Bv9ARM.ch04.html revision 7e3f5fbcf871f22707e7da5e4c69573a4fdc64b5
00cf03a1ca1624dac1fecc85f43fc34f8806aff9Luke Smith - Copyright (C) 2004-2015 Internet Systems Consortium, Inc. ("ISC")
00cf03a1ca1624dac1fecc85f43fc34f8806aff9Luke Smith - Copyright (C) 2000-2003 Internet Software Consortium.
d3c5729464159cab52ada7ff4b6c26b91bd4dcb4Satyen Desai - Permission to use, copy, modify, and/or distribute this software for any
d3c5729464159cab52ada7ff4b6c26b91bd4dcb4Satyen Desai - purpose with or without fee is hereby granted, provided that the above
d3c5729464159cab52ada7ff4b6c26b91bd4dcb4Satyen Desai - copyright notice and this permission notice appear in all copies.
d3c5729464159cab52ada7ff4b6c26b91bd4dcb4Satyen Desai - THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
d3c5729464159cab52ada7ff4b6c26b91bd4dcb4Satyen Desai - REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
d3c5729464159cab52ada7ff4b6c26b91bd4dcb4Satyen Desai - AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
d3c5729464159cab52ada7ff4b6c26b91bd4dcb4Satyen Desai - INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
00cf03a1ca1624dac1fecc85f43fc34f8806aff9Luke Smith - LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
d3c5729464159cab52ada7ff4b6c26b91bd4dcb4Satyen Desai - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
d3c5729464159cab52ada7ff4b6c26b91bd4dcb4Satyen Desai - PERFORMANCE OF THIS SOFTWARE.
00cf03a1ca1624dac1fecc85f43fc34f8806aff9Luke Smith<!-- $Id$ -->
d3c5729464159cab52ada7ff4b6c26b91bd4dcb4Satyen Desai<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
d3c5729464159cab52ada7ff4b6c26b91bd4dcb4Satyen Desai<meta name="generator" content="DocBook XSL Stylesheets V1.71.1">
d3c5729464159cab52ada7ff4b6c26b91bd4dcb4Satyen Desai<link rel="start" href="Bv9ARM.html" title="BIND 9 Administrator Reference Manual">
d3c5729464159cab52ada7ff4b6c26b91bd4dcb4Satyen Desai<link rel="up" href="Bv9ARM.html" title="BIND 9 Administrator Reference Manual">
d3c5729464159cab52ada7ff4b6c26b91bd4dcb4Satyen Desai<link rel="prev" href="Bv9ARM.ch03.html" title="Chapter�3.�Name Server Configuration">
d3c5729464159cab52ada7ff4b6c26b91bd4dcb4Satyen Desai<link rel="next" href="Bv9ARM.ch05.html" title="Chapter�5.�The BIND 9 Lightweight Resolver">
d3c5729464159cab52ada7ff4b6c26b91bd4dcb4Satyen Desai<body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF">
d3c5729464159cab52ada7ff4b6c26b91bd4dcb4Satyen Desai<table width="100%" summary="Navigation header">
d3c5729464159cab52ada7ff4b6c26b91bd4dcb4Satyen Desai<tr><th colspan="3" align="center">Chapter�4.�Advanced DNS Features</th></tr>
00cf03a1ca1624dac1fecc85f43fc34f8806aff9Luke Smith<a accesskey="p" href="Bv9ARM.ch03.html">Prev</a>�</td>
00cf03a1ca1624dac1fecc85f43fc34f8806aff9Luke Smith<td width="20%" align="right">�<a accesskey="n" href="Bv9ARM.ch05.html">Next</a>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<div class="titlepage"><div><div><h2 class="title">
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<a name="Bv9ARM.ch04"></a>Chapter�4.�Advanced DNS Features</h2></div></div></div>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<dt><span class="sect1"><a href="Bv9ARM.ch04.html#notify">Notify</a></span></dt>
d3c5729464159cab52ada7ff4b6c26b91bd4dcb4Satyen Desai<dt><span class="sect1"><a href="Bv9ARM.ch04.html#dynamic_update">Dynamic Update</a></span></dt>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<dd><dl><dt><span class="sect2"><a href="Bv9ARM.ch04.html#journal">The journal file</a></span></dt></dl></dd>
d3c5729464159cab52ada7ff4b6c26b91bd4dcb4Satyen Desai<dt><span class="sect1"><a href="Bv9ARM.ch04.html#incremental_zone_transfers">Incremental Zone Transfers (IXFR)</a></span></dt>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<dt><span class="sect1"><a href="Bv9ARM.ch04.html#id2569988">Split DNS</a></span></dt>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<dd><dl><dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2570006">Example split DNS setup</a></span></dt></dl></dd>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<dt><span class="sect1"><a href="Bv9ARM.ch04.html#tsig">TSIG</a></span></dt>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2570439">Generate Shared Keys for Each Pair of Hosts</a></span></dt>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2570581">Copying the Shared Secret to Both Machines</a></span></dt>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2570592">Informing the Servers of the Key's Existence</a></span></dt>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2570628">Instructing the Server to Use the Key</a></span></dt>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2570685">TSIG Key Based Access Control</a></span></dt>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2570734">Errors</a></span></dt>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<dt><span class="sect1"><a href="Bv9ARM.ch04.html#id2570748">TKEY</a></span></dt>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<dt><span class="sect1"><a href="Bv9ARM.ch04.html#id2570866">SIG(0)</a></span></dt>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<dt><span class="sect1"><a href="Bv9ARM.ch04.html#DNSSEC">DNSSEC</a></span></dt>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2571002">Generating Keys</a></span></dt>
d3c5729464159cab52ada7ff4b6c26b91bd4dcb4Satyen Desai<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2571218">Signing the Zone</a></span></dt>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2571299">Configuring Servers</a></span></dt>
d3c5729464159cab52ada7ff4b6c26b91bd4dcb4Satyen Desai<dt><span class="sect1"><a href="Bv9ARM.ch04.html#dnssec.dynamic.zones">DNSSEC, Dynamic Zones, and Automatic Signing</a></span></dt>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2612933">Converting from insecure to secure</a></span></dt>
d3c5729464159cab52ada7ff4b6c26b91bd4dcb4Satyen Desai<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2612970">Dynamic DNS update method</a></span></dt>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2563718">Fully automatic zone signing</a></span></dt>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2563897">Private-type records</a></span></dt>
98c1ab155c0e2148f69291b1abe1007c9d5a08e8Satyen Desai<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2563934">DNSKEY rollovers</a></span></dt>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2563947">Dynamic DNS update method</a></span></dt>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2573742">Automatic key rollovers</a></span></dt>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2573769">NSEC3PARAM rollovers via UPDATE</a></span></dt>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2573779">Converting from NSEC to NSEC3</a></span></dt>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2573788">Converting from NSEC3 to NSEC</a></span></dt>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2612440">Converting from secure to insecure</a></span></dt>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2612477">Periodic re-signing</a></span></dt>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2612491">NSEC3 and OPTOUT</a></span></dt>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<dt><span class="sect1"><a href="Bv9ARM.ch04.html#rfc5011.support">Dynamic Trust Anchor Management</a></span></dt>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2573876">Validating Resolver</a></span></dt>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2573898">Authoritative Server</a></span></dt>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<dt><span class="sect1"><a href="Bv9ARM.ch04.html#pkcs11">PKCS#11 (Cryptoki) support</a></span></dt>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2612574">Prerequisites</a></span></dt>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2612584">Native PKCS#11</a></span></dt>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2613276">OpenSSL-based PKCS#11</a></span></dt>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2640320">PKCS#11 Tools</a></span></dt>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2640356">Using the HSM</a></span></dt>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2640573">Specifying the engine on the command line</a></span></dt>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2640621">Running named with automatic zone re-signing</a></span></dt>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<dt><span class="sect1"><a href="Bv9ARM.ch04.html#dlz-info">DLZ (Dynamically Loadable Zones)</a></span></dt>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2640782">Configuring DLZ</a></span></dt>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2612798">Sample DLZ Driver</a></span></dt>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<dt><span class="sect1"><a href="Bv9ARM.ch04.html#id2571523">IPv6 Support in <acronym class="acronym">BIND</acronym> 9</a></span></dt>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2571789">Address Lookups Using AAAA Records</a></span></dt>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<dt><span class="sect2"><a href="Bv9ARM.ch04.html#id2571811">Address to Name Lookups Using Nibble Format</a></span></dt>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<div class="titlepage"><div><div><h2 class="title" style="clear: both">
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<a name="notify"></a>Notify</h2></div></div></div>
d3c5729464159cab52ada7ff4b6c26b91bd4dcb4Satyen Desai <acronym class="acronym">DNS</acronym> NOTIFY is a mechanism that allows master
d3c5729464159cab52ada7ff4b6c26b91bd4dcb4Satyen Desai servers to notify their slave servers of changes to a zone's data. In
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai response to a <span><strong class="command">NOTIFY</strong></span> from a master server, the
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai slave will check to see that its version of the zone is the
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai current version and, if not, initiate a zone transfer.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai For more information about <acronym class="acronym">DNS</acronym>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai <span><strong class="command">NOTIFY</strong></span>, see the description of the
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai <span><strong class="command">notify</strong></span> option in <a href="Bv9ARM.ch06.html#boolean_options" title="Boolean Options">the section called “Boolean Options”</a> and
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai the description of the zone option <span><strong class="command">also-notify</strong></span> in
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai <a href="Bv9ARM.ch06.html#zone_transfers" title="Zone Transfers">the section called “Zone Transfers”</a>. The <span><strong class="command">NOTIFY</strong></span>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai protocol is specified in RFC 1996.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<div class="note" style="margin-left: 0.5in; margin-right: 0.5in;">
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai As a slave zone can also be a master to other slaves, <span><strong class="command">named</strong></span>,
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai by default, sends <span><strong class="command">NOTIFY</strong></span> messages for every zone
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai it loads. Specifying <span><strong class="command">notify master-only;</strong></span> will
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai cause <span><strong class="command">named</strong></span> to only send <span><strong class="command">NOTIFY</strong></span> for master
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai zones that it loads.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<div class="titlepage"><div><div><h2 class="title" style="clear: both">
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<a name="dynamic_update"></a>Dynamic Update</h2></div></div></div>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai Dynamic Update is a method for adding, replacing or deleting
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai records in a master server by sending it a special form of DNS
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai messages. The format and meaning of these messages is specified
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai in RFC 2136.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai Dynamic update is enabled by including an
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai <span><strong class="command">allow-update</strong></span> or an <span><strong class="command">update-policy</strong></span>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai clause in the <span><strong class="command">zone</strong></span> statement.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai If the zone's <span><strong class="command">update-policy</strong></span> is set to
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai <strong class="userinput"><code>local</code></strong>, updates to the zone
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai will be permitted for the key <code class="varname">local-ddns</code>,
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai which will be generated by <span><strong class="command">named</strong></span> at startup.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai See <a href="Bv9ARM.ch06.html#dynamic_update_policies" title="Dynamic Update Policies">the section called “Dynamic Update Policies”</a> for more details.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai Dynamic updates using Kerberos signed requests can be made
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai using the TKEY/GSS protocol by setting either the
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai <span><strong class="command">tkey-gssapi-keytab</strong></span> option, or alternatively
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai by setting both the <span><strong class="command">tkey-gssapi-credential</strong></span>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai and <span><strong class="command">tkey-domain</strong></span> options. Once enabled,
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai Kerberos signed requests will be matched against the update
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai policies for the zone, using the Kerberos principal as the
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai signer for the request.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai Updating of secure zones (zones using DNSSEC) follows RFC
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai 3007: RRSIG, NSEC and NSEC3 records affected by updates are
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai automatically regenerated by the server using an online
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai zone key. Update authorization is based on transaction
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai signatures and an explicit server policy.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<div class="titlepage"><div><div><h3 class="title">
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<a name="journal"></a>The journal file</h3></div></div></div>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai All changes made to a zone using dynamic update are stored
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai in the zone's journal file. This file is automatically created
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai by the server when the first dynamic update takes place.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai The name of the journal file is formed by appending the extension
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai <code class="filename">.jnl</code> to the name of the
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai corresponding zone
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai file unless specifically overridden. The journal file is in a
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai binary format and should not be edited manually.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai The server will also occasionally write ("dump")
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai the complete contents of the updated zone to its zone file.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai This is not done immediately after
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai each dynamic update, because that would be too slow when a large
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai zone is updated frequently. Instead, the dump is delayed by
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai up to 15 minutes, allowing additional updates to take place.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai During the dump process, transient files will be created
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai with the extensions <code class="filename">.jnw</code> and
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai <code class="filename">.jbk</code>; under ordinary circumstances, these
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai will be removed when the dump is complete, and can be safely
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai When a server is restarted after a shutdown or crash, it will replay
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai the journal file to incorporate into the zone any updates that
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai place after the last zone dump.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai Changes that result from incoming incremental zone transfers are
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai journalled in a similar way.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai The zone files of dynamic zones cannot normally be edited by
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai hand because they are not guaranteed to contain the most recent
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai dynamic changes — those are only in the journal file.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai The only way to ensure that the zone file of a dynamic zone
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai is up to date is to run <span><strong class="command">rndc stop</strong></span>.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai If you have to make changes to a dynamic zone
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai manually, the following procedure will work:
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai Disable dynamic updates to the zone using
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai <span><strong class="command">rndc freeze <em class="replaceable"><code>zone</code></em></strong></span>.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai This will update the zone's master file with the changes
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai stored in its <code class="filename">.jnl</code> file.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai Edit the zone file. Run
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai <span><strong class="command">rndc thaw <em class="replaceable"><code>zone</code></em></strong></span>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai to reload the changed zone and re-enable dynamic updates.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai <span><strong class="command">rndc sync <em class="replaceable"><code>zone</code></em></strong></span>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai will update the zone file with changes from the journal file
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai without stopping dynamic updates; this may be useful for viewing
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai the current zone state. To remove the <code class="filename">.jnl</code>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai file after updating the zone file, use
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai <span><strong class="command">rndc sync -clean</strong></span>.
d8f2b0dd5ac08b7e9256df9f92b204b33c7f9f69Satyen Desai<div class="titlepage"><div><div><h2 class="title" style="clear: both">
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<a name="incremental_zone_transfers"></a>Incremental Zone Transfers (IXFR)</h2></div></div></div>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai The incremental zone transfer (IXFR) protocol is a way for
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai slave servers to transfer only changed data, instead of having to
d8f2b0dd5ac08b7e9256df9f92b204b33c7f9f69Satyen Desai transfer the entire zone. The IXFR protocol is specified in RFC
d3c5729464159cab52ada7ff4b6c26b91bd4dcb4Satyen Desai 1995. See <a href="Bv9ARM.ch11.html#proposed_standards">Proposed Standards</a>.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai When acting as a master, <acronym class="acronym">BIND</acronym> 9
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai supports IXFR for those zones
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai where the necessary change history information is available. These
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai include master zones maintained by dynamic update and slave zones
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai whose data was obtained by IXFR. For manually maintained master
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai zones, and for slave zones obtained by performing a full zone
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai transfer (AXFR), IXFR is supported only if the option
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai <span><strong class="command">ixfr-from-differences</strong></span> is set
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai to <strong class="userinput"><code>yes</code></strong>.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai When acting as a slave, <acronym class="acronym">BIND</acronym> 9 will
81ed0aaa8456bd5c6a54e7797258b1f182eb1f5bSatyen Desai attempt to use IXFR unless
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai it is explicitly disabled. For more information about disabling
81ed0aaa8456bd5c6a54e7797258b1f182eb1f5bSatyen Desai IXFR, see the description of the <span><strong class="command">request-ixfr</strong></span> clause
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai of the <span><strong class="command">server</strong></span> statement.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<div class="titlepage"><div><div><h2 class="title" style="clear: both">
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<a name="id2569988"></a>Split DNS</h2></div></div></div>
81ed0aaa8456bd5c6a54e7797258b1f182eb1f5bSatyen Desai Setting up different views, or visibility, of the DNS space to
81ed0aaa8456bd5c6a54e7797258b1f182eb1f5bSatyen Desai internal and external resolvers is usually referred to as a
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai <span class="emphasis"><em>Split DNS</em></span> setup. There are several
d8f2b0dd5ac08b7e9256df9f92b204b33c7f9f69Satyen Desai reasons an organization would want to set up its DNS this way.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai One common reason for setting up a DNS system this way is
d8f2b0dd5ac08b7e9256df9f92b204b33c7f9f69Satyen Desai to hide "internal" DNS information from "external" clients on the
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai Internet. There is some debate as to whether or not this is actually
d8f2b0dd5ac08b7e9256df9f92b204b33c7f9f69Satyen Desai Internal DNS information leaks out in many ways (via email headers,
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai for example) and most savvy "attackers" can find the information
d8f2b0dd5ac08b7e9256df9f92b204b33c7f9f69Satyen Desai they need using other means.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai However, since listing addresses of internal servers that
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai external clients cannot possibly reach can result in
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai connection delays and other annoyances, an organization may
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai choose to use a Split DNS to present a consistent view of itself
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai to the outside world.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai Another common reason for setting up a Split DNS system is
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai to allow internal networks that are behind filters or in RFC 1918
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai space (reserved IP space, as documented in RFC 1918) to resolve DNS
d8f2b0dd5ac08b7e9256df9f92b204b33c7f9f69Satyen Desai on the Internet. Split DNS can also be used to allow mail from outside
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai back in to the internal network.
d8f2b0dd5ac08b7e9256df9f92b204b33c7f9f69Satyen Desai<div class="titlepage"><div><div><h3 class="title">
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<a name="id2570006"></a>Example split DNS setup</h3></div></div></div>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai Let's say a company named <span class="emphasis"><em>Example, Inc.</em></span>
12bdc27e9ac1ba89d9657200cfb22aadad54e7fbSatyen Desai has several corporate sites that have an internal network with
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai Internet Protocol (IP) space and an external demilitarized zone (DMZ),
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai or "outside" section of a network, that is available to the public.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai <span class="emphasis"><em>Example, Inc.</em></span> wants its internal clients
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai to be able to resolve external hostnames and to exchange mail with
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai people on the outside. The company also wants its internal resolvers
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai to have access to certain internal-only zones that are not available
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai at all outside of the internal network.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai In order to accomplish this, the company will set up two sets
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai of name servers. One set will be on the inside network (in the
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai IP space) and the other set will be on bastion hosts, which are
12bdc27e9ac1ba89d9657200cfb22aadad54e7fbSatyen Desai hosts that can talk to both sides of its network, in the DMZ.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai The internal servers will be configured to forward all queries,
12bdc27e9ac1ba89d9657200cfb22aadad54e7fbSatyen Desai except queries for <code class="filename">site1.internal</code>, <code class="filename">site2.internal</code>, <code class="filename">site1.example.com</code>,
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai and <code class="filename">site2.example.com</code>, to the servers
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai DMZ. These internal servers will have complete sets of information
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai for <code class="filename">site1.example.com</code>, <code class="filename">site2.example.com</code>, <code class="filename">site1.internal</code>,
12bdc27e9ac1ba89d9657200cfb22aadad54e7fbSatyen Desai and <code class="filename">site2.internal</code>.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai To protect the <code class="filename">site1.internal</code> and <code class="filename">site2.internal</code> domains,
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai the internal name servers must be configured to disallow all queries
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai to these domains from any external hosts, including the bastion
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai The external servers, which are on the bastion hosts, will
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai be configured to serve the "public" version of the <code class="filename">site1</code> and <code class="filename">site2.example.com</code> zones.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai This could include things such as the host records for public servers
12bdc27e9ac1ba89d9657200cfb22aadad54e7fbSatyen Desai (<code class="filename">www.example.com</code> and <code class="filename">ftp.example.com</code>),
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai and mail exchange (MX) records (<code class="filename">a.mx.example.com</code> and <code class="filename">b.mx.example.com</code>).
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai In addition, the public <code class="filename">site1</code> and <code class="filename">site2.example.com</code> zones
12bdc27e9ac1ba89d9657200cfb22aadad54e7fbSatyen Desai should have special MX records that contain wildcard (`*') records
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai pointing to the bastion hosts. This is needed because external mail
12bdc27e9ac1ba89d9657200cfb22aadad54e7fbSatyen Desai servers do not have any other way of looking up how to deliver mail
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai to those internal hosts. With the wildcard records, the mail will
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai be delivered to the bastion host, which can then forward it on to
12bdc27e9ac1ba89d9657200cfb22aadad54e7fbSatyen Desai internal hosts.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai Here's an example of a wildcard MX record:
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<pre class="programlisting">* IN MX 10 external1.example.com.</pre>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai Now that they accept mail on behalf of anything in the internal
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai network, the bastion hosts will need to know how to deliver mail
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai to internal hosts. In order for this to work properly, the resolvers
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai the bastion hosts will need to be configured to point to the internal
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai name servers for DNS resolution.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai Queries for internal hostnames will be answered by the internal
12bdc27e9ac1ba89d9657200cfb22aadad54e7fbSatyen Desai servers, and queries for external hostnames will be forwarded back
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai out to the DNS servers on the bastion hosts.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai In order for all this to work properly, internal clients will
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai need to be configured to query <span class="emphasis"><em>only</em></span> the internal
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai name servers for DNS queries. This could also be enforced via
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai filtering on the network.
12bdc27e9ac1ba89d9657200cfb22aadad54e7fbSatyen Desai If everything has been set properly, <span class="emphasis"><em>Example, Inc.</em></span>'s
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai internal clients will now be able to:
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai Look up any hostnames in the <code class="literal">site1</code>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai <code class="literal">site2.example.com</code> zones.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai Look up any hostnames in the <code class="literal">site1.internal</code> and
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai <code class="literal">site2.internal</code> domains.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<li>Exchange mail with both internal and external people.</li>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai Hosts on the Internet will be able to:
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai Look up any hostnames in the <code class="literal">site1</code>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai <code class="literal">site2.example.com</code> zones.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai Exchange mail with anyone in the <code class="literal">site1</code> and
12bdc27e9ac1ba89d9657200cfb22aadad54e7fbSatyen Desai <code class="literal">site2.example.com</code> zones.
12bdc27e9ac1ba89d9657200cfb22aadad54e7fbSatyen Desai Here is an example configuration for the setup we just
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai described above. Note that this is only configuration information;
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai for information on how to configure your zone files, see <a href="Bv9ARM.ch03.html#sample_configuration" title="Sample Configurations">the section called “Sample Configurations”</a>.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai Internal DNS server config:
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desaiacl internals { 172.16.72.0/24; 192.168.1.0/24; };
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desaiacl externals { <code class="varname">bastion-ips-go-here</code>; };
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai forward only;
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai // forward to external servers
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai forwarders {
12bdc27e9ac1ba89d9657200cfb22aadad54e7fbSatyen Desai <code class="varname">bastion-ips-go-here</code>;
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai // sample allow-transfer (no one)
12bdc27e9ac1ba89d9657200cfb22aadad54e7fbSatyen Desai allow-transfer { none; };
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai // restrict query access
12bdc27e9ac1ba89d9657200cfb22aadad54e7fbSatyen Desai allow-query { internals; externals; };
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai // restrict recursion
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai allow-recursion { internals; };
12bdc27e9ac1ba89d9657200cfb22aadad54e7fbSatyen Desai// sample master zone
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai type master;
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai // do normal iterative resolution (do not forward)
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai forwarders { };
12bdc27e9ac1ba89d9657200cfb22aadad54e7fbSatyen Desai allow-query { internals; externals; };
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai allow-transfer { internals; };
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai// sample slave zone
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai masters { 172.16.72.3; };
12bdc27e9ac1ba89d9657200cfb22aadad54e7fbSatyen Desai forwarders { };
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai allow-query { internals; externals; };
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai allow-transfer { internals; };
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai type master;
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai forwarders { };
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai allow-query { internals; };
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai allow-transfer { internals; }
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai masters { 172.16.72.3; };
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai forwarders { };
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai allow-query { internals };
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai allow-transfer { internals; }
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai External (bastion host) DNS server config:
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desaiacl internals { 172.16.72.0/24; 192.168.1.0/24; };
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desaiacl externals { bastion-ips-go-here; };
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai // sample allow-transfer (no one)
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai allow-transfer { none; };
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai // default query access
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai allow-query { any; };
cea74478b281e652658d4e498aafc87c9fa90e92Satyen Desai // restrict cache access
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai allow-query-cache { internals; externals; };
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai // restrict recursion
cea74478b281e652658d4e498aafc87c9fa90e92Satyen Desai allow-recursion { internals; externals; };
cea74478b281e652658d4e498aafc87c9fa90e92Satyen Desai// sample slave zone
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai type master;
cea74478b281e652658d4e498aafc87c9fa90e92Satyen Desai allow-transfer { internals; externals; };
12bdc27e9ac1ba89d9657200cfb22aadad54e7fbSatyen Desai masters { another_bastion_host_maybe; };
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai allow-transfer { internals; externals; }
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai In the <code class="filename">resolv.conf</code> (or equivalent) on
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai the bastion host(s):
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desainameserver 172.16.72.2
cea74478b281e652658d4e498aafc87c9fa90e92Satyen Desainameserver 172.16.72.3
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desainameserver 172.16.72.4
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<div class="titlepage"><div><div><h2 class="title" style="clear: both">
cea74478b281e652658d4e498aafc87c9fa90e92Satyen Desai This is a short guide to setting up Transaction SIGnatures
cea74478b281e652658d4e498aafc87c9fa90e92Satyen Desai (TSIG) based transaction security in <acronym class="acronym">BIND</acronym>. It describes changes
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai to the configuration file as well as what changes are required for
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai different features, including the process of creating transaction
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai keys and using transaction signatures with <acronym class="acronym">BIND</acronym>.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai <acronym class="acronym">BIND</acronym> primarily supports TSIG for server
00cf03a1ca1624dac1fecc85f43fc34f8806aff9Luke Smith to server communication.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai This includes zone transfer, notify, and recursive query messages.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai Resolvers based on newer versions of <acronym class="acronym">BIND</acronym> 8 have limited support
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai TSIG can also be useful for dynamic update. A primary
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai server for a dynamic zone should control access to the dynamic
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai update service, but IP-based access control is insufficient.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai The cryptographic access control provided by TSIG
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai is far superior. The <span><strong class="command">nsupdate</strong></span>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai program supports TSIG via the <code class="option">-k</code> and
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai <code class="option">-y</code> command line options or inline by use
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai of the <span><strong class="command">key</strong></span>.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<div class="titlepage"><div><div><h3 class="title">
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<a name="id2570439"></a>Generate Shared Keys for Each Pair of Hosts</h3></div></div></div>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai A shared secret is generated to be shared between <span class="emphasis"><em>host1</em></span> and <span class="emphasis"><em>host2</em></span>.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai An arbitrary key name is chosen: "host1-host2.". The key name must
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai be the same on both hosts.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<div class="titlepage"><div><div><h4 class="title">
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<a name="id2570524"></a>Automatic Generation</h4></div></div></div>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai The following command will generate a 128-bit (16 byte) HMAC-SHA256
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai key as described above. Longer keys are better, but shorter keys
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai are easier to read. Note that the maximum key length is the digest
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai length, here 256 bits.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai <strong class="userinput"><code>dnssec-keygen -a hmac-sha256 -b 128 -n HOST host1-host2.</code></strong>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai The key is in the file <code class="filename">Khost1-host2.+163+00000.private</code>.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai Nothing directly uses this file, but the base-64 encoded string
1809f37c5e32d3366ee0a26377448d74d5fa7ff5Satyen Desai can be extracted from the file and used as a shared secret:
1809f37c5e32d3366ee0a26377448d74d5fa7ff5Satyen Desai<pre class="programlisting">Key: La/E5CjG9O+os1jq0a2jdA==</pre>
1809f37c5e32d3366ee0a26377448d74d5fa7ff5Satyen Desai The string "<code class="literal">La/E5CjG9O+os1jq0a2jdA==</code>" can
1809f37c5e32d3366ee0a26377448d74d5fa7ff5Satyen Desai be used as the shared secret.
1809f37c5e32d3366ee0a26377448d74d5fa7ff5Satyen Desai<div class="titlepage"><div><div><h4 class="title">
1809f37c5e32d3366ee0a26377448d74d5fa7ff5Satyen Desai<a name="id2570563"></a>Manual Generation</h4></div></div></div>
1809f37c5e32d3366ee0a26377448d74d5fa7ff5Satyen Desai The shared secret is simply a random sequence of bits, encoded
1809f37c5e32d3366ee0a26377448d74d5fa7ff5Satyen Desai in base-64. Most ASCII strings are valid base-64 strings (assuming
1809f37c5e32d3366ee0a26377448d74d5fa7ff5Satyen Desai the length is a multiple of 4 and only valid characters are used),
1809f37c5e32d3366ee0a26377448d74d5fa7ff5Satyen Desai so the shared secret can be manually generated.
1809f37c5e32d3366ee0a26377448d74d5fa7ff5Satyen Desai Also, a known string can be run through <span><strong class="command">mmencode</strong></span> or
1809f37c5e32d3366ee0a26377448d74d5fa7ff5Satyen Desai a similar program to generate base-64 encoded data.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<div class="titlepage"><div><div><h3 class="title">
1809f37c5e32d3366ee0a26377448d74d5fa7ff5Satyen Desai<a name="id2570581"></a>Copying the Shared Secret to Both Machines</h3></div></div></div>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai This is beyond the scope of DNS. A secure transport mechanism
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai should be used. This could be secure FTP, ssh, telephone, etc.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<div class="titlepage"><div><div><h3 class="title">
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<a name="id2570592"></a>Informing the Servers of the Key's Existence</h3></div></div></div>
1809f37c5e32d3366ee0a26377448d74d5fa7ff5Satyen Desai Imagine <span class="emphasis"><em>host1</em></span> and <span class="emphasis"><em>host 2</em></span>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai both servers. The following is added to each server's <code class="filename">named.conf</code> file:
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desaikey host1-host2. {
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai algorithm hmac-sha256;
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai The secret is the one generated above. Since this is a secret, it
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai is recommended that either <code class="filename">named.conf</code> be
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai non-world readable, or the key directive be added to a non-world
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai readable file that is included by <code class="filename">named.conf</code>.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai At this point, the key is recognized. This means that if the
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai server receives a message signed by this key, it can verify the
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai signature. If the signature is successfully verified, the
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai response is signed by the same key.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<div class="titlepage"><div><div><h3 class="title">
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<a name="id2570628"></a>Instructing the Server to Use the Key</h3></div></div></div>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai Since keys are shared between two hosts only, the server must
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai be told when keys are to be used. The following is added to the <code class="filename">named.conf</code> file
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai for <span class="emphasis"><em>host1</em></span>, if the IP address of <span class="emphasis"><em>host2</em></span> is
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desaiserver 10.1.2.3 {
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai keys { host1-host2. ;};
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai Multiple keys may be present, but only the first is used.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai This directive does not contain any secrets, so it may be in a
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai world-readable
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai If <span class="emphasis"><em>host1</em></span> sends a message that is a request
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai to that address, the message will be signed with the specified key. <span class="emphasis"><em>host1</em></span> will
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai expect any responses to signed messages to be signed with the same
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai A similar statement must be present in <span class="emphasis"><em>host2</em></span>'s
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai configuration file (with <span class="emphasis"><em>host1</em></span>'s address) for <span class="emphasis"><em>host2</em></span> to
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai sign request messages to <span class="emphasis"><em>host1</em></span>.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<div class="titlepage"><div><div><h3 class="title">
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<a name="id2570685"></a>TSIG Key Based Access Control</h3></div></div></div>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai <acronym class="acronym">BIND</acronym> allows IP addresses and ranges
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai to be specified in ACL
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai definitions and
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai <span><strong class="command">allow-{ query | transfer | update }</strong></span>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai This has been extended to allow TSIG keys also. The above key would
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai be denoted <span><strong class="command">key host1-host2.</strong></span>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai An example of an <span><strong class="command">allow-update</strong></span> directive would be:
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desaiallow-update { key host1-host2. ;};
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai This allows dynamic updates to succeed only if the request
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai was signed by a key named "<span><strong class="command">host1-host2.</strong></span>".
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai See <a href="Bv9ARM.ch06.html#dynamic_update_policies" title="Dynamic Update Policies">the section called “Dynamic Update Policies”</a> for a discussion of
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai the more flexible <span><strong class="command">update-policy</strong></span> statement.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<div class="titlepage"><div><div><h3 class="title">
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<a name="id2570734"></a>Errors</h3></div></div></div>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai The processing of TSIG signed messages can result in
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai several errors. If a signed message is sent to a non-TSIG aware
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai server, a FORMERR (format error) will be returned, since the server will not
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai understand the record. This is a result of misconfiguration,
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai since the server must be explicitly configured to send a TSIG
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai signed message to a specific server.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai If a TSIG aware server receives a message signed by an
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai unknown key, the response will be unsigned with the TSIG
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai extended error code set to BADKEY. If a TSIG aware server
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai receives a message with a signature that does not validate, the
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai response will be unsigned with the TSIG extended error code set
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai to BADSIG. If a TSIG aware server receives a message with a time
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai outside of the allowed range, the response will be signed with
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai the TSIG extended error code set to BADTIME, and the time values
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai will be adjusted so that the response can be successfully
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai verified. In any of these cases, the message's rcode (response code) is set to
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai NOTAUTH (not authenticated).
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<div class="titlepage"><div><div><h2 class="title" style="clear: both">
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<a name="id2570748"></a>TKEY</h2></div></div></div>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<p><span><strong class="command">TKEY</strong></span>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai is a mechanism for automatically generating a shared secret
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai between two hosts. There are several "modes" of
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai <span><strong class="command">TKEY</strong></span> that specify how the key is generated
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai or assigned. <acronym class="acronym">BIND</acronym> 9 implements only one of
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai these modes, the Diffie-Hellman key exchange. Both hosts are
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai required to have a Diffie-Hellman KEY record (although this
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai record is not required to be present in a zone). The
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai <span><strong class="command">TKEY</strong></span> process must use signed messages,
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai signed either by TSIG or SIG(0). The result of
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai <span><strong class="command">TKEY</strong></span> is a shared secret that can be used to
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai sign messages with TSIG. <span><strong class="command">TKEY</strong></span> can also be
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai used to delete shared secrets that it had previously
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai The <span><strong class="command">TKEY</strong></span> process is initiated by a
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai or server by sending a signed <span><strong class="command">TKEY</strong></span>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai (including any appropriate KEYs) to a TKEY-aware server. The
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai server response, if it indicates success, will contain a
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai <span><strong class="command">TKEY</strong></span> record and any appropriate keys.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai this exchange, both participants have enough information to
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai determine the shared secret; the exact process depends on the
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai <span><strong class="command">TKEY</strong></span> mode. When using the
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai Diffie-Hellman
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai <span><strong class="command">TKEY</strong></span> mode, Diffie-Hellman keys are
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai and the shared secret is derived by both participants.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<div class="titlepage"><div><div><h2 class="title" style="clear: both">
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<a name="id2570866"></a>SIG(0)</h2></div></div></div>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai <acronym class="acronym">BIND</acronym> 9 partially supports DNSSEC SIG(0)
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai transaction signatures as specified in RFC 2535 and RFC 2931.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai uses public/private keys to authenticate messages. Access control
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai is performed in the same manner as TSIG keys; privileges can be
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai granted or denied based on the key name.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai When a SIG(0) signed message is received, it will only be
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai verified if the key is known and trusted by the server; the server
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai will not attempt to locate and/or validate the key.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai SIG(0) signing of multiple-message TCP streams is not
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai The only tool shipped with <acronym class="acronym">BIND</acronym> 9 that
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai generates SIG(0) signed messages is <span><strong class="command">nsupdate</strong></span>.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<div class="titlepage"><div><div><h2 class="title" style="clear: both">
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<a name="DNSSEC"></a>DNSSEC</h2></div></div></div>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai Cryptographic authentication of DNS information is possible
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai through the DNS Security (<span class="emphasis"><em>DNSSEC-bis</em></span>) extensions,
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai defined in RFC 4033, RFC 4034, and RFC 4035.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai This section describes the creation and use of DNSSEC signed zones.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai In order to set up a DNSSEC secure zone, there are a series
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai of steps which must be followed. <acronym class="acronym">BIND</acronym>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai with several tools
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai that are used in this process, which are explained in more detail
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai below. In all cases, the <code class="option">-h</code> option prints a
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai full list of parameters. Note that the DNSSEC tools require the
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai keyset files to be in the working directory or the
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai directory specified by the <code class="option">-d</code> option, and
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai that the tools shipped with BIND 9.2.x and earlier are not compatible
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai with the current ones.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai There must also be communication with the administrators of
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai the parent and/or child zone to transmit keys. A zone's security
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai status must be indicated by the parent zone for a DNSSEC capable
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai resolver to trust its data. This is done through the presence
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai or absence of a <code class="literal">DS</code> record at the
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai For other servers to trust data in this zone, they must
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai either be statically configured with this zone's zone key or the
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai zone key of another zone above this one in the DNS tree.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<div class="titlepage"><div><div><h3 class="title">
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<a name="id2571002"></a>Generating Keys</h3></div></div></div>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai The <span><strong class="command">dnssec-keygen</strong></span> program is used to
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai generate keys.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai A secure zone must contain one or more zone keys. The
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai zone keys will sign all other records in the zone, as well as
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai the zone keys of any secure delegated zones. Zone keys must
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai have the same name as the zone, a name type of
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai <span><strong class="command">ZONE</strong></span>, and must be usable for
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai authentication.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai It is recommended that zone keys use a cryptographic algorithm
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai designated as "mandatory to implement" by the IETF; currently
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai the only one is RSASHA1.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai The following command will generate a 768-bit RSASHA1 key for
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai the <code class="filename">child.example</code> zone:
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai <strong class="userinput"><code>dnssec-keygen -a RSASHA1 -b 768 -n ZONE child.example.</code></strong>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai Two output files will be produced:
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai <code class="filename">Kchild.example.+005+12345.key</code> and
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai <code class="filename">Kchild.example.+005+12345.private</code>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai 12345 is an example of a key tag). The key filenames contain
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai the key name (<code class="filename">child.example.</code>),
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai algorithm (3
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai is DSA, 1 is RSAMD5, 5 is RSASHA1, etc.), and the key tag (12345 in
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai The private key (in the <code class="filename">.private</code>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai used to generate signatures, and the public key (in the
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai <code class="filename">.key</code> file) is used for signature
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai verification.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai To generate another key with the same properties (but with
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai a different key tag), repeat the above command.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai The <span><strong class="command">dnssec-keyfromlabel</strong></span> program is used
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai to get a key pair from a crypto hardware and build the key
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai files. Its usage is similar to <span><strong class="command">dnssec-keygen</strong></span>.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai The public keys should be inserted into the zone file by
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai including the <code class="filename">.key</code> files using
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai <span><strong class="command">$INCLUDE</strong></span> statements.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<div class="titlepage"><div><div><h3 class="title">
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<a name="id2571218"></a>Signing the Zone</h3></div></div></div>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai The <span><strong class="command">dnssec-signzone</strong></span> program is used
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai to sign a zone.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai Any <code class="filename">keyset</code> files corresponding to
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai secure subzones should be present. The zone signer will
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai generate <code class="literal">NSEC</code>, <code class="literal">NSEC3</code>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai and <code class="literal">RRSIG</code> records for the zone, as
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai well as <code class="literal">DS</code> for the child zones if
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai <code class="literal">'-g'</code> is specified. If <code class="literal">'-g'</code>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai is not specified, then DS RRsets for the secure child
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai zones need to be added manually.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai The following command signs the zone, assuming it is in a
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai file called <code class="filename">zone.child.example</code>. By
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai default, all zone keys which have an available private key are
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai used to generate signatures.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai <strong class="userinput"><code>dnssec-signzone -o child.example zone.child.example</code></strong>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai One output file is produced:
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai <code class="filename">zone.child.example.signed</code>. This
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai should be referenced by <code class="filename">named.conf</code>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai input file for the zone.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<p><span><strong class="command">dnssec-signzone</strong></span>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai will also produce a keyset and dsset files and optionally a
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai dlvset file. These are used to provide the parent zone
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai administrators with the <code class="literal">DNSKEYs</code> (or their
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai corresponding <code class="literal">DS</code> records) that are the
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai secure entry point to the zone.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<div class="titlepage"><div><div><h3 class="title">
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<a name="id2571299"></a>Configuring Servers</h3></div></div></div>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai To enable <span><strong class="command">named</strong></span> to respond appropriately
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai to DNS requests from DNSSEC aware clients,
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai <span><strong class="command">dnssec-enable</strong></span> must be set to yes.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai (This is the default setting.)
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai To enable <span><strong class="command">named</strong></span> to validate answers from
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai other servers, the <span><strong class="command">dnssec-enable</strong></span> option
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai must be set to <strong class="userinput"><code>yes</code></strong>, and the
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai <span><strong class="command">dnssec-validation</strong></span> options must be set to
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai <strong class="userinput"><code>yes</code></strong> or <strong class="userinput"><code>auto</code></strong>.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai If <span><strong class="command">dnssec-validation</strong></span> is set to
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai <strong class="userinput"><code>auto</code></strong>, then a default
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai trust anchor for the DNS root zone will be used.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai If it is set to <strong class="userinput"><code>yes</code></strong>, however,
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai then at least one trust anchor must be configured
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai with a <span><strong class="command">trusted-keys</strong></span> or
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai <span><strong class="command">managed-keys</strong></span> statement in
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai <code class="filename">named.conf</code>, or DNSSEC validation
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai will not occur. The default setting is
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai <strong class="userinput"><code>yes</code></strong>.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai <span><strong class="command">trusted-keys</strong></span> are copies of DNSKEY RRs
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai for zones that are used to form the first link in the
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai cryptographic chain of trust. All keys listed in
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai <span><strong class="command">trusted-keys</strong></span> (and corresponding zones)
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai are deemed to exist and only the listed keys will be used
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai to validated the DNSKEY RRset that they are from.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai <span><strong class="command">managed-keys</strong></span> are trusted keys which are
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai automatically kept up to date via RFC 5011 trust anchor
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai maintenance.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai <span><strong class="command">trusted-keys</strong></span> and
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai <span><strong class="command">managed-keys</strong></span> are described in more detail
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai later in this document.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai Unlike <acronym class="acronym">BIND</acronym> 8, <acronym class="acronym">BIND</acronym>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai 9 does not verify signatures on load, so zone keys for
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai authoritative zones do not need to be specified in the
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai configuration file.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai After DNSSEC gets established, a typical DNSSEC configuration
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai will look something like the following. It has one or
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai more public keys for the root. This allows answers from
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai outside the organization to be validated. It will also
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai have several keys for parts of the namespace the organization
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai controls. These are here to ensure that <span><strong class="command">named</strong></span>
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai is immune to compromises in the DNSSEC components of the security
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai of parent zones.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desaimanaged-keys {
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai /* Root Key */
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai "." initial-key 257 3 3 "BNY4wrWM1nCfJ+CXd0rVXyYmobt7sEEfK3clRbGaTwS
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai 66gKodQj+MiA21AfUVe7u99WzTLzY3qlxDhxYQQ20FQ
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai dgxbcDTClU0CRBdiieyLMNzXG3";
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desaitrusted-keys {
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai /* Key for our organization's forward zone */
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai example.com. 257 3 5 "AwEAAaxPMcR2x0HbQV4WeZB6oEDX+r0QM6
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai 5KbhTjrW1ZaARmPhEZZe3Y9ifgEuq7vZ/z
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai GZUdEGNWy+JZzus0lUptwgjGwhUS1558Hb
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai 4JKUbbOTcM8pwXlj0EiX3oDFVmjHO444gL
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai g4ywzO9WglMk7jbfW33gUKvirTHr25GL7S
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai TQUzBb5Usxt8lgnyTUHs1t3JwCY5hKZ6Cq
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai F4qJCyduieHukuY3H4XMAcR+xia2nIUPvm
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai /* Key for our reverse zone. */
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai 2.0.192.IN-ADDRPA.NET. 257 3 5 "AQOnS4xn/IgOUpBPJ3bogzwc
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai xOdNax071L18QqZnQQQAVVr+i
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai LhGTnNGp3HoWQLUIzKrJVZ3zg
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai gy3WwNT6kZo6c0tszYqbtvchm
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai siaOdS0yOI6BgPsw+YZdzlYMa
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai IJGf4M4dyoKIhzdZyQ2bYQrjy
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai Q4LB0lC7aOnsMyYKHHYeRvPxj
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai IQXmdqgOJGq+vsevG06zW+1xg
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai 59VvjSPsZJHeDCUyWYrvPZesZ
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai DIRvhDD52SKvbheeTJUm6Ehkz
d3c5729464159cab52ada7ff4b6c26b91bd4dcb4Satyen Desai dnssec-enable yes;
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai dnssec-validation yes;
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<div class="note" style="margin-left: 0.5in; margin-right: 0.5in;">
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai None of the keys listed in this example are valid. In particular,
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai the root key is not valid.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai When DNSSEC validation is enabled and properly configured,
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai the resolver will reject any answers from signed, secure zones
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai which fail to validate, and will return SERVFAIL to the client.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai Responses may fail to validate for any of several reasons,
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai including missing, expired, or invalid signatures, a key which
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai does not match the DS RRset in the parent zone, or an insecure
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai response from a zone which, according to its parent, should have
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai been secure.
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai<div class="note" style="margin-left: 0.5in; margin-right: 0.5in;">
d4a90de3308f343c5d935b5f9b6bcc9f5bc4d05fSatyen Desai When the validator receives a response from an unsigned zone
00cf03a1ca1624dac1fecc85f43fc34f8806aff9Luke Smith that has a signed parent, it must confirm with the parent
00cf03a1ca1624dac1fecc85f43fc34f8806aff9Luke Smith that the zone was intentionally left unsigned. It does
<a name="dnssec.dynamic.zones"></a>DNSSEC, Dynamic Zones, and Automatic Signing</h2></div></div></div>
zone example.net {
> update add example.net DNSKEY 256 3 7 AwEAAZn17pUF0KpbPA2c7Gz76Vb18v0teKT3EyAGfBfL8eQ8al35zz3Y I1m/SAQBxIqMfLtIwqWPdgthsu36azGQAX8=
> update add example.net DNSKEY 257 3 7 AwEAAd/7odU/64o2LGsifbLtQmtO8dFDtTAZXSX2+X3e/UNlq9IHq3Y0 XtC0Iuawl/qkaKVxXe2lo8Ct+dM6UehyCqk=
> update add example.net DNSKEY 256 3 7 AwEAAZn17pUF0KpbPA2c7Gz76Vb18v0teKT3EyAGfBfL8eQ8al35zz3Y I1m/SAQBxIqMfLtIwqWPdgthsu36azGQAX8=
> update add example.net DNSKEY 257 3 7 AwEAAd/7odU/64o2LGsifbLtQmtO8dFDtTAZXSX2+X3e/UNlq9IHq3Y0 XtC0Iuawl/qkaKVxXe2lo8Ct+dM6UehyCqk=
> update add example.net NSEC3PARAM 1 1 100 1234567890
(See <a href="man.dnssec-keygen.html" title="dnssec-keygen"><span class="refentrytitle"><span class="application">dnssec-keygen</span></span>(8)</a> and
<a href="man.dnssec-settime.html" title="dnssec-settime"><span class="refentrytitle"><span class="application">dnssec-settime</span></span>(8)</a> for more information.)
<span><strong class="command">rndc sign</strong></span> or <span><strong class="command">rndc loadkeys</strong></span>
<span><strong class="command">dnssec-keygen</strong></span> or <span><strong class="command">dnssec-settime</strong></span>),
<p>In any secure zone which supports dynamic updates, <span><strong class="command">named</strong></span>
and Usage">the section called “<span><strong class="command">managed-keys</strong></span> Statement Definition
$ <strong class="userinput"><code>dnssec-keygen -K keys -f KSK -P now -A now+2y example.net</code></strong>
and the <span><strong class="command">dnssec-*</strong></span> and <span><strong class="command">pkcs11-*</strong></span>
<span><strong class="command">dnssec-*</strong></span> tools, or the <code class="option">-m</code> in
$ <strong class="userinput"><code> configure --with-crypto-backend=openssl --prefix=/opt/pkcs11/usr --enable-gost </code></strong>
$ <strong class="userinput"><code> /opt/pkcs11/usr/bin/softhsm-util --init-token 0 --slot 0 --label softhsmv2 </code></strong>
$ <strong class="userinput"><code>wget <a href="" target="_top">http://www.openssl.org/source/openssl-0.9.8zc.tar.gz</a></code></strong>
$ <strong class="userinput"><code>cp pkcs11.GCC4.0.2.so.4.05 /opt/pkcs11/usr/lib/libpkcs11.so</code></strong>
and "<span><strong class="command">make test</strong></span>". If "<span><strong class="command">make
$ <strong class="userinput"><code> echo "0:/opt/pkcs11/softhsm.db" > $SOFTHSM_CONF </code></strong>
$ <strong class="userinput"><code> /opt/pkcs11/usr/bin/softhsm --init-token 0 --slot 0 --label softhsm </code></strong>
$ <strong class="userinput"><code>export LD_LIBRARY_PATH=/opt/pkcs11/usr/lib:${LD_LIBRARY_PATH}</code></strong>
$ <strong class="userinput"><code>export KEYPER_LIBRARY_PATH=/opt/Keyper/PKCS11Provider</code></strong>
"sample-ksk" as the key-signing key for "example.net":
$ <strong class="userinput"><code>dnssec-keyfromlabel -l sample-ksk -f KSK example.net</code></strong>
<a href="man.dnssec-keyfromlabel.html" title="dnssec-keyfromlabel"><span class="refentrytitle"><span class="application">dnssec-keyfromlabel</span></span>(8)</a> for details.)
then <span><strong class="command">named</strong></span> must have access to the HSM PIN. In OpenSSL-based PKCS#11,
this is accomplished by placing the PIN into the openssl.cnf file
The location of the openssl.cnf file can be overridden by
Historically, DLZ drivers had to be statically linked with the <span><strong class="command">named</strong></span>
"dlopen" driver is linked into <span><strong class="command">named</strong></span> by default, so configure options
When the DLZ module provides data to <span><strong class="command">named</strong></span>, it does so in text format.
The response is converted to DNS wire format by <span><strong class="command">named</strong></span>. This
dynamically-linkable DLZ module--i.e., one which can be
"example.nil", which can answer queries and AXFR requests, and
example.nil. 1800 IN A 10.53.0.1
e.g., by providing different address records for a particular name
<a name="id2571523"></a>IPv6 Support in <acronym class="acronym">BIND</acronym> 9</h2></div></div></div>
see <a href="Bv9ARM.ch11.html#ipv6addresses" title="IPv6 addresses (AAAA)">the section called “IPv6 addresses (AAAA)”</a>.
$ORIGIN example.com.