mirror of
https://gitlab.isc.org/isc-projects/bind9
synced 2025-08-30 22:15:20 +00:00
[master] add text clarifying native-pkcs11
This commit is contained in:
9
README
9
README
@@ -120,9 +120,12 @@ BIND 9.10.0
|
|||||||
allows BIND 9 cryptography functions to use the PKCS#11 API
|
allows BIND 9 cryptography functions to use the PKCS#11 API
|
||||||
natively, so that BIND can drive a cryptographic hardware
|
natively, so that BIND can drive a cryptographic hardware
|
||||||
service module (HSM) directly instead of using a modified
|
service module (HSM) directly instead of using a modified
|
||||||
OpenSSL as an intermediary. This has been tested with the
|
OpenSSL as an intermediary. (Note: This feature requires an
|
||||||
Thales nShield HSM and with SoftHSMv2 from the Open DNSSEC
|
HSM to have a full implementation of the PKCS#11 API; many
|
||||||
project.
|
current HSMs only have partial implementations. The new
|
||||||
|
"pkcs11-tokens" command can be used to check API completeness.
|
||||||
|
Native PKCS#11 is known to work with the Thales nShield HSM
|
||||||
|
and with SoftHSM version 2 from the Open DNSSEC project.)
|
||||||
- The new "max-zone-ttl" option enforces maximum TTLs for
|
- The new "max-zone-ttl" option enforces maximum TTLs for
|
||||||
zones. This can simplify the process of rolling DNSSEC keys
|
zones. This can simplify the process of rolling DNSSEC keys
|
||||||
by guaranteeing that cached signatures will have expired
|
by guaranteeing that cached signatures will have expired
|
||||||
|
Reference in New Issue
Block a user