Bv9ARM.ch04.html revision bd84b04e4fda4f41923bba6e7277546d87045b5a
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov - Copyright (C) 2004-2015 Internet Systems Consortium, Inc. ("ISC")
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov - Copyright (C) 2000-2003 Internet Software Consortium.
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov - Permission to use, copy, modify, and/or distribute this software for any
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov - purpose with or without fee is hereby granted, provided that the above
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov - copyright notice and this permission notice appear in all copies.
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov - THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov - REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov - AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov - INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov - LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov - PERFORMANCE OF THIS SOFTWARE.
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
6398f22526303343193a18e514602f1af6fb29cbNikolai Kondrashov<title>Chapter�4.�Advanced DNS Features</title>
6398f22526303343193a18e514602f1af6fb29cbNikolai Kondrashov<meta name="generator" content="DocBook XSL Stylesheets V1.71.1">
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<link rel="start" href="Bv9ARM.html" title="BIND 9 Administrator Reference Manual">
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<link rel="up" href="Bv9ARM.html" title="BIND 9 Administrator Reference Manual">
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<link rel="prev" href="Bv9ARM.ch03.html" title="Chapter�3.�Name Server Configuration">
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<link rel="next" href="Bv9ARM.ch05.html" title="Chapter�5.�The BIND 9 Lightweight Resolver">
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF">
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<table width="100%" summary="Navigation header">
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<tr><th colspan="3" align="center">Chapter�4.�Advanced DNS Features</th></tr>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<a accesskey="p" href="Bv9ARM.ch03.html">Prev</a>�</td>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<td width="20%" align="right">�<a accesskey="n" href="Bv9ARM.ch05.html">Next</a>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<div class="titlepage"><div><div><h2 class="title">
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<a name="Bv9ARM.ch04"></a>Chapter�4.�Advanced DNS Features</h2></div></div></div>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<dt><span class="sect1"><a href="Bv9ARM.ch04.html#notify">Notify</a></span></dt>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<dt><span class="sect1"><a href="Bv9ARM.ch04.html#dynamic_update">Dynamic Update</a></span></dt>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<dd><dl><dt><span class="sect2"><a href="Bv9ARM.ch04.html#journal">The journal file</a></span></dt></dl></dd>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<dt><span class="sect1"><a href="Bv9ARM.ch04.html#incremental_zone_transfers">Incremental Zone Transfers (IXFR)</a></span></dt>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<dt><span class="sect1"><a href="Bv9ARM.ch04.html#id2569920">Split DNS</a></span></dt>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<dd><dl><dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2569938">Example split DNS setup</a></span></dt></dl></dd>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<dt><span class="sect1"><a href="Bv9ARM.ch04.html#tsig">TSIG</a></span></dt>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2570439">Generate Shared Keys for Each Pair of Hosts</a></span></dt>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2570581">Copying the Shared Secret to Both Machines</a></span></dt>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2570592">Informing the Servers of the Key's Existence</a></span></dt>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2570628">Instructing the Server to Use the Key</a></span></dt>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2570685">TSIG Key Based Access Control</a></span></dt>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2570734">Errors</a></span></dt>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<dt><span class="sect1"><a href="Bv9ARM.ch04.html#id2570748">TKEY</a></span></dt>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<dt><span class="sect1"><a href="Bv9ARM.ch04.html#id2570797">SIG(0)</a></span></dt>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<dt><span class="sect1"><a href="Bv9ARM.ch04.html#DNSSEC">DNSSEC</a></span></dt>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2570934">Generating Keys</a></span></dt>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2571218">Signing the Zone</a></span></dt>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2571299">Configuring Servers</a></span></dt>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<dt><span class="sect1"><a href="Bv9ARM.ch04.html#dnssec.dynamic.zones">DNSSEC, Dynamic Zones, and Automatic Signing</a></span></dt>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2612846">Converting from insecure to secure</a></span></dt>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2612884">Dynamic DNS update method</a></span></dt>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2563632">Fully automatic zone signing</a></span></dt>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2563742">Private-type records</a></span></dt>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2563780">DNSKEY rollovers</a></span></dt>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2563793">Dynamic DNS update method</a></span></dt>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2563962">Automatic key rollovers</a></span></dt>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2563989">NSEC3PARAM rollovers via UPDATE</a></span></dt>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2563998">Converting from NSEC to NSEC3</a></span></dt>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2564008">Converting from NSEC3 to NSEC</a></span></dt>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2564021">Converting from secure to insecure</a></span></dt>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2573752">Periodic re-signing</a></span></dt>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2573766">NSEC3 and OPTOUT</a></span></dt>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<dt><span class="sect1"><a href="Bv9ARM.ch04.html#rfc5011.support">Dynamic Trust Anchor Management</a></span></dt>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2573789">Validating Resolver</a></span></dt>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2573812">Authoritative Server</a></span></dt>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<dt><span class="sect1"><a href="Bv9ARM.ch04.html#pkcs11">PKCS#11 (Cryptoki) support</a></span></dt>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2667716">Prerequisites</a></span></dt>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2612429">Native PKCS#11</a></span></dt>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2613258">OpenSSL-based PKCS#11</a></span></dt>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2640165">PKCS#11 Tools</a></span></dt>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2640201">Using the HSM</a></span></dt>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2640487">Specifying the engine on the command line</a></span></dt>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2640535">Running named with automatic zone re-signing</a></span></dt>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<dt><span class="sect1"><a href="Bv9ARM.ch04.html#dlz-info">DLZ (Dynamically Loadable Zones)</a></span></dt>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2612502">Configuring DLZ</a></span></dt>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2612780">Sample DLZ Driver</a></span></dt>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<dt><span class="sect1"><a href="Bv9ARM.ch04.html#id2571523">IPv6 Support in <acronym class="acronym">BIND</acronym> 9</a></span></dt>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2571789">Address Lookups Using AAAA Records</a></span></dt>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2571811">Address to Name Lookups Using Nibble Format</a></span></dt>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<div class="titlepage"><div><div><h2 class="title" style="clear: both">
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<a name="notify"></a>Notify</h2></div></div></div>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov <acronym class="acronym">DNS</acronym> NOTIFY is a mechanism that allows master
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov servers to notify their slave servers of changes to a zone's data. In
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov response to a <span><strong class="command">NOTIFY</strong></span> from a master server, the
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov slave will check to see that its version of the zone is the
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov current version and, if not, initiate a zone transfer.
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov For more information about <acronym class="acronym">DNS</acronym>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov <span><strong class="command">NOTIFY</strong></span>, see the description of the
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov <span><strong class="command">notify</strong></span> option in <a href="Bv9ARM.ch06.html#boolean_options" title="Boolean Options">the section called “Boolean Options”</a> and
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov the description of the zone option <span><strong class="command">also-notify</strong></span> in
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov <a href="Bv9ARM.ch06.html#zone_transfers" title="Zone Transfers">the section called “Zone Transfers”</a>. The <span><strong class="command">NOTIFY</strong></span>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov protocol is specified in RFC 1996.
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<div class="note" style="margin-left: 0.5in; margin-right: 0.5in;">
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov As a slave zone can also be a master to other slaves, <span><strong class="command">named</strong></span>,
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov by default, sends <span><strong class="command">NOTIFY</strong></span> messages for every zone
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov it loads. Specifying <span><strong class="command">notify master-only;</strong></span> will
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov cause <span><strong class="command">named</strong></span> to only send <span><strong class="command">NOTIFY</strong></span> for master
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov zones that it loads.
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<div class="titlepage"><div><div><h2 class="title" style="clear: both">
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<a name="dynamic_update"></a>Dynamic Update</h2></div></div></div>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov Dynamic Update is a method for adding, replacing or deleting
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov records in a master server by sending it a special form of DNS
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov messages. The format and meaning of these messages is specified
8ef1a136c1406bd1bab66e4ebf75b9375090cd86Nikolai Kondrashov Dynamic update is enabled by including an
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov <span><strong class="command">allow-update</strong></span> or an <span><strong class="command">update-policy</strong></span>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov clause in the <span><strong class="command">zone</strong></span> statement.
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov If the zone's <span><strong class="command">update-policy</strong></span> is set to
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov <strong class="userinput"><code>local</code></strong>, updates to the zone
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov will be permitted for the key <code class="varname">local-ddns</code>,
3e2f89726a90dfe091d7d7d3b558d97469e5d3afLukas Slebodnik which will be generated by <span><strong class="command">named</strong></span> at startup.
3e2f89726a90dfe091d7d7d3b558d97469e5d3afLukas Slebodnik See <a href="Bv9ARM.ch06.html#dynamic_update_policies" title="Dynamic Update Policies">the section called “Dynamic Update Policies”</a> for more details.
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov Dynamic updates using Kerberos signed requests can be made
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov using the TKEY/GSS protocol by setting either the
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov <span><strong class="command">tkey-gssapi-keytab</strong></span> option, or alternatively
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov by setting both the <span><strong class="command">tkey-gssapi-credential</strong></span>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov and <span><strong class="command">tkey-domain</strong></span> options. Once enabled,
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov Kerberos signed requests will be matched against the update
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov policies for the zone, using the Kerberos principal as the
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov signer for the request.
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov Updating of secure zones (zones using DNSSEC) follows RFC
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov 3007: RRSIG, NSEC and NSEC3 records affected by updates are
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov automatically regenerated by the server using an online
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov zone key. Update authorization is based on transaction
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov signatures and an explicit server policy.
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<div class="titlepage"><div><div><h3 class="title">
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<a name="journal"></a>The journal file</h3></div></div></div>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov All changes made to a zone using dynamic update are stored
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov in the zone's journal file. This file is automatically created
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov by the server when the first dynamic update takes place.
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov The name of the journal file is formed by appending the extension
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov <code class="filename">.jnl</code> to the name of the
8dff4a773dd9525ec587cd31646a9f67252122c1Nikolai Kondrashov corresponding zone
8dff4a773dd9525ec587cd31646a9f67252122c1Nikolai Kondrashov file unless specifically overridden. The journal file is in a
8dff4a773dd9525ec587cd31646a9f67252122c1Nikolai Kondrashov binary format and should not be edited manually.
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov The server will also occasionally write ("dump")
9d453f1e8b28983b363b44c49b7cd701a994fd97Nikolai Kondrashov the complete contents of the updated zone to its zone file.
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov This is not done immediately after
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov each dynamic update, because that would be too slow when a large
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov zone is updated frequently. Instead, the dump is delayed by
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov up to 15 minutes, allowing additional updates to take place.
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov During the dump process, transient files will be created
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov with the extensions <code class="filename">.jnw</code> and
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov <code class="filename">.jbk</code>; under ordinary circumstances, these
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov will be removed when the dump is complete, and can be safely
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov When a server is restarted after a shutdown or crash, it will replay
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov the journal file to incorporate into the zone any updates that
444a82bd6d68c6f23e05d523ff92d328f6b2ec05Lukas Slebodnik place after the last zone dump.
444a82bd6d68c6f23e05d523ff92d328f6b2ec05Lukas Slebodnik Changes that result from incoming incremental zone transfers are
444a82bd6d68c6f23e05d523ff92d328f6b2ec05Lukas Slebodnik journalled in a similar way.
444a82bd6d68c6f23e05d523ff92d328f6b2ec05Lukas Slebodnik The zone files of dynamic zones cannot normally be edited by
444a82bd6d68c6f23e05d523ff92d328f6b2ec05Lukas Slebodnik hand because they are not guaranteed to contain the most recent
444a82bd6d68c6f23e05d523ff92d328f6b2ec05Lukas Slebodnik dynamic changes — those are only in the journal file.
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov The only way to ensure that the zone file of a dynamic zone
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov is up to date is to run <span><strong class="command">rndc stop</strong></span>.
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov If you have to make changes to a dynamic zone
9d453f1e8b28983b363b44c49b7cd701a994fd97Nikolai Kondrashov manually, the following procedure will work:
9d453f1e8b28983b363b44c49b7cd701a994fd97Nikolai Kondrashov Disable dynamic updates to the zone using
9d453f1e8b28983b363b44c49b7cd701a994fd97Nikolai Kondrashov <span><strong class="command">rndc freeze <em class="replaceable"><code>zone</code></em></strong></span>.
9d453f1e8b28983b363b44c49b7cd701a994fd97Nikolai Kondrashov This will update the zone's master file with the changes
9d453f1e8b28983b363b44c49b7cd701a994fd97Nikolai Kondrashov stored in its <code class="filename">.jnl</code> file.
9d453f1e8b28983b363b44c49b7cd701a994fd97Nikolai Kondrashov Edit the zone file. Run
9d453f1e8b28983b363b44c49b7cd701a994fd97Nikolai Kondrashov <span><strong class="command">rndc thaw <em class="replaceable"><code>zone</code></em></strong></span>
9d453f1e8b28983b363b44c49b7cd701a994fd97Nikolai Kondrashov to reload the changed zone and re-enable dynamic updates.
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov <span><strong class="command">rndc sync <em class="replaceable"><code>zone</code></em></strong></span>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov will update the zone file with changes from the journal file
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov without stopping dynamic updates; this may be useful for viewing
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov the current zone state. To remove the <code class="filename">.jnl</code>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov file after updating the zone file, use
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov <span><strong class="command">rndc sync -clean</strong></span>.
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<div class="titlepage"><div><div><h2 class="title" style="clear: both">
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<a name="incremental_zone_transfers"></a>Incremental Zone Transfers (IXFR)</h2></div></div></div>
3e2f89726a90dfe091d7d7d3b558d97469e5d3afLukas Slebodnik The incremental zone transfer (IXFR) protocol is a way for
3e2f89726a90dfe091d7d7d3b558d97469e5d3afLukas Slebodnik slave servers to transfer only changed data, instead of having to
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov transfer the entire zone. The IXFR protocol is specified in RFC
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov 1995. See <a href="Bv9ARM.ch11.html#proposed_standards">Proposed Standards</a>.
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov When acting as a master, <acronym class="acronym">BIND</acronym> 9
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov supports IXFR for those zones
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov where the necessary change history information is available. These
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov include master zones maintained by dynamic update and slave zones
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov whose data was obtained by IXFR. For manually maintained master
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov zones, and for slave zones obtained by performing a full zone
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov transfer (AXFR), IXFR is supported only if the option
057f699b401097ad7f48fe3760e81c6993619a4bLukas Slebodnik <span><strong class="command">ixfr-from-differences</strong></span> is set
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov to <strong class="userinput"><code>yes</code></strong>.
057f699b401097ad7f48fe3760e81c6993619a4bLukas Slebodnik When acting as a slave, <acronym class="acronym">BIND</acronym> 9 will
057f699b401097ad7f48fe3760e81c6993619a4bLukas Slebodnik attempt to use IXFR unless
057f699b401097ad7f48fe3760e81c6993619a4bLukas Slebodnik it is explicitly disabled. For more information about disabling
057f699b401097ad7f48fe3760e81c6993619a4bLukas Slebodnik IXFR, see the description of the <span><strong class="command">request-ixfr</strong></span> clause
057f699b401097ad7f48fe3760e81c6993619a4bLukas Slebodnik of the <span><strong class="command">server</strong></span> statement.
057f699b401097ad7f48fe3760e81c6993619a4bLukas Slebodnik<div class="titlepage"><div><div><h2 class="title" style="clear: both">
057f699b401097ad7f48fe3760e81c6993619a4bLukas Slebodnik<a name="id2569920"></a>Split DNS</h2></div></div></div>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov Setting up different views, or visibility, of the DNS space to
e373fffbb8e06d0d7682d095c734e8df8a499ba0Nikolai Kondrashov internal and external resolvers is usually referred to as a
e373fffbb8e06d0d7682d095c734e8df8a499ba0Nikolai Kondrashov <span class="emphasis"><em>Split DNS</em></span> setup. There are several
e373fffbb8e06d0d7682d095c734e8df8a499ba0Nikolai Kondrashov reasons an organization would want to set up its DNS this way.
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov One common reason for setting up a DNS system this way is
444a82bd6d68c6f23e05d523ff92d328f6b2ec05Lukas Slebodnik to hide "internal" DNS information from "external" clients on the
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov Internet. There is some debate as to whether or not this is actually
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov Internal DNS information leaks out in many ways (via email headers,
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov for example) and most savvy "attackers" can find the information
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov they need using other means.
8d1b572126afceb60693ff4c4a734bd6dbdaf548Nikolai Kondrashov However, since listing addresses of internal servers that
8d1b572126afceb60693ff4c4a734bd6dbdaf548Nikolai Kondrashov external clients cannot possibly reach can result in
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov connection delays and other annoyances, an organization may
8d1b572126afceb60693ff4c4a734bd6dbdaf548Nikolai Kondrashov choose to use a Split DNS to present a consistent view of itself
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov to the outside world.
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov Another common reason for setting up a Split DNS system is
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov to allow internal networks that are behind filters or in RFC 1918
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov space (reserved IP space, as documented in RFC 1918) to resolve DNS
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov on the Internet. Split DNS can also be used to allow mail from outside
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov back in to the internal network.
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<div class="titlepage"><div><div><h3 class="title">
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<a name="id2569938"></a>Example split DNS setup</h3></div></div></div>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov Let's say a company named <span class="emphasis"><em>Example, Inc.</em></span>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov (<code class="literal">example.com</code>)
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov has several corporate sites that have an internal network with
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov Internet Protocol (IP) space and an external demilitarized zone (DMZ),
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov or "outside" section of a network, that is available to the public.
933c7c5efc76b4a9f3206b36bf6fe60e5dd635f1Nikolai Kondrashov <span class="emphasis"><em>Example, Inc.</em></span> wants its internal clients
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov to be able to resolve external hostnames and to exchange mail with
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov people on the outside. The company also wants its internal resolvers
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov to have access to certain internal-only zones that are not available
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov at all outside of the internal network.
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov In order to accomplish this, the company will set up two sets
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov of name servers. One set will be on the inside network (in the
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov IP space) and the other set will be on bastion hosts, which are
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov hosts that can talk to both sides of its network, in the DMZ.
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov The internal servers will be configured to forward all queries,
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov except queries for <code class="filename">site1.internal</code>, <code class="filename">site2.internal</code>, <code class="filename">site1.example.com</code>,
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov and <code class="filename">site2.example.com</code>, to the servers
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov DMZ. These internal servers will have complete sets of information
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov for <code class="filename">site1.example.com</code>, <code class="filename">site2.example.com</code>, <code class="filename">site1.internal</code>,
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov and <code class="filename">site2.internal</code>.
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov To protect the <code class="filename">site1.internal</code> and <code class="filename">site2.internal</code> domains,
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov the internal name servers must be configured to disallow all queries
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov to these domains from any external hosts, including the bastion
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov The external servers, which are on the bastion hosts, will
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov be configured to serve the "public" version of the <code class="filename">site1</code> and <code class="filename">site2.example.com</code> zones.
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov This could include things such as the host records for public servers
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov (<code class="filename">www.example.com</code> and <code class="filename">ftp.example.com</code>),
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov and mail exchange (MX) records (<code class="filename">a.mx.example.com</code> and <code class="filename">b.mx.example.com</code>).
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov In addition, the public <code class="filename">site1</code> and <code class="filename">site2.example.com</code> zones
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov should have special MX records that contain wildcard (`*') records
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov pointing to the bastion hosts. This is needed because external mail
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov servers do not have any other way of looking up how to deliver mail
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov to those internal hosts. With the wildcard records, the mail will
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov be delivered to the bastion host, which can then forward it on to
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov internal hosts.
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov Here's an example of a wildcard MX record:
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<pre class="programlisting">* IN MX 10 external1.example.com.</pre>
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov Now that they accept mail on behalf of anything in the internal
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov network, the bastion hosts will need to know how to deliver mail
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov to internal hosts. In order for this to work properly, the resolvers
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov the bastion hosts will need to be configured to point to the internal
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov name servers for DNS resolution.
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov Queries for internal hostnames will be answered by the internal
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov servers, and queries for external hostnames will be forwarded back
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov out to the DNS servers on the bastion hosts.
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov In order for all this to work properly, internal clients will
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov need to be configured to query <span class="emphasis"><em>only</em></span> the internal
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov name servers for DNS queries. This could also be enforced via
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov filtering on the network.
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov If everything has been set properly, <span class="emphasis"><em>Example, Inc.</em></span>'s
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov internal clients will now be able to:
3ce85a5f5264e7118beb6524e120fd8b53a13da4Nikolai Kondrashov<div class="itemizedlist"><ul type="disc">
for information on how to configure your zone files, see <a href="Bv9ARM.ch03.html#sample_configuration" title="Sample Configurations">the section called “Sample Configurations”</a>.
zone "site1.example.com" {
zone "site2.example.com" {
zone "site1.internal" {
zone "site2.internal" {
zone "site1.example.com" {
zone "site2.example.com" {
A shared secret is generated to be shared between <span class="emphasis"><em>host1</em></span> and <span class="emphasis"><em>host2</em></span>.
<strong class="userinput"><code>dnssec-keygen -a hmac-sha256 -b 128 -n HOST host1-host2.</code></strong>
Imagine <span class="emphasis"><em>host1</em></span> and <span class="emphasis"><em>host 2</em></span>
both servers. The following is added to each server's <code class="filename">named.conf</code> file:
be told when keys are to be used. The following is added to the <code class="filename">named.conf</code> file
for <span class="emphasis"><em>host1</em></span>, if the IP address of <span class="emphasis"><em>host2</em></span> is
to that address, the message will be signed with the specified key. <span class="emphasis"><em>host1</em></span> will
configuration file (with <span class="emphasis"><em>host1</em></span>'s address) for <span class="emphasis"><em>host2</em></span> to
See <a href="Bv9ARM.ch06.html#dynamic_update_policies" title="Dynamic Update Policies">the section called “Dynamic Update Policies”</a> for a discussion of
that the tools shipped with BIND 9.2.x and earlier are not compatible
<strong class="userinput"><code>dnssec-keygen -a RSASHA1 -b 768 -n ZONE child.example.</code></strong>
<strong class="userinput"><code>yes</code></strong> or <strong class="userinput"><code>auto</code></strong>.
example.com. 257 3 5 "AwEAAaxPMcR2x0HbQV4WeZB6oEDX+r0QM6
<a name="dnssec.dynamic.zones"></a>DNSSEC, Dynamic Zones, and Automatic Signing</h2></div></div></div>
zone example.net {
> update add example.net DNSKEY 256 3 7 AwEAAZn17pUF0KpbPA2c7Gz76Vb18v0teKT3EyAGfBfL8eQ8al35zz3Y I1m/SAQBxIqMfLtIwqWPdgthsu36azGQAX8=
> update add example.net DNSKEY 257 3 7 AwEAAd/7odU/64o2LGsifbLtQmtO8dFDtTAZXSX2+X3e/UNlq9IHq3Y0 XtC0Iuawl/qkaKVxXe2lo8Ct+dM6UehyCqk=
> update add example.net DNSKEY 256 3 7 AwEAAZn17pUF0KpbPA2c7Gz76Vb18v0teKT3EyAGfBfL8eQ8al35zz3Y I1m/SAQBxIqMfLtIwqWPdgthsu36azGQAX8=
> update add example.net DNSKEY 257 3 7 AwEAAd/7odU/64o2LGsifbLtQmtO8dFDtTAZXSX2+X3e/UNlq9IHq3Y0 XtC0Iuawl/qkaKVxXe2lo8Ct+dM6UehyCqk=
> update add example.net NSEC3PARAM 1 1 100 1234567890
(See <a href="man.dnssec-keygen.html" title="dnssec-keygen"><span class="refentrytitle"><span class="application">dnssec-keygen</span></span>(8)</a> and
<a href="man.dnssec-settime.html" title="dnssec-settime"><span class="refentrytitle"><span class="application">dnssec-settime</span></span>(8)</a> for more information.)
<span><strong class="command">rndc sign</strong></span> or <span><strong class="command">rndc loadkeys</strong></span>
<span><strong class="command">dnssec-keygen</strong></span> or <span><strong class="command">dnssec-settime</strong></span>),
<p>In any secure zone which supports dynamic updates, <span><strong class="command">named</strong></span>
and Usage">the section called “<span><strong class="command">managed-keys</strong></span> Statement Definition
$ <strong class="userinput"><code>dnssec-keygen -K keys -f KSK -P now -A now+2y example.net</code></strong>
and the <span><strong class="command">dnssec-*</strong></span> and <span><strong class="command">pkcs11-*</strong></span>
<span><strong class="command">dnssec-*</strong></span> tools, or the <code class="option">-m</code> in
$ <strong class="userinput"><code> configure --with-crypto-backend=openssl --prefix=/opt/pkcs11/usr --enable-gost </code></strong>
$ <strong class="userinput"><code> /opt/pkcs11/usr/bin/softhsm-util --init-token 0 --slot 0 --label softhsmv2 </code></strong>
$ <strong class="userinput"><code>wget <a href="" target="_top">http://www.openssl.org/source/openssl-0.9.8zc.tar.gz</a></code></strong>
$ <strong class="userinput"><code>cp pkcs11.GCC4.0.2.so.4.05 /opt/pkcs11/usr/lib/libpkcs11.so</code></strong>
and "<span><strong class="command">make test</strong></span>". If "<span><strong class="command">make
$ <strong class="userinput"><code> echo "0:/opt/pkcs11/softhsm.db" > $SOFTHSM_CONF </code></strong>
$ <strong class="userinput"><code> /opt/pkcs11/usr/bin/softhsm --init-token 0 --slot 0 --label softhsm </code></strong>
$ <strong class="userinput"><code>export LD_LIBRARY_PATH=/opt/pkcs11/usr/lib:${LD_LIBRARY_PATH}</code></strong>
$ <strong class="userinput"><code>export KEYPER_LIBRARY_PATH=/opt/Keyper/PKCS11Provider</code></strong>
"sample-ksk" as the key-signing key for "example.net":
$ <strong class="userinput"><code>dnssec-keyfromlabel -l sample-ksk -f KSK example.net</code></strong>
<a href="man.dnssec-keyfromlabel.html" title="dnssec-keyfromlabel"><span class="refentrytitle"><span class="application">dnssec-keyfromlabel</span></span>(8)</a> for details.)
then <span><strong class="command">named</strong></span> must have access to the HSM PIN. In OpenSSL-based PKCS#11,
this is accomplished by placing the PIN into the openssl.cnf file
The location of the openssl.cnf file can be overridden by
Historically, DLZ drivers had to be statically linked with the <span><strong class="command">named</strong></span>
"dlopen" driver is linked into <span><strong class="command">named</strong></span> by default, so configure options
When the DLZ module provides data to <span><strong class="command">named</strong></span>, it does so in text format.
The response is converted to DNS wire format by <span><strong class="command">named</strong></span>. This
dynamically-linkable DLZ module--i.e., one which can be
"example.nil", which can answer queries and AXFR requests, and
example.nil. 1800 IN A 10.53.0.1
e.g., by providing different address records for a particular name
<a name="id2571523"></a>IPv6 Support in <acronym class="acronym">BIND</acronym> 9</h2></div></div></div>
see <a href="Bv9ARM.ch11.html#ipv6addresses" title="IPv6 addresses (AAAA)">the section called “IPv6 addresses (AAAA)”</a>.
$ORIGIN example.com.