⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 draft-ietf-dnsext-dnssec-opt-in-05.txt

📁 bind-3.2.
💻 TXT
📖 第 1 页 / 共 3 页
字号:
Arends, et al.          Expires August 28, 2003                [Page 18]Internet-Draft               DNSSEC Opt-In                 February 2003Informative References   [5]   Bradner, S., "Key words for use in RFCs to Indicate Requirement         Levels", BCP 14, RFC 2119, March 1997.   [6]   Elz, R. and R. Bush, "Clarifications to the DNS Specification",         RFC 2181, July 1997.   [7]   Eastlake, D., "Secure Domain Name System Dynamic Update", RFC         2137, April 1997.   [8]   Lewis, E., "DNS Security Extension Clarification on Zone         Status", RFC 3090, March 2001.   [9]   Conrad, D., "Indicating Resolver Support of DNSSEC", RFC 3225,         December 2001.   [10]  Atkins, D. and R. Austein, "Threat Analysis Of The Domain Name         System", draft-ietf-dnsext-dns-threats-02 (work in progress),         November 2002.Authors' Addresses   Roy Arends   Telematica Instituut   Drienerlolaan 5   7522 NB  Enschede   NL   EMail: roy.arends@telin.nl   Mark Kosters   Verisign, Inc.   21355 Ridgetop Circle   Dulles, VA  20166   US   Phone: +1 703 948 3200   EMail: markk@verisign.com   URI:   http://www.verisignlabs.comArends, et al.          Expires August 28, 2003                [Page 19]Internet-Draft               DNSSEC Opt-In                 February 2003   David Blacka   Verisign, Inc.   21355 Ridgetop Circle   Dulles, VA  20166   US   Phone: +1 703 948 3200   EMail: davidb@verisign.com   URI:   http://www.verisignlabs.comArends, et al.          Expires August 28, 2003                [Page 20]Internet-Draft               DNSSEC Opt-In                 February 2003Appendix A. Implementing Opt-In using "Views"   In many cases, it may be convenient to implement an Opt-In zone by   combining two separately maintained "views" of a zone at request   time.  In this context, "view" refers to a particular version of a   zone, not to any specific DNS implementation feature.   In this scenario, one view is the secure view, the other is the   insecure (or legacy) view.  The secure view consists of an entirely   signed zone using Opt-In tagged NXT records.  The insecure view   contains no DNSSEC information.  It is helpful, although not   necessary, for the secure view to be a subset (minus DNSSEC records)   of the insecure view.   In addition, the only RRsets that may solely exist in the insecure   view are non-zone-apex NS RRsets. That is, all non-NS RRsets (and the   zone apex NS RRset) MUST be signed and in the secure view.   These two views may be combined at request time to provide a virtual,   single Opt-In zone.  The following algorithm is used when responding   to each query:      V_A is the secure view as described above.      V_B is the insecure view as described above.      R_A is a response generated from V_A, following RFC 2535 [2].      R_B is a response generated from V_B, following DNS resolution as      per RFC 1035 [1].      R_C is the response generated by combining R_A with R_B, as      described below.      A query is DNSSEC-aware if it either has the DO bit [9] turned on,      or is for a DNSSEC-specific record type.   1.  If V_A is a subset of V_B and the query is not DNSSEC-aware,       generate and return R_B, otherwise   2.  Generate R_A.   3.  If R_A's RCODE != NXDOMAIN, return R_A, otherwise   4.  Generate R_B and combine it with R_A to form R_C:Arends, et al.          Expires August 28, 2003                [Page 21]Internet-Draft               DNSSEC Opt-In                 February 2003          For each section (ANSWER, AUTHORITY, ADDITIONAL), copy the          records from R_A into R_B, EXCEPT the AUTHORITY section SOA          record, if R_B's RCODE = NOERROR.   5.  Return R_C.Arends, et al.          Expires August 28, 2003                [Page 22]Internet-Draft               DNSSEC Opt-In                 February 2003Appendix B. Changes from Prior Versions   Changes from version 04:      Added definitions for "signed name" and "unsigned name".      Added text to make it clear that insecure delegations may have      Opt-In NXT records of the same name.  Updated the example to have      one of these.      Changed Server-side requirements from MUST NOT to SHOULD NOT and      added some basic description of what action to take in the face of      violating the delegation-only restriction.      Relaxed requirement that servers drop negative wildcard proof from      MUST to MAY, reiterated the client requirement.      Added section on Dynamic Update declaring it to be undefined wrt      Opt-In.      Essentially rewrote the "Security Considerations" section. It does      not actually say anything different, but hopefully it says it in a      clearer fashion.      Split references into Normative and Informative.      Fixed the example zone and responses to match Delegation Signer.   Changes from version 03:      Editorial changes for clarification only.   Changes from version 02:      Added text on changes to validation process, use of the AD bit,      and interactions with wildcards.  Added wildcard caveats to the      "Security Considerations" section.  Added "Transition Issues"      section.   Changes from version 01:      Changed to "delegation only". Strengthened "Security      Considerations" section. Added "Server Considerations" and "Client      Considerations" sections.  Added AD bit requirement.   Changes from version 00:      Complete rewrite, altering approach from "views" to tagged NXTArends, et al.          Expires August 28, 2003                [Page 23]Internet-Draft               DNSSEC Opt-In                 February 2003      recordsArends, et al.          Expires August 28, 2003                [Page 24]Internet-Draft               DNSSEC Opt-In                 February 2003Intellectual Property Statement   The IETF takes no position regarding the validity or scope of any   intellectual property or other rights that might be claimed to   pertain to the implementation or use of the technology described in   this document or the extent to which any license under such rights   might or might not be available; neither does it represent that it   has made any effort to identify any such rights. Information on the   IETF's procedures with respect to rights in standards-track and   standards-related documentation can be found in BCP-11. Copies of   claims of rights made available for publication and any assurances of   licenses to be made available, or the result of an attempt made to   obtain a general license or permission for the use of such   proprietary rights by implementors or users of this specification can   be obtained from the IETF Secretariat.   The IETF invites any interested party to bring to its attention any   copyrights, patents or patent applications, or other proprietary   rights which may cover technology that may be required to practice   this standard. Please address the information to the IETF Executive   Director.Full Copyright Statement   Copyright (C) The Internet Society (2003). All Rights Reserved.   This document and translations of it may be copied and furnished to   others, and derivative works that comment on or otherwise explain it   or assist in its implementation may be prepared, copied, published   and distributed, in whole or in part, without restriction of any   kind, provided that the above copyright notice and this paragraph are   included on all such copies and derivative works. However, this   document itself may not be modified in any way, such as by removing   the copyright notice or references to the Internet Society or other   Internet organizations, except as needed for the purpose of   developing Internet standards in which case the procedures for   copyrights defined in the Internet Standards process must be   followed, or as required to translate it into languages other than   English.   The limited permissions granted above are perpetual and will not be   revoked by the Internet Society or its successors or assignees.   This document and the information contained herein is provided on an   "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING   TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING   BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATIONArends, et al.          Expires August 28, 2003                [Page 25]Internet-Draft               DNSSEC Opt-In                 February 2003   HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF   MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.Acknowledgement   Funding for the RFC Editor function is currently provided by the   Internet Society.Arends, et al.          Expires August 28, 2003                [Page 26]

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -