Skip site navigation (1)Skip section navigation (2)

FreeBSD Manual Pages

Man Page or Keyword Search:
Man Architecture
Apropos Keyword Search (all sections) Output format
home | help
drill(1)							      drill(1)

       drill - get (debug) information out of DNS(SEC)

       drill [ OPTIONS ] name [	@server	] [ type ] [ class ]

       drill  is a tool	to designed to get all sorts of	information out	of the
       DNS. It is specificly designed to be used with DNSSEC.

       The name	drill is a pun on dig. With drill you should be	able get  even
       more information	than with dig.

       If  no  arguments are given class defaults to 'IN' and type to 'A'. The
       server(s) specified in /etc/resolv.conf are used	to query against.

       name Ask	for this name.

       @server Send to query to	this server. If	not specified  use  the	 name-
       servers from /etc/resolv.conf.

       type  Ask for this RR type. If type is not given	on the command line it
       defaults	to 'A'.	Except when doing to reverse lookup when  it  defaults
       to 'PTR'.

       class Use this class when querying.

       drill mx	Show the MX records of the domain

       drill -S
	      Chase  any  signatures  in  the  domain. This
	      option is	only  available	 when  ldns  has  been	compiled  with

       drill -TD
	      Do  a  DNSSEC  (-D)  trace  (-T)	from  the  rootservers down to	This option only works when ldns has been com-
	      piled with openssl support.

       drill -s	dnskey
	      Show the DNSKEY record(s)	for	For each found
	      DNSKEY record also print the DS record.

       -D     Enable DNSSEC in the  query.  When  querying  for	 DNSSEC	 types
	      (DNSKEY, RRSIG, DS and NSEC) this	is not automaticly enabled.

       -T     Trace  name  from	 the  root  down.  When	 using this option the
	      @server and the type arguments are not used.

       -S     Chase the	signature(s) of	'name' to a known key or as high up in
	      the tree as possible.

       -V level
	      Be  more verbose.	Set level to 5 to see the actual query that is

       -Q     Quiet mode, this overrules -V.

       -f file
	      Read the query from a file. The query must be dumped with	-w.

       -i file
	      read the answer from the file instead  from  the	network.  This
	      aids in debugging	and can	be used	to check if a query on disk is
	      valid.  If the file contains binary data it is assumed to	 be  a
	      query in network order.

       -w file
	      Write an answer packet to	file.

       -q file
	      Write the	query packet to	file.

       -v     Show drill's version.

       -h     Show a short help	message.

       -4     Stay on ip4. Only	send queries to	ip4 enabled nameservers.

       -6     Stay on ip6. Only	send queries to	ip6 enabled nameservers.

       -a     Use the resolver structure's fallback mechanism if the answer is
	      truncated	(TC=1).	If a truncated packet  is  received  and  this
	      option  is  set,	drill  will  first send	a new query with EDNS0
	      buffer size 4096.

	      If the EDNS0 buffer size was already set to 512+ bytes,  or  the
	      above  retry  also  results  in a	truncated answer, the resolver
	      structure	will fall back to TCP.

       -b size
	      Use size as the buffer size in the EDNS0 pseudo RR.

       -c file
	      Use file instead of /etc/resolv.conf for	nameserver  configura-

       -d domain
	      When tracing (-T), start from this domain	instead	of the root.

       -t     Use TCP/IP when querying a server

       -k keyfile
	      Use this file to read a (trusted)	key from. When this options is
	      given drill tries	to validate the	current	answer with this  key.
	      No chasing is done. When drill is	doing a	secure trace, this key
	      will be used as trust anchor. Can	 contain  a  DNSKEY  or	 a  DS

	      Alternatively,  when  DNSSEC  enabled tracing (-TD) or signature
	      chasing (-S), if -k is not specified, and	a default trust	anchor
	      (/etc/unbound/root.key) exists and contains a valid DNSKEY or DS
	      record, it will be used as the trust anchor.

       -o mnemonic
	      Use this option to set or	unset specific header bits. A  bit  is
	      set by using the bit mnemonic in CAPITAL letters.	A bit is unset
	      when the mnemonic	is given in lowercase. The following mnemonics
	      are understood by	drill:

		      QR, qr: set, unset QueRy (default: on)
		      AA, aa: set, unset Authoritative Answer (default:	off)
		      TC, tc: set, unset TrunCated (default: off)
		      RD, rd: set, unset Recursion Desired (default: on)
		      CD, cd: set, unset Checking Disabled  (default: off)
		      RA, ra: set, unset Recursion Available  (default:	off)
		      AD, ad: set, unset Authenticated Data (default: off)

	      Thus:  -o	CD, will enable	Checking Disabled, which instructs the
	      cache to not validate the	answers	it gives out.

       -p port
	      Use this port instead of the default of 53.

       -r file
	      When tracing (-T), use file as a root servers hint file.

       -s     When encountering	a DNSKEY print the equivalent DS also.

       -u     Use UDP when querying a server. This is the default.

       -w file
	      write the	answer to a file. The file will	contain	a  hexadecimal
	      dump of the query. This can be used in conjunction with -f.

       -x     Do a reverse loopup. The type argument is	not used, it is	preset
	      to PTR.

       -y _name:key[:algo]_
	      specify  named  base64  tsig  key,  and  optional	 an  algorithm
	      (defaults	to

       -z     don't randomize the nameserver list before sending queries.

	      The file from which trusted keys are loaded when no -k option is


       Jelte Jansen and	Miek Gieben. Both of NLnet Labs.

       Report bugs to <>.

       Copyright (c) 2004-2008 NLnet Labs.  Licensed  under  the  revised  BSD
       license.	 There is NO warranty; not even	for MERCHANTABILITY or FITNESS

       dig(1), RFC403{3,4,5}.

				  28 May 2006			      drill(1)


Want to link to this manual page? Use this URL:

home | help