CentOS 7.0 - man page for drill (centos section 1)

Linux & Unix Commands - Search Man Pages

Man Page or Keyword Search:   man
Select Man Page Set:       apropos Keyword Search (sections above)

drill(1)										 drill(1)

       drill - get (debug) information out of DNS(SEC)

       drill [ OPTIONS ] name [ @server ] [ type ] [ class ]

       drill  is  a tool to designed to get all sorts of information out of the DNS. It is speci-
       ficly designed to be used with DNSSEC.

       The name drill is a pun on dig. With drill you should be able get  even	more  information
       than with dig.

       If  no arguments are given class defaults to 'IN' and type to 'A'. The server(s) specified
       in /etc/resolv.conf are used to query against.

       name Ask for this name.

       @server Send to	query  to  this  server.  If  not  specified  use  the	nameservers  from

       type  Ask  for  this RR type. If type is not given on the command line it defaults to 'A'.
       Except when doing to reverse lookup when it defaults to 'PTR'.

       class Use this class when querying.

       drill mx miek.nl Show the MX records of the domain miek.nl

       drill -S jelte.nlnetlabs.nl
	      Chase any signatures in the jelte.nlnetlab.nl domain. This option is only available
	      when ldns has been compiled with openssl-support.

       drill -TD www.example.com
	      Do  a  DNSSEC  (-D)  trace (-T) from the rootservers down to www.example.com.  This
	      option only works when ldns has been compiled with openssl support.

       drill -s dnskey jelte.nlnetlabs.nl
	      Show the DNSKEY record(s) for jelte.nlnetlabs.nl. For each found DNSKEY record also
	      print the DS record.

       -D     Enable  DNSSEC  in the query. When querying for DNSSEC types (DNSKEY, RRSIG, DS and
	      NSEC) this is not automaticly enabled.

       -T     Trace name from the root down. When using this option  the  @server  and	the  type
	      arguments are not used.

       -S     Chase the signature(s) of 'name' to a known key or as high up in the tree as possi-

       -V level
	      Be more verbose. Set level to 5 to see the actual query that is sent.

       -Q     Quiet mode, this overrules -V.

       -f file
	      Read the query from a file. The query must be dumped with -w.

       -i file
	      read the answer from the file instead from the network. This aids in debugging  and
	      can be used to check if a query on disk is valid.  If the file contains binary data
	      it is assumed to be a query in network order.

       -w file
	      Write an answer packet to file.

       -q file
	      Write the query packet to file.

       -v     Show drill's version.

       -h     Show a short help message.

       -4     Stay on ip4. Only send queries to ip4 enabled nameservers.

       -6     Stay on ip6. Only send queries to ip6 enabled nameservers.

       -a     Use the resolver structure's fallback mechanism if the answer is truncated  (TC=1).
	      If  a  truncated packet is received and this option is set, drill will first send a
	      new query with EDNS0 buffer size 4096.

	      If the EDNS0 buffer size was already set to 512+ bytes, or  the  above  retry  also
	      results in a truncated answer, the resolver structure will fall back to TCP.

       -b size
	      Use size as the buffer size in the EDNS0 pseudo RR.

       -c file
	      Use file instead of /etc/resolv.conf for nameserver configuration.

       -d domain
	      When tracing (-T), start from this domain instead of the root.

       -t     Use TCP/IP when querying a server

       -k keyfile
	      Use  this file to read a (trusted) key from. When this options is given drill tries
	      to validate the current answer with this key. No chasing is  done.  When	drill  is
	      doing  a	secure trace, this key will be used as trust anchor. Can contain a DNSKEY
	      or a DS record.

	      Alternatively, when DNSSEC enabled tracing (-TD) or signature chasing (-S),  if  -k
	      is not specified, and a default trust anchor (/var/lib/unbound/root.key) exists and
	      contains a valid DNSKEY or DS record, it will be used as the trust anchor.

       -o mnemonic
	      Use this option to set or unset specific header bits. A bit is set by using the bit
	      mnemonic	in  CAPITAL  letters. A bit is unset when the mnemonic is given in lower-
	      case. The following mnemonics are understood by drill:

		      QR, qr: set, unset QueRy (default: on)
		      AA, aa: set, unset Authoritative Answer (default: off)
		      TC, tc: set, unset TrunCated (default: off)
		      RD, rd: set, unset Recursion Desired (default: on)
		      CD, cd: set, unset Checking Disabled  (default: off)
		      RA, ra: set, unset Recursion Available  (default: off)
		      AD, ad: set, unset Authenticated Data (default: off)

	      Thus: -o CD, will enable Checking Disabled, which instructs the cache to not  vali-
	      date the answers it gives out.

       -p port
	      Use this port instead of the default of 53.

       -r file
	      When tracing (-T), use file as a root servers hint file.

       -s     When encountering a DNSKEY print the equivalent DS also.

       -u     Use UDP when querying a server. This is the default.

       -w file
	      write  the answer to a file. The file will contain a hexadecimal dump of the query.
	      This can be used in conjunction with -f.

       -x     Do a reverse loopup. The type argument is not used, it is preset to PTR.

       -y <name:key[:algo]>
	      specify named base64 tsig key, and optional an algorithm (defaults to hmac-md5.sig-

       -z     don't randomize the nameserver list before sending queries.

	      The file from which trusted keys are loaded when no -k option is given.


       Jelte Jansen and Miek Gieben. Both of NLnet Labs.

       Report bugs to <ldns-team@nlnetlabs.nl>.

       Copyright  (c)  2004-2008 NLnet Labs.  Licensed under the revised BSD license. There is NO

       dig(1), RFC403{3,4,5}.

					   28 May 2006					 drill(1)
Unix & Linux Commands & Man Pages : ©2000 - 2018 Unix and Linux Forums

All times are GMT -4. The time now is 05:32 PM.

Unix & Linux Forums Content Copyright©1993-2018. All Rights Reserved.
Show Password

Not a Forum Member?
Forgot Password?