unbound-control, unbound-control-setup - Unbound remote server
control utility.
unbound-control [
-hq] [
-c cfgfile] [
-s
server]
command
Unbound-control performs remote administration on the
unbound(8)
DNS server. It reads the configuration file, contacts the Unbound server over
SSL sends the command and displays the result.
The available options are:
- -h
- Show the version and commandline option help.
- -c cfgfile
- The config file to read with settings. If not given the
default config file /etc/unbound/unbound.conf is used.
- -s server[@port]
- IPv4 or IPv6 address of the server to contact. If not
given, the address is read from the config file.
- -q
- quiet, if the option is given it does not print anything if
it works ok.
There are several commands that the server understands.
- start
- Start the server. Simply execs unbound(8). The
Unbound executable is searched for in the PATH set in the
environment. It is started with the config file specified using -c
or the default config file.
- stop
- Stop the server. The server daemon exits.
- reload
- Reload the server. This flushes the cache and reads the
config file fresh.
- reload_keep_cache
- Reload the server but try to keep the RRset and message
cache if (re)configuration allows for it. That means the caches sizes and
the number of threads must not change between reloads.
- verbosity number
- Change verbosity value for logging. Same values as
verbosity keyword in unbound.conf(5). This new setting lasts
until the server is issued a reload (taken from config file again), or the
next verbosity control command.
- log_reopen
- Reopen the logfile, close and open it. Useful for
logrotation to make the daemon release the file it is logging to. If you
are using syslog it will attempt to close and open the syslog (which may
not work if chrooted).
- stats
- Print statistics. Resets the internal counters to zero,
this can be controlled using the statistics-cumulative config
statement. Statistics are printed with one [name]: [value] per line.
- stats_noreset
- Peek at statistics. Prints them like the stats
command does, but does not reset the internal counters to zero.
- status
- Display server status. Exit code 3 if not running (the
connection to the port is refused), 1 on error, 0 if running.
- local_zone name type
- Add new local zone with name and type. Like
local-zone config statement. If the zone already exists, the type
is changed to the given argument.
- local_zone_remove name
- Remove the local zone with the given name. Removes all
local data inside it. If the zone does not exist, the command
succeeds.
- local_data RR data...
- Add new local data, the given resource record. Like
local-data config statement, except for when no covering zone
exists. In that case this remote control command creates a transparent
zone with the same name as this record.
- local_data_remove name
- Remove all RR data from local name. If the name already has
no items, nothing happens. Often results in NXDOMAIN for the name (in a
static zone), but if the name has become an empty nonterminal (there is
still data in domain names below the removed name), NOERROR nodata answers
are the result for that name.
- local_zones
- Add local zones read from stdin of unbound-control. Input
is read per line, with name space type on a line. For bulk additions.
- local_zones_remove
- Remove local zones read from stdin of unbound-control.
Input is one name per line. For bulk removals.
- local_datas
- Add local data RRs read from stdin of unbound-control.
Input is one RR per line. For bulk additions.
- local_datas_remove
- Remove local data RRs read from stdin of unbound-control.
Input is one name per line. For bulk removals.
- dump_cache
- The contents of the cache is printed in a text format to
stdout. You can redirect it to a file to store the cache in a file.
- load_cache
- The contents of the cache is loaded from stdin. Uses the
same format as dump_cache uses. Loading the cache with old, or wrong data
can result in old or wrong data returned to clients. Loading data into the
cache in this way is supported in order to aid with debugging.
- lookup name
- Print to stdout the name servers that would be used to look
up the name specified.
- flush name
- Remove the name from the cache. Removes the types A, AAAA,
NS, SOA, CNAME, DNAME, MX, PTR, SRV, NAPTR, SVCB and HTTPS. Because that
is fast to do. Other record types can be removed using flush_type
or flush_zone.
- flush_type name type
- Remove the name, type information from the cache.
- flush_zone name
- Remove all information at or below the name from the cache.
The rrsets and key entries are removed so that new lookups will be
performed. This needs to walk and inspect the entire cache, and is a slow
operation. The entries are set to expired in the implementation of this
command (so, with serve-expired enabled, it'll serve that information but
schedule a prefetch for new information).
- flush_bogus
- Remove all bogus data from the cache.
- flush_negative
- Remove all negative data from the cache. This is nxdomain
answers, nodata answers and servfail answers. Also removes bad key entries
(which could be due to failed lookups) from the dnssec key cache, and
iterator last-resort lookup failures from the rrset cache.
- flush_stats
- Reset statistics to zero.
- flush_requestlist
- Drop the queries that are worked on. Stops working on the
queries that the server is working on now. The cache is unaffected. No
reply is sent for those queries, probably making those users request again
later. Useful to make the server restart working on queries with new
settings, such as a higher verbosity level.
- dump_requestlist
- Show what is worked on. Prints all queries that the server
is currently working on. Prints the time that users have been waiting. For
internal requests, no time is printed. And then prints out the module
status. This prints the queries from the first thread, and not queries
that are being serviced from other threads.
- flush_infra all|IP
- If all then entire infra cache is emptied. If a specific IP
address, the entry for that address is removed from the cache. It contains
EDNS, ping and lameness data.
- dump_infra
- Show the contents of the infra cache.
- set_option opt: val
- Set the option to the given value without a reload. The
cache is therefore not flushed. The option must end with a ':' and
whitespace must be between the option and the value. Some values may not
have an effect if set this way, the new values are not written to the
config file, not all options are supported. This is different from the
set_option call in libunbound, where all values work because Unbound has
not been initialized.
- The values that work are: statistics-interval,
statistics-cumulative, do-not-query-localhost, harden-short-bufsize,
harden-large-queries, harden-glue, harden-dnssec-stripped,
harden-below-nxdomain, harden-referral-path, prefetch, prefetch-key,
log-queries, hide-identity, hide-version, identity, version,
val-log-level, val-log-squelch, ignore-cd-flag, add-holddown,
del-holddown, keep-missing, tcp-upstream, ssl-upstream, max-udp-size,
ratelimit, ip-ratelimit, cache-max-ttl, cache-min-ttl,
cache-max-negative-ttl.
- get_option opt
- Get the value of the option. Give the option name without a
trailing ':'. The value is printed. If the value is "", nothing
is printed and the connection closes. On error 'error ...' is printed (it
gives a syntax error on unknown option). For some options a list of
values, one on each line, is printed. The options are shown from the
config file as modified with set_option. For some options an override may
have been taken that does not show up with this command, not results from
e.g. the verbosity and forward control commands. Not all options work, see
list_stubs, list_forwards, list_local_zones and list_local_data for
those.
- list_stubs
- List the stub zones in use. These are printed one by one to
the output. This includes the root hints in use.
- list_forwards
- List the forward zones in use. These are printed zone by
zone to the output.
- list_insecure
- List the zones with domain-insecure.
- list_local_zones
- List the local zones in use. These are printed one per line
with zone type.
- list_local_data
- List the local data RRs in use. The resource records are
printed.
- insecure_add zone
- Add a domain-insecure for the given zone, like the
statement in unbound.conf. Adds to the running Unbound without affecting
the cache contents (which may still be bogus, use flush_zone to
remove it), does not affect the config file.
- insecure_remove zone
- Removes domain-insecure for the given zone.
- forward_add [+i] zone addr ...
- Add a new forward zone to running Unbound. With +i option
also adds a domain-insecure for the zone (so it can resolve
insecurely if you have a DNSSEC root trust anchor configured for other
names). The addr can be IP4, IP6 or nameserver names, like
forward-zone config in unbound.conf.
- forward_remove [+i] zone
- Remove a forward zone from running Unbound. The +i also
removes a domain-insecure for the zone.
- stub_add [+ip] zone addr ...
- Add a new stub zone to running Unbound. With +i option also
adds a domain-insecure for the zone. With +p the stub zone is set
to prime, without it it is set to notprime. The addr can be IP4, IP6 or
nameserver names, like the stub-zone config in unbound.conf.
- stub_remove [+i] zone
- Remove a stub zone from running Unbound. The +i also
removes a domain-insecure for the zone.
- forward [off | addr ... ]
- Setup forwarding mode. Configures if the server should ask
other upstream nameservers, should go to the internet root nameservers
itself, or show the current config. You could pass the nameservers after a
DHCP update.
- Without arguments the current list of addresses used to
forward all queries to is printed. On startup this is from the
forward-zone "." configuration. Afterwards it shows the status.
It prints off when no forwarding is used.
- If off is passed, forwarding is disabled and the
root nameservers are used. This can be used to avoid to avoid buggy or
non-DNSSEC supporting nameservers returned from DHCP. But may not work in
hotels or hotspots.
- If one or more IPv4 or IPv6 addresses are given, those are
then used to forward queries to. The addresses must be separated with
spaces. With '@port' the port number can be set explicitly (default port
is 53 (DNS)).
- By default the forwarder information from the config file
for the root "." is used. The config file is not changed, so
after a reload these changes are gone. Other forward zones from the config
file are not affected by this command.
- ratelimit_list [+a]
- List the domains that are ratelimited. Printed one per line
with current estimated qps and qps limit from config. With +a it prints
all domains, not just the ratelimited domains, with their estimated qps.
The ratelimited domains return an error for uncached (new) queries, but
cached queries work as normal.
- ip_ratelimit_list [+a]
- List the ip addresses that are ratelimited. Printed one per
line with current estimated qps and qps limit from config. With +a it
prints all ips, not just the ratelimited ips, with their estimated qps.
The ratelimited ips are dropped before checking the cache.
- list_auth_zones
- List the auth zones that are configured. Printed one per
line with a status, indicating if the zone is expired and current serial
number. Configured RPZ zones are included.
- auth_zone_reload zone
- Reload the auth zone (or RPZ zone) from zonefile. The
zonefile is read in overwriting the current contents of the zone in
memory. This changes the auth zone contents itself, not the cache
contents. Such cache contents exists if you set Unbound to validate with
for-upstream yes and that can be cleared with flush_zone
zone.
- auth_zone_transfer zone
- Transfer the auth zone (or RPZ zone) from master. The auth
zone probe sequence is started, where the masters are probed to see if
they have an updated zone (with the SOA serial check). And then the zone
is transferred for a newer zone version.
- rpz_enable zone
- Enable the RPZ zone if it had previously been
disabled.
- rpz_disable zone
- Disable the RPZ zone.
- view_list_local_zones view
-
list_local_zones for given view.
- view_local_zone view name
type
-
local_zone for given view.
- view_local_zone_remove view name
-
local_zone_remove for given view.
- view_list_local_data view
-
list_local_data for given view.
- view_local_data view RR data...
-
local_data for given view.
- view_local_data_remove view name
-
local_data_remove for given view.
- view_local_datas_remove view
- Remove a list of local_data for given view from
stdin. Like local_datas_remove.
- view_local_datas view
- Add a list of local_data for given view from stdin.
Like local_datas.
The unbound-control program exits with status code 1 on error, 0 on success.
The setup requires a self-signed certificate and private keys for both the
server and client. The script
unbound-control-setup generates these in
the default run directory, or with -d in another directory. If you change the
access control permissions on the key files you can decide who can use
unbound-control, by default owner and group but not all users. Run the script
under the same username as you have configured in unbound.conf or as root, so
that the daemon is permitted to read the files, for example with:
sudo -u unbound unbound-control-setup
If you have not configured a username in unbound.conf, the keys need read
permission for the user credentials under which the daemon is started. The
script preserves private keys present in the directory. After running the
script as root, turn on
control-enable in
unbound.conf.
The
stats command shows a number of statistic counters.
- threadX.num.queries
- number of queries received by thread
- threadX.num.queries_ip_ratelimited
- number of queries rate limited by thread
- threadX.num.cachehits
- number of queries that were successfully answered using a
cache lookup
- threadX.num.cachemiss
- number of queries that needed recursive processing
- threadX.num.dnscrypt.crypted
- number of queries that were encrypted and successfully
decapsulated by dnscrypt.
- threadX.num.dnscrypt.cert
- number of queries that were requesting dnscrypt
certificates.
- threadX.num.dnscrypt.cleartext
- number of queries received on dnscrypt port that were
cleartext and not a request for certificates.
- threadX.num.dnscrypt.malformed
- number of request that were neither cleartext, not valid
dnscrypt messages.
- threadX.num.prefetch
- number of cache prefetches performed. This number is
included in cachehits, as the original query had the unprefetched answer
from cache, and resulted in recursive processing, taking a slot in the
requestlist. Not part of the recursivereplies (or the histogram thereof)
or cachemiss, as a cache response was sent.
- threadX.num.expired
- number of replies that served an expired cache entry.
- threadX.num.recursivereplies
- The number of replies sent to queries that needed recursive
processing. Could be smaller than threadX.num.cachemiss if due to timeouts
no replies were sent for some queries.
- threadX.requestlist.avg
- The average number of requests in the internal recursive
processing request list on insert of a new incoming recursive processing
query.
- threadX.requestlist.max
- Maximum size attained by the internal recursive processing
request list.
- threadX.requestlist.overwritten
- Number of requests in the request list that were
overwritten by newer entries. This happens if there is a flood of queries
that recursive processing and the server has a hard time.
- threadX.requestlist.exceeded
- Queries that were dropped because the request list was
full. This happens if a flood of queries need recursive processing, and
the server can not keep up.
- threadX.requestlist.current.all
- Current size of the request list, includes internally
generated queries (such as priming queries and glue lookups).
- threadX.requestlist.current.user
- Current size of the request list, only the requests from
client queries.
- threadX.recursion.time.avg
- Average time it took to answer queries that needed
recursive processing. Note that queries that were answered from the cache
are not in this average.
- threadX.recursion.time.median
- The median of the time it took to answer queries that
needed recursive processing. The median means that 50% of the user queries
were answered in less than this time. Because of big outliers (usually
queries to non responsive servers), the average can be bigger than the
median. This median has been calculated by interpolation from a
histogram.
- threadX.tcpusage
- The currently held tcp buffers for incoming connections. A
spot value on the time of the request. This helps you spot if the
incoming-num-tcp buffers are full.
- total.num.queries
- summed over threads.
- total.num.cachehits
- summed over threads.
- total.num.cachemiss
- summed over threads.
- total.num.dnscrypt.crypted
- summed over threads.
- total.num.dnscrypt.cert
- summed over threads.
- total.num.dnscrypt.cleartext
- summed over threads.
- total.num.dnscrypt.malformed
- summed over threads.
- total.num.prefetch
- summed over threads.
- total.num.expired
- summed over threads.
- total.num.recursivereplies
- summed over threads.
- total.requestlist.avg
- averaged over threads.
- total.requestlist.max
- the maximum of the thread requestlist.max values.
- total.requestlist.overwritten
- summed over threads.
- total.requestlist.exceeded
- summed over threads.
- total.requestlist.current.all
- summed over threads.
- total.recursion.time.median
- averaged over threads.
- total.tcpusage
- summed over threads.
- time.now
- current time in seconds since 1970.
- time.up
- uptime since server boot in seconds.
- time.elapsed
- time since last statistics printout, in seconds.
- mem.cache.rrset
- Memory in bytes in use by the RRset cache.
- mem.cache.message
- Memory in bytes in use by the message cache.
- mem.cache.dnscrypt_shared_secret
- Memory in bytes in use by the dnscrypt shared secrets
cache.
- mem.cache.dnscrypt_nonce
- Memory in bytes in use by the dnscrypt nonce cache.
- mem.mod.iterator
- Memory in bytes in use by the iterator module.
- mem.mod.validator
- Memory in bytes in use by the validator module. Includes
the key cache and negative cache.
- mem.streamwait
- Memory in bytes in used by the TCP and TLS stream wait
buffers. These are answers waiting to be written back to the clients.
- mem.http.query_buffer
- Memory in bytes used by the HTTP/2 query buffers.
Containing (partial) DNS queries waiting for request stream
completion.
- mem.http.response_buffer
- Memory in bytes used by the HTTP/2 response buffers.
Containing DNS responses waiting to be written back to the clients.
- histogram.<sec>.<usec>.to.<sec>.<usec>
- Shows a histogram, summed over all threads. Every element
counts the recursive queries whose reply time fit between the lower and
upper bound. Times larger or equal to the lowerbound, and smaller than the
upper bound. There are 40 buckets, with bucket sizes doubling.
- num.query.type.A
- The total number of queries over all threads with query
type A. Printed for the other query types as well, but only for the types
for which queries were received, thus =0 entries are omitted for
brevity.
- num.query.type.other
- Number of queries with query types 256-65535.
- num.query.class.IN
- The total number of queries over all threads with query
class IN (internet). Also printed for other classes (such as CH (CHAOS)
sometimes used for debugging), or NONE, ANY, used by dynamic update.
num.query.class.other is printed for classes 256-65535.
- num.query.opcode.QUERY
- The total number of queries over all threads with query
opcode QUERY. Also printed for other opcodes, UPDATE, ...
- num.query.tcp
- Number of queries that were made using TCP towards the
Unbound server.
- num.query.tcpout
- Number of queries that the Unbound server made using TCP
outgoing towards other servers.
- num.query.udpout
- Number of queries that the Unbound server made using UDP
outgoing towards other servers.
- num.query.tls
- Number of queries that were made using TLS towards the
Unbound server. These are also counted in num.query.tcp, because TLS uses
TCP.
- num.query.tls.resume
- Number of TLS session resumptions, these are queries over
TLS towards the Unbound server where the client negotiated a TLS session
resumption key.
- num.query.https
- Number of queries that were made using HTTPS towards the
Unbound server. These are also counted in num.query.tcp and num.query.tls,
because HTTPS uses TLS and TCP.
- num.query.ipv6
- Number of queries that were made using IPv6 towards the
Unbound server.
- num.query.flags.RD
- The number of queries that had the RD flag set in the
header. Also printed for flags QR, AA, TC, RA, Z, AD, CD. Note that
queries with flags QR, AA or TC may have been rejected because of
that.
- num.query.edns.present
- number of queries that had an EDNS OPT record present.
- num.query.edns.DO
- number of queries that had an EDNS OPT record with the DO
(DNSSEC OK) bit set. These queries are also included in the
num.query.edns.present number.
- num.query.ratelimited
- The number of queries that are turned away from being send
to nameserver due to ratelimiting.
- num.query.dnscrypt.shared_secret.cachemiss
- The number of dnscrypt queries that did not find a shared
secret in the cache. The can be use to compute the shared secret
hitrate.
- num.query.dnscrypt.replay
- The number of dnscrypt queries that found a nonce hit in
the nonce cache and hence are considered a query replay.
- num.answer.rcode.NXDOMAIN
- The number of answers to queries, from cache or from
recursion, that had the return code NXDOMAIN. Also printed for the other
return codes.
- num.answer.rcode.nodata
- The number of answers to queries that had the pseudo return
code nodata. This means the actual return code was NOERROR, but
additionally, no data was carried in the answer (making what is called a
NOERROR/NODATA answer). These queries are also included in the
num.answer.rcode.NOERROR number. Common for AAAA lookups when an A record
exists, and no AAAA.
- num.answer.secure
- Number of answers that were secure. The answer validated
correctly. The AD bit might have been set in some of these answers, where
the client signalled (with DO or AD bit in the query) that they were ready
to accept the AD bit in the answer.
- num.answer.bogus
- Number of answers that were bogus. These answers resulted
in SERVFAIL to the client because the answer failed validation.
- num.rrset.bogus
- The number of rrsets marked bogus by the validator.
Increased for every RRset inspection that fails.
- unwanted.queries
- Number of queries that were refused or dropped because they
failed the access control settings.
- unwanted.replies
- Replies that were unwanted or unsolicited. Could have been
random traffic, delayed duplicates, very late answers, or could be
spoofing attempts. Some low level of late answers and delayed duplicates
are to be expected with the UDP protocol. Very high values could indicate
a threat (spoofing).
- msg.cache.count
- The number of items (DNS replies) in the message
cache.
- rrset.cache.count
- The number of RRsets in the rrset cache. This includes
rrsets used by the messages in the message cache, but also delegation
information.
- infra.cache.count
- The number of items in the infra cache. These are IP
addresses with their timing and protocol support information.
- key.cache.count
- The number of items in the key cache. These are DNSSEC
keys, one item per delegation point, and their validation status.
- dnscrypt_shared_secret.cache.count
- The number of items in the shared secret cache. These are
precomputed shared secrets for a given client public key/server secret key
pair. Shared secrets are CPU intensive and this cache allows Unbound to
avoid recomputing the shared secret when multiple dnscrypt queries are
sent from the same client.
- dnscrypt_nonce.cache.count
- The number of items in the client nonce cache. This cache
is used to prevent dnscrypt queries replay. The client nonce must be
unique for each client public key/server secret key pair. This cache
should be able to host QPS * `replay window` interval keys to prevent
replay of a query during `replay window` seconds.
- num.query.authzone.up
- The number of queries answered from auth-zone data,
upstream queries. These queries would otherwise have been sent (with
fallback enabled) to the internet, but are now answered from the auth
zone.
- num.query.authzone.down
- The number of queries for downstream answered from
auth-zone data. These queries are from downstream clients, and have had an
answer from the data in the auth zone.
- num.query.aggressive.NOERROR
- The number of queries answered using cached NSEC records
with NODATA RCODE. These queries would otherwise have been sent to the
internet, but are now answered using cached data.
- num.query.aggressive.NXDOMAIN
- The number of queries answered using cached NSEC records
with NXDOMAIN RCODE. These queries would otherwise have been sent to the
internet, but are now answered using cached data.
- num.query.subnet
- Number of queries that got an answer that contained EDNS
client subnet data.
- num.query.subnet_cache
- Number of queries answered from the edns client subnet
cache. These are counted as cachemiss by the main counters, but hit the
client subnet specific cache, after getting processed by the edns client
subnet module.
- num.rpz.action.<rpz_action>
- Number of queries answered using configured RPZ policy, per
RPZ action type. Possible actions are: nxdomain, nodata, passthru, drop,
tcp-only, local-data, disabled, and cname-override.
- /etc/unbound/unbound.conf
- Unbound configuration file.
- /etc/unbound
- directory with private keys (unbound_server.key and
unbound_control.key) and self-signed certificates (unbound_server.pem and
unbound_control.pem).
unbound.conf(5),
unbound(8).