Bv9ARM.ch09.html revision ea94d370123a5892f6c47a97f21d1b28d44bb168
c92c50783e4e93699f2a42643b8f200b9b719c87Automatic Updater - Copyright (C) 2004-2012 Internet Systems Consortium, Inc. ("ISC")
75c0816e8295e180f4bc7f10db3d0d880383bc1cMark Andrews - Copyright (C) 2000-2003 Internet Software Consortium.
4a14ce5ba00ab7bc55c99ffdcf59c7a4ab902721Automatic Updater - Permission to use, copy, modify, and/or distribute this software for any
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - purpose with or without fee is hereby granted, provided that the above
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - copyright notice and this permission notice appear in all copies.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - PERFORMANCE OF THIS SOFTWARE.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
e21a2904f02a03fa06b6db04d348f65fe9c67b2bMark Andrews<meta name="generator" content="DocBook XSL Stylesheets V1.71.1">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<link rel="start" href="Bv9ARM.html" title="BIND 9 Administrator Reference Manual">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<link rel="up" href="Bv9ARM.html" title="BIND 9 Administrator Reference Manual">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<link rel="prev" href="Bv9ARM.ch08.html" title="Chapter�8.�Troubleshooting">
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews<link rel="next" href="Bv9ARM.ch10.html" title="Manual pages">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<tr><th colspan="3" align="center">Appendix�A.�Appendices</th></tr>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a accesskey="p" href="Bv9ARM.ch08.html">Prev</a>�</td>
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews<td width="20%" align="right">�<a accesskey="n" href="Bv9ARM.ch10.html">Next</a>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h2 class="title">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="Bv9ARM.ch09"></a>Appendix�A.�Appendices</h2></div></div></div>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<dt><span class="sect1"><a href="Bv9ARM.ch09.html#id2604306">Acknowledgments</a></span></dt>
71c66a876ecca77923638d3f94cc0783152b2f03Mark Andrews<dd><dl><dt><span class="sect2"><a href="Bv9ARM.ch09.html#historical_dns_information">A Brief History of the <acronym class="acronym">DNS</acronym> and <acronym class="acronym">BIND</acronym></a></span></dt></dl></dd>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<dt><span class="sect1"><a href="Bv9ARM.ch09.html#id2604614">General <acronym class="acronym">DNS</acronym> Reference Information</a></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dd><dl><dt><span class="sect2"><a href="Bv9ARM.ch09.html#ipv6addresses">IPv6 addresses (AAAA)</a></span></dt></dl></dd>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="sect1"><a href="Bv9ARM.ch09.html#bibliography">Bibliography (and Suggested Reading)</a></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="sect2"><a href="Bv9ARM.ch09.html#rfcs">Request for Comments (RFCs)</a></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="sect2"><a href="Bv9ARM.ch09.html#internet_drafts">Internet Drafts</a></span></dt>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<dt><span class="sect2"><a href="Bv9ARM.ch09.html#id2607826">Other Documents About <acronym class="acronym">BIND</acronym></a></span></dt>
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater<dt><span class="sect1"><a href="Bv9ARM.ch09.html#bind9.library">BIND 9 DNS Library Support</a></span></dt>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<dt><span class="sect2"><a href="Bv9ARM.ch09.html#id2610234">Prerequisite</a></span></dt>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<dt><span class="sect2"><a href="Bv9ARM.ch09.html#id2609425">Compilation</a></span></dt>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<dt><span class="sect2"><a href="Bv9ARM.ch09.html#id2609449">Installation</a></span></dt>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<dt><span class="sect2"><a href="Bv9ARM.ch09.html#id2609480">Known Defects/Restrictions</a></span></dt>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<dt><span class="sect2"><a href="Bv9ARM.ch09.html#id2609557">The dns.conf File</a></span></dt>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<dt><span class="sect2"><a href="Bv9ARM.ch09.html#id2609584">Sample Applications</a></span></dt>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<dt><span class="sect2"><a href="Bv9ARM.ch09.html#id2610556">Library References</a></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h2 class="title" style="clear: both">
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2604306"></a>Acknowledgments</h2></div></div></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h3 class="title">
4abdfc917e6635a7c81d1f931a0c79227e72d025Mark Andrews<a name="historical_dns_information"></a>A Brief History of the <acronym class="acronym">DNS</acronym> and <acronym class="acronym">BIND</acronym>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Although the "official" beginning of the Domain Name
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein System occurred in 1984 with the publication of RFC 920, the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein core of the new system was described in 1983 in RFCs 882 and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein 883. From 1984 to 1987, the ARPAnet (the precursor to today's
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Internet) became a testbed of experimentation for developing the
b05bdb520d83f7ecaad708fe305268c3420be01dMark Andrews new naming/addressing scheme in a rapidly expanding,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein operational network environment. New RFCs were written and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein published in 1987 that modified the original documents to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein incorporate improvements based on the working model. RFC 1034,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein "Domain Names-Concepts and Facilities", and RFC 1035, "Domain
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Names-Implementation and Specification" were published and
71c66a876ecca77923638d3f94cc0783152b2f03Mark Andrews became the standards upon which all <acronym class="acronym">DNS</acronym> implementations are
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The first working domain name server, called "Jeeves", was
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein written in 1983-84 by Paul Mockapetris for operation on DEC
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein machines located at the University of Southern California's
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Sciences Institute (USC-ISI) and SRI International's Network
71c66a876ecca77923638d3f94cc0783152b2f03Mark Andrews Center (SRI-NIC). A <acronym class="acronym">DNS</acronym> server for
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Unix machines, the Berkeley Internet
71c66a876ecca77923638d3f94cc0783152b2f03Mark Andrews Name Domain (<acronym class="acronym">BIND</acronym>) package, was
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein written soon after by a group of
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein graduate students at the University of California at Berkeley
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein a grant from the US Defense Advanced Research Projects
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Administration
71c66a876ecca77923638d3f94cc0783152b2f03Mark Andrews Versions of <acronym class="acronym">BIND</acronym> through
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein 4.8.3 were maintained by the Computer
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Systems Research Group (CSRG) at UC Berkeley. Douglas Terry, Mark
71c66a876ecca77923638d3f94cc0783152b2f03Mark Andrews Painter, David Riggle and Songnian Zhou made up the initial <acronym class="acronym">BIND</acronym>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein project team. After that, additional work on the software package
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein was done by Ralph Campbell. Kevin Dunlap, a Digital Equipment
71c66a876ecca77923638d3f94cc0783152b2f03Mark Andrews employee on loan to the CSRG, worked on <acronym class="acronym">BIND</acronym> for 2 years, from 1985
71c66a876ecca77923638d3f94cc0783152b2f03Mark Andrews to 1987. Many other people also contributed to <acronym class="acronym">BIND</acronym> development
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein during that time: Doug Kingston, Craig Partridge, Smoot
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Carl-Mitchell,
71c66a876ecca77923638d3f94cc0783152b2f03Mark Andrews Mike Muuss, Jim Bloom and Mike Schwartz. <acronym class="acronym">BIND</acronym> maintenance was subsequently
a1b05dea35aa30b152a47115e18bbe679d3fcf19Mark Andrews handled by Mike Karels and �ivind Kure.
71c66a876ecca77923638d3f94cc0783152b2f03Mark Andrews <acronym class="acronym">BIND</acronym> versions 4.9 and 4.9.1 were
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein released by Digital Equipment
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Corporation (now Compaq Computer Corporation). Paul Vixie, then
71c66a876ecca77923638d3f94cc0783152b2f03Mark Andrews a DEC employee, became <acronym class="acronym">BIND</acronym>'s
b05bdb520d83f7ecaad708fe305268c3420be01dMark Andrews primary caretaker. He was assisted
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein by Phil Almquist, Robert Elz, Alan Barrett, Paul Albitz, Bryan
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Beecher, Andrew
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Partan, Andy Cherenson, Tom Limoncelli, Berthold Paffrath, Fuat
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Baran, Anant Kumar, Art Harkin, Win Treese, Don Lewis, Christophe
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Wolfhugel, and others.
bea931e17b7567f09107f93ab7e25c7f00abeb9cMark Andrews In 1994, <acronym class="acronym">BIND</acronym> version 4.9.2 was sponsored by
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Vixie Enterprises. Paul
71c66a876ecca77923638d3f94cc0783152b2f03Mark Andrews Vixie became <acronym class="acronym">BIND</acronym>'s principal
71c66a876ecca77923638d3f94cc0783152b2f03Mark Andrews <acronym class="acronym">BIND</acronym> versions from 4.9.3 onward
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein have been developed and maintained
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews by the Internet Systems Consortium and its predecessor,
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews the Internet Software Consortium, with support being provided
a1b05dea35aa30b152a47115e18bbe679d3fcf19Mark Andrews by ISC's sponsors.
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews Paul Vixie released the first production-ready version of
71c66a876ecca77923638d3f94cc0783152b2f03Mark Andrews <acronym class="acronym">BIND</acronym> version 8 in May 1997.
a1b05dea35aa30b152a47115e18bbe679d3fcf19Mark Andrews BIND version 9 was released in September 2000 and is a
a1b05dea35aa30b152a47115e18bbe679d3fcf19Mark Andrews major rewrite of nearly all aspects of the underlying
a1b05dea35aa30b152a47115e18bbe679d3fcf19Mark Andrews BIND architecture.
9c6a5d1f22f972232d7a9fd5c5fa64f10bacbdffAutomatic Updater BIND versions 4 and 8 are officially deprecated.
9c6a5d1f22f972232d7a9fd5c5fa64f10bacbdffAutomatic Updater No additional development is done
9c6a5d1f22f972232d7a9fd5c5fa64f10bacbdffAutomatic Updater on BIND version 4 or BIND version 8.
71c66a876ecca77923638d3f94cc0783152b2f03Mark Andrews <acronym class="acronym">BIND</acronym> development work is made
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein possible today by the sponsorship
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein of several corporations, and by the tireless work efforts of
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews numerous individuals.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h2 class="title" style="clear: both">
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2604614"></a>General <acronym class="acronym">DNS</acronym> Reference Information</h2></div></div></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h3 class="title">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="ipv6addresses"></a>IPv6 addresses (AAAA)</h3></div></div></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein IPv6 addresses are 128-bit identifiers for interfaces and
71c66a876ecca77923638d3f94cc0783152b2f03Mark Andrews sets of interfaces which were introduced in the <acronym class="acronym">DNS</acronym> to facilitate
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein scalable Internet routing. There are three types of addresses: <span class="emphasis"><em>Unicast</em></span>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein an identifier for a single interface;
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein an identifier for a set of interfaces; and <span class="emphasis"><em>Multicast</em></span>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein an identifier for a set of interfaces. Here we describe the global
bea931e17b7567f09107f93ab7e25c7f00abeb9cMark Andrews Unicast address scheme. For more information, see RFC 3587,
bea931e17b7567f09107f93ab7e25c7f00abeb9cMark Andrews "Global Unicast Address Format."
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews IPv6 unicast addresses consist of a
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews <span class="emphasis"><em>global routing prefix</em></span>, a
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews <span class="emphasis"><em>subnet identifier</em></span>, and an
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews <span class="emphasis"><em>interface identifier</em></span>.
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews The global routing prefix is provided by the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein upstream provider or ISP, and (roughly) corresponds to the
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews IPv4 <span class="emphasis"><em>network</em></span> section
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews of the address range.
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews The subnet identifier is for local subnetting, much the
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews same as subnetting an
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein IPv4 /16 network into /24 subnets.
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews The interface identifier is the address of an individual
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews interface on a given network; in IPv6, addresses belong to
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews interfaces rather than to machines.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The subnetting capability of IPv6 is much more flexible than
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews that of IPv4: subnetting can be carried out on bit boundaries,
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews in much the same way as Classless InterDomain Routing
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews (CIDR), and the DNS PTR representation ("nibble" format)
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews makes setting up reverse zones easier.
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews The Interface Identifier must be unique on the local link,
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews and is usually generated automatically by the IPv6
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews implementation, although it is usually possible to
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews override the default setting if necessary. A typical IPv6
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews address might look like:
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews <span><strong class="command">2001:db8:201:9:a00:20ff:fe81:2b32</strong></span>
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews IPv6 address specifications often contain long strings
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein of zeros, so the architects have included a shorthand for
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein them. The double colon (`::') indicates the longest possible
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein of zeros that can fit, and can be used only once in an address.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h2 class="title" style="clear: both">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="bibliography"></a>Bibliography (and Suggested Reading)</h2></div></div></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h3 class="title">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="rfcs"></a>Request for Comments (RFCs)</h3></div></div></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Specification documents for the Internet protocol suite, including
71c66a876ecca77923638d3f94cc0783152b2f03Mark Andrews the <acronym class="acronym">DNS</acronym>, are published as part of
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the Request for Comments (RFCs)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein series of technical notes. The standards themselves are defined
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein by the Internet Engineering Task Force (IETF) and the Internet
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews Engineering Steering Group (IESG). RFCs can be obtained online via FTP at:
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <a href="ftp://www.isi.edu/in-notes/" target="_top">
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews ftp://www.isi.edu/in-notes/RFC<em class="replaceable"><code>xxxx</code></em>.txt
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews (where <em class="replaceable"><code>xxxx</code></em> is
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews the number of the RFC). RFCs are also available via the Web at:
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <a href="http://www.ietf.org/rfc/" target="_top">http://www.ietf.org/rfc/</a>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h4 class="title">
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2604802"></a>Bibliography</h4></div></div></div>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2604812"></a><p>[<abbr class="abbrev">RFC974</abbr>] <span class="author"><span class="firstname">C.</span> <span class="surname">Partridge</span>. </span><span class="title"><i>Mail Routing and the Domain System</i>. </span><span class="pubdate">January 1986. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2604836"></a><p>[<abbr class="abbrev">RFC1034</abbr>] <span class="author"><span class="firstname">P.V.</span> <span class="surname">Mockapetris</span>. </span><span class="title"><i>Domain Names — Concepts and Facilities</i>. </span><span class="pubdate">November 1987. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2604928"></a><p>[<abbr class="abbrev">RFC1035</abbr>] <span class="author"><span class="firstname">P. V.</span> <span class="surname">Mockapetris</span>. </span><span class="title"><i>Domain Names — Implementation and
71c66a876ecca77923638d3f94cc0783152b2f03Mark Andrews Specification</i>. </span><span class="pubdate">November 1987. </span></p>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="proposed_standards"></a>Proposed Standards</h3>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2604964"></a><p>[<abbr class="abbrev">RFC2181</abbr>] <span class="author"><span class="firstname">R., R. Bush</span> <span class="surname">Elz</span>. </span><span class="title"><i>Clarifications to the <acronym class="acronym">DNS</acronym>
71c66a876ecca77923638d3f94cc0783152b2f03Mark Andrews Specification</i>. </span><span class="pubdate">July 1997. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2604990"></a><p>[<abbr class="abbrev">RFC2308</abbr>] <span class="author"><span class="firstname">M.</span> <span class="surname">Andrews</span>. </span><span class="title"><i>Negative Caching of <acronym class="acronym">DNS</acronym>
71c66a876ecca77923638d3f94cc0783152b2f03Mark Andrews Queries</i>. </span><span class="pubdate">March 1998. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2605016"></a><p>[<abbr class="abbrev">RFC1995</abbr>] <span class="author"><span class="firstname">M.</span> <span class="surname">Ohta</span>. </span><span class="title"><i>Incremental Zone Transfer in <acronym class="acronym">DNS</acronym></i>. </span><span class="pubdate">August 1996. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2605041"></a><p>[<abbr class="abbrev">RFC1996</abbr>] <span class="author"><span class="firstname">P.</span> <span class="surname">Vixie</span>. </span><span class="title"><i>A Mechanism for Prompt Notification of Zone Changes</i>. </span><span class="pubdate">August 1996. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2605064"></a><p>[<abbr class="abbrev">RFC2136</abbr>] <span class="authorgroup"><span class="firstname">P.</span> <span class="surname">Vixie</span>, <span class="firstname">S.</span> <span class="surname">Thomson</span>, <span class="firstname">Y.</span> <span class="surname">Rekhter</span>, and <span class="firstname">J.</span> <span class="surname">Bound</span>. </span><span class="title"><i>Dynamic Updates in the Domain Name System</i>. </span><span class="pubdate">April 1997. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2605120"></a><p>[<abbr class="abbrev">RFC2671</abbr>] <span class="authorgroup"><span class="firstname">P.</span> <span class="surname">Vixie</span>. </span><span class="title"><i>Extension Mechanisms for DNS (EDNS0)</i>. </span><span class="pubdate">August 1997. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2605146"></a><p>[<abbr class="abbrev">RFC2672</abbr>] <span class="authorgroup"><span class="firstname">M.</span> <span class="surname">Crawford</span>. </span><span class="title"><i>Non-Terminal DNS Name Redirection</i>. </span><span class="pubdate">August 1999. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2605173"></a><p>[<abbr class="abbrev">RFC2845</abbr>] <span class="authorgroup"><span class="firstname">P.</span> <span class="surname">Vixie</span>, <span class="firstname">O.</span> <span class="surname">Gudmundsson</span>, <span class="firstname">D.</span> <span class="surname">Eastlake</span>, <span class="lineage">3rd</span>, and <span class="firstname">B.</span> <span class="surname">Wellington</span>. </span><span class="title"><i>Secret Key Transaction Authentication for <acronym class="acronym">DNS</acronym> (TSIG)</i>. </span><span class="pubdate">May 2000. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2605235"></a><p>[<abbr class="abbrev">RFC2930</abbr>] <span class="authorgroup"><span class="firstname">D.</span> <span class="surname">Eastlake</span>, <span class="lineage">3rd</span>. </span><span class="title"><i>Secret Key Establishment for DNS (TKEY RR)</i>. </span><span class="pubdate">September 2000. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2605265"></a><p>[<abbr class="abbrev">RFC2931</abbr>] <span class="authorgroup"><span class="firstname">D.</span> <span class="surname">Eastlake</span>, <span class="lineage">3rd</span>. </span><span class="title"><i>DNS Request and Transaction Signatures (SIG(0)s)</i>. </span><span class="pubdate">September 2000. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2605294"></a><p>[<abbr class="abbrev">RFC3007</abbr>] <span class="authorgroup"><span class="firstname">B.</span> <span class="surname">Wellington</span>. </span><span class="title"><i>Secure Domain Name System (DNS) Dynamic Update</i>. </span><span class="pubdate">November 2000. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2605321"></a><p>[<abbr class="abbrev">RFC3645</abbr>] <span class="authorgroup"><span class="firstname">S.</span> <span class="surname">Kwan</span>, <span class="firstname">P.</span> <span class="surname">Garg</span>, <span class="firstname">J.</span> <span class="surname">Gilroy</span>, <span class="firstname">L.</span> <span class="surname">Esibov</span>, <span class="firstname">J.</span> <span class="surname">Westhead</span>, and <span class="firstname">R.</span> <span class="surname">Hall</span>. </span><span class="title"><i>Generic Security Service Algorithm for Secret
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews Key Transaction Authentication for DNS
71c66a876ecca77923638d3f94cc0783152b2f03Mark Andrews (GSS-TSIG)</i>. </span><span class="pubdate">October 2003. </span></p>
71c66a876ecca77923638d3f94cc0783152b2f03Mark Andrews<acronym class="acronym">DNS</acronym> Security Proposed Standards</h3>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2605403"></a><p>[<abbr class="abbrev">RFC3225</abbr>] <span class="authorgroup"><span class="firstname">D.</span> <span class="surname">Conrad</span>. </span><span class="title"><i>Indicating Resolver Support of DNSSEC</i>. </span><span class="pubdate">December 2001. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2605430"></a><p>[<abbr class="abbrev">RFC3833</abbr>] <span class="authorgroup"><span class="firstname">D.</span> <span class="surname">Atkins</span> and <span class="firstname">R.</span> <span class="surname">Austein</span>. </span><span class="title"><i>Threat Analysis of the Domain Name System (DNS)</i>. </span><span class="pubdate">August 2004. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2605466"></a><p>[<abbr class="abbrev">RFC4033</abbr>] <span class="authorgroup"><span class="firstname">R.</span> <span class="surname">Arends</span>, <span class="firstname">R.</span> <span class="surname">Austein</span>, <span class="firstname">M.</span> <span class="surname">Larson</span>, <span class="firstname">D.</span> <span class="surname">Massey</span>, and <span class="firstname">S.</span> <span class="surname">Rose</span>. </span><span class="title"><i>DNS Security Introduction and Requirements</i>. </span><span class="pubdate">March 2005. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2605531"></a><p>[<abbr class="abbrev">RFC4034</abbr>] <span class="authorgroup"><span class="firstname">R.</span> <span class="surname">Arends</span>, <span class="firstname">R.</span> <span class="surname">Austein</span>, <span class="firstname">M.</span> <span class="surname">Larson</span>, <span class="firstname">D.</span> <span class="surname">Massey</span>, and <span class="firstname">S.</span> <span class="surname">Rose</span>. </span><span class="title"><i>Resource Records for the DNS Security Extensions</i>. </span><span class="pubdate">March 2005. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2605596"></a><p>[<abbr class="abbrev">RFC4035</abbr>] <span class="authorgroup"><span class="firstname">R.</span> <span class="surname">Arends</span>, <span class="firstname">R.</span> <span class="surname">Austein</span>, <span class="firstname">M.</span> <span class="surname">Larson</span>, <span class="firstname">D.</span> <span class="surname">Massey</span>, and <span class="firstname">S.</span> <span class="surname">Rose</span>. </span><span class="title"><i>Protocol Modifications for the DNS
71c66a876ecca77923638d3f94cc0783152b2f03Mark Andrews Security Extensions</i>. </span><span class="pubdate">March 2005. </span></p>
71c66a876ecca77923638d3f94cc0783152b2f03Mark Andrews<h3 class="title">Other Important RFCs About <acronym class="acronym">DNS</acronym>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Implementation</h3>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2605670"></a><p>[<abbr class="abbrev">RFC1535</abbr>] <span class="author"><span class="firstname">E.</span> <span class="surname">Gavron</span>. </span><span class="title"><i>A Security Problem and Proposed Correction With Widely
71c66a876ecca77923638d3f94cc0783152b2f03Mark Andrews Deployed <acronym class="acronym">DNS</acronym> Software.</i>. </span><span class="pubdate">October 1993. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2605696"></a><p>[<abbr class="abbrev">RFC1536</abbr>] <span class="authorgroup"><span class="firstname">A.</span> <span class="surname">Kumar</span>, <span class="firstname">J.</span> <span class="surname">Postel</span>, <span class="firstname">C.</span> <span class="surname">Neuman</span>, <span class="firstname">P.</span> <span class="surname">Danzig</span>, and <span class="firstname">S.</span> <span class="surname">Miller</span>. </span><span class="title"><i>Common <acronym class="acronym">DNS</acronym> Implementation
71c66a876ecca77923638d3f94cc0783152b2f03Mark Andrews Errors and Suggested Fixes</i>. </span><span class="pubdate">October 1993. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2605764"></a><p>[<abbr class="abbrev">RFC1982</abbr>] <span class="authorgroup"><span class="firstname">R.</span> <span class="surname">Elz</span> and <span class="firstname">R.</span> <span class="surname">Bush</span>. </span><span class="title"><i>Serial Number Arithmetic</i>. </span><span class="pubdate">August 1996. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2605799"></a><p>[<abbr class="abbrev">RFC4074</abbr>] <span class="authorgroup"><span class="firstname">Y.</span> <span class="surname">Morishita</span> and <span class="firstname">T.</span> <span class="surname">Jinmei</span>. </span><span class="title"><i>Common Misbehaviour Against <acronym class="acronym">DNS</acronym>
71c66a876ecca77923638d3f94cc0783152b2f03Mark Andrews Queries for IPv6 Addresses</i>. </span><span class="pubdate">May 2005. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2605845"></a><p>[<abbr class="abbrev">RFC1183</abbr>] <span class="authorgroup"><span class="firstname">C.F.</span> <span class="surname">Everhart</span>, <span class="firstname">L. A.</span> <span class="surname">Mamakos</span>, <span class="firstname">R.</span> <span class="surname">Ullmann</span>, and <span class="firstname">P.</span> <span class="surname">Mockapetris</span>. </span><span class="title"><i>New <acronym class="acronym">DNS</acronym> RR Definitions</i>. </span><span class="pubdate">October 1990. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2605902"></a><p>[<abbr class="abbrev">RFC1706</abbr>] <span class="authorgroup"><span class="firstname">B.</span> <span class="surname">Manning</span> and <span class="firstname">R.</span> <span class="surname">Colella</span>. </span><span class="title"><i><acronym class="acronym">DNS</acronym> NSAP Resource Records</i>. </span><span class="pubdate">October 1994. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2605940"></a><p>[<abbr class="abbrev">RFC2168</abbr>] <span class="authorgroup"><span class="firstname">R.</span> <span class="surname">Daniel</span> and <span class="firstname">M.</span> <span class="surname">Mealling</span>. </span><span class="title"><i>Resolution of Uniform Resource Identifiers using
71c66a876ecca77923638d3f94cc0783152b2f03Mark Andrews the Domain Name System</i>. </span><span class="pubdate">June 1997. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2605975"></a><p>[<abbr class="abbrev">RFC1876</abbr>] <span class="authorgroup"><span class="firstname">C.</span> <span class="surname">Davis</span>, <span class="firstname">P.</span> <span class="surname">Vixie</span>, <span class="firstname">T.</span>, and <span class="firstname">I.</span> <span class="surname">Dickinson</span>. </span><span class="title"><i>A Means for Expressing Location Information in the
71c66a876ecca77923638d3f94cc0783152b2f03Mark Andrews Name System</i>. </span><span class="pubdate">January 1996. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2606029"></a><p>[<abbr class="abbrev">RFC2052</abbr>] <span class="authorgroup"><span class="firstname">A.</span> <span class="surname">Gulbrandsen</span> and <span class="firstname">P.</span> <span class="surname">Vixie</span>. </span><span class="title"><i>A <acronym class="acronym">DNS</acronym> RR for Specifying the
71c66a876ecca77923638d3f94cc0783152b2f03Mark Andrews Services.</i>. </span><span class="pubdate">October 1996. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2606068"></a><p>[<abbr class="abbrev">RFC2163</abbr>] <span class="author"><span class="firstname">A.</span> <span class="surname">Allocchio</span>. </span><span class="title"><i>Using the Internet <acronym class="acronym">DNS</acronym> to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Distribute MIXER
71c66a876ecca77923638d3f94cc0783152b2f03Mark Andrews Conformant Global Address Mapping</i>. </span><span class="pubdate">January 1998. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2606093"></a><p>[<abbr class="abbrev">RFC2230</abbr>] <span class="author"><span class="firstname">R.</span> <span class="surname">Atkinson</span>. </span><span class="title"><i>Key Exchange Delegation Record for the <acronym class="acronym">DNS</acronym></i>. </span><span class="pubdate">October 1997. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2606119"></a><p>[<abbr class="abbrev">RFC2536</abbr>] <span class="author"><span class="firstname">D.</span> <span class="surname">Eastlake</span>, <span class="lineage">3rd</span>. </span><span class="title"><i>DSA KEYs and SIGs in the Domain Name System (DNS)</i>. </span><span class="pubdate">March 1999. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2606146"></a><p>[<abbr class="abbrev">RFC2537</abbr>] <span class="author"><span class="firstname">D.</span> <span class="surname">Eastlake</span>, <span class="lineage">3rd</span>. </span><span class="title"><i>RSA/MD5 KEYs and SIGs in the Domain Name System (DNS)</i>. </span><span class="pubdate">March 1999. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2606172"></a><p>[<abbr class="abbrev">RFC2538</abbr>] <span class="authorgroup"><span class="firstname">D.</span> <span class="surname">Eastlake</span>, <span class="lineage">3rd</span> and <span class="firstname">O.</span> <span class="surname">Gudmundsson</span>. </span><span class="title"><i>Storing Certificates in the Domain Name System (DNS)</i>. </span><span class="pubdate">March 1999. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2606212"></a><p>[<abbr class="abbrev">RFC2539</abbr>] <span class="authorgroup"><span class="firstname">D.</span> <span class="surname">Eastlake</span>, <span class="lineage">3rd</span>. </span><span class="title"><i>Storage of Diffie-Hellman Keys in the Domain Name System (DNS)</i>. </span><span class="pubdate">March 1999. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2606242"></a><p>[<abbr class="abbrev">RFC2540</abbr>] <span class="authorgroup"><span class="firstname">D.</span> <span class="surname">Eastlake</span>, <span class="lineage">3rd</span>. </span><span class="title"><i>Detached Domain Name System (DNS) Information</i>. </span><span class="pubdate">March 1999. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2606272"></a><p>[<abbr class="abbrev">RFC2782</abbr>] <span class="author"><span class="firstname">A.</span> <span class="surname">Gulbrandsen</span>. </span><span class="author"><span class="firstname">P.</span> <span class="surname">Vixie</span>. </span><span class="author"><span class="firstname">L.</span> <span class="surname">Esibov</span>. </span><span class="title"><i>A DNS RR for specifying the location of services (DNS SRV)</i>. </span><span class="pubdate">February 2000. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2606314"></a><p>[<abbr class="abbrev">RFC2915</abbr>] <span class="author"><span class="firstname">M.</span> <span class="surname">Mealling</span>. </span><span class="author"><span class="firstname">R.</span> <span class="surname">Daniel</span>. </span><span class="title"><i>The Naming Authority Pointer (NAPTR) DNS Resource Record</i>. </span><span class="pubdate">September 2000. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2606347"></a><p>[<abbr class="abbrev">RFC3110</abbr>] <span class="author"><span class="firstname">D.</span> <span class="surname">Eastlake</span>, <span class="lineage">3rd</span>. </span><span class="title"><i>RSA/SHA-1 SIGs and RSA KEYs in the Domain Name System (DNS)</i>. </span><span class="pubdate">May 2001. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2606374"></a><p>[<abbr class="abbrev">RFC3123</abbr>] <span class="author"><span class="firstname">P.</span> <span class="surname">Koch</span>. </span><span class="title"><i>A DNS RR Type for Lists of Address Prefixes (APL RR)</i>. </span><span class="pubdate">June 2001. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2606397"></a><p>[<abbr class="abbrev">RFC3596</abbr>] <span class="authorgroup"><span class="firstname">S.</span> <span class="surname">Thomson</span>, <span class="firstname">C.</span> <span class="surname">Huitema</span>, <span class="firstname">V.</span> <span class="surname">Ksinant</span>, and <span class="firstname">M.</span> <span class="surname">Souissi</span>. </span><span class="title"><i><acronym class="acronym">DNS</acronym> Extensions to support IP
71c66a876ecca77923638d3f94cc0783152b2f03Mark Andrews version 6</i>. </span><span class="pubdate">October 2003. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2606455"></a><p>[<abbr class="abbrev">RFC3597</abbr>] <span class="author"><span class="firstname">A.</span> <span class="surname">Gustafsson</span>. </span><span class="title"><i>Handling of Unknown DNS Resource Record (RR) Types</i>. </span><span class="pubdate">September 2003. </span></p>
71c66a876ecca77923638d3f94cc0783152b2f03Mark Andrews<acronym class="acronym">DNS</acronym> and the Internet</h3>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2606487"></a><p>[<abbr class="abbrev">RFC1101</abbr>] <span class="author"><span class="firstname">P. V.</span> <span class="surname">Mockapetris</span>. </span><span class="title"><i><acronym class="acronym">DNS</acronym> Encoding of Network Names
71c66a876ecca77923638d3f94cc0783152b2f03Mark Andrews and Other Types</i>. </span><span class="pubdate">April 1989. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2606513"></a><p>[<abbr class="abbrev">RFC1123</abbr>] <span class="author"><span class="surname">Braden</span>. </span><span class="title"><i>Requirements for Internet Hosts - Application and
71c66a876ecca77923638d3f94cc0783152b2f03Mark Andrews Support</i>. </span><span class="pubdate">October 1989. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2606535"></a><p>[<abbr class="abbrev">RFC1591</abbr>] <span class="author"><span class="firstname">J.</span> <span class="surname">Postel</span>. </span><span class="title"><i>Domain Name System Structure and Delegation</i>. </span><span class="pubdate">March 1994. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2606558"></a><p>[<abbr class="abbrev">RFC2317</abbr>] <span class="authorgroup"><span class="firstname">H.</span> <span class="surname">Eidnes</span>, <span class="firstname">G.</span> <span class="surname">de Groot</span>, and <span class="firstname">P.</span> <span class="surname">Vixie</span>. </span><span class="title"><i>Classless IN-ADDR.ARPA Delegation</i>. </span><span class="pubdate">March 1998. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2606604"></a><p>[<abbr class="abbrev">RFC2826</abbr>] <span class="authorgroup"><span class="surname">Internet Architecture Board</span>. </span><span class="title"><i>IAB Technical Comment on the Unique DNS Root</i>. </span><span class="pubdate">May 2000. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2606628"></a><p>[<abbr class="abbrev">RFC2929</abbr>] <span class="authorgroup"><span class="firstname">D.</span> <span class="surname">Eastlake</span>, <span class="lineage">3rd</span>, <span class="firstname">E.</span> <span class="surname">Brunner-Williams</span>, and <span class="firstname">B.</span> <span class="surname">Manning</span>. </span><span class="title"><i>Domain Name System (DNS) IANA Considerations</i>. </span><span class="pubdate">September 2000. </span></p>
71c66a876ecca77923638d3f94cc0783152b2f03Mark Andrews<acronym class="acronym">DNS</acronym> Operations</h3>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2606685"></a><p>[<abbr class="abbrev">RFC1033</abbr>] <span class="author"><span class="firstname">M.</span> <span class="surname">Lottor</span>. </span><span class="title"><i>Domain administrators operations guide.</i>. </span><span class="pubdate">November 1987. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2606709"></a><p>[<abbr class="abbrev">RFC1537</abbr>] <span class="author"><span class="firstname">P.</span> <span class="surname">Beertema</span>. </span><span class="title"><i>Common <acronym class="acronym">DNS</acronym> Data File
71c66a876ecca77923638d3f94cc0783152b2f03Mark Andrews Configuration Errors</i>. </span><span class="pubdate">October 1993. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2606736"></a><p>[<abbr class="abbrev">RFC1912</abbr>] <span class="author"><span class="firstname">D.</span> <span class="surname">Barr</span>. </span><span class="title"><i>Common <acronym class="acronym">DNS</acronym> Operational and
71c66a876ecca77923638d3f94cc0783152b2f03Mark Andrews Configuration Errors</i>. </span><span class="pubdate">February 1996. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2606762"></a><p>[<abbr class="abbrev">RFC2010</abbr>] <span class="authorgroup"><span class="firstname">B.</span> <span class="surname">Manning</span> and <span class="firstname">P.</span> <span class="surname">Vixie</span>. </span><span class="title"><i>Operational Criteria for Root Name Servers.</i>. </span><span class="pubdate">October 1996. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2606798"></a><p>[<abbr class="abbrev">RFC2219</abbr>] <span class="authorgroup"><span class="firstname">M.</span> <span class="surname">Hamilton</span> and <span class="firstname">R.</span> <span class="surname">Wright</span>. </span><span class="title"><i>Use of <acronym class="acronym">DNS</acronym> Aliases for
71c66a876ecca77923638d3f94cc0783152b2f03Mark Andrews Network Services.</i>. </span><span class="pubdate">October 1997. </span></p>
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews<h3 class="title">Internationalized Domain Names</h3>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2606844"></a><p>[<abbr class="abbrev">RFC2825</abbr>] <span class="authorgroup"><span class="surname">IAB</span> and <span class="firstname">R.</span> <span class="surname">Daigle</span>. </span><span class="title"><i>A Tangled Web: Issues of I18N, Domain Names,
71c66a876ecca77923638d3f94cc0783152b2f03Mark Andrews and the Other Internet protocols</i>. </span><span class="pubdate">May 2000. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2606876"></a><p>[<abbr class="abbrev">RFC3490</abbr>] <span class="authorgroup"><span class="firstname">P.</span> <span class="surname">Faltstrom</span>, <span class="firstname">P.</span> <span class="surname">Hoffman</span>, and <span class="firstname">A.</span> <span class="surname">Costello</span>. </span><span class="title"><i>Internationalizing Domain Names in Applications (IDNA)</i>. </span><span class="pubdate">March 2003. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2606922"></a><p>[<abbr class="abbrev">RFC3491</abbr>] <span class="authorgroup"><span class="firstname">P.</span> <span class="surname">Hoffman</span> and <span class="firstname">M.</span> <span class="surname">Blanchet</span>. </span><span class="title"><i>Nameprep: A Stringprep Profile for Internationalized Domain Names</i>. </span><span class="pubdate">March 2003. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2606957"></a><p>[<abbr class="abbrev">RFC3492</abbr>] <span class="authorgroup"><span class="firstname">A.</span> <span class="surname">Costello</span>. </span><span class="title"><i>Punycode: A Bootstring encoding of Unicode
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews for Internationalized Domain Names in
71c66a876ecca77923638d3f94cc0783152b2f03Mark Andrews Applications (IDNA)</i>. </span><span class="pubdate">March 2003. </span></p>
71c66a876ecca77923638d3f94cc0783152b2f03Mark Andrews<h3 class="title">Other <acronym class="acronym">DNS</acronym>-related RFCs</h3>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="note" style="margin-left: 0.5in; margin-right: 0.5in;">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Note: the following list of RFCs, although
71c66a876ecca77923638d3f94cc0783152b2f03Mark Andrews <acronym class="acronym">DNS</acronym>-related, are not
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein concerned with implementing software.
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2607002"></a><p>[<abbr class="abbrev">RFC1464</abbr>] <span class="author"><span class="firstname">R.</span> <span class="surname">Rosenbaum</span>. </span><span class="title"><i>Using the Domain Name System To Store Arbitrary String
71c66a876ecca77923638d3f94cc0783152b2f03Mark Andrews Attributes</i>. </span><span class="pubdate">May 1993. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2607025"></a><p>[<abbr class="abbrev">RFC1713</abbr>] <span class="author"><span class="firstname">A.</span> <span class="surname">Romao</span>. </span><span class="title"><i>Tools for <acronym class="acronym">DNS</acronym> Debugging</i>. </span><span class="pubdate">November 1994. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2607050"></a><p>[<abbr class="abbrev">RFC1794</abbr>] <span class="author"><span class="firstname">T.</span> <span class="surname">Brisco</span>. </span><span class="title"><i><acronym class="acronym">DNS</acronym> Support for Load
71c66a876ecca77923638d3f94cc0783152b2f03Mark Andrews Balancing</i>. </span><span class="pubdate">April 1995. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2607076"></a><p>[<abbr class="abbrev">RFC2240</abbr>] <span class="author"><span class="firstname">O.</span> <span class="surname">Vaughan</span>. </span><span class="title"><i>A Legal Basis for Domain Name Allocation</i>. </span><span class="pubdate">November 1997. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2607099"></a><p>[<abbr class="abbrev">RFC2345</abbr>] <span class="authorgroup"><span class="firstname">J.</span> <span class="surname">Klensin</span>, <span class="firstname">T.</span> <span class="surname">Wolf</span>, and <span class="firstname">G.</span> <span class="surname">Oglesby</span>. </span><span class="title"><i>Domain Names and Company Name Retrieval</i>. </span><span class="pubdate">May 1998. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2607213"></a><p>[<abbr class="abbrev">RFC2352</abbr>] <span class="author"><span class="firstname">O.</span> <span class="surname">Vaughan</span>. </span><span class="title"><i>A Convention For Using Legal Names as Domain Names</i>. </span><span class="pubdate">May 1998. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2607237"></a><p>[<abbr class="abbrev">RFC3071</abbr>] <span class="authorgroup"><span class="firstname">J.</span> <span class="surname">Klensin</span>. </span><span class="title"><i>Reflections on the DNS, RFC 1591, and Categories of Domains</i>. </span><span class="pubdate">February 2001. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2607264"></a><p>[<abbr class="abbrev">RFC3258</abbr>] <span class="authorgroup"><span class="firstname">T.</span> <span class="surname">Hardie</span>. </span><span class="title"><i>Distributing Authoritative Name Servers via
71c66a876ecca77923638d3f94cc0783152b2f03Mark Andrews Shared Unicast Addresses</i>. </span><span class="pubdate">April 2002. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2607289"></a><p>[<abbr class="abbrev">RFC3901</abbr>] <span class="authorgroup"><span class="firstname">A.</span> <span class="surname">Durand</span> and <span class="firstname">J.</span> <span class="surname">Ihren</span>. </span><span class="title"><i>DNS IPv6 Transport Operational Guidelines</i>. </span><span class="pubdate">September 2004. </span></p>
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews<h3 class="title">Obsolete and Unimplemented Experimental RFC</h3>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2607333"></a><p>[<abbr class="abbrev">RFC1712</abbr>] <span class="authorgroup"><span class="firstname">C.</span> <span class="surname">Farrell</span>, <span class="firstname">M.</span> <span class="surname">Schulze</span>, <span class="firstname">S.</span> <span class="surname">Pleitner</span>, and <span class="firstname">D.</span> <span class="surname">Baldoni</span>. </span><span class="title"><i><acronym class="acronym">DNS</acronym> Encoding of Geographical
71c66a876ecca77923638d3f94cc0783152b2f03Mark Andrews Location</i>. </span><span class="pubdate">November 1994. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2607390"></a><p>[<abbr class="abbrev">RFC2673</abbr>] <span class="authorgroup"><span class="firstname">M.</span> <span class="surname">Crawford</span>. </span><span class="title"><i>Binary Labels in the Domain Name System</i>. </span><span class="pubdate">August 1999. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2607417"></a><p>[<abbr class="abbrev">RFC2874</abbr>] <span class="authorgroup"><span class="firstname">M.</span> <span class="surname">Crawford</span> and <span class="firstname">C.</span> <span class="surname">Huitema</span>. </span><span class="title"><i>DNS Extensions to Support IPv6 Address Aggregation
71c66a876ecca77923638d3f94cc0783152b2f03Mark Andrews and Renumbering</i>. </span><span class="pubdate">July 2000. </span></p>
b05bdb520d83f7ecaad708fe305268c3420be01dMark Andrews<h3 class="title">Obsoleted DNS Security RFCs</h3>
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews<div class="note" style="margin-left: 0.5in; margin-right: 0.5in;">
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews Most of these have been consolidated into RFC4033,
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews RFC4034 and RFC4035 which collectively describe DNSSECbis.
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2607465"></a><p>[<abbr class="abbrev">RFC2065</abbr>] <span class="authorgroup"><span class="firstname">D.</span> <span class="surname">Eastlake</span>, <span class="lineage">3rd</span> and <span class="firstname">C.</span> <span class="surname">Kaufman</span>. </span><span class="title"><i>Domain Name System Security Extensions</i>. </span><span class="pubdate">January 1997. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2607505"></a><p>[<abbr class="abbrev">RFC2137</abbr>] <span class="author"><span class="firstname">D.</span> <span class="surname">Eastlake</span>, <span class="lineage">3rd</span>. </span><span class="title"><i>Secure Domain Name System Dynamic Update</i>. </span><span class="pubdate">April 1997. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2607531"></a><p>[<abbr class="abbrev">RFC2535</abbr>] <span class="authorgroup"><span class="firstname">D.</span> <span class="surname">Eastlake</span>, <span class="lineage">3rd</span>. </span><span class="title"><i>Domain Name System Security Extensions</i>. </span><span class="pubdate">March 1999. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2607561"></a><p>[<abbr class="abbrev">RFC3008</abbr>] <span class="authorgroup"><span class="firstname">B.</span> <span class="surname">Wellington</span>. </span><span class="title"><i>Domain Name System Security (DNSSEC)
71c66a876ecca77923638d3f94cc0783152b2f03Mark Andrews Signing Authority</i>. </span><span class="pubdate">November 2000. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2607587"></a><p>[<abbr class="abbrev">RFC3090</abbr>] <span class="authorgroup"><span class="firstname">E.</span> <span class="surname">Lewis</span>. </span><span class="title"><i>DNS Security Extension Clarification on Zone Status</i>. </span><span class="pubdate">March 2001. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2607613"></a><p>[<abbr class="abbrev">RFC3445</abbr>] <span class="authorgroup"><span class="firstname">D.</span> <span class="surname">Massey</span> and <span class="firstname">S.</span> <span class="surname">Rose</span>. </span><span class="title"><i>Limiting the Scope of the KEY Resource Record (RR)</i>. </span><span class="pubdate">December 2002. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2607650"></a><p>[<abbr class="abbrev">RFC3655</abbr>] <span class="authorgroup"><span class="firstname">B.</span> <span class="surname">Wellington</span> and <span class="firstname">O.</span> <span class="surname">Gudmundsson</span>. </span><span class="title"><i>Redefinition of DNS Authenticated Data (AD) bit</i>. </span><span class="pubdate">November 2003. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2607686"></a><p>[<abbr class="abbrev">RFC3658</abbr>] <span class="authorgroup"><span class="firstname">O.</span> <span class="surname">Gudmundsson</span>. </span><span class="title"><i>Delegation Signer (DS) Resource Record (RR)</i>. </span><span class="pubdate">December 2003. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2607713"></a><p>[<abbr class="abbrev">RFC3755</abbr>] <span class="authorgroup"><span class="firstname">S.</span> <span class="surname">Weiler</span>. </span><span class="title"><i>Legacy Resolver Compatibility for Delegation Signer (DS)</i>. </span><span class="pubdate">May 2004. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2607739"></a><p>[<abbr class="abbrev">RFC3757</abbr>] <span class="authorgroup"><span class="firstname">O.</span> <span class="surname">Kolkman</span>, <span class="firstname">J.</span> <span class="surname">Schlyter</span>, and <span class="firstname">E.</span> <span class="surname">Lewis</span>. </span><span class="title"><i>Domain Name System KEY (DNSKEY) Resource Record
71c66a876ecca77923638d3f94cc0783152b2f03Mark Andrews (RR) Secure Entry Point (SEP) Flag</i>. </span><span class="pubdate">April 2004. </span></p>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2607784"></a><p>[<abbr class="abbrev">RFC3845</abbr>] <span class="authorgroup"><span class="firstname">J.</span> <span class="surname">Schlyter</span>. </span><span class="title"><i>DNS Security (DNSSEC) NextSECure (NSEC) RDATA Format</i>. </span><span class="pubdate">August 2004. </span></p>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h3 class="title">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="internet_drafts"></a>Internet Drafts</h3></div></div></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Internet Drafts (IDs) are rough-draft working documents of
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the Internet Engineering Task Force. They are, in essence, RFCs
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein in the preliminary stages of development. Implementors are
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein cautioned not
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to regard IDs as archival, and they should not be quoted or cited
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein in any formal documents unless accompanied by the disclaimer that
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein they are "works in progress." IDs have a lifespan of six months
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein after which they are deleted unless updated by their authors.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h3 class="title">
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2607826"></a>Other Documents About <acronym class="acronym">BIND</acronym>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h4 class="title">
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2607835"></a>Bibliography</h4></div></div></div>
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2607837"></a><p><span class="authorgroup"><span class="firstname">Paul</span> <span class="surname">Albitz</span> and <span class="firstname">Cricket</span> <span class="surname">Liu</span>. </span><span class="title"><i><acronym class="acronym">DNS</acronym> and <acronym class="acronym">BIND</acronym></i>. </span><span class="copyright">Copyright � 1998 Sebastopol, CA: O'Reilly and Associates. </span></p>
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater<div class="titlepage"><div><div><h2 class="title" style="clear: both">
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater<a name="bind9.library"></a>BIND 9 DNS Library Support</h2></div></div></div>
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater<p>This version of BIND 9 "exports" its internal libraries so
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater that they can be used by third-party applications more easily (we
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater call them "export" libraries in this document). In addition to
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater all major DNS-related APIs BIND 9 is currently using, the export
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater libraries provide the following features:</p>
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater<li><p>The newly created "DNS client" module. This is a higher
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater level API that provides an interface to name resolution,
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater single DNS transaction with a particular server, and dynamic
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater update. Regarding name resolution, it supports advanced
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater features such as DNSSEC validation and caching. This module
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater supports both synchronous and asynchronous mode.</p></li>
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater<li><p>The new "IRS" (Information Retrieval System) library.
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater It provides an interface to parse the traditional resolv.conf
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater file and more advanced, DNS-specific configuration file for
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater the rest of this package (see the description for the
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater<li><p>As part of the IRS library, newly implemented standard
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater address-name mapping functions, getaddrinfo() and
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater getnameinfo(), are provided. They use the DNSSEC-aware
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater validating resolver backend, and could use other advanced
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater features of the BIND 9 libraries such as caching. The
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater getaddrinfo() function resolves both A and AAAA RRs
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater concurrently (when the address family is unspecified).</p></li>
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater<li><p>An experimental framework to support other event
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater libraries than BIND 9's internal event task system.</p></li>
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater<div class="titlepage"><div><div><h3 class="title">
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2610234"></a>Prerequisite</h3></div></div></div>
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater<p>GNU make is required to build the export libraries (other
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater part of BIND 9 can still be built with other types of make). In
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater the reminder of this document, "make" means GNU make. Note that
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater in some platforms you may need to invoke a different command name
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater than "make" (e.g. "gmake") to indicate it's GNU make.</p>
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater<div class="titlepage"><div><div><h3 class="title">
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2609425"></a>Compilation</h3></div></div></div>
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater$ <strong class="userinput"><code>/configure --enable-exportlib <em class="replaceable"><code>[other flags]</code></em></code></strong>
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater$ <strong class="userinput"><code>make</code></strong>
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater This will create (in addition to usual BIND 9 programs) and a
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater separate set of libraries under the lib/export directory. For
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater example, <code class="filename">lib/export/dns/libdns.a</code> is the archive file of the
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater export version of the BIND 9 DNS library. Sample application
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater programs using the libraries will also be built under the
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater lib/export/samples directory (see below).</p>
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater<div class="titlepage"><div><div><h3 class="title">
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2609449"></a>Installation</h3></div></div></div>
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater$ <strong class="userinput"><code>cd lib/export</code></strong>
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater$ <strong class="userinput"><code>make install</code></strong>
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater This will install library object files under the directory
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater specified by the --with-export-libdir configure option (default:
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater EPREFIX/lib/bind9), and header files under the directory
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater specified by the --with-export-includedir configure option
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater Root privilege is normally required.
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater "<span><strong class="command">make install</strong></span>" at the top directory will do the
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater To see how to build your own
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater application after the installation, see
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater <code class="filename">lib/export/samples/Makefile-postinstall.in</code>.</p>
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater<div class="titlepage"><div><div><h3 class="title">
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2609480"></a>Known Defects/Restrictions</h3></div></div></div>
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater<li><p>Currently, win32 is not supported for the export
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater library. (Normal BIND 9 application can be built as
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater<p>The "fixed" RRset order is not (currently) supported in
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater the export library. If you want to use "fixed" RRset order
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater for, e.g. <span><strong class="command">named</strong></span> while still building the
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater export library even without the fixed order support, build
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater them separately:
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater$ <strong class="userinput"><code>/configure --enable-fixed-rrset <em class="replaceable"><code>[other flags, but not --enable-exportlib]</code></em></code></strong>
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater$ <strong class="userinput"><code>make</code></strong>
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater$ <strong class="userinput"><code>/configure --enable-exportlib <em class="replaceable"><code>[other flags, but not --enable-fixed-rrset]</code></em></code></strong>
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater$ <strong class="userinput"><code>cd lib/export</code></strong>
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater$ <strong class="userinput"><code>make</code></strong>
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater<li><p>The client module and the IRS library currently do not
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater support DNSSEC validation using DLV (the underlying modules
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater can handle it, but there is no tunable interface to enable
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater<li><p>RFC 5011 is not supported in the validating stub
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater resolver of the export library. In fact, it is not clear
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater whether it should: trust anchors would be a system-wide
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater configuration which would be managed by an administrator,
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater while the stub resolver will be used by ordinary applications
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater<li><p>Not all common <code class="filename">/etc/resolv.conf</code>
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater options are supported
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater in the IRS library. The only available options in this
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater<div class="titlepage"><div><div><h3 class="title">
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2609557"></a>The dns.conf File</h3></div></div></div>
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater<p>The IRS library supports an "advanced" configuration file
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater related to the DNS library for configuration parameters that
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater would be beyond the capability of the
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater <code class="filename">resolv.conf</code> file.
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater Specifically, it is intended to provide DNSSEC related
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater configuration parameters. By default the path to this
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater configuration file is <code class="filename">/etc/dns.conf</code>.
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater This module is very
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater experimental and the configuration syntax or library interfaces
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater may change in future versions. Currently, only the
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater <span><strong class="command">trusted-keys</strong></span>
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater statement is supported, whose syntax is the same as the same name
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater of statement for <code class="filename">named.conf</code>. (See
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater <a href="Bv9ARM.ch06.html#trusted-keys" title="trusted-keys Statement Grammar">the section called “<span><strong class="command">trusted-keys</strong></span> Statement Grammar”</a> for details.)</p>
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater<div class="titlepage"><div><div><h3 class="title">
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2609584"></a>Sample Applications</h3></div></div></div>
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater<p>Some sample application programs using this API are
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater provided for reference. The following is a brief description of
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater these applications.
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater<div class="titlepage"><div><div><h4 class="title">
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2609592"></a>sample: a simple stub resolver utility</h4></div></div></div>
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater It sends a query of a given name (of a given optional RR type) to a
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater specified recursive server, and prints the result as a list of
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater RRs. It can also act as a validating stub resolver if a trust
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater anchor is given via a set of command line options.</p>
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater Usage: sample [options] server_address hostname
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater Options and Arguments:
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater specify the RR type of the query. The default is the A RR.
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater [-a algorithm] [-e] -k keyname -K keystring
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater specify a command-line DNS key to validate the answer. For
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater example, to specify the following DNSKEY of example.com:
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater����������������example.com.�3600�IN�DNSKEY�257�3�5�xxx<br>
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater specify the options as follows:
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater -e means that this key is a zone's "key signing key" (as known
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater as "secure Entry point").
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater When -a is omitted rsasha1 will be used by default.
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater -s domain:alt_server_address
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater specify a separate recursive server address for the specific
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater "domain". Example: -s example.com:2001:db8::1234
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater<dt><span class="term">server_address</span></dt>
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater an IP(v4/v6) address of the recursive server to which queries
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater<dt><span class="term">hostname</span></dt>
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater the domain name for the query
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater<div class="titlepage"><div><div><h4 class="title">
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2609683"></a>sample-async: a simple stub resolver, working asynchronously</h4></div></div></div>
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater Similar to "sample", but accepts a list
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater of (query) domain names as a separate file and resolves the names
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater asynchronously.</p>
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater Usage: sample-async [-s server_address] [-t RR_type] input_file</p>
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater Options and Arguments:
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater -s server_address
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater an IPv4 address of the recursive server to which queries are sent.
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater (IPv6 addresses are not supported in this implementation)
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater specify the RR type of the queries. The default is the A
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater a list of domain names to be resolved. each line
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater consists of a single domain name. Example:
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater<div class="titlepage"><div><div><h4 class="title">
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2609736"></a>sample-request: a simple DNS transaction client</h4></div></div></div>
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater It sends a query to a specified server, and
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater prints the response with minimal processing. It doesn't act as a
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater "stub resolver": it stops the processing once it gets any
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater response from the server, whether it's a referral or an alias
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater (CNAME or DNAME) that would require further queries to get the
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater ultimate answer. In other words, this utility acts as a very
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater simplified <span><strong class="command">dig</strong></span>.
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater Usage: sample-request [-t RRtype] server_address hostname
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater Options and Arguments:
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater specify the RR type of
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater the queries. The default is the A RR.
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater server_address
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater address of the recursive server to which the query is sent.
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater the domain name for the query
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater<div class="titlepage"><div><div><h4 class="title">
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2609800"></a>sample-gai: getaddrinfo() and getnameinfo() test code</h4></div></div></div>
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater This is a test program
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater to check getaddrinfo() and getnameinfo() behavior. It takes a
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater host name as an argument, calls getaddrinfo() with the given host
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater name, and calls getnameinfo() with the resulting IP addresses
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater returned by getaddrinfo(). If the dns.conf file exists and
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater defines a trust anchor, the underlying resolver will act as a
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater validating resolver, and getaddrinfo()/getnameinfo() will fail
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater with an EAI_INSECUREDATA error when DNSSEC validation fails.
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater Usage: sample-gai hostname
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater<div class="titlepage"><div><div><h4 class="title">
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2609815"></a>sample-update: a simple dynamic update client program</h4></div></div></div>
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater It accepts a single update command as a
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater command-line argument, sends an update request message to the
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater authoritative server, and shows the response from the server. In
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater other words, this is a simplified <span><strong class="command">nsupdate</strong></span>.
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater Usage: sample-update [options] (add|delete) "update data"
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater Options and Arguments:
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater -a auth_server
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater An IP address of the authoritative server that has authority
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater for the zone containing the update name. This should normally
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater be the primary authoritative server that accepts dynamic
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater updates. It can also be a secondary server that is configured
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater to forward update requests to the primary server.
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater A TSIG key file to secure the update transaction. The keyfile
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater format is the same as that for the nsupdate utility.
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater -p prerequisite
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater A prerequisite for the update (only one prerequisite can be
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater specified). The prerequisite format is the same as that is
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater accepted by the nsupdate utility.
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater -r recursive_server
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater An IP address of a recursive server that this utility will
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater use. A recursive server may be necessary to identify the
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater authoritative server address to which the update request is
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater The domain name of the zone that contains
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater Specify the type of update operation. Either "add" or "delete"
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater must be specified.
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater Specify the data to be updated. A typical example of the data
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater would look like "name TTL RRtype RDATA".
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater<div class="note" style="margin-left: 0.5in; margin-right: 0.5in;">
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater<h3 class="title">Note</h3>In practice, either -a or -r must be specified. Others can
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater be optional; the underlying library routine tries to identify the
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater appropriate server and the zone name for the update.</div>
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater Examples: assuming the primary authoritative server of the
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater dynamic.example.com zone has an IPv6 address 2001:db8::1234,
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater$ <strong class="userinput"><code>sample-update -a sample-update -k Kxxx.+nnn+mmmm.key add "foo.dynamic.example.com 30 IN A 192.168.2.1"</code></strong></pre>
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater adds an A RR for foo.dynamic.example.com using the given key.
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater$ <strong class="userinput"><code>sample-update -a sample-update -k Kxxx.+nnn+mmmm.key delete "foo.dynamic.example.com 30 IN A"</code></strong></pre>
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater removes all A RRs for foo.dynamic.example.com using the given key.
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater$ <strong class="userinput"><code>sample-update -a sample-update -k Kxxx.+nnn+mmmm.key delete "foo.dynamic.example.com"</code></strong></pre>
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater removes all RRs for foo.dynamic.example.com using the given key.
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater<div class="titlepage"><div><div><h4 class="title">
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2610492"></a>nsprobe: domain/name server checker in terms of RFC 4074</h4></div></div></div>
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater It checks a set
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater of domains to see the name servers of the domains behave
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater correctly in terms of RFC 4074. This is included in the set of
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater sample programs to show how the export library can be used in a
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater DNS-related application.
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater Usage: nsprobe [-d] [-v [-v...]] [-c cache_address] [input_file]
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater run in the "debug" mode. with this option nsprobe will dump
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater every RRs it receives.
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater increase verbosity of other normal log messages. This can be
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater specified multiple times
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater -c cache_address
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater specify an IP address of a recursive (caching) name server.
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater nsprobe uses this server to get the NS RRset of each domain and
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater the A and/or AAAA RRsets for the name servers. The default
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater value is 127.0.0.1.
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater a file name containing a list of domain (zone) names to be
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater probed. when omitted the standard input will be used. Each
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater line of the input file specifies a single domain name such as
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater "example.com". In general this domain name must be the apex
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater name of some DNS zone (unlike normal "host names" such as
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater "www.example.com"). nsprobe first identifies the NS RRsets for
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater the given domain name, and sends A and AAAA queries to these
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater servers for some "widely used" names under the zone;
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater specifically, adding "www" and "ftp" to the zone name.
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater<div class="titlepage"><div><div><h3 class="title">
ea94d370123a5892f6c47a97f21d1b28d44bb168Tinderbox User<a name="id2610556"></a>Library References</h3></div></div></div>
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater<p>As of this writing, there is no formal "manual" of the
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater libraries, except this document, header files (some of them
44d0f0256fbdce130a18655023c3b06bacacbd61Automatic Updater provide pretty detailed explanations), and sample application
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a accesskey="p" href="Bv9ARM.ch08.html">Prev</a>�</td>
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews<td width="40%" align="right">�<a accesskey="n" href="Bv9ARM.ch10.html">Next</a>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<td width="40%" align="left" valign="top">Chapter�8.�Troubleshooting�</td>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<td width="20%" align="center"><a accesskey="h" href="Bv9ARM.html">Home</a></td>
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews<td width="40%" align="right" valign="top">�Manual pages</td>