Welcome to Linux Knowledge Base and Tutorial
"The place where you learn linux"
The ONE Campaign to make poverty history

 Create an AccountHome | Submit News | Your Account  

Tutorial Menu
Linux Tutorial Home
Table of Contents

· Introduction to Operating Systems
· Linux Basics
· Working with the System
· Shells and Utilities
· Editing Files
· Basic Administration
· The Operating System
· The X Windowing System
· The Computer Itself
· Networking
· System Monitoring
· Solving Problems
· Security
· Installing and Upgrading
· Linux and Windows

Man Pages
Linux Topics
Test Your Knowledge

Site Menu
Site Map
Copyright Info
Terms of Use
Privacy Info
Masthead / Impressum
Your Account

Private Messages

News Archive
Submit News
User Articles
Web Links


The Web

Who's Online
There are currently, 70 guest(s) and 0 member(s) that are online.

You are an Anonymous user. You can register for free by clicking here




       rndc-confgen  [ -a ]  [ -b keysize ]  [ -c keyfile ]  [ -h
       ]  [ -k keyname ]  [ -p port ]  [ -r randomfile  ]   [  -s
       address ]  [ -t chrootdir ]  [ -u user ]


       rndc-confgen  generates  configuration  files for rndc. It
       can be used as a convenient  alternative  to  writing  the
       rndc.conf  file  and  the  corresponding  controls and key
       statements in named.conf by hand.  Alternatively,  it  can
       be  run  with  the -a option to set up a rndc.key file and
       avoid the need for a rndc.conf file and a controls  state­
       ment altogether.


       -a     Do  automatic  rndc  configuration.  This creates a
              file rndc.key in /etc (or whatever  sysconfdir  was
              specified  as  when BIND was built) that is read by
              both rndc and named on startup. The  rndc.key  file
              defines  a  default command channel and authentica­
              tion key allowing rndc to  communicate  with  named
              with no further configuration.

              Running  rndc-confgen  -a allows BIND 9 and rndc to
              be used as drop-in replacements for BIND 8 and ndc,
              with  no  changes to the existing BIND 8 named.conf

       -b keysize
              Specifies the size of  the  authentication  key  in
              bits.   Must be between 1 and 512 bits; the default
              is 128.

       -c keyfile
              Used with the -a option  to  specify  an  alternate
              location for rndc.key.

       -h     Prints a short summary of the options and arguments
              to rndc-confgen.

       -k keyname
              Specifies the key name of the  rndc  authentication
              key.   This  must  be  a  valid  domain  name.  The
              default is rndc-key.

       -p port
              Specifies the command channel port where named lis­
              tens  for  connections  from  rndc.  The default is

       -r randomfile
       -t chrootdir
              Used  with  the  -a  option  to specify a directory
              where named will run chrooted. An  additional  copy
              of  the  rndc.key  will be written relative to this
              directory so that it will be found by the  chrooted

       -u user
              Used  with  the  -a  option to set the owner of the
              rndc.key file generated. If -t  is  also  specified
              only  the  file  in  the  chroot area has its owner


       To allow rndc to be used with no manual configuration, run

       rndc-confgen -a

       To  print  a  sample rndc.conf file and corresponding con­
       trols and key statements  to  be  manually  inserted  into
       named.conf, run



       rndc(8), rndc.conf(5), named(8), BIND 9 Administrator Ref­
       erence Manual.


       Internet Software Consortium

BIND9                      Aug 27, 2001           RNDC-CONFGEN(8)



Security Code
Security Code
Type Security Code

Don't have an account yet? You can create one. As a registered user you have some advantages like theme manager, comments configuration and post comments with your name.

Help if you can!

Amazon Wish List

Did You Know?
The Linux Tutorial welcomes your suggestions and ideas.


Tell a Friend About Us

Bookmark and Share

Web site powered by PHP-Nuke

Is this information useful? At the very least you can help by spreading the word to your favorite newsgroups, mailing lists and forums.
All logos and trademarks in this site are property of their respective owner. The comments are property of their posters. Articles are the property of their respective owners. Unless otherwise stated in the body of the article, article content (C) 1994-2013 by James Mohr. All rights reserved. The stylized page/paper, as well as the terms "The Linux Tutorial", "The Linux Server Tutorial", "The Linux Knowledge Base and Tutorial" and "The place where you learn Linux" are service marks of James Mohr. All rights reserved.
The Linux Knowledge Base and Tutorial may contain links to sites on the Internet, which are owned and operated by third parties. The Linux Tutorial is not responsible for the content of any such third-party site. By viewing/utilizing this web site, you have agreed to our disclaimer, terms of use and privacy policy. Use of automated download software ("harvesters") such as wget, httrack, etc. causes the site to quickly exceed its bandwidth limitation and are therefore expressly prohibited. For more details on this, take a look here

PHP-Nuke Copyright © 2004 by Francisco Burzi. This is free software, and you may redistribute it under the GPL. PHP-Nuke comes with absolutely no warranty, for details, see the license.
Page Generation: 0.05 Seconds