README.libdns 11.5 KB
Newer Older
Lamont Jones's avatar
Lamont Jones committed
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58

			BIND-9 DNS Library Support

This version of BIND9 "exports" its internal libraries so that they
can be used by third-party applications more easily (we call them
"export" libraries in this document).  In addition to all major
DNS-related APIs BIND9 is currently using, the export libraries
provide the following features:

- The newly created "DNS client" module.  This is a higher level API
  that provides an interface to name resolution, single DNS
  transaction with a particular server, and dynamic update.  Regarding
  name resolution, it supports advanced features such as DNSSEC
  validation and caching.  This module supports both synchronous and
  asynchronous mode.
- The new "IRS" (Information Retrieval System) library.  It provides
  an interface to parse the traditional resolv.conf file and more
  advanced, DNS-specific configuration file for the rest of this
  package (see the description for the dns.conf file below).
- As part of the IRS library, newly implemented standard address-name
  mapping functions, getaddrinfo() and getnameinfo(), are provided.
  They use the DNSSEC-aware validating resolver backend, and could use
  other advanced features of the BIND9 libraries such as caching.  The
  getaddrinfo() function resolves both A and AAAA RRs concurrently
  (when the address family is unspecified).
- An experimental framework to support other event libraries than
  BIND9's internal event task system.

* Prerequisite

GNU make is required to build the export libraries (other part of
BIND9 can still be built with other types of make).  In the reminder
of this document, "make" means GNU make.  Note that in some platforms
you may need to invoke a different command name than "make"
(e.g. "gmake") to indicate it's GNU make.

* Compilation

1. ./configure --enable-exportlib [other flags]
2. make

This will create (in addition to usual BIND9 programs) and a separate
set of libraries under the lib/export directory.  For example,
lib/export/dns/libdns.a is the archive file of the export version of
the BIND9 DNS library.

Sample application programs using the libraries will also be built
under the lib/export/samples directory (see below).

* Installation

1. cd lib/export
2. make install (root privilege is normally required)
   (make install at the top directory will do the same)

This will install library object files under the directory specified
by the --with-export-libdir configure option (default:
EPREFIX/lib/bind9), and header files under the directory specified by
Lamont Jones's avatar
Lamont Jones committed
the --with-export-includedir configure option (default:
Lamont Jones's avatar
Lamont Jones committed
60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274

To see how to build your own application after the installation, see

* Known Defects/Restrictions

- Currently, win32 is not supported for the export library.  (Normal
  BIND9 application can be built as before).
- The "fixed" RRset order is not (currently) supported in the export
  library.  If you want to use "fixed" RRset order for, e.g. named
  while still building the export library even without the fixed
  order support, build them separately:
  % ./configure --enable-fixed-rrset [other flags, but not --enable-exportlib]
  % make (this doesn't have to be make)
  % ./configure --enable-exportlib [other flags, but not --enable-fixed-rrset]
  % cd lib/export
  % make
- The client module and the IRS library currently do not support
  DNSSEC validation using DLV (the underlying modules can handle it,
  but there is no tunable interface to enable the feature).
- RFC5011 is not supported in the validating stub resolver of the
  export library.  In fact, it is not clear whether it should: trust
  anchors would be a system-wide configuration which would be managed
  by an administrator, while the stub resolver will be used by
  ordinary applications run by a normal user.
- Not all common /etc/resolv.conf options are supported in the IRS library.
  The only available options in this version are "debug" and "ndots".

* The dns.conf File

The IRS library supports an "advanced" configuration file related to
the DNS library for configuration parameters that would be beyond the
capability of the resolv.conf file.  Specifically, it is intended to
provide DNSSEC related configuration parameters.

By default the path to this configuration file is /etc/dns.conf.

This module is very experimental and the configuration syntax or
library interfaces may change in future versions.  Currently, only the
'trusted-keys' statement is supported, whose syntax is the same as the
same name of statement for named.conf.

* Sample Applications

Some sample application programs using this API are provided for
reference.  The following is a brief description of these

- sample: a simple stub resolver utility.

  It sends a query of a given name (of a given optional RR type)
  to a specified recursive server, and prints the result as a list of
  RRs.  It can also act as a validating stub resolver if a trust
  anchor is given via a set of command line options.

  Usage: sample [options] server_address hostname

  Options and Arguments:
  -t RRtype
	specify the RR type of the query.  The default is the A RR.
  [-a algorithm] [-e] -k keyname -K keystring
	specify a command-line DNS key to validate the answer.  For
	example, to specify the following DNSKEY of 3600 IN DNSKEY 257 3 5 xxx
        specify the options as follows:
	  -e -k -K "xxx"
	-e means that this key is a zone's "key signing key" (as known
        as "secure Entry point").
 	when -a is omitted rsasha1 will be used by default.
  -s domain:alt_server_address
	specify a separate recursive server address for the specific
	"domain".  Example: -s
	an IP(v4/v6) address of the recursive server to which queries
	are sent.
	the domain name for the query

- sample-async: a simple stub resolver, working asynchronously.

  Similar to "sample", but accepts a list of (query) domain names as a
  separate file and resolves the names asynchronously.

  Usage: sample-async [-s server_address] [-t RR_type] input_file
  Options and Arguments:
  -s server_address
	an IPv4 address of the recursive server to which queries are
	sent.  (IPv6 addresses are not supported in this implementation)
  -t RR_type
	specify the RR type of the queries.  The default is the A RR.
	a list of domain names to be resolved.  each line consists of a
	single domain name.  Example:

- sample-request: a simple DNS transaction client.

  It sends a query to a specified server, and prints the response with
  minimal processing.  It doesn't act as a "stub resolver": it stops
  the processing once it gets any response from the server, whether
  it's a referral or an alias (CNAME or DNAME) that would require
  further queries to get the ultimate answer.  In other words, this
  utility acts as a very simplified dig.

  Usage: sample-request [-t RRtype] server_address hostname
  Options and Arguments:
  -t RRtype
	specify the RR type of the queries.  The default is the A RR.
	an IP(v4/v6) address of the recursive server to which the query is
	the domain name for the query

- sample-gai: getaddrinfo() and getnameinfo() test code.

  This is a test program to check getaddrinfo() and getnameinfo()
  behavior.  It takes a host name as an argument, calls getaddrinfo()
  with the given host name, and calls getnameinfo() with the resulting
  IP addresses returned by getaddrinfo().  If the dns.conf file exists
  and defines a trust anchor, the underlying resolver will act as a
  validating resolver, and getaddrinfo()/getnameinfo() will fail with
  an EAI_INSECUREDATA error when DNSSEC validation fails.

  Usage: sample-gai hostname

- sample-update: a simple dynamic update client program

  It accepts a single update command as a command-line argument, sends
  an update request message to the authoritative server, and shows the
  response from the server.  In other words, this is a simplified

  Usage: sample-update [options] (add|delete) "update data"
  Options and Arguments:
  -a auth_server
	An IP address of the authoritative server that has authority
	for the zone containing the update name.  This should normally
	be the primary authoritative server that accepts dynamic
	updates.  It can also be a secondary server that is configured
	to forward update requests to the primary server.
  -k keyfile
	A TSIG key file to secure the update transaction.  The keyfile
	format is the same as that for the nsupdate utility.
  -p prerequisite
	A prerequisite for the update (only one prerequisite can be
	specified).  The prerequisite format is the same as that is
	accepted by the nsupdate utility.
  -r recursive_server
	An IP address of a recursive server that this utility will
	use.  A recursive server may be necessary to identify the
	authoritative server address to which the update request is
  -z zonename
	The domain name of the zone that contains
	Specify the type of update operation.  Either "add" or "delete"
	must be specified.
  "update data"
	Specify the data to be updated.  A typical example of the data
	would look like "name TTL RRtype RDATA".

   Note: in practice, either -a or -r must be specified.  Others can
   be optional; the underlying library routine tries to identify the
   appropriate server and the zone name for the update.

   Examples: assuming the primary authoritative server of the zone has an IPv6 address 2001:db8::1234,
   + sample-update -a sample-update -k Kxxx.+nnn+mmmm.key add " 30 IN A"
     adds an A RR for using the given key.
   + sample-update -a sample-update -k Kxxx.+nnn+mmmm.key delete " 30 IN A"
     removes all A RRs for using the given key.
   + sample-update -a sample-update -k Kxxx.+nnn+mmmm.key delete ""
     removes all RRs for using the given key.

- nsprobe: domain/name server checker in terms of RFC4074.

  It checks a set of domains to see the name servers of the domains
  behave correctly in terms of RFC4074.  This is included in the set
  of sample programs to show how the export library can be used in a
  DNS-related application.

  Usage: nsprobe [-d] [-v [-v...]] [-c cache_address] [input_file]
	run in the "debug" mode.  with this option nsprobe will dump
	every RRs it receives.
	increase verbosity of other normal log messages.  This can be
	specified multiple times
  -c cache_address
	specify an IP address of a recursive (caching) name server.
	nsprobe uses this server to get the NS RRset of each domain and
	the A and/or AAAA RRsets for the name servers.  The default
	value is
	a file name containing a list of domain (zone) names to be
	probed.  when omitted the standard input will be used.  Each
	line of the input file specifies a single domain name such as
	"".  In general this domain name must be the apex
	name of some DNS zone (unlike normal "host names" such as
	"").  nsprobe first identifies the NS RRsets for
	the given domain name, and sends A and AAAA queries to these
	servers for some "widely used" names under the zone;
	specifically, adding "www" and "ftp" to the zone name.

* Library References

As of this writing, there is no formal "manual" of the libraries,
except this document, header files (some of them provide pretty
detailed explanations), and sample application programs.

Lamont Jones's avatar
Lamont Jones committed
; $Id: README.libdns,v 1.3 2009/09/15 19:12:03 jinmei Exp $