mirror of
https://gitlab.isc.org/isc-projects/bind9
synced 2025-08-29 13:38:26 +00:00
Document initial-ds and static-ds keywords
This commit is contained in:
parent
54a682ea50
commit
c29ccae2a6
@ -13,7 +13,7 @@
|
|||||||
|
|
||||||
<refentry xmlns:db="http://docbook.org/ns/docbook" version="5.0" xml:id="man.named.conf">
|
<refentry xmlns:db="http://docbook.org/ns/docbook" version="5.0" xml:id="man.named.conf">
|
||||||
<info>
|
<info>
|
||||||
<date>2019-08-07</date>
|
<date>2019-08-12</date>
|
||||||
</info>
|
</info>
|
||||||
<refentryinfo>
|
<refentryinfo>
|
||||||
<corpname>ISC</corpname>
|
<corpname>ISC</corpname>
|
||||||
@ -113,7 +113,8 @@ dlz <replaceable>string</replaceable> {
|
|||||||
<refsection><info><title>DNSSEC-KEYS</title></info>
|
<refsection><info><title>DNSSEC-KEYS</title></info>
|
||||||
<literallayout class="normal">
|
<literallayout class="normal">
|
||||||
dnssec-keys { <replaceable>string</replaceable> ( static-key |
|
dnssec-keys { <replaceable>string</replaceable> ( static-key |
|
||||||
initial-key ) <replaceable>integer</replaceable> <replaceable>integer</replaceable> <replaceable>integer</replaceable>
|
initial-key | static-ds | initial-ds )
|
||||||
|
<replaceable>integer</replaceable> <replaceable>integer</replaceable> <replaceable>integer</replaceable>
|
||||||
<replaceable>quoted_string</replaceable>; ... };
|
<replaceable>quoted_string</replaceable>; ... };
|
||||||
</literallayout>
|
</literallayout>
|
||||||
</refsection>
|
</refsection>
|
||||||
@ -158,9 +159,9 @@ logging {
|
|||||||
<para>Deprecated - see DNSSEC-KEYS.</para>
|
<para>Deprecated - see DNSSEC-KEYS.</para>
|
||||||
<literallayout class="normal">
|
<literallayout class="normal">
|
||||||
managed-keys { <replaceable>string</replaceable> ( static-key
|
managed-keys { <replaceable>string</replaceable> ( static-key
|
||||||
| initial-key ) <replaceable>integer</replaceable>
|
| initial-key | static-ds |
|
||||||
<replaceable>integer</replaceable> <replaceable>integer</replaceable>
|
initial-ds ) <replaceable>integer</replaceable> <replaceable>integer</replaceable>
|
||||||
<replaceable>quoted_string</replaceable>; ... }; deprecated
|
<replaceable>integer</replaceable> <replaceable>quoted_string</replaceable>; ... }; deprecated
|
||||||
</literallayout>
|
</literallayout>
|
||||||
</refsection>
|
</refsection>
|
||||||
|
|
||||||
@ -607,8 +608,9 @@ view <replaceable>string</replaceable> [ <replaceable>class</replaceable> ] {
|
|||||||
dnssec-accept-expired <replaceable>boolean</replaceable>;
|
dnssec-accept-expired <replaceable>boolean</replaceable>;
|
||||||
dnssec-dnskey-kskonly <replaceable>boolean</replaceable>;
|
dnssec-dnskey-kskonly <replaceable>boolean</replaceable>;
|
||||||
dnssec-keys { <replaceable>string</replaceable> ( static-key |
|
dnssec-keys { <replaceable>string</replaceable> ( static-key |
|
||||||
initial-key ) <replaceable>integer</replaceable> <replaceable>integer</replaceable>
|
initial-key | static-ds | initial-ds
|
||||||
<replaceable>integer</replaceable> <replaceable>quoted_string</replaceable>; ... };
|
) <replaceable>integer</replaceable> <replaceable>integer</replaceable> <replaceable>integer</replaceable>
|
||||||
|
<replaceable>quoted_string</replaceable>; ... };
|
||||||
dnssec-loadkeys-interval <replaceable>integer</replaceable>;
|
dnssec-loadkeys-interval <replaceable>integer</replaceable>;
|
||||||
dnssec-must-be-secure <replaceable>string</replaceable> <replaceable>boolean</replaceable>;
|
dnssec-must-be-secure <replaceable>string</replaceable> <replaceable>boolean</replaceable>;
|
||||||
dnssec-secure-to-insecure <replaceable>boolean</replaceable>;
|
dnssec-secure-to-insecure <replaceable>boolean</replaceable>;
|
||||||
@ -646,6 +648,7 @@ view <replaceable>string</replaceable> [ <replaceable>class</replaceable> ] {
|
|||||||
lmdb-mapsize <replaceable>sizeval</replaceable>;
|
lmdb-mapsize <replaceable>sizeval</replaceable>;
|
||||||
managed-keys { <replaceable>string</replaceable> (
|
managed-keys { <replaceable>string</replaceable> (
|
||||||
static-key | initial-key
|
static-key | initial-key
|
||||||
|
| static-ds | initial-ds
|
||||||
) <replaceable>integer</replaceable> <replaceable>integer</replaceable>
|
) <replaceable>integer</replaceable> <replaceable>integer</replaceable>
|
||||||
<replaceable>integer</replaceable>
|
<replaceable>integer</replaceable>
|
||||||
<replaceable>quoted_string</replaceable>; ... }; deprecated
|
<replaceable>quoted_string</replaceable>; ... }; deprecated
|
||||||
|
@ -2230,13 +2230,14 @@ allow-update { !{ !localnets; any; }; key host1-host2. ;};
|
|||||||
The keys specified in <command>dnssec-keys</command>
|
The keys specified in <command>dnssec-keys</command>
|
||||||
copies of DNSKEY RRs for zones that are used to form the
|
copies of DNSKEY RRs for zones that are used to form the
|
||||||
first link in the cryptographic chain of trust. Keys configured
|
first link in the cryptographic chain of trust. Keys configured
|
||||||
with the keyword <command>static-key</command> are loaded directly
|
with the keyword <command>static-key</command> or
|
||||||
|
<command>static-ds</command> are loaded directly
|
||||||
into the table of trust anchors, and can only be changed by
|
into the table of trust anchors, and can only be changed by
|
||||||
altering the configuration. Keys configured with
|
altering the configuration. Keys configured with
|
||||||
<command>initial-key</command> are used to initialize
|
<command>initial-key</command> or <command>initial-ds</command>
|
||||||
RFC 5011 trust anchor maintenance, and will be kept up to
|
are used to initialize RFC 5011 trust anchor maintenance, and
|
||||||
date automatically after the first time <command>named</command>
|
will be kept up to date automatically after the first time
|
||||||
runs.
|
<command>named</command> runs.
|
||||||
</para>
|
</para>
|
||||||
|
|
||||||
<para>
|
<para>
|
||||||
@ -2276,17 +2277,7 @@ dnssec-keys {
|
|||||||
97S+LKUTpQcq27R7AT3/V5hRQxScINqwcz4jYqZD2fQ
|
97S+LKUTpQcq27R7AT3/V5hRQxScINqwcz4jYqZD2fQ
|
||||||
dgxbcDTClU0CRBdiieyLMNzXG3";
|
dgxbcDTClU0CRBdiieyLMNzXG3";
|
||||||
/* Key for our organization's forward zone */
|
/* Key for our organization's forward zone */
|
||||||
example.com. static-key 257 3 5 "AwEAAaxPMcR2x0HbQV4WeZB6oEDX+r0QM6
|
example.com. static-ds 54135 5 2 "8EF922C97F1D07B23134440F19682E7519ADDAE180E20B1B1EC52E7F58B2831D"
|
||||||
5KbhTjrW1ZaARmPhEZZe3Y9ifgEuq7vZ/z
|
|
||||||
GZUdEGNWy+JZzus0lUptwgjGwhUS1558Hb
|
|
||||||
4JKUbbOTcM8pwXlj0EiX3oDFVmjHO444gL
|
|
||||||
kBOUKUf/mC7HvfwYH/Be22GnClrinKJp1O
|
|
||||||
g4ywzO9WglMk7jbfW33gUKvirTHr25GL7S
|
|
||||||
TQUzBb5Usxt8lgnyTUHs1t3JwCY5hKZ6Cq
|
|
||||||
FxmAVZP20igTixin/1LcrgX/KMEGd/biuv
|
|
||||||
F4qJCyduieHukuY3H4XMAcR+xia2nIUPvm
|
|
||||||
/oyWR8BW/hWdzOvnSCThlHf3xiYleDbt/o
|
|
||||||
1OTQ09A0=";
|
|
||||||
|
|
||||||
/* Key for our reverse zone. */
|
/* Key for our reverse zone. */
|
||||||
2.0.192.IN-ADDRPA.NET. static-key 257 3 5 "AQOnS4xn/IgOUpBPJ3bogzwc
|
2.0.192.IN-ADDRPA.NET. static-key 257 3 5 "AQOnS4xn/IgOUpBPJ3bogzwc
|
||||||
@ -3215,11 +3206,14 @@ $ORIGIN 0.0.0.0.0.0.0.0.8.b.d.0.1.0.0.2.ip6.arpa.
|
|||||||
</entry>
|
</entry>
|
||||||
<entry colname="2">
|
<entry colname="2">
|
||||||
<para>
|
<para>
|
||||||
defines DNSSEC keys: if used with the
|
defines DNSSEC trust anchors: if used with
|
||||||
<command>initial-key</command> keyword,
|
the <command>initial-key</command> or
|
||||||
keys are kept up to date using RFC 5011
|
<command>initial-ds</command> keyword,
|
||||||
trust anchor maintenance, and if used with
|
trust anchors are kept up to date using RFC
|
||||||
<command>static-key</command>, keys are permanent.
|
5011 trust anchor maintenance, and if used with
|
||||||
|
<command>static-key</command> or
|
||||||
|
<command>static-ds</command>, trust anchors
|
||||||
|
are permanent.
|
||||||
</para>
|
</para>
|
||||||
</entry>
|
</entry>
|
||||||
</row>
|
</row>
|
||||||
@ -4628,7 +4622,8 @@ badresp:1,adberr:0,findfail:0,valfail:0]
|
|||||||
<para>
|
<para>
|
||||||
Specifies the directory in which to store the files that
|
Specifies the directory in which to store the files that
|
||||||
track managed DNSSEC keys (i.e., those configured using
|
track managed DNSSEC keys (i.e., those configured using
|
||||||
the <command>initial-key</command> keyword in a
|
the <command>initial-key</command> or
|
||||||
|
<command>initial-ds</command> keywords in a
|
||||||
<command>dnssec-keys</command> statement). By default,
|
<command>dnssec-keys</command> statement). By default,
|
||||||
this is the working directory. The directory
|
this is the working directory. The directory
|
||||||
<emphasis>must</emphasis> be writable by the effective
|
<emphasis>must</emphasis> be writable by the effective
|
||||||
@ -10864,12 +10859,12 @@ example.com CNAME rpz-tcp-only.
|
|||||||
trust anchors. DNSSEC is described in <xref linkend="DNSSEC"/>.
|
trust anchors. DNSSEC is described in <xref linkend="DNSSEC"/>.
|
||||||
</para>
|
</para>
|
||||||
<para>
|
<para>
|
||||||
A trust anchor is defined when the public key for
|
A trust anchor is defined when the public key or public key
|
||||||
a non-authoritative zone is known, but cannot be securely
|
digest for a non-authoritative zone is known, but cannot be
|
||||||
obtained through DNS, either because it is the DNS root zone
|
securely obtained through DNS, either because it is the DNS
|
||||||
or because its parent zone is unsigned. Once a key has been
|
root zone or because its parent zone is unsigned. Once a key
|
||||||
configured as a trust anchor, it is treated as if it had
|
or digest has been configured as a trust anchor, it is treated
|
||||||
been validated and proven secure.
|
as if it had been validated and proven secure.
|
||||||
</para>
|
</para>
|
||||||
<para>
|
<para>
|
||||||
The resolver attempts DNSSEC validation on all DNS data
|
The resolver attempts DNSSEC validation on all DNS data
|
||||||
@ -10885,16 +10880,6 @@ example.com CNAME rpz-tcp-only.
|
|||||||
are used to validate the DNSKEY RRset for the corresponding
|
are used to validate the DNSKEY RRset for the corresponding
|
||||||
name. The parent's DS RRset will not be used.
|
name. The parent's DS RRset will not be used.
|
||||||
</para>
|
</para>
|
||||||
<para>
|
|
||||||
The <command>dnssec-keys</command> statement can contain
|
|
||||||
multiple key entries, each consisting of the key's
|
|
||||||
domain name, followed by the <command>static-key</command> or
|
|
||||||
<command>initial-key</command> keyword, then the key's flags,
|
|
||||||
protocol, algorithm, and the Base64 representation of the key
|
|
||||||
data. Spaces, tabs, newlines and carriage returns are ignored
|
|
||||||
in the key data, so the configuration may be split up into
|
|
||||||
multiple lines.
|
|
||||||
</para>
|
|
||||||
<para>
|
<para>
|
||||||
<command>dnssec-keys</command> may be set at the top level
|
<command>dnssec-keys</command> may be set at the top level
|
||||||
of <filename>named.conf</filename> or within a view. If it is
|
of <filename>named.conf</filename> or within a view. If it is
|
||||||
@ -10903,11 +10888,33 @@ example.com CNAME rpz-tcp-only.
|
|||||||
defined in a view are only used within that view.
|
defined in a view are only used within that view.
|
||||||
</para>
|
</para>
|
||||||
<para>
|
<para>
|
||||||
<command>dnssec-keys</command> entries can be configured with
|
The <command>dnssec-keys</command> statement can contain
|
||||||
two keywords: <command>static-key</command> or
|
multiple trust anchor entries, each consisting of a
|
||||||
<command>initial-key</command>. Keys configured with
|
domain name, followed by an "anchor type" keyword indicating
|
||||||
<command>static-key</command> are immutable,
|
the trust anchor's format, followed by the key or digest data.
|
||||||
while keys configured with <command>initial-key</command>
|
</para>
|
||||||
|
<para>
|
||||||
|
If the anchor type is <command>static-key</command> or
|
||||||
|
<command>initial-key</command>, then it is followed with the
|
||||||
|
key's flags, protocol, algorithm, and the Base64 representation
|
||||||
|
of the public key data. This is identical to the text
|
||||||
|
representation of a DNSKEY record. Spaces, tabs, newlines and
|
||||||
|
carriage returns are ignored in the key data, so the
|
||||||
|
configuration may be split up into multiple lines.
|
||||||
|
</para>
|
||||||
|
<para>
|
||||||
|
If the anchor type is <command>static-ds</command> or
|
||||||
|
<command>initial-ds</command>, then it is followed with the
|
||||||
|
key tag, algorithm, digest type, and the hexidecimal
|
||||||
|
representation of the key digest. This is identical to the
|
||||||
|
text representation of a DS record. Spaces, tabs, newlines
|
||||||
|
and carriage returns are ignored.
|
||||||
|
</para>
|
||||||
|
<para>
|
||||||
|
Trust anchors configured with the
|
||||||
|
<command>static-key</command> or <command>static-ds</command>
|
||||||
|
anchor types are immutable, while keys configured with
|
||||||
|
<command>initial-key</command> or <command>initial-ds</command>
|
||||||
can be kept up to date automatically, without intervention
|
can be kept up to date automatically, without intervention
|
||||||
from the resolver operator. (<command>static-key</command>
|
from the resolver operator. (<command>static-key</command>
|
||||||
keys are identical to keys configured using the deprecated
|
keys are identical to keys configured using the deprecated
|
||||||
@ -10917,45 +10924,55 @@ example.com CNAME rpz-tcp-only.
|
|||||||
Suppose, for example, that a zone's key-signing
|
Suppose, for example, that a zone's key-signing
|
||||||
key was compromised, and the zone owner had to revoke and
|
key was compromised, and the zone owner had to revoke and
|
||||||
replace the key. A resolver which had the original key
|
replace the key. A resolver which had the original key
|
||||||
configured as a <command>static-key</command> would be
|
configured using <command>static-key</command> or
|
||||||
unable to validate this zone any longer; it would
|
<command>static-ds</command> would be unable to validate
|
||||||
reply with a SERVFAIL response code. This would
|
this zone any longer; it would reply with a SERVFAIL response
|
||||||
continue until the resolver operator had updated the
|
code. This would continue until the resolver operator had
|
||||||
<command>dnssec-keys</command> statement with the new key.
|
updated the <command>dnssec-keys</command> statement with
|
||||||
|
the new key.
|
||||||
</para>
|
</para>
|
||||||
<para>
|
<para>
|
||||||
If, however, the trust anchor had been configured with
|
If, however, the trust anchor had been configured with
|
||||||
<command>initial-key</command> instead, then the
|
<command>initial-key</command> or <command>initial-ds</command>
|
||||||
zone owner could add a "stand-by" key to their zone in advance.
|
instead, then the zone owner could add a "stand-by" key to
|
||||||
<command>named</command> would store the stand-by key, and
|
their zone in advance. <command>named</command> would store
|
||||||
when the original key was revoked, <command>named</command>
|
the stand-by key, and when the original key was revoked,
|
||||||
would be able to transition smoothly to the new key. It would
|
<command>named</command> would be able to transition smoothly
|
||||||
also recognize that the old key had been revoked, and cease
|
to the new key. It would also recognize that the old key had
|
||||||
using that key to validate answers, minimizing the damage that
|
been revoked, and cease using that key to validate answers,
|
||||||
the compromised key could do. This is the process used to
|
minimizing the damage that the compromised key could do.
|
||||||
keep the ICANN root DNSSEC key up to date.
|
This is the process used to keep the ICANN root DNSSEC key
|
||||||
|
up to date.
|
||||||
</para>
|
</para>
|
||||||
<para>
|
<para>
|
||||||
Whereas <command>static-key</command>
|
Whereas <command>static-key</command> and
|
||||||
keys continue to be trusted until they are removed from
|
<command>static-ds</command> trust anchors continue
|
||||||
|
to be trusted until they are removed from
|
||||||
<filename>named.conf</filename>, an
|
<filename>named.conf</filename>, an
|
||||||
<command>initial-key</command> is only trusted
|
<command>initial-key</command> or <command>initial-ds</command>
|
||||||
<emphasis>once</emphasis>: for as long as it
|
is only trusted <emphasis>once</emphasis>: for as long as it
|
||||||
takes to load the managed key database and start the RFC 5011
|
takes to load the managed key database and start the RFC 5011
|
||||||
key maintenance process.
|
key maintenance process.
|
||||||
</para>
|
</para>
|
||||||
|
<para>
|
||||||
|
It is not possible to mix static with initial trust anchors
|
||||||
|
for the same domain name. It is also not possible to mix
|
||||||
|
<command>key</command> with <command>ds</command> trust anchors.
|
||||||
|
</para>
|
||||||
<para>
|
<para>
|
||||||
The first time <command>named</command> runs with an
|
The first time <command>named</command> runs with an
|
||||||
<command>initial-key</command> configured in
|
<command>initial-key</command> or <command>initial-ds</command>
|
||||||
<filename>named.conf</filename>, it fetches the
|
configured in <filename>named.conf</filename>, it fetches the
|
||||||
DNSKEY RRset directly from the zone apex, and validates it
|
DNSKEY RRset directly from the zone apex, and validates it
|
||||||
using the key specified in <command>dnssec-keys</command>.
|
using the trust anchor specified in <command>dnssec-keys</command>.
|
||||||
If the DNSKEY RRset is validly signed, then it is
|
If the DNSKEY RRset is validly signed by a key matching
|
||||||
used as the basis for a new managed keys database.
|
the trust anchor, then it is used as the basis for a new
|
||||||
|
managed keys database.
|
||||||
</para>
|
</para>
|
||||||
<para>
|
<para>
|
||||||
From that point on, whenever <command>named</command> runs, it
|
From that point on, whenever <command>named</command> runs, it
|
||||||
sees the <command>initial-key</command> listed in
|
sees the <command>initial-key</command> or
|
||||||
|
<command>initial-ds</command> listed in
|
||||||
<command>dnssec-keys</command>, checks to
|
<command>dnssec-keys</command>, checks to
|
||||||
make sure RFC 5011 key maintenance has already been initialized
|
make sure RFC 5011 key maintenance has already been initialized
|
||||||
for the specified domain, and if so, it simply moves on. The
|
for the specified domain, and if so, it simply moves on. The
|
||||||
@ -10966,13 +10983,13 @@ example.com CNAME rpz-tcp-only.
|
|||||||
</para>
|
</para>
|
||||||
<para>
|
<para>
|
||||||
The next time <command>named</command> runs after an
|
The next time <command>named</command> runs after an
|
||||||
<command>initial-key</command> has been
|
<command>initial-key</command> or <command>initial-ds</command>
|
||||||
<emphasis>removed</emphasis> from the
|
trust anchor has been <emphasis>removed</emphasis> from the
|
||||||
<command>dnssec-keys</command> statement (or changed to
|
<command>dnssec-keys</command> statement (or changed to
|
||||||
a <command>static-key</command>), the corresponding
|
a <command>static-key</command> or <command>static-ds</command>),
|
||||||
zone will be removed from the managed keys database,
|
the corresponding keys will be removed from the managed keys
|
||||||
and RFC 5011 key maintenance will no longer be used for that
|
database, and RFC 5011 key maintenance will no longer be used
|
||||||
domain.
|
for that domain.
|
||||||
</para>
|
</para>
|
||||||
<para>
|
<para>
|
||||||
In the current implementation, the managed keys database
|
In the current implementation, the managed keys database
|
||||||
|
@ -13,6 +13,7 @@
|
|||||||
|
|
||||||
<programlisting>
|
<programlisting>
|
||||||
<command>dnssec-keys</command> { <replaceable>string</replaceable> ( static-key |
|
<command>dnssec-keys</command> { <replaceable>string</replaceable> ( static-key |
|
||||||
<command>initial-key</command> ) <replaceable>integer</replaceable> <replaceable>integer</replaceable> <replaceable>integer</replaceable>
|
<command>initial-key</command> | static-ds | initial-ds )
|
||||||
|
<replaceable>integer</replaceable> <replaceable>integer</replaceable> <replaceable>integer</replaceable>
|
||||||
<replaceable>quoted_string</replaceable>; ... };
|
<replaceable>quoted_string</replaceable>; ... };
|
||||||
</programlisting>
|
</programlisting>
|
||||||
|
@ -138,7 +138,8 @@ $ <userinput>make</userinput>
|
|||||||
<filename>named.conf</filename>, except that all
|
<filename>named.conf</filename>, except that all
|
||||||
<command>managed-keys</command> entries will be treated as
|
<command>managed-keys</command> entries will be treated as
|
||||||
if they were configured with the <command>static-key</command>
|
if they were configured with the <command>static-key</command>
|
||||||
keyword, even if they are configured with <command>initial-key</command>.
|
or <command>static-ds</command> keywords, even if they are configured
|
||||||
|
with <command>initial-key</command> or <command>iniital-ds</command>.
|
||||||
(See <xref linkend="managed-keys"/> for syntax details.)
|
(See <xref linkend="managed-keys"/> for syntax details.)
|
||||||
</para>
|
</para>
|
||||||
</section>
|
</section>
|
||||||
|
@ -13,7 +13,7 @@
|
|||||||
|
|
||||||
<programlisting>
|
<programlisting>
|
||||||
<command>managed-keys</command> { <replaceable>string</replaceable> ( static-key
|
<command>managed-keys</command> { <replaceable>string</replaceable> ( static-key
|
||||||
| initial-key ) <replaceable>integer</replaceable>
|
| initial-key | static-ds |
|
||||||
<replaceable>integer</replaceable> <replaceable>integer</replaceable>
|
<command>initial-ds</command> ) <replaceable>integer</replaceable> <replaceable>integer</replaceable>
|
||||||
<replaceable>quoted_string</replaceable>; ... }; deprecated
|
<replaceable>integer</replaceable> <replaceable>quoted_string</replaceable>; ... }; deprecated
|
||||||
</programlisting>
|
</programlisting>
|
||||||
|
@ -25,8 +25,8 @@
|
|||||||
<para>To configure a validating resolver to use RFC 5011 to
|
<para>To configure a validating resolver to use RFC 5011 to
|
||||||
maintain a trust anchor, configure the trust anchor using a
|
maintain a trust anchor, configure the trust anchor using a
|
||||||
<command>dnssec-keys</command> statement and the
|
<command>dnssec-keys</command> statement and the
|
||||||
<command>initial-key</command> keyword. Information about
|
<command>initial-key</command> or <command>initial-ds</command>
|
||||||
this can be found in
|
keyword. Information about this can be found in
|
||||||
<xref linkend="dnssec-keys"/>.</para>
|
<xref linkend="dnssec-keys"/>.</para>
|
||||||
</section>
|
</section>
|
||||||
<section><info><title>Authoritative Server</title></info>
|
<section><info><title>Authoritative Server</title></info>
|
||||||
|
@ -22,7 +22,8 @@ dlz <string> {
|
|||||||
}; // may occur multiple times
|
}; // may occur multiple times
|
||||||
|
|
||||||
dnssec-keys { <string> ( static-key |
|
dnssec-keys { <string> ( static-key |
|
||||||
initial-key ) <integer> <integer> <integer>
|
initial-key | static-ds | initial-ds )
|
||||||
|
<integer> <integer> <integer>
|
||||||
<quoted_string>; ... }; // may occur multiple times
|
<quoted_string>; ... }; // may occur multiple times
|
||||||
|
|
||||||
dnssec-policy <string> {
|
dnssec-policy <string> {
|
||||||
@ -68,9 +69,9 @@ logging {
|
|||||||
lwres { <unspecified-text> }; // obsolete, may occur multiple times
|
lwres { <unspecified-text> }; // obsolete, may occur multiple times
|
||||||
|
|
||||||
managed-keys { <string> ( static-key
|
managed-keys { <string> ( static-key
|
||||||
| initial-key ) <integer>
|
| initial-key | static-ds |
|
||||||
<integer> <integer>
|
initial-ds ) <integer> <integer>
|
||||||
<quoted_string>; ... }; // may occur multiple times, deprecated
|
<integer> <quoted_string>; ... }; // may occur multiple times, deprecated
|
||||||
|
|
||||||
masters <string> [ port <integer> ] [ dscp
|
masters <string> [ port <integer> ] [ dscp
|
||||||
<integer> ] { ( <masters> | <ipv4_address> [
|
<integer> ] { ( <masters> | <ipv4_address> [
|
||||||
@ -209,7 +210,7 @@ options {
|
|||||||
fstrm-set-output-queue-model ( mpsc | spsc ); // not configured
|
fstrm-set-output-queue-model ( mpsc | spsc ); // not configured
|
||||||
fstrm-set-output-queue-size <integer>; // not configured
|
fstrm-set-output-queue-size <integer>; // not configured
|
||||||
fstrm-set-reopen-interval <ttlval>; // not configured
|
fstrm-set-reopen-interval <ttlval>; // not configured
|
||||||
geoip-directory ( <quoted_string> | none ); // not configured
|
geoip-directory ( <quoted_string> | none );
|
||||||
geoip-use-ecs <boolean>; // obsolete
|
geoip-use-ecs <boolean>; // obsolete
|
||||||
glue-cache <boolean>;
|
glue-cache <boolean>;
|
||||||
has-old-clients <boolean>; // ancient
|
has-old-clients <boolean>; // ancient
|
||||||
@ -230,7 +231,7 @@ options {
|
|||||||
listen-on-v6 [ port <integer> ] [ dscp
|
listen-on-v6 [ port <integer> ] [ dscp
|
||||||
<integer> ] {
|
<integer> ] {
|
||||||
<address_match_element>; ... }; // may occur multiple times
|
<address_match_element>; ... }; // may occur multiple times
|
||||||
lmdb-mapsize <sizeval>; // non-operational
|
lmdb-mapsize <sizeval>;
|
||||||
lock-file ( <quoted_string> | none );
|
lock-file ( <quoted_string> | none );
|
||||||
maintain-ixfr-base <boolean>; // ancient
|
maintain-ixfr-base <boolean>; // ancient
|
||||||
managed-keys-directory <quoted_string>;
|
managed-keys-directory <quoted_string>;
|
||||||
@ -538,8 +539,9 @@ view <string> [ <class> ] {
|
|||||||
dnssec-dnskey-kskonly <boolean>;
|
dnssec-dnskey-kskonly <boolean>;
|
||||||
dnssec-enable <boolean>; // obsolete
|
dnssec-enable <boolean>; // obsolete
|
||||||
dnssec-keys { <string> ( static-key |
|
dnssec-keys { <string> ( static-key |
|
||||||
initial-key ) <integer> <integer>
|
initial-key | static-ds | initial-ds
|
||||||
<integer> <quoted_string>; ... }; // may occur multiple times
|
) <integer> <integer> <integer>
|
||||||
|
<quoted_string>; ... }; // may occur multiple times
|
||||||
dnssec-loadkeys-interval <integer>;
|
dnssec-loadkeys-interval <integer>;
|
||||||
dnssec-lookaside ( <string>
|
dnssec-lookaside ( <string>
|
||||||
trust-anchor <string> |
|
trust-anchor <string> |
|
||||||
@ -581,10 +583,11 @@ view <string> [ <class> ] {
|
|||||||
}; // may occur multiple times
|
}; // may occur multiple times
|
||||||
key-directory <quoted_string>;
|
key-directory <quoted_string>;
|
||||||
lame-ttl <ttlval>;
|
lame-ttl <ttlval>;
|
||||||
lmdb-mapsize <sizeval>; // non-operational
|
lmdb-mapsize <sizeval>;
|
||||||
maintain-ixfr-base <boolean>; // ancient
|
maintain-ixfr-base <boolean>; // ancient
|
||||||
managed-keys { <string> (
|
managed-keys { <string> (
|
||||||
static-key | initial-key
|
static-key | initial-key
|
||||||
|
| static-ds | initial-ds
|
||||||
) <integer> <integer>
|
) <integer> <integer>
|
||||||
<integer>
|
<integer>
|
||||||
<quoted_string>; ... }; // may occur multiple times, deprecated
|
<quoted_string>; ... }; // may occur multiple times, deprecated
|
||||||
|
@ -22,7 +22,8 @@ dlz <string> {
|
|||||||
}; // may occur multiple times
|
}; // may occur multiple times
|
||||||
|
|
||||||
dnssec-keys { <string> ( static-key |
|
dnssec-keys { <string> ( static-key |
|
||||||
initial-key ) <integer> <integer> <integer>
|
initial-key | static-ds | initial-ds )
|
||||||
|
<integer> <integer> <integer>
|
||||||
<quoted_string>; ... }; // may occur multiple times
|
<quoted_string>; ... }; // may occur multiple times
|
||||||
|
|
||||||
dyndb <string> <quoted_string> {
|
dyndb <string> <quoted_string> {
|
||||||
@ -50,9 +51,9 @@ logging {
|
|||||||
};
|
};
|
||||||
|
|
||||||
managed-keys { <string> ( static-key
|
managed-keys { <string> ( static-key
|
||||||
| initial-key ) <integer>
|
| initial-key | static-ds |
|
||||||
<integer> <integer>
|
initial-ds ) <integer> <integer>
|
||||||
<quoted_string>; ... }; // may occur multiple times, deprecated
|
<integer> <quoted_string>; ... }; // may occur multiple times, deprecated
|
||||||
|
|
||||||
masters <string> [ port <integer> ] [ dscp
|
masters <string> [ port <integer> ] [ dscp
|
||||||
<integer> ] { ( <masters> | <ipv4_address> [
|
<integer> ] { ( <masters> | <ipv4_address> [
|
||||||
@ -175,7 +176,7 @@ options {
|
|||||||
fstrm-set-output-queue-model ( mpsc | spsc ); // not configured
|
fstrm-set-output-queue-model ( mpsc | spsc ); // not configured
|
||||||
fstrm-set-output-queue-size <integer>; // not configured
|
fstrm-set-output-queue-size <integer>; // not configured
|
||||||
fstrm-set-reopen-interval <ttlval>; // not configured
|
fstrm-set-reopen-interval <ttlval>; // not configured
|
||||||
geoip-directory ( <quoted_string> | none ); // not configured
|
geoip-directory ( <quoted_string> | none );
|
||||||
glue-cache <boolean>;
|
glue-cache <boolean>;
|
||||||
heartbeat-interval <integer>;
|
heartbeat-interval <integer>;
|
||||||
hostname ( <quoted_string> | none );
|
hostname ( <quoted_string> | none );
|
||||||
@ -192,7 +193,7 @@ options {
|
|||||||
listen-on-v6 [ port <integer> ] [ dscp
|
listen-on-v6 [ port <integer> ] [ dscp
|
||||||
<integer> ] {
|
<integer> ] {
|
||||||
<address_match_element>; ... }; // may occur multiple times
|
<address_match_element>; ... }; // may occur multiple times
|
||||||
lmdb-mapsize <sizeval>; // non-operational
|
lmdb-mapsize <sizeval>;
|
||||||
lock-file ( <quoted_string> | none );
|
lock-file ( <quoted_string> | none );
|
||||||
managed-keys-directory <quoted_string>;
|
managed-keys-directory <quoted_string>;
|
||||||
masterfile-format ( map | raw | text );
|
masterfile-format ( map | raw | text );
|
||||||
@ -470,8 +471,9 @@ view <string> [ <class> ] {
|
|||||||
dnssec-accept-expired <boolean>;
|
dnssec-accept-expired <boolean>;
|
||||||
dnssec-dnskey-kskonly <boolean>;
|
dnssec-dnskey-kskonly <boolean>;
|
||||||
dnssec-keys { <string> ( static-key |
|
dnssec-keys { <string> ( static-key |
|
||||||
initial-key ) <integer> <integer>
|
initial-key | static-ds | initial-ds
|
||||||
<integer> <quoted_string>; ... }; // may occur multiple times
|
) <integer> <integer> <integer>
|
||||||
|
<quoted_string>; ... }; // may occur multiple times
|
||||||
dnssec-loadkeys-interval <integer>;
|
dnssec-loadkeys-interval <integer>;
|
||||||
dnssec-must-be-secure <string> <boolean>; // may occur multiple times
|
dnssec-must-be-secure <string> <boolean>; // may occur multiple times
|
||||||
dnssec-secure-to-insecure <boolean>;
|
dnssec-secure-to-insecure <boolean>;
|
||||||
@ -506,9 +508,10 @@ view <string> [ <class> ] {
|
|||||||
}; // may occur multiple times
|
}; // may occur multiple times
|
||||||
key-directory <quoted_string>;
|
key-directory <quoted_string>;
|
||||||
lame-ttl <ttlval>;
|
lame-ttl <ttlval>;
|
||||||
lmdb-mapsize <sizeval>; // non-operational
|
lmdb-mapsize <sizeval>;
|
||||||
managed-keys { <string> (
|
managed-keys { <string> (
|
||||||
static-key | initial-key
|
static-key | initial-key
|
||||||
|
| static-ds | initial-ds
|
||||||
) <integer> <integer>
|
) <integer> <integer>
|
||||||
<integer>
|
<integer>
|
||||||
<quoted_string>; ... }; // may occur multiple times, deprecated
|
<quoted_string>; ... }; // may occur multiple times, deprecated
|
||||||
|
Loading…
x
Reference in New Issue
Block a user