HP-UX IP Address and Client Management Administrator's Guide HP-UX 11i v2, HP-UX 11i v3
NOTE: You cannot use an include statement within another statement. Therefore, an entry
such as the following is incorrect:
acl internal_hosts {include internal_hosts.acl};
Also, do not type #include as you would in a C program. The pound sign (#) is used to start
a comment in the /etc/named.conf file.
The key Statement
The key statement in the /etc/named.conf file defines a shared secret key for use with TSIG.
The key statement can occur at the top level of the configuration file or inside a view statement.
You can use the keys defined in the top-level key statements in all the views. You must define
keys intended for use in a controls statement at the top level.
The key statement is of the following format:
key key_id {algorithm algorithm_id;
secret secret_string; };
The key_id, also known as the key name, is a domain name uniquely identifying the key. The
algorithm_id is a string that specifies a security or authentication algorithm. The
secret_string is a base-64 encoded secret string used by the algorithm.
An example key statement is as follows:
key sample_key { algorithm hmac-md5;
secret “secret here”; };
You can use the key ID defined in the key statement to associate an authentication method with
a particular name server. You must create a key ID in the key statement before using it in a server
definition.
The logging Statement
The logging statement in the /etc/named.conf file specifies what messages the server logs
and where the log messages are sent. The logging statement also configures a variety of logging
options for the name server.
The logging statement configures the logging system, which sends messages to one or more
channels.
The logging statement is of the following format:
logging { [ channel channel_name
{ ( file path name [ versions ( number | unlimited )
] [ size size spec ] | null | stderr | syslog
syslog_facility ) ; [ severity ( critical | error | warning
| notice | info | debug [ level ] | dynamic ) ; ]
[ print-category yes_or_no ; ] [ print-severity yes_or_no
; ] [ print-time yes_or_no ; ] }; ]... [ category category_name
{ ( channel_name ; )... }; ]... };
The logging keyword contains a list of statements enclosed in braces.
Specifying the Number of Log File Backups
You can specify the number of backup versions of a log file by using the version (number
| unlimited) option in the logging statement. If you specify version 4, named retains
four backup versions of the log file. When you open a file, named retains the backup versions
by renaming the original file to a backup file, the backup file to the previous backup file, and so
on.
For example, if you choose to retain three old versions of the file lame.log, then just before it
is opened, lame.log is renamed to lame.log.0, lame.log.0 is renamed to lame.log.1,
and lame.log.1 is renamed to lame.log.2.
BIND Name Service Overview 27