Bv9ARM.ch04.html revision cedb0bd0c1e3c461b7e479a16d3adfd5b150f1f4
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<!--
2f072c2982861ec2e86e97f8a3ed199fe45c1f70Michael Graff - Copyright (C) 2004, 2005 Internet Systems Consortium, Inc. ("ISC")
2f072c2982861ec2e86e97f8a3ed199fe45c1f70Michael Graff - Copyright (C) 2000-2003 Internet Software Consortium.
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews -
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews - Permission to use, copy, modify, and distribute this software for any
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews - purpose with or without fee is hereby granted, provided that the above
2f072c2982861ec2e86e97f8a3ed199fe45c1f70Michael Graff - copyright notice and this permission notice appear in all copies.
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews -
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews - THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews - REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews - AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews - INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews - LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews - PERFORMANCE OF THIS SOFTWARE.
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews-->
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<!-- $Id: Bv9ARM.ch04.html,v 1.60 2005/10/13 03:14:03 marka Exp $ -->
3ddd92da6651bc72aa79a04195ad389d86fd1a66Andreas Gustafsson<html>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<head>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<title>Chapter�4.�Advanced DNS Features</title>
854d0238dbc2908490197984b3b9d558008a53dfMark Andrews<meta name="generator" content="DocBook XSL Stylesheets V1.69.1">
854d0238dbc2908490197984b3b9d558008a53dfMark Andrews<link rel="start" href="Bv9ARM.html" title="BIND 9 Administrator Reference Manual">
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<link rel="up" href="Bv9ARM.html" title="BIND 9 Administrator Reference Manual">
4529cdaedaf1a0a5f8ff89aeca510b7a4475446cBob Halley<link rel="prev" href="Bv9ARM.ch03.html" title="Chapter�3.�Name Server Configuration">
d981ca645597116d227a48bf37cc5edc061c854dBob Halley<link rel="next" href="Bv9ARM.ch05.html" title="Chapter�5.�The BIND 9 Lightweight Resolver">
0e8cf9a887c70f96ac448b06c069d90b830215ccMark Andrews</head>
0e8cf9a887c70f96ac448b06c069d90b830215ccMark Andrews<body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF">
0e8cf9a887c70f96ac448b06c069d90b830215ccMark Andrews<div class="navheader">
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<table width="100%" summary="Navigation header">
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<tr><th colspan="3" align="center">Chapter�4.�Advanced DNS Features</th></tr>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<tr>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<td width="20%" align="left">
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<a accesskey="p" href="Bv9ARM.ch03.html">Prev</a>�</td>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<th width="60%" align="center">�</th>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<td width="20%" align="right">�<a accesskey="n" href="Bv9ARM.ch05.html">Next</a>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews</td>
5fc7ba3e1ac5d72239e9971e0f469dd5796738f9Andreas Gustafsson</tr>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews</table>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<hr>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews</div>
d981ca645597116d227a48bf37cc5edc061c854dBob Halley<div class="chapter" lang="en">
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<div class="titlepage"><div><div><h2 class="title">
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<a name="Bv9ARM.ch04"></a>Chapter�4.�Advanced DNS Features</h2></div></div></div>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<div class="toc">
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<p><b>Table of Contents</b></p>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<dl>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<dt><span class="sect1"><a href="Bv9ARM.ch04.html#notify">Notify</a></span></dt>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<dt><span class="sect1"><a href="Bv9ARM.ch04.html#dynamic_update">Dynamic Update</a></span></dt>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<dd><dl><dt><span class="sect2"><a href="Bv9ARM.ch04.html#journal">The journal file</a></span></dt></dl></dd>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<dt><span class="sect1"><a href="Bv9ARM.ch04.html#incremental_zone_transfers">Incremental Zone Transfers (IXFR)</a></span></dt>
5d15501996f597d9bbb734d88d4549828e28000bMark Andrews<dt><span class="sect1"><a href="Bv9ARM.ch04.html#id2552139">Split DNS</a></span></dt>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<dt><span class="sect1"><a href="Bv9ARM.ch04.html#tsig">TSIG</a></span></dt>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<dd><dl>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2552932">Generate Shared Keys for Each Pair of Hosts</a></span></dt>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2553005">Copying the Shared Secret to Both Machines</a></span></dt>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2553016">Informing the Servers of the Key's Existence</a></span></dt>
3ddd92da6651bc72aa79a04195ad389d86fd1a66Andreas Gustafsson<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2553056">Instructing the Server to Use the Key</a></span></dt>
3ddd92da6651bc72aa79a04195ad389d86fd1a66Andreas Gustafsson<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2553113">TSIG Key Based Access Control</a></span></dt>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2553158">Errors</a></span></dt>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews</dl></dd>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<dt><span class="sect1"><a href="Bv9ARM.ch04.html#id2553172">TKEY</a></span></dt>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<dt><span class="sect1"><a href="Bv9ARM.ch04.html#id2553221">SIG(0)</a></span></dt>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<dt><span class="sect1"><a href="Bv9ARM.ch04.html#DNSSEC">DNSSEC</a></span></dt>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<dd><dl>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2553357">Generating Keys</a></span></dt>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2553563">Signing the Zone</a></span></dt>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2553642">Configuring Servers</a></span></dt>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews</dl></dd>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<dt><span class="sect1"><a href="Bv9ARM.ch04.html#id2553666">IPv6 Support in <span class="acronym">BIND</span> 9</a></span></dt>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<dd><dl>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2553796">Address Lookups Using AAAA Records</a></span></dt>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2553817">Address to Name Lookups Using Nibble Format</a></span></dt>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews</dl></dd>
5fc7ba3e1ac5d72239e9971e0f469dd5796738f9Andreas Gustafsson</dl>
5fc7ba3e1ac5d72239e9971e0f469dd5796738f9Andreas Gustafsson</div>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<div class="sect1" lang="en">
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<div class="titlepage"><div><div><h2 class="title" style="clear: both">
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<a name="notify"></a>Notify</h2></div></div></div>
5fc7ba3e1ac5d72239e9971e0f469dd5796738f9Andreas Gustafsson<p>
5fc7ba3e1ac5d72239e9971e0f469dd5796738f9Andreas Gustafsson <span class="acronym">DNS</span> NOTIFY is a mechanism that allows master
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews servers to notify their slave servers of changes to a zone's data. In
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews response to a <span><strong class="command">NOTIFY</strong></span> from a master server, the
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews slave will check to see that its version of the zone is the
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews current version and, if not, initiate a zone transfer.
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews </p>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<p>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews For more information about <span class="acronym">DNS</span>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews <span><strong class="command">NOTIFY</strong></span>, see the description of the
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews <span><strong class="command">notify</strong></span> option in <a href="Bv9ARM.ch06.html#boolean_options" title="Boolean Options">the section called &#8220;Boolean Options&#8221;</a> and
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews the description of the zone option <span><strong class="command">also-notify</strong></span> in
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews <a href="Bv9ARM.ch06.html#zone_transfers" title="Zone Transfers">the section called &#8220;Zone Transfers&#8221;</a>. The <span><strong class="command">NOTIFY</strong></span>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews protocol is specified in RFC 1996.
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews </p>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<div class="note" style="margin-left: 0.5in; margin-right: 0.5in;">
822f6cdabb1edd44472c7a758b5cae71376fa9beBrian Wellington<h3 class="title">Note</h3>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews As slave zone can also be a master to other slaves, named,
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews by default, sends <span><strong class="command">NOTIFY</strong></span> messages for every zone
4529cdaedaf1a0a5f8ff89aeca510b7a4475446cBob Halley it loads. Specifying <span><strong class="command">notify master-only;</strong></span> will
5fc7ba3e1ac5d72239e9971e0f469dd5796738f9Andreas Gustafsson cause named to only send <span><strong class="command">NOTIFY</strong></span> for master
5fc7ba3e1ac5d72239e9971e0f469dd5796738f9Andreas Gustafsson zones that it loads.
5fc7ba3e1ac5d72239e9971e0f469dd5796738f9Andreas Gustafsson </div>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews</div>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<div class="sect1" lang="en">
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<div class="titlepage"><div><div><h2 class="title" style="clear: both">
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<a name="dynamic_update"></a>Dynamic Update</h2></div></div></div>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<p>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews Dynamic Update is a method for adding, replacing or deleting
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews records in a master server by sending it a special form of DNS
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews messages. The format and meaning of these messages is specified
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews in RFC 2136.
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews </p>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<p>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews Dynamic update is enabled by
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews including an <span><strong class="command">allow-update</strong></span> or
5fc7ba3e1ac5d72239e9971e0f469dd5796738f9Andreas Gustafsson <span><strong class="command">update-policy</strong></span> clause in the
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews <span><strong class="command">zone</strong></span> statement.
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews </p>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<p>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews Updating of secure zones (zones using DNSSEC) follows
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews RFC 3007: RRSIG and NSEC records affected by updates are automatically
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews regenerated by the server using an online zone key.
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews Update authorization is based
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews on transaction signatures and an explicit server policy.
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews </p>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<div class="sect2" lang="en">
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<div class="titlepage"><div><div><h3 class="title">
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<a name="journal"></a>The journal file</h3></div></div></div>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<p>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews All changes made to a zone using dynamic update are stored
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews in the zone's journal file. This file is automatically created
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews by the server when the first dynamic update takes place.
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews The name of the journal file is formed by appending the extension
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews <code class="filename">.jnl</code> to the name of the
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews corresponding zone
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews file unless specifically overridden. The journal file is in a
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews binary format and should not be edited manually.
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews </p>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<p>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews The server will also occasionally write ("dump")
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews the complete contents of the updated zone to its zone file.
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews This is not done immediately after
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews each dynamic update, because that would be too slow when a large
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews zone is updated frequently. Instead, the dump is delayed by
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews up to 15 minutes, allowing additional updates to take place.
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews </p>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<p>
5fc7ba3e1ac5d72239e9971e0f469dd5796738f9Andreas Gustafsson When a server is restarted after a shutdown or crash, it will replay
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews the journal file to incorporate into the zone any updates that
fad44a20eede1bbc66716241dede225500c91caaAndreas Gustafsson took
fad44a20eede1bbc66716241dede225500c91caaAndreas Gustafsson place after the last zone dump.
5fc7ba3e1ac5d72239e9971e0f469dd5796738f9Andreas Gustafsson </p>
5fc7ba3e1ac5d72239e9971e0f469dd5796738f9Andreas Gustafsson<p>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews Changes that result from incoming incremental zone transfers are
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews also
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews journalled in a similar way.
5fc7ba3e1ac5d72239e9971e0f469dd5796738f9Andreas Gustafsson </p>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<p>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews The zone files of dynamic zones cannot normally be edited by
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews hand because they are not guaranteed to contain the most recent
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews dynamic changes - those are only in the journal file.
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews The only way to ensure that the zone file of a dynamic zone
b5da378f2987a115491c291d062252f3152d8db8Brian Wellington is up to date is to run <span><strong class="command">rndc stop</strong></span>.
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews </p>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<p>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews If you have to make changes to a dynamic zone
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews manually, the following procedure will work: Disable dynamic updates
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews to the zone using
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews <span><strong class="command">rndc freeze <em class="replaceable"><code>zone</code></em></strong></span>.
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews This will also remove the zone's <code class="filename">.jnl</code> file
2bc0da0cd874b15593d65338ba96e90ceed13072Mark Andrews and update the master file. Edit the zone file. Run
5fc7ba3e1ac5d72239e9971e0f469dd5796738f9Andreas Gustafsson <span><strong class="command">rndc thaw <em class="replaceable"><code>zone</code></em></strong></span>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews to reload the changed zone and re-enable dynamic updates.
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews </p>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews</div>
5fc7ba3e1ac5d72239e9971e0f469dd5796738f9Andreas Gustafsson</div>
5fc7ba3e1ac5d72239e9971e0f469dd5796738f9Andreas Gustafsson<div class="sect1" lang="en">
5fc7ba3e1ac5d72239e9971e0f469dd5796738f9Andreas Gustafsson<div class="titlepage"><div><div><h2 class="title" style="clear: both">
fad44a20eede1bbc66716241dede225500c91caaAndreas Gustafsson<a name="incremental_zone_transfers"></a>Incremental Zone Transfers (IXFR)</h2></div></div></div>
fad44a20eede1bbc66716241dede225500c91caaAndreas Gustafsson<p>
5fc7ba3e1ac5d72239e9971e0f469dd5796738f9Andreas Gustafsson The incremental zone transfer (IXFR) protocol is a way for
5fc7ba3e1ac5d72239e9971e0f469dd5796738f9Andreas Gustafsson slave servers to transfer only changed data, instead of having to
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews transfer the entire zone. The IXFR protocol is specified in RFC
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews 1995. See <a href="Bv9ARM.ch09.html#proposed_standards">Proposed Standards</a>.
4529cdaedaf1a0a5f8ff89aeca510b7a4475446cBob Halley </p>
d981ca645597116d227a48bf37cc5edc061c854dBob Halley<p>
0e8cf9a887c70f96ac448b06c069d90b830215ccMark Andrews When acting as a master, <span class="acronym">BIND</span> 9
0e8cf9a887c70f96ac448b06c069d90b830215ccMark Andrews supports IXFR for those zones
0e8cf9a887c70f96ac448b06c069d90b830215ccMark Andrews where the necessary change history information is available. These
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews include master zones maintained by dynamic update and slave zones
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews whose data was obtained by IXFR. For manually maintained master
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews zones, and for slave zones obtained by performing a full zone
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews transfer (AXFR), IXFR is supported only if the option
1ef8965366d91e02a4672c35a187d30aa4a4c72cMark Andrews <span><strong class="command">ixfr-from-differences</strong></span> is set
1ef8965366d91e02a4672c35a187d30aa4a4c72cMark Andrews to <strong class="userinput"><code>yes</code></strong>.
1ef8965366d91e02a4672c35a187d30aa4a4c72cMark Andrews </p>
1ef8965366d91e02a4672c35a187d30aa4a4c72cMark Andrews<p>
1ef8965366d91e02a4672c35a187d30aa4a4c72cMark Andrews When acting as a slave, <span class="acronym">BIND</span> 9 will
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews attempt to use IXFR unless
d981ca645597116d227a48bf37cc5edc061c854dBob Halley it is explicitly disabled. For more information about disabling
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews IXFR, see the description of the <span><strong class="command">request-ixfr</strong></span> clause
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews of the <span><strong class="command">server</strong></span> statement.
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews </p>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews</div>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<div class="sect1" lang="en">
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<div class="titlepage"><div><div><h2 class="title" style="clear: both">
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<a name="id2552139"></a>Split DNS</h2></div></div></div>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<p>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews Setting up different views, or visibility, of the DNS space to
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews internal and external resolvers is usually referred to as a
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews <span class="emphasis"><em>Split DNS</em></span> setup. There are several
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews reasons an organization would want to set up its DNS this way.
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews </p>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<p>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews One common reason for setting up a DNS system this way is
2bc0da0cd874b15593d65338ba96e90ceed13072Mark Andrews to hide "internal" DNS information from "external" clients on the
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews Internet. There is some debate as to whether or not this is actually
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews useful.
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews Internal DNS information leaks out in many ways (via email headers,
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews for example) and most savvy "attackers" can find the information
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews they need using other means.
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews However, since listing addresses of internal servers that
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews external clients cannot possibly reach can result in
2bc0da0cd874b15593d65338ba96e90ceed13072Mark Andrews connection delays and other annoyances, an organization may
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews choose to use a Split DNS to present a consistant view of itself
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews to the outside world.
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews </p>
4529cdaedaf1a0a5f8ff89aeca510b7a4475446cBob Halley<p>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews Another common reason for setting up a Split DNS system is
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews to allow internal networks that are behind filters or in RFC 1918
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews space (reserved IP space, as documented in RFC 1918) to resolve DNS
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews on the Internet. Split DNS can also be used to allow mail from outside
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews back in to the internal network.
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews </p>
52637f592f705ca93fadc218e403fd55e8ce4aeaMark Andrews<p>
52637f592f705ca93fadc218e403fd55e8ce4aeaMark Andrews Here is an example of a split DNS setup:
52637f592f705ca93fadc218e403fd55e8ce4aeaMark Andrews </p>
52637f592f705ca93fadc218e403fd55e8ce4aeaMark Andrews<p>
52637f592f705ca93fadc218e403fd55e8ce4aeaMark Andrews Let's say a company named <span class="emphasis"><em>Example, Inc.</em></span>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews (<code class="literal">example.com</code>)
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews has several corporate sites that have an internal network with
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews reserved
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews Internet Protocol (IP) space and an external demilitarized zone (DMZ),
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews or "outside" section of a network, that is available to the public.
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews </p>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<p>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews <span class="emphasis"><em>Example, Inc.</em></span> wants its internal clients
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews to be able to resolve external hostnames and to exchange mail with
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews people on the outside. The company also wants its internal resolvers
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews to have access to certain internal-only zones that are not available
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews at all outside of the internal network.
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews </p>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<p>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews In order to accomplish this, the company will set up two sets
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews of name servers. One set will be on the inside network (in the
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews reserved
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews IP space) and the other set will be on bastion hosts, which are
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews "proxy"
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews hosts that can talk to both sides of its network, in the DMZ.
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews </p>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<p>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews The internal servers will be configured to forward all queries,
4529cdaedaf1a0a5f8ff89aeca510b7a4475446cBob Halley except queries for <code class="filename">site1.internal</code>, <code class="filename">site2.internal</code>, <code class="filename">site1.example.com</code>,
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews and <code class="filename">site2.example.com</code>, to the servers
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews in the
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews DMZ. These internal servers will have complete sets of information
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews for <code class="filename">site1.example.com</code>, <code class="filename">site2.example.com</code>,<span class="emphasis"><em></em></span> <code class="filename">site1.internal</code>,
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews and <code class="filename">site2.internal</code>.
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews </p>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<p>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews To protect the <code class="filename">site1.internal</code> and <code class="filename">site2.internal</code> domains,
d981ca645597116d227a48bf37cc5edc061c854dBob Halley the internal name servers must be configured to disallow all queries
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews to these domains from any external hosts, including the bastion
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews hosts.
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews </p>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<p>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews The external servers, which are on the bastion hosts, will
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews be configured to serve the "public" version of the <code class="filename">site1</code> and <code class="filename">site2.example.com</code> zones.
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews This could include things such as the host records for public servers
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews (<code class="filename">www.example.com</code> and <code class="filename">ftp.example.com</code>),
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews and mail exchange (MX) records (<code class="filename">a.mx.example.com</code> and <code class="filename">b.mx.example.com</code>).
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews </p>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<p>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews In addition, the public <code class="filename">site1</code> and <code class="filename">site2.example.com</code> zones
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews should have special MX records that contain wildcard (`*') records
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews pointing to the bastion hosts. This is needed because external mail
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews servers do not have any other way of looking up how to deliver mail
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews to those internal hosts. With the wildcard records, the mail will
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews be delivered to the bastion host, which can then forward it on to
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews internal hosts.
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews </p>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<p>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews Here's an example of a wildcard MX record:
7c0539bea56022274da04263eb41fbb5b8835c38Mark Andrews </p>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<pre class="programlisting">* IN MX 10 external1.example.com.</pre>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<p>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews Now that they accept mail on behalf of anything in the internal
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews network, the bastion hosts will need to know how to deliver mail
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews to internal hosts. In order for this to work properly, the resolvers
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews on
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews the bastion hosts will need to be configured to point to the internal
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews name servers for DNS resolution.
4529cdaedaf1a0a5f8ff89aeca510b7a4475446cBob Halley </p>
d981ca645597116d227a48bf37cc5edc061c854dBob Halley<p>
0e8cf9a887c70f96ac448b06c069d90b830215ccMark Andrews Queries for internal hostnames will be answered by the internal
0e8cf9a887c70f96ac448b06c069d90b830215ccMark Andrews servers, and queries for external hostnames will be forwarded back
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington out to the DNS servers on the bastion hosts.
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington </p>
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington<p>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews In order for all this to work properly, internal clients will
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews need to be configured to query <span class="emphasis"><em>only</em></span> the internal
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews name servers for DNS queries. This could also be enforced via
d981ca645597116d227a48bf37cc5edc061c854dBob Halley selective
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews filtering on the network.
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews </p>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<p>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews If everything has been set properly, <span class="emphasis"><em>Example, Inc.</em></span>'s
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington internal clients will now be able to:
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington </p>
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington<div class="itemizedlist"><ul type="disc">
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington<li>
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington Look up any hostnames in the <code class="literal">site1</code>
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington and
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington <code class="literal">site2.example.com</code> zones.
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington </li>
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington<li>
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington Look up any hostnames in the <code class="literal">site1.internal</code> and
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington <code class="literal">site2.internal</code> domains.
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington </li>
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington<li>Look up any hostnames on the Internet.</li>
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington<li>Exchange mail with internal AND external people.</li>
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington</ul></div>
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington<p>
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington Hosts on the Internet will be able to:
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington </p>
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington<div class="itemizedlist"><ul type="disc">
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington<li>
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington Look up any hostnames in the <code class="literal">site1</code>
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington and
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington <code class="literal">site2.example.com</code> zones.
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington </li>
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington<li>
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington Exchange mail with anyone in the <code class="literal">site1</code> and
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington <code class="literal">site2.example.com</code> zones.
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington </li>
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington</ul></div>
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington<p>
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington Here is an example configuration for the setup we just
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington described above. Note that this is only configuration information;
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington for information on how to configure your zone files, see <a href="Bv9ARM.ch03.html#sample_configuration" title="Sample Configurations">the section called &#8220;Sample Configurations&#8221;</a>
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington </p>
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington<p>
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington Internal DNS server config:
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington </p>
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington<pre class="programlisting">
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellingtonacl internals { 172.16.72.0/24; 192.168.1.0/24; };
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrewsacl externals { <code class="varname">bastion-ips-go-here</code>; };
4529cdaedaf1a0a5f8ff89aeca510b7a4475446cBob Halley
94a3bcd132e515b4baa0884ba9dd0f361d2e17bcMark Andrewsoptions {
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington ...
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington ...
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington forward only;
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews forwarders { // forward to external servers
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews <code class="varname">bastion-ips-go-here</code>;
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews };
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews allow-transfer { none; }; // sample allow-transfer (no one)
94a3bcd132e515b4baa0884ba9dd0f361d2e17bcMark Andrews allow-query { internals; externals; }; // restrict query access
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews allow-recursion { internals; }; // restrict recursion
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington ...
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington ...
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington};
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellingtonzone "site1.example.com" { // sample master zone
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington type master;
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington file "m/site1.example.com";
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington forwarders { }; // do normal iterative
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington // resolution (do not forward)
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington allow-query { internals; externals; };
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington allow-transfer { internals; };
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington};
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellingtonzone "site2.example.com" { // sample slave zone
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington type slave;
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington file "s/site2.example.com";
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington masters { 172.16.72.3; };
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington forwarders { };
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington allow-query { internals; externals; };
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington allow-transfer { internals; };
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington};
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellingtonzone "site1.internal" {
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington type master;
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington file "m/site1.internal";
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington forwarders { };
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington allow-query { internals; };
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington allow-transfer { internals; }
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington};
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellingtonzone "site2.internal" {
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington type slave;
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington file "s/site2.internal";
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington masters { 172.16.72.3; };
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington forwarders { };
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington allow-query { internals };
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington allow-transfer { internals; }
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington};
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington</pre>
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington<p>
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington External (bastion host) DNS server config:
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington </p>
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington<pre class="programlisting">
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellingtonacl internals { 172.16.72.0/24; 192.168.1.0/24; };
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellingtonacl externals { bastion-ips-go-here; };
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellingtonoptions {
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington ...
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington ...
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington allow-transfer { none; }; // sample allow-transfer (no one)
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington allow-query { any; }; // default query access
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington allow-query-cache { internals; externals; }; // restrict cache access
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington allow-recursion { internals; externals; }; // restrict recursion
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington ...
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington ...
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington};
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellingtonzone "site1.example.com" { // sample slave zone
b5da378f2987a115491c291d062252f3152d8db8Brian Wellington type master;
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington file "m/site1.foo.com";
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington allow-transfer { internals; externals; };
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington};
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellingtonzone "site2.example.com" {
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington type slave;
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington file "s/site2.foo.com";
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington masters { another_bastion_host_maybe; };
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington allow-transfer { internals; externals; }
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington};
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington</pre>
ffe74cc719aa0f10c38fbc1f2f3ea7db0960cb8fMark Andrews<p>
94a3bcd132e515b4baa0884ba9dd0f361d2e17bcMark Andrews In the <code class="filename">resolv.conf</code> (or equivalent) on
4529cdaedaf1a0a5f8ff89aeca510b7a4475446cBob Halley the bastion host(s):
94a3bcd132e515b4baa0884ba9dd0f361d2e17bcMark Andrews </p>
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington<pre class="programlisting">
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellingtonsearch ...
94a3bcd132e515b4baa0884ba9dd0f361d2e17bcMark Andrewsnameserver 172.16.72.2
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellingtonnameserver 172.16.72.3
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellingtonnameserver 172.16.72.4
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington</pre>
32b57aa1b97abdcd5fb5b1d0c05eb561ef3c125aBrian Wellington</div>
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington<div class="sect1" lang="en">
d8813e2ceee2f4adaf697931c2491de265ce5eb9Brian Wellington<div class="titlepage"><div><div><h2 class="title" style="clear: both">
94a3bcd132e515b4baa0884ba9dd0f361d2e17bcMark Andrews<a name="tsig"></a>TSIG</h2></div></div></div>
d981ca645597116d227a48bf37cc5edc061c854dBob Halley<p>
4529cdaedaf1a0a5f8ff89aeca510b7a4475446cBob Halley This is a short guide to setting up Transaction SIGnatures
d981ca645597116d227a48bf37cc5edc061c854dBob Halley (TSIG) based transaction security in <span class="acronym">BIND</span>. It describes changes
d981ca645597116d227a48bf37cc5edc061c854dBob Halley to the configuration file as well as what changes are required for
d981ca645597116d227a48bf37cc5edc061c854dBob Halley different features, including the process of creating transaction
d981ca645597116d227a48bf37cc5edc061c854dBob Halley keys and using transaction signatures with <span class="acronym">BIND</span>.
d981ca645597116d227a48bf37cc5edc061c854dBob Halley </p>
d981ca645597116d227a48bf37cc5edc061c854dBob Halley<p>
d981ca645597116d227a48bf37cc5edc061c854dBob Halley <span class="acronym">BIND</span> primarily supports TSIG for server
d981ca645597116d227a48bf37cc5edc061c854dBob Halley to server communication.
d981ca645597116d227a48bf37cc5edc061c854dBob Halley This includes zone transfer, notify, and recursive query messages.
d981ca645597116d227a48bf37cc5edc061c854dBob Halley Resolvers based on newer versions of <span class="acronym">BIND</span> 8 have limited support
d981ca645597116d227a48bf37cc5edc061c854dBob Halley for TSIG.
e27a69f8bd9538e08f775265167ba6cc5f47c587Bob Halley </p>
e27a69f8bd9538e08f775265167ba6cc5f47c587Bob Halley<p>
e27a69f8bd9538e08f775265167ba6cc5f47c587Bob Halley TSIG can also be useful for dynamic update. A primary
e27a69f8bd9538e08f775265167ba6cc5f47c587Bob Halley server for a dynamic zone should control access to the dynamic
e27a69f8bd9538e08f775265167ba6cc5f47c587Bob Halley update service, but IP-based access control is insufficient.
e27a69f8bd9538e08f775265167ba6cc5f47c587Bob Halley The cryptographic access control provided by TSIG
e27a69f8bd9538e08f775265167ba6cc5f47c587Bob Halley is far superior. The <span><strong class="command">nsupdate</strong></span>
e27a69f8bd9538e08f775265167ba6cc5f47c587Bob Halley program supports TSIG via the <code class="option">-k</code> and
e27a69f8bd9538e08f775265167ba6cc5f47c587Bob Halley <code class="option">-y</code> command line options or inline by use
e27a69f8bd9538e08f775265167ba6cc5f47c587Bob Halley of the <span><strong class="command">key</strong></span>.
e27a69f8bd9538e08f775265167ba6cc5f47c587Bob Halley </p>
e27a69f8bd9538e08f775265167ba6cc5f47c587Bob Halley<div class="sect2" lang="en">
e27a69f8bd9538e08f775265167ba6cc5f47c587Bob Halley<div class="titlepage"><div><div><h3 class="title">
e27a69f8bd9538e08f775265167ba6cc5f47c587Bob Halley<a name="id2552932"></a>Generate Shared Keys for Each Pair of Hosts</h3></div></div></div>
e27a69f8bd9538e08f775265167ba6cc5f47c587Bob Halley<p>
e27a69f8bd9538e08f775265167ba6cc5f47c587Bob Halley A shared secret is generated to be shared between <span class="emphasis"><em>host1</em></span> and <span class="emphasis"><em>host2</em></span>.
e27a69f8bd9538e08f775265167ba6cc5f47c587Bob Halley An arbitrary key name is chosen: "host1-host2.". The key name must
e27a69f8bd9538e08f775265167ba6cc5f47c587Bob Halley be the same on both hosts.
e27a69f8bd9538e08f775265167ba6cc5f47c587Bob Halley </p>
e27a69f8bd9538e08f775265167ba6cc5f47c587Bob Halley<div class="sect3" lang="en">
e27a69f8bd9538e08f775265167ba6cc5f47c587Bob Halley<div class="titlepage"><div><div><h4 class="title">
e27a69f8bd9538e08f775265167ba6cc5f47c587Bob Halley<a name="id2552949"></a>Automatic Generation</h4></div></div></div>
e27a69f8bd9538e08f775265167ba6cc5f47c587Bob Halley<p>
e27a69f8bd9538e08f775265167ba6cc5f47c587Bob Halley The following command will generate a 128 bit (16 byte) HMAC-MD5
854d0238dbc2908490197984b3b9d558008a53dfMark Andrews key as described above. Longer keys are better, but shorter keys
are easier to read. Note that the maximum key length is 512 bits;
keys longer than that will be digested with MD5 to produce a 128
bit key.
</p>
<p>
<strong class="userinput"><code>dnssec-keygen -a hmac-md5 -b 128 -n HOST host1-host2.</code></strong>
</p>
<p>
The key is in the file <code class="filename">Khost1-host2.+157+00000.private</code>.
Nothing directly uses this file, but the base-64 encoded string
following "<code class="literal">Key:</code>"
can be extracted from the file and used as a shared secret:
</p>
<pre class="programlisting">Key: La/E5CjG9O+os1jq0a2jdA==</pre>
<p>
The string "<code class="literal">La/E5CjG9O+os1jq0a2jdA==</code>" can
be used as the shared secret.
</p>
</div>
<div class="sect3" lang="en">
<div class="titlepage"><div><div><h4 class="title">
<a name="id2552987"></a>Manual Generation</h4></div></div></div>
<p>
The shared secret is simply a random sequence of bits, encoded
in base-64. Most ASCII strings are valid base-64 strings (assuming
the length is a multiple of 4 and only valid characters are used),
so the shared secret can be manually generated.
</p>
<p>
Also, a known string can be run through <span><strong class="command">mmencode</strong></span> or
a similar program to generate base-64 encoded data.
</p>
</div>
</div>
<div class="sect2" lang="en">
<div class="titlepage"><div><div><h3 class="title">
<a name="id2553005"></a>Copying the Shared Secret to Both Machines</h3></div></div></div>
<p>
This is beyond the scope of DNS. A secure transport mechanism
should be used. This could be secure FTP, ssh, telephone, etc.
</p>
</div>
<div class="sect2" lang="en">
<div class="titlepage"><div><div><h3 class="title">
<a name="id2553016"></a>Informing the Servers of the Key's Existence</h3></div></div></div>
<p>
Imagine <span class="emphasis"><em>host1</em></span> and <span class="emphasis"><em>host 2</em></span>
are
both servers. The following is added to each server's <code class="filename">named.conf</code> file:
</p>
<pre class="programlisting">
key host1-host2. {
algorithm hmac-md5;
secret "La/E5CjG9O+os1jq0a2jdA==";
};
</pre>
<p>
The algorithm, hmac-md5, is the only one supported by <span class="acronym">BIND</span>.
The secret is the one generated above. Since this is a secret, it
is recommended that either <code class="filename">named.conf</code> be non-world
readable, or the key directive be added to a non-world readable
file that is included by
<code class="filename">named.conf</code>.
</p>
<p>
At this point, the key is recognized. This means that if the
server receives a message signed by this key, it can verify the
signature. If the signature is successfully verified, the
response is signed by the same key.
</p>
</div>
<div class="sect2" lang="en">
<div class="titlepage"><div><div><h3 class="title">
<a name="id2553056"></a>Instructing the Server to Use the Key</h3></div></div></div>
<p>
Since keys are shared between two hosts only, the server must
be told when keys are to be used. The following is added to the <code class="filename">named.conf</code> file
for <span class="emphasis"><em>host1</em></span>, if the IP address of <span class="emphasis"><em>host2</em></span> is
10.1.2.3:
</p>
<pre class="programlisting">
server 10.1.2.3 {
keys { host1-host2. ;};
};
</pre>
<p>
Multiple keys may be present, but only the first is used.
This directive does not contain any secrets, so it may be in a
world-readable
file.
</p>
<p>
If <span class="emphasis"><em>host1</em></span> sends a message that is a request
to that address, the message will be signed with the specified key. <span class="emphasis"><em>host1</em></span> will
expect any responses to signed messages to be signed with the same
key.
</p>
<p>
A similar statement must be present in <span class="emphasis"><em>host2</em></span>'s
configuration file (with <span class="emphasis"><em>host1</em></span>'s address) for <span class="emphasis"><em>host2</em></span> to
sign request messages to <span class="emphasis"><em>host1</em></span>.
</p>
</div>
<div class="sect2" lang="en">
<div class="titlepage"><div><div><h3 class="title">
<a name="id2553113"></a>TSIG Key Based Access Control</h3></div></div></div>
<p>
<span class="acronym">BIND</span> allows IP addresses and ranges
to be specified in ACL
definitions and
<span><strong class="command">allow-{ query | transfer | update }</strong></span>
directives.
This has been extended to allow TSIG keys also. The above key would
be denoted <span><strong class="command">key host1-host2.</strong></span>
</p>
<p>
An example of an allow-update directive would be:
</p>
<pre class="programlisting">
allow-update { key host1-host2. ;};
</pre>
<p>
This allows dynamic updates to succeed only if the request
was signed by a key named
"<span><strong class="command">host1-host2.</strong></span>".
</p>
<p>
You may want to read about the more
powerful <span><strong class="command">update-policy</strong></span> statement in <a href="Bv9ARM.ch06.html#dynamic_update_policies" title="Dynamic Update Policies">the section called &#8220;Dynamic Update Policies&#8221;</a>.
</p>
</div>
<div class="sect2" lang="en">
<div class="titlepage"><div><div><h3 class="title">
<a name="id2553158"></a>Errors</h3></div></div></div>
<p>
The processing of TSIG signed messages can result in
several errors. If a signed message is sent to a non-TSIG aware
server, a FORMERR will be returned, since the server will not
understand the record. This is a result of misconfiguration,
since the server must be explicitly configured to send a TSIG
signed message to a specific server.
</p>
<p>
If a TSIG aware server receives a message signed by an
unknown key, the response will be unsigned with the TSIG
extended error code set to BADKEY. If a TSIG aware server
receives a message with a signature that does not validate, the
response will be unsigned with the TSIG extended error code set
to BADSIG. If a TSIG aware server receives a message with a time
outside of the allowed range, the response will be signed with
the TSIG extended error code set to BADTIME, and the time values
will be adjusted so that the response can be successfully
verified. In any of these cases, the message's rcode is set to
NOTAUTH.
</p>
</div>
</div>
<div class="sect1" lang="en">
<div class="titlepage"><div><div><h2 class="title" style="clear: both">
<a name="id2553172"></a>TKEY</h2></div></div></div>
<p><span><strong class="command">TKEY</strong></span>
is a mechanism for automatically generating a shared secret
between two hosts. There are several "modes" of
<span><strong class="command">TKEY</strong></span> that specify how the key is generated
or assigned. <span class="acronym">BIND</span> 9 implements only one of
these modes, the Diffie-Hellman key exchange. Both hosts are
required to have a Diffie-Hellman KEY record (although this
record is not required to be present in a zone). The
<span><strong class="command">TKEY</strong></span> process must use signed messages,
signed either by TSIG or SIG(0). The result of
<span><strong class="command">TKEY</strong></span> is a shared secret that can be used to
sign messages with TSIG. <span><strong class="command">TKEY</strong></span> can also be
used to delete shared secrets that it had previously
generated.
</p>
<p>
The <span><strong class="command">TKEY</strong></span> process is initiated by a
client
or server by sending a signed <span><strong class="command">TKEY</strong></span>
query
(including any appropriate KEYs) to a TKEY-aware server. The
server response, if it indicates success, will contain a
<span><strong class="command">TKEY</strong></span> record and any appropriate keys.
After
this exchange, both participants have enough information to
determine the shared secret; the exact process depends on the
<span><strong class="command">TKEY</strong></span> mode. When using the
Diffie-Hellman
<span><strong class="command">TKEY</strong></span> mode, Diffie-Hellman keys are
exchanged,
and the shared secret is derived by both participants.
</p>
</div>
<div class="sect1" lang="en">
<div class="titlepage"><div><div><h2 class="title" style="clear: both">
<a name="id2553221"></a>SIG(0)</h2></div></div></div>
<p>
<span class="acronym">BIND</span> 9 partially supports DNSSEC SIG(0)
transaction signatures as specified in RFC 2535 and RFC2931.
SIG(0)
uses public/private keys to authenticate messages. Access control
is performed in the same manner as TSIG keys; privileges can be
granted or denied based on the key name.
</p>
<p>
When a SIG(0) signed message is received, it will only be
verified if the key is known and trusted by the server; the server
will not attempt to locate and/or validate the key.
</p>
<p>
SIG(0) signing of multiple-message TCP streams is not
supported.
</p>
<p>
The only tool shipped with <span class="acronym">BIND</span> 9 that
generates SIG(0) signed messages is <span><strong class="command">nsupdate</strong></span>.
</p>
</div>
<div class="sect1" lang="en">
<div class="titlepage"><div><div><h2 class="title" style="clear: both">
<a name="DNSSEC"></a>DNSSEC</h2></div></div></div>
<p>
Cryptographic authentication of DNS information is possible
through the DNS Security (<span class="emphasis"><em>DNSSEC-bis</em></span>) extensions,
defined in RFC 4033, RFC 4034 and RFC 4035.
This section describes the creation and use of DNSSEC signed zones.
</p>
<p>
In order to set up a DNSSEC secure zone, there are a series
of steps which must be followed. <span class="acronym">BIND</span>
9 ships
with several tools
that are used in this process, which are explained in more detail
below. In all cases, the <code class="option">-h</code> option prints a
full list of parameters. Note that the DNSSEC tools require the
keyset files to be in the working directory or the
directory specified by the <code class="option">-d</code> option, and
that the tools shipped with BIND 9.2.x and earlier are not compatible
with the current ones.
</p>
<p>
There must also be communication with the administrators of
the parent and/or child zone to transmit keys. A zone's security
status must be indicated by the parent zone for a DNSSEC capable
resolver to trust its data. This is done through the presense
or absence of a <code class="literal">DS</code> record at the
delegation
point.
</p>
<p>
For other servers to trust data in this zone, they must
either be statically configured with this zone's zone key or the
zone key of another zone above this one in the DNS tree.
</p>
<div class="sect2" lang="en">
<div class="titlepage"><div><div><h3 class="title">
<a name="id2553357"></a>Generating Keys</h3></div></div></div>
<p>
The <span><strong class="command">dnssec-keygen</strong></span> program is used to
generate keys.
</p>
<p>
A secure zone must contain one or more zone keys. The
zone keys will sign all other records in the zone, as well as
the zone keys of any secure delegated zones. Zone keys must
have the same name as the zone, a name type of
<span><strong class="command">ZONE</strong></span>, and must be usable for
authentication.
It is recommended that zone keys use a cryptographic algorithm
designated as "mandatory to implement" by the IETF; currently
the only one is RSASHA1.
</p>
<p>
The following command will generate a 768 bit RSASHA1 key for
the <code class="filename">child.example</code> zone:
</p>
<p>
<strong class="userinput"><code>dnssec-keygen -a RSASHA1 -b 768 -n ZONE child.example.</code></strong>
</p>
<p>
Two output files will be produced:
<code class="filename">Kchild.example.+005+12345.key</code> and
<code class="filename">Kchild.example.+005+12345.private</code>
(where
12345 is an example of a key tag). The key file names contain
the key name (<code class="filename">child.example.</code>),
algorithm (3
is DSA, 1 is RSAMD5, 5 is RSASHA1, etc.), and the key tag (12345 in
this case).
The private key (in the <code class="filename">.private</code>
file) is
used to generate signatures, and the public key (in the
<code class="filename">.key</code> file) is used for signature
verification.
</p>
<p>
To generate another key with the same properties (but with
a different key tag), repeat the above command.
</p>
<p>
The public keys should be inserted into the zone file by
including the <code class="filename">.key</code> files using
<span><strong class="command">$INCLUDE</strong></span> statements.
</p>
</div>
<div class="sect2" lang="en">
<div class="titlepage"><div><div><h3 class="title">
<a name="id2553563"></a>Signing the Zone</h3></div></div></div>
<p>
The <span><strong class="command">dnssec-signzone</strong></span> program is used
to
sign a zone.
</p>
<p>
Any <code class="filename">keyset</code> files corresponding
to secure subzones should be present. The zone signer will
generate <code class="literal">NSEC</code> and <code class="literal">RRSIG</code>
records for the zone, as well as <code class="literal">DS</code>
for
the child zones if <code class="literal">'-d'</code> is specified.
If <code class="literal">'-d'</code> is not specified then
DS RRsets for
the secure child zones need to be added manually.
</p>
<p>
The following command signs the zone, assuming it is in a
file called <code class="filename">zone.child.example</code>. By
default, all zone keys which have an available private key are
used to generate signatures.
</p>
<p>
<strong class="userinput"><code>dnssec-signzone -o child.example zone.child.example</code></strong>
</p>
<p>
One output file is produced:
<code class="filename">zone.child.example.signed</code>. This
file
should be referenced by <code class="filename">named.conf</code>
as the
input file for the zone.
</p>
<p><span><strong class="command">dnssec-signzone</strong></span>
will also produce a keyset and dsset files and optionally a
dlvset file. These are used to provide the parent zone
administators with the <code class="literal">DNSKEYs</code> (or their
corresponding <code class="literal">DS</code> records) that are the
secure entry point to the zone.
</p>
</div>
<div class="sect2" lang="en">
<div class="titlepage"><div><div><h3 class="title">
<a name="id2553642"></a>Configuring Servers</h3></div></div></div>
<p>
Unlike <span class="acronym">BIND</span> 8,
<span class="acronym">BIND</span> 9 does not verify signatures on
load,
so zone keys for authoritative zones do not need to be specified
in the configuration file.
</p>
<p>
The public key for any security root must be present in
the configuration file's <span><strong class="command">trusted-keys</strong></span>
statement, as described later in this document.
</p>
</div>
</div>
<div class="sect1" lang="en">
<div class="titlepage"><div><div><h2 class="title" style="clear: both">
<a name="id2553666"></a>IPv6 Support in <span class="acronym">BIND</span> 9</h2></div></div></div>
<p>
<span class="acronym">BIND</span> 9 fully supports all currently
defined forms of IPv6
name to address and address to name lookups. It will also use
IPv6 addresses to make queries when running on an IPv6 capable
system.
</p>
<p>
For forward lookups, <span class="acronym">BIND</span> 9 supports
only AAAA records. RFC 3363 deprecated the use of A6 records,
and client-side support for A6 records was accordingly removed
from <span class="acronym">BIND</span> 9.
However, authoritative <span class="acronym">BIND</span> 9 name servers still
load zone files containing A6 records correctly, answer queries
for A6 records, and accept zone transfer for a zone containing A6
records.
</p>
<p>
For IPv6 reverse lookups, <span class="acronym">BIND</span> 9 supports
the traditional "nibble" format used in the
<span class="emphasis"><em>ip6.arpa</em></span> domain, as well as the older, deprecated
<span class="emphasis"><em>ip6.int</em></span> domain.
Older versions of <span class="acronym">BIND</span> 9
supported the "binary label" (also known as "bitstring") format,
but support of binary labels has been completely removed per
RFC 3363.
Many applications in <span class="acronym">BIND</span> 9 do not understand
the binary label format at all any more, and will return an
error if given.
In particular, an authoritative <span class="acronym">BIND</span> 9
name server will not load a zone file containing binary labels.
</p>
<p>
For an overview of the format and structure of IPv6 addresses,
see <a href="Bv9ARM.ch09.html#ipv6addresses" title="IPv6 addresses (AAAA)">the section called &#8220;IPv6 addresses (AAAA)&#8221;</a>.
</p>
<div class="sect2" lang="en">
<div class="titlepage"><div><div><h3 class="title">
<a name="id2553796"></a>Address Lookups Using AAAA Records</h3></div></div></div>
<p>
The IPv6 AAAA record is a parallel to the IPv4 A record,
and, unlike the deprecated A6 record, specifies the entire
IPv6 address in a single record. For example,
</p>
<pre class="programlisting">
$ORIGIN example.com.
host 3600 IN AAAA 2001:db8::1
</pre>
<p>
Use of IPv4-in-IPv6 mapped addresses is not recommended.
If a host has an IPv4 address, use an A record, not
a AAAA, with <code class="literal">::ffff:192.168.42.1</code> as
the address.
</p>
</div>
<div class="sect2" lang="en">
<div class="titlepage"><div><div><h3 class="title">
<a name="id2553817"></a>Address to Name Lookups Using Nibble Format</h3></div></div></div>
<p>
When looking up an address in nibble format, the address
components are simply reversed, just as in IPv4, and
<code class="literal">ip6.arpa.</code> is appended to the
resulting name.
For example, the following would provide reverse name lookup for
a host with address
<code class="literal">2001:db8::1</code>.
</p>
<pre class="programlisting">
$ORIGIN 0.0.0.0.0.0.0.0.8.b.d.0.1.0.0.2.ip6.arpa.
1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0 14400 IN PTR host.example.com.
</pre>
</div>
</div>
</div>
<div class="navfooter">
<hr>
<table width="100%" summary="Navigation footer">
<tr>
<td width="40%" align="left">
<a accesskey="p" href="Bv9ARM.ch03.html">Prev</a>�</td>
<td width="20%" align="center">�</td>
<td width="40%" align="right">�<a accesskey="n" href="Bv9ARM.ch05.html">Next</a>
</td>
</tr>
<tr>
<td width="40%" align="left" valign="top">Chapter�3.�Name Server Configuration�</td>
<td width="20%" align="center"><a accesskey="h" href="Bv9ARM.html">Home</a></td>
<td width="40%" align="right" valign="top">�Chapter�5.�The <span class="acronym">BIND</span> 9 Lightweight Resolver</td>
</tr>
</table>
</div>
</body>
</html>