rfc-compliance revision bf4fe7ca1b9c313200aaefec18ac165ce9efc16b
90f35c2f2a1c660f3b96eec413036d238df395f6Francis DupontCopyright (C) 2004, 2015 Internet Systems Consortium, Inc. ("ISC")
010a51c427bfb6ab658fc0056955a1a5b69810beTinderbox UserCopyright (C) 2001 Internet Software Consortium.
90f35c2f2a1c660f3b96eec413036d238df395f6Francis DupontSee COPYRIGHT in the source root or http://isc.org/copyright.html for terms.
90f35c2f2a1c660f3b96eec413036d238df395f6Francis DupontBIND 9 is striving for strict compliance with IETF standards. We
90f35c2f2a1c660f3b96eec413036d238df395f6Francis Dupontbelieve this release of BIND 9 complies with the following RFCs, with
90f35c2f2a1c660f3b96eec413036d238df395f6Francis Dupontthe caveats and exceptions listed in the numbered notes below. Note
90f35c2f2a1c660f3b96eec413036d238df395f6Francis Dupontthat a number of these RFCs do not have the status of Internet
90f35c2f2a1c660f3b96eec413036d238df395f6Francis Dupontstandards but are proposed or draft standards, experimental RFCs,
90f35c2f2a1c660f3b96eec413036d238df395f6Francis Dupontor Best Current Practice (BCP) documents. The list is non exhaustive.
90f35c2f2a1c660f3b96eec413036d238df395f6Francis Dupont RFC1035 [1] [2]
c7d32c0b0ff4c01f0d4479af3410d3c06044d48aAutomatic Updater RFC3491 (Obsoleted by 5890, 5891) [7]
fd2597f75693a2279fdf588bd40dfe2407c42028Tinderbox User RFC4294 - Section 5.1 [8]
e62b9c9ce6413fb183c8116381e75dcd07ca5517Tinderbox UserThe following DNS related RFC have been obsoleted
e62b9c9ce6413fb183c8116381e75dcd07ca5517Tinderbox User RFC2535 (Obsoleted by 4034, 4035) [3] [4]
e62b9c9ce6413fb183c8116381e75dcd07ca5517Tinderbox User RFC2537 (Obsoleted by 3110)
e62b9c9ce6413fb183c8116381e75dcd07ca5517Tinderbox User RFC2538 (Obsoleted by 4398)
e62b9c9ce6413fb183c8116381e75dcd07ca5517Tinderbox User RFC2671 (Obsoleted by 6891)
fd2597f75693a2279fdf588bd40dfe2407c42028Tinderbox User RFC2672 (Obsoleted by 6672)
90f35c2f2a1c660f3b96eec413036d238df395f6Francis Dupont RFC2673 (Obsoleted by 6891)
bbbf2e27d3a981163dab139497d6b2dc85449db0Tinderbox User RFC3008 (Obsoleted by 4034, 4035)
fd2597f75693a2279fdf588bd40dfe2407c42028Tinderbox User RFC3152 (Obsoleted by 3596)
e62b9c9ce6413fb183c8116381e75dcd07ca5517Tinderbox User RFC3445 (Obsoleted by 4034, 4035)
e62b9c9ce6413fb183c8116381e75dcd07ca5517Tinderbox User RFC3655 (Obsoleted by 4034, 4035)
fd2597f75693a2279fdf588bd40dfe2407c42028Tinderbox User RFC3658 (Obsoleted by 4034, 4035)
e62b9c9ce6413fb183c8116381e75dcd07ca5517Tinderbox User RFC3755 (Obsoleted by 4034, 4035)
e62b9c9ce6413fb183c8116381e75dcd07ca5517Tinderbox User RFC3757 (Obsoleted by 4034, 4035)
e62b9c9ce6413fb183c8116381e75dcd07ca5517Tinderbox User RFC3845 (Obsoleted by 4034, 4035)
e62b9c9ce6413fb183c8116381e75dcd07ca5517Tinderbox User[1] Queries to zones that have failed to load return SERVFAIL rather
e62b9c9ce6413fb183c8116381e75dcd07ca5517Tinderbox Userthan a non-authoritative response. This is considered a feature.
e62b9c9ce6413fb183c8116381e75dcd07ca5517Tinderbox User[2] CLASS ANY queries are not supported. This is considered a
e62b9c9ce6413fb183c8116381e75dcd07ca5517Tinderbox User[3] Wildcard records are not supported in DNSSEC secure zones.
e62b9c9ce6413fb183c8116381e75dcd07ca5517Tinderbox User[4] Servers authoritative for secure zones being resolved by BIND
e62b9c9ce6413fb183c8116381e75dcd07ca5517Tinderbox User9 must support EDNS0 (RFC2671), and must return all relevant SIGs
e62b9c9ce6413fb183c8116381e75dcd07ca5517Tinderbox Userand NXTs in responses rather than relying on the resolving server
fd2597f75693a2279fdf588bd40dfe2407c42028Tinderbox Userto perform separate queries for missing SIGs and NXTs.
e62b9c9ce6413fb183c8116381e75dcd07ca5517Tinderbox User[5] When receiving a query signed with a SIG(0), the server will
e62b9c9ce6413fb183c8116381e75dcd07ca5517Tinderbox Useronly be able to verify the signature if it has the key in its local
e62b9c9ce6413fb183c8116381e75dcd07ca5517Tinderbox Userauthoritative data; it will not do recursion or validation to
e62b9c9ce6413fb183c8116381e75dcd07ca5517Tinderbox Userretrieve unknown keys.
e62b9c9ce6413fb183c8116381e75dcd07ca5517Tinderbox User[6] Section 4 is ignored.
fd2597f75693a2279fdf588bd40dfe2407c42028Tinderbox User[7] Requires --with-idn to enable entry of IDN labels within dig,
90f35c2f2a1c660f3b96eec413036d238df395f6Francis Duponthost and nslookup at compile time. ACE labels are supported
fd2597f75693a2279fdf588bd40dfe2407c42028Tinderbox Usereverywhere with or without --with-idn.
e62b9c9ce6413fb183c8116381e75dcd07ca5517Tinderbox User[8] Section 5.1 - DNAME records are fully supported.
e62b9c9ce6413fb183c8116381e75dcd07ca5517Tinderbox User[9] Minimally Covering NSEC Record are accepted but not generated.
e62b9c9ce6413fb183c8116381e75dcd07ca5517Tinderbox User[10] Will interoperate with correctly designed experiments.
c7d32c0b0ff4c01f0d4479af3410d3c06044d48aAutomatic Updater[11] Named only uses ports to extend the id space, address are not
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User[12] Conditional on the OpenSSL library being linked against
c7d32c0b0ff4c01f0d4479af3410d3c06044d48aAutomatic Updatersupporting GOST.
c7d32c0b0ff4c01f0d4479af3410d3c06044d48aAutomatic Updater[13] Section 5.5 does not match reality. Named uses the presence
c7d32c0b0ff4c01f0d4479af3410d3c06044d48aAutomatic Updaterof DO=1 to detect if validation may be occuring. CD has no bearing
c7d32c0b0ff4c01f0d4479af3410d3c06044d48aAutomatic Updateron whether validation is occuring or not.
90f35c2f2a1c660f3b96eec413036d238df395f6Francis Dupont[14] Conditional on the OpenSSL library being linked against
fd2597f75693a2279fdf588bd40dfe2407c42028Tinderbox Usersupporting ECDSA.
e62b9c9ce6413fb183c8116381e75dcd07ca5517Tinderbox User[15] Section 5.9 - Always set CD=1 on queries. This is *not* done as
e62b9c9ce6413fb183c8116381e75dcd07ca5517Tinderbox Userit prevents DNSSEC working correctly through another recursive server.
fd2597f75693a2279fdf588bd40dfe2407c42028Tinderbox UserWhen talking to a recurive server the best algorithm to do is send
e62b9c9ce6413fb183c8116381e75dcd07ca5517Tinderbox UserCD=0 and then send CD=1 iff SERVFAIL is returned in case the recurive
e62b9c9ce6413fb183c8116381e75dcd07ca5517Tinderbox Userserver has a bad clock and/or bad trust anchor. Alternatively one
e62b9c9ce6413fb183c8116381e75dcd07ca5517Tinderbox Usercan send CD=1 then CD=0 on validation failure in case the recursive
f8e3e03cacd16ffb923a9603fca23a9e1a1fee07Automatic Updaterserver is under attack or there is stale / bogus authoritative data.
e62b9c9ce6413fb183c8116381e75dcd07ca5517Tinderbox User[16] Named doesn't currently encrypt DNS requests so the PAD option
e62b9c9ce6413fb183c8116381e75dcd07ca5517Tinderbox Useris accepted but not returned in responses.