⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 rfc-compliance

📁 非常好的dns解析软件
💻
字号:
Copyright (C) 2004  Internet Systems Consortium, Inc. ("ISC")Copyright (C) 2001  Internet Software Consortium.See COPYRIGHT in the source root or http://isc.org/copyright.html for terms.$Id: rfc-compliance,v 1.4 2004/03/05 05:04:53 marka Exp $BIND 9 is striving for strict compliance with IETF standards.  Webelieve this release of BIND 9 complies with the following RFCs, withthe caveats and exceptions listed in the numbered notes below.  Notethat a number of these RFCs do not have the status of Internetstandards but are proposed or draft standards, experimental RFCs, or Best Current Practice (BCP) documents.  RFC1034  RFC1035 [1] [2]  RFC1123  RFC1183  RFC1535  RFC1536  RFC1706  RFC1712  RFC1750  RFC1876  RFC1982  RFC1995  RFC1996  RFC2136  RFC2163  RFC2181  RFC2230  RFC2308  RFC2535 [3] [4]  RFC2536  RFC2537  RFC2538  RFC2539  RFC2671  RFC2672  RFC2673  RFC2782  RFC2915  RFC2930  RFC2931 [5]  RFC3007[1] Queries to zones that have failed to load return SERVFAIL ratherthan a non-authoritative response.  This is considered a feature.[2] CLASS ANY queries are not supported.  This is considered a feature.[3] Wildcard records are not supported in DNSSEC secure zones.[4] Servers authoritative for secure zones being resolved by BIND 9must support EDNS0 (RFC2671), and must return all relevant SIGs andNXTs in responses rather than relying on the resolving server toperform separate queries for missing SIGs and NXTs.[5] When receiving a query signed with a SIG(0), the server will onlybe able to verify the signature if it has the key in its localauthoritative data; it will not do recursion or validation toretrieve unknown keys.

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -