BIND (Berkeley Internet Name Domain) is a complete, highly portable implementation of the DNS (Domain Name System) protocol.
The BIND name server,
named, is able to serve as an authoritative name server, recursive resolver, DNS forwarder, or all three simultaneously. It implements views for split-horizon DNS, automatic DNSSEC zone signing and key management, catalog zones to facilitate provisioning of zone data throughout a name server constellation, response policy zones (RPZ) to protect clients from malicious data, response rate limiting (RRL) and recursive query limits to reduce distributed denial of service attacks, and many other advanced DNS features. BIND also includes a suite of administrative tools, including the
delv DNS lookup tools,
nsupdate for dynamic DNS zone updates,
rndc for remote name server administration, and more.
BIND 9 began as a complete re-write of the BIND architecture that was used in versions 4 and 8. Internet Systems Consortium (https://www.isc.org), a 501(c)(3) public benefit corporation dedicated to providing software and services in support of the Internet infrastructure, developed BIND 9 and is responsible for its ongoing maintenance and improvement. BIND is open source software licensed under the terms of the Mozilla Public License, version 2.0.
For a summary of features introduced in past major releases of BIND, see the file HISTORY.
For a detailed list of changes made throughout the history of BIND 9, see the file CHANGES. See below for details on the CHANGES file format.
For up-to-date versions and release notes, see https://www.isc.org/download/.
For information about supported platforms, see PLATFORMS.
To report non-security-sensitive bugs or request new features, you may open an Issue in the BIND 9 project on the ISC GitLab server at https://gitlab.isc.org/isc-projects/bind9.
Please note that, unless you explicitly mark the newly created Issue as “confidential”, it will be publicly readable. Please do not include any information in bug reports that you consider to be confidential unless the issue has been marked as such. In particular, if submitting the contents of your configuration file in a non-confidential Issue, it is advisable to obscure key secrets: this can be done automatically by using
If the bug you are reporting is a potential security issue, such as an assertion failure or other crash in
named, please do NOT use GitLab to report it. Instead, send mail to firstname.lastname@example.org using our OpenPGP key to secure your message. (Information about OpenPGP and links to our key can be found at https://www.isc.org/pgpkey.) Please do not discuss the bug on any public mailing list.
For a general overview of ISC security policies, read the Knowledge Base article at https://kb.isc.org/docs/aa-00861.
Professional support and training for BIND are available from ISC at https://www.isc.org/support.
To join the BIND Users mailing list, or view the archives, visit https://lists.isc.org/mailman/listinfo/bind-users.
If you’re planning on making changes to the BIND 9 source code, you may also want to join the BIND Workers mailing list, at https://lists.isc.org/mailman/listinfo/bind-workers.
ISC maintains a public git repository for BIND; details can be found at http://www.isc.org/git/.
Information for BIND contributors can be found in the following files: - General information: CONTRIBUTING.md - Code of Conduct: CODE_OF_CONDUCT.md - BIND 9 code style: doc/dev/style.md - BIND architecture and developer guide: doc/dev/dev.md
Patches for BIND may be submitted as merge requests in the ISC GitLab server at at https://gitlab.isc.org/isc-projects/bind9/merge_requests.
By default, external contributors don’t have ability to fork BIND in the GitLab server, but if you wish to contribute code to BIND, you may request permission to do so. Thereafter, you can create git branches and directly submit requests that they be reviewed and merged.
If you prefer, you may also submit code by opening a GitLab Issue and including your patch as an attachment, preferably generated by
BIND 9.16 is the current stable branch of BIND 9. It includes all changes from the 9.15 development branch, updating the previous stable branch, 9.14. New features include:
dnssec-policystatement to configure a key and signing policy for zones, enabling automatic key regeneration and rollover.
trust-anchorsstatement, permitting configuration of trust anchors in DS as well as DNSKEY format.
Minimally, BIND requires a UNIX or Linux system with an ANSI C compiler, basic POSIX support, and a 64-bit integer type. BIND also requires the
libuv asynchronous I/O library, and a cryptography provider library such as OpenSSL or a hardware service module supporting PKCS#11. On Linux, BIND requires the
libcap library to set process privileges, though this requirement can be overridden by disabling capability support at compile time. See Compile-time options below for details on other libraries that may be required to support optional features.
Successful builds have been observed on many versions of Linux and UNIX, including RHEL/CentOS, Fedora, Debian, Ubuntu, SLES, openSUSE, Slackware, Alpine, FreeBSD, NetBSD, OpenBSD, macOS, Solaris, OpenIndiana, OmniOS CE, HP-UX, and OpenWRT.
BIND is also available for Windows Server 2012 R2 and higher. See
win32utils/build.txt for details on building for Windows systems.
To build on a UNIX or Linux system, use:
$ ./configure $ make
If you’re planning on making changes to the BIND 9 source, you should run
make depend. If you’re using Emacs, you might find
make tags helpful.
Several environment variables that can be set before running
configure will affect compilation. Significant ones are:
||The C compiler to use.
||C compiler flags. Defaults to include -g and/or -O2 as supported by the compiler. Please include ‘-g’ if you need to set
||System header file directories. Can be used to specify where add-on thread or IPv6 support is, for example. Defaults to empty string.|
||Any additional preprocessor symbols you want defined. Defaults to empty string. For a list of possible settings, see the file OPTIONS.|
||Linker flags. Defaults to empty string.|
||Needed when cross-compiling: the native C compiler to use when building for the target system.|
Additional environment variables affecting the build are listed at the end of the
configure help text, which can be obtained by running the command:
$ ./configure --help
Building on macOS assumes that the “Command Tools for Xcode” is installed. This can be downloaded from https://developer.apple.com/download/more/ or, if you have Xcode already installed, you can run
xcode-select --install. (Note that an Apple ID may be required to access the download page.)
Portions of BIND that are written in Python, including
dnssec-checkds, and some of the system tests, require the
distutils.core modules to be available.
argparse is a standard module as of Python 2.7 and Python 3.2.
ply is available from https://pypi.python.org/pypi/ply.
distutils.core is required for installation.
To see a full list of configuration options, run
To build shared libraries, specify
--with-libtool on the
configure command line.
For the server to support DNSSEC, you need to build it with crypto support. To use OpenSSL, you should have OpenSSL 1.0.2e or newer installed. If the OpenSSL library is installed in a nonstandard location, specify the prefix using
--with-openssl=<PREFIX> on the configure command line. To use a PKCS#11 hardware service module for cryptographic operations, specify the path to the PKCS#11 provider library using
--with-pkcs11=<PREFIX>, and configure BIND with
To support the HTTP statistics channel, the server must be linked with at least one of the following libraries:
libxml2 http://xmlsoft.org or
json-c https://github.com/json-c/json-c. If these are installed at a nonstandard location, then:
libxml2, specify the prefix using
To support compression on the HTTP statistics channel, the server must be linked against
libzlib. If this is installed in a nonstandard location, specify the prefix using
To support storing configuration data for runtime-added zones in an LMDB database, the server must be linked with liblmdb. If this is installed in a nonstandard location, specify the prefix using
To support MaxMind GeoIP2 location-based ACLs, the server must be linked with
libmaxminddb. This is turned on by default if the library is found; if the library is installed in a nonstandard location, specify the prefix using
--with-maxminddb=/prefix. GeoIP2 support can be switched off with
For DNSTAP packet logging, you must have installed
libfstrm https://github.com/farsightsec/fstrm and
libprotobuf-c https://developers.google.com/protocol-buffers, and BIND must be configured with
Certain compiled-in constants and default settings can be decreased to values better suited to small machines, e.g. OpenWRT boxes, by specifying
--with-tuning=small on the
configure command line. This will decrease memory usage by using smaller structures, but will degrade performance.
On Linux, process capabilities are managed in user space using the
libcap library, which can be installed on most Linux systems via the
libcap-devel package. Process capability support can also be disabled by configuring with
On some platforms it is necessary to explicitly request large file support to handle files bigger than 2GB. This can be done by using
--enable-largefile on the
configure command line.
Support for the “fixed” rrset-order option can be enabled or disabled by specifying
--disable-fixed-rrset on the configure command line. By default, fixed rrset-order is disabled to reduce memory footprint.
--enable-querytrace option causes
named to log every step of processing every query. This should only be enabled when debugging, because it has a significant negative impact on query performance.
make install will install
named and the various BIND 9 libraries. By default, installation is into /usr/local, but this can be changed with the
--prefix option when running
You may specify the option
--sysconfdir to set the directory where configuration files like
named.conf go by default, and
--localstatedir to set the default parent directory of
--sysconfdir defaults to
--localstatedir defaults to
A system test suite can be run with
make test. The system tests require you to configure a set of virtual IP addresses on your system (this allows multiple servers to run locally and communicate with one another). These IP addresses can be configured by running the command
bin/tests/system/ifconfig.sh up as root.
Some tests require Perl and the
IO::Socket::INET6 modules, and will be skipped if these are not available. Some tests require Python and the
dnspython module and will be skipped if these are not available. See bin/tests/system/README for further details.
Unit tests are implemented using the CMocka unit testing framework. To build them, use
configure --with-cmocka. Execution of tests is done by the Kyua test execution engine; if the
kyua command is available, then unit tests can be run via
make test or
The BIND 9 Administrator Reference Manual is included with the source distribution, in DocBook XML, HTML, and PDF format, in the
Some of the programs in the BIND 9 distribution have man pages in their directories. In particular, the command line options of
named are documented in
Frequently (and not-so-frequently) asked questions and their answers can be found in the ISC Knowledge Base at https://kb.isc.org.
Additional information on various subjects can be found in other
README files throughout the source tree.
A detailed list of all changes that have been made throughout the development BIND 9 is included in the file CHANGES, with the most recent changes listed first. Change notes include tags indicating the category of the change that was made; these categories are:
|[bug]||General bug fix|
|[security]||Fix for a significant security flaw|
|[experimental]||Used for new features when the syntax or other aspects of the design are still in flux and may change|
|[maint]||Updates to built-in data such as root server addresses and keys|
|[tuning]||Changes to built-in configuration defaults and constants to improve performance|
|[performance]||Other changes to improve server performance|
|[protocol]||Updates to the DNS protocol such as new RR types|
|[test]||Changes to the automatic tests, not affecting server functionality|
|[cleanup]||Minor corrections and refactoring|
|[contrib]||Changes to the contributed tools and libraries in the ‘contrib’ subdirectory|
|[placeholder]||Used in the main development branch to reserve change numbers for use in other branches, e.g., when fixing a bug that only exists in older releases|
In general, [func] and [experimental] tags will only appear in new-feature releases (i.e., those with version numbers ending in zero). Some new functionality may be backported to older releases on a case-by-case basis. All other change types may be applied to all currently-supported releases.
Most notes in the CHANGES file include a reference to a bug report or issue number. Prior to 2018, these were usually of the form
[RT #NNN] and referred to entries in the “bind9-bugs” RT database, which was not open to the public. More recent entries use the form
[GL #NNN] or, less often,
[GL !NNN], which, respectively, refer to issues or merge requests in the GitLab database. Most of these are publicly readable, unless they include information which is confidential or security sensitive.
To look up a GitLab issue by its number, use the URL https://gitlab.isc.org/isc-projects/bind9/issues/NNN. To look up a merge request, use https://gitlab.isc.org/isc-projects/bind9/merge_requests/NNN.
In rare cases, an issue or merge request number may be followed with the letter “P”. This indicates that the information is in the private ISC GitLab instance, which is not visible to the public.
The original development of BIND 9 was underwritten by the following organizations:
Sun Microsystems, Inc. Hewlett Packard Compaq Computer Corporation IBM Process Software Corporation Silicon Graphics, Inc. Network Associates, Inc. U.S. Defense Information Systems Agency USENIX Association Stichting NLnet - NLnet Foundation Nominum, Inc.
This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. http://www.OpenSSL.org/
This product includes cryptographic software written by Eric Young (email@example.com)
This product includes software written by Tim Hudson (firstname.lastname@example.org)