Bv9ARM.ch09.html revision 44d0f0256fbdce130a18655023c3b06bacacbd61
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<!--
6ca0e6973c8176100f4a426444823ae5e777e28fsascha - Copyright (C) 2004-2010 Internet Systems Consortium, Inc. ("ISC")
6ca0e6973c8176100f4a426444823ae5e777e28fsascha - Copyright (C) 2000-2003 Internet Software Consortium.
6ca0e6973c8176100f4a426444823ae5e777e28fsascha -
6ca0e6973c8176100f4a426444823ae5e777e28fsascha - Permission to use, copy, modify, and/or distribute this software for any
6ca0e6973c8176100f4a426444823ae5e777e28fsascha - purpose with or without fee is hereby granted, provided that the above
6ca0e6973c8176100f4a426444823ae5e777e28fsascha - copyright notice and this permission notice appear in all copies.
6ca0e6973c8176100f4a426444823ae5e777e28fsascha -
6ca0e6973c8176100f4a426444823ae5e777e28fsascha - THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
6ca0e6973c8176100f4a426444823ae5e777e28fsascha - REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
6ca0e6973c8176100f4a426444823ae5e777e28fsascha - AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
6ca0e6973c8176100f4a426444823ae5e777e28fsascha - INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
6ca0e6973c8176100f4a426444823ae5e777e28fsascha - LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
6ca0e6973c8176100f4a426444823ae5e777e28fsascha - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
6ca0e6973c8176100f4a426444823ae5e777e28fsascha - PERFORMANCE OF THIS SOFTWARE.
6ca0e6973c8176100f4a426444823ae5e777e28fsascha-->
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<!-- $Id: Bv9ARM.ch09.html,v 1.226 2010/02/04 01:14:17 tbox Exp $ -->
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<html>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<head>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<title>Appendix�A.�Appendices</title>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<meta name="generator" content="DocBook XSL Stylesheets V1.71.1">
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<link rel="start" href="Bv9ARM.html" title="BIND 9 Administrator Reference Manual">
22ad84685642948ad15cc1e881ecbc4ac8cbf98cmanoj<link rel="up" href="Bv9ARM.html" title="BIND 9 Administrator Reference Manual">
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<link rel="prev" href="Bv9ARM.ch08.html" title="Chapter�8.�Troubleshooting">
22ad84685642948ad15cc1e881ecbc4ac8cbf98cmanoj<link rel="next" href="Bv9ARM.ch10.html" title="Manual pages">
6ca0e6973c8176100f4a426444823ae5e777e28fsascha</head>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF">
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<div class="navheader">
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<table width="100%" summary="Navigation header">
3a47c2ef905c3b6483279637fb8054ca67c5b6ddsascha<tr><th colspan="3" align="center">Appendix�A.�Appendices</th></tr>
3a47c2ef905c3b6483279637fb8054ca67c5b6ddsascha<tr>
3a47c2ef905c3b6483279637fb8054ca67c5b6ddsascha<td width="20%" align="left">
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<a accesskey="p" href="Bv9ARM.ch08.html">Prev</a>�</td>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<th width="60%" align="center">�</th>
e50587e6b2ff25bdcbe29410be5bf8f4792016eegregames<td width="20%" align="right">�<a accesskey="n" href="Bv9ARM.ch10.html">Next</a>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha</td>
0d9c389e9c63d02edb068917d49af2fa8012af91marc</tr>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha</table>
dadf206a4cf1eccf5c13b64bd9678610dd763868rbb<hr>
dadf206a4cf1eccf5c13b64bd9678610dd763868rbb</div>
a773226ea345018b49d45cf2e076ff2452eead5arbb<div class="appendix" lang="en">
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<div class="titlepage"><div><div><h2 class="title">
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<a name="Bv9ARM.ch09"></a>Appendix�A.�Appendices</h2></div></div></div>
ec9b5c4854a4055d00f5459dbbd879d517f1531dmartin<div class="toc">
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<p><b>Table of Contents</b></p>
5181b311fbd45b65a34b3fddb3ace5fab85f36e4wrowe<dl>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<dt><span class="sect1"><a href="Bv9ARM.ch09.html#id2601612">Acknowledgments</a></span></dt>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<dd><dl><dt><span class="sect2"><a href="Bv9ARM.ch09.html#historical_dns_information">A Brief History of the <acronym class="acronym">DNS</acronym> and <acronym class="acronym">BIND</acronym></a></span></dt></dl></dd>
4cbb3bcf66a6788196bcc7244e4e36705acfbb57rbb<dt><span class="sect1"><a href="Bv9ARM.ch09.html#id2601921">General <acronym class="acronym">DNS</acronym> Reference Information</a></span></dt>
5f69f46ccdf50afd8f0a23f134746e6066185e89rbb<dd><dl><dt><span class="sect2"><a href="Bv9ARM.ch09.html#ipv6addresses">IPv6 addresses (AAAA)</a></span></dt></dl></dd>
12b0070d002520b81a273ae892b9ea08e810b123rbb<dt><span class="sect1"><a href="Bv9ARM.ch09.html#bibliography">Bibliography (and Suggested Reading)</a></span></dt>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<dd><dl>
886cd69ebf69e990dbc365be87ff8ea7cd681904rbb<dt><span class="sect2"><a href="Bv9ARM.ch09.html#rfcs">Request for Comments (RFCs)</a></span></dt>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<dt><span class="sect2"><a href="Bv9ARM.ch09.html#internet_drafts">Internet Drafts</a></span></dt>
305a68a1a5db3cc264077d89b3caa6f923257150fielding<dt><span class="sect2"><a href="Bv9ARM.ch09.html#id2605064">Other Documents About <acronym class="acronym">BIND</acronym></a></span></dt>
7bfe076b680e6e591add6cdc754ce9a6910682a2sascha</dl></dd>
105475009f541187ba7a14a367547d9404c578befielding<dt><span class="sect1"><a href="Bv9ARM.ch09.html#bind9.library">BIND 9 DNS Library Support</a></span></dt>
105475009f541187ba7a14a367547d9404c578befielding<dd><dl>
7bfe076b680e6e591add6cdc754ce9a6910682a2sascha<dt><span class="sect2"><a href="Bv9ARM.ch09.html#id2607411">Prerequisite</a></span></dt>
f07a80771bc5d30b1e0cfcb7256c1a302da77675rbb<dt><span class="sect2"><a href="Bv9ARM.ch09.html#id2607420">Compilation</a></span></dt>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<dt><span class="sect2"><a href="Bv9ARM.ch09.html#id2605329">Installation</a></span></dt>
80e9324586de2fa55e2da4df409e6a85885ea659fielding<dt><span class="sect2"><a href="Bv9ARM.ch09.html#id2605360">Known Defects/Restrictions</a></span></dt>
9022fa73d4ac101553e7c36a1457ead52a73333borlikowski<dt><span class="sect2"><a href="Bv9ARM.ch09.html#id2606529">The dns.conf File</a></span></dt>
9022fa73d4ac101553e7c36a1457ead52a73333borlikowski<dt><span class="sect2"><a href="Bv9ARM.ch09.html#id2606555">Sample Applications</a></span></dt>
105475009f541187ba7a14a367547d9404c578befielding<dt><span class="sect2"><a href="Bv9ARM.ch09.html#id2607528">Library References</a></span></dt>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha</dl></dd>
105475009f541187ba7a14a367547d9404c578befielding</dl>
105475009f541187ba7a14a367547d9404c578befielding</div>
105475009f541187ba7a14a367547d9404c578befielding<div class="sect1" lang="en">
105475009f541187ba7a14a367547d9404c578befielding<div class="titlepage"><div><div><h2 class="title" style="clear: both">
105475009f541187ba7a14a367547d9404c578befielding<a name="id2601612"></a>Acknowledgments</h2></div></div></div>
105475009f541187ba7a14a367547d9404c578befielding<div class="sect2" lang="en">
105475009f541187ba7a14a367547d9404c578befielding<div class="titlepage"><div><div><h3 class="title">
105475009f541187ba7a14a367547d9404c578befielding<a name="historical_dns_information"></a>A Brief History of the <acronym class="acronym">DNS</acronym> and <acronym class="acronym">BIND</acronym>
105475009f541187ba7a14a367547d9404c578befielding</h3></div></div></div>
105475009f541187ba7a14a367547d9404c578befielding<p>
105475009f541187ba7a14a367547d9404c578befielding Although the "official" beginning of the Domain Name
105475009f541187ba7a14a367547d9404c578befielding System occurred in 1984 with the publication of RFC 920, the
6ca0e6973c8176100f4a426444823ae5e777e28fsascha core of the new system was described in 1983 in RFCs 882 and
6ca0e6973c8176100f4a426444823ae5e777e28fsascha 883. From 1984 to 1987, the ARPAnet (the precursor to today's
6ca0e6973c8176100f4a426444823ae5e777e28fsascha Internet) became a testbed of experimentation for developing the
cb5d3f2f217d457dada4883addb1dc9f3f17bb85fielding new naming/addressing scheme in a rapidly expanding,
6a1c919219ae7e3382fb22f1c4cf89f11b4becffcoar operational network environment. New RFCs were written and
ce8d7a0627c0f246376cccd980463f8250a6a97ebjh published in 1987 that modified the original documents to
ce8d7a0627c0f246376cccd980463f8250a6a97ebjh incorporate improvements based on the working model. RFC 1034,
ce8d7a0627c0f246376cccd980463f8250a6a97ebjh "Domain Names-Concepts and Facilities", and RFC 1035, "Domain
ce8d7a0627c0f246376cccd980463f8250a6a97ebjh Names-Implementation and Specification" were published and
cdb58be93a9cbeaba1ebc759b48aa8ed519675a9bjh became the standards upon which all <acronym class="acronym">DNS</acronym> implementations are
6ca0e6973c8176100f4a426444823ae5e777e28fsascha built.
6ca0e6973c8176100f4a426444823ae5e777e28fsascha </p>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<p>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha The first working domain name server, called "Jeeves", was
6ca0e6973c8176100f4a426444823ae5e777e28fsascha written in 1983-84 by Paul Mockapetris for operation on DEC
6ca0e6973c8176100f4a426444823ae5e777e28fsascha Tops-20
6ca0e6973c8176100f4a426444823ae5e777e28fsascha machines located at the University of Southern California's
6ca0e6973c8176100f4a426444823ae5e777e28fsascha Information
6ca0e6973c8176100f4a426444823ae5e777e28fsascha Sciences Institute (USC-ISI) and SRI International's Network
3a47c2ef905c3b6483279637fb8054ca67c5b6ddsascha Information
3a47c2ef905c3b6483279637fb8054ca67c5b6ddsascha Center (SRI-NIC). A <acronym class="acronym">DNS</acronym> server for
3a47c2ef905c3b6483279637fb8054ca67c5b6ddsascha Unix machines, the Berkeley Internet
3a47c2ef905c3b6483279637fb8054ca67c5b6ddsascha Name Domain (<acronym class="acronym">BIND</acronym>) package, was
3a47c2ef905c3b6483279637fb8054ca67c5b6ddsascha written soon after by a group of
96e6cafca226a8a2a64a7bbdc634b5b2679c9e0csascha graduate students at the University of California at Berkeley
22ad84685642948ad15cc1e881ecbc4ac8cbf98cmanoj under
22ad84685642948ad15cc1e881ecbc4ac8cbf98cmanoj a grant from the US Defense Advanced Research Projects
22ad84685642948ad15cc1e881ecbc4ac8cbf98cmanoj Administration
22ad84685642948ad15cc1e881ecbc4ac8cbf98cmanoj (DARPA).
22ad84685642948ad15cc1e881ecbc4ac8cbf98cmanoj </p>
22ad84685642948ad15cc1e881ecbc4ac8cbf98cmanoj<p>
22ad84685642948ad15cc1e881ecbc4ac8cbf98cmanoj Versions of <acronym class="acronym">BIND</acronym> through
22ad84685642948ad15cc1e881ecbc4ac8cbf98cmanoj 4.8.3 were maintained by the Computer
22ad84685642948ad15cc1e881ecbc4ac8cbf98cmanoj Systems Research Group (CSRG) at UC Berkeley. Douglas Terry, Mark
aa811cad2eb3fc01d17a5c8eba274b915ab8cd20manoj Painter, David Riggle and Songnian Zhou made up the initial <acronym class="acronym">BIND</acronym>
b90c64e517df3fe1c97806830f84a30362187f0afielding project team. After that, additional work on the software package
aa811cad2eb3fc01d17a5c8eba274b915ab8cd20manoj was done by Ralph Campbell. Kevin Dunlap, a Digital Equipment
aa811cad2eb3fc01d17a5c8eba274b915ab8cd20manoj Corporation
aa811cad2eb3fc01d17a5c8eba274b915ab8cd20manoj employee on loan to the CSRG, worked on <acronym class="acronym">BIND</acronym> for 2 years, from 1985
b90c64e517df3fe1c97806830f84a30362187f0afielding to 1987. Many other people also contributed to <acronym class="acronym">BIND</acronym> development
aa811cad2eb3fc01d17a5c8eba274b915ab8cd20manoj during that time: Doug Kingston, Craig Partridge, Smoot
e6b0215ca481b00d658a0adfea378c36a67aa088trawick Carl-Mitchell,
e6b0215ca481b00d658a0adfea378c36a67aa088trawick Mike Muuss, Jim Bloom and Mike Schwartz. <acronym class="acronym">BIND</acronym> maintenance was subsequently
e6b0215ca481b00d658a0adfea378c36a67aa088trawick handled by Mike Karels and �ivind Kure.
e6b0215ca481b00d658a0adfea378c36a67aa088trawick </p>
e6b0215ca481b00d658a0adfea378c36a67aa088trawick<p>
aa811cad2eb3fc01d17a5c8eba274b915ab8cd20manoj <acronym class="acronym">BIND</acronym> versions 4.9 and 4.9.1 were
aa811cad2eb3fc01d17a5c8eba274b915ab8cd20manoj released by Digital Equipment
aa811cad2eb3fc01d17a5c8eba274b915ab8cd20manoj Corporation (now Compaq Computer Corporation). Paul Vixie, then
aa811cad2eb3fc01d17a5c8eba274b915ab8cd20manoj a DEC employee, became <acronym class="acronym">BIND</acronym>'s
ec7f09808149aa3a0f9895c29025766d4961a044dougm primary caretaker. He was assisted
b9e4a86f22b3e8666186b9fe08e9241cdaf50d26manoj by Phil Almquist, Robert Elz, Alan Barrett, Paul Albitz, Bryan
b9e4a86f22b3e8666186b9fe08e9241cdaf50d26manoj Beecher, Andrew
d6baa4df51dd4759e4a7d26d3c864d7ef20e08bcmanoj Partan, Andy Cherenson, Tom Limoncelli, Berthold Paffrath, Fuat
aa811cad2eb3fc01d17a5c8eba274b915ab8cd20manoj Baran, Anant Kumar, Art Harkin, Win Treese, Don Lewis, Christophe
aa811cad2eb3fc01d17a5c8eba274b915ab8cd20manoj Wolfhugel, and others.
6ca0e6973c8176100f4a426444823ae5e777e28fsascha </p>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<p>
825ab8e480abebc9528fa3b580df41bc9ec4fbderbb In 1994, <acronym class="acronym">BIND</acronym> version 4.9.2 was sponsored by
6ca0e6973c8176100f4a426444823ae5e777e28fsascha Vixie Enterprises. Paul
6ca0e6973c8176100f4a426444823ae5e777e28fsascha Vixie became <acronym class="acronym">BIND</acronym>'s principal
6ca0e6973c8176100f4a426444823ae5e777e28fsascha architect/programmer.
0af3a77b888861a190b1701079a96469f323e661rbb </p>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<p>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha <acronym class="acronym">BIND</acronym> versions from 4.9.3 onward
6ca0e6973c8176100f4a426444823ae5e777e28fsascha have been developed and maintained
6ca0e6973c8176100f4a426444823ae5e777e28fsascha by the Internet Systems Consortium and its predecessor,
7b4eb92d597c1c5cb679d021b84f06f1e425f41bdgaudet the Internet Software Consortium, with support being provided
6ca0e6973c8176100f4a426444823ae5e777e28fsascha by ISC's sponsors.
6ca0e6973c8176100f4a426444823ae5e777e28fsascha </p>
825ab8e480abebc9528fa3b580df41bc9ec4fbderbb<p>
825ab8e480abebc9528fa3b580df41bc9ec4fbderbb As co-architects/programmers, Bob Halley and
cb5d3f2f217d457dada4883addb1dc9f3f17bb85fielding Paul Vixie released the first production-ready version of
cb5d3f2f217d457dada4883addb1dc9f3f17bb85fielding <acronym class="acronym">BIND</acronym> version 8 in May 1997.
825ab8e480abebc9528fa3b580df41bc9ec4fbderbb </p>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<p>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha BIND version 9 was released in September 2000 and is a
6ca0e6973c8176100f4a426444823ae5e777e28fsascha major rewrite of nearly all aspects of the underlying
6ca0e6973c8176100f4a426444823ae5e777e28fsascha BIND architecture.
6ca0e6973c8176100f4a426444823ae5e777e28fsascha </p>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<p>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha BIND versions 4 and 8 are officially deprecated.
6ca0e6973c8176100f4a426444823ae5e777e28fsascha No additional development is done
6ca0e6973c8176100f4a426444823ae5e777e28fsascha on BIND version 4 or BIND version 8.
6ca0e6973c8176100f4a426444823ae5e777e28fsascha </p>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<p>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha <acronym class="acronym">BIND</acronym> development work is made
6ca0e6973c8176100f4a426444823ae5e777e28fsascha possible today by the sponsorship
1606d7656cbc08d3f3777edbdec4a7e4f9ede0a8rbb of several corporations, and by the tireless work efforts of
6ca0e6973c8176100f4a426444823ae5e777e28fsascha numerous individuals.
6ca0e6973c8176100f4a426444823ae5e777e28fsascha </p>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha</div>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha</div>
1606d7656cbc08d3f3777edbdec4a7e4f9ede0a8rbb<div class="sect1" lang="en">
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<div class="titlepage"><div><div><h2 class="title" style="clear: both">
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<a name="id2601921"></a>General <acronym class="acronym">DNS</acronym> Reference Information</h2></div></div></div>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<div class="sect2" lang="en">
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<div class="titlepage"><div><div><h3 class="title">
832935ea1f5cc1b21d72674929eef16ed80437d6martin<a name="ipv6addresses"></a>IPv6 addresses (AAAA)</h3></div></div></div>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<p>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha IPv6 addresses are 128-bit identifiers for interfaces and
6ca0e6973c8176100f4a426444823ae5e777e28fsascha sets of interfaces which were introduced in the <acronym class="acronym">DNS</acronym> to facilitate
7bfe076b680e6e591add6cdc754ce9a6910682a2sascha scalable Internet routing. There are three types of addresses: <span class="emphasis"><em>Unicast</em></span>,
6ca0e6973c8176100f4a426444823ae5e777e28fsascha an identifier for a single interface;
6ca0e6973c8176100f4a426444823ae5e777e28fsascha <span class="emphasis"><em>Anycast</em></span>,
6ca0e6973c8176100f4a426444823ae5e777e28fsascha an identifier for a set of interfaces; and <span class="emphasis"><em>Multicast</em></span>,
6ca0e6973c8176100f4a426444823ae5e777e28fsascha an identifier for a set of interfaces. Here we describe the global
d0211374a981173d4537e3f919c708b5f64040fcgstein Unicast address scheme. For more information, see RFC 3587,
6ca0e6973c8176100f4a426444823ae5e777e28fsascha "Global Unicast Address Format."
6ca0e6973c8176100f4a426444823ae5e777e28fsascha </p>
d0211374a981173d4537e3f919c708b5f64040fcgstein<p>
d0211374a981173d4537e3f919c708b5f64040fcgstein IPv6 unicast addresses consist of a
d0211374a981173d4537e3f919c708b5f64040fcgstein <span class="emphasis"><em>global routing prefix</em></span>, a
d0211374a981173d4537e3f919c708b5f64040fcgstein <span class="emphasis"><em>subnet identifier</em></span>, and an
d0211374a981173d4537e3f919c708b5f64040fcgstein <span class="emphasis"><em>interface identifier</em></span>.
d0211374a981173d4537e3f919c708b5f64040fcgstein </p>
d0211374a981173d4537e3f919c708b5f64040fcgstein<p>
d0211374a981173d4537e3f919c708b5f64040fcgstein The global routing prefix is provided by the
d0211374a981173d4537e3f919c708b5f64040fcgstein upstream provider or ISP, and (roughly) corresponds to the
d0211374a981173d4537e3f919c708b5f64040fcgstein IPv4 <span class="emphasis"><em>network</em></span> section
d0211374a981173d4537e3f919c708b5f64040fcgstein of the address range.
6ca0e6973c8176100f4a426444823ae5e777e28fsascha
6ca0e6973c8176100f4a426444823ae5e777e28fsascha The subnet identifier is for local subnetting, much the
7a9190dfde3a06f271dc6c4f4830c1a5440efef8fanf same as subnetting an
d0211374a981173d4537e3f919c708b5f64040fcgstein IPv4 /16 network into /24 subnets.
7a9190dfde3a06f271dc6c4f4830c1a5440efef8fanf
d0211374a981173d4537e3f919c708b5f64040fcgstein The interface identifier is the address of an individual
71cd8b65badad4cda51aa7eaba1dea44f78190c7jerenkrantz interface on a given network; in IPv6, addresses belong to
71cd8b65badad4cda51aa7eaba1dea44f78190c7jerenkrantz interfaces rather than to machines.
71cd8b65badad4cda51aa7eaba1dea44f78190c7jerenkrantz </p>
71cd8b65badad4cda51aa7eaba1dea44f78190c7jerenkrantz<p>
71cd8b65badad4cda51aa7eaba1dea44f78190c7jerenkrantz The subnetting capability of IPv6 is much more flexible than
71cd8b65badad4cda51aa7eaba1dea44f78190c7jerenkrantz that of IPv4: subnetting can be carried out on bit boundaries,
71cd8b65badad4cda51aa7eaba1dea44f78190c7jerenkrantz in much the same way as Classless InterDomain Routing
d0211374a981173d4537e3f919c708b5f64040fcgstein (CIDR), and the DNS PTR representation ("nibble" format)
68de907078051f290050b089c0570d8167b3500dgstein makes setting up reverse zones easier.
68de907078051f290050b089c0570d8167b3500dgstein </p>
68de907078051f290050b089c0570d8167b3500dgstein<p>
d0211374a981173d4537e3f919c708b5f64040fcgstein The Interface Identifier must be unique on the local link,
68de907078051f290050b089c0570d8167b3500dgstein and is usually generated automatically by the IPv6
d0211374a981173d4537e3f919c708b5f64040fcgstein implementation, although it is usually possible to
d0211374a981173d4537e3f919c708b5f64040fcgstein override the default setting if necessary. A typical IPv6
68de907078051f290050b089c0570d8167b3500dgstein address might look like:
68de907078051f290050b089c0570d8167b3500dgstein <span><strong class="command">2001:db8:201:9:a00:20ff:fe81:2b32</strong></span>
d0211374a981173d4537e3f919c708b5f64040fcgstein </p>
d0211374a981173d4537e3f919c708b5f64040fcgstein<p>
68de907078051f290050b089c0570d8167b3500dgstein IPv6 address specifications often contain long strings
d0211374a981173d4537e3f919c708b5f64040fcgstein of zeros, so the architects have included a shorthand for
d0211374a981173d4537e3f919c708b5f64040fcgstein specifying
855aa233fcb7b51d738fca5c36585646ae1960c3jerenkrantz them. The double colon (`::') indicates the longest possible
855aa233fcb7b51d738fca5c36585646ae1960c3jerenkrantz string
855aa233fcb7b51d738fca5c36585646ae1960c3jerenkrantz of zeros that can fit, and can be used only once in an address.
855aa233fcb7b51d738fca5c36585646ae1960c3jerenkrantz </p>
855aa233fcb7b51d738fca5c36585646ae1960c3jerenkrantz</div>
855aa233fcb7b51d738fca5c36585646ae1960c3jerenkrantz</div>
855aa233fcb7b51d738fca5c36585646ae1960c3jerenkrantz<div class="sect1" lang="en">
71cd8b65badad4cda51aa7eaba1dea44f78190c7jerenkrantz<div class="titlepage"><div><div><h2 class="title" style="clear: both">
71cd8b65badad4cda51aa7eaba1dea44f78190c7jerenkrantz<a name="bibliography"></a>Bibliography (and Suggested Reading)</h2></div></div></div>
71cd8b65badad4cda51aa7eaba1dea44f78190c7jerenkrantz<div class="sect2" lang="en">
71cd8b65badad4cda51aa7eaba1dea44f78190c7jerenkrantz<div class="titlepage"><div><div><h3 class="title">
71cd8b65badad4cda51aa7eaba1dea44f78190c7jerenkrantz<a name="rfcs"></a>Request for Comments (RFCs)</h3></div></div></div>
855aa233fcb7b51d738fca5c36585646ae1960c3jerenkrantz<p>
855aa233fcb7b51d738fca5c36585646ae1960c3jerenkrantz Specification documents for the Internet protocol suite, including
d0211374a981173d4537e3f919c708b5f64040fcgstein the <acronym class="acronym">DNS</acronym>, are published as part of
6ca0e6973c8176100f4a426444823ae5e777e28fsascha the Request for Comments (RFCs)
6ca0e6973c8176100f4a426444823ae5e777e28fsascha series of technical notes. The standards themselves are defined
6ca0e6973c8176100f4a426444823ae5e777e28fsascha by the Internet Engineering Task Force (IETF) and the Internet
6ca0e6973c8176100f4a426444823ae5e777e28fsascha Engineering Steering Group (IESG). RFCs can be obtained online via FTP at:
f07a80771bc5d30b1e0cfcb7256c1a302da77675rbb </p>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<p>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha <a href="ftp://www.isi.edu/in-notes/" target="_top">
6ca0e6973c8176100f4a426444823ae5e777e28fsascha ftp://www.isi.edu/in-notes/RFC<em class="replaceable"><code>xxxx</code></em>.txt
df349d5fc2ae7d106b058fe779c7ea4d19ee0588trawick </a>
c803b0d84b48f151504b87ec3f196cb433149592rbb </p>
c803b0d84b48f151504b87ec3f196cb433149592rbb<p>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha (where <em class="replaceable"><code>xxxx</code></em> is
6ca0e6973c8176100f4a426444823ae5e777e28fsascha the number of the RFC). RFCs are also available via the Web at:
6ca0e6973c8176100f4a426444823ae5e777e28fsascha </p>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<p>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha <a href="http://www.ietf.org/rfc/" target="_top">http://www.ietf.org/rfc/</a>.
6ca0e6973c8176100f4a426444823ae5e777e28fsascha </p>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<div class="bibliography">
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<div class="titlepage"><div><div><h4 class="title">
02310171693a3c0138ab617c74fae72eaf9ff4degstein<a name="id2602040"></a>Bibliography</h4></div></div></div>
7c2d1ecc95b2213a3fd449b2549999ed6f19f6berbb<div class="bibliodiv">
6a1c919219ae7e3382fb22f1c4cf89f11b4becffcoar<h3 class="title">Standards</h3>
6a1c919219ae7e3382fb22f1c4cf89f11b4becffcoar<div class="biblioentry">
6a1c919219ae7e3382fb22f1c4cf89f11b4becffcoar<a name="id2602051"></a><p>[<abbr class="abbrev">RFC974</abbr>] <span class="author"><span class="firstname">C.</span> <span class="surname">Partridge</span>. </span><span class="title"><i>Mail Routing and the Domain System</i>. </span><span class="pubdate">January 1986. </span></p>
7c2d1ecc95b2213a3fd449b2549999ed6f19f6berbb</div>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<div class="biblioentry">
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<a name="id2602074"></a><p>[<abbr class="abbrev">RFC1034</abbr>] <span class="author"><span class="firstname">P.V.</span> <span class="surname">Mockapetris</span>. </span><span class="title"><i>Domain Names &#8212; Concepts and Facilities</i>. </span><span class="pubdate">November 1987. </span></p>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha</div>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<div class="biblioentry">
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<a name="id2602098"></a><p>[<abbr class="abbrev">RFC1035</abbr>] <span class="author"><span class="firstname">P. V.</span> <span class="surname">Mockapetris</span>. </span><span class="title"><i>Domain Names &#8212; Implementation and
6ca0e6973c8176100f4a426444823ae5e777e28fsascha Specification</i>. </span><span class="pubdate">November 1987. </span></p>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha</div>
03cab97a25239933bc85c7c79813846f424bde43rbb</div>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<div class="bibliodiv">
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<h3 class="title">
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<a name="proposed_standards"></a>Proposed Standards</h3>
5181b311fbd45b65a34b3fddb3ace5fab85f36e4wrowe<div class="biblioentry">
5181b311fbd45b65a34b3fddb3ace5fab85f36e4wrowe<a name="id2602134"></a><p>[<abbr class="abbrev">RFC2181</abbr>] <span class="author"><span class="firstname">R., R. Bush</span> <span class="surname">Elz</span>. </span><span class="title"><i>Clarifications to the <acronym class="acronym">DNS</acronym>
5181b311fbd45b65a34b3fddb3ace5fab85f36e4wrowe Specification</i>. </span><span class="pubdate">July 1997. </span></p>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha</div>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<div class="biblioentry">
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<a name="id2602161"></a><p>[<abbr class="abbrev">RFC2308</abbr>] <span class="author"><span class="firstname">M.</span> <span class="surname">Andrews</span>. </span><span class="title"><i>Negative Caching of <acronym class="acronym">DNS</acronym>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha Queries</i>. </span><span class="pubdate">March 1998. </span></p>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha</div>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<div class="biblioentry">
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<a name="id2602186"></a><p>[<abbr class="abbrev">RFC1995</abbr>] <span class="author"><span class="firstname">M.</span> <span class="surname">Ohta</span>. </span><span class="title"><i>Incremental Zone Transfer in <acronym class="acronym">DNS</acronym></i>. </span><span class="pubdate">August 1996. </span></p>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha</div>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<div class="biblioentry">
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<a name="id2602211"></a><p>[<abbr class="abbrev">RFC1996</abbr>] <span class="author"><span class="firstname">P.</span> <span class="surname">Vixie</span>. </span><span class="title"><i>A Mechanism for Prompt Notification of Zone Changes</i>. </span><span class="pubdate">August 1996. </span></p>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha</div>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<div class="biblioentry">
bf078a3439b4597ad13a6820df5f9b2cd3267652trawick<a name="id2602234"></a><p>[<abbr class="abbrev">RFC2136</abbr>] <span class="authorgroup"><span class="firstname">P.</span> <span class="surname">Vixie</span>, <span class="firstname">S.</span> <span class="surname">Thomson</span>, <span class="firstname">Y.</span> <span class="surname">Rekhter</span>, and <span class="firstname">J.</span> <span class="surname">Bound</span>. </span><span class="title"><i>Dynamic Updates in the Domain Name System</i>. </span><span class="pubdate">April 1997. </span></p>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha</div>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<div class="biblioentry">
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<a name="id2602290"></a><p>[<abbr class="abbrev">RFC2671</abbr>] <span class="authorgroup"><span class="firstname">P.</span> <span class="surname">Vixie</span>. </span><span class="title"><i>Extension Mechanisms for DNS (EDNS0)</i>. </span><span class="pubdate">August 1997. </span></p>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha</div>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<div class="biblioentry">
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<a name="id2602316"></a><p>[<abbr class="abbrev">RFC2672</abbr>] <span class="authorgroup"><span class="firstname">M.</span> <span class="surname">Crawford</span>. </span><span class="title"><i>Non-Terminal DNS Name Redirection</i>. </span><span class="pubdate">August 1999. </span></p>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha</div>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<div class="biblioentry">
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<a name="id2602343"></a><p>[<abbr class="abbrev">RFC2845</abbr>] <span class="authorgroup"><span class="firstname">P.</span> <span class="surname">Vixie</span>, <span class="firstname">O.</span> <span class="surname">Gudmundsson</span>, <span class="firstname">D.</span> <span class="surname">Eastlake</span>, <span class="lineage">3rd</span>, and <span class="firstname">B.</span> <span class="surname">Wellington</span>. </span><span class="title"><i>Secret Key Transaction Authentication for <acronym class="acronym">DNS</acronym> (TSIG)</i>. </span><span class="pubdate">May 2000. </span></p>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha</div>
dadf206a4cf1eccf5c13b64bd9678610dd763868rbb<div class="biblioentry">
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<a name="id2602405"></a><p>[<abbr class="abbrev">RFC2930</abbr>] <span class="authorgroup"><span class="firstname">D.</span> <span class="surname">Eastlake</span>, <span class="lineage">3rd</span>. </span><span class="title"><i>Secret Key Establishment for DNS (TKEY RR)</i>. </span><span class="pubdate">September 2000. </span></p>
dadf206a4cf1eccf5c13b64bd9678610dd763868rbb</div>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<div class="biblioentry">
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<a name="id2602435"></a><p>[<abbr class="abbrev">RFC2931</abbr>] <span class="authorgroup"><span class="firstname">D.</span> <span class="surname">Eastlake</span>, <span class="lineage">3rd</span>. </span><span class="title"><i>DNS Request and Transaction Signatures (SIG(0)s)</i>. </span><span class="pubdate">September 2000. </span></p>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha</div>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<div class="biblioentry">
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<a name="id2602465"></a><p>[<abbr class="abbrev">RFC3007</abbr>] <span class="authorgroup"><span class="firstname">B.</span> <span class="surname">Wellington</span>. </span><span class="title"><i>Secure Domain Name System (DNS) Dynamic Update</i>. </span><span class="pubdate">November 2000. </span></p>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha</div>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<div class="biblioentry">
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<a name="id2602491"></a><p>[<abbr class="abbrev">RFC3645</abbr>] <span class="authorgroup"><span class="firstname">S.</span> <span class="surname">Kwan</span>, <span class="firstname">P.</span> <span class="surname">Garg</span>, <span class="firstname">J.</span> <span class="surname">Gilroy</span>, <span class="firstname">L.</span> <span class="surname">Esibov</span>, <span class="firstname">J.</span> <span class="surname">Westhead</span>, and <span class="firstname">R.</span> <span class="surname">Hall</span>. </span><span class="title"><i>Generic Security Service Algorithm for Secret
6ca0e6973c8176100f4a426444823ae5e777e28fsascha Key Transaction Authentication for DNS
6ca0e6973c8176100f4a426444823ae5e777e28fsascha (GSS-TSIG)</i>. </span><span class="pubdate">October 2003. </span></p>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha</div>
24f5b94863535532bfede80f84e2a6095dda56d2rbb</div>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<div class="bibliodiv">
24f5b94863535532bfede80f84e2a6095dda56d2rbb<h3 class="title">
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<acronym class="acronym">DNS</acronym> Security Proposed Standards</h3>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<div class="biblioentry">
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<a name="id2602573"></a><p>[<abbr class="abbrev">RFC3225</abbr>] <span class="authorgroup"><span class="firstname">D.</span> <span class="surname">Conrad</span>. </span><span class="title"><i>Indicating Resolver Support of DNSSEC</i>. </span><span class="pubdate">December 2001. </span></p>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha</div>
d0211374a981173d4537e3f919c708b5f64040fcgstein<div class="biblioentry">
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<a name="id2602600"></a><p>[<abbr class="abbrev">RFC3833</abbr>] <span class="authorgroup"><span class="firstname">D.</span> <span class="surname">Atkins</span> and <span class="firstname">R.</span> <span class="surname">Austein</span>. </span><span class="title"><i>Threat Analysis of the Domain Name System (DNS)</i>. </span><span class="pubdate">August 2004. </span></p>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha</div>
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<div class="biblioentry">
6ca0e6973c8176100f4a426444823ae5e777e28fsascha<a name="id2602636"></a><p>[<abbr class="abbrev">RFC4033</abbr>] <span class="authorgroup"><span class="firstname">R.</span> <span class="surname">Arends</span>, <span class="firstname">R.</span> <span class="surname">Austein</span>, <span class="firstname">M.</span> <span class="surname">Larson</span>, <span class="firstname">D.</span> <span class="surname">Massey</span>, and <span class="firstname">S.</span> <span class="surname">Rose</span>. </span><span class="title"><i>DNS Security Introduction and Requirements</i>. </span><span class="pubdate">March 2005. </span></p>
d0211374a981173d4537e3f919c708b5f64040fcgstein</div>
d0211374a981173d4537e3f919c708b5f64040fcgstein<div class="biblioentry">
d0211374a981173d4537e3f919c708b5f64040fcgstein<a name="id2602701"></a><p>[<abbr class="abbrev">RFC4034</abbr>] <span class="authorgroup"><span class="firstname">R.</span> <span class="surname">Arends</span>, <span class="firstname">R.</span> <span class="surname">Austein</span>, <span class="firstname">M.</span> <span class="surname">Larson</span>, <span class="firstname">D.</span> <span class="surname">Massey</span>, and <span class="firstname">S.</span> <span class="surname">Rose</span>. </span><span class="title"><i>Resource Records for the DNS Security Extensions</i>. </span><span class="pubdate">March 2005. </span></p>
d0211374a981173d4537e3f919c708b5f64040fcgstein</div>
d0211374a981173d4537e3f919c708b5f64040fcgstein<div class="biblioentry">
d0211374a981173d4537e3f919c708b5f64040fcgstein<a name="id2602766"></a><p>[<abbr class="abbrev">RFC4035</abbr>] <span class="authorgroup"><span class="firstname">R.</span> <span class="surname">Arends</span>, <span class="firstname">R.</span> <span class="surname">Austein</span>, <span class="firstname">M.</span> <span class="surname">Larson</span>, <span class="firstname">D.</span> <span class="surname">Massey</span>, and <span class="firstname">S.</span> <span class="surname">Rose</span>. </span><span class="title"><i>Protocol Modifications for the DNS
d0211374a981173d4537e3f919c708b5f64040fcgstein Security Extensions</i>. </span><span class="pubdate">March 2005. </span></p>
d0211374a981173d4537e3f919c708b5f64040fcgstein</div>
d0211374a981173d4537e3f919c708b5f64040fcgstein</div>
d0211374a981173d4537e3f919c708b5f64040fcgstein<div class="bibliodiv">
d0211374a981173d4537e3f919c708b5f64040fcgstein<h3 class="title">Other Important RFCs About <acronym class="acronym">DNS</acronym>
d0211374a981173d4537e3f919c708b5f64040fcgstein Implementation</h3>
d0211374a981173d4537e3f919c708b5f64040fcgstein<div class="biblioentry">
d0211374a981173d4537e3f919c708b5f64040fcgstein<a name="id2602840"></a><p>[<abbr class="abbrev">RFC1535</abbr>] <span class="author"><span class="firstname">E.</span> <span class="surname">Gavron</span>. </span><span class="title"><i>A Security Problem and Proposed Correction With Widely
d0211374a981173d4537e3f919c708b5f64040fcgstein Deployed <acronym class="acronym">DNS</acronym> Software.</i>. </span><span class="pubdate">October 1993. </span></p>
d0211374a981173d4537e3f919c708b5f64040fcgstein</div>
d0211374a981173d4537e3f919c708b5f64040fcgstein<div class="biblioentry">
d0211374a981173d4537e3f919c708b5f64040fcgstein<a name="id2602866"></a><p>[<abbr class="abbrev">RFC1536</abbr>] <span class="authorgroup"><span class="firstname">A.</span> <span class="surname">Kumar</span>, <span class="firstname">J.</span> <span class="surname">Postel</span>, <span class="firstname">C.</span> <span class="surname">Neuman</span>, <span class="firstname">P.</span> <span class="surname">Danzig</span>, and <span class="firstname">S.</span> <span class="surname">Miller</span>. </span><span class="title"><i>Common <acronym class="acronym">DNS</acronym> Implementation
d0211374a981173d4537e3f919c708b5f64040fcgstein Errors and Suggested Fixes</i>. </span><span class="pubdate">October 1993. </span></p>
d0211374a981173d4537e3f919c708b5f64040fcgstein</div>
d0211374a981173d4537e3f919c708b5f64040fcgstein<div class="biblioentry">
98fde0d0b2576b57adedb21b7cb2fbbc765df7e1trawick<a name="id2602934"></a><p>[<abbr class="abbrev">RFC1982</abbr>] <span class="authorgroup"><span class="firstname">R.</span> <span class="surname">Elz</span> and <span class="firstname">R.</span> <span class="surname">Bush</span>. </span><span class="title"><i>Serial Number Arithmetic</i>. </span><span class="pubdate">August 1996. </span></p>
d0211374a981173d4537e3f919c708b5f64040fcgstein</div>
d0211374a981173d4537e3f919c708b5f64040fcgstein<div class="biblioentry">
d0211374a981173d4537e3f919c708b5f64040fcgstein<a name="id2602969"></a><p>[<abbr class="abbrev">RFC4074</abbr>] <span class="authorgroup"><span class="firstname">Y.</span> <span class="surname">Morishita</span> and <span class="firstname">T.</span> <span class="surname">Jinmei</span>. </span><span class="title"><i>Common Misbehaviour Against <acronym class="acronym">DNS</acronym>
d0211374a981173d4537e3f919c708b5f64040fcgstein Queries for IPv6 Addresses</i>. </span><span class="pubdate">May 2005. </span></p>
0f47ee3ae8ede113e11f21bf34f3b11161d3e61drasmus</div>
78e8f0ef042921ab37fdf14ba9babfdd03c8c5dbrbb</div>
7bfe076b680e6e591add6cdc754ce9a6910682a2sascha<div class="bibliodiv">
7bfe076b680e6e591add6cdc754ce9a6910682a2sascha<h3 class="title">Resource Record Types</h3>
7bfe076b680e6e591add6cdc754ce9a6910682a2sascha<div class="biblioentry">
7bfe076b680e6e591add6cdc754ce9a6910682a2sascha<a name="id2603015"></a><p>[<abbr class="abbrev">RFC1183</abbr>] <span class="authorgroup"><span class="firstname">C.F.</span> <span class="surname">Everhart</span>, <span class="firstname">L. A.</span> <span class="surname">Mamakos</span>, <span class="firstname">R.</span> <span class="surname">Ullmann</span>, and <span class="firstname">P.</span> <span class="surname">Mockapetris</span>. </span><span class="title"><i>New <acronym class="acronym">DNS</acronym> RR Definitions</i>. </span><span class="pubdate">October 1990. </span></p>
7bfe076b680e6e591add6cdc754ce9a6910682a2sascha</div>
7bfe076b680e6e591add6cdc754ce9a6910682a2sascha<div class="biblioentry">
7bfe076b680e6e591add6cdc754ce9a6910682a2sascha<a name="id2603073"></a><p>[<abbr class="abbrev">RFC1706</abbr>] <span class="authorgroup"><span class="firstname">B.</span> <span class="surname">Manning</span> and <span class="firstname">R.</span> <span class="surname">Colella</span>. </span><span class="title"><i><acronym class="acronym">DNS</acronym> NSAP Resource Records</i>. </span><span class="pubdate">October 1994. </span></p>
11ce1f263fdd8812189b85930874943f9fa81bd5fielding</div>
11ce1f263fdd8812189b85930874943f9fa81bd5fielding<div class="biblioentry">
11ce1f263fdd8812189b85930874943f9fa81bd5fielding<a name="id2603178"></a><p>[<abbr class="abbrev">RFC2168</abbr>] <span class="authorgroup"><span class="firstname">R.</span> <span class="surname">Daniel</span> and <span class="firstname">M.</span> <span class="surname">Mealling</span>. </span><span class="title"><i>Resolution of Uniform Resource Identifiers using
11ce1f263fdd8812189b85930874943f9fa81bd5fielding the Domain Name System</i>. </span><span class="pubdate">June 1997. </span></p>
11ce1f263fdd8812189b85930874943f9fa81bd5fielding</div>
11ce1f263fdd8812189b85930874943f9fa81bd5fielding<div class="biblioentry">
11ce1f263fdd8812189b85930874943f9fa81bd5fielding<a name="id2603213"></a><p>[<abbr class="abbrev">RFC1876</abbr>] <span class="authorgroup"><span class="firstname">C.</span> <span class="surname">Davis</span>, <span class="firstname">P.</span> <span class="surname">Vixie</span>, <span class="firstname">T.</span>, and <span class="firstname">I.</span> <span class="surname">Dickinson</span>. </span><span class="title"><i>A Means for Expressing Location Information in the
11ce1f263fdd8812189b85930874943f9fa81bd5fielding Domain
11ce1f263fdd8812189b85930874943f9fa81bd5fielding Name System</i>. </span><span class="pubdate">January 1996. </span></p>
11ce1f263fdd8812189b85930874943f9fa81bd5fielding</div>
11ce1f263fdd8812189b85930874943f9fa81bd5fielding<div class="biblioentry">
7753e1f66119f5c483dd8cd1db8e0a7abd7c28c1fielding<a name="id2603268"></a><p>[<abbr class="abbrev">RFC2052</abbr>] <span class="authorgroup"><span class="firstname">A.</span> <span class="surname">Gulbrandsen</span> and <span class="firstname">P.</span> <span class="surname">Vixie</span>. </span><span class="title"><i>A <acronym class="acronym">DNS</acronym> RR for Specifying the
11ce1f263fdd8812189b85930874943f9fa81bd5fielding Location of
11ce1f263fdd8812189b85930874943f9fa81bd5fielding Services.</i>. </span><span class="pubdate">October 1996. </span></p>
11ce1f263fdd8812189b85930874943f9fa81bd5fielding</div>
11ce1f263fdd8812189b85930874943f9fa81bd5fielding<div class="biblioentry">
11ce1f263fdd8812189b85930874943f9fa81bd5fielding<a name="id2603306"></a><p>[<abbr class="abbrev">RFC2163</abbr>] <span class="author"><span class="firstname">A.</span> <span class="surname">Allocchio</span>. </span><span class="title"><i>Using the Internet <acronym class="acronym">DNS</acronym> to
11ce1f263fdd8812189b85930874943f9fa81bd5fielding Distribute MIXER
11ce1f263fdd8812189b85930874943f9fa81bd5fielding Conformant Global Address Mapping</i>. </span><span class="pubdate">January 1998. </span></p>
11ce1f263fdd8812189b85930874943f9fa81bd5fielding</div>
11ce1f263fdd8812189b85930874943f9fa81bd5fielding<div class="biblioentry">
11ce1f263fdd8812189b85930874943f9fa81bd5fielding<a name="id2603332"></a><p>[<abbr class="abbrev">RFC2230</abbr>] <span class="author"><span class="firstname">R.</span> <span class="surname">Atkinson</span>. </span><span class="title"><i>Key Exchange Delegation Record for the <acronym class="acronym">DNS</acronym></i>. </span><span class="pubdate">October 1997. </span></p>
11ce1f263fdd8812189b85930874943f9fa81bd5fielding</div>
11ce1f263fdd8812189b85930874943f9fa81bd5fielding<div class="biblioentry">
11ce1f263fdd8812189b85930874943f9fa81bd5fielding<a name="id2603357"></a><p>[<abbr class="abbrev">RFC2536</abbr>] <span class="author"><span class="firstname">D.</span> <span class="surname">Eastlake</span>, <span class="lineage">3rd</span>. </span><span class="title"><i>DSA KEYs and SIGs in the Domain Name System (DNS)</i>. </span><span class="pubdate">March 1999. </span></p>
0b64bc833d9ece31e1ce6a05ea0136742b280a25martin</div>
febbe558e62e212f2f451b6528996433b272cc21martin<div class="biblioentry">
11ce1f263fdd8812189b85930874943f9fa81bd5fielding<a name="id2603384"></a><p>[<abbr class="abbrev">RFC2537</abbr>] <span class="author"><span class="firstname">D.</span> <span class="surname">Eastlake</span>, <span class="lineage">3rd</span>. </span><span class="title"><i>RSA/MD5 KEYs and SIGs in the Domain Name System (DNS)</i>. </span><span class="pubdate">March 1999. </span></p>
11ce1f263fdd8812189b85930874943f9fa81bd5fielding</div>
11ce1f263fdd8812189b85930874943f9fa81bd5fielding<div class="biblioentry">
11ce1f263fdd8812189b85930874943f9fa81bd5fielding<a name="id2603411"></a><p>[<abbr class="abbrev">RFC2538</abbr>] <span class="authorgroup"><span class="firstname">D.</span> <span class="surname">Eastlake</span>, <span class="lineage">3rd</span> and <span class="firstname">O.</span> <span class="surname">Gudmundsson</span>. </span><span class="title"><i>Storing Certificates in the Domain Name System (DNS)</i>. </span><span class="pubdate">March 1999. </span></p>
11ce1f263fdd8812189b85930874943f9fa81bd5fielding</div>
11ce1f263fdd8812189b85930874943f9fa81bd5fielding<div class="biblioentry">
11ce1f263fdd8812189b85930874943f9fa81bd5fielding<a name="id2603450"></a><p>[<abbr class="abbrev">RFC2539</abbr>] <span class="authorgroup"><span class="firstname">D.</span> <span class="surname">Eastlake</span>, <span class="lineage">3rd</span>. </span><span class="title"><i>Storage of Diffie-Hellman Keys in the Domain Name System (DNS)</i>. </span><span class="pubdate">March 1999. </span></p>
11ce1f263fdd8812189b85930874943f9fa81bd5fielding</div>
11ce1f263fdd8812189b85930874943f9fa81bd5fielding<div class="biblioentry">
11ce1f263fdd8812189b85930874943f9fa81bd5fielding<a name="id2603480"></a><p>[<abbr class="abbrev">RFC2540</abbr>] <span class="authorgroup"><span class="firstname">D.</span> <span class="surname">Eastlake</span>, <span class="lineage">3rd</span>. </span><span class="title"><i>Detached Domain Name System (DNS) Information</i>. </span><span class="pubdate">March 1999. </span></p>
7a10502c7e7e9340cd02c15583aa534a39d0c2f0fielding</div>
7a10502c7e7e9340cd02c15583aa534a39d0c2f0fielding<div class="biblioentry">
7a10502c7e7e9340cd02c15583aa534a39d0c2f0fielding<a name="id2603510"></a><p>[<abbr class="abbrev">RFC2782</abbr>] <span class="author"><span class="firstname">A.</span> <span class="surname">Gulbrandsen</span>. </span><span class="author"><span class="firstname">P.</span> <span class="surname">Vixie</span>. </span><span class="author"><span class="firstname">L.</span> <span class="surname">Esibov</span>. </span><span class="title"><i>A DNS RR for specifying the location of services (DNS SRV)</i>. </span><span class="pubdate">February 2000. </span></p>
11ce1f263fdd8812189b85930874943f9fa81bd5fielding</div>
11ce1f263fdd8812189b85930874943f9fa81bd5fielding<div class="biblioentry">
11ce1f263fdd8812189b85930874943f9fa81bd5fielding<a name="id2603553"></a><p>[<abbr class="abbrev">RFC2915</abbr>] <span class="author"><span class="firstname">M.</span> <span class="surname">Mealling</span>. </span><span class="author"><span class="firstname">R.</span> <span class="surname">Daniel</span>. </span><span class="title"><i>The Naming Authority Pointer (NAPTR) DNS Resource Record</i>. </span><span class="pubdate">September 2000. </span></p>
11ce1f263fdd8812189b85930874943f9fa81bd5fielding</div>
11ce1f263fdd8812189b85930874943f9fa81bd5fielding<div class="biblioentry">
11ce1f263fdd8812189b85930874943f9fa81bd5fielding<a name="id2603586"></a><p>[<abbr class="abbrev">RFC3110</abbr>] <span class="author"><span class="firstname">D.</span> <span class="surname">Eastlake</span>, <span class="lineage">3rd</span>. </span><span class="title"><i>RSA/SHA-1 SIGs and RSA KEYs in the Domain Name System (DNS)</i>. </span><span class="pubdate">May 2001. </span></p>
11ce1f263fdd8812189b85930874943f9fa81bd5fielding</div>
11ce1f263fdd8812189b85930874943f9fa81bd5fielding<div class="biblioentry">
11ce1f263fdd8812189b85930874943f9fa81bd5fielding<a name="id2603612"></a><p>[<abbr class="abbrev">RFC3123</abbr>] <span class="author"><span class="firstname">P.</span> <span class="surname">Koch</span>. </span><span class="title"><i>A DNS RR Type for Lists of Address Prefixes (APL RR)</i>. </span><span class="pubdate">June 2001. </span></p>
11ce1f263fdd8812189b85930874943f9fa81bd5fielding</div>
11ce1f263fdd8812189b85930874943f9fa81bd5fielding<div class="biblioentry">
11ce1f263fdd8812189b85930874943f9fa81bd5fielding<a name="id2603636"></a><p>[<abbr class="abbrev">RFC3596</abbr>] <span class="authorgroup"><span class="firstname">S.</span> <span class="surname">Thomson</span>, <span class="firstname">C.</span> <span class="surname">Huitema</span>, <span class="firstname">V.</span> <span class="surname">Ksinant</span>, and <span class="firstname">M.</span> <span class="surname">Souissi</span>. </span><span class="title"><i><acronym class="acronym">DNS</acronym> Extensions to support IP
11ce1f263fdd8812189b85930874943f9fa81bd5fielding version 6</i>. </span><span class="pubdate">October 2003. </span></p>
11ce1f263fdd8812189b85930874943f9fa81bd5fielding</div>
11ce1f263fdd8812189b85930874943f9fa81bd5fielding<div class="biblioentry">
11ce1f263fdd8812189b85930874943f9fa81bd5fielding<a name="id2603693"></a><p>[<abbr class="abbrev">RFC3597</abbr>] <span class="author"><span class="firstname">A.</span> <span class="surname">Gustafsson</span>. </span><span class="title"><i>Handling of Unknown DNS Resource Record (RR) Types</i>. </span><span class="pubdate">September 2003. </span></p>
11ce1f263fdd8812189b85930874943f9fa81bd5fielding</div>
11ce1f263fdd8812189b85930874943f9fa81bd5fielding</div>
11ce1f263fdd8812189b85930874943f9fa81bd5fielding<div class="bibliodiv">
11ce1f263fdd8812189b85930874943f9fa81bd5fielding<h3 class="title">
11ce1f263fdd8812189b85930874943f9fa81bd5fielding<acronym class="acronym">DNS</acronym> and the Internet</h3>
11ce1f263fdd8812189b85930874943f9fa81bd5fielding<div class="biblioentry">
11ce1f263fdd8812189b85930874943f9fa81bd5fielding<a name="id2603725"></a><p>[<abbr class="abbrev">RFC1101</abbr>] <span class="author"><span class="firstname">P. V.</span> <span class="surname">Mockapetris</span>. </span><span class="title"><i><acronym class="acronym">DNS</acronym> Encoding of Network Names
11ce1f263fdd8812189b85930874943f9fa81bd5fielding and Other Types</i>. </span><span class="pubdate">April 1989. </span></p>
11ce1f263fdd8812189b85930874943f9fa81bd5fielding</div>
11ce1f263fdd8812189b85930874943f9fa81bd5fielding<div class="biblioentry">
11ce1f263fdd8812189b85930874943f9fa81bd5fielding<a name="id2603751"></a><p>[<abbr class="abbrev">RFC1123</abbr>] <span class="author"><span class="surname">Braden</span>. </span><span class="title"><i>Requirements for Internet Hosts - Application and
11ce1f263fdd8812189b85930874943f9fa81bd5fielding Support</i>. </span><span class="pubdate">October 1989. </span></p>
11ce1f263fdd8812189b85930874943f9fa81bd5fielding</div>
11ce1f263fdd8812189b85930874943f9fa81bd5fielding<div class="biblioentry">
11ce1f263fdd8812189b85930874943f9fa81bd5fielding<a name="id2603773"></a><p>[<abbr class="abbrev">RFC1591</abbr>] <span class="author"><span class="firstname">J.</span> <span class="surname">Postel</span>. </span><span class="title"><i>Domain Name System Structure and Delegation</i>. </span><span class="pubdate">March 1994. </span></p>
11ce1f263fdd8812189b85930874943f9fa81bd5fielding</div>
11ce1f263fdd8812189b85930874943f9fa81bd5fielding<div class="biblioentry">
11ce1f263fdd8812189b85930874943f9fa81bd5fielding<a name="id2603797"></a><p>[<abbr class="abbrev">RFC2317</abbr>] <span class="authorgroup"><span class="firstname">H.</span> <span class="surname">Eidnes</span>, <span class="firstname">G.</span> <span class="surname">de Groot</span>, and <span class="firstname">P.</span> <span class="surname">Vixie</span>. </span><span class="title"><i>Classless IN-ADDR.ARPA Delegation</i>. </span><span class="pubdate">March 1998. </span></p>
11ce1f263fdd8812189b85930874943f9fa81bd5fielding</div>
11ce1f263fdd8812189b85930874943f9fa81bd5fielding<div class="biblioentry">
11ce1f263fdd8812189b85930874943f9fa81bd5fielding<a name="id2603843"></a><p>[<abbr class="abbrev">RFC2826</abbr>] <span class="authorgroup"><span class="surname">Internet Architecture Board</span>. </span><span class="title"><i>IAB Technical Comment on the Unique DNS Root</i>. </span><span class="pubdate">May 2000. </span></p>
11ce1f263fdd8812189b85930874943f9fa81bd5fielding</div>
11ce1f263fdd8812189b85930874943f9fa81bd5fielding<div class="biblioentry">
11ce1f263fdd8812189b85930874943f9fa81bd5fielding<a name="id2603866"></a><p>[<abbr class="abbrev">RFC2929</abbr>] <span class="authorgroup"><span class="firstname">D.</span> <span class="surname">Eastlake</span>, <span class="lineage">3rd</span>, <span class="firstname">E.</span> <span class="surname">Brunner-Williams</span>, and <span class="firstname">B.</span> <span class="surname">Manning</span>. </span><span class="title"><i>Domain Name System (DNS) IANA Considerations</i>. </span><span class="pubdate">September 2000. </span></p>
11ce1f263fdd8812189b85930874943f9fa81bd5fielding</div>
11ce1f263fdd8812189b85930874943f9fa81bd5fielding</div>
11ce1f263fdd8812189b85930874943f9fa81bd5fielding<div class="bibliodiv">
11ce1f263fdd8812189b85930874943f9fa81bd5fielding<h3 class="title">
11ce1f263fdd8812189b85930874943f9fa81bd5fielding<acronym class="acronym">DNS</acronym> Operations</h3>
11ce1f263fdd8812189b85930874943f9fa81bd5fielding<div class="biblioentry">
11ce1f263fdd8812189b85930874943f9fa81bd5fielding<a name="id2603924"></a><p>[<abbr class="abbrev">RFC1033</abbr>] <span class="author"><span class="firstname">M.</span> <span class="surname">Lottor</span>. </span><span class="title"><i>Domain administrators operations guide.</i>. </span><span class="pubdate">November 1987. </span></p>
11ce1f263fdd8812189b85930874943f9fa81bd5fielding</div>
11ce1f263fdd8812189b85930874943f9fa81bd5fielding<div class="biblioentry">
11ce1f263fdd8812189b85930874943f9fa81bd5fielding<a name="id2603947"></a><p>[<abbr class="abbrev">RFC1537</abbr>] <span class="author"><span class="firstname">P.</span> <span class="surname">Beertema</span>. </span><span class="title"><i>Common <acronym class="acronym">DNS</acronym> Data File
11ce1f263fdd8812189b85930874943f9fa81bd5fielding Configuration Errors</i>. </span><span class="pubdate">October 1993. </span></p>
aacc4d6400eb8cc01a7490a0c9ade3378e10c4f9rbb</div>
11ce1f263fdd8812189b85930874943f9fa81bd5fielding<div class="biblioentry">
aacc4d6400eb8cc01a7490a0c9ade3378e10c4f9rbb<a name="id2603974"></a><p>[<abbr class="abbrev">RFC1912</abbr>] <span class="author"><span class="firstname">D.</span> <span class="surname">Barr</span>. </span><span class="title"><i>Common <acronym class="acronym">DNS</acronym> Operational and
11ce1f263fdd8812189b85930874943f9fa81bd5fielding Configuration Errors</i>. </span><span class="pubdate">February 1996. </span></p>
11ce1f263fdd8812189b85930874943f9fa81bd5fielding</div>
11ce1f263fdd8812189b85930874943f9fa81bd5fielding<div class="biblioentry">
1e7749fd30f80b3fa49039f446a9b9d02b27f7effielding<a name="id2604001"></a><p>[<abbr class="abbrev">RFC2010</abbr>] <span class="authorgroup"><span class="firstname">B.</span> <span class="surname">Manning</span> and <span class="firstname">P.</span> <span class="surname">Vixie</span>. </span><span class="title"><i>Operational Criteria for Root Name Servers.</i>. </span><span class="pubdate">October 1996. </span></p>
1e7749fd30f80b3fa49039f446a9b9d02b27f7effielding</div>
11ce1f263fdd8812189b85930874943f9fa81bd5fielding<div class="biblioentry">
11ce1f263fdd8812189b85930874943f9fa81bd5fielding<a name="id2604105"></a><p>[<abbr class="abbrev">RFC2219</abbr>] <span class="authorgroup"><span class="firstname">M.</span> <span class="surname">Hamilton</span> and <span class="firstname">R.</span> <span class="surname">Wright</span>. </span><span class="title"><i>Use of <acronym class="acronym">DNS</acronym> Aliases for
11ce1f263fdd8812189b85930874943f9fa81bd5fielding Network Services.</i>. </span><span class="pubdate">October 1997. </span></p>
11ce1f263fdd8812189b85930874943f9fa81bd5fielding</div>
7753e1f66119f5c483dd8cd1db8e0a7abd7c28c1fielding</div>
11ce1f263fdd8812189b85930874943f9fa81bd5fielding<div class="bibliodiv">
11ce1f263fdd8812189b85930874943f9fa81bd5fielding<h3 class="title">Internationalized Domain Names</h3>
<div class="biblioentry">
<a name="id2604151"></a><p>[<abbr class="abbrev">RFC2825</abbr>] <span class="authorgroup"><span class="surname">IAB</span> and <span class="firstname">R.</span> <span class="surname">Daigle</span>. </span><span class="title"><i>A Tangled Web: Issues of I18N, Domain Names,
and the Other Internet protocols</i>. </span><span class="pubdate">May 2000. </span></p>
</div>
<div class="biblioentry">
<a name="id2604183"></a><p>[<abbr class="abbrev">RFC3490</abbr>] <span class="authorgroup"><span class="firstname">P.</span> <span class="surname">Faltstrom</span>, <span class="firstname">P.</span> <span class="surname">Hoffman</span>, and <span class="firstname">A.</span> <span class="surname">Costello</span>. </span><span class="title"><i>Internationalizing Domain Names in Applications (IDNA)</i>. </span><span class="pubdate">March 2003. </span></p>
</div>
<div class="biblioentry">
<a name="id2604229"></a><p>[<abbr class="abbrev">RFC3491</abbr>] <span class="authorgroup"><span class="firstname">P.</span> <span class="surname">Hoffman</span> and <span class="firstname">M.</span> <span class="surname">Blanchet</span>. </span><span class="title"><i>Nameprep: A Stringprep Profile for Internationalized Domain Names</i>. </span><span class="pubdate">March 2003. </span></p>
</div>
<div class="biblioentry">
<a name="id2604264"></a><p>[<abbr class="abbrev">RFC3492</abbr>] <span class="authorgroup"><span class="firstname">A.</span> <span class="surname">Costello</span>. </span><span class="title"><i>Punycode: A Bootstring encoding of Unicode
for Internationalized Domain Names in
Applications (IDNA)</i>. </span><span class="pubdate">March 2003. </span></p>
</div>
</div>
<div class="bibliodiv">
<h3 class="title">Other <acronym class="acronym">DNS</acronym>-related RFCs</h3>
<div class="note" style="margin-left: 0.5in; margin-right: 0.5in;">
<h3 class="title">Note</h3>
<p>
Note: the following list of RFCs, although
<acronym class="acronym">DNS</acronym>-related, are not
concerned with implementing software.
</p>
</div>
<div class="biblioentry">
<a name="id2604309"></a><p>[<abbr class="abbrev">RFC1464</abbr>] <span class="author"><span class="firstname">R.</span> <span class="surname">Rosenbaum</span>. </span><span class="title"><i>Using the Domain Name System To Store Arbitrary String
Attributes</i>. </span><span class="pubdate">May 1993. </span></p>
</div>
<div class="biblioentry">
<a name="id2604331"></a><p>[<abbr class="abbrev">RFC1713</abbr>] <span class="author"><span class="firstname">A.</span> <span class="surname">Romao</span>. </span><span class="title"><i>Tools for <acronym class="acronym">DNS</acronym> Debugging</i>. </span><span class="pubdate">November 1994. </span></p>
</div>
<div class="biblioentry">
<a name="id2604357"></a><p>[<abbr class="abbrev">RFC1794</abbr>] <span class="author"><span class="firstname">T.</span> <span class="surname">Brisco</span>. </span><span class="title"><i><acronym class="acronym">DNS</acronym> Support for Load
Balancing</i>. </span><span class="pubdate">April 1995. </span></p>
</div>
<div class="biblioentry">
<a name="id2604382"></a><p>[<abbr class="abbrev">RFC2240</abbr>] <span class="author"><span class="firstname">O.</span> <span class="surname">Vaughan</span>. </span><span class="title"><i>A Legal Basis for Domain Name Allocation</i>. </span><span class="pubdate">November 1997. </span></p>
</div>
<div class="biblioentry">
<a name="id2604406"></a><p>[<abbr class="abbrev">RFC2345</abbr>] <span class="authorgroup"><span class="firstname">J.</span> <span class="surname">Klensin</span>, <span class="firstname">T.</span> <span class="surname">Wolf</span>, and <span class="firstname">G.</span> <span class="surname">Oglesby</span>. </span><span class="title"><i>Domain Names and Company Name Retrieval</i>. </span><span class="pubdate">May 1998. </span></p>
</div>
<div class="biblioentry">
<a name="id2604452"></a><p>[<abbr class="abbrev">RFC2352</abbr>] <span class="author"><span class="firstname">O.</span> <span class="surname">Vaughan</span>. </span><span class="title"><i>A Convention For Using Legal Names as Domain Names</i>. </span><span class="pubdate">May 1998. </span></p>
</div>
<div class="biblioentry">
<a name="id2604475"></a><p>[<abbr class="abbrev">RFC3071</abbr>] <span class="authorgroup"><span class="firstname">J.</span> <span class="surname">Klensin</span>. </span><span class="title"><i>Reflections on the DNS, RFC 1591, and Categories of Domains</i>. </span><span class="pubdate">February 2001. </span></p>
</div>
<div class="biblioentry">
<a name="id2604502"></a><p>[<abbr class="abbrev">RFC3258</abbr>] <span class="authorgroup"><span class="firstname">T.</span> <span class="surname">Hardie</span>. </span><span class="title"><i>Distributing Authoritative Name Servers via
Shared Unicast Addresses</i>. </span><span class="pubdate">April 2002. </span></p>
</div>
<div class="biblioentry">
<a name="id2604528"></a><p>[<abbr class="abbrev">RFC3901</abbr>] <span class="authorgroup"><span class="firstname">A.</span> <span class="surname">Durand</span> and <span class="firstname">J.</span> <span class="surname">Ihren</span>. </span><span class="title"><i>DNS IPv6 Transport Operational Guidelines</i>. </span><span class="pubdate">September 2004. </span></p>
</div>
</div>
<div class="bibliodiv">
<h3 class="title">Obsolete and Unimplemented Experimental RFC</h3>
<div class="biblioentry">
<a name="id2604571"></a><p>[<abbr class="abbrev">RFC1712</abbr>] <span class="authorgroup"><span class="firstname">C.</span> <span class="surname">Farrell</span>, <span class="firstname">M.</span> <span class="surname">Schulze</span>, <span class="firstname">S.</span> <span class="surname">Pleitner</span>, and <span class="firstname">D.</span> <span class="surname">Baldoni</span>. </span><span class="title"><i><acronym class="acronym">DNS</acronym> Encoding of Geographical
Location</i>. </span><span class="pubdate">November 1994. </span></p>
</div>
<div class="biblioentry">
<a name="id2604629"></a><p>[<abbr class="abbrev">RFC2673</abbr>] <span class="authorgroup"><span class="firstname">M.</span> <span class="surname">Crawford</span>. </span><span class="title"><i>Binary Labels in the Domain Name System</i>. </span><span class="pubdate">August 1999. </span></p>
</div>
<div class="biblioentry">
<a name="id2604656"></a><p>[<abbr class="abbrev">RFC2874</abbr>] <span class="authorgroup"><span class="firstname">M.</span> <span class="surname">Crawford</span> and <span class="firstname">C.</span> <span class="surname">Huitema</span>. </span><span class="title"><i>DNS Extensions to Support IPv6 Address Aggregation
and Renumbering</i>. </span><span class="pubdate">July 2000. </span></p>
</div>
</div>
<div class="bibliodiv">
<h3 class="title">Obsoleted DNS Security RFCs</h3>
<div class="note" style="margin-left: 0.5in; margin-right: 0.5in;">
<h3 class="title">Note</h3>
<p>
Most of these have been consolidated into RFC4033,
RFC4034 and RFC4035 which collectively describe DNSSECbis.
</p>
</div>
<div class="biblioentry">
<a name="id2604704"></a><p>[<abbr class="abbrev">RFC2065</abbr>] <span class="authorgroup"><span class="firstname">D.</span> <span class="surname">Eastlake</span>, <span class="lineage">3rd</span> and <span class="firstname">C.</span> <span class="surname">Kaufman</span>. </span><span class="title"><i>Domain Name System Security Extensions</i>. </span><span class="pubdate">January 1997. </span></p>
</div>
<div class="biblioentry">
<a name="id2604743"></a><p>[<abbr class="abbrev">RFC2137</abbr>] <span class="author"><span class="firstname">D.</span> <span class="surname">Eastlake</span>, <span class="lineage">3rd</span>. </span><span class="title"><i>Secure Domain Name System Dynamic Update</i>. </span><span class="pubdate">April 1997. </span></p>
</div>
<div class="biblioentry">
<a name="id2604770"></a><p>[<abbr class="abbrev">RFC2535</abbr>] <span class="authorgroup"><span class="firstname">D.</span> <span class="surname">Eastlake</span>, <span class="lineage">3rd</span>. </span><span class="title"><i>Domain Name System Security Extensions</i>. </span><span class="pubdate">March 1999. </span></p>
</div>
<div class="biblioentry">
<a name="id2604800"></a><p>[<abbr class="abbrev">RFC3008</abbr>] <span class="authorgroup"><span class="firstname">B.</span> <span class="surname">Wellington</span>. </span><span class="title"><i>Domain Name System Security (DNSSEC)
Signing Authority</i>. </span><span class="pubdate">November 2000. </span></p>
</div>
<div class="biblioentry">
<a name="id2604825"></a><p>[<abbr class="abbrev">RFC3090</abbr>] <span class="authorgroup"><span class="firstname">E.</span> <span class="surname">Lewis</span>. </span><span class="title"><i>DNS Security Extension Clarification on Zone Status</i>. </span><span class="pubdate">March 2001. </span></p>
</div>
<div class="biblioentry">
<a name="id2604852"></a><p>[<abbr class="abbrev">RFC3445</abbr>] <span class="authorgroup"><span class="firstname">D.</span> <span class="surname">Massey</span> and <span class="firstname">S.</span> <span class="surname">Rose</span>. </span><span class="title"><i>Limiting the Scope of the KEY Resource Record (RR)</i>. </span><span class="pubdate">December 2002. </span></p>
</div>
<div class="biblioentry">
<a name="id2604888"></a><p>[<abbr class="abbrev">RFC3655</abbr>] <span class="authorgroup"><span class="firstname">B.</span> <span class="surname">Wellington</span> and <span class="firstname">O.</span> <span class="surname">Gudmundsson</span>. </span><span class="title"><i>Redefinition of DNS Authenticated Data (AD) bit</i>. </span><span class="pubdate">November 2003. </span></p>
</div>
<div class="biblioentry">
<a name="id2604924"></a><p>[<abbr class="abbrev">RFC3658</abbr>] <span class="authorgroup"><span class="firstname">O.</span> <span class="surname">Gudmundsson</span>. </span><span class="title"><i>Delegation Signer (DS) Resource Record (RR)</i>. </span><span class="pubdate">December 2003. </span></p>
</div>
<div class="biblioentry">
<a name="id2604951"></a><p>[<abbr class="abbrev">RFC3755</abbr>] <span class="authorgroup"><span class="firstname">S.</span> <span class="surname">Weiler</span>. </span><span class="title"><i>Legacy Resolver Compatibility for Delegation Signer (DS)</i>. </span><span class="pubdate">May 2004. </span></p>
</div>
<div class="biblioentry">
<a name="id2604978"></a><p>[<abbr class="abbrev">RFC3757</abbr>] <span class="authorgroup"><span class="firstname">O.</span> <span class="surname">Kolkman</span>, <span class="firstname">J.</span> <span class="surname">Schlyter</span>, and <span class="firstname">E.</span> <span class="surname">Lewis</span>. </span><span class="title"><i>Domain Name System KEY (DNSKEY) Resource Record
(RR) Secure Entry Point (SEP) Flag</i>. </span><span class="pubdate">April 2004. </span></p>
</div>
<div class="biblioentry">
<a name="id2605022"></a><p>[<abbr class="abbrev">RFC3845</abbr>] <span class="authorgroup"><span class="firstname">J.</span> <span class="surname">Schlyter</span>. </span><span class="title"><i>DNS Security (DNSSEC) NextSECure (NSEC) RDATA Format</i>. </span><span class="pubdate">August 2004. </span></p>
</div>
</div>
</div>
</div>
<div class="sect2" lang="en">
<div class="titlepage"><div><div><h3 class="title">
<a name="internet_drafts"></a>Internet Drafts</h3></div></div></div>
<p>
Internet Drafts (IDs) are rough-draft working documents of
the Internet Engineering Task Force. They are, in essence, RFCs
in the preliminary stages of development. Implementors are
cautioned not
to regard IDs as archival, and they should not be quoted or cited
in any formal documents unless accompanied by the disclaimer that
they are "works in progress." IDs have a lifespan of six months
after which they are deleted unless updated by their authors.
</p>
</div>
<div class="sect2" lang="en">
<div class="titlepage"><div><div><h3 class="title">
<a name="id2605064"></a>Other Documents About <acronym class="acronym">BIND</acronym>
</h3></div></div></div>
<p></p>
<div class="bibliography">
<div class="titlepage"><div><div><h4 class="title">
<a name="id2605074"></a>Bibliography</h4></div></div></div>
<div class="biblioentry">
<a name="id2605076"></a><p><span class="authorgroup"><span class="firstname">Paul</span> <span class="surname">Albitz</span> and <span class="firstname">Cricket</span> <span class="surname">Liu</span>. </span><span class="title"><i><acronym class="acronym">DNS</acronym> and <acronym class="acronym">BIND</acronym></i>. </span><span class="copyright">Copyright � 1998 Sebastopol, CA: O'Reilly and Associates. </span></p>
</div>
</div>
</div>
</div>
<div class="sect1" lang="en">
<div class="titlepage"><div><div><h2 class="title" style="clear: both">
<a name="bind9.library"></a>BIND 9 DNS Library Support</h2></div></div></div>
<p>This version of BIND 9 "exports" its internal libraries so
that they can be used by third-party applications more easily (we
call them "export" libraries in this document). In addition to
all major DNS-related APIs BIND 9 is currently using, the export
libraries provide the following features:</p>
<div class="itemizedlist"><ul type="disc">
<li><p>The newly created "DNS client" module. This is a higher
level API that provides an interface to name resolution,
single DNS transaction with a particular server, and dynamic
update. Regarding name resolution, it supports advanced
features such as DNSSEC validation and caching. This module
supports both synchronous and asynchronous mode.</p></li>
<li><p>The new "IRS" (Information Retrieval System) library.
It provides an interface to parse the traditional resolv.conf
file and more advanced, DNS-specific configuration file for
the rest of this package (see the description for the
dns.conf file below).</p></li>
<li><p>As part of the IRS library, newly implemented standard
address-name mapping functions, getaddrinfo() and
getnameinfo(), are provided. They use the DNSSEC-aware
validating resolver backend, and could use other advanced
features of the BIND 9 libraries such as caching. The
getaddrinfo() function resolves both A and AAAA RRs
concurrently (when the address family is unspecified).</p></li>
<li><p>An experimental framework to support other event
libraries than BIND 9's internal event task system.</p></li>
</ul></div>
<div class="sect2" lang="en">
<div class="titlepage"><div><div><h3 class="title">
<a name="id2607411"></a>Prerequisite</h3></div></div></div>
<p>GNU make is required to build the export libraries (other
part of BIND 9 can still be built with other types of make). In
the reminder of this document, "make" means GNU make. Note that
in some platforms you may need to invoke a different command name
than "make" (e.g. "gmake") to indicate it's GNU make.</p>
</div>
<div class="sect2" lang="en">
<div class="titlepage"><div><div><h3 class="title">
<a name="id2607420"></a>Compilation</h3></div></div></div>
<pre class="screen">
$ <strong class="userinput"><code>/configure --enable-exportlib <em class="replaceable"><code>[other flags]</code></em></code></strong>
$ <strong class="userinput"><code>make</code></strong>
</pre>
<p>
This will create (in addition to usual BIND 9 programs) and a
separate set of libraries under the lib/export directory. For
example, <code class="filename">lib/export/dns/libdns.a</code> is the archive file of the
export version of the BIND 9 DNS library. Sample application
programs using the libraries will also be built under the
lib/export/samples directory (see below).</p>
</div>
<div class="sect2" lang="en">
<div class="titlepage"><div><div><h3 class="title">
<a name="id2605329"></a>Installation</h3></div></div></div>
<pre class="screen">
$ <strong class="userinput"><code>cd lib/export</code></strong>
$ <strong class="userinput"><code>make install</code></strong>
</pre>
<p>
This will install library object files under the directory
specified by the --with-export-libdir configure option (default:
EPREFIX/lib/bind9), and header files under the directory
specified by the --with-export-includedir configure option
(default: PREFIX/include/bind9).
Root privilege is normally required.
"<span><strong class="command">make install</strong></span>" at the top directory will do the
same.
</p>
<p>
To see how to build your own
application after the installation, see
<code class="filename">lib/export/samples/Makefile-postinstall.in</code>.</p>
</div>
<div class="sect2" lang="en">
<div class="titlepage"><div><div><h3 class="title">
<a name="id2605360"></a>Known Defects/Restrictions</h3></div></div></div>
<div class="itemizedlist"><ul type="disc">
<li><p>Currently, win32 is not supported for the export
library. (Normal BIND 9 application can be built as
before).</p></li>
<li>
<p>The "fixed" RRset order is not (currently) supported in
the export library. If you want to use "fixed" RRset order
for, e.g. <span><strong class="command">named</strong></span> while still building the
export library even without the fixed order support, build
them separately:
</p>
<pre class="screen">
$ <strong class="userinput"><code>/configure --enable-fixed-rrset <em class="replaceable"><code>[other flags, but not --enable-exportlib]</code></em></code></strong>
$ <strong class="userinput"><code>make</code></strong>
$ <strong class="userinput"><code>/configure --enable-exportlib <em class="replaceable"><code>[other flags, but not --enable-fixed-rrset]</code></em></code></strong>
$ <strong class="userinput"><code>cd lib/export</code></strong>
$ <strong class="userinput"><code>make</code></strong>
</pre>
<p>
</p>
</li>
<li><p>The client module and the IRS library currently do not
support DNSSEC validation using DLV (the underlying modules
can handle it, but there is no tunable interface to enable
the feature).</p></li>
<li><p>RFC 5011 is not supported in the validating stub
resolver of the export library. In fact, it is not clear
whether it should: trust anchors would be a system-wide
configuration which would be managed by an administrator,
while the stub resolver will be used by ordinary applications
run by a normal user.</p></li>
<li><p>Not all common <code class="filename">/etc/resolv.conf</code>
options are supported
in the IRS library. The only available options in this
version are "debug" and "ndots".</p></li>
</ul></div>
</div>
<div class="sect2" lang="en">
<div class="titlepage"><div><div><h3 class="title">
<a name="id2606529"></a>The dns.conf File</h3></div></div></div>
<p>The IRS library supports an "advanced" configuration file
related to the DNS library for configuration parameters that
would be beyond the capability of the
<code class="filename">resolv.conf</code> file.
Specifically, it is intended to provide DNSSEC related
configuration parameters. By default the path to this
configuration file is <code class="filename">/etc/dns.conf</code>.
This module is very
experimental and the configuration syntax or library interfaces
may change in future versions. Currently, only the
<span><strong class="command">trusted-keys</strong></span>
statement is supported, whose syntax is the same as the same name
of statement for <code class="filename">named.conf</code>. (See
<a href="Bv9ARM.ch06.html#trusted-keys" title="trusted-keys Statement Grammar">the section called &#8220;<span><strong class="command">trusted-keys</strong></span> Statement Grammar&#8221;</a> for details.)</p>
</div>
<div class="sect2" lang="en">
<div class="titlepage"><div><div><h3 class="title">
<a name="id2606555"></a>Sample Applications</h3></div></div></div>
<p>Some sample application programs using this API are
provided for reference. The following is a brief description of
these applications.
</p>
<div class="sect3" lang="en">
<div class="titlepage"><div><div><h4 class="title">
<a name="id2606564"></a>sample: a simple stub resolver utility</h4></div></div></div>
<p>
It sends a query of a given name (of a given optional RR type) to a
specified recursive server, and prints the result as a list of
RRs. It can also act as a validating stub resolver if a trust
anchor is given via a set of command line options.</p>
<p>
Usage: sample [options] server_address hostname
</p>
<p>
Options and Arguments:
</p>
<div class="variablelist"><dl>
<dt><span class="term">
-t RRtype
</span></dt>
<dd><p>
specify the RR type of the query. The default is the A RR.
</p></dd>
<dt><span class="term">
[-a algorithm] [-e] -k keyname -K keystring
</span></dt>
<dd>
<p>
specify a command-line DNS key to validate the answer. For
example, to specify the following DNSKEY of example.com:
</p>
<div class="literallayout"><p><br>
����������������example.com.�3600�IN�DNSKEY�257�3�5�xxx<br>
</p></div>
<p>
specify the options as follows:
</p>
<pre class="screen">
<strong class="userinput"><code>
-e -k example.com -K "xxx"
</code></strong>
</pre>
<p>
-e means that this key is a zone's "key signing key" (as known
as "secure Entry point").
When -a is omitted rsasha1 will be used by default.
</p>
</dd>
<dt><span class="term">
-s domain:alt_server_address
</span></dt>
<dd><p>
specify a separate recursive server address for the specific
"domain". Example: -s example.com:2001:db8::1234
</p></dd>
<dt><span class="term">server_address</span></dt>
<dd><p>
an IP(v4/v6) address of the recursive server to which queries
are sent.
</p></dd>
<dt><span class="term">hostname</span></dt>
<dd><p>
the domain name for the query
</p></dd>
</dl></div>
</div>
<div class="sect3" lang="en">
<div class="titlepage"><div><div><h4 class="title">
<a name="id2606654"></a>sample-async: a simple stub resolver, working asynchronously</h4></div></div></div>
<p>
Similar to "sample", but accepts a list
of (query) domain names as a separate file and resolves the names
asynchronously.</p>
<p>
Usage: sample-async [-s server_address] [-t RR_type] input_file</p>
<p>
Options and Arguments:
</p>
<div class="variablelist"><dl>
<dt><span class="term">
-s server_address
</span></dt>
<dd>
an IPv4 address of the recursive server to which queries are sent.
(IPv6 addresses are not supported in this implementation)
</dd>
<dt><span class="term">
-t RR_type
</span></dt>
<dd>
specify the RR type of the queries. The default is the A
RR.
</dd>
<dt><span class="term">
input_file
</span></dt>
<dd>
a list of domain names to be resolved. each line
consists of a single domain name. Example:
<div class="literallayout"><p><br>
��www.example.com<br>
��mx.examle.net<br>
��ns.xxx.example<br>
</p></div>
</dd>
</dl></div>
</div>
<div class="sect3" lang="en">
<div class="titlepage"><div><div><h4 class="title">
<a name="id2606708"></a>sample-request: a simple DNS transaction client</h4></div></div></div>
<p>
It sends a query to a specified server, and
prints the response with minimal processing. It doesn't act as a
"stub resolver": it stops the processing once it gets any
response from the server, whether it's a referral or an alias
(CNAME or DNAME) that would require further queries to get the
ultimate answer. In other words, this utility acts as a very
simplified <span><strong class="command">dig</strong></span>.
</p>
<p>
Usage: sample-request [-t RRtype] server_address hostname
</p>
<p>
Options and Arguments:
</p>
<div class="variablelist"><dl>
<dt><span class="term">
-t RRtype
</span></dt>
<dd><p>
specify the RR type of
the queries. The default is the A RR.
</p></dd>
<dt><span class="term">
server_address
</span></dt>
<dd><p>
an IP(v4/v6)
address of the recursive server to which the query is sent.
</p></dd>
<dt><span class="term">
hostname
</span></dt>
<dd><p>
the domain name for the query
</p></dd>
</dl></div>
</div>
<div class="sect3" lang="en">
<div class="titlepage"><div><div><h4 class="title">
<a name="id2607250"></a>sample-gai: getaddrinfo() and getnameinfo() test code</h4></div></div></div>
<p>
This is a test program
to check getaddrinfo() and getnameinfo() behavior. It takes a
host name as an argument, calls getaddrinfo() with the given host
name, and calls getnameinfo() with the resulting IP addresses
returned by getaddrinfo(). If the dns.conf file exists and
defines a trust anchor, the underlying resolver will act as a
validating resolver, and getaddrinfo()/getnameinfo() will fail
with an EAI_INSECUREDATA error when DNSSEC validation fails.
</p>
<p>
Usage: sample-gai hostname
</p>
</div>
<div class="sect3" lang="en">
<div class="titlepage"><div><div><h4 class="title">
<a name="id2607265"></a>sample-update: a simple dynamic update client program</h4></div></div></div>
<p>
It accepts a single update command as a
command-line argument, sends an update request message to the
authoritative server, and shows the response from the server. In
other words, this is a simplified <span><strong class="command">nsupdate</strong></span>.
</p>
<p>
Usage: sample-update [options] (add|delete) "update data"
</p>
<p>
Options and Arguments:
</p>
<div class="variablelist"><dl>
<dt><span class="term">
-a auth_server
</span></dt>
<dd><p>
An IP address of the authoritative server that has authority
for the zone containing the update name. This should normally
be the primary authoritative server that accepts dynamic
updates. It can also be a secondary server that is configured
to forward update requests to the primary server.
</p></dd>
<dt><span class="term">
-k keyfile
</span></dt>
<dd><p>
A TSIG key file to secure the update transaction. The keyfile
format is the same as that for the nsupdate utility.
</p></dd>
<dt><span class="term">
-p prerequisite
</span></dt>
<dd><p>
A prerequisite for the update (only one prerequisite can be
specified). The prerequisite format is the same as that is
accepted by the nsupdate utility.
</p></dd>
<dt><span class="term">
-r recursive_server
</span></dt>
<dd><p>
An IP address of a recursive server that this utility will
use. A recursive server may be necessary to identify the
authoritative server address to which the update request is
sent.
</p></dd>
<dt><span class="term">
-z zonename
</span></dt>
<dd><p>
The domain name of the zone that contains
</p></dd>
<dt><span class="term">
(add|delete)
</span></dt>
<dd><p>
Specify the type of update operation. Either "add" or "delete"
must be specified.
</p></dd>
<dt><span class="term">
"update data"
</span></dt>
<dd><p>
Specify the data to be updated. A typical example of the data
would look like "name TTL RRtype RDATA".
</p></dd>
</dl></div>
<div class="note" style="margin-left: 0.5in; margin-right: 0.5in;">
<h3 class="title">Note</h3>In practice, either -a or -r must be specified. Others can
be optional; the underlying library routine tries to identify the
appropriate server and the zone name for the update.</div>
<p>
Examples: assuming the primary authoritative server of the
dynamic.example.com zone has an IPv6 address 2001:db8::1234,
</p>
<pre class="screen">
$ <strong class="userinput"><code>sample-update -a sample-update -k Kxxx.+nnn+mmmm.key add "foo.dynamic.example.com 30 IN A 192.168.2.1"</code></strong></pre>
<p>
adds an A RR for foo.dynamic.example.com using the given key.
</p>
<pre class="screen">
$ <strong class="userinput"><code>sample-update -a sample-update -k Kxxx.+nnn+mmmm.key delete "foo.dynamic.example.com 30 IN A"</code></strong></pre>
<p>
removes all A RRs for foo.dynamic.example.com using the given key.
</p>
<pre class="screen">
$ <strong class="userinput"><code>sample-update -a sample-update -k Kxxx.+nnn+mmmm.key delete "foo.dynamic.example.com"</code></strong></pre>
<p>
removes all RRs for foo.dynamic.example.com using the given key.
</p>
</div>
<div class="sect3" lang="en">
<div class="titlepage"><div><div><h4 class="title">
<a name="id2607464"></a>nsprobe: domain/name server checker in terms of RFC 4074</h4></div></div></div>
<p>
It checks a set
of domains to see the name servers of the domains behave
correctly in terms of RFC 4074. This is included in the set of
sample programs to show how the export library can be used in a
DNS-related application.
</p>
<p>
Usage: nsprobe [-d] [-v [-v...]] [-c cache_address] [input_file]
</p>
<p>
Options
</p>
<div class="variablelist"><dl>
<dt><span class="term">
-d
</span></dt>
<dd><p>
run in the "debug" mode. with this option nsprobe will dump
every RRs it receives.
</p></dd>
<dt><span class="term">
-v
</span></dt>
<dd><p>
increase verbosity of other normal log messages. This can be
specified multiple times
</p></dd>
<dt><span class="term">
-c cache_address
</span></dt>
<dd><p>
specify an IP address of a recursive (caching) name server.
nsprobe uses this server to get the NS RRset of each domain and
the A and/or AAAA RRsets for the name servers. The default
value is 127.0.0.1.
</p></dd>
<dt><span class="term">
input_file
</span></dt>
<dd><p>
a file name containing a list of domain (zone) names to be
probed. when omitted the standard input will be used. Each
line of the input file specifies a single domain name such as
"example.com". In general this domain name must be the apex
name of some DNS zone (unlike normal "host names" such as
"www.example.com"). nsprobe first identifies the NS RRsets for
the given domain name, and sends A and AAAA queries to these
servers for some "widely used" names under the zone;
specifically, adding "www" and "ftp" to the zone name.
</p></dd>
</dl></div>
</div>
</div>
<div class="sect2" lang="en">
<div class="titlepage"><div><div><h3 class="title">
<a name="id2607528"></a>Library References</h3></div></div></div>
<p>As of this writing, there is no formal "manual" of the
libraries, except this document, header files (some of them
provide pretty detailed explanations), and sample application
programs.</p>
</div>
</div>
</div>
<div class="navfooter">
<hr>
<table width="100%" summary="Navigation footer">
<tr>
<td width="40%" align="left">
<a accesskey="p" href="Bv9ARM.ch08.html">Prev</a>�</td>
<td width="20%" align="center">�</td>
<td width="40%" align="right">�<a accesskey="n" href="Bv9ARM.ch10.html">Next</a>
</td>
</tr>
<tr>
<td width="40%" align="left" valign="top">Chapter�8.�Troubleshooting�</td>
<td width="20%" align="center"><a accesskey="h" href="Bv9ARM.html">Home</a></td>
<td width="40%" align="right" valign="top">�Manual pages</td>
</tr>
</table>
</div>
</body>
</html>