2008-09-11 10:14:12 -04:00
.TH "unbound-control" "8" "@date@" "NLnet Labs" "unbound @version@"
. \"
. \" unbound-control.8 -- unbound remote control manual
. \"
. \" Copyright (c) 2008, NLnet Labs. All rights reserved.
. \"
. \" See LICENSE for the license.
. \"
. \"
.SH "NAME"
2009-11-12 11:27:11 -05:00
.B unbound\-control,
.B unbound\-control\-setup
2008-09-11 10:14:12 -04:00
\- Unbound remote server control utility.
.SH "SYNOPSIS"
2009-11-12 11:27:11 -05:00
.B unbound\-control
2012-09-27 05:32:35 -04:00
.RB [ \- hq ]
2021-12-13 06:46:08 -05:00
.RB [ \- c
2008-09-11 10:14:12 -04:00
.IR cfgfile ]
2021-12-13 06:46:08 -05:00
.RB [ \- s
2008-09-11 10:14:12 -04:00
.IR server ]
.IR command
.SH "DESCRIPTION"
2009-11-12 11:27:11 -05:00
.B Unbound\-control
2008-11-18 08:40:38 -05:00
performs remote administration on the \fI unbound\fR (8) DNS server.
2021-12-13 06:46:08 -05:00
It reads the configuration file, contacts the Unbound server over SSL
2008-09-11 10:14:12 -04:00
sends the command and displays the result.
.P
The available options are:
.TP
.B \- h
Show the version and commandline option help.
.TP
.B \- c \fI cfgfile
The config file to read with settings. If not given the default
config file @ub_conf_file@ is used.
.TP
.B \- s \fI server[@port]
IPv4 or IPv6 address of the server to contact. If not given, the
address is read from the config file.
2012-09-27 05:32:35 -04:00
.TP
.B \- q
quiet, if the option is given it does not print anything if it works ok.
2008-09-11 10:14:12 -04:00
.SH "COMMANDS"
There are several commands that the server understands.
.TP
.B start
2021-12-13 06:46:08 -05:00
Start the server. Simply execs \fI unbound\fR (8). The Unbound executable
is searched for in the \fB PATH\fR set in the environment. It is started
2008-09-15 04:35:45 -04:00
with the config file specified using \fI \- c\fR or the default config file.
2008-09-11 10:14:12 -04:00
.TP
.B stop
2008-09-15 04:35:45 -04:00
Stop the server. The server daemon exits.
2008-09-11 10:14:12 -04:00
.TP
.B reload
2008-09-15 04:35:45 -04:00
Reload the server. This flushes the cache and reads the config file fresh.
2008-09-15 10:19:41 -04:00
.TP
2022-12-14 10:33:28 -05:00
.B reload_keep_cache
Reload the server but try to keep the RRset and message cache if
(re)configuration allows for it.
That means the caches sizes and the number of threads must not change between
reloads.
.TP
Fast Reload Option (#1042)
* - fast-reload, add unbound-control fast_reload
* - fast-reload, make a thread to service the unbound-control command.
* - fast-reload, communication sockets for information transfer.
* - fast-reload, fix compile for unbound-dnstap-socket.
* - fast-reload, set nonblocking communication to keep the server thread
responding to DNS requests.
* - fast-reload, poll routine to test for readiness, timeout fails connection.
* - fast-reload, detect loop in sock_poll_timeout routine.
* - fast-reload, send done and exited notification.
* - fast-reload, defines for constants in ipc.
* - fast-reload, ipc socket recv and send resists partial reads and writes and
can continue byte by byte. Also it can continue after an interrupt.
* - fast-reload, send exit command to thread when done.
* - fast-reload, output strings for client on string list.
* - fast-reload, add newline to terminal output.
* - fast-reload, send client string to remote client.
* - fast-reload, better debug output.
* - fast-reload, print queue structure, for output to the remote client.
* - fast-reload, move print items to print queue from fast_reload_thread struct.
* - fast-reload, keep list of pending print queue items in daemon struct.
* - fast-reload, comment explains in_list for printq to print remainder.
* - fast-reload, unit test testdata/fast_reload_thread.tdir that tests the
thread output.
* - fast-reload, fix test link for fast_reload_printq_list_delete function.
* - fast-reload, reread config file from disk.
* - fast-reload, unshare forwards, making the structure locked, with an rwlock.
* - fast-reload, for nonthreaded, the unbound-control commands forward,
forward_add and forward_delete should be distributed to other processes,
but when threaded, they should not be distributed to other threads because
the structure is not thread specific any more.
* - fast-reload, unshared stub hints, making the structure locked, with an rwlock.
* - fast-reload, helpful comments for hints lookup function return value.
* - fast-reload, fix bug in fast reload printout, the strlist appendlist routine,
and printout time statistics after the reload is done.
* - fast-reload, keep track of reloadtime and deletestime and print them.
* - fast-reload, keep track of constructtime and print it.
* - fast-reload, construct new items.
* - fast-reload, better comment.
* - fast-reload, reload the config and swap trees for forwards and stub hints.
* - fast-reload, in forwards_swap_tree set protection of trees with locks.
* - fast-reload, in hints_swap_tree also swap the node count of the trees.
* - fast-reload, reload ipc to stop and start threads.
* - fast-reload, unused forward declarations removed.
* - fast-reload, unit test that fast reload works with forwards and stubs.
* - fast-reload, fix clang analyzer warnings.
* - fast-reload, small documentation entry in unbound-control -h output.
* - fast-reload, printout memory use by fast reload, in bytes.
* - fast-reload, compile without threads.
* - fast-reload, document fast_reload in man page.
* - fast-reload, print ok when done successfully.
* - fast-reload, option for fast-reload commandline, +v verbosity option,
with timing and memory use output.
* - fast-reload, option for fast-reload commandline, +p does not pause threads.
* - fast-reload, option for fast-reload commandline, +d drops mesh queries.
* - fast-reload, fix to poll every thread with nopause to make certain that
resources are not held by the threads and can be deleted.
* - fast-reload, fix to use atomic store for config variables with nopause.
* - fast-reload, reload views.
* - fast-reload, when tag defines are different, it drops the queries.
* - fast-reload, fix tag define check.
* - fast-reload, document that tag change causes drop of queries.
* - fast-reload, fix space in documentation man page.
* - fast-reload, copy respip client information to query state, put views tree
in module env for lookup.
* - fast-reload, nicer respip view comparison.
* - fast-reload, respip global set is in module env.
* - fast-reload, document that respip_client_info acl info is copied.
* - fast-reload, reload the respip_set.
* - fast-reload, document no pause and pick up of use_response_ip boolean.
* - fast-reload, fix test compile.
* - fast-reload, reload local zones.
* Update locking management for iter_fwd and iter_hints methods. (#1054)
fast reload, move most of the locking management to iter_fwd and
iter_hints methods. The caller still has the ability to handle its
own locking, if desired, for atomic operations on sets of different
structs.
Co-authored-by: Wouter Wijngaards <wcawijngaards@users.noreply.github.com>
* - fast-reload, reload access-control.
* - fast-reload, reload access control interface, such as interface-action.
* - fast-reload, reload tcp-connection-limit.
* - fast-reload, improve comments on acl_list and tcl_list swap tree.
* - fast-reload, fixup references to old tcp connection limits in open tcp
connections.
* - fast-reload, fixup to clean tcp connection also for different linked order.
* - fast-reload, if no tcp connection limits existed, no need to remove
references for that.
* - fast-reload, document more options that work and do not work.
* - fast-reload, reload auth_zone and rpz data.
* - fast-reload, fix auth_zones_get_mem.
* - fast-reload, fix compilation of testbound for the new comm_timer_get_mem
reference in remote control.
* - fast-reload, change use_rpz with reload.
* - fast-reload, list changes in auth zones and stop zonemd callbacks for
deleted auth zones.
* - fast-reload, note xtree is not swapped, and why it is not swapped.
* - fast-reload, for added auth zones, pick up zone transfer and zonemd tasks.
* - fast-reload, unlock xfr when done with transfer pick up.
* - fast-reload, unlock z when picking up the xfr for it during transfer task
pick up.
* - fast-reload, pick up task changes for added, deleted and modified auth zones.
* - fast-reload, remove xfr of auth zone deletion without tasks.
* - fast-reload, pick up zone transfer config.
* - fast-reload, the main worker thread picks up the transfer tasks and also
performs setup of the xfer struct.
* - fast-reload, keep writelock on newzone when auth zone changes.
* - fast-reload, change cachedb_enabled setting.
* - fast-reload, pick up edns-strings config.
* - fast-reload, note that settings are not updated.
* - fast-reload, pick up dnstap config.
* - fast-reload, dnstap options that need to be loaded without +p.
* - fast-reload, fix auth zone reload
* - fast-reload, remove debug for auth zone test.
* - fast-reload, fix auth zone reload with zone transfer.
* - fast-reload, fix auth zone reload lock order.
* - fast-reload, remove debug from fast reload test.
* - fast-reload, remove unused function.
* - fast-reload, fix the worker trust anchor probe timer lock acquisition in
the probe answer callback routine for trust anchor probes.
* - fast-reload, reload trust anchors.
* - fast-reload, fix trust anchor reload lock on autr global data and test
for trust anchor reload.
* - fast-reload, adjust cache sizes.
* - fast-reload, reload cache sizes when changed.
* - fast-reload, reload validator env changes.
* - fast-reload, reload mesh changes.
* - fast-reload, check for incompatible changes.
* - fast-reload, improve error text for incompatible change.
* - fast-reload, fix check config option compatibility.
* - fast-reload, improve error text for nopause change.
* - fast-reload, fix spelling of incompatible options.
* - fast-reload, reload target-fetch-policy, outbound-msg-retry, max-sent-count
and max-query-restarts.
* - fast-reload, check nopause config change for target-fetch-policy.
* - fast-reload, reload do-not-query-address, private-address and capt-exempt.
* - fast-reload, check nopause config change for do-not-query-address,
private-address and capt-exempt.
* - fast-reload, check fast reload not possible due to interface and
outgoing-interface changes.
* - fast-reload, reload nat64 settings.
* - fast-reload, reload settings stored in the infra structure.
* - fast-reload, fix modstack lookup and remove outgoing-range check.
* - fast-reload, more explanation for config parse failure.
* - fast-reload, reload worker outside network changes.
* - fast-reload, detect incompatible changes in network settings.
* fast-reload, commit test files.
* - fast-reload, fix warnings for call types in windows compile.
* - fast-reload, fix warnings and comm_point_internal for tcp wouldblock calls.
* - fast-reload, extend lock checks for repeat thread ids.
* - fast-reload, additional test cases, cache change and tag changes.
* - fast-reload, fix documentation for auth_zone_verify_zonemd_with_key.
* - fast-reload, fix copy_cfg type casts and memory leak on config parse failure.
* - fast-reload, fix use of WSAPoll.
* Review comments for the fast reload feature (#1259)
* - fast-reload review, respip set can be null from a view.
* - fast-reload review, typos.
* - fast-reload review, keep clang static analyzer happy.
* - fast-reload review, don't forget to copy tag_actions.
* - fast-reload review, less indentation.
* - fast-reload review, don't leak respip_actions when reloading.
* - fast-reload review, protect NULL pointer dereference in get_mem
functions.
* - fast-reload review, add fast_reload_most_options.tdir to test most
options with high verbosity when fast reloading.
* - fast-reload review, don't skip new line on long error printouts.
* - fast-reload review, typo.
* - fast-reload review, use new_z for consistency.
* - fast-reload review, nit for unlock ordering to make eye comparison
with the lock counterpart easier.
* - fast-reload review, in case of error the sockets are already closed.
* - fast-reload review, identation.
* - fast-reload review, add static keywords.
* - fast-reload review, update unbound-control usage text.
* - fast-reload review, updates to the man page.
* - fast-reload, the fast-reload command is experimental.
* - fast-reload, fix compile of doqclient for fast reload functions.
* Changelog comment for #1042
- Merge #1042: Fast Reload. The unbound-control fast_reload is added.
It reads changed config in a thread, then only briefly pauses the
service threads, that keep running. DNS service is only interrupted
briefly, less than a second.
---------
Co-authored-by: Yorgos Thessalonikefs <yorgos@nlnetlabs.nl>
2025-03-31 09:25:24 -04:00
.B fast_reload \fR [\fI+dpv\fR]
Reload the server, but keep downtime to a minimum, so that user queries
keep seeing service. This needs the code compiled with threads. The config
is loaded in a thread, and prepared, then it briefly pauses the existing
server and updates config options. The intent is that the pause does not
impact the service of user queries. The cache is kept. Also user queries
worked on are kept and continue, but with the new config options.
This command is experimental at this time.
Not all options are changed, but it changes like forwards, stubs and
local zones. Also access-control and interface-action and similar options,
also tcp-connection-limits, views. It can reload some define-tag changes.
It does not work with interface, outgoing-interface changes, also not with
remote-control, outgoing-port-permit, outgoing-port-avoid, msg-buffer-size,
slabs options and statistics-interval changes.
.IP
The fast reload also works on the options: insecure-lan-zones, domain-insecure,
trust-anchor-file, trust-anchor, trusted-key-file, auto-trust-anchor-file,
auth-zone and its options, rpz and its options, edns-strings, respip_set,
view and its options, access-control options, tcp-connection-limit,
log-identity, infra-cache-numhosts, msg-cache-size, rrset-cache-size,
key-cache-size, ratelimit-size, neg-cache-size, num-queries-per-thread,
jostle-timeout, use-caps-for-id, unwanted-reply-threshold, tls-use-sni,
outgoing-tcp-mss, ip-dscp, max-reuse-tcp-queries, tcp-reuse-timeout,
tcp-auth-query-timeout, delay-close.
.IP
For dnstap, the options can be changed: dnstap-log-resolver-query-messages,
dnstap-log-resolver-response-messages, dnstap-log-client-query-messages,
dnstap-log-client-response-messages, dnstap-log-forwarder-query-messages
and dnstap-log-forwarder-response-messages. It does not work with
these options: dnstap-enable, dnstap-bidirectional, dnstap-socket-path,
dnstap-ip, dnstap-tls, dnstap-tls-server-name, dnstap-tls-cert-bundle,
dnstap-tls-client-key-file and dnstap-tls-client-cert-file. The options
dnstap-send-identity, dnstap-send-version, dnstap-identity, and
dnstap-version can be loaded when '+p' is not used.
.IP
The '+v' option makes the output verbose which includes the time it took to do
the reload.
With '+vv' it is more verbose which includes the amount of memory that was
allocated temporarily to perform the reload; this amount of memory can be big
if the config has large contents.
In the timing output the 'reload' time is the time during which the server was
paused.
.IP
The '+p' option makes the reload not pause threads, they keep running.
Locks are acquired, but items are updated in sequence, so it is possible
for threads to see an inconsistent state with some options from the old
and some options from the new config, such as cache TTL parameters from the
old config and forwards from the new config. The stubs and forwards are
updated at the same time, so that they are viewed consistently, either old
or new values together. The option makes the reload time take eg. 3
microseconds instead of 0.3 milliseconds during which the worker threads are
interrupted. So, the interruption is much shorter, at the expense of some
inconsistency. After the reload itself, every worker thread is briefly
contacted to make them release resources, this makes the delete timing
a little longer, and takes up time from the remote control servicing
worker thread.
.IP
With the nopause option, the reload does not work to reload some options,
that fast reload works on without the nopause option: val-bogus-ttl,
val-date-override, val-sig-key-min, val-sig-skew-max, val-max-restart,
val-nsec3-keysize-iterations, target-fetch-policy, outbound-msg-retry,
max-sent-count, max-query-restarts, do-not-query-address,
do-not-query-localhost, private-address, private-domain, caps-exempt,
nat64-prefix, do-nat64, infra-host-ttl, infra-keep-probing, ratelimit,
ip-ratelimit, ip-ratelimit-cookie, wait-limit-netblock,
wait-limit-cookie-netblock, ratelimit-below-domain, ratelimit-for-domain.
.IP
The '+d' option makes the reload drop queries that the worker threads are
working on. This is like flush_requestlist. Without it the queries are kept
so that users keep getting answers for those queries that are currently
processed. The drop makes it so that queries during the life time of the
query processing see only old, or only new config options.
.IP
When there are changes to the config tags, from \fB define\- tag\fR config,
then the '+d' option is implicitly turned on with a warning printout, and
queries are dropped.
This is to stop references to the old tag information, by the old
queries. If the number of tags is increased in the newly loaded config, by
adding tags at the end, then the implicit '+d' option is not needed.
.IP
For response ip, that is actions associated with IP addresses, and perhaps
intersected with access control tag and action information, those settings
are stored with a query when it comes in based on its source IP address.
The old information is kept with the query until the queries are done.
This is gone when those queries are resolved and finished, or it is possible
to flush the requestlist with '+d'.
.TP
2008-09-15 10:19:41 -04:00
.B verbosity \fI number
Change verbosity value for logging. Same values as \fB verbosity\fR keyword in
\fI unbound.conf\fR (5). This new setting lasts until the server is issued
a reload (taken from config file again), or the next verbosity control command.
.TP
2010-02-18 11:40:22 -05:00
.B log_reopen
Reopen the logfile, close and open it. Useful for logrotation to make the
daemon release the file it is logging to. If you are using syslog it will
attempt to close and open the syslog (which may not work if chrooted).
.TP
2008-09-15 10:19:41 -04:00
.B stats
2021-12-13 06:46:08 -05:00
Print statistics. Resets the internal counters to zero, this can be
controlled using the \fB statistics\- cumulative\fR config statement.
2008-09-15 10:19:41 -04:00
Statistics are printed with one [name]: [value] per line.
2008-09-19 10:49:29 -04:00
.TP
2009-02-12 06:41:51 -05:00
.B stats_noreset
Peek at statistics. Prints them like the \fB stats\fR command does, but does not
reset the internal counters to zero.
.TP
2008-12-17 09:03:49 -05:00
.B status
2021-12-13 06:46:08 -05:00
Display server status. Exit code 3 if not running (the connection to the
2008-12-17 09:03:49 -05:00
port is refused), 1 on error, 0 if running.
.TP
2008-09-19 10:49:29 -04:00
.B local_zone \fI name\fR \fI type
Add new local zone with name and type. Like \fB local\- zone\fR config statement.
If the zone already exists, the type is changed to the given argument.
.TP
.B local_zone_remove \fI name
Remove the local zone with the given name. Removes all local data inside
it. If the zone does not exist, the command succeeds.
.TP
.B local_data \fI RR data...
Add new local data, the given resource record. Like \fB local\- data\fR
config statement, except for when no covering zone exists. In that case
2021-12-13 06:46:08 -05:00
this remote control command creates a transparent zone with the same
2021-07-16 04:51:27 -04:00
name as this record.
2008-09-19 10:49:29 -04:00
.TP
.B local_data_remove \fI name
Remove all RR data from local name. If the name already has no items,
nothing happens. Often results in NXDOMAIN for the name (in a static zone),
2021-12-13 06:46:08 -05:00
but if the name has become an empty nonterminal (there is still data in
domain names below the removed name), NOERROR nodata answers are the
2008-09-19 10:49:29 -04:00
result for that name.
2008-09-22 11:20:18 -04:00
.TP
2016-11-30 06:22:29 -05:00
.B local_zones
Add local zones read from stdin of unbound\- control. Input is read per line,
with name space type on a line. For bulk additions.
.TP
.B local_zones_remove
Remove local zones read from stdin of unbound\- control. Input is one name per
line. For bulk removals.
.TP
.B local_datas
Add local data RRs read from stdin of unbound\- control. Input is one RR per
line. For bulk additions.
.TP
.B local_datas_remove
Remove local data RRs read from stdin of unbound\- control. Input is one name per
line. For bulk removals.
.TP
2008-09-22 11:20:18 -04:00
.B dump_cache
2024-05-17 04:25:24 -04:00
The content of the cache is printed in a text format to stdout.
You can redirect it to a file to store the cache in a file.
Not supported in remote Unbounds in multi-process operation.
2008-09-22 11:20:18 -04:00
.TP
.B load_cache
2024-05-17 04:25:24 -04:00
The content of the cache is loaded from stdin.
Uses the same format as dump_cache uses.
Loading the cache with old, or wrong data can result in old or wrong data
returned to clients.
Loading data into the cache in this way is supported in order to aid with
debugging.
Not supported in remote Unbounds in multi-process operation.
2008-09-23 06:55:36 -04:00
.TP
.B lookup \fI name
2021-12-13 06:46:08 -05:00
Print to stdout the name servers that would be used to look up the
2008-09-23 06:55:36 -04:00
name specified.
2008-09-23 10:07:02 -04:00
.TP
2024-05-16 10:56:58 -04:00
.B flush \fR [\fI+c\fR] \fI name
2008-09-23 10:07:02 -04:00
Remove the name from the cache. Removes the types
2022-11-30 08:33:16 -05:00
A, AAAA, NS, SOA, CNAME, DNAME, MX, PTR, SRV, NAPTR, SVCB and HTTPS.
2021-12-13 06:46:08 -05:00
Because that is fast to do. Other record types can be removed using
.B flush_type
or
2008-09-23 10:07:02 -04:00
.B flush_zone\fR.
2024-05-16 10:56:58 -04:00
.IP
The '+c' option removes the items also from the cachedb cache. If
cachedb is in use.
2008-09-23 10:07:02 -04:00
.TP
2024-05-16 10:56:58 -04:00
.B flush_type \fR [\fI+c\fR] \fI name\fR \fI type
2008-09-23 10:07:02 -04:00
Remove the name, type information from the cache.
.TP
2024-05-16 10:56:58 -04:00
.B flush_zone \fR [\fI+c\fR] \fI name
2021-12-13 06:46:08 -05:00
Remove all information at or below the name from the cache.
2008-09-23 10:07:02 -04:00
The rrsets and key entries are removed so that new lookups will be performed.
This needs to walk and inspect the entire cache, and is a slow operation.
2018-04-09 03:39:59 -04:00
The entries are set to expired in the implementation of this command (so,
with serve\- expired enabled, it'll serve that information but schedule a
prefetch for new information).
2009-02-10 10:11:54 -05:00
.TP
2024-05-16 10:56:58 -04:00
.B flush_bogus \fR [\fI+c\fR]
2012-07-09 10:33:07 -04:00
Remove all bogus data from the cache.
.TP
2024-05-16 10:56:58 -04:00
.B flush_negative \fR [\fI+c\fR]
2014-04-29 04:47:33 -04:00
Remove all negative data from the cache. This is nxdomain answers,
nodata answers and servfail answers. Also removes bad key entries
(which could be due to failed lookups) from the dnssec key cache, and
iterator last-resort lookup failures from the rrset cache.
.TP
2009-02-12 05:37:00 -05:00
.B flush_stats
Reset statistics to zero.
.TP
2009-02-12 08:21:19 -05:00
.B flush_requestlist
Drop the queries that are worked on. Stops working on the queries that the
server is working on now. The cache is unaffected. No reply is sent for
those queries, probably making those users request again later.
Useful to make the server restart working on queries with new settings,
such as a higher verbosity level.
.TP
2009-02-10 10:11:54 -05:00
.B dump_requestlist
Show what is worked on. Prints all queries that the server is currently
working on. Prints the time that users have been waiting. For internal
requests, no time is printed. And then prints out the module status.
2014-04-10 05:13:58 -04:00
This prints the queries from the first thread, and not queries that are
being serviced from other threads.
2009-02-13 10:26:37 -05:00
.TP
2010-10-26 05:08:33 -04:00
.B flush_infra \fI all|IP
If all then entire infra cache is emptied. If a specific IP address, the
entry for that address is removed from the cache. It contains EDNS, ping
and lameness data.
.TP
.B dump_infra
Show the contents of the infra cache.
.TP
2010-02-23 08:53:10 -05:00
.B set_option \fI opt: val
2011-08-22 09:22:05 -04:00
Set the option to the given value without a reload. The cache is
therefore not flushed. The option must end with a ':' and whitespace
must be between the option and the value. Some values may not have an
effect if set this way, the new values are not written to the config file,
not all options are supported. This is different from the set_option call
2021-12-13 06:46:08 -05:00
in libunbound, where all values work because Unbound has not been initialized.
2011-08-22 09:22:05 -04:00
.IP
The values that work are: statistics\- interval, statistics\- cumulative,
do\- not\- query\- localhost, harden\- short\- bufsize, harden\- large\- queries,
harden\- glue, harden\- dnssec\- stripped, harden\- below\- nxdomain,
harden\- referral\- path, prefetch, prefetch\- key, log\- queries,
hide\- identity, hide\- version, identity, version, val\- log\- level,
val\- log\- squelch, ignore\- cd\- flag, add\- holddown, del\- holddown,
2015-05-29 10:51:36 -04:00
keep\- missing, tcp\- upstream, ssl\- upstream, max\- udp\- size, ratelimit,
2017-01-05 08:57:12 -05:00
ip\- ratelimit, cache\- max\- ttl, cache\- min\- ttl, cache\- max\- negative\- ttl.
2010-02-23 08:53:10 -05:00
.TP
.B get_option \fI opt
Get the value of the option. Give the option name without a trailing ':'.
2011-08-22 09:22:05 -04:00
The value is printed. If the value is "", nothing is printed
and the connection closes. On error 'error ...' is printed (it gives
a syntax error on unknown option). For some options a list of values,
one on each line, is printed. The options are shown from the config file
as modified with set_option. For some options an override may have been
taken that does not show up with this command, not results from e.g. the
verbosity and forward control commands. Not all options work, see list_stubs,
list_forwards, list_local_zones and list_local_data for those.
2010-02-23 08:53:10 -05:00
.TP
2010-02-26 10:40:46 -05:00
.B list_stubs
List the stub zones in use. These are printed one by one to the output.
This includes the root hints in use.
.TP
.B list_forwards
List the forward zones in use. These are printed zone by zone to the output.
.TP
2015-04-07 09:50:09 -04:00
.B list_insecure
List the zones with domain\- insecure.
.TP
2010-02-26 11:14:00 -05:00
.B list_local_zones
List the local zones in use. These are printed one per line with zone type.
.TP
.B list_local_data
List the local data RRs in use. The resource records are printed.
.TP
2013-04-26 10:14:07 -04:00
.B insecure_add \fI zone
Add a \fB domain\- insecure\fR for the given zone, like the statement in unbound.conf.
2021-12-13 06:46:08 -05:00
Adds to the running Unbound without affecting the cache contents (which may
2013-04-26 10:14:07 -04:00
still be bogus, use \fB flush_zone\fR to remove it), does not affect the config file.
.TP
.B insecure_remove \fI zone
Removes domain\- insecure for the given zone.
.TP
2024-03-28 04:58:03 -04:00
.B forward_add \fR [\fI+it\fR] \fI zone addr ...
2021-12-13 06:46:08 -05:00
Add a new forward zone to running Unbound. With +i option also adds a
2012-02-15 09:35:28 -05:00
\fI domain\- insecure\fR for the zone (so it can resolve insecurely if you have
a DNSSEC root trust anchor configured for other names).
The addr can be IP4, IP6 or nameserver names, like \fI forward-zone\fR config
in unbound.conf.
2024-03-28 04:58:03 -04:00
The +t option sets it to use tls upstream, like \fI forward\- tls\- upstream\fR : yes.
2012-02-15 09:35:28 -05:00
.TP
.B forward_remove \fR [\fI+i\fR] \fI zone
2021-12-13 06:46:08 -05:00
Remove a forward zone from running Unbound. The +i also removes a
2012-02-15 09:35:28 -05:00
\fI domain\- insecure\fR for the zone.
.TP
2024-03-28 04:58:03 -04:00
.B stub_add \fR [\fI+ipt\fR] \fI zone addr ...
2021-12-13 06:46:08 -05:00
Add a new stub zone to running Unbound. With +i option also adds a
2012-02-15 09:35:28 -05:00
\fI domain\- insecure\fR for the zone. With +p the stub zone is set to prime,
without it it is set to notprime. The addr can be IP4, IP6 or nameserver
names, like the \fI stub-zone\fR config in unbound.conf.
2024-03-28 04:58:03 -04:00
The +t option sets it to use tls upstream, like \fI stub\- tls\- upstream\fR : yes.
2012-02-15 09:35:28 -05:00
.TP
.B stub_remove \fR [\fI+i\fR] \fI zone
2021-12-13 06:46:08 -05:00
Remove a stub zone from running Unbound. The +i also removes a
2012-02-15 09:35:28 -05:00
\fI domain\- insecure\fR for the zone.
.TP
2010-02-23 08:53:10 -05:00
.B forward \fR [\fIoff\fR | \fI addr ...\fR ]
2009-02-13 10:26:37 -05:00
Setup forwarding mode. Configures if the server should ask other upstream
2021-12-13 06:46:08 -05:00
nameservers, should go to the internet root nameservers itself, or show
2009-02-13 10:26:37 -05:00
the current config. You could pass the nameservers after a DHCP update.
.IP
Without arguments the current list of addresses used to forward all queries
2009-11-12 11:27:11 -05:00
to is printed. On startup this is from the forward\- zone "." configuration.
2009-02-13 10:26:37 -05:00
Afterwards it shows the status. It prints off when no forwarding is used.
.IP
If \fI off\fR is passed, forwarding is disabled and the root nameservers
2009-11-12 11:27:11 -05:00
are used. This can be used to avoid to avoid buggy or non\- DNSSEC supporting
2009-02-13 10:26:37 -05:00
nameservers returned from DHCP. But may not work in hotels or hotspots.
.IP
If one or more IPv4 or IPv6 addresses are given, those are then used to forward
queries to. The addresses must be separated with spaces. With '@port' the
port number can be set explicitly (default port is 53 (DNS)).
.IP
By default the forwarder information from the config file for the root "." is
used. The config file is not changed, so after a reload these changes are
gone. Other forward zones from the config file are not affected by this command.
2015-04-10 10:07:25 -04:00
.TP
.B ratelimit_list \fR [\fI+a\fR]
List the domains that are ratelimited. Printed one per line with current
estimated qps and qps limit from config. With +a it prints all domains, not
just the ratelimited domains, with their estimated qps. The ratelimited
domains return an error for uncached (new) queries, but cached queries work
as normal.
2016-10-05 05:36:25 -04:00
.TP
2017-01-05 08:57:12 -05:00
.B ip_ratelimit_list \fR [\fI+a\fR]
List the ip addresses that are ratelimited. Printed one per line with current
estimated qps and qps limit from config. With +a it prints all ips, not
just the ratelimited ips, with their estimated qps. The ratelimited
ips are dropped before checking the cache.
.TP
2018-04-23 10:42:30 -04:00
.B list_auth_zones
2022-05-15 15:49:03 -04:00
List the auth zones that are configured. Printed one per line with a status,
indicating if the zone is expired and current serial number. Configured RPZ
zones are included.
2018-04-23 10:42:30 -04:00
.TP
2018-06-15 09:42:41 -04:00
.B auth_zone_reload \fI zone\fR
2022-05-15 15:49:03 -04:00
Reload the auth zone (or RPZ zone) from zonefile. The zonefile is read in
overwriting the current contents of the zone in memory. This changes the auth
zone contents itself, not the cache contents. Such cache contents exists if
you set Unbound to validate with for-upstream yes and that can be cleared with
\fB flush_zone\fR \fI zone\fR .
2018-06-15 09:42:41 -04:00
.TP
2018-06-15 11:01:31 -04:00
.B auth_zone_transfer \fI zone\fR
2022-05-15 15:49:03 -04:00
Transfer the auth zone (or RPZ zone) from master. The auth zone probe sequence
is started, where the masters are probed to see if they have an updated zone
(with the SOA serial check). And then the zone is transferred for a newer zone
version.
2018-06-15 11:01:31 -04:00
.TP
2020-12-13 14:35:11 -05:00
.B rpz_enable \fI zone\fR
Enable the RPZ zone if it had previously been disabled.
.TP
2021-03-20 09:28:10 -04:00
.B rpz_disable \fI zone\fR
2020-12-13 14:35:11 -05:00
Disable the RPZ zone.
.TP
2016-10-05 05:36:25 -04:00
.B view_list_local_zones \fI view\fR
\fI list_local_zones\fR for given view.
.TP
.B view_local_zone \fI view\fR \fI name\fR \fI type
\fI local_zone\fR for given view.
.TP
.B view_local_zone_remove \fI view\fR \fI name
\fI local_zone_remove\fR for given view.
.TP
2017-01-12 10:56:05 -05:00
.B view_list_local_data \fI view\fR
\fI list_local_data\fR for given view.
.TP
2016-10-05 05:36:25 -04:00
.B view_local_data \fI view\fR \fI RR data...
\fI local_data\fR for given view.
.TP
.B view_local_data_remove \fI view\fR \fI name
\fI local_data_remove\fR for given view.
2018-11-26 08:37:23 -05:00
.TP
2020-01-29 09:32:55 -05:00
.B view_local_datas_remove \fI view\fR
Remove a list of \fI local_data\fR for given view from stdin. Like local_datas_remove.
.TP
2018-11-26 08:37:23 -05:00
.B view_local_datas \fI view\fR
Add a list of \fI local_data\fR for given view from stdin. Like local_datas.
Cookie secret file (#1090)
* - cookie-secret-file, define struct.
* - cookie-secret-file, add config option, create, read and delete struct.
* - cookie-secret-file, check cookie secrets for cookie validation.
* - cookie-secret-file, unbound-control add_cookie_secret, drop_cookie_secret,
activate_cookie_secret and print_cookie_secrets.
* - cookie-secret-file, test and fix locks, renew writes a fresh cookie,
staging cookies get a fresh cookie and spelling in error message.
* - cookie-secret-file, remove unused variable from cookie file unit test.
* Remove unshare and faketime dependencies for cookie_file test; documentation nits.
---------
Co-authored-by: Yorgos Thessalonikefs <yorgos@nlnetlabs.nl>
2024-08-02 07:32:08 -04:00
.TP
.B add_cookie_secret <secret>
Add or replace a cookie secret persistently. <secret> needs to be an 128 bit
hex string.
.IP
Cookie secrets can be either \fI active\fR or \fI staging\fR . \fI Active\fR cookie
secrets are used to create DNS Cookies, but verification of a DNS Cookie
succeeds with any of the \fI active\fR or \fI staging\fR cookie secrets. The
state of the current cookie secrets can be printed with the
\fB print_cookie_secrets\fR command.
.IP
When there are no cookie secrets configured yet, the <secret> is added as
\fI active\fR . If there is already an \fI active\fR cookie secret, the <secret>
is added as \fI staging\fR or replacing an existing \fI staging\fR secret.
.IP
To "roll" a cookie secret used in an anycast set. The new secret has to be
added as staging secret to \fB all\fR nodes in the anycast set. When \fB all\fR
nodes can verify DNS Cookies with the new secret, the new secret can be
activated with the \fB activate_cookie_secret\fR command. After \fB all\fR nodes
have the new secret \fI active\fR for at least one hour, the previous secret can
be dropped with the \fB drop_cookie_secret\fR command.
.IP
Persistence is accomplished by writing to a file which if configured with the
\fB cookie\- secret\- file\fR option in the server section of the config file.
This is disabled by default, "".
.TP
.B drop_cookie_secret
Drop the \fI staging\fR cookie secret.
.TP
.B activate_cookie_secret
Make the current \fI staging\fR cookie secret \fI active\fR , and the current
\fI active\fR cookie secret \fI staging\fR .
.TP
.B print_cookie_secrets
Show the current configured cookie secrets with their status.
2008-09-11 10:14:12 -04:00
.SH "EXIT CODE"
2009-11-12 11:27:11 -05:00
The unbound\- control program exits with status code 1 on error, 0 on success.
2008-09-11 10:14:12 -04:00
.SH "SET UP"
2021-12-13 06:46:08 -05:00
The setup requires a self\- signed certificate and private keys for both
2008-09-11 10:14:12 -04:00
the server and client. The script \fI unbound\- control\- setup\fR generates
these in the default run directory, or with \- d in another directory.
2010-05-31 10:11:51 -04:00
If you change the access control permissions on the key files you can decide
who can use unbound\- control, by default owner and group but not all users.
2008-11-24 05:55:14 -05:00
Run the script under the same username as you have configured in unbound.conf
2010-05-31 10:11:51 -04:00
or as root, so that the daemon is permitted to read the files, for example with:
2008-11-24 05:55:14 -05:00
.nf
sudo \- u unbound unbound\- control\- setup
.fi
If you have not configured
a username in unbound.conf, the keys need read permission for the user
credentials under which the daemon is started.
2008-09-11 10:14:12 -04:00
The script preserves private keys present in the directory.
2021-12-13 06:46:08 -05:00
After running the script as root, turn on \fB control\- enable\fR in
2008-09-11 10:14:12 -04:00
\fI unbound.conf\fR .
2008-09-18 05:44:37 -04:00
.SH "STATISTIC COUNTERS"
The \fI stats\fR command shows a number of statistic counters.
.TP
.I threadX.num.queries
number of queries received by thread
.TP
2017-01-05 08:57:12 -05:00
.I threadX.num.queries_ip_ratelimited
number of queries rate limited by thread
.TP
2023-08-08 09:19:56 -04:00
.I threadX.num.queries_cookie_valid
number of queries with a valid DNS Cookie by thread
.TP
.I threadX.num.queries_cookie_client
number of queries with a client part only DNS Cookie by thread
.TP
.I threadX.num.queries_cookie_invalid
number of queries with an invalid DNS Cookie by thread
.TP
2024-11-01 10:52:58 -04:00
.I threadX.num.queries_discard_timeout
number of queries removed due to discard-timeout by thread
.TP
.I threadX.num.queries_wait_limit
number of queries removed due to wait-limit by thread
.TP
2008-09-18 05:44:37 -04:00
.I threadX.num.cachehits
number of queries that were successfully answered using a cache lookup
.TP
.I threadX.num.cachemiss
number of queries that needed recursive processing
.TP
2017-09-18 04:55:08 -04:00
.I threadX.num.dnscrypt.crypted
2017-10-06 03:00:10 -04:00
number of queries that were encrypted and successfully decapsulated by dnscrypt.
2017-09-18 04:55:08 -04:00
.TP
.I threadX.num.dnscrypt.cert
number of queries that were requesting dnscrypt certificates.
.TP
.I threadX.num.dnscrypt.cleartext
number of queries received on dnscrypt port that were cleartext and not a
request for certificates.
.TP
.I threadX.num.dnscrypt.malformed
number of request that were neither cleartext, not valid dnscrypt messages.
.TP
2010-01-07 11:06:26 -05:00
.I threadX.num.prefetch
number of cache prefetches performed. This number is included in
cachehits, as the original query had the unprefetched answer from cache,
and resulted in recursive processing, taking a slot in the requestlist.
Not part of the recursivereplies (or the histogram thereof) or cachemiss,
as a cache response was sent.
.TP
2020-02-05 08:20:27 -05:00
.I threadX.num.expired
number of replies that served an expired cache entry.
2016-10-28 11:08:32 -04:00
.TP
2023-04-26 07:49:33 -04:00
.I threadX.num.queries_timed_out
number of queries that are dropped because they waited in the UDP socket buffer
for too long.
.TP
.I threadX.query.queue_time_us.max
The maximum wait time for packets in the socket buffer, in microseconds. This
is only reported when sock-queue-timeout is enabled.
.TP
2008-09-18 05:44:37 -04:00
.I threadX.num.recursivereplies
The number of replies sent to queries that needed recursive processing. Could be smaller than threadX.num.cachemiss if due to timeouts no replies were sent for some queries.
.TP
.I threadX.requestlist.avg
The average number of requests in the internal recursive processing request list on insert of a new incoming recursive processing query.
.TP
.I threadX.requestlist.max
Maximum size attained by the internal recursive processing request list.
.TP
.I threadX.requestlist.overwritten
Number of requests in the request list that were overwritten by newer entries. This happens if there is a flood of queries that recursive processing and the server has a hard time.
.TP
.I threadX.requestlist.exceeded
Queries that were dropped because the request list was full. This happens if a flood of queries need recursive processing, and the server can not keep up.
.TP
.I threadX.requestlist.current.all
Current size of the request list, includes internally generated queries (such
as priming queries and glue lookups).
.TP
.I threadX.requestlist.current.user
Current size of the request list, only the requests from client queries.
.TP
.I threadX.recursion.time.avg
Average time it took to answer queries that needed recursive processing. Note that queries that were answered from the cache are not in this average.
.TP
.I threadX.recursion.time.median
The median of the time it took to answer queries that needed recursive
2021-12-13 06:46:08 -05:00
processing. The median means that 50% of the user queries were answered in
less than this time. Because of big outliers (usually queries to non
2008-09-18 05:44:37 -04:00
responsive servers), the average can be bigger than the median. This median
has been calculated by interpolation from a histogram.
.TP
2015-03-05 10:23:14 -05:00
.I threadX.tcpusage
The currently held tcp buffers for incoming connections. A spot value on
the time of the request. This helps you spot if the incoming\- num\- tcp
buffers are full.
.TP
2008-09-18 05:44:37 -04:00
.I total.num.queries
summed over threads.
.TP
2023-08-08 09:19:56 -04:00
.I total.num.queries_ip_ratelimited
summed over threads.
.TP
.I total.num.queries_cookie_valid
summed over threads.
.TP
.I total.num.queries_cookie_client
summed over threads.
.TP
.I total.num.queries_cookie_invalid
summed over threads.
.TP
2024-11-01 10:52:58 -04:00
.I total.num.queries_discard_timeout
summed over threads.
.TP
.I total.num.queries_wait_limit
summed over threads.
.TP
2008-09-18 05:44:37 -04:00
.I total.num.cachehits
summed over threads.
.TP
.I total.num.cachemiss
summed over threads.
.TP
2017-09-18 04:55:08 -04:00
.I total.num.dnscrypt.crypted
summed over threads.
.TP
.I total.num.dnscrypt.cert
summed over threads.
.TP
.I total.num.dnscrypt.cleartext
summed over threads.
.TP
.I total.num.dnscrypt.malformed
summed over threads.
.TP
2010-01-07 11:06:26 -05:00
.I total.num.prefetch
summed over threads.
.TP
2020-02-05 08:20:27 -05:00
.I total.num.expired
2016-10-28 11:08:32 -04:00
summed over threads.
.TP
2023-04-26 07:49:33 -04:00
.I total.num.queries_timed_out
summed over threads.
.TP
.I total.query.queue_time_us.max
the maximum of the thread values.
.TP
2008-09-18 05:44:37 -04:00
.I total.num.recursivereplies
summed over threads.
.TP
.I total.requestlist.avg
averaged over threads.
.TP
.I total.requestlist.max
the maximum of the thread requestlist.max values.
.TP
.I total.requestlist.overwritten
summed over threads.
.TP
.I total.requestlist.exceeded
summed over threads.
.TP
.I total.requestlist.current.all
summed over threads.
.TP
.I total.recursion.time.median
averaged over threads.
.TP
2015-03-05 10:23:14 -05:00
.I total.tcpusage
summed over threads.
.TP
2008-09-18 05:44:37 -04:00
.I time.now
current time in seconds since 1970.
.TP
.I time.up
uptime since server boot in seconds.
.TP
.I time.elapsed
time since last statistics printout, in seconds.
.SH EXTENDED STATISTICS
.TP
.I mem.cache.rrset
Memory in bytes in use by the RRset cache.
.TP
.I mem.cache.message
Memory in bytes in use by the message cache.
.TP
2017-09-18 04:55:08 -04:00
.I mem.cache.dnscrypt_shared_secret
Memory in bytes in use by the dnscrypt shared secrets cache.
.TP
.I mem.cache.dnscrypt_nonce
Memory in bytes in use by the dnscrypt nonce cache.
.TP
2008-09-18 05:44:37 -04:00
.I mem.mod.iterator
Memory in bytes in use by the iterator module.
.TP
.I mem.mod.validator
Memory in bytes in use by the validator module. Includes the key cache and
negative cache.
.TP
2019-01-22 08:20:06 -05:00
.I mem.streamwait
Memory in bytes in used by the TCP and TLS stream wait buffers. These are
answers waiting to be written back to the clients.
.TP
2020-05-12 12:12:19 -04:00
.I mem.http.query_buffer
Memory in bytes used by the HTTP/2 query buffers. Containing (partial) DNS
queries waiting for request stream completion.
.TP
.I mem.http.response_buffer
Memory in bytes used by the HTTP/2 response buffers. Containing DNS responses
waiting to be written back to the clients.
.TP
DNSoverQUIC (#871)
* - dnsoverquic, configure --with-libngtcp2 option.
* - dnsoverquic, create comm_point for doq and receive cmsg local address.
* - dnsoverquic, less obtrusive debug.
* - dnsoverquic, log and fix local port number. Neater subroutines and ifdefs.
* - dnsoverquic, add testcode/doqclient.
* - dnsoverquic, review fixes on doqclient.
* - dnsoverquic, fix unit test testbound link.
* - dnsoverquic, parse query in doqclient.
* - dnsoverquic, link with libngtcp2_crypto_openssl and code for doqclient.
* - dnsoverquic, random routine for doqclient and fix ngaddr allocation, and
check ub_initstate return.
* - dnsoverquic, fix doqclient free of allocated ngaddr addresses.
* - dnsoverquic, enable debug output with -v for doqclient.
* - dnsoverquic, create and set TLS object and TLS context in doqclient.
* - dnsoverquic, work on quic tls context in doqclient.
* - dnsoverquic, set default dnsoverquic port to the standardized 853 port.
* - dnsoverquic, remove debug comment.
* - dnsoverquic, dns-over-quic quic-port: 853 config option.
* - dnsoverquic, log type of interface created at start of unbound.
* - dnsoverquic, log type of no tls https as https when interface is created.
* - dnsoverquic, setup client quic tls methods.
* - dnsoverquic, event work in doqclient.
* - dnsoverquic, explain in documentation that QUIC uses UDP.
* - dnsoverquic, make doqclient exit.
* - dnsoverquic, doqclient cleanup run routine.
* - dnsoverquic, doqclient code nicer.
* - dnsoverquic, doqclient read and timer.
* - dnsoverquic, doqclient write work.
* - dnsoverquic, review fixes.
* - dnsoverquic, detect openssl quic support at configure time.
* - dnsoverquic, do not allow QUIC on port 53 to stop confusion of DoQ and DNS.
* - dnsoverquic, in doqclient, when idle close is returned, drop the connection
without calling ngtcp2_conn_write_connection_close.
* - dnsoverquic, in doqclient, log callbacks.
* - dnsoverquic, in doqclient add extend_max_local_streams_bidi callback.
* - dnsoverquic, in doqclient add client query lists.
* - dnsoverquic, in doqclient, code cleaner, log text nicer.
* - dnsoverquic, in doqclient, work on write_streams.
* - dnsoverquic, in doqclient, use signed int for stream_id, work on the
ngtcp2_recv_stream_data callback.
* - dnsoverquic, in doqclient, print result and fixes for recv data.
* - dnsoverquic, in doqclient, add the event callbacks to fptr wlist.
* - dnsoverquic, in doqclient, when already expired, use zero timeout timer.
* - dnsoverquic, in doqclient, ignore unused return codes from
ngtcp2_conn_writev_stream.
* - dnsoverquic, add doqclient event functions to the unbound-dnstap-socket
test tool for linking.
* - dnsoverquic, in doqclient, fix multiple operands for the commandline.
neater dns message output.
* - dnsoverquic, in doqclient, store packet when write blocks and try later.
* - dnsoverquic, in doqclient, limit number of packets and number of bytes sent.
* - dnsoverquic, in doqclient, better size estimate for outgoing packet.
* - dnsoverquic, in doqclient, fix that already written next packet is not
counted for data length to send.
* - dnsoverquic, in doqclient, early data transmission and session resumption.
* - dnsoverquic, send version negotiation packet.
* - dnsoverquic, send retry and accept the connection.
* - dnsoverquic, storage structures.
* - dnsoverquic, doq connection setup.
* - dnsoverquic, neater code layout for new conn. Fix verbosity of log print.
* - dnsoverquic, doq conn callback functions.
* - dnsoverquic, doq_fill_rand routine in header file.
* - dnsoverquic, keep track of connection ids.
* - dnsoverquic, get_new_connection_id callback.
* - dnsoverquic, create doq_conid tree.
* - dnsoverquic, settings for server connection.
* - dnsoverquic, tls context.
* - dnsoverquic, sendmsg error handling.
* - dnsoverquic, neat code.
* - dnsoverquic, track doq connection last error.
* - dnsoverquic, neater packet address parameters.
* - dnsoverquic, fix uninitialized bytes in msg control in doq sendmsg, and
fix tree cleanup of conid tree.
* - dnsoverquic, better usage text for doqclient.
* - dnsoverquic, neat code.
* - dnsoverquic, connection receive packet handling.
* - dnsoverquic, debug output.
* - dnsoverquic, debug switched meaning of scid and dcid gives
ERR_TRANSPORT_PARAM.
* - dnsoverquic, remove debug output.
* - dnsoverquic, connection delete routine and error from connection read in
more detail with less clutter.
* - dnsoverquic, write to stream, and receive stream data, log packet.
* - dnsoverquic, alpn set up.
* - dnsoverquic, connection close.
* - dnsoverquic, doq_table and locks.
* - dnsoverquic, fix tests.
* - dnsoverquic, better locking.
* - dnsoverquic, doq_stream.
* - dnsoverquic, remove compile warning.
* - dnsoverquic, doq_stream receive data.
* - dnsoverquic, fixes for locks and keep length bytes allocated.
* - dnsoverquic, lock connection on initial insertion.
* - dnsoverquic, reply information, and reply buffer.
* - dnsoverquic, reply info from cache, local-zone and recursion lookups.
* - dnsoverquic, spelling in comment about buffer storage.
* - dnsoverquic, stream write list and doqclient fixes to exit and printout.
* - dnsoverquic, doqclient -q option for short printout.
* - dnsoverquic, unit test with local data reply.
* - dnsoverquic, write connection and write event is set.
* - dnsoverquic, neater logging for write event connection stream writes.
* - dnsoverquic, log remote connection when the streams are written for it.
* - dnsoverquic, better threaded use, threads can write to doq connections at
the same time.
* - dnsoverquic, unit test for the calculation of connection size with a query.
* - dnsoverquic, use less memory per connection.
* - dnsoverquic, remove unit test output.
* - dnsoverquic, add MSG_DONTWAIT so that there is no mistakenly blocking
socket operations.
* - dnsoverquic, doqclient logs address on connection failures.
* - dnsoverquic, compat code for clock get time routine.
* - dnsoverquic, use skip_test for doq unit test.
* - dnsoverquic, fixes for proxyprotocol, use remote_addr and set proxyprotocol
disabled on the doq connection.
* - dnsoverquic, doqclient sets log identity to its name, instead of "unbound".
* - dnsoverquic, handle blocked udp packet writes.
* - dnsoverquic, fix function documentation for verbose_print_addr from
services/listen_dnsport.c.
* - dnsoverquic, fix doq_conn lock protection. The checklock allows to set
the output file name, and doqclient uses that. Print place of lock_protect.
* - dnsoverquic, neater buffer clear when write of blocked packet fails, make
sure that memory area does not overlap for blocked packet addresses when
write of blocked packet fails, and size blocked packet buffer to the pkt buf.
* - dnsoverquic, move lock check after the test to test script in doq test.
* - dnsoverquic, the doq test uses valgrind when enabled.
* - dnsoverquic, git ignore the doqclient test.
* - dnsoverquic, limit the buffer for packets to max packet size with some more.
* - dnsoverquic, spelling fix.
* - dnsoverquic, timer work, structure and adds and deletes.
* - dnsoverquic, timer_tree uses table.lock.
* - dnsoverquic, fix timer tree remove and spelling in header file comment.
* - dnsoverquic, fix testbound for timer compare function linkage.
* - dnsoverquic, timer set add debug output.
* - dnsoverquic, doq_conn_check_timer function.
* - dnsoverquic, doq_done_setup_timer_and_write function.
* - dnsoverquic, fix that doq conn is not deleted whilst editing write and timer.
* - dnsoverquic, Fix #861 make ERROR netevent.h:1073:32: error: field 'blocked_pkt_pi' has incomplete type
* - dnsoverquic, timer element has timeout setup when socket callback complete.
* - dnsoverquic, fix unit test compile.
* - dnsoverquic, timer callback routine, handle timeout and close and delete the
connection if necessary.
* - dnsoverquic, timer pickup stops at current time.
* - dnsoverquic, timer comparable with the event base time.
* - dnsoverquic, erase marked time when timer disabled.
* - dnsoverquic, fix timer to set correctly and lock popped write connection
early, before it is modified.
* - dnsoverquic, fix to unlock connection lock when it is unlinked and deleted.
* - dnsoverquic, fix to unlock connection lock when it is deleted because it is
a duplicate connection.
* - dnsoverquic, fix that doq timer is not disabled when not set.
* - dnsoverquic, quic-size: 8m maximum number of bytes for QUIC buffers.
* - dnsoverquic, flex and bison.
* - dnsoverquic, quic-size turn away new connections when full.
* - dnsoverquic, doqclient outputs stream reset information.
* - dnsoverquic, detect stream close and reset.
* - dnsoverquic, free stream buffers when data is acked and stream is closed.
* - dnsoverquic, delete stream when closed. Unlink it. Allow stream_id 4 as first.
* - dnsoverquic, stats output for mem.quic and num.query.quic.
* - dnsoverquic, review fix.
* - dnsoverquic, fix when compiled without ngtcp2.
* - dnsoverquic, fix to detect ngtcp2_crypto_quictls for openssl crypto, after
change in libngtcp2.
* - dnsoverquic, fix for newer ngtcp2 versions. detect ngtcp2_ccerr_default,
ngtcp2/ngtcp2_crypto_quictls.h, struct ngtcp2_pkt_hd.tokenlen,
struct ngtcp2_settings.tokenlen and struct ngtcp2_version_cid.
* - dnsoverquic, fix for newer ngtcp2 version, detect number of arguments for
ngtcp2_conn_shutdown_stream.
* - dnsoverquic, fix for newer ngtcp2.
* - dnsoverquic, use the functions from util/timeval_func.h.
* - dnsoverquic, fix in doqclient only write transport parameters once.
* - dnsoverquic, debug log output removed.
* - dnsoverquic, fix in doqclient to work with renamed NGTCP2_CC_ALGO_BBR_V2
from ngtcp2.
* - dnsoverquic, fix to check in doq_server_socket_create that tls-service-key
and tls-service-pem have a value.
* - dnsoverquic, fix to error when doq_server_socket_create fails.
* - dnsoverquic, improve linebreaks in configparser additions.
* - dnsoverquic, fix port from interface pickup after main branch change.
* Fix getting user data from SSL, fix calloc warning.
* Fix fwrite return value check in doqclient
* - timeval_substruct from timeval_func.h
- lock_protect also for HAVE_NGTCP2_CCERR_DEFAULT
- fix doq logging for inet_ntop failures
* - memset for consistency
- no value returned from msghdr_get_ecn when S_SPLINT_S is defined
* - dnsoverquic, rerun autoconf.
---------
Co-authored-by: Yorgos Thessalonikefs <yorgos@nlnetlabs.nl>
2024-10-09 04:32:03 -04:00
.I mem.quic
Memory in bytes used by QUIC. Containing connection information, stream
information, queries read and responses written back to the clients.
.TP
2008-09-18 10:37:20 -04:00
.I histogram.<sec>.<usec>.to.<sec>.<usec>
Shows a histogram, summed over all threads. Every element counts the
recursive queries whose reply time fit between the lower and upper bound.
Times larger or equal to the lowerbound, and smaller than the upper bound.
There are 40 buckets, with bucket sizes doubling.
.TP
2008-09-18 05:44:37 -04:00
.I num.query.type.A
The total number of queries over all threads with query type A.
Printed for the other query types as well, but only for the types for which
queries were received, thus =0 entries are omitted for brevity.
.TP
.I num.query.type.other
2009-11-12 11:27:11 -05:00
Number of queries with query types 256\- 65535.
2008-09-18 05:44:37 -04:00
.TP
.I num.query.class.IN
The total number of queries over all threads with query class IN (internet).
Also printed for other classes (such as CH (CHAOS) sometimes used for
debugging), or NONE, ANY, used by dynamic update.
2009-11-12 11:27:11 -05:00
num.query.class.other is printed for classes 256\- 65535.
2008-09-18 05:44:37 -04:00
.TP
.I num.query.opcode.QUERY
The total number of queries over all threads with query opcode QUERY.
Also printed for other opcodes, UPDATE, ...
.TP
.I num.query.tcp
2021-12-13 06:46:08 -05:00
Number of queries that were made using TCP towards the Unbound server.
2008-09-18 05:44:37 -04:00
.TP
2014-04-10 05:13:58 -04:00
.I num.query.tcpout
2021-12-13 06:46:08 -05:00
Number of queries that the Unbound server made using TCP outgoing towards
2014-04-10 05:13:58 -04:00
other servers.
.TP
2022-06-29 04:51:54 -04:00
.I num.query.udpout
Number of queries that the Unbound server made using UDP outgoing towards
other servers.
.TP
2018-06-28 04:15:47 -04:00
.I num.query.tls
2021-12-13 06:46:08 -05:00
Number of queries that were made using TLS towards the Unbound server.
2018-06-28 05:14:31 -04:00
These are also counted in num.query.tcp, because TLS uses TCP.
2018-06-28 04:15:47 -04:00
.TP
2019-01-23 05:19:04 -05:00
.I num.query.tls.resume
Number of TLS session resumptions, these are queries over TLS towards
2021-12-13 06:46:08 -05:00
the Unbound server where the client negotiated a TLS session resumption key.
2019-01-23 05:19:04 -05:00
.TP
2020-05-08 06:14:17 -04:00
.I num.query.https
2021-12-13 06:46:08 -05:00
Number of queries that were made using HTTPS towards the Unbound server.
2020-05-08 06:14:17 -04:00
These are also counted in num.query.tcp and num.query.tls, because HTTPS
uses TLS and TCP.
.TP
DNSoverQUIC (#871)
* - dnsoverquic, configure --with-libngtcp2 option.
* - dnsoverquic, create comm_point for doq and receive cmsg local address.
* - dnsoverquic, less obtrusive debug.
* - dnsoverquic, log and fix local port number. Neater subroutines and ifdefs.
* - dnsoverquic, add testcode/doqclient.
* - dnsoverquic, review fixes on doqclient.
* - dnsoverquic, fix unit test testbound link.
* - dnsoverquic, parse query in doqclient.
* - dnsoverquic, link with libngtcp2_crypto_openssl and code for doqclient.
* - dnsoverquic, random routine for doqclient and fix ngaddr allocation, and
check ub_initstate return.
* - dnsoverquic, fix doqclient free of allocated ngaddr addresses.
* - dnsoverquic, enable debug output with -v for doqclient.
* - dnsoverquic, create and set TLS object and TLS context in doqclient.
* - dnsoverquic, work on quic tls context in doqclient.
* - dnsoverquic, set default dnsoverquic port to the standardized 853 port.
* - dnsoverquic, remove debug comment.
* - dnsoverquic, dns-over-quic quic-port: 853 config option.
* - dnsoverquic, log type of interface created at start of unbound.
* - dnsoverquic, log type of no tls https as https when interface is created.
* - dnsoverquic, setup client quic tls methods.
* - dnsoverquic, event work in doqclient.
* - dnsoverquic, explain in documentation that QUIC uses UDP.
* - dnsoverquic, make doqclient exit.
* - dnsoverquic, doqclient cleanup run routine.
* - dnsoverquic, doqclient code nicer.
* - dnsoverquic, doqclient read and timer.
* - dnsoverquic, doqclient write work.
* - dnsoverquic, review fixes.
* - dnsoverquic, detect openssl quic support at configure time.
* - dnsoverquic, do not allow QUIC on port 53 to stop confusion of DoQ and DNS.
* - dnsoverquic, in doqclient, when idle close is returned, drop the connection
without calling ngtcp2_conn_write_connection_close.
* - dnsoverquic, in doqclient, log callbacks.
* - dnsoverquic, in doqclient add extend_max_local_streams_bidi callback.
* - dnsoverquic, in doqclient add client query lists.
* - dnsoverquic, in doqclient, code cleaner, log text nicer.
* - dnsoverquic, in doqclient, work on write_streams.
* - dnsoverquic, in doqclient, use signed int for stream_id, work on the
ngtcp2_recv_stream_data callback.
* - dnsoverquic, in doqclient, print result and fixes for recv data.
* - dnsoverquic, in doqclient, add the event callbacks to fptr wlist.
* - dnsoverquic, in doqclient, when already expired, use zero timeout timer.
* - dnsoverquic, in doqclient, ignore unused return codes from
ngtcp2_conn_writev_stream.
* - dnsoverquic, add doqclient event functions to the unbound-dnstap-socket
test tool for linking.
* - dnsoverquic, in doqclient, fix multiple operands for the commandline.
neater dns message output.
* - dnsoverquic, in doqclient, store packet when write blocks and try later.
* - dnsoverquic, in doqclient, limit number of packets and number of bytes sent.
* - dnsoverquic, in doqclient, better size estimate for outgoing packet.
* - dnsoverquic, in doqclient, fix that already written next packet is not
counted for data length to send.
* - dnsoverquic, in doqclient, early data transmission and session resumption.
* - dnsoverquic, send version negotiation packet.
* - dnsoverquic, send retry and accept the connection.
* - dnsoverquic, storage structures.
* - dnsoverquic, doq connection setup.
* - dnsoverquic, neater code layout for new conn. Fix verbosity of log print.
* - dnsoverquic, doq conn callback functions.
* - dnsoverquic, doq_fill_rand routine in header file.
* - dnsoverquic, keep track of connection ids.
* - dnsoverquic, get_new_connection_id callback.
* - dnsoverquic, create doq_conid tree.
* - dnsoverquic, settings for server connection.
* - dnsoverquic, tls context.
* - dnsoverquic, sendmsg error handling.
* - dnsoverquic, neat code.
* - dnsoverquic, track doq connection last error.
* - dnsoverquic, neater packet address parameters.
* - dnsoverquic, fix uninitialized bytes in msg control in doq sendmsg, and
fix tree cleanup of conid tree.
* - dnsoverquic, better usage text for doqclient.
* - dnsoverquic, neat code.
* - dnsoverquic, connection receive packet handling.
* - dnsoverquic, debug output.
* - dnsoverquic, debug switched meaning of scid and dcid gives
ERR_TRANSPORT_PARAM.
* - dnsoverquic, remove debug output.
* - dnsoverquic, connection delete routine and error from connection read in
more detail with less clutter.
* - dnsoverquic, write to stream, and receive stream data, log packet.
* - dnsoverquic, alpn set up.
* - dnsoverquic, connection close.
* - dnsoverquic, doq_table and locks.
* - dnsoverquic, fix tests.
* - dnsoverquic, better locking.
* - dnsoverquic, doq_stream.
* - dnsoverquic, remove compile warning.
* - dnsoverquic, doq_stream receive data.
* - dnsoverquic, fixes for locks and keep length bytes allocated.
* - dnsoverquic, lock connection on initial insertion.
* - dnsoverquic, reply information, and reply buffer.
* - dnsoverquic, reply info from cache, local-zone and recursion lookups.
* - dnsoverquic, spelling in comment about buffer storage.
* - dnsoverquic, stream write list and doqclient fixes to exit and printout.
* - dnsoverquic, doqclient -q option for short printout.
* - dnsoverquic, unit test with local data reply.
* - dnsoverquic, write connection and write event is set.
* - dnsoverquic, neater logging for write event connection stream writes.
* - dnsoverquic, log remote connection when the streams are written for it.
* - dnsoverquic, better threaded use, threads can write to doq connections at
the same time.
* - dnsoverquic, unit test for the calculation of connection size with a query.
* - dnsoverquic, use less memory per connection.
* - dnsoverquic, remove unit test output.
* - dnsoverquic, add MSG_DONTWAIT so that there is no mistakenly blocking
socket operations.
* - dnsoverquic, doqclient logs address on connection failures.
* - dnsoverquic, compat code for clock get time routine.
* - dnsoverquic, use skip_test for doq unit test.
* - dnsoverquic, fixes for proxyprotocol, use remote_addr and set proxyprotocol
disabled on the doq connection.
* - dnsoverquic, doqclient sets log identity to its name, instead of "unbound".
* - dnsoverquic, handle blocked udp packet writes.
* - dnsoverquic, fix function documentation for verbose_print_addr from
services/listen_dnsport.c.
* - dnsoverquic, fix doq_conn lock protection. The checklock allows to set
the output file name, and doqclient uses that. Print place of lock_protect.
* - dnsoverquic, neater buffer clear when write of blocked packet fails, make
sure that memory area does not overlap for blocked packet addresses when
write of blocked packet fails, and size blocked packet buffer to the pkt buf.
* - dnsoverquic, move lock check after the test to test script in doq test.
* - dnsoverquic, the doq test uses valgrind when enabled.
* - dnsoverquic, git ignore the doqclient test.
* - dnsoverquic, limit the buffer for packets to max packet size with some more.
* - dnsoverquic, spelling fix.
* - dnsoverquic, timer work, structure and adds and deletes.
* - dnsoverquic, timer_tree uses table.lock.
* - dnsoverquic, fix timer tree remove and spelling in header file comment.
* - dnsoverquic, fix testbound for timer compare function linkage.
* - dnsoverquic, timer set add debug output.
* - dnsoverquic, doq_conn_check_timer function.
* - dnsoverquic, doq_done_setup_timer_and_write function.
* - dnsoverquic, fix that doq conn is not deleted whilst editing write and timer.
* - dnsoverquic, Fix #861 make ERROR netevent.h:1073:32: error: field 'blocked_pkt_pi' has incomplete type
* - dnsoverquic, timer element has timeout setup when socket callback complete.
* - dnsoverquic, fix unit test compile.
* - dnsoverquic, timer callback routine, handle timeout and close and delete the
connection if necessary.
* - dnsoverquic, timer pickup stops at current time.
* - dnsoverquic, timer comparable with the event base time.
* - dnsoverquic, erase marked time when timer disabled.
* - dnsoverquic, fix timer to set correctly and lock popped write connection
early, before it is modified.
* - dnsoverquic, fix to unlock connection lock when it is unlinked and deleted.
* - dnsoverquic, fix to unlock connection lock when it is deleted because it is
a duplicate connection.
* - dnsoverquic, fix that doq timer is not disabled when not set.
* - dnsoverquic, quic-size: 8m maximum number of bytes for QUIC buffers.
* - dnsoverquic, flex and bison.
* - dnsoverquic, quic-size turn away new connections when full.
* - dnsoverquic, doqclient outputs stream reset information.
* - dnsoverquic, detect stream close and reset.
* - dnsoverquic, free stream buffers when data is acked and stream is closed.
* - dnsoverquic, delete stream when closed. Unlink it. Allow stream_id 4 as first.
* - dnsoverquic, stats output for mem.quic and num.query.quic.
* - dnsoverquic, review fix.
* - dnsoverquic, fix when compiled without ngtcp2.
* - dnsoverquic, fix to detect ngtcp2_crypto_quictls for openssl crypto, after
change in libngtcp2.
* - dnsoverquic, fix for newer ngtcp2 versions. detect ngtcp2_ccerr_default,
ngtcp2/ngtcp2_crypto_quictls.h, struct ngtcp2_pkt_hd.tokenlen,
struct ngtcp2_settings.tokenlen and struct ngtcp2_version_cid.
* - dnsoverquic, fix for newer ngtcp2 version, detect number of arguments for
ngtcp2_conn_shutdown_stream.
* - dnsoverquic, fix for newer ngtcp2.
* - dnsoverquic, use the functions from util/timeval_func.h.
* - dnsoverquic, fix in doqclient only write transport parameters once.
* - dnsoverquic, debug log output removed.
* - dnsoverquic, fix in doqclient to work with renamed NGTCP2_CC_ALGO_BBR_V2
from ngtcp2.
* - dnsoverquic, fix to check in doq_server_socket_create that tls-service-key
and tls-service-pem have a value.
* - dnsoverquic, fix to error when doq_server_socket_create fails.
* - dnsoverquic, improve linebreaks in configparser additions.
* - dnsoverquic, fix port from interface pickup after main branch change.
* Fix getting user data from SSL, fix calloc warning.
* Fix fwrite return value check in doqclient
* - timeval_substruct from timeval_func.h
- lock_protect also for HAVE_NGTCP2_CCERR_DEFAULT
- fix doq logging for inet_ntop failures
* - memset for consistency
- no value returned from msghdr_get_ecn when S_SPLINT_S is defined
* - dnsoverquic, rerun autoconf.
---------
Co-authored-by: Yorgos Thessalonikefs <yorgos@nlnetlabs.nl>
2024-10-09 04:32:03 -04:00
.I num.query.quic
Number of queries that were made using QUIC towards the Unbound server.
These are also counted in num.query.tls, because TLS is used for these queries.
.TP
2008-12-17 09:50:03 -05:00
.I num.query.ipv6
2021-12-13 06:46:08 -05:00
Number of queries that were made using IPv6 towards the Unbound server.
2008-12-17 09:50:03 -05:00
.TP
2008-09-18 05:44:37 -04:00
.I num.query.flags.RD
The number of queries that had the RD flag set in the header.
Also printed for flags QR, AA, TC, RA, Z, AD, CD.
2021-12-13 06:46:08 -05:00
Note that queries with flags QR, AA or TC may have been rejected
2008-09-18 05:44:37 -04:00
because of that.
.TP
.I num.query.edns.present
number of queries that had an EDNS OPT record present.
.TP
.I num.query.edns.DO
number of queries that had an EDNS OPT record with the DO (DNSSEC OK) bit set.
2008-09-18 08:11:20 -04:00
These queries are also included in the num.query.edns.present number.
2008-09-18 05:44:37 -04:00
.TP
2017-08-03 08:52:33 -04:00
.I num.query.ratelimited
The number of queries that are turned away from being send to nameserver due to
ratelimiting.
.TP
2017-09-18 04:55:08 -04:00
.I num.query.dnscrypt.shared_secret.cachemiss
The number of dnscrypt queries that did not find a shared secret in the cache.
2023-08-08 09:19:56 -04:00
This can be used to compute the shared secret hitrate.
2017-09-18 04:55:08 -04:00
.TP
.I num.query.dnscrypt.replay
The number of dnscrypt queries that found a nonce hit in the nonce cache and
hence are considered a query replay.
.TP
2008-09-18 05:44:37 -04:00
.I num.answer.rcode.NXDOMAIN
The number of answers to queries, from cache or from recursion, that had the
return code NXDOMAIN. Also printed for the other return codes.
.TP
.I num.answer.rcode.nodata
The number of answers to queries that had the pseudo return code nodata.
This means the actual return code was NOERROR, but additionally, no data was
carried in the answer (making what is called a NOERROR/NODATA answer).
2008-09-18 08:11:20 -04:00
These queries are also included in the num.answer.rcode.NOERROR number.
2008-09-18 05:44:37 -04:00
Common for AAAA lookups when an A record exists, and no AAAA.
.TP
.I num.answer.secure
2021-12-13 06:46:08 -05:00
Number of answers that were secure. The answer validated correctly.
2008-09-18 05:44:37 -04:00
The AD bit might have been set in some of these answers, where the client
signalled (with DO or AD bit in the query) that they were ready to accept
the AD bit in the answer.
.TP
.I num.answer.bogus
Number of answers that were bogus. These answers resulted in SERVFAIL
to the client because the answer failed validation.
.TP
.I num.rrset.bogus
The number of rrsets marked bogus by the validator. Increased for every
RRset inspection that fails.
.TP
.I unwanted.queries
Number of queries that were refused or dropped because they failed the
access control settings.
.TP
.I unwanted.replies
Replies that were unwanted or unsolicited. Could have been random traffic,
delayed duplicates, very late answers, or could be spoofing attempts.
Some low level of late answers and delayed duplicates are to be expected
with the UDP protocol. Very high values could indicate a threat (spoofing).
2014-08-01 09:24:46 -04:00
.TP
.I msg.cache.count
The number of items (DNS replies) in the message cache.
.TP
.I rrset.cache.count
The number of RRsets in the rrset cache. This includes rrsets used by
the messages in the message cache, but also delegation information.
.TP
.I infra.cache.count
The number of items in the infra cache. These are IP addresses with their
timing and protocol support information.
.TP
.I key.cache.count
The number of items in the key cache. These are DNSSEC keys, one item
per delegation point, and their validation status.
2017-09-18 04:55:08 -04:00
.TP
2023-01-13 05:01:46 -05:00
.I msg.cache.max_collisions
The maximum number of hash table collisions in the msg cache. This is the
number of hashes that are identical when a new element is inserted in the
2023-01-13 05:22:47 -05:00
hash table. If the value is very large, like hundreds, something is wrong
with the performance of the hash table, hash values are incorrect or malicious.
2023-01-13 05:01:46 -05:00
.TP
.I rrset.cache.max_collisions
The maximum number of hash table collisions in the rrset cache. This is the
number of hashes that are identical when a new element is inserted in the
2023-01-13 05:22:47 -05:00
hash table. If the value is very large, like hundreds, something is wrong
with the performance of the hash table, hash values are incorrect or malicious.
2023-01-13 05:01:46 -05:00
.TP
2017-09-18 04:55:08 -04:00
.I dnscrypt_shared_secret.cache.count
The number of items in the shared secret cache. These are precomputed shared
secrets for a given client public key/server secret key pair. Shared secrets
2021-12-13 06:46:08 -05:00
are CPU intensive and this cache allows Unbound to avoid recomputing the
2017-10-06 03:00:10 -04:00
shared secret when multiple dnscrypt queries are sent from the same client.
2017-09-18 04:55:08 -04:00
.TP
.I dnscrypt_nonce.cache.count
The number of items in the client nonce cache. This cache is used to prevent
dnscrypt queries replay. The client nonce must be unique for each client public
key/server secret key pair. This cache should be able to host QPS * `replay
window` interval keys to prevent replay of a query during `replay window`
seconds.
2018-04-09 06:15:06 -04:00
.TP
.I num.query.authzone.up
The number of queries answered from auth\- zone data, upstream queries.
These queries would otherwise have been sent (with fallback enabled) to
the internet, but are now answered from the auth zone.
.TP
.I num.query.authzone.down
The number of queries for downstream answered from auth\- zone data.
These queries are from downstream clients, and have had an answer from
the data in the auth zone.
2018-04-10 07:39:23 -04:00
.TP
.I num.query.aggressive.NOERROR
The number of queries answered using cached NSEC records with NODATA RCODE.
These queries would otherwise have been sent to the internet, but are now
answered using cached data.
.TP
.I num.query.aggressive.NXDOMAIN
The number of queries answered using cached NSEC records with NXDOMAIN RCODE.
These queries would otherwise have been sent to the internet, but are now
answered using cached data.
2018-08-21 10:14:28 -04:00
.TP
.I num.query.subnet
Number of queries that got an answer that contained EDNS client subnet data.
.TP
.I num.query.subnet_cache
Number of queries answered from the edns client subnet cache. These are
counted as cachemiss by the main counters, but hit the client subnet
2023-05-30 11:49:50 -04:00
specific cache after getting processed by the edns client subnet module.
.TP
.I num.query.cachedb
Number of queries answered from the external cache of cachedb.
These are counted as cachemiss by the main counters, but hit the cachedb
external cache after getting processed by the cachedb module.
2019-11-21 23:56:24 -05:00
.TP
.I num.rpz.action.<rpz_action>
Number of queries answered using configured RPZ policy, per RPZ action type.
2021-03-12 07:24:17 -05:00
Possible actions are: nxdomain, nodata, passthru, drop, tcp\- only, local\- data,
disabled, and cname\- override.
2008-09-11 10:14:12 -04:00
.SH "FILES"
.TP
.I @ub_conf_file@
2021-12-13 06:46:08 -05:00
Unbound configuration file.
2008-09-11 10:14:12 -04:00
.TP
.I @UNBOUND_RUN_DIR@
2008-09-12 08:09:00 -04:00
directory with private keys (unbound_server.key and unbound_control.key) and
2009-11-12 11:27:11 -05:00
self\- signed certificates (unbound_server.pem and unbound_control.pem).
2008-09-11 10:14:12 -04:00
.SH "SEE ALSO"
2021-12-13 06:46:08 -05:00
\fI unbound.conf\fR (5),
2008-09-11 10:14:12 -04:00
\fI unbound\fR (8).