mirror of
https://gitlab.isc.org/isc-projects/bind9
synced 2025-08-31 06:25:31 +00:00
regen master
This commit is contained in:
@@ -212,7 +212,7 @@
|
||||
<dt><span class="term">-r <em class="replaceable"><code>mode</code></em></span></dt>
|
||||
<dd><p>
|
||||
Check for records that are treated as different by DNSSEC but
|
||||
are semantically equal in plain DNS.
|
||||
are semantically equal in plain DNS.
|
||||
Possible modes are <span class="command"><strong>"fail"</strong></span>,
|
||||
<span class="command"><strong>"warn"</strong></span> (default) and
|
||||
<span class="command"><strong>"ignore"</strong></span>.
|
||||
|
@@ -60,7 +60,7 @@
|
||||
local DDNS key for use with <span class="command"><strong>nsupdate -l</strong></span>:
|
||||
it does this when a zone is configured with
|
||||
<span class="command"><strong>update-policy local;</strong></span>.
|
||||
<span class="command"><strong>ddns-confgen</strong></span> is only needed when a
|
||||
<span class="command"><strong>ddns-confgen</strong></span> is only needed when a
|
||||
more elaborate configuration is required: for instance,
|
||||
if <span class="command"><strong>nsupdate</strong></span> is to be used from a remote
|
||||
system.
|
||||
|
@@ -74,7 +74,7 @@
|
||||
<p>
|
||||
The IN and CH class names overlap with the IN and CH top level
|
||||
domain names. Either use the <code class="option">-t</code> and
|
||||
<code class="option">-c</code> options to specify the type and class,
|
||||
<code class="option">-c</code> options to specify the type and class,
|
||||
use the <code class="option">-q</code> the specify the domain name, or
|
||||
use "IN." and "CH." when looking up these top level domains.
|
||||
</p>
|
||||
@@ -771,7 +771,7 @@ dig +qr www.isc.org any -x 127.0.0.1 isc.org ns +noqr
|
||||
reply from the server.
|
||||
If you'd like to turn off the IDN support for some reason, defines
|
||||
the <code class="envar">IDN_DISABLE</code> environment variable.
|
||||
The IDN support is disabled if the variable is set when
|
||||
The IDN support is disabled if the variable is set when
|
||||
<span class="command"><strong>dig</strong></span> runs.
|
||||
</p>
|
||||
</div>
|
||||
|
@@ -178,7 +178,7 @@
|
||||
<code class="filename">/etc/resolv.conf</code>.
|
||||
</p>
|
||||
<p>
|
||||
The <code class="option">-s</code> option tells <span class="command"><strong>host</strong></span>
|
||||
The <code class="option">-s</code> option tells <span class="command"><strong>host</strong></span>
|
||||
<span class="emphasis"><em>not</em></span> to send the query to the next nameserver
|
||||
if any server responds with a SERVFAIL response, which is the
|
||||
reverse of normal stub resolver behavior.
|
||||
@@ -198,7 +198,7 @@
|
||||
<a name="id-1.8"></a><h2>IDN SUPPORT</h2>
|
||||
<p>
|
||||
If <span class="command"><strong>host</strong></span> has been built with IDN (internationalized
|
||||
domain name) support, it can accept and display non-ASCII domain names.
|
||||
domain name) support, it can accept and display non-ASCII domain names.
|
||||
<span class="command"><strong>host</strong></span> appropriately converts character encoding of
|
||||
domain name before sending a request to DNS server or displaying a
|
||||
reply from the server.
|
||||
|
@@ -94,7 +94,7 @@
|
||||
<dd><p>
|
||||
Include ZSKs when generating DS records. Without this option,
|
||||
only keys which have the KSK flag set will be converted to DS
|
||||
records and printed. Useful only in zone file mode.
|
||||
records and printed. Useful only in zone file mode.
|
||||
</p></dd>
|
||||
<dt><span class="term">-l <em class="replaceable"><code>domain</code></em></span></dt>
|
||||
<dd><p>
|
||||
|
@@ -281,7 +281,7 @@
|
||||
</p>
|
||||
<p>
|
||||
If the key is being created as an explicit successor to another
|
||||
key, then the default prepublication interval is 30 days;
|
||||
key, then the default prepublication interval is 30 days;
|
||||
otherwise it is zero.
|
||||
</p>
|
||||
<p>
|
||||
@@ -313,7 +313,7 @@
|
||||
footprint).
|
||||
</p></li>
|
||||
</ul></div>
|
||||
<p><span class="command"><strong>dnssec-keyfromlabel</strong></span>
|
||||
<p><span class="command"><strong>dnssec-keyfromlabel</strong></span>
|
||||
creates two files, with names based
|
||||
on the printed string. <code class="filename">Knnnn.+aaa+iiiii.key</code>
|
||||
contains the public key, and
|
||||
|
@@ -328,7 +328,7 @@
|
||||
</p>
|
||||
<p>
|
||||
If the key is being created as an explicit successor to another
|
||||
key, then the default prepublication interval is 30 days;
|
||||
key, then the default prepublication interval is 30 days;
|
||||
otherwise it is zero.
|
||||
</p>
|
||||
<p>
|
||||
@@ -361,7 +361,7 @@
|
||||
footprint).
|
||||
</p></li>
|
||||
</ul></div>
|
||||
<p><span class="command"><strong>dnssec-keygen</strong></span>
|
||||
<p><span class="command"><strong>dnssec-keygen</strong></span>
|
||||
creates two files, with names based
|
||||
on the printed string. <code class="filename">Knnnn.+aaa+iiiii.key</code>
|
||||
contains the public key, and
|
||||
|
@@ -65,8 +65,8 @@
|
||||
fail when attempting to update a legacy key. With this option,
|
||||
the key will be recreated in the new format, but with the
|
||||
original key data retained. The key's creation date will be
|
||||
set to the present time. If no other values are specified,
|
||||
then the key's publication and activation dates will also
|
||||
set to the present time. If no other values are specified,
|
||||
then the key's publication and activation dates will also
|
||||
be set to the present time.
|
||||
</p></dd>
|
||||
<dt><span class="term">-K <em class="replaceable"><code>directory</code></em></span></dt>
|
||||
@@ -178,7 +178,7 @@
|
||||
</p>
|
||||
<p>
|
||||
If the key is being set to be an explicit successor to another
|
||||
key, then the default prepublication interval is 30 days;
|
||||
key, then the default prepublication interval is 30 days;
|
||||
otherwise it is zero.
|
||||
</p>
|
||||
<p>
|
||||
|
@@ -74,7 +74,7 @@
|
||||
(<code class="option">-S</code>) is used, DNSKEY records are also
|
||||
included. The resulting file can be included in the original
|
||||
zone file with <span class="command"><strong>$INCLUDE</strong></span>. This option
|
||||
cannot be combined with <code class="option">-O raw</code>,
|
||||
cannot be combined with <code class="option">-O raw</code>,
|
||||
<code class="option">-O map</code>, or serial number updating.
|
||||
</p></dd>
|
||||
<dt><span class="term">-E <em class="replaceable"><code>engine</code></em></span></dt>
|
||||
@@ -328,7 +328,7 @@
|
||||
<p>
|
||||
Normally, when a previously-signed zone is passed as input
|
||||
to the signer, and a DNSKEY record has been removed and
|
||||
replaced with a new one, signatures from the old key
|
||||
replaced with a new one, signatures from the old key
|
||||
that are still within their validity period are retained.
|
||||
This allows the zone to continue to validate with cached
|
||||
copies of the old DNSKEY RRset. The <code class="option">-Q</code>
|
||||
@@ -391,7 +391,7 @@
|
||||
<dd><p>
|
||||
If the key's activation date is set and in the past, the
|
||||
key is published (regardless of publication date) and
|
||||
used to sign the zone.
|
||||
used to sign the zone.
|
||||
</p></dd>
|
||||
<dt></dt>
|
||||
<dd><p>
|
||||
|
@@ -39,7 +39,7 @@
|
||||
server that answers queries using the BIND 9 lightweight
|
||||
resolver protocol rather than the DNS protocol.
|
||||
</p>
|
||||
<p><span class="command"><strong>lwresd</strong></span>
|
||||
<p><span class="command"><strong>lwresd</strong></span>
|
||||
listens for resolver queries on a
|
||||
UDP port on the IPv4 loopback interface, 127.0.0.1. This
|
||||
means that <span class="command"><strong>lwresd</strong></span> can only be used by
|
||||
@@ -123,7 +123,7 @@
|
||||
<em class="replaceable"><code>trace</code></em>,
|
||||
<em class="replaceable"><code>record</code></em>,
|
||||
<em class="replaceable"><code>size</code></em>, and
|
||||
<em class="replaceable"><code>mctx</code></em>.
|
||||
<em class="replaceable"><code>mctx</code></em>.
|
||||
These correspond to the ISC_MEM_DEBUGXXXX flags described in
|
||||
<code class="filename"><isc/mem.h></code>.
|
||||
</p></dd>
|
||||
|
@@ -49,7 +49,7 @@
|
||||
</p></dd>
|
||||
<dt><span class="term">-l <em class="replaceable"><code>domain</code></em></span></dt>
|
||||
<dd><p>
|
||||
Check for a DLV record in the specified lookaside domain,
|
||||
Check for a DLV record in the specified lookaside domain,
|
||||
instead of checking for a DS record in the zone's parent.
|
||||
For example, to check for DLV records for "example.com"
|
||||
in ISC's DLV zone, use:
|
||||
|
@@ -556,7 +556,7 @@
|
||||
operations (such as signing or generating
|
||||
NSEC3 chains) is stored in the zone in the form
|
||||
of DNS resource records of type
|
||||
<span class="command"><strong>sig-signing-type</strong></span>.
|
||||
<span class="command"><strong>sig-signing-type</strong></span>.
|
||||
<span class="command"><strong>rndc signing -list</strong></span> converts
|
||||
these records into a human-readable form,
|
||||
indicating which keys are currently signing
|
||||
@@ -582,7 +582,7 @@
|
||||
flags, iterations, and salt, in that order.
|
||||
</p>
|
||||
<p>
|
||||
Currently, the only defined value for hash algorithm
|
||||
Currently, the only defined value for hash algorithm
|
||||
is <code class="literal">1</code>, representing SHA-1.
|
||||
The <code class="option">flags</code> may be set to
|
||||
<code class="literal">0</code> or <code class="literal">1</code>,
|
||||
|
@@ -34,10 +34,10 @@
|
||||
<p>
|
||||
<span class="command"><strong>named-journalprint</strong></span>
|
||||
prints the contents of a zone journal file in a human-readable
|
||||
form.
|
||||
form.
|
||||
</p>
|
||||
<p>
|
||||
Journal files are automatically created by <span class="command"><strong>named</strong></span>
|
||||
Journal files are automatically created by <span class="command"><strong>named</strong></span>
|
||||
when changes are made to dynamic zones (e.g., by
|
||||
<span class="command"><strong>nsupdate</strong></span>). They record each addition
|
||||
or deletion of a resource record, in binary format, allowing the
|
||||
|
@@ -579,7 +579,7 @@ nameserver 172.16.72.4
|
||||
<p>
|
||||
TSIG keys can be generated using the <span class="command"><strong>tsig-keygen</strong></span>
|
||||
command; the output of the command is a <span class="command"><strong>key</strong></span> directive
|
||||
suitable for inclusion in <code class="filename">named.conf</code>. The
|
||||
suitable for inclusion in <code class="filename">named.conf</code>. The
|
||||
key name, algorithm and size can be specified by command line parameters;
|
||||
the defaults are "tsig-key", HMAC-SHA256, and 256 bits, respectively.
|
||||
</p>
|
||||
@@ -661,7 +661,7 @@ key "host1-host2." {
|
||||
signed using the specified key. Keys may also be specified
|
||||
in the <span class="command"><strong>also-notify</strong></span> statement of a master
|
||||
or slave zone, causing NOTIFY messages to be signed using
|
||||
the specified key.
|
||||
the specified key.
|
||||
</p>
|
||||
<p>
|
||||
Keys can also be specified in a <span class="command"><strong>server</strong></span>
|
||||
@@ -770,7 +770,7 @@ allow-update { !{ !localnets; any; }; key host1-host2. ;};
|
||||
<p>
|
||||
The TKEY process is initiated by a client or server by sending
|
||||
a query of type TKEY to a TKEY-aware server. The query must include
|
||||
an appropriate KEY record in the additional section, and
|
||||
an appropriate KEY record in the additional section, and
|
||||
must be signed using either TSIG or SIG(0) with a previously
|
||||
established key. The server's response, if successful, will
|
||||
contain a TKEY record in its answer section. After this transaction,
|
||||
@@ -1112,15 +1112,15 @@ options {
|
||||
<div class="section"><div class="titlepage"><div><div><h3 class="title">
|
||||
<a name="id-1.5.10.3"></a>Converting from insecure to secure</h3></div></div></div></div>
|
||||
<p>Changing a zone from insecure to secure can be done in two
|
||||
ways: using a dynamic DNS update, or the
|
||||
ways: using a dynamic DNS update, or the
|
||||
<span class="command"><strong>auto-dnssec</strong></span> zone option.</p>
|
||||
<p>For either method, you need to configure
|
||||
<span class="command"><strong>named</strong></span> so that it can see the
|
||||
<p>For either method, you need to configure
|
||||
<span class="command"><strong>named</strong></span> so that it can see the
|
||||
<code class="filename">K*</code> files which contain the public and private
|
||||
parts of the keys that will be used to sign the zone. These files
|
||||
will have been generated by
|
||||
will have been generated by
|
||||
<span class="command"><strong>dnssec-keygen</strong></span>. You can do this by placing them
|
||||
in the key-directory, as specified in
|
||||
in the key-directory, as specified in
|
||||
<code class="filename">named.conf</code>:</p>
|
||||
<pre class="programlisting">
|
||||
zone example.net {
|
||||
@@ -1146,7 +1146,7 @@ options {
|
||||
> send
|
||||
</pre>
|
||||
<p>While the update request will complete almost immediately,
|
||||
the zone will not be completely signed until
|
||||
the zone will not be completely signed until
|
||||
<span class="command"><strong>named</strong></span> has had time to walk the zone and
|
||||
generate the NSEC and RRSIG records. The NSEC record at the apex
|
||||
will be added last, to signal that there is a complete NSEC
|
||||
@@ -1164,7 +1164,7 @@ options {
|
||||
> send
|
||||
</pre>
|
||||
<p>Again, this update request will complete almost
|
||||
immediately; however, the record won't show up until
|
||||
immediately; however, the record won't show up until
|
||||
<span class="command"><strong>named</strong></span> has had a chance to build/remove the
|
||||
relevant chain. A private type record will be created to record
|
||||
the state of the operation (see below for more details), and will
|
||||
@@ -1173,17 +1173,17 @@ options {
|
||||
is happening, other updates are possible as well.</p>
|
||||
<div class="section"><div class="titlepage"><div><div><h3 class="title">
|
||||
<a name="id-1.5.10.16"></a>Fully automatic zone signing</h3></div></div></div></div>
|
||||
<p>To enable automatic signing, add the
|
||||
<span class="command"><strong>auto-dnssec</strong></span> option to the zone statement in
|
||||
<code class="filename">named.conf</code>.
|
||||
<span class="command"><strong>auto-dnssec</strong></span> has two possible arguments:
|
||||
<code class="constant">allow</code> or
|
||||
<p>To enable automatic signing, add the
|
||||
<span class="command"><strong>auto-dnssec</strong></span> option to the zone statement in
|
||||
<code class="filename">named.conf</code>.
|
||||
<span class="command"><strong>auto-dnssec</strong></span> has two possible arguments:
|
||||
<code class="constant">allow</code> or
|
||||
<code class="constant">maintain</code>.</p>
|
||||
<p>With
|
||||
<span class="command"><strong>auto-dnssec allow</strong></span>,
|
||||
<p>With
|
||||
<span class="command"><strong>auto-dnssec allow</strong></span>,
|
||||
<span class="command"><strong>named</strong></span> can search the key directory for keys
|
||||
matching the zone, insert them into the zone, and use them to
|
||||
sign the zone. It will do so only when it receives an
|
||||
sign the zone. It will do so only when it receives an
|
||||
<span class="command"><strong>rndc sign <zonename></strong></span>.</p>
|
||||
<p>
|
||||
|
||||
@@ -1191,7 +1191,7 @@ options {
|
||||
functionality, but will also automatically adjust the zone's
|
||||
DNSKEY records on schedule according to the keys' timing metadata.
|
||||
(See <a class="xref" href="man.dnssec-keygen.html" title="dnssec-keygen"><span class="refentrytitle"><span class="application">dnssec-keygen</span></span>(8)</a> and
|
||||
<a class="xref" href="man.dnssec-settime.html" title="dnssec-settime"><span class="refentrytitle"><span class="application">dnssec-settime</span></span>(8)</a> for more information.)
|
||||
<a class="xref" href="man.dnssec-settime.html" title="dnssec-settime"><span class="refentrytitle"><span class="application">dnssec-settime</span></span>(8)</a> for more information.)
|
||||
</p>
|
||||
<p>
|
||||
<span class="command"><strong>named</strong></span> will periodically search the key directory
|
||||
@@ -1205,7 +1205,7 @@ options {
|
||||
</p>
|
||||
<p>
|
||||
If keys are present in the key directory the first time the zone
|
||||
is loaded, the zone will be signed immediately, without waiting for an
|
||||
is loaded, the zone will be signed immediately, without waiting for an
|
||||
<span class="command"><strong>rndc sign</strong></span> or <span class="command"><strong>rndc loadkeys</strong></span>
|
||||
command. (Those commands can still be used when there are unscheduled
|
||||
key changes, however.)
|
||||
@@ -1227,10 +1227,10 @@ options {
|
||||
the zone is signed and the NSEC3 chain is completed, the NSEC3PARAM
|
||||
record will appear in the zone.
|
||||
</p>
|
||||
<p>Using the
|
||||
<p>Using the
|
||||
<span class="command"><strong>auto-dnssec</strong></span> option requires the zone to be
|
||||
configured to allow dynamic updates, by adding an
|
||||
<span class="command"><strong>allow-update</strong></span> or
|
||||
configured to allow dynamic updates, by adding an
|
||||
<span class="command"><strong>allow-update</strong></span> or
|
||||
<span class="command"><strong>update-policy</strong></span> statement to the zone
|
||||
configuration. If this has not been done, the configuration will
|
||||
fail.</p>
|
||||
@@ -1278,14 +1278,14 @@ options {
|
||||
<div class="section"><div class="titlepage"><div><div><h3 class="title">
|
||||
<a name="id-1.5.10.32"></a>DNSKEY rollovers</h3></div></div></div></div>
|
||||
<p>As with insecure-to-secure conversions, rolling DNSSEC
|
||||
keys can be done in two ways: using a dynamic DNS update, or the
|
||||
keys can be done in two ways: using a dynamic DNS update, or the
|
||||
<span class="command"><strong>auto-dnssec</strong></span> zone option.</p>
|
||||
<div class="section"><div class="titlepage"><div><div><h3 class="title">
|
||||
<a name="id-1.5.10.34"></a>Dynamic DNS update method</h3></div></div></div></div>
|
||||
<p> To perform key rollovers via dynamic update, you need to add
|
||||
the <code class="filename">K*</code> files for the new keys so that
|
||||
the <code class="filename">K*</code> files for the new keys so that
|
||||
<span class="command"><strong>named</strong></span> can find them. You can then add the new
|
||||
DNSKEY RRs via dynamic update.
|
||||
DNSKEY RRs via dynamic update.
|
||||
<span class="command"><strong>named</strong></span> will then cause the zone to be signed
|
||||
with the new keys. When the signing is complete the private type
|
||||
records will be updated so that the last octet is non
|
||||
@@ -1299,14 +1299,14 @@ options {
|
||||
be able to verify at least one signature when you remove the old
|
||||
DNSKEY.</p>
|
||||
<p>The old DNSKEY can be removed via UPDATE. Take care to
|
||||
specify the correct key.
|
||||
specify the correct key.
|
||||
<span class="command"><strong>named</strong></span> will clean out any signatures generated
|
||||
by the old key after the update completes.</p>
|
||||
<div class="section"><div class="titlepage"><div><div><h3 class="title">
|
||||
<a name="id-1.5.10.39"></a>Automatic key rollovers</h3></div></div></div></div>
|
||||
<p>When a new key reaches its activation date (as set by
|
||||
<span class="command"><strong>dnssec-keygen</strong></span> or <span class="command"><strong>dnssec-settime</strong></span>),
|
||||
if the <span class="command"><strong>auto-dnssec</strong></span> zone option is set to
|
||||
if the <span class="command"><strong>auto-dnssec</strong></span> zone option is set to
|
||||
<code class="constant">maintain</code>, <span class="command"><strong>named</strong></span> will
|
||||
automatically carry out the key rollover. If the key's algorithm
|
||||
has not previously been used to sign the zone, then the zone will
|
||||
@@ -1344,9 +1344,9 @@ options {
|
||||
<span class="command"><strong>nsupdate</strong></span>. All signatures, NSEC or NSEC3 chains,
|
||||
and associated NSEC3PARAM records will be removed automatically.
|
||||
This will take place after the update request completes.</p>
|
||||
<p> This requires the
|
||||
<span class="command"><strong>dnssec-secure-to-insecure</strong></span> option to be set to
|
||||
<strong class="userinput"><code>yes</code></strong> in
|
||||
<p> This requires the
|
||||
<span class="command"><strong>dnssec-secure-to-insecure</strong></span> option to be set to
|
||||
<strong class="userinput"><code>yes</code></strong> in
|
||||
<code class="filename">named.conf</code>.</p>
|
||||
<p>In addition, if the <span class="command"><strong>auto-dnssec maintain</strong></span>
|
||||
zone statement is used, it should be removed or changed to
|
||||
@@ -1364,9 +1364,9 @@ options {
|
||||
<p>
|
||||
<span class="command"><strong>named</strong></span> only supports creating new NSEC3 chains
|
||||
where all the NSEC3 records in the zone have the same OPTOUT
|
||||
state.
|
||||
state.
|
||||
<span class="command"><strong>named</strong></span> supports UPDATES to zones where the NSEC3
|
||||
records in the chain have mixed OPTOUT state.
|
||||
records in the chain have mixed OPTOUT state.
|
||||
<span class="command"><strong>named</strong></span> does not support changing the OPTOUT
|
||||
state of an individual NSEC3 record, the entire chain needs to be
|
||||
changed if the OPTOUT state of an individual NSEC3 needs to be
|
||||
@@ -1376,7 +1376,7 @@ options {
|
||||
<div class="titlepage"><div><div><h2 class="title" style="clear: both">
|
||||
<a name="rfc5011.support"></a>Dynamic Trust Anchor Management</h2></div></div></div>
|
||||
<p>BIND 9.7.0 introduces support for RFC 5011, dynamic trust
|
||||
anchor management. Using this feature allows
|
||||
anchor management. Using this feature allows
|
||||
<span class="command"><strong>named</strong></span> to keep track of changes to critical
|
||||
DNSSEC keys without any need for the operator to make changes to
|
||||
configuration files.</p>
|
||||
@@ -1384,9 +1384,9 @@ options {
|
||||
<div class="titlepage"><div><div><h3 class="title">
|
||||
<a name="id-1.5.11.3"></a>Validating Resolver</h3></div></div></div>
|
||||
<p>To configure a validating resolver to use RFC 5011 to
|
||||
maintain a trust anchor, configure the trust anchor using a
|
||||
maintain a trust anchor, configure the trust anchor using a
|
||||
<span class="command"><strong>managed-keys</strong></span> statement. Information about
|
||||
this can be found in
|
||||
this can be found in
|
||||
<a class="xref" href="Bv9ARM.ch06.html#managed-keys" title="managed-keys Statement Definition and Usage">the section called “<span class="command"><strong>managed-keys</strong></span> Statement Definition
|
||||
and Usage”</a>.</p>
|
||||
</div>
|
||||
@@ -1408,21 +1408,21 @@ options {
|
||||
timer has completed, the active KSK can be revoked, and the
|
||||
zone can be "rolled over" to the newly accepted key.</p>
|
||||
<p>The easiest way to place a stand-by key in a zone is to
|
||||
use the "smart signing" features of
|
||||
<span class="command"><strong>dnssec-keygen</strong></span> and
|
||||
use the "smart signing" features of
|
||||
<span class="command"><strong>dnssec-keygen</strong></span> and
|
||||
<span class="command"><strong>dnssec-signzone</strong></span>. If a key with a publication
|
||||
date in the past, but an activation date which is unset or in
|
||||
the future, "
|
||||
the future, "
|
||||
<span class="command"><strong>dnssec-signzone -S</strong></span>" will include the DNSKEY
|
||||
record in the zone, but will not sign with it:</p>
|
||||
<pre class="screen">
|
||||
$ <strong class="userinput"><code>dnssec-keygen -K keys -f KSK -P now -A now+2y example.net</code></strong>
|
||||
$ <strong class="userinput"><code>dnssec-signzone -S -K keys example.net</code></strong>
|
||||
</pre>
|
||||
<p>To revoke a key, the new command
|
||||
<p>To revoke a key, the new command
|
||||
<span class="command"><strong>dnssec-revoke</strong></span> has been added. This adds the
|
||||
REVOKED bit to the key flags and re-generates the
|
||||
<code class="filename">K*.key</code> and
|
||||
REVOKED bit to the key flags and re-generates the
|
||||
<code class="filename">K*.key</code> and
|
||||
<code class="filename">K*.private</code> files.</p>
|
||||
<p>After revoking the active key, the zone must be signed
|
||||
with both the revoked KSK and the new active KSK. (Smart
|
||||
@@ -1440,7 +1440,7 @@ $ <strong class="userinput"><code>dnssec-signzone -S -K keys example.net</code><
|
||||
"<code class="filename">Kexample.com.+005+10128</code>".</p>
|
||||
<p>If two keys have IDs exactly 128 apart, and one is
|
||||
revoked, then the two key IDs will collide, causing several
|
||||
problems. To prevent this,
|
||||
problems. To prevent this,
|
||||
<span class="command"><strong>dnssec-keygen</strong></span> will not generate a new key if
|
||||
another key is present which may collide. This checking will
|
||||
only occur if the new keys are written to the same directory
|
||||
@@ -1724,8 +1724,8 @@ $ <strong class="userinput"><code>./Configure solaris64-x86_64-cc \
|
||||
(For a 32-bit build, use "solaris-x86-cc" and /usr/lib/libpkcs11.so.)
|
||||
</p>
|
||||
<p>
|
||||
After configuring, run
|
||||
<span class="command"><strong>make</strong></span> and
|
||||
After configuring, run
|
||||
<span class="command"><strong>make</strong></span> and
|
||||
<span class="command"><strong>make test</strong></span>.
|
||||
</p>
|
||||
</div>
|
||||
@@ -1872,9 +1872,9 @@ $ <strong class="userinput"><code>./configure --enable-threads \
|
||||
<a name="id-1.5.12.9"></a>PKCS#11 Tools</h3></div></div></div>
|
||||
<p>
|
||||
BIND 9 includes a minimal set of tools to operate the
|
||||
HSM, including
|
||||
HSM, including
|
||||
<span class="command"><strong>pkcs11-keygen</strong></span> to generate a new key pair
|
||||
within the HSM,
|
||||
within the HSM,
|
||||
<span class="command"><strong>pkcs11-list</strong></span> to list objects currently
|
||||
available,
|
||||
<span class="command"><strong>pkcs11-destroy</strong></span> to remove objects, and
|
||||
@@ -1911,7 +1911,7 @@ $ <strong class="userinput"><code>export LD_LIBRARY_PATH=/opt/pkcs11/usr/lib:${L
|
||||
For example, when operating an AEP Keyper, it is necessary to
|
||||
specify the location of the "machine" file, which stores
|
||||
information about the Keyper for use by the provider
|
||||
library. If the machine file is in
|
||||
library. If the machine file is in
|
||||
<code class="filename">/opt/Keyper/PKCS11Provider/machine</code>,
|
||||
use:
|
||||
</p>
|
||||
@@ -1920,12 +1920,12 @@ $ <strong class="userinput"><code>export KEYPER_LIBRARY_PATH=/opt/Keyper/PKCS11P
|
||||
</pre>
|
||||
<p>
|
||||
Such environment variables must be set whenever running
|
||||
any tool that uses the HSM, including
|
||||
<span class="command"><strong>pkcs11-keygen</strong></span>,
|
||||
<span class="command"><strong>pkcs11-list</strong></span>,
|
||||
<span class="command"><strong>pkcs11-destroy</strong></span>,
|
||||
<span class="command"><strong>dnssec-keyfromlabel</strong></span>,
|
||||
<span class="command"><strong>dnssec-signzone</strong></span>,
|
||||
any tool that uses the HSM, including
|
||||
<span class="command"><strong>pkcs11-keygen</strong></span>,
|
||||
<span class="command"><strong>pkcs11-list</strong></span>,
|
||||
<span class="command"><strong>pkcs11-destroy</strong></span>,
|
||||
<span class="command"><strong>dnssec-keyfromlabel</strong></span>,
|
||||
<span class="command"><strong>dnssec-signzone</strong></span>,
|
||||
<span class="command"><strong>dnssec-keygen</strong></span>, and
|
||||
<span class="command"><strong>named</strong></span>.
|
||||
</p>
|
||||
@@ -2033,7 +2033,7 @@ example.net.signed
|
||||
$ <strong class="userinput"><code>dnssec-signzone -E '' -S example.net</code></strong>
|
||||
</pre>
|
||||
<p>
|
||||
This causes
|
||||
This causes
|
||||
<span class="command"><strong>dnssec-signzone</strong></span> to run as if it were compiled
|
||||
without the --with-pkcs11 option.
|
||||
</p>
|
||||
@@ -2051,7 +2051,7 @@ $ <strong class="userinput"><code>dnssec-signzone -E '' -S example.net</code></s
|
||||
using HSM keys, and/or to to sign new records inserted via nsupdate,
|
||||
then <span class="command"><strong>named</strong></span> must have access to the HSM PIN. In OpenSSL-based PKCS#11,
|
||||
this is accomplished by placing the PIN into the openssl.cnf file
|
||||
(in the above examples,
|
||||
(in the above examples,
|
||||
<code class="filename">/opt/pkcs11/usr/ssl/openssl.cnf</code>).
|
||||
</p>
|
||||
<p>
|
||||
|
@@ -2669,11 +2669,11 @@ badresp:1,adberr:0,findfail:0,valfail:0]
|
||||
event payloads which are encoded using Protocol Buffers
|
||||
(<span class="command"><strong>libprotobuf-c</strong></span>, a mechanism for
|
||||
serializing structured data developed
|
||||
by Google, Inc.; see
|
||||
by Google, Inc.; see
|
||||
<a class="link" href="https://developers.google.com/protocol-buffers/" target="_top">https://developers.google.com/protocol-buffers</a>).
|
||||
</p>
|
||||
<p>
|
||||
To enable <span class="command"><strong>dnstap</strong></span> at compile time,
|
||||
To enable <span class="command"><strong>dnstap</strong></span> at compile time,
|
||||
the <span class="command"><strong>fstrm</strong></span> and <span class="command"><strong>protobuf-c</strong></span>
|
||||
libraries must be available, and BIND must be configured with
|
||||
<code class="option">--enable-dnstap</code>.
|
||||
|
@@ -245,7 +245,7 @@
|
||||
whose assistance is gratefully acknowledged.
|
||||
</p>
|
||||
<p>
|
||||
To enable <span class="command"><strong>dnstap</strong></span> at compile time,
|
||||
To enable <span class="command"><strong>dnstap</strong></span> at compile time,
|
||||
the <span class="command"><strong>fstrm</strong></span> and <span class="command"><strong>protobuf-c</strong></span>
|
||||
libraries must be available, and BIND must be configured with
|
||||
<code class="option">--enable-dnstap</code>.
|
||||
|
@@ -449,7 +449,7 @@ $ <strong class="userinput"><code>sample-update -a sample-update -k Kxxx.+nnn+mm
|
||||
<p>
|
||||
removes all A RRs for foo.dynamic.example.com using the given key.
|
||||
</p>
|
||||
<pre class="screen">
|
||||
<pre class="screen">
|
||||
$ <strong class="userinput"><code>sample-update -a sample-update -k Kxxx.+nnn+mmmm.key delete "foo.dynamic.example.com"</code></strong></pre>
|
||||
<p>
|
||||
removes all RRs for foo.dynamic.example.com using the given key.
|
||||
|
@@ -79,7 +79,7 @@
|
||||
local DDNS key for use with <span class="command"><strong>nsupdate -l</strong></span>:
|
||||
it does this when a zone is configured with
|
||||
<span class="command"><strong>update-policy local;</strong></span>.
|
||||
<span class="command"><strong>ddns-confgen</strong></span> is only needed when a
|
||||
<span class="command"><strong>ddns-confgen</strong></span> is only needed when a
|
||||
more elaborate configuration is required: for instance,
|
||||
if <span class="command"><strong>nsupdate</strong></span> is to be used from a remote
|
||||
system.
|
||||
|
@@ -414,7 +414,7 @@
|
||||
<dt><span class="term"><code class="option">+[no]all</code></span></dt>
|
||||
<dd><p>
|
||||
Set or clear the display options
|
||||
<code class="option">+[no]comments</code>,
|
||||
<code class="option">+[no]comments</code>,
|
||||
<code class="option">+[no]rrcomments</code>, and
|
||||
<code class="option">+[no]trust</code> as a group.
|
||||
</p></dd>
|
||||
|
@@ -92,7 +92,7 @@
|
||||
<p>
|
||||
The IN and CH class names overlap with the IN and CH top level
|
||||
domain names. Either use the <code class="option">-t</code> and
|
||||
<code class="option">-c</code> options to specify the type and class,
|
||||
<code class="option">-c</code> options to specify the type and class,
|
||||
use the <code class="option">-q</code> the specify the domain name, or
|
||||
use "IN." and "CH." when looking up these top level domains.
|
||||
</p>
|
||||
@@ -789,7 +789,7 @@ dig +qr www.isc.org any -x 127.0.0.1 isc.org ns +noqr
|
||||
reply from the server.
|
||||
If you'd like to turn off the IDN support for some reason, defines
|
||||
the <code class="envar">IDN_DISABLE</code> environment variable.
|
||||
The IDN support is disabled if the variable is set when
|
||||
The IDN support is disabled if the variable is set when
|
||||
<span class="command"><strong>dig</strong></span> runs.
|
||||
</p>
|
||||
</div>
|
||||
|
@@ -68,7 +68,7 @@
|
||||
</p></dd>
|
||||
<dt><span class="term">-l <em class="replaceable"><code>domain</code></em></span></dt>
|
||||
<dd><p>
|
||||
Check for a DLV record in the specified lookaside domain,
|
||||
Check for a DLV record in the specified lookaside domain,
|
||||
instead of checking for a DS record in the zone's parent.
|
||||
For example, to check for DLV records for "example.com"
|
||||
in ISC's DLV zone, use:
|
||||
|
@@ -97,7 +97,7 @@
|
||||
<p>
|
||||
The length of time to check for DNSSEC coverage. Key events
|
||||
scheduled further into the future than <code class="option">duration</code>
|
||||
will be ignored, and assumed to be correct.
|
||||
will be ignored, and assumed to be correct.
|
||||
</p>
|
||||
<p>
|
||||
The value of <code class="option">duration</code> can be set in seconds,
|
||||
|
@@ -113,7 +113,7 @@
|
||||
<dd><p>
|
||||
Include ZSKs when generating DS records. Without this option,
|
||||
only keys which have the KSK flag set will be converted to DS
|
||||
records and printed. Useful only in zone file mode.
|
||||
records and printed. Useful only in zone file mode.
|
||||
</p></dd>
|
||||
<dt><span class="term">-l <em class="replaceable"><code>domain</code></em></span></dt>
|
||||
<dd><p>
|
||||
|
@@ -300,7 +300,7 @@
|
||||
</p>
|
||||
<p>
|
||||
If the key is being created as an explicit successor to another
|
||||
key, then the default prepublication interval is 30 days;
|
||||
key, then the default prepublication interval is 30 days;
|
||||
otherwise it is zero.
|
||||
</p>
|
||||
<p>
|
||||
@@ -332,7 +332,7 @@
|
||||
footprint).
|
||||
</p></li>
|
||||
</ul></div>
|
||||
<p><span class="command"><strong>dnssec-keyfromlabel</strong></span>
|
||||
<p><span class="command"><strong>dnssec-keyfromlabel</strong></span>
|
||||
creates two files, with names based
|
||||
on the printed string. <code class="filename">Knnnn.+aaa+iiiii.key</code>
|
||||
contains the public key, and
|
||||
|
@@ -346,7 +346,7 @@
|
||||
</p>
|
||||
<p>
|
||||
If the key is being created as an explicit successor to another
|
||||
key, then the default prepublication interval is 30 days;
|
||||
key, then the default prepublication interval is 30 days;
|
||||
otherwise it is zero.
|
||||
</p>
|
||||
<p>
|
||||
@@ -379,7 +379,7 @@
|
||||
footprint).
|
||||
</p></li>
|
||||
</ul></div>
|
||||
<p><span class="command"><strong>dnssec-keygen</strong></span>
|
||||
<p><span class="command"><strong>dnssec-keygen</strong></span>
|
||||
creates two files, with names based
|
||||
on the printed string. <code class="filename">Knnnn.+aaa+iiiii.key</code>
|
||||
contains the public key, and
|
||||
|
@@ -84,8 +84,8 @@
|
||||
fail when attempting to update a legacy key. With this option,
|
||||
the key will be recreated in the new format, but with the
|
||||
original key data retained. The key's creation date will be
|
||||
set to the present time. If no other values are specified,
|
||||
then the key's publication and activation dates will also
|
||||
set to the present time. If no other values are specified,
|
||||
then the key's publication and activation dates will also
|
||||
be set to the present time.
|
||||
</p></dd>
|
||||
<dt><span class="term">-K <em class="replaceable"><code>directory</code></em></span></dt>
|
||||
@@ -197,7 +197,7 @@
|
||||
</p>
|
||||
<p>
|
||||
If the key is being set to be an explicit successor to another
|
||||
key, then the default prepublication interval is 30 days;
|
||||
key, then the default prepublication interval is 30 days;
|
||||
otherwise it is zero.
|
||||
</p>
|
||||
<p>
|
||||
|
@@ -92,7 +92,7 @@
|
||||
(<code class="option">-S</code>) is used, DNSKEY records are also
|
||||
included. The resulting file can be included in the original
|
||||
zone file with <span class="command"><strong>$INCLUDE</strong></span>. This option
|
||||
cannot be combined with <code class="option">-O raw</code>,
|
||||
cannot be combined with <code class="option">-O raw</code>,
|
||||
<code class="option">-O map</code>, or serial number updating.
|
||||
</p></dd>
|
||||
<dt><span class="term">-E <em class="replaceable"><code>engine</code></em></span></dt>
|
||||
@@ -346,7 +346,7 @@
|
||||
<p>
|
||||
Normally, when a previously-signed zone is passed as input
|
||||
to the signer, and a DNSKEY record has been removed and
|
||||
replaced with a new one, signatures from the old key
|
||||
replaced with a new one, signatures from the old key
|
||||
that are still within their validity period are retained.
|
||||
This allows the zone to continue to validate with cached
|
||||
copies of the old DNSKEY RRset. The <code class="option">-Q</code>
|
||||
@@ -409,7 +409,7 @@
|
||||
<dd><p>
|
||||
If the key's activation date is set and in the past, the
|
||||
key is published (regardless of publication date) and
|
||||
used to sign the zone.
|
||||
used to sign the zone.
|
||||
</p></dd>
|
||||
<dt></dt>
|
||||
<dd><p>
|
||||
|
@@ -196,7 +196,7 @@
|
||||
<code class="filename">/etc/resolv.conf</code>.
|
||||
</p>
|
||||
<p>
|
||||
The <code class="option">-s</code> option tells <span class="command"><strong>host</strong></span>
|
||||
The <code class="option">-s</code> option tells <span class="command"><strong>host</strong></span>
|
||||
<span class="emphasis"><em>not</em></span> to send the query to the next nameserver
|
||||
if any server responds with a SERVFAIL response, which is the
|
||||
reverse of normal stub resolver behavior.
|
||||
@@ -216,7 +216,7 @@
|
||||
<a name="id-1.14.3.8"></a><h2>IDN SUPPORT</h2>
|
||||
<p>
|
||||
If <span class="command"><strong>host</strong></span> has been built with IDN (internationalized
|
||||
domain name) support, it can accept and display non-ASCII domain names.
|
||||
domain name) support, it can accept and display non-ASCII domain names.
|
||||
<span class="command"><strong>host</strong></span> appropriately converts character encoding of
|
||||
domain name before sending a request to DNS server or displaying a
|
||||
reply from the server.
|
||||
|
@@ -57,7 +57,7 @@
|
||||
server that answers queries using the BIND 9 lightweight
|
||||
resolver protocol rather than the DNS protocol.
|
||||
</p>
|
||||
<p><span class="command"><strong>lwresd</strong></span>
|
||||
<p><span class="command"><strong>lwresd</strong></span>
|
||||
listens for resolver queries on a
|
||||
UDP port on the IPv4 loopback interface, 127.0.0.1. This
|
||||
means that <span class="command"><strong>lwresd</strong></span> can only be used by
|
||||
@@ -141,7 +141,7 @@
|
||||
<em class="replaceable"><code>trace</code></em>,
|
||||
<em class="replaceable"><code>record</code></em>,
|
||||
<em class="replaceable"><code>size</code></em>, and
|
||||
<em class="replaceable"><code>mctx</code></em>.
|
||||
<em class="replaceable"><code>mctx</code></em>.
|
||||
These correspond to the ISC_MEM_DEBUGXXXX flags described in
|
||||
<code class="filename"><isc/mem.h></code>.
|
||||
</p></dd>
|
||||
|
@@ -230,7 +230,7 @@
|
||||
<dt><span class="term">-r <em class="replaceable"><code>mode</code></em></span></dt>
|
||||
<dd><p>
|
||||
Check for records that are treated as different by DNSSEC but
|
||||
are semantically equal in plain DNS.
|
||||
are semantically equal in plain DNS.
|
||||
Possible modes are <span class="command"><strong>"fail"</strong></span>,
|
||||
<span class="command"><strong>"warn"</strong></span> (default) and
|
||||
<span class="command"><strong>"ignore"</strong></span>.
|
||||
|
@@ -53,10 +53,10 @@
|
||||
<p>
|
||||
<span class="command"><strong>named-journalprint</strong></span>
|
||||
prints the contents of a zone journal file in a human-readable
|
||||
form.
|
||||
form.
|
||||
</p>
|
||||
<p>
|
||||
Journal files are automatically created by <span class="command"><strong>named</strong></span>
|
||||
Journal files are automatically created by <span class="command"><strong>named</strong></span>
|
||||
when changes are made to dynamic zones (e.g., by
|
||||
<span class="command"><strong>nsupdate</strong></span>). They record each addition
|
||||
or deletion of a resource record, in binary format, allowing the
|
||||
|
@@ -574,7 +574,7 @@
|
||||
operations (such as signing or generating
|
||||
NSEC3 chains) is stored in the zone in the form
|
||||
of DNS resource records of type
|
||||
<span class="command"><strong>sig-signing-type</strong></span>.
|
||||
<span class="command"><strong>sig-signing-type</strong></span>.
|
||||
<span class="command"><strong>rndc signing -list</strong></span> converts
|
||||
these records into a human-readable form,
|
||||
indicating which keys are currently signing
|
||||
@@ -600,7 +600,7 @@
|
||||
flags, iterations, and salt, in that order.
|
||||
</p>
|
||||
<p>
|
||||
Currently, the only defined value for hash algorithm
|
||||
Currently, the only defined value for hash algorithm
|
||||
is <code class="literal">1</code>, representing SHA-1.
|
||||
The <code class="option">flags</code> may be set to
|
||||
<code class="literal">0</code> or <code class="literal">1</code>,
|
||||
|
@@ -206,7 +206,7 @@
|
||||
whose assistance is gratefully acknowledged.
|
||||
</p>
|
||||
<p>
|
||||
To enable <span class="command"><strong>dnstap</strong></span> at compile time,
|
||||
To enable <span class="command"><strong>dnstap</strong></span> at compile time,
|
||||
the <span class="command"><strong>fstrm</strong></span> and <span class="command"><strong>protobuf-c</strong></span>
|
||||
libraries must be available, and BIND must be configured with
|
||||
<code class="option">--enable-dnstap</code>.
|
||||
|
Reference in New Issue
Block a user