## page was renamed from DNS/drill DNS/drillについて、ここに記述してください。 {{{ drill version 1.6.10 (ldns version 1.6.10) Written by NLnet Labs. Copyright (c) 2004-2008 NLnet Labs. Licensed under the revised BSD license. There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. Usage: drill name [@server] [type] [class] can be a domain name or an IP address (-x lookups) defaults to A defaults to IN arguments may be placed in random order Options: -D enable DNSSEC (DO bit) -T trace from the root down to -S chase signature(s) from to a know key [*] -V verbosity (0-5) -Q quiet mode (overrules -V) -f file read packet from file and send it -i file read packet from file and print it -w file write answer packet to file -q file write query packet to file -h show this help -v show version Query options: -4 stay on ip4 -6 stay on ip6 -a fallback to EDNS0 and TCP if the answer is truncated -b use as the buffer size (defaults to 512 b) -c use file for rescursive nameserver configuration (/etc/resolv.conf) -k specify a file that contains a trusted DNSSEC key (DNSKEY|DS) [**] used to verify any signatures in the current answer -o set flags to: [QR|qr][AA|aa][TC|tc][RD|rd][CD|cd][RA|ra][AD|ad] lowercase: unset bit, uppercase: set bit -p use as remote port number -s show the DS RR for each key in a packet -u send the query with udp (the default) -x do a reverse lookup when doing a secure trace: -r use file as root servers hint file -t send the query with tcp (connected) -d use domain as the start point for the trace -y specify named base64 tsig key, and optional an algorithm (defaults to hmac-md5.sig-alg.reg.int) -z don't randomize the nameservers before use [*] = enables/implies DNSSEC [**] = can be given more than once ldns-team@nlnetlabs.nl | http://www.nlnetlabs.nl/ldns/ }}}