bind10-guide.txt 50 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360
  1. BIND 10 Guide
  2. Administrator Reference for BIND 10
  3. This is the reference guide for BIND 10 version 20111021.
  4. Copyright (c) 2010-2011 Internet Systems Consortium, Inc.
  5. Abstract
  6. BIND 10 is a Domain Name System (DNS) suite managed by Internet Systems
  7. Consortium (ISC). It includes DNS libraries and modular components for
  8. controlling authoritative and recursive DNS servers.
  9. This is the reference guide for BIND 10 version 20111021. The most
  10. up-to-date version of this document (in PDF, HTML, and plain text
  11. formats), along with other documents for BIND 10, can be found at
  12. http://bind10.isc.org/docs.
  13. --------------------------------------------------------------------------
  14. Table of Contents
  15. 1. Introduction
  16. Supported Platforms
  17. Required Software
  18. Starting and Stopping the Server
  19. Managing BIND 10
  20. 2. Installation
  21. Building Requirements
  22. Quick start
  23. Installation from source
  24. Download Tar File
  25. Retrieve from Git
  26. Configure before the build
  27. Build
  28. Install
  29. Install Hierarchy
  30. 3. Starting BIND10 with bind10
  31. Starting BIND 10
  32. Configuration of started processes
  33. 4. Command channel
  34. 5. Configuration manager
  35. 6. Remote control daemon
  36. Configuration specification for b10-cmdctl
  37. 7. Control and configure user interface
  38. 8. Authoritative Server
  39. Server Configurations
  40. Data Source Backends
  41. Loading Master Zones Files
  42. 9. Incoming Zone Transfers
  43. Configuration for Incoming Zone Transfers
  44. Enabling IXFR
  45. Trigger an Incoming Zone Transfer Manually
  46. 10. Outbound Zone Transfers
  47. 11. Secondary Manager
  48. 12. Recursive Name Server
  49. Access Control
  50. Forwarding
  51. 13. Statistics
  52. 14. Logging
  53. Logging configuration
  54. Loggers
  55. Output Options
  56. Example session
  57. Logging Message Format
  58. List of Tables
  59. 3.1.
  60. Chapter 1. Introduction
  61. Table of Contents
  62. Supported Platforms
  63. Required Software
  64. Starting and Stopping the Server
  65. Managing BIND 10
  66. BIND is the popular implementation of a DNS server, developer interfaces,
  67. and DNS tools. BIND 10 is a rewrite of BIND 9. BIND 10 is written in C++
  68. and Python and provides a modular environment for serving and maintaining
  69. DNS.
  70. Note
  71. This guide covers the experimental prototype of BIND 10 version 20111021.
  72. Note
  73. BIND 10 provides a EDNS0- and DNSSEC-capable authoritative DNS server and
  74. a caching recursive name server which also provides forwarding.
  75. Supported Platforms
  76. BIND 10 builds have been tested on Debian GNU/Linux 5, Ubuntu 9.10, NetBSD
  77. 5, Solaris 10, FreeBSD 7 and 8, and CentOS Linux 5.3. It has been tested
  78. on Sparc, i386, and amd64 hardware platforms. It is planned for BIND 10 to
  79. build, install and run on Windows and standard Unix-type platforms.
  80. Required Software
  81. BIND 10 requires Python 3.1. Later versions may work, but Python 3.1 is
  82. the minimum version which will work.
  83. BIND 10 uses the Botan crypto library for C++. It requires at least Botan
  84. version 1.8.
  85. BIND 10 uses the log4cplus C++ logging library. It requires at least
  86. log4cplus version 1.0.3.
  87. The authoritative server requires SQLite 3.3.9 or newer. The b10-xfrin,
  88. b10-xfrout, and b10-zonemgr modules require the libpython3 library and the
  89. Python _sqlite3.so module.
  90. Note
  91. Some operating systems do not provide these dependencies in their default
  92. installation nor standard packages collections. You may need to install
  93. them separately.
  94. Starting and Stopping the Server
  95. BIND 10 is modular. Part of this modularity is accomplished using multiple
  96. cooperating processes which, together, provide the server functionality.
  97. This is a change from the previous generation of BIND software, which used
  98. a single process.
  99. At first, running many different processes may seem confusing. However,
  100. these processes are started, stopped, and maintained by a single command,
  101. bind10. This command starts a master process which will start other
  102. processes as needed. The processes started by the bind10 command have
  103. names starting with "b10-", including:
  104. o b10-msgq -- Message bus daemon. This process coordinates communication
  105. between all of the other BIND 10 processes.
  106. o b10-auth -- Authoritative DNS server. This process serves DNS
  107. requests.
  108. o b10-cfgmgr -- Configuration manager. This process maintains all of the
  109. configuration for BIND 10.
  110. o b10-cmdctl -- Command and control service. This process allows
  111. external control of the BIND 10 system.
  112. o b10-resolver -- Recursive name server. This process handles incoming
  113. queries.
  114. o b10-stats -- Statistics collection daemon. This process collects and
  115. reports statistics data.
  116. o b10-xfrin -- Incoming zone transfer service. This process is used to
  117. transfer a new copy of a zone into BIND 10, when acting as a secondary
  118. server.
  119. o b10-xfrout -- Outgoing zone transfer service. This process is used to
  120. handle transfer requests to send a local zone to a remote secondary
  121. server, when acting as a master server.
  122. o b10-zonemgr -- Secondary manager. This process keeps track of timers
  123. and other necessary information for BIND 10 to act as a slave server.
  124. These are ran automatically by bind10 and do not need to be run manually.
  125. Managing BIND 10
  126. Once BIND 10 is running, a few commands are used to interact directly with
  127. the system:
  128. o bindctl -- interactive administration interface. This is a
  129. command-line tool which allows an administrator to control BIND 10.
  130. o b10-loadzone -- zone file loader. This tool will load standard
  131. masterfile-format zone files into BIND 10.
  132. o b10-cmdctl-usermgr -- user access control. This tool allows an
  133. administrator to authorize additional users to manage BIND 10.
  134. The tools and modules are covered in full detail in this guide. In
  135. addition, manual pages are also provided in the default installation.
  136. BIND 10 also provides libraries and programmer interfaces for C++ and
  137. Python for the message bus, configuration backend, and, of course, DNS.
  138. These include detailed developer documentation and code examples.
  139. Chapter 2. Installation
  140. Table of Contents
  141. Building Requirements
  142. Quick start
  143. Installation from source
  144. Download Tar File
  145. Retrieve from Git
  146. Configure before the build
  147. Build
  148. Install
  149. Install Hierarchy
  150. Building Requirements
  151. In addition to the run-time requirements, building BIND 10 from source
  152. code requires various development include headers.
  153. Note
  154. Some operating systems have split their distribution packages into a
  155. run-time and a development package. You will need to install the
  156. development package versions, which include header files and libraries, to
  157. build BIND 10 from source code.
  158. Building from source code requires the Boost build-time headers. At least
  159. Boost version 1.35 is required.
  160. To build BIND 10, also install the Botan (at least version 1.8) and the
  161. log4cplus (at least version 1.0.3) development include headers.
  162. The Python Library and Python _sqlite3 module are required to enable the
  163. Xfrout and Xfrin support.
  164. Note
  165. The Python related libraries and modules need to be built for Python 3.1.
  166. Building BIND 10 also requires a C++ compiler and standard development
  167. headers, make, and pkg-config. BIND 10 builds have been tested with GCC
  168. g++ 3.4.3, 4.1.2, 4.1.3, 4.2.1, 4.3.2, and 4.4.1; Clang++ 2.8; and Sun C++
  169. 5.10.
  170. Quick start
  171. Note
  172. This quickly covers the standard steps for installing and deploying BIND
  173. 10 as an authoritative name server using its defaults. For
  174. troubleshooting, full customizations and further details, see the
  175. respective chapters in the BIND 10 guide.
  176. To quickly get started with BIND 10, follow these steps.
  177. 1. Install required build dependencies.
  178. 2. Download the BIND 10 source tar file from
  179. ftp://ftp.isc.org/isc/bind10/.
  180. 3. Extract the tar file:
  181. $ gzcat bind10-VERSION.tar.gz | tar -xvf -
  182. 4. Go into the source and run configure:
  183. $ cd bind10-VERSION
  184. $ ./configure
  185. 5. Build it:
  186. $ make
  187. 6. Install it (to default /usr/local):
  188. $ make install
  189. 7. Start the server:
  190. $ /usr/local/sbin/bind10
  191. 8. Test it; for example:
  192. $ dig @127.0.0.1 -c CH -t TXT authors.bind
  193. 9. Load desired zone file(s), for example:
  194. $ b10-loadzone your.zone.example.org
  195. 10. Test the new zone.
  196. Installation from source
  197. BIND 10 is open source software written in C++ and Python. It is freely
  198. available in source code form from ISC via the Git code revision control
  199. system or as a downloadable tar file. It may also be available in
  200. pre-compiled ready-to-use packages from operating system vendors.
  201. Download Tar File
  202. Downloading a release tar file is the recommended method to obtain the
  203. source code.
  204. The BIND 10 releases are available as tar file downloads from
  205. ftp://ftp.isc.org/isc/bind10/. Periodic development snapshots may also be
  206. available.
  207. Retrieve from Git
  208. Downloading this "bleeding edge" code is recommended only for developers
  209. or advanced users. Using development code in a production environment is
  210. not recommended.
  211. Note
  212. When using source code retrieved via Git additional software will be
  213. required: automake (v1.11 or newer), libtoolize, and autoconf (2.59 or
  214. newer). These may need to be installed.
  215. The latest development code, including temporary experiments and
  216. un-reviewed code, is available via the BIND 10 code revision control
  217. system. This is powered by Git and all the BIND 10 development is public.
  218. The leading development is done in the "master".
  219. The code can be checked out from git://bind10.isc.org/bind10; for example:
  220. $ git clone git://bind10.isc.org/bind10
  221. When checking out the code from the code version control system, it
  222. doesn't include the generated configure script, Makefile.in files, nor the
  223. related configure files. They can be created by running autoreconf with
  224. the --install switch. This will run autoconf, aclocal, libtoolize,
  225. autoheader, automake, and related commands.
  226. Configure before the build
  227. BIND 10 uses the GNU Build System to discover build environment details.
  228. To generate the makefiles using the defaults, simply run:
  229. $ ./configure
  230. Run ./configure with the --help switch to view the different options. The
  231. commonly-used options are:
  232. --prefix
  233. Define the installation location (the default is /usr/local/).
  234. --with-boost-include
  235. Define the path to find the Boost headers.
  236. --with-pythonpath
  237. Define the path to Python 3.1 if it is not in the standard
  238. execution path.
  239. --with-gtest
  240. Enable building the C++ Unit Tests using the Google Tests
  241. framework. Optionally this can define the path to the gtest header
  242. files and library.
  243. For example, the following configures it to find the Boost headers, find
  244. the Python interpreter, and sets the installation location:
  245. $ ./configure \
  246. --with-boost-include=/usr/pkg/include \
  247. --with-pythonpath=/usr/pkg/bin/python3.1 \
  248. --prefix=/opt/bind10
  249. If the configure fails, it may be due to missing or old dependencies.
  250. Build
  251. After the configure step is complete, to build the executables from the
  252. C++ code and prepare the Python scripts, run:
  253. $ make
  254. Install
  255. To install the BIND 10 executables, support files, and documentation, run:
  256. $ make install
  257. Note
  258. The install step may require superuser privileges.
  259. Install Hierarchy
  260. The following is the layout of the complete BIND 10 installation:
  261. o bin/ -- general tools and diagnostic clients.
  262. o etc/bind10-devel/ -- configuration files.
  263. o lib/ -- libraries and python modules.
  264. o libexec/bind10-devel/ -- executables that a user wouldn't normally run
  265. directly and are not run independently. These are the BIND 10 modules
  266. which are daemons started by the bind10 tool.
  267. o sbin/ -- commands used by the system administrator.
  268. o share/bind10-devel/ -- configuration specifications.
  269. o share/man/ -- manual pages (online documentation).
  270. o var/bind10-devel/ -- data source and configuration databases.
  271. Chapter 3. Starting BIND10 with bind10
  272. Table of Contents
  273. Starting BIND 10
  274. Configuration of started processes
  275. BIND 10 provides the bind10 command which starts up the required
  276. processes. bind10 will also restart some processes that exit unexpectedly.
  277. This is the only command needed to start the BIND 10 system.
  278. After starting the b10-msgq communications channel, bind10 connects to it,
  279. runs the configuration manager, and reads its own configuration. Then it
  280. starts the other modules.
  281. The b10-sockcreator, b10-msgq and b10-cfgmgr services make up the core.
  282. The b10-msgq daemon provides the communication channel between every part
  283. of the system. The b10-cfgmgr daemon is always needed by every module, if
  284. only to send information about themselves somewhere, but more importantly
  285. to ask about their own settings, and about other modules. The
  286. b10-sockcreator will allocate sockets for the rest of the system.
  287. In its default configuration, the bind10 master process will also start up
  288. b10-cmdctl for admins to communicate with the system, b10-auth for
  289. authoritative DNS service, b10-stats for statistics collection, b10-xfrin
  290. for inbound DNS zone transfers, b10-xfrout for outbound DNS zone
  291. transfers, and b10-zonemgr for secondary service.
  292. Starting BIND 10
  293. To start the BIND 10 service, simply run bind10. Run it with the --verbose
  294. switch to get additional debugging or diagnostic output.
  295. Note
  296. If the setproctitle Python module is detected at start up, the process
  297. names for the Python-based daemons will be renamed to better identify them
  298. instead of just "python". This is not needed on some operating systems.
  299. Configuration of started processes
  300. The processes to be started can be configured, with the exception of the
  301. b10-sockcreator, b10-msgq and b10-cfgmgr.
  302. The configuration is in the Boss/components section. Each element
  303. represents one component, which is an abstraction of a process (currently
  304. there's also one component which doesn't represent a process). If you
  305. didn't want to transfer out at all (your server is a slave only), you
  306. would just remove the corresponding component from the set, like this and
  307. the process would be stopped immediately (and not started on the next
  308. startup):
  309. > config remove Boss/components b10-xfrout
  310. > config commit
  311. To add a process to the set, let's say the resolver (which not started by
  312. default), you would do this:
  313. > config add Boss/components b10-resolver
  314. > config set Boss/components/b10-resolver/special resolver
  315. > config set Boss/components/b10-resolver/kind needed
  316. > config set Boss/components/b10-resolver/priority 10
  317. > config commit
  318. Now, what it means. We add an entry called b10-resolver. It is both a name
  319. used to reference this component in the configuration and the name of the
  320. process to start. Then we set some parameters on how to start it.
  321. The special one is for components that need some kind of special care
  322. during startup or shutdown. Unless specified, the component is started in
  323. usual way. This is the list of components that need to be started in a
  324. special way, with the value of special used for them:
  325. Table 3.1.
  326. +------------------------------------------------------------------------+
  327. | Component | Special | Description |
  328. |--------------+----------+----------------------------------------------|
  329. | b10-auth | auth | Authoritative server |
  330. |--------------+----------+----------------------------------------------|
  331. | b10-resolver | resolver | The resolver |
  332. |--------------+----------+----------------------------------------------|
  333. | b10-cmdctl | cmdctl | The command control (remote control |
  334. | | | interface) |
  335. |--------------+----------+----------------------------------------------|
  336. | setuid | setuid | Virtual component, see below |
  337. +------------------------------------------------------------------------+
  338. The kind specifies how a failure of the component should be handled. If it
  339. is set to "dispensable" (the default unless you set something else), it
  340. will get started again if it fails. If it is set to "needed" and it fails
  341. at startup, the whole bind10 shuts down and exits with error exit code.
  342. But if it fails some time later, it is just started again. If you set it
  343. to "core", you indicate that the system is not usable without the
  344. component and if such component fails, the system shuts down no matter
  345. when the failure happened. This is the behaviour of the core components
  346. (the ones you can't turn off), but you can declare any other components as
  347. core as well if you wish (but you can turn these off, they just can't
  348. fail).
  349. The priority defines order in which the components should start. The ones
  350. with higher number are started sooner than the ones with lower ones. If
  351. you don't set it, 0 (zero) is used as the priority.
  352. There are other parameters we didn't use in our example. One of them is
  353. "address". It is the address used by the component on the b10-msgq message
  354. bus. The special components already know their address, but the usual ones
  355. don't. The address is by convention the thing after b10-, with the first
  356. letter capital (eg. b10-stats would have "Stats" as its address).
  357. The last one is process. It is the name of the process to be started. It
  358. defaults to the name of the component if not set, but you can use this to
  359. override it.
  360. Note
  361. This system allows you to start the same component multiple times (by
  362. including it in the configuration with different names, but the same
  363. process setting). However, the rest of the system doesn't expect such
  364. situation, so it would probably not do what you want. Such support is yet
  365. to be implemented.
  366. Note
  367. The configuration is quite powerful, but that includes a lot of space for
  368. mistakes. You could turn off the b10-cmdctl, but then you couldn't change
  369. it back the usual way, as it would require it to be running (you would
  370. have to find and edit the configuration directly). Also, some modules
  371. might have dependencies -- b10-stats-httpd need b10-stats, b10-xfrout
  372. needs the b10-auth to be running, etc.
  373. In short, you should think twice before disabling something here.
  374. Now, to the mysterious setuid virtual component. If you use the -u option
  375. to start the bind10 as root, but change the user later, we need to start
  376. the b10-auth or b10-resolver as root (until the socket creator is
  377. finished). So we need to specify the time when the switch from root do the
  378. given user happens and that's what the setuid component is for. The switch
  379. is done at the time the setuid component would be started, if it was a
  380. process. The default configuration contains the setuid component with
  381. priority 5, b10-auth has 10 to be started before the switch and everything
  382. else is without priority, so it is started after the switch.
  383. Chapter 4. Command channel
  384. The BIND 10 components use the b10-msgq message routing daemon to
  385. communicate with other BIND 10 components. The b10-msgq implements what is
  386. called the "Command Channel". Processes intercommunicate by sending
  387. messages on the command channel. Example messages include shutdown, get
  388. configurations, and set configurations. This Command Channel is not used
  389. for DNS message passing. It is used only to control and monitor the BIND
  390. 10 system.
  391. Administrators do not communicate directly with the b10-msgq daemon. By
  392. default, BIND 10 uses port 9912 for the b10-msgq service. It listens on
  393. 127.0.0.1.
  394. Chapter 5. Configuration manager
  395. The configuration manager, b10-cfgmgr, handles all BIND 10 system
  396. configuration. It provides persistent storage for configuration, and
  397. notifies running modules of configuration changes.
  398. The b10-auth and b10-xfrin daemons and other components receive their
  399. configurations from the configuration manager over the b10-msgq command
  400. channel.
  401. The administrator doesn't connect to it directly, but uses a user
  402. interface to communicate with the configuration manager via b10-cmdctl's
  403. REST-ful interface. b10-cmdctl is covered in Chapter 6, Remote control
  404. daemon.
  405. Note
  406. The development prototype release only provides the bindctl as a user
  407. interface to b10-cmdctl. Upcoming releases will provide another
  408. interactive command-line interface and a web-based interface.
  409. The b10-cfgmgr daemon can send all specifications and all current settings
  410. to the bindctl client (via b10-cmdctl).
  411. b10-cfgmgr relays configurations received from b10-cmdctl to the
  412. appropriate modules.
  413. The stored configuration file is at
  414. /usr/local/var/bind10-devel/b10-config.db. (The full path is what was
  415. defined at build configure time for --localstatedir. The default is
  416. /usr/local/var/.) The format is loosely based on JSON and is directly
  417. parseable python, but this may change in a future version. This
  418. configuration data file is not manually edited by the administrator.
  419. The configuration manager does not have any command line arguments.
  420. Normally it is not started manually, but is automatically started using
  421. the bind10 master process (as covered in Chapter 3, Starting BIND10 with
  422. bind10).
  423. Chapter 6. Remote control daemon
  424. Table of Contents
  425. Configuration specification for b10-cmdctl
  426. b10-cmdctl is the gateway between administrators and the BIND 10 system.
  427. It is a HTTPS server that uses standard HTTP Digest Authentication for
  428. username and password validation. It provides a REST-ful interface for
  429. accessing and controlling BIND 10.
  430. When b10-cmdctl starts, it firsts asks b10-cfgmgr about what modules are
  431. running and what their configuration is (over the b10-msgq channel). Then
  432. it will start listening on HTTPS for clients -- the user interface -- such
  433. as bindctl.
  434. b10-cmdctl directly sends commands (received from the user interface) to
  435. the specified component. Configuration changes are actually commands to
  436. b10-cfgmgr so are sent there.
  437. The HTTPS server requires a private key, such as a RSA PRIVATE KEY. The
  438. default location is at /usr/local/etc/bind10-devel/cmdctl-keyfile.pem. (A
  439. sample key is at /usr/local/share/bind10-devel/cmdctl-keyfile.pem.) It
  440. also uses a certificate located at
  441. /usr/local/etc/bind10-devel/cmdctl-certfile.pem. (A sample certificate is
  442. at /usr/local/share/bind10-devel/cmdctl-certfile.pem.) This may be a
  443. self-signed certificate or purchased from a certification authority.
  444. Note
  445. The HTTPS server doesn't support a certificate request from a client (at
  446. this time). The b10-cmdctl daemon does not provide a public service. If
  447. any client wants to control BIND 10, then a certificate needs to be first
  448. received from the BIND 10 administrator. The BIND 10 installation provides
  449. a sample PEM bundle that matches the sample key and certificate.
  450. The b10-cmdctl daemon also requires the user account file located at
  451. /usr/local/etc/bind10-devel/cmdctl-accounts.csv. This comma-delimited file
  452. lists the accounts with a user name, hashed password, and salt. (A sample
  453. file is at /usr/local/share/bind10-devel/cmdctl-accounts.csv. It contains
  454. the user named "root" with the password "bind10".)
  455. The administrator may create a user account with the b10-cmdctl-usermgr
  456. tool.
  457. By default the HTTPS server listens on the localhost port 8080. The port
  458. can be set by using the --port command line option. The address to listen
  459. on can be set using the --address command line argument. Each HTTPS
  460. connection is stateless and timesout in 1200 seconds by default. This can
  461. be redefined by using the --idle-timeout command line argument.
  462. Configuration specification for b10-cmdctl
  463. The configuration items for b10-cmdctl are: key_file cert_file
  464. accounts_file
  465. The control commands are: print_settings shutdown
  466. Chapter 7. Control and configure user interface
  467. Note
  468. For this development prototype release, bindctl is the only user
  469. interface. It is expected that upcoming releases will provide another
  470. interactive command-line interface and a web-based interface for
  471. controlling and configuring BIND 10.
  472. The bindctl tool provides an interactive prompt for configuring,
  473. controlling, and querying the BIND 10 components. It communicates directly
  474. with a REST-ful interface over HTTPS provided by b10-cmdctl. It doesn't
  475. communicate to any other components directly.
  476. Configuration changes are actually commands to b10-cfgmgr. So when bindctl
  477. sends a configuration, it is sent to b10-cmdctl (over a HTTPS connection);
  478. then b10-cmdctl sends the command (over a b10-msgq command channel) to
  479. b10-cfgmgr which then stores the details and relays (over a b10-msgq
  480. command channel) the configuration on to the specified module.
  481. Chapter 8. Authoritative Server
  482. Table of Contents
  483. Server Configurations
  484. Data Source Backends
  485. Loading Master Zones Files
  486. The b10-auth is the authoritative DNS server. It supports EDNS0 and
  487. DNSSEC. It supports IPv6. Normally it is started by the bind10 master
  488. process.
  489. Server Configurations
  490. b10-auth is configured via the b10-cfgmgr configuration manager. The
  491. module name is "Auth". The configuration data item is:
  492. database_file
  493. This is an optional string to define the path to find the SQLite3
  494. database file. Note: Later the DNS server will use various data
  495. source backends. This may be a temporary setting until then.
  496. The configuration command is:
  497. shutdown
  498. Stop the authoritative DNS server.
  499. Data Source Backends
  500. Note
  501. For the development prototype release, b10-auth supports a SQLite3 data
  502. source backend and in-memory data source backend. Upcoming versions will
  503. be able to use multiple different data sources, such as MySQL and Berkeley
  504. DB.
  505. By default, the SQLite3 backend uses the data file located at
  506. /usr/local/var/bind10-devel/zone.sqlite3. (The full path is what was
  507. defined at build configure time for --localstatedir. The default is
  508. /usr/local/var/.) This data file location may be changed by defining the
  509. "database_file" configuration.
  510. Loading Master Zones Files
  511. RFC 1035 style DNS master zone files may imported into a BIND 10 data
  512. source by using the b10-loadzone utility.
  513. b10-loadzone supports the following special directives (control entries):
  514. $INCLUDE
  515. Loads an additional zone file. This may be recursive.
  516. $ORIGIN
  517. Defines the relative domain name.
  518. $TTL
  519. Defines the time-to-live value used for following records that
  520. don't include a TTL.
  521. The -o argument may be used to define the default origin for loaded zone
  522. file records.
  523. Note
  524. In the development prototype release, only the SQLite3 back end is used.
  525. By default, it stores the zone data in
  526. /usr/local/var/bind10-devel/zone.sqlite3 unless the -d switch is used to
  527. set the database filename. Multiple zones are stored in a single SQLite3
  528. zone database.
  529. If you reload a zone already existing in the database, all records from
  530. that prior zone disappear and a whole new set appears.
  531. Chapter 9. Incoming Zone Transfers
  532. Table of Contents
  533. Configuration for Incoming Zone Transfers
  534. Enabling IXFR
  535. Trigger an Incoming Zone Transfer Manually
  536. Incoming zones are transferred using the b10-xfrin process which is
  537. started by bind10. When received, the zone is stored in the corresponding
  538. BIND 10 data source, and its records can be served by b10-auth. In
  539. combination with b10-zonemgr (for automated SOA checks), this allows the
  540. BIND 10 server to provide "secondary" service.
  541. The b10-xfrin process supports both AXFR and IXFR. Due to some
  542. implementation limitations of the current development release, however, it
  543. only tries AXFR by default, and care should be taken to enable IXFR.
  544. Note
  545. In the current development release of BIND 10, incoming zone transfers are
  546. only available for SQLite3-based data sources, that is, they don't work
  547. for an in-memory data source.
  548. Configuration for Incoming Zone Transfers
  549. In practice, you need to specify a list of secondary zones to enable
  550. incoming zone transfers for these zones (you can still trigger a zone
  551. transfer manually, without a prior configuration (see below)).
  552. For example, to enable zone transfers for a zone named "example.com"
  553. (whose master address is assumed to be 2001:db8::53 here), run the
  554. following at the bindctl prompt:
  555. > config add Xfrin/zones
  556. > config set Xfrin/zones[0]/name "example.com"
  557. > config set Xfrin/zones[0]/master_addr "2001:db8::53"
  558. > config commit
  559. (We assume there has been no zone configuration before).
  560. Enabling IXFR
  561. As noted above, b10-xfrin uses AXFR for zone transfers by default. To
  562. enable IXFR for zone transfers for a particular zone, set the use_ixfr
  563. configuration parameter to true. In the above example of configuration
  564. sequence, you'll need to add the following before performing commit:
  565. > config set Xfrin/zones[0]/use_ixfr true
  566. Note
  567. One reason why IXFR is disabled by default in the current release is
  568. because it does not support automatic fallback from IXFR to AXFR when it
  569. encounters a primary server that doesn't support outbound IXFR (and, not
  570. many existing implementations support it). Another, related reason is that
  571. it does not use AXFR even if it has no knowledge about the zone (like at
  572. the very first time the secondary server is set up). IXFR requires the
  573. "current version" of the zone, so obviously it doesn't work in this
  574. situation and AXFR is the only workable choice. The current release of
  575. b10-xfrin does not make this selection automatically. These features will
  576. be implemented in a near future version, at which point we will enable
  577. IXFR by default.
  578. Trigger an Incoming Zone Transfer Manually
  579. To manually trigger a zone transfer to retrieve a remote zone, you may use
  580. the bindctl utility. For example, at the bindctl prompt run:
  581. > Xfrin retransfer zone_name="foo.example.org" master=192.0.2.99
  582. Chapter 10. Outbound Zone Transfers
  583. The b10-xfrout process is started by bind10. When the b10-auth
  584. authoritative DNS server receives an AXFR or IXFR request, b10-auth
  585. internally forwards the request to b10-xfrout, which handles the rest of
  586. request processing. This is used to provide primary DNS service to share
  587. zones to secondary name servers. The b10-xfrout is also used to send
  588. NOTIFY messages to secondary servers.
  589. A global or per zone transfer_acl configuration can be used to control
  590. accessibility of the outbound zone transfer service. By default,
  591. b10-xfrout allows any clients to perform zone transfers for any zones:
  592. > config show Xfrout/transfer_acl
  593. Xfrout/transfer_acl[0] {"action": "ACCEPT"} any (default)
  594. You can change this to, for example, rejecting all transfer requests by
  595. default while allowing requests for the transfer of zone "example.com"
  596. from 192.0.2.1 and 2001:db8::1 as follows:
  597. > config set Xfrout/transfer_acl[0] {"action": "REJECT"}
  598. > config add Xfrout/zone_config
  599. > config set Xfrout/zone_config[0]/origin "example.com"
  600. > config set Xfrout/zone_config[0]/transfer_acl [{"action": "ACCEPT", "from": "192.0.2.1"},
  601. {"action": "ACCEPT", "from": "2001:db8::1"}]
  602. > config commit
  603. Note
  604. In the above example the lines for transfer_acl were divided for
  605. readability. In the actual input it must be in a single line.
  606. If you want to require TSIG in access control, a separate TSIG "key ring"
  607. must be configured specifically for b10-xfrout as well as a system wide
  608. key ring, both containing a consistent set of keys. For example, to change
  609. the previous example to allowing requests from 192.0.2.1 signed by a TSIG
  610. with a key name of "key.example", you'll need to do this:
  611. > config set tsig_keys/keys ["key.example:<base64-key>"]
  612. > config set Xfrout/tsig_keys/keys ["key.example:<base64-key>"]
  613. > config set Xfrout/zone_config[0]/transfer_acl [{"action": "ACCEPT", "from": "192.0.2.1", "key": "key.example"}]
  614. > config commit
  615. The first line of configuration defines a system wide key ring. This is
  616. necessary because the b10-auth server also checks TSIGs and it uses the
  617. system wide configuration.
  618. Note
  619. In a future version, b10-xfrout will also use the system wide TSIG
  620. configuration. The way to specify zone specific configuration (ACLs, etc)
  621. is likely to be changed, too.
  622. Chapter 11. Secondary Manager
  623. The b10-zonemgr process is started by bind10. It keeps track of SOA
  624. refresh, retry, and expire timers and other details for BIND 10 to perform
  625. as a slave. When the b10-auth authoritative DNS server receives a NOTIFY
  626. message, b10-zonemgr may tell b10-xfrin to do a refresh to start an
  627. inbound zone transfer. The secondary manager resets its counters when a
  628. new zone is transferred in.
  629. Note
  630. Access control (such as allowing notifies) is not yet provided. The
  631. primary/secondary service is not yet complete.
  632. Chapter 12. Recursive Name Server
  633. Table of Contents
  634. Access Control
  635. Forwarding
  636. The b10-resolver process is started by bind10.
  637. The main bind10 process can be configured to select to run either the
  638. authoritative or resolver or both. By default, it starts the authoritative
  639. service. You may change this using bindctl, for example:
  640. > config remove Boss/components b10-xfrout
  641. > config remove Boss/components b10-xfrin
  642. > config remove Boss/components b10-auth
  643. > config add Boss/components b10-resolver
  644. > config set Boss/components/b10-resolver/special resolver
  645. > config set Boss/components/b10-resolver/kind needed
  646. > config set Boss/components/b10-resolver/priority 10
  647. > config commit
  648. The master bind10 will stop and start the desired services.
  649. By default, the resolver listens on port 53 for 127.0.0.1 and ::1. The
  650. following example shows how it can be configured to listen on an
  651. additional address (and port):
  652. > config add Resolver/listen_on
  653. > config set Resolver/listen_on[2]/address "192.168.1.1"
  654. > config set Resolver/listen_on[2]/port 53
  655. > config commit
  656. (Replace the "2" as needed; run "config show Resolver/listen_on" if
  657. needed.)
  658. Access Control
  659. By default, the b10-resolver daemon only accepts DNS queries from the
  660. localhost (127.0.0.1 and ::1). The Resolver/query_acl configuration may be
  661. used to reject, drop, or allow specific IPs or networks. This
  662. configuration list is first match.
  663. The configuration's action item may be set to "ACCEPT" to allow the
  664. incoming query, "REJECT" to respond with a DNS REFUSED return code, or
  665. "DROP" to ignore the query without any response (such as a blackhole). For
  666. more information, see the respective debugging messages:
  667. RESOLVER_QUERY_ACCEPTED, RESOLVER_QUERY_REJECTED, and
  668. RESOLVER_QUERY_DROPPED.
  669. The required configuration's from item is set to an IPv4 or IPv6 address,
  670. addresses with an network mask, or to the special lowercase keywords
  671. "any6" (for any IPv6 address) or "any4" (for any IPv4 address).
  672. For example to allow the 192.168.1.0/24 network to use your recursive name
  673. server, at the bindctl prompt run:
  674. > config add Resolver/query_acl
  675. > config set Resolver/query_acl[2]/action "ACCEPT"
  676. > config set Resolver/query_acl[2]/from "192.168.1.0/24"
  677. > config commit
  678. (Replace the "2" as needed; run "config show Resolver/query_acl" if
  679. needed.)
  680. Note
  681. This prototype access control configuration syntax may be changed.
  682. Forwarding
  683. To enable forwarding, the upstream address and port must be configured to
  684. forward queries to, such as:
  685. > config set Resolver/forward_addresses [{ "address": "192.168.1.1", "port": 53 }]
  686. > config commit
  687. (Replace 192.168.1.1 to point to your full resolver.)
  688. Normal iterative name service can be re-enabled by clearing the forwarding
  689. address(es); for example:
  690. > config set Resolver/forward_addresses []
  691. > config commit
  692. Chapter 13. Statistics
  693. The b10-stats process is started by bind10. It periodically collects
  694. statistics data from various modules and aggregates it.
  695. This stats daemon provides commands to identify if it is running, show
  696. specified or all statistics data, show specified or all statistics data
  697. schema, and set specified statistics data. For example, using bindctl:
  698. > Stats show
  699. {
  700. "Auth": {
  701. "queries.tcp": 1749,
  702. "queries.udp": 867868
  703. },
  704. "Boss": {
  705. "boot_time": "2011-01-20T16:59:03Z"
  706. },
  707. "Stats": {
  708. "boot_time": "2011-01-20T16:59:05Z",
  709. "last_update_time": "2011-01-20T17:04:05Z",
  710. "lname": "4d3869d9_a@jreed.example.net",
  711. "report_time": "2011-01-20T17:04:06Z",
  712. "timestamp": 1295543046.823504
  713. }
  714. }
  715. Chapter 14. Logging
  716. Table of Contents
  717. Logging configuration
  718. Loggers
  719. Output Options
  720. Example session
  721. Logging Message Format
  722. Logging configuration
  723. The logging system in BIND 10 is configured through the Logging module.
  724. All BIND 10 modules will look at the configuration in Logging to see what
  725. should be logged and to where.
  726. Loggers
  727. Within BIND 10, a message is logged through a component called a "logger".
  728. Different parts of BIND 10 log messages through different loggers, and
  729. each logger can be configured independently of one another.
  730. In the Logging module, you can specify the configuration for zero or more
  731. loggers; any that are not specified will take appropriate default values..
  732. The three most important elements of a logger configuration are the name
  733. (the component that is generating the messages), the severity (what to
  734. log), and the output_options (where to log).
  735. name (string)
  736. Each logger in the system has a name, the name being that of the component
  737. using it to log messages. For instance, if you want to configure logging
  738. for the resolver module, you add an entry for a logger named "Resolver".
  739. This configuration will then be used by the loggers in the Resolver
  740. module, and all the libraries used by it.
  741. If you want to specify logging for one specific library within the module,
  742. you set the name to module.library. For example, the logger used by the
  743. nameserver address store component has the full name of "Resolver.nsas".
  744. If there is no entry in Logging for a particular library, it will use the
  745. configuration given for the module.
  746. To illustrate this, suppose you want the cache library to log messages of
  747. severity DEBUG, and the rest of the resolver code to log messages of
  748. severity INFO. To achieve this you specify two loggers, one with the name
  749. "Resolver" and severity INFO, and one with the name "Resolver.cache" with
  750. severity DEBUG. As there are no entries for other libraries (e.g. the
  751. nsas), they will use the configuration for the module ("Resolver"), so
  752. giving the desired behavior.
  753. One special case is that of a module name of "*" (asterisks), which is
  754. interpreted as any module. You can set global logging options by using
  755. this, including setting the logging configuration for a library that is
  756. used by multiple modules (e.g. "*.config" specifies the configuration
  757. library code in whatever module is using it).
  758. If there are multiple logger specifications in the configuration that
  759. might match a particular logger, the specification with the more specific
  760. logger name takes precedence. For example, if there are entries for for
  761. both "*" and "Resolver", the resolver module -- and all libraries it uses
  762. -- will log messages according to the configuration in the second entry
  763. ("Resolver"). All other modules will use the configuration of the first
  764. entry ("*"). If there was also a configuration entry for "Resolver.cache",
  765. the cache library within the resolver would use that in preference to the
  766. entry for "Resolver".
  767. One final note about the naming. When specifying the module name within a
  768. logger, use the name of the module as specified in bindctl, e.g.
  769. "Resolver" for the resolver module, "Xfrout" for the xfrout module, etc.
  770. When the message is logged, the message will include the name of the
  771. logger generating the message, but with the module name replaced by the
  772. name of the process implementing the module (so for example, a message
  773. generated by the "Auth.cache" logger will appear in the output with a
  774. logger name of "b10-auth.cache").
  775. severity (string)
  776. This specifies the category of messages logged. Each message is logged
  777. with an associated severity which may be one of the following (in
  778. descending order of severity):
  779. o FATAL
  780. o ERROR
  781. o WARN
  782. o INFO
  783. o DEBUG
  784. When the severity of a logger is set to one of these values, it will only
  785. log messages of that severity, and the severities above it. The severity
  786. may also be set to NONE, in which case all messages from that logger are
  787. inhibited.
  788. output_options (list)
  789. Each logger can have zero or more output_options. These specify where log
  790. messages are sent to. These are explained in detail below.
  791. The other options for a logger are:
  792. debuglevel (integer)
  793. When a logger's severity is set to DEBUG, this value specifies what debug
  794. messages should be printed. It ranges from 0 (least verbose) to 99 (most
  795. verbose).
  796. If severity for the logger is not DEBUG, this value is ignored.
  797. additive (true or false)
  798. If this is true, the output_options from the parent will be used. For
  799. example, if there are two loggers configured; "Resolver" and
  800. "Resolver.cache", and additive is true in the second, it will write the
  801. log messages not only to the destinations specified for "Resolver.cache",
  802. but also to the destinations as specified in the output_options in the
  803. logger named "Resolver".
  804. Output Options
  805. The main settings for an output option are the destination and a value
  806. called output, the meaning of which depends on the destination that is
  807. set.
  808. destination (string)
  809. The destination is the type of output. It can be one of:
  810. o console
  811. o file
  812. o syslog
  813. output (string)
  814. Depending on what is set as the output destination, this value is
  815. interpreted as follows:
  816. destination is "console"
  817. The value of output must be one of "stdout" (messages printed to
  818. standard output) or "stderr" (messages printed to standard error).
  819. destination is "file"
  820. The value of output is interpreted as a file name; log messages
  821. will be appended to this file.
  822. destination is "syslog"
  823. The value of output is interpreted as the syslog facility (e.g.
  824. local0) that should be used for log messages.
  825. The other options for output_options are:
  826. flush (true of false)
  827. Flush buffers after each log message. Doing this will reduce performance
  828. but will ensure that if the program terminates abnormally, all messages up
  829. to the point of termination are output.
  830. maxsize (integer)
  831. Only relevant when destination is file, this is maximum file size of
  832. output files in bytes. When the maximum size is reached, the file is
  833. renamed and a new file opened. (For example, a ".1" is appended to the
  834. name -- if a ".1" file exists, it is renamed ".2", etc.)
  835. If this is 0, no maximum file size is used.
  836. maxver (integer)
  837. Maximum number of old log files to keep around when rolling the output
  838. file. Only relevant when destination is "file".
  839. Example session
  840. In this example we want to set the global logging to write to the file
  841. /var/log/my_bind10.log, at severity WARN. We want the authoritative server
  842. to log at DEBUG with debuglevel 40, to a different file
  843. (/tmp/debug_messages).
  844. Start bindctl.
  845. ["login success "]
  846. > config show Logging
  847. Logging/loggers [] list
  848. By default, no specific loggers are configured, in which case the severity
  849. defaults to INFO and the output is written to stderr.
  850. Let's first add a default logger:
  851. > config add Logging/loggers
  852. > config show Logging
  853. Logging/loggers/ list (modified)
  854. The loggers value line changed to indicate that it is no longer an empty
  855. list:
  856. > config show Logging/loggers
  857. Logging/loggers[0]/name "" string (default)
  858. Logging/loggers[0]/severity "INFO" string (default)
  859. Logging/loggers[0]/debuglevel 0 integer (default)
  860. Logging/loggers[0]/additive false boolean (default)
  861. Logging/loggers[0]/output_options [] list (default)
  862. The name is mandatory, so we must set it. We will also change the severity
  863. as well. Let's start with the global logger.
  864. > config set Logging/loggers[0]/name *
  865. > config set Logging/loggers[0]/severity WARN
  866. > config show Logging/loggers
  867. Logging/loggers[0]/name "*" string (modified)
  868. Logging/loggers[0]/severity "WARN" string (modified)
  869. Logging/loggers[0]/debuglevel 0 integer (default)
  870. Logging/loggers[0]/additive false boolean (default)
  871. Logging/loggers[0]/output_options [] list (default)
  872. Of course, we need to specify where we want the log messages to go, so we
  873. add an entry for an output option.
  874. > config add Logging/loggers[0]/output_options
  875. > config show Logging/loggers[0]/output_options
  876. Logging/loggers[0]/output_options[0]/destination "console" string (default)
  877. Logging/loggers[0]/output_options[0]/output "stdout" string (default)
  878. Logging/loggers[0]/output_options[0]/flush false boolean (default)
  879. Logging/loggers[0]/output_options[0]/maxsize 0 integer (default)
  880. Logging/loggers[0]/output_options[0]/maxver 0 integer (default)
  881. These aren't the values we are looking for.
  882. > config set Logging/loggers[0]/output_options[0]/destination file
  883. > config set Logging/loggers[0]/output_options[0]/output /var/log/bind10.log
  884. > config set Logging/loggers[0]/output_options[0]/maxsize 30000
  885. > config set Logging/loggers[0]/output_options[0]/maxver 8
  886. Which would make the entire configuration for this logger look like:
  887. > config show all Logging/loggers
  888. Logging/loggers[0]/name "*" string (modified)
  889. Logging/loggers[0]/severity "WARN" string (modified)
  890. Logging/loggers[0]/debuglevel 0 integer (default)
  891. Logging/loggers[0]/additive false boolean (default)
  892. Logging/loggers[0]/output_options[0]/destination "file" string (modified)
  893. Logging/loggers[0]/output_options[0]/output "/var/log/bind10.log" string (modified)
  894. Logging/loggers[0]/output_options[0]/flush false boolean (default)
  895. Logging/loggers[0]/output_options[0]/maxsize 30000 integer (modified)
  896. Logging/loggers[0]/output_options[0]/maxver 8 integer (modified)
  897. That looks OK, so let's commit it before we add the configuration for the
  898. authoritative server's logger.
  899. > config commit
  900. Now that we have set it, and checked each value along the way, adding a
  901. second entry is quite similar.
  902. > config add Logging/loggers
  903. > config set Logging/loggers[1]/name Auth
  904. > config set Logging/loggers[1]/severity DEBUG
  905. > config set Logging/loggers[1]/debuglevel 40
  906. > config add Logging/loggers[1]/output_options
  907. > config set Logging/loggers[1]/output_options[0]/destination file
  908. > config set Logging/loggers[1]/output_options[0]/output /tmp/auth_debug.log
  909. > config commit
  910. And that's it. Once we have found whatever it was we needed the debug
  911. messages for, we can simply remove the second logger to let the
  912. authoritative server use the same settings as the rest.
  913. > config remove Logging/loggers[1]
  914. > config commit
  915. And every module will now be using the values from the logger named "*".
  916. Logging Message Format
  917. Each message written by BIND 10 to the configured logging destinations
  918. comprises a number of components that identify the origin of the message
  919. and, if the message indicates a problem, information about the problem
  920. that may be useful in fixing it.
  921. Consider the message below logged to a file:
  922. 2011-06-15 13:48:22.034 ERROR [b10-resolver.asiolink]
  923. ASIODNS_OPENSOCK error 111 opening TCP socket to 127.0.0.1(53)
  924. Note: the layout of messages written to the system logging file (syslog)
  925. may be slightly different. This message has been split across two lines
  926. here for display reasons; in the logging file, it will appear on one
  927. line.)
  928. The log message comprises a number of components:
  929. 2011-06-15 13:48:22.034
  930. The date and time at which the message was generated.
  931. ERROR
  932. The severity of the message.
  933. [b10-resolver.asiolink]
  934. The source of the message. This comprises two components: the BIND
  935. 10 process generating the message (in this case, b10-resolver) and
  936. the module within the program from which the message originated
  937. (which in the example is the asynchronous I/O link module,
  938. asiolink).
  939. ASIODNS_OPENSOCK
  940. The message identification. Every message in BIND 10 has a unique
  941. identification, which can be used as an index into the BIND 10
  942. Messages Manual (http://bind10.isc.org/docs/bind10-messages.html)
  943. from which more information can be obtained.
  944. error 111 opening TCP socket to 127.0.0.1(53)
  945. A brief description of the cause of the problem. Within this text,
  946. information relating to the condition that caused the message to
  947. be logged will be included. In this example, error number 111 (an
  948. operating system-specific error number) was encountered when
  949. trying to open a TCP connection to port 53 on the local system
  950. (address 127.0.0.1). The next step would be to find out the reason
  951. for the failure by consulting your system's documentation to
  952. identify what error number 111 means.