📄 dnssec
字号:
Copyright (C) 2004 Internet Systems Consortium, Inc. ("ISC")Copyright (C) 2000-2002 Internet Software Consortium.See COPYRIGHT in the source root or http://isc.org/copyright.html for terms.DNSSEC Release NotesThis document summarizes the state of the DNSSEC implementation inthis release of BIND9.OpenSSL Library RequiredTo support DNSSEC, BIND 9 must be linked with version 0.9.6e or newer ofthe OpenSSL library. As of BIND 9.2, the library is no longerincluded in the distribution - it must be provided by the operatingsystem or installed separately.To build BIND 9 with OpenSSL, use "configure --with-openssl". Ifthe OpenSSL library is installed in a nonstandard location, you canspecify a path as in "configure --with-openssl=/var".Key Generation and SigningThe tools for generating DNSSEC keys and signatures are now in thebin/dnssec directory. Documentation for these programs can be foundin doc/arm/Bv9ARM.4.html and the man pages.The random data used in generating DNSSEC keys and signatures comesfrom either /dev/random (if the OS supports it) or keyboard input.Alternatively, a device or file containing entropy/random data can bespecified.Serving Secure ZonesWhen acting as an authoritative name server, BIND9 includes KEY, SIGand NXT records in responses as specified in RFC2535 when the requesthas the DO flag set in the query.Secure ResolutionBasic support for validation of DNSSEC signatures in responses hasbeen implemented but should still be considered experimental.When acting as a caching name server, BIND9 is capable of performingbasic DNSSEC validation of positive as well as nonexistence responses.This functionality is enabled by including a "trusted-keys" clausein the configuration file, containing the top-level zone key of thethe DNSSEC tree.Validation of wildcard responses is not currently supported. Inparticular, a "name does not exist" response will validatesuccessfully even if it does not contain the NXT records to prove thenonexistence of a matching wildcard.Proof of insecure status for insecure zones delegated from securezones works when the zones are completely insecure. Privatelysecured zones delegated from secure zones will not work in all cases,such as when the privately secured zone is served by the same serveras an ancestor (but not parent) zone.Handling of the CD bit in queries is now fully implemented. Validationis not attempted for recursive queries if CD is set.Secure Dynamic UpdateDynamic update of secure zones has been implemented, but may not becomplete. Affected NXT and SIG records are updated by the server whenan update occurs. Advanced access control is possible using the"update-policy" statement in the zone definition.Secure Zone TransfersBIND 9 does not implement the zone transfer security mechanisms ofRFC2535 section 5.6, and we have no plans to implement them in thefuture as we consider them inferior to the use of TSIG or SIG(0) toensure the integrity of zone transfers.$Id: dnssec,v 1.14.2.6.4.4 2004/03/08 09:04:25 marka Exp $
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -