diff --git a/bin/check/named-checkconf.8 b/bin/check/named-checkconf.8 index 89bde7a02a..67a8f4a3da 100644 --- a/bin/check/named-checkconf.8 +++ b/bin/check/named-checkconf.8 @@ -13,7 +13,7 @@ .\" OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR .\" PERFORMANCE OF THIS SOFTWARE. .\" -.\" $Id: named-checkconf.8,v 1.33 2009/12/29 01:14:03 tbox Exp $ +.\" $Id$ .\" .hy 0 .ad l diff --git a/bin/check/named-checkconf.html b/bin/check/named-checkconf.html index 9980723b6b..aa80c7cbe8 100644 --- a/bin/check/named-checkconf.html +++ b/bin/check/named-checkconf.html @@ -14,7 +14,7 @@ - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR - PERFORMANCE OF THIS SOFTWARE. --> - +
@@ -32,7 +32,7 @@named-checkconf
[-h
] [-v
] [-j
] [-t
] {filename} [directory
-p
] [-z
]
named-checkconf checks the syntax, but not the semantics, of a named configuration file. The file is parsed @@ -52,7 +52,7 @@
named-checkconf returns an exit status of 1 if errors were detected and 0 otherwise.
named-compilezone
[-d
] [-j
] [-q
] [-v
] [-c
] [class
-C
] [mode
-f
] [format
-F
] [format
-i
] [mode
-k
] [mode
-m
] [mode
-n
] [mode
-L
] [serial
-r
] [mode
-s
] [style
-t
] [directory
-w
] [directory
-D
] [-W
] {mode
-o
} {zonename} {filename}filename
named-checkzone checks the syntax and integrity of a zone file. It performs the same checks as named does when loading a @@ -53,7 +53,7 @@
named-checkzone returns an exit status of 1 if errors were detected and 0 otherwise.
ddns-confgen
[-a
] [algorithm
-h
] [-k
] [keyname
-r
] [ -s randomfile
name
| -z zone
] [-q
] [name]
ddns-confgen generates a key for use by nsupdate and named. It simplifies configuration @@ -58,7 +58,7 @@
rndc-confgen
[-a
] [-b
] [keysize
-c
] [keyfile
-h
] [-k
] [keyname
-p
] [port
-r
] [randomfile
-s
] [address
-t
] [chrootdir
-u
]user
rndc-confgen generates configuration files for rndc. It can be used as a @@ -48,7 +48,7 @@
dig
[global-queryopt...] [query...]
dig (domain information groper) is a flexible tool for interrogating DNS name servers. It performs DNS lookups and @@ -80,7 +80,7 @@
The -b
option sets the source IP address of the query
to address
. This must be a valid
@@ -230,7 +230,7 @@
dig provides a number of query options which affect the way in which lookups are made and the results displayed. Some of @@ -581,7 +581,7 @@
The BIND 9 implementation of dig supports @@ -627,7 +627,7 @@ dig +qr www.isc.org any -x 127.0.0.1 isc.org ns +noqr
If dig has been built with IDN (internationalized domain name) support, it can accept and display non-ASCII domain names. @@ -641,14 +641,14 @@ dig +qr www.isc.org any -x 127.0.0.1 isc.org ns +noqr
host(1), named(8), dnssec-keygen(8), @@ -656,7 +656,7 @@ dig +qr www.isc.org any -x 127.0.0.1 isc.org ns +noqr
There are probably too many query options.
diff --git a/bin/dig/host.1 b/bin/dig/host.1 index 82b3aea18b..b6eb81ba40 100644 --- a/bin/dig/host.1 +++ b/bin/dig/host.1 @@ -13,7 +13,7 @@ .\" OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR .\" PERFORMANCE OF THIS SOFTWARE. .\" -.\" $Id: host.1,v 1.31 2009/07/11 01:12:45 tbox Exp $ +.\" $Id$ .\" .hy 0 .ad l diff --git a/bin/dig/host.html b/bin/dig/host.html index d7fe697a5b..d5fb6e735f 100644 --- a/bin/dig/host.html +++ b/bin/dig/host.html @@ -14,7 +14,7 @@ - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR - PERFORMANCE OF THIS SOFTWARE. --> - + @@ -32,7 +32,7 @@host
[-aCdlnrsTwv
] [-c
] [class
-N
] [ndots
-R
] [number
-t
] [type
-W
] [wait
-m
] [flag
-4
] [-6
] {name} [server]
host is a simple utility for performing DNS lookups. It is normally used to convert names to IP addresses and vice versa. @@ -184,7 +184,7 @@
If host has been built with IDN (internationalized domain name) support, it can accept and display non-ASCII domain names. @@ -198,12 +198,12 @@
dig(1), named(8).
diff --git a/bin/dig/nslookup.1 b/bin/dig/nslookup.1 index b6c8cded7e..f988995ba8 100644 --- a/bin/dig/nslookup.1 +++ b/bin/dig/nslookup.1 @@ -12,7 +12,7 @@ .\" OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR .\" PERFORMANCE OF THIS SOFTWARE. .\" -.\" $Id: nslookup.1,v 1.16 2010/02/23 01:14:31 tbox Exp $ +.\" $Id$ .\" .hy 0 .ad l diff --git a/bin/dig/nslookup.html b/bin/dig/nslookup.html index c0d4ded161..4bf6aab5c4 100644 --- a/bin/dig/nslookup.html +++ b/bin/dig/nslookup.html @@ -13,7 +13,7 @@ - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR - PERFORMANCE OF THIS SOFTWARE. --> - + @@ -21,7 +21,7 @@nslookup — query Internet name servers interactively
@@ -31,7 +31,7 @@nslookup
[-option
] [name | -] [server]
Nslookup is a program to query Internet domain name servers. Nslookup has two modes: interactive and non-interactive. Interactive mode allows @@ -43,7 +43,7 @@
Interactive mode is entered in the following cases:
@@ -78,7 +78,7 @@ nslookup -query=hinfo -timeout=10host
[server]Andrew Cherenson
diff --git a/bin/dnssec/dnssec-dsfromkey.8 b/bin/dnssec/dnssec-dsfromkey.8 index 48086851ef..87d5301306 100644 --- a/bin/dnssec/dnssec-dsfromkey.8 +++ b/bin/dnssec/dnssec-dsfromkey.8 @@ -12,7 +12,7 @@ .\" OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR .\" PERFORMANCE OF THIS SOFTWARE. .\" -.\" $Id: dnssec-dsfromkey.8,v 1.15 2011/10/26 01:14:51 tbox Exp $ +.\" $Id$ .\" .hy 0 .ad l diff --git a/bin/dnssec/dnssec-dsfromkey.html b/bin/dnssec/dnssec-dsfromkey.html index 1198f9835f..a131cab7e2 100644 --- a/bin/dnssec/dnssec-dsfromkey.html +++ b/bin/dnssec/dnssec-dsfromkey.html @@ -13,7 +13,7 @@ - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR - PERFORMANCE OF THIS SOFTWARE. --> - + @@ -32,14 +32,14 @@dnssec-dsfromkey
{-s} [-1
] [-2
] [-a
] [alg
-K
] [directory
-l
] [domain
-s
] [-c
] [class
-T
] [TTL
-f
] [file
-A
] [-v
] {dnsname}level
dnssec-dsfromkey outputs the Delegation Signer (DS) resource record (RR), as defined in RFC 3658 and RFC 4509, for the given key(s).
The keyfile can be designed by the key identification
Knnnn.+aaa+iiiii
or the full file name
@@ -144,13 +144,13 @@
dnssec-keygen(8), dnssec-signzone(8), BIND 9 Administrator Reference Manual, @@ -160,7 +160,7 @@
dnssec-keyfromlabel
{-l label
} [-3
] [-a
] [algorithm
-A
] [date/offset
-c
] [class
-D
] [date/offset
-E
] [engine
-f
] [flag
-G
] [-I
] [date/offset
-k
] [-K
] [directory
-L
] [ttl
-n
] [nametype
-P
] [date/offset
-p
] [protocol
-R
] [date/offset
-t
] [type
-v
] [level
-y
] {name}
When dnssec-keyfromlabel completes successfully, @@ -258,7 +258,7 @@
dnssec-keygen(8), dnssec-signzone(8), BIND 9 Administrator Reference Manual, @@ -266,7 +266,7 @@
dnssec-keygen
[-a
] [algorithm
-b
] [keysize
-n
] [nametype
-3
] [-A
] [date/offset
-C
] [-c
] [class
-D
] [date/offset
-E
] [engine
-e
] [-f
] [flag
-G
] [-g
] [generator
-h
] [-I
] [date/offset
-i
] [interval
-K
] [directory
-L
] [ttl
-k
] [-P
] [date/offset
-p
] [protocol
-q
] [-R
] [date/offset
-r
] [randomdev
-S
] [key
-s
] [strength
-t
] [type
-v
] [level
-z
] {name}
dnssec-keygen generates keys for DNSSEC (Secure DNS), as defined in RFC 2535 and RFC 4034. It can also generate keys for use with @@ -46,7 +46,7 @@
Dates can be expressed in the format YYYYMMDD or YYYYMMDDHHMMSS. If the argument begins with a '+' or '-', it is interpreted as @@ -328,7 +328,7 @@
To generate a 768-bit DSA key for the domain
example.com
, the following command would be
@@ -395,7 +395,7 @@
dnssec-signzone(8), BIND 9 Administrator Reference Manual, RFC 2539, @@ -404,7 +404,7 @@
dnssec-revoke
[-hr
] [-v
] [level
-K
] [directory
-E
] [engine
-f
] [-R
] {keyfile}
dnssec-revoke reads a DNSSEC key file, sets the REVOKED bit on the key as defined in RFC 5011, and creates a new pair of key files containing the @@ -39,7 +39,7 @@
dnssec-settime
[-f
] [-K
] [directory
-L
] [ttl
-P
] [date/offset
-A
] [date/offset
-R
] [date/offset
-I
] [date/offset
-D
] [date/offset
-h
] [-v
] [level
-E
] {keyfile}engine
dnssec-settime
reads a DNSSEC private key file and sets the key timing metadata
as specified by the -P
, -A
,
@@ -57,7 +57,7 @@
Dates can be expressed in the format YYYYMMDD or YYYYMMDDHHMMSS. If the argument begins with a '+' or '-', it is interpreted as @@ -178,7 +178,7 @@
dnssec-settime can also be used to print the timing metadata associated with a key. @@ -204,7 +204,7 @@
dnssec-keygen(8), dnssec-signzone(8), BIND 9 Administrator Reference Manual, @@ -212,7 +212,7 @@
dnssec-signzone
[-a
] [-c
] [class
-d
] [directory
-D
] [-E
] [engine
-e
] [end-time
-f
] [output-file
-g
] [-h
] [-K
] [directory
-k
] [key
-L
] [serial
-l
] [domain
-i
] [interval
-I
] [input-format
-j
] [jitter
-N
] [soa-serial-format
-o
] [origin
-O
] [output-format
-P
] [-p
] [-R
] [-r
] [randomdev
-S
] [-s
] [start-time
-T
] [ttl
-t
] [-u
] [-v
] [level
-X
] [extended end-time
-x
] [-z
] [-3
] [salt
-H
] [iterations
-A
] {zonefile} [key...]
dnssec-signzone signs a zone. It generates NSEC and RRSIG records and produces a signed version of the @@ -43,7 +43,7 @@
The following command signs the example.com
zone with the DSA key generated by dnssec-keygen
@@ -476,14 +476,14 @@ db.example.com.signed
%
lwresd — lightweight resolver daemon
@@ -32,7 +32,7 @@lwresd
[-c
] [config-file
-C
] [config-file
-d
] [debug-level
-f
] [-g
] [-i
] [pid-file
-m
] [flag
-n
] [#cpus
-P
] [port
-p
] [port
-s
] [-t
] [directory
-u
] [user
-v
] [-4
] [-6
]
lwresd is the daemon providing name lookup services to clients that use the BIND 9 lightweight resolver @@ -67,7 +67,7 @@
named.conf
— configuration file for named
named.conf
named.conf
is the configuration file
for
named. Statements are enclosed
@@ -50,14 +50,14 @@
masters string
[ port integer
] {
( masters
| ipv4_address
[port integer
] |
@@ -75,7 +75,7 @@ masters
server ( ipv4_address[/prefixlen]
| ipv6_address[/prefixlen]
) {
bogus boolean
;
@@ -97,7 +97,7 @@ server
trusted-keys {
domain_name
flags
protocol
algorithm
key
; ...
@@ -105,7 +105,7 @@ trusted-keys
managed-keys {
domain_name
initial-key
flags
protocol
algorithm
key
; ...
@@ -113,7 +113,7 @@ managed-keys
controls {
inet ( ipv4_address
| ipv6_address
| * )
@@ -125,7 +125,7 @@ controls
view string
optional_class
{
match-clients { address_match_element
; ... };
@@ -525,7 +525,7 @@ view
zone string
optional_class
{
type ( master | slave | stub | hint | redirect |
@@ -622,12 +622,12 @@ zone
named(8), named-checkconf(8), rndc(8), diff --git a/bin/named/named.html b/bin/named/named.html index 49b3c11418..6e1aa05253 100644 --- a/bin/named/named.html +++ b/bin/named/named.html @@ -14,7 +14,7 @@ - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR - PERFORMANCE OF THIS SOFTWARE. --> - +
@@ -32,7 +32,7 @@named
[-4
] [-6
] [-c
] [config-file
-d
] [debug-level
-E
] [engine-name
-f
] [-g
] [-m
] [flag
-n
] [#cpus
-p
] [port
-s
] [-S
] [#max-socks
-t
] [directory
-U
] [#listeners
-u
] [user
-v
] [-V
] [-x
]cache-file
named is a Domain Name System (DNS) server, part of the BIND 9 distribution from ISC. For more @@ -47,7 +47,7 @@
In routine operation, signals should not be used to control the nameserver; rndc should be used @@ -258,7 +258,7 @@
The named configuration file is too complex to describe in detail here. A complete description is provided @@ -275,7 +275,7 @@
nsupdate
[-d
] [-D
] [[-g
] | [-o
] | [-l
] | [-y
] | [[hmac:]keyname:secret
-k
]] [keyfile
-t
] [timeout
-u
] [udptimeout
-r
] [udpretries
-R
] [randomdev
-v
] [filename]
nsupdate
[-d
] [-D
] [[-g
] | [-o
] | [-l
] | [-y
] | [[hmac:]keyname:secret
-k
]] [keyfile
-t
] [timeout
-u
] [udptimeout
-r
] [udpretries
-R
] [randomdev
-v
] [-T
] [-P
] [filename]
nsupdate
is used to submit Dynamic DNS Update requests as defined in RFC 2136
to a name server.
@@ -190,9 +190,25 @@
keyboard
indicates that keyboard input
should be used. This option may be specified multiple times.
+ Other types can be entered using "TYPEXXXXX" where "XXXXX" is the + decimal value of the type with no leading zeros. The rdata, + if present, will be parsed using the UNKNOWN rdata format, + (<backslash> <hash> <space> <length> + <space> <hexstring>). +
+
+ The -T
and -P
options print out
+ lists of non-meta types for which the type-specific presentation
+ formats are known. -T
prints out the list of
+ IANA-assigned types. -P
prints out the list of
+ private types specific to named. These options
+ may be combined. nsupdate will exit after the
+ lists are printed.
+
The TSIG key is redundantly stored in two separate files. This is a consequence of nsupdate using the DST library diff --git a/bin/rndc/rndc.8 b/bin/rndc/rndc.8 index 8b5514c504..7197ed0b92 100644 --- a/bin/rndc/rndc.8 +++ b/bin/rndc/rndc.8 @@ -13,7 +13,7 @@ .\" OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR .\" PERFORMANCE OF THIS SOFTWARE. .\" -.\" $Id: rndc.8,v 1.43 2009/07/11 01:12:46 tbox Exp $ +.\" $Id$ .\" .hy 0 .ad l diff --git a/bin/rndc/rndc.conf.5 b/bin/rndc/rndc.conf.5 index 16534233aa..694a4815da 100644 --- a/bin/rndc/rndc.conf.5 +++ b/bin/rndc/rndc.conf.5 @@ -13,7 +13,7 @@ .\" OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR .\" PERFORMANCE OF THIS SOFTWARE. .\" -.\" $Id: rndc.conf.5,v 1.41 2009/07/11 01:12:46 tbox Exp $ +.\" $Id$ .\" .hy 0 .ad l diff --git a/bin/rndc/rndc.conf.html b/bin/rndc/rndc.conf.html index 28f7d100f7..b0f904b2ab 100644 --- a/bin/rndc/rndc.conf.html +++ b/bin/rndc/rndc.conf.html @@ -14,7 +14,7 @@ - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR - PERFORMANCE OF THIS SOFTWARE. --> - +
@@ -32,7 +32,7 @@rndc.conf
rndc.conf
is the configuration file
for rndc, the BIND 9 name server control
utility. This file has a similar structure and syntax to
@@ -117,7 +117,7 @@
The name server must be configured to accept rndc connections and
to recognize the key specified in the rndc.conf
@@ -201,7 +201,7 @@
rndc
[-b
] [source-address
-c
] [config-file
-k
] [key-file
-s
] [server
-p
] [port
-V
] [-y
] {command}key_id
rndc controls the operation of a name server. It supersedes the ndc utility @@ -61,7 +61,7 @@
source-address
@@ -133,7 +133,7 @@
rndc does not yet support all the commands of the BIND 8 ndc utility. @@ -147,7 +147,7 @@
arpaname
{ipaddress
...}
arpaname translates IP addresses (IPv4 and IPv6) to the corresponding IN-ADDR.ARPA or IP6.ARPA names.
genrandom
[-n
] {number
size
} {filename
}
genrandom generates a file or a set of files containing a specified quantity @@ -40,7 +40,7 @@
isc-hmac-fixup
{algorithm
} {secret
}
Versions of BIND 9 up to and including BIND 9.6 had a bug causing HMAC-SHA* TSIG keys which were longer than the digest length of the @@ -57,7 +57,7 @@
Secrets that have been converted by isc-hmac-fixup are shortened, but as this is how the HMAC protocol works in @@ -68,14 +68,14 @@
named-journalprint
{journal
}
named-journalprint prints the contents of a zone journal file in a human-readable @@ -57,7 +57,7 @@
nsec3hash
{salt
} {algorithm
} {iterations
} {domain
}
nsec3hash generates an NSEC3 hash based on a set of NSEC3 parameters. This can be used to check the validity @@ -39,7 +39,7 @@
Table of Contents
The Berkeley Internet Name Domain (BIND) implements a @@ -87,7 +87,7 @@
In this document, Chapter 1 introduces the basic DNS and BIND concepts. Chapter 2 @@ -116,7 +116,7 @@
In this document, we use the following general typographic conventions: @@ -243,7 +243,7 @@
The purpose of this document is to explain the installation and upkeep of the BIND (Berkeley Internet @@ -253,7 +253,7 @@
The Domain Name System (DNS) is a hierarchical, distributed database. It stores information for mapping Internet host names to @@ -275,7 +275,7 @@
The data stored in the DNS is identified by domain names that are organized as a tree according to organizational or administrative boundaries. Each node of the tree, @@ -321,7 +321,7 @@
To properly operate a name server, it is important to understand the difference between a zone @@ -374,7 +374,7 @@
Each zone is served by at least one authoritative name server, @@ -391,7 +391,7 @@
The authoritative server where the master copy of the zone data is maintained is called the @@ -411,7 +411,7 @@
The other authoritative servers, the slave servers (also known as secondary servers) @@ -427,7 +427,7 @@
Usually all of the zone's authoritative servers are listed in NS records in the parent zone. These NS records constitute @@ -462,7 +462,7 @@
The resolver libraries provided by most operating systems are stub resolvers, meaning that they are not @@ -489,7 +489,7 @@
Even a caching name server does not necessarily perform the complete recursive lookup itself. Instead, it can @@ -516,7 +516,7 @@
The BIND name server can simultaneously act as diff --git a/doc/arm/Bv9ARM.ch02.html b/doc/arm/Bv9ARM.ch02.html index 7e8f1ad1f9..2965781971 100644 --- a/doc/arm/Bv9ARM.ch02.html +++ b/doc/arm/Bv9ARM.ch02.html @@ -14,7 +14,7 @@ - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR - PERFORMANCE OF THIS SOFTWARE. --> - +
@@ -45,16 +45,16 @@Table of Contents
DNS hardware requirements have traditionally been quite modest. @@ -73,7 +73,7 @@
CPU requirements for BIND 9 range from i486-class machines @@ -84,7 +84,7 @@
The memory of the server has to be large enough to fit the cache and zones loaded off disk. The max-cache-size @@ -107,7 +107,7 @@
For name server intensive environments, there are two alternative configurations that may be used. The first is where clients and @@ -124,7 +124,7 @@
ISC BIND 9 compiles and runs on a large number diff --git a/doc/arm/Bv9ARM.ch03.html b/doc/arm/Bv9ARM.ch03.html index 4dce6b6e89..e944c71b74 100644 --- a/doc/arm/Bv9ARM.ch03.html +++ b/doc/arm/Bv9ARM.ch03.html @@ -14,7 +14,7 @@ - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR - PERFORMANCE OF THIS SOFTWARE. --> - +
@@ -47,14 +47,14 @@The following sample configuration is appropriate for a caching-only name server for use by clients internal to a corporation. All @@ -98,7 +98,7 @@ zone "0.0.127.in-addr.arpa" {
This sample configuration is for an authoritative-only server
that is the master server for "example.com
"
@@ -146,7 +146,7 @@ zone "eng.example.com" {
A primitive form of load balancing can be achieved in the DNS by using multiple records @@ -289,10 +289,10 @@ zone "eng.example.com" {
This section describes several indispensable diagnostic, administrative and monitoring tools available to the system @@ -983,7 +983,7 @@ controls {
Certain UNIX signals cause the name server to take specific actions, as described in the following table. These signals can diff --git a/doc/arm/Bv9ARM.ch04.html b/doc/arm/Bv9ARM.ch04.html index 9f09f8463e..2e32ffd25e 100644 --- a/doc/arm/Bv9ARM.ch04.html +++ b/doc/arm/Bv9ARM.ch04.html @@ -14,7 +14,7 @@ - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR - PERFORMANCE OF THIS SOFTWARE. --> - +
@@ -49,59 +49,59 @@Setting up different views, or visibility, of the DNS space to internal and external resolvers is usually referred to as a @@ -286,7 +286,7 @@
Let's say a company named Example, Inc.
(example.com
)
@@ -543,7 +543,7 @@ nameserver 172.16.72.4
A shared secret is generated to be shared between host1 and host2. An arbitrary key name is chosen: "host1-host2.". The key name must @@ -551,7 +551,7 @@ nameserver 172.16.72.4
The following command will generate a 128-bit (16 byte) HMAC-SHA256 key as described above. Longer keys are better, but shorter keys @@ -575,7 +575,7 @@ nameserver 172.16.72.4
The shared secret is simply a random sequence of bits, encoded in base-64. Most ASCII strings are valid base-64 strings (assuming @@ -590,7 +590,7 @@ nameserver 172.16.72.4
This is beyond the scope of DNS. A secure transport mechanism should be used. This could be secure FTP, ssh, telephone, etc. @@ -598,7 +598,7 @@ nameserver 172.16.72.4
Imagine host1 and host 2 are @@ -625,7 +625,7 @@ key host1-host2. {
Since keys are shared between two hosts only, the server must
be told when keys are to be used. The following is added to the named.conf
file
@@ -657,7 +657,7 @@ server 10.1.2.3 {
BIND allows IP addresses and ranges to be specified in ACL @@ -684,7 +684,7 @@ allow-update { key host1-host2. ;};
The processing of TSIG signed messages can result in several errors. If a signed message is sent to a non-TSIG aware @@ -710,7 +710,7 @@ allow-update { key host1-host2. ;};
TKEY is a mechanism for automatically generating a shared secret between two hosts. There are several "modes" of @@ -746,7 +746,7 @@ allow-update { key host1-host2. ;};
BIND 9 partially supports DNSSEC SIG(0) transaction signatures as specified in RFC 2535 and RFC 2931. @@ -807,7 +807,7 @@ allow-update { key host1-host2. ;};
The dnssec-keygen program is used to generate keys. @@ -863,7 +863,7 @@ allow-update { key host1-host2. ;};
The dnssec-signzone program is used to sign a zone. @@ -905,7 +905,7 @@ allow-update { key host1-host2. ;};
To enable named to respond appropriately to DNS requests from DNSSEC aware clients, @@ -1065,7 +1065,7 @@ options { from insecure to signed and back again. A secure zone can use either NSEC or NSEC3 chains.
+Converting from insecure to secureChanging a zone from insecure to secure can be done in two ways: using a dynamic DNS update, or the auto-dnssec zone option.
@@ -1091,7 +1091,7 @@ options { well. An NSEC chain will be generated as part of the initial signing process. +Dynamic DNS update methodTo insert the keys via dynamic update:
% nsupdate @@ -1127,7 +1127,7 @@ options {While the initial signing and NSEC/NSEC3 chain generation is happening, other updates are possible as well.
+Fully automatic zone signingTo enable automatic signing, add the auto-dnssec option to the zone statement in
+Private-type recordsnamed.conf
. @@ -1183,7 +1183,7 @@ options { configuration. If this has not been done, the configuration will fail.The state of the signing process is signaled by private-type records (with a default type value of 65534). When signing is complete, these records will have a nonzero value for @@ -1224,12 +1224,12 @@ options {
+DNSKEY rollovers
As with insecure-to-secure conversions, rolling DNSSEC keys can be done in two ways: using a dynamic DNS update, or the auto-dnssec zone option.
+Dynamic DNS update methodTo perform key rollovers via dynamic update, you need to add the
+Automatic key rolloversK*
files for the new keys so that named can find them. You can then add the new @@ -1251,7 +1251,7 @@ options { named will clean out any signatures generated by the old key after the update completes.When a new key reaches its activation date (as set by dnssec-keygen or dnssec-settime), if the auto-dnssec zone option is set to @@ -1266,27 +1266,27 @@ options { completes in 30 days, after which it will be safe to remove the old key from the DNSKEY RRset.
+NSEC3PARAM rollovers via UPDATEAdd the new NSEC3PARAM record via dynamic update. When the new NSEC3 chain has been generated, the NSEC3PARAM flag field will be zero. At this point you can remove the old NSEC3PARAM record. The old chain will be removed after the update request completes.
+Converting from NSEC to NSEC3To do this, you just need to add an NSEC3PARAM record. When the conversion is complete, the NSEC chain will have been removed and the NSEC3PARAM record will have a zero flag field. The NSEC3 chain will be generated before the NSEC chain is destroyed.
+Converting from NSEC3 to NSECTo do this, use nsupdate to remove all NSEC3PARAM records with a zero flag field. The NSEC chain will be generated before the NSEC3 chain is removed.
+Converting from secure to insecureTo convert a signed zone to unsigned using dynamic DNS, delete all the DNSKEY records from the zone apex using nsupdate. All signatures, NSEC or NSEC3 chains, @@ -1301,14 +1301,14 @@ options { allow instead (or it will re-sign).
+Periodic re-signingIn any secure zone which supports dynamic updates, named will periodically re-sign RRsets which have not been re-signed as a result of some update action. The signature lifetimes will be adjusted so as to spread the re-sign load over time rather than all at once.
+NSEC3 and OPTOUTnamed only supports creating new NSEC3 chains where all the NSEC3 records in the zone have the same OPTOUT @@ -1330,7 +1330,7 @@ options { configuration files.
To configure a validating resolver to use RFC 5011 to maintain a trust anchor, configure the trust anchor using a managed-keys statement. Information about @@ -1341,7 +1341,7 @@ options {
To set up an authoritative zone for RFC 5011 trust anchor maintenance, generate two (or more) key signing keys (KSKs) for the zone. Sign the zone with one of them; this is the "active" @@ -1415,7 +1415,7 @@ $
dnssec-signzone -S -K keys example.net
< Debian Linux, Solaris x86 and Windows Server 2003.See the HSM vendor documentation for information about installing, initializing, testing and troubleshooting the HSM.
@@ -1492,7 +1492,7 @@ $patch -p1 -d openssl-0.9.8s \ when we configure BIND 9.
The AEP Keyper is a highly secure key storage device, but does not provide hardware cryptographic acceleration. It can carry out cryptographic operations, but it is probably @@ -1524,7 +1524,7 @@ $
./Configure linux-generic32 -m32 -pthread \
The SCA-6000 PKCS #11 provider is installed as a system library, libpkcs11. It is a true crypto accelerator, up to 4 times faster than any CPU, so the flavor shall be @@ -1546,7 +1546,7 @@ $
./Configure solaris64-x86_64-cc \
SoftHSM is a software library provided by the OpenDNSSEC project (http://www.opendnssec.org) which provides a PKCS#11 interface to a virtual HSM, implemented in the form of encrypted @@ -1606,12 +1606,12 @@ $
./Configure linux-x86_64 -pthread \
When building BIND 9, the location of the custom-built OpenSSL library must be specified via configure.
To link with the PKCS #11 provider, threads must be enabled in the BIND 9 build.
The PKCS #11 library for the AEP Keyper is currently @@ -1627,7 +1627,7 @@ $
./configure CC="gcc -m32" --enable-threads \
To link with the PKCS #11 provider, threads must be enabled in the BIND 9 build.
@@ -1645,7 +1645,7 @@ $./configure CC="cc -xarch=amd64" --enable-thre
$cd ../bind9
$./configure --enable-threads \ @@ -1662,7 +1662,7 @@ $
./configure --enable-threads \
BIND 9 includes a minimal set of tools to operate the HSM, including pkcs11-keygen to generate a new key pair @@ -1680,7 +1680,7 @@ $
./configure --enable-threads \
First, we must set up the runtime environment so the OpenSSL and PKCS #11 libraries can be loaded:
@@ -1768,7 +1768,7 @@ example.net.signedThe OpenSSL engine can be specified in named and all of the BIND dnssec-* tools by using the "-E @@ -1789,7 +1789,7 @@ $
dnssec-signzone -E '' -S example.net
If you want named to dynamically re-sign zones using HSM keys, and/or to to sign new records inserted via nsupdate, then @@ -1825,7 +1825,7 @@ $
dnssec-signzone -E '' -S example.net
BIND 9 fully supports all currently defined forms of IPv6 name to address and address to name @@ -1863,7 +1863,7 @@ $
dnssec-signzone -E '' -S example.net
The IPv6 AAAA record is a parallel to the IPv4 A record, and, unlike the deprecated A6 record, specifies the entire @@ -1882,7 +1882,7 @@ host 3600 IN AAAA 2001:db8::1
When looking up an address in nibble format, the address components are simply reversed, just as in IPv4, and diff --git a/doc/arm/Bv9ARM.ch05.html b/doc/arm/Bv9ARM.ch05.html index a9965404f9..4aa25d307c 100644 --- a/doc/arm/Bv9ARM.ch05.html +++ b/doc/arm/Bv9ARM.ch05.html @@ -14,7 +14,7 @@ - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR - PERFORMANCE OF THIS SOFTWARE. --> - +
@@ -45,13 +45,13 @@Table of Contents
Traditionally applications have been linked with a stub resolver library that sends recursive DNS queries to a local caching name diff --git a/doc/arm/Bv9ARM.ch06.html b/doc/arm/Bv9ARM.ch06.html index 37eab02b06..d47afabc1c 100644 --- a/doc/arm/Bv9ARM.ch06.html +++ b/doc/arm/Bv9ARM.ch06.html @@ -14,7 +14,7 @@ - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR - PERFORMANCE OF THIS SOFTWARE. --> - +
@@ -48,58 +48,58 @@Configuration File Elements Configuration File Grammar - -
- acl Statement Grammar
+- acl Statement Grammar
- acl Statement Definition and Usage
-- controls Statement Grammar
+- controls Statement Grammar
- controls Statement Definition and Usage
-- include Statement Grammar
-- include Statement Definition and +
- include Statement Grammar
+- include Statement Definition and Usage
-- key Statement Grammar
-- key Statement Definition and Usage
-- logging Statement Grammar
-- logging Statement Definition and +
- key Statement Grammar
+- key Statement Definition and Usage
+- logging Statement Grammar
+- logging Statement Definition and Usage
-- lwres Statement Grammar
-- lwres Statement Definition and Usage
-- masters Statement Grammar
-- masters Statement Definition and +
- lwres Statement Grammar
+- lwres Statement Definition and Usage
+- masters Statement Grammar
+- masters Statement Definition and Usage
-- options Statement Grammar
+- options Statement Grammar
- options Statement Definition and Usage
- server Statement Grammar
- server Statement Definition and Usage
- statistics-channels Statement Grammar
-- statistics-channels Statement Definition and +
- statistics-channels Statement Definition and Usage
- trusted-keys Statement Grammar
-- trusted-keys Statement Definition +
- trusted-keys Statement Definition and Usage
-- managed-keys Statement Grammar
+- managed-keys Statement Grammar
- managed-keys Statement Definition and Usage
- view Statement Grammar
-- view Statement Definition and Usage
+- view Statement Definition and Usage
- zone Statement Grammar
-- zone Statement Definition and Usage
+- zone Statement Definition and Usage
Zone File +Zone File
- Types of Resource Records and When to Use Them
-- Discussion of MX Records
+- Discussion of MX Records
- Setting TTLs
-- Inverse Mapping in IPv4
-- Other Zone File Directives
-- BIND Master File Extension: the $GENERATE Directive
+- Inverse Mapping in IPv4
+- Other Zone File Directives
+- BIND Master File Extension: the $GENERATE Directive
- Additional File Formats
BIND9 Statistics @@ -477,7 +477,7 @@ Address Match Listsaddress_match_list
= address_match_list_element ; [ address_match_list_element; ... ]address_match_list_element
= [ ! ] (ip_address [/length] | @@ -486,7 +486,7 @@Address match lists are primarily used to determine access control for various server operations. They are also used in @@ -570,7 +570,7 @@
The BIND 9 comment syntax allows for comments to appear @@ -580,7 +580,7 @@
/* This is a BIND comment as in C */@@ -596,7 +596,7 @@Comments may appear anywhere that whitespace may appear in a BIND configuration file. @@ -850,7 +850,7 @@
acl acl-name { address_match_list }; @@ -932,7 +932,7 @@controls { [ inet ( ip_addr | * ) [ port ip_port ] allow {address_match_list
} @@ -1056,12 +1056,12 @@includefilename
;The include statement inserts the @@ -1076,7 +1076,7 @@
keykey_id
{ algorithmstring
; secretstring
; @@ -1085,7 +1085,7 @@The key statement defines a shared secret key for use with TSIG (see the section called “TSIG”) @@ -1132,7 +1132,7 @@
logging { [ channelchannel_name
{ ( filepath_name
@@ -1156,7 +1156,7 @@The logging statement configures a @@ -1190,7 +1190,7 @@
All log output goes to one or more channels; you can make as many of them as you want. @@ -1774,7 +1774,7 @@ category notify { null; };
The query-errors category is specifically intended for debugging purposes: To identify @@ -2002,7 +2002,7 @@ badresp:1,adberr:0,findfail:0,valfail:0]
This is the grammar of the lwres statement in the
named.conf
file: @@ -2018,7 +2018,7 @@ badresp:1,adberr:0,findfail:0,valfail:0]The lwres statement configures the name @@ -2069,7 +2069,7 @@ badresp:1,adberr:0,findfail:0,valfail:0]
mastersname
[portip_port
] { (masters_list
|ip_addr
[portip_port
] [keykey
] ) ; [...] }; @@ -2077,7 +2077,7 @@ badresp:1,adberr:0,findfail:0,valfail:0]masters lists allow for a common set of masters to be easily used by @@ -2087,7 +2087,7 @@ badresp:1,adberr:0,findfail:0,valfail:0]
This is the grammar of the options statement in the
named.conf
file: @@ -3724,7 +3724,7 @@ options {The forwarding facility can be used to create a large site-wide cache on a few servers, reducing traffic over links to external @@ -3768,7 +3768,7 @@ options {
Dual-stack servers are used as servers of last resort to work around @@ -3979,7 +3979,7 @@ options {
The interfaces and ports that the server will answer queries from may be specified using the listen-on option. listen-on takes @@ -4447,7 +4447,7 @@ avoid-v6-udp-ports {};
use-v4-udp-ports, avoid-v4-udp-ports, @@ -4489,7 +4489,7 @@ avoid-v6-udp-ports { 40000; range 50000 60000; };
The server's usage of many system resources can be limited. Scaled values are allowed when specifying resource limits. For @@ -4651,7 +4651,7 @@ avoid-v6-udp-ports { 40000; range 50000 60000; };
- cleaning-interval
@@ -5509,7 +5509,7 @@ avoid-v6-udp-ports { 40000; range 50000 60000; };
BIND 9 provides the ability to filter out DNS responses from external DNS servers containing @@ -5632,7 +5632,7 @@ deny-answer-aliases { "example.net"; };
BIND 9 includes an intentionally limited mechanism to modify DNS responses for recursive requests @@ -6068,7 +6068,7 @@ ns.domain.com.rpz-nsdname CNAME .
The statistics-channels statement @@ -6128,7 +6128,7 @@ ns.domain.com.rpz-nsdname CNAME .
The trusted-keys statement defines @@ -6168,7 +6168,7 @@ ns.domain.com.rpz-nsdname CNAME .
managed-keys {string
initial-keynumber
number
number
string
; [string
initial-keynumber
number
number
string
; [...]] @@ -6303,7 +6303,7 @@ ns.domain.com.rpz-nsdname CNAME .The view statement is a powerful feature @@ -6604,10 +6604,10 @@ zone
zone_name
[
@@ -6887,7 +6887,7 @@ zone zone_name
[The zone's name may optionally be followed by a class. If a class is not specified, class
IN
(forInternet
), @@ -6909,7 +6909,7 @@ zonezone_name
[
- allow-notify
@@ -7820,7 +7820,7 @@ example.com. NS ns2.example.net.
@@ -7833,7 +7833,7 @@ example.com. NS ns2.example.net.A domain name identifies a node. Each node has a set of resource information, which may be empty. The set of resource @@ -8570,7 +8570,7 @@ example.com. NS ns2.example.net.
RRs are represented in binary form in the packets of the DNS protocol, and are usually represented in highly encoded form @@ -8773,7 +8773,7 @@ example.com. NS ns2.example.net.
As described above, domain servers store information as a series of resource records, each of which contains a particular @@ -9029,7 +9029,7 @@ example.com. NS ns2.example.net.
Reverse name resolution (that is, translation from IP address to name) is achieved by means of the in-addr.arpa domain @@ -9090,7 +9090,7 @@ example.com. NS ns2.example.net.
The Master File Format was initially defined in RFC 1035 and has subsequently been extended. While the Master File Format @@ -9105,7 +9105,7 @@ example.com. NS ns2.example.net.
When used in the label (or name) field, the asperand or at-sign (@) symbol represents the current origin. @@ -9116,7 +9116,7 @@ example.com. NS ns2.example.net.
Syntax: $ORIGIN
domain-name
@@ -9145,7 +9145,7 @@ WWW.EXAMPLE.COM. CNAME MAIN-SERVER.EXAMPLE.COM.Syntax: $INCLUDE
filename
@@ -9181,7 +9181,7 @@ WWW.EXAMPLE.COM. CNAME MAIN-SERVER.EXAMPLE.COM.Syntax: $TTL
default-ttl
@@ -9200,7 +9200,7 @@ WWW.EXAMPLE.COM. CNAME MAIN-SERVER.EXAMPLE.COM.Syntax: $GENERATE
range
@@ -9624,7 +9624,7 @@ HOST-127.EXAMPLE. MX 0 .
@@ -10181,7 +10181,7 @@ HOST-127.EXAMPLE. MX 0 .
@@ -10335,7 +10335,7 @@ HOST-127.EXAMPLE. MX 0 .
@@ -10718,7 +10718,7 @@ HOST-127.EXAMPLE. MX 0 . Socket I/O statistics counters are defined per socket types, which are @@ -10873,7 +10873,7 @@ HOST-127.EXAMPLE. MX 0 .
Most statistics counters that were available in BIND 8 are also supported in diff --git a/doc/arm/Bv9ARM.ch07.html b/doc/arm/Bv9ARM.ch07.html index 6d664f879c..b953dca059 100644 --- a/doc/arm/Bv9ARM.ch07.html +++ b/doc/arm/Bv9ARM.ch07.html @@ -14,7 +14,7 @@ - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR - PERFORMANCE OF THIS SOFTWARE. --> - +
@@ -46,10 +46,10 @@Table of Contents
@@ -121,7 +121,7 @@ zone "example.com" {On UNIX servers, it is possible to run BIND @@ -147,7 +147,7 @@ zone "example.com" {
In order for a chroot environment to @@ -175,7 +175,7 @@ zone "example.com" {
Prior to running the named daemon, use diff --git a/doc/arm/Bv9ARM.ch08.html b/doc/arm/Bv9ARM.ch08.html index ef91977b58..fb81e2f706 100644 --- a/doc/arm/Bv9ARM.ch08.html +++ b/doc/arm/Bv9ARM.ch08.html @@ -14,7 +14,7 @@ - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR - PERFORMANCE OF THIS SOFTWARE. --> - +
@@ -45,18 +45,18 @@Table of Contents
The best solution to solving installation and configuration issues is to take preventative measures by setting @@ -68,7 +68,7 @@
Zone serial numbers are just numbers — they aren't date related. A lot of people set them to a number that @@ -95,7 +95,7 @@
The Internet Systems Consortium (ISC) offers a wide range diff --git a/doc/arm/Bv9ARM.ch09.html b/doc/arm/Bv9ARM.ch09.html index 491ce9f439..f68b2b19b8 100644 --- a/doc/arm/Bv9ARM.ch09.html +++ b/doc/arm/Bv9ARM.ch09.html @@ -14,7 +14,7 @@ - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR - PERFORMANCE OF THIS SOFTWARE. --> - +
@@ -45,31 +45,31 @@Table of Contents
@@ -278,42 +278,42 @@Standards
-[RFC974] Mail Routing and the Domain System. January 1986.
+[RFC974] Mail Routing and the Domain System. January 1986.
Proposed Standards
-[RFC1995] Incremental Zone Transfer in DNS. August 1996.
+[RFC1995] Incremental Zone Transfer in DNS. August 1996.
-[RFC1996] A Mechanism for Prompt Notification of Zone Changes. August 1996.
+[RFC1996] A Mechanism for Prompt Notification of Zone Changes. August 1996.
-[RFC2136] Dynamic Updates in the Domain Name System. April 1997.
+[RFC2136] Dynamic Updates in the Domain Name System. April 1997.
-[RFC2671] Extension Mechanisms for DNS (EDNS0). August 1997.
+[RFC2671] Extension Mechanisms for DNS (EDNS0). August 1997.
-[RFC2672] Non-Terminal DNS Name Redirection. August 1999.
+[RFC2672] Non-Terminal DNS Name Redirection. August 1999.
-[RFC2845] Secret Key Transaction Authentication for DNS (TSIG). May 2000.
+[RFC2845] Secret Key Transaction Authentication for DNS (TSIG). May 2000.
-[RFC2930] Secret Key Establishment for DNS (TKEY RR). September 2000.
+[RFC2930] Secret Key Establishment for DNS (TKEY RR). September 2000.
-[RFC2931] DNS Request and Transaction Signatures (SIG(0)s). September 2000.
+[RFC2931] DNS Request and Transaction Signatures (SIG(0)s). September 2000.
-[RFC3007] Secure Domain Name System (DNS) Dynamic Update. November 2000.
+[RFC3007] Secure Domain Name System (DNS) Dynamic Update. November 2000.
-@@ -322,19 +322,19 @@[RFC3645] Generic Security Service Algorithm for Secret +
[RFC3645] Generic Security Service Algorithm for Secret Key Transaction Authentication for DNS (GSS-TSIG). October 2003.
DNS Security Proposed Standards
-[RFC3225] Indicating Resolver Support of DNSSEC. December 2001.
+[RFC3225] Indicating Resolver Support of DNSSEC. December 2001.
-[RFC3833] Threat Analysis of the Domain Name System (DNS). August 2004.
+[RFC3833] Threat Analysis of the Domain Name System (DNS). August 2004.
-[RFC4033] DNS Security Introduction and Requirements. March 2005.
+[RFC4033] DNS Security Introduction and Requirements. March 2005.
-[RFC4034] Resource Records for the DNS Security Extensions. March 2005.
+[RFC4034] Resource Records for the DNS Security Extensions. March 2005.
-@@ -342,146 +342,146 @@[RFC4035] Protocol Modifications for the DNS +
[RFC4035] Protocol Modifications for the DNS Security Extensions. March 2005.
Other Important RFCs About DNS Implementation
-[RFC1535] A Security Problem and Proposed Correction With Widely +
[RFC1535] A Security Problem and Proposed Correction With Widely Deployed DNS Software.. October 1993.
-[RFC1536] Common DNS Implementation +
[RFC1536] Common DNS Implementation Errors and Suggested Fixes. October 1993.
-[RFC4074] Common Misbehaviour Against DNS +
[RFC4074] Common Misbehaviour Against DNS Queries for IPv6 Addresses. May 2005.
Resource Record Types
-[RFC1706] DNS NSAP Resource Records. October 1994.
+[RFC1706] DNS NSAP Resource Records. October 1994.
-[RFC2168] Resolution of Uniform Resource Identifiers using +
[RFC2168] Resolution of Uniform Resource Identifiers using the Domain Name System. June 1997.
-[RFC1876] A Means for Expressing Location Information in the +
[RFC1876] A Means for Expressing Location Information in the Domain Name System. January 1996.
-[RFC2052] A DNS RR for Specifying the +
[RFC2052] A DNS RR for Specifying the Location of Services.. October 1996.
-[RFC2163] Using the Internet DNS to +
[RFC2163] Using the Internet DNS to Distribute MIXER Conformant Global Address Mapping. January 1998.
-[RFC2230] Key Exchange Delegation Record for the DNS. October 1997.
+[RFC2230] Key Exchange Delegation Record for the DNS. October 1997.
-[RFC2536] DSA KEYs and SIGs in the Domain Name System (DNS). March 1999.
+[RFC2536] DSA KEYs and SIGs in the Domain Name System (DNS). March 1999.
-[RFC2537] RSA/MD5 KEYs and SIGs in the Domain Name System (DNS). March 1999.
+[RFC2537] RSA/MD5 KEYs and SIGs in the Domain Name System (DNS). March 1999.
-[RFC2538] Storing Certificates in the Domain Name System (DNS). March 1999.
+[RFC2538] Storing Certificates in the Domain Name System (DNS). March 1999.
-[RFC2539] Storage of Diffie-Hellman Keys in the Domain Name System (DNS). March 1999.
+[RFC2539] Storage of Diffie-Hellman Keys in the Domain Name System (DNS). March 1999.
-[RFC2540] Detached Domain Name System (DNS) Information. March 1999.
+[RFC2540] Detached Domain Name System (DNS) Information. March 1999.
-[RFC2782] A DNS RR for specifying the location of services (DNS SRV). February 2000.
+[RFC2782] A DNS RR for specifying the location of services (DNS SRV). February 2000.
-[RFC2915] The Naming Authority Pointer (NAPTR) DNS Resource Record. September 2000.
+[RFC2915] The Naming Authority Pointer (NAPTR) DNS Resource Record. September 2000.
-[RFC3110] RSA/SHA-1 SIGs and RSA KEYs in the Domain Name System (DNS). May 2001.
+[RFC3110] RSA/SHA-1 SIGs and RSA KEYs in the Domain Name System (DNS). May 2001.
-[RFC3123] A DNS RR Type for Lists of Address Prefixes (APL RR). June 2001.
+[RFC3123] A DNS RR Type for Lists of Address Prefixes (APL RR). June 2001.
DNS and the Internet
-[RFC1101] DNS Encoding of Network Names +
[RFC1101] DNS Encoding of Network Names and Other Types. April 1989.
-[RFC1123] Requirements for Internet Hosts - Application and +
[RFC1123] Requirements for Internet Hosts - Application and Support. October 1989.
-[RFC1591] Domain Name System Structure and Delegation. March 1994.
+[RFC1591] Domain Name System Structure and Delegation. March 1994.
-[RFC2317] Classless IN-ADDR.ARPA Delegation. March 1998.
+[RFC2317] Classless IN-ADDR.ARPA Delegation. March 1998.
DNS Operations
-[RFC1033] Domain administrators operations guide.. November 1987.
+[RFC1033] Domain administrators operations guide.. November 1987.
-[RFC1912] Common DNS Operational and +
[RFC1912] Common DNS Operational and Configuration Errors. February 1996.
Internationalized Domain Names
-[RFC2825] A Tangled Web: Issues of I18N, Domain Names, +
[RFC2825] A Tangled Web: Issues of I18N, Domain Names, and the Other Internet protocols. May 2000.
-@@ -497,47 +497,47 @@[RFC3490] Internationalizing Domain Names in Applications (IDNA). March 2003.
+[RFC3490] Internationalizing Domain Names in Applications (IDNA). March 2003.
-[RFC1464] Using the Domain Name System To Store Arbitrary String +
[RFC1464] Using the Domain Name System To Store Arbitrary String Attributes. May 1993.
-[RFC1713] Tools for DNS Debugging. November 1994.
+[RFC1713] Tools for DNS Debugging. November 1994.
-[RFC2240] A Legal Basis for Domain Name Allocation. November 1997.
+[RFC2240] A Legal Basis for Domain Name Allocation. November 1997.
-[RFC2345] Domain Names and Company Name Retrieval. May 1998.
+[RFC2345] Domain Names and Company Name Retrieval. May 1998.
-[RFC2352] A Convention For Using Legal Names as Domain Names. May 1998.
+[RFC2352] A Convention For Using Legal Names as Domain Names. May 1998.
-[RFC3071] Reflections on the DNS, RFC 1591, and Categories of Domains. February 2001.
+[RFC3071] Reflections on the DNS, RFC 1591, and Categories of Domains. February 2001.
-[RFC3258] Distributing Authoritative Name Servers via +
[RFC3258] Distributing Authoritative Name Servers via Shared Unicast Addresses. April 2002.
-[RFC3901] DNS IPv6 Transport Operational Guidelines. September 2004.
+[RFC3901] DNS IPv6 Transport Operational Guidelines. September 2004.
@@ -551,39 +551,39 @@Obsolete and Unimplemented Experimental RFC
-[RFC1712] DNS Encoding of Geographical +
[RFC1712] DNS Encoding of Geographical Location. November 1994.
-[RFC2065] Domain Name System Security Extensions. January 1997.
+[RFC2065] Domain Name System Security Extensions. January 1997.
-[RFC2137] Secure Domain Name System Dynamic Update. April 1997.
+[RFC2137] Secure Domain Name System Dynamic Update. April 1997.
-[RFC2535] Domain Name System Security Extensions. March 1999.
+[RFC2535] Domain Name System Security Extensions. March 1999.
-[RFC3008] Domain Name System Security (DNSSEC) +
[RFC3008] Domain Name System Security (DNSSEC) Signing Authority. November 2000.
-[RFC3090] DNS Security Extension Clarification on Zone Status. March 2001.
+[RFC3090] DNS Security Extension Clarification on Zone Status. March 2001.
-[RFC3445] Limiting the Scope of the KEY Resource Record (RR). December 2002.
+[RFC3445] Limiting the Scope of the KEY Resource Record (RR). December 2002.
-[RFC3655] Redefinition of DNS Authenticated Data (AD) bit. November 2003.
+[RFC3655] Redefinition of DNS Authenticated Data (AD) bit. November 2003.
-[RFC3658] Delegation Signer (DS) Resource Record (RR). December 2003.
+[RFC3658] Delegation Signer (DS) Resource Record (RR). December 2003.
-[RFC3755] Legacy Resolver Compatibility for Delegation Signer (DS). May 2004.
+[RFC3755] Legacy Resolver Compatibility for Delegation Signer (DS). May 2004.
-[RFC3757] Domain Name System KEY (DNSKEY) Resource Record +
[RFC3757] Domain Name System KEY (DNSKEY) Resource Record (RR) Secure Entry Point (SEP) Flag. April 2004.
-@@ -604,14 +604,14 @@[RFC3845] DNS Security (DNSSEC) NextSECure (NSEC) RDATA Format. August 2004.
+[RFC3845] DNS Security (DNSSEC) NextSECure (NSEC) RDATA Format. August 2004.
-@@ -648,7 +648,7 @@DNS and BIND. Copyright © 1998 Sebastopol, CA: O'Reilly and Associates.
+DNS and BIND. Copyright © 1998 Sebastopol, CA: O'Reilly and Associates.
GNU make is required to build the export libraries (other part of BIND 9 can still be built with other types of make). In the reminder of this document, "make" means GNU make. Note that @@ -657,7 +657,7 @@
$./configure --enable-exportlib
$[other flags]
make
@@ -672,7 +672,7 @@ $make
$cd lib/export
$make install
@@ -694,7 +694,7 @@ $make install
Currently, win32 is not supported for the export library. (Normal BIND 9 application can be built as @@ -734,7 +734,7 @@ $
make
The IRS library supports an "advanced" configuration file related to the DNS library for configuration parameters that would be beyond the capability of the @@ -752,14 +752,14 @@ $
make
Some sample application programs using this API are provided for reference. The following is a brief description of these applications.
It sends a query of a given name (of a given optional RR type) to a specified recursive server, and prints the result as a list of @@ -823,7 +823,7 @@ $
make
Similar to "sample", but accepts a list of (query) domain names as a separate file and resolves the names @@ -864,7 +864,7 @@ $
make
It sends a query to a specified server, and prints the response with minimal processing. It doesn't act as a @@ -905,7 +905,7 @@ $
make
This is a test program to check getaddrinfo() and getnameinfo() behavior. It takes a @@ -922,7 +922,7 @@ $
make
It accepts a single update command as a command-line argument, sends an update request message to the @@ -1017,7 +1017,7 @@ $
sample-update -a sample-update -k Kxxx.+nnn+mm
It checks a set of domains to see the name servers of the domains behave @@ -1074,7 +1074,7 @@ $
sample-update -a sample-update -k Kxxx.+nnn+mm
As of this writing, there is no formal "manual" of the libraries, except this document, header files (some of them provide pretty detailed explanations), and sample application diff --git a/doc/arm/Bv9ARM.ch10.html b/doc/arm/Bv9ARM.ch10.html index 2af5d90bb4..1484ecf469 100644 --- a/doc/arm/Bv9ARM.ch10.html +++ b/doc/arm/Bv9ARM.ch10.html @@ -14,7 +14,7 @@ - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR - PERFORMANCE OF THIS SOFTWARE. --> - +
diff --git a/doc/arm/Bv9ARM.html b/doc/arm/Bv9ARM.html index 842d1422eb..9181c27e92 100644 --- a/doc/arm/Bv9ARM.html +++ b/doc/arm/Bv9ARM.html @@ -14,7 +14,7 @@ - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR - PERFORMANCE OF THIS SOFTWARE. --> - + @@ -40,7 +40,7 @@@@ -51,39 +51,39 @@Copyright © 2004-2012 Internet Systems Consortium, Inc. ("ISC")
Copyright © 2000-2003 Internet Software Consortium.
- 1. Introduction
- 2. BIND Resource Requirements
- 3. Name Server Configuration
- 4. Advanced DNS Features
@@ -92,64 +92,64 @@- Dynamic Update
- Incremental Zone Transfers (IXFR)
-- Split DNS
-- +
- Split DNS
+- TSIG
- -
-
- Generate Shared Keys for Each Pair of Hosts
-- Copying the Shared Secret to Both Machines
-- Informing the Servers of the Key's Existence
-- Instructing the Server to Use the Key
-- TSIG Key Based Access Control
-- Errors
+- Generate Shared Keys for Each Pair of Hosts
+- Copying the Shared Secret to Both Machines
+- Informing the Servers of the Key's Existence
+- Instructing the Server to Use the Key
+- TSIG Key Based Access Control
+- Errors
- TKEY
-- SIG(0)
+- TKEY
+- SIG(0)
- DNSSEC
- DNSSEC, Dynamic Zones, and Automatic Signing
-
- Converting from insecure to secure
-- Dynamic DNS update method
-- Fully automatic zone signing
-- Private-type records
-- DNSKEY rollovers
-- Dynamic DNS update method
-- Automatic key rollovers
-- NSEC3PARAM rollovers via UPDATE
-- Converting from NSEC to NSEC3
-- Converting from NSEC3 to NSEC
-- Converting from secure to insecure
-- Periodic re-signing
-- NSEC3 and OPTOUT
+- Converting from insecure to secure
+- Dynamic DNS update method
+- Fully automatic zone signing
+- Private-type records
+- DNSKEY rollovers
+- Dynamic DNS update method
+- Automatic key rollovers
+- NSEC3PARAM rollovers via UPDATE
+- Converting from NSEC to NSEC3
+- Converting from NSEC3 to NSEC
+- Converting from secure to insecure
+- Periodic re-signing
+- NSEC3 and OPTOUT
- Dynamic Trust Anchor Management
- PKCS #11 (Cryptoki) support
- -
-
- Prerequisites
-- Building BIND 9 with PKCS#11
-- PKCS #11 Tools
-- Using the HSM
-- Specifying the engine on the command line
-- Running named with automatic zone re-signing
+- Prerequisites
+- Building BIND 9 with PKCS#11
+- PKCS #11 Tools
+- Using the HSM
+- Specifying the engine on the command line
+- Running named with automatic zone re-signing
- IPv6 Support in BIND 9
+- IPv6 Support in BIND 9
5. The BIND 9 Lightweight Resolver 6. BIND 9 Configuration Reference @@ -157,58 +157,58 @@Configuration File Elements Configuration File Grammar - -
- acl Statement Grammar
+- acl Statement Grammar
- acl Statement Definition and Usage
-- controls Statement Grammar
+- controls Statement Grammar
- controls Statement Definition and Usage
-- include Statement Grammar
-- include Statement Definition and +
- include Statement Grammar
+- include Statement Definition and Usage
-- key Statement Grammar
-- key Statement Definition and Usage
-- logging Statement Grammar
-- logging Statement Definition and +
- key Statement Grammar
+- key Statement Definition and Usage
+- logging Statement Grammar
+- logging Statement Definition and Usage
-- lwres Statement Grammar
-- lwres Statement Definition and Usage
-- masters Statement Grammar
-- masters Statement Definition and +
- lwres Statement Grammar
+- lwres Statement Definition and Usage
+- masters Statement Grammar
+- masters Statement Definition and Usage
-- options Statement Grammar
+- options Statement Grammar
- options Statement Definition and Usage
- server Statement Grammar
- server Statement Definition and Usage
- statistics-channels Statement Grammar
-- statistics-channels Statement Definition and +
- statistics-channels Statement Definition and Usage
- trusted-keys Statement Grammar
-- trusted-keys Statement Definition +
- trusted-keys Statement Definition and Usage
-- managed-keys Statement Grammar
+- managed-keys Statement Grammar
- managed-keys Statement Definition and Usage
- view Statement Grammar
-- view Statement Definition and Usage
+- view Statement Definition and Usage
- zone Statement Grammar
-- zone Statement Definition and Usage
+- zone Statement Definition and Usage
Zone File +Zone File
- Types of Resource Records and When to Use Them
-- Discussion of MX Records
+- Discussion of MX Records
- Setting TTLs
-- Inverse Mapping in IPv4
-- Other Zone File Directives
-- BIND Master File Extension: the $GENERATE Directive
+- Inverse Mapping in IPv4
+- Other Zone File Directives
+- BIND Master File Extension: the $GENERATE Directive
- Additional File Formats
BIND9 Statistics @@ -217,41 +217,41 @@7. BIND 9 Security Considerations 8. Troubleshooting A. Appendices I. Manual pages diff --git a/doc/arm/Bv9ARM.pdf b/doc/arm/Bv9ARM.pdf old mode 100755 new mode 100644 index 5a46f2bc32..542628937f --- a/doc/arm/Bv9ARM.pdf +++ b/doc/arm/Bv9ARM.pdf @@ -2510,8 +2510,8 @@ x6$a êœqNLžYç<'\_³È¾já6Vü„×›êªè†ˆâ¶3ŒØ»*䉘øL&c1L R&‘00LPç#&,#LQ0á“~$q7“¢ºŠ/ös¡å³¤bŸ±d€!†TÁ!†ê|ÄÚ)¢â"à ¯«^lÊŸõ¬æŒ.>ãÉ8C'¨(‚S$'ÔyÀIåœäJ†r¥/X:œN6íMÝ,[;ã¹/wÊ•²¹/›þž”íc]²–Š4DØREL"AwΔ$Y–å3e(1JuÉP™Xžo–«¢y~y[Øâµ±9|¯†¨d €!F¡ Fê|¤@’©L ¸£àⶸ<(nöçNñ9.|ê’¹ †P„‹H¨ó‘¥‰V¹ \ÏE[·íÍ#24Í5DÈZ2ÀCª‚ Cu>ÖR¥ÙXC(WCœ‹›eu=Y=Ãö®Øœ$Ä'1™`ˆE’Ó„DÂÀAƒ†àDj>–*”¯ëæ?E¿À~Õ£"¿“ùË×¼Ÿøì%£14 :‘004PçãàÁ)ZŽu†vƒGl¶ÖÑßnnÛåÝûʇú¶›üæB?÷™‡OW2Àcʰ caÇ9Ü9ö›Þ2ÏH&lÃDxØÊ~yþî•Ó¸\×›fá/ÿ½Y6åÊoŒG³ÎøÔ-nh€lqoEª&³Ï†dg×ilcAÚ4i!ÜZuØâþÁ žnuÙŽ»õC–æF~Ы+ä8õꂆÈÕµ¥!ÂM$ŒÔyà'D ™;~üæöéûð‚‚¸dÔÓòyNfbA†"a`¡ÎCÚÞ¡…v+ßaÛûm¹ªýbÐ.F2—pžŽOn28ÀЇ€ uÀ‘9¸[{Ø\ã Çç]»Û:,;ŸU÷Pu5´KôßY¯7]Å÷{jâúµÚ#B²’A †P„H¨ó ‚È÷ͼ_)èõ6wwuÓúf™ŸîʦhÃÒÁÐÑ/†‹ ¢Ïd2%À£*¥§)‰„Q²ã<:`vHuî–³†™@|°8«Ÿ)å×›¦@»]Ã)Ÿ< ØT †šM§ œ KÏŽÓèEDí•CM6¤gìv-VaBü(-ÝHIõá6ü”ëÊ'7ùº†ØuÅC€‰„ƒ:«-"§D2*=9¡çèÄa3¬ØÎëêö!¾lkÓ®ó½"ä,hˆ ±¥É4±0 pç#™!Âþ€ðÝE'nm« åBIñìz˜Cz’µ†˜ö0ýˆö‘00íQçþ.b‹v™{ÆD„?×…«Â^·Eµè«0ÃÕ¡èKYòùNf b,A=Í4K‘00–Pç%% cÊW$߹꾯Jäóyç7ºûøÌ&S1j rù45‘00jPçãÝGrBYæËÊ‘ËãœÕõÛôùT7áyŠáà/ÇJ-}³A{SNÝ•úžØ¢\u툜}g·ŸŸdñ!&>Ì?"~$L|ÔyØÜþ‘å|?l -¿Z×U½n—÷Ð̈ƒ2fûHBÎ’ †PˆH¨ó–Ãi€ð-g'W«eµ\· hGPü.6¶¾Šþ>EÉúCL(¢$LÔùx7 Šdœ‡""ÌE.–×U1\üìP†~IÜÍ)“ýD’¼ÝFHÚ9ß×1Ý’‹CiÇ{lýA¨É¥ëbÖO®îítÆ/1Y•E»iÊõd¦ÂÉ>³r2 "+‡;çí34½O‡df×k¬Pç%yΆ^†¥Ãwu»üdgööJÝ£§G¾ÕŒ0àÅH½¡!r n‰‰# õHSÆëÂæW^=TÅÊ—uﮊÖÞÍM¦ýß¹<'34Úa1‚vƒÀ Â\‡r€KM²\fž qrèg{ÿª7-ücÓ”w»æÀÍÓ¸ñéMbä@ùØôb,ŒÔ{|„$:×® ëQçÕblMñàtN†=jŠjý)´›vãŸÿõõ‡ái|gÏœIT|6“Q†*P-•H*¨÷€ŠoTn|Eä[S.în—-,>ÔB¿åpäeHfbŒA™1Æ"q`Œ¡ÞÇ{£Ä¦/÷…{ÙÙ/`Ó~ý˜¹îoe»¹ëJ$±Ïpøô%Ã18´êuÛ?ö©¿®Ë ÏN²öÀÓfŸÓií#q`Ú£ÞÃÚ:ËìŠ*>j6[N6m½*Â^‹ƒaxÏÞ—ß§'Y|`ˆ‰Ó‰‰õ>Нíä™f@{¿¯ò¶¨6~…όگße(YþÑSä7L{Ìõ8æ+J¨ï6ì´÷{*§õÝCh°ûçÇþ‹ÒM˜]YÚÖ®5¨ö[ïoûŽÁ®_ñø>7ɪCLv˜{L÷H˜ð¨÷Qy‘‘ÜV’Ayÿ¢¨óÊÞÇWíác¶þn>µUÀÜgg¿,×mYuObfL}gšû¬$k1ÍaÖ1Í#q`š£ÞG͹"Æ·všË ùºmŽÍQ÷Jè á·/ðÐhè¦#úù,k…l%³ 1 |ú=¤±80Pï#LŒÉ€‚)Ç0¯Šžá5µ'‹E¹^‡gÚáÁ«¾BÐÏ»á.¨æò–Åh‡1TÁØ #s=AѾӯ#¿iá¬TÆþÃëež|Ú“†QPV©HS¨w¿ver¢Xækí—®~<û[׬#KW_m‰Ô+‘J°C ƒ:#ŒE‚@C]{²ŒHßh§³~wæüM·3G‡m9Iób_m@󊤒ìÒ Þ|úm¨‘ °us=¾ÓŸîÞEŒïWywqqvj':ûñ Ì7ƒÊ%?•©ÑA -‹µÁPá_ù™óœ˜ØûÆ»Õõ Î…~‰‰&Áº"15s_êb["_ø3yoÿ>ªendstream +¿Z×U½n—÷Ð̈ƒ2fûHBÎ’ †PˆH¨ó–Ãi€ð-g'W«eµ\· hGPü.6¶¾Šþ>EÉúCL(¢$LÔùx7 Šdœ‡""ÌE.–×U1\üìP†~IÜÍ)“ýD’¼ÝFHÚ9ß×1ÝI‹CiÇ{lýA¨É¥ëbÖO®îítÆ/1Y•E»iÊõd¦ÂÉ>³r2 "+‡;çí34½O‡df×k¬Pç%yΆ^†¥Ãwu»üdgööJÝ£§G¾ÕŒ0àÅH½¡!r n‰‰# õHSÆëÂæW^=TÅÊ—uﮊÖÞÍM¦ýß¹<'34Úa1‚vƒÀ Â\‡r€KM²\fž qrèg{ÿª7-ücÓ”w»æÀÍÓ¸ñéMbä@ùØôb,ŒÔ{|„$:×® ëQçÕblMñàtN†=jŠjý)´›vãŸÿõõ‡ái|gÏœIT|6“Q†*P-•H*¨÷€ŠoTn|Eä[S.în—-,>ÔB¿åpäeHfbŒA™1Æ"q`Œ¡ÞÇ{£Ä¦/÷…{ÙÙ/`Ó~ý˜¹îoe»¹ëJ$±Ïpøô%Ã18 ´êuÛ?ö©¿®Ë ÏN²öÀÓfŸÓií#q`Ú£ÞÃÚ:ËìŠ*>j6[N6m½*Â^‹ƒaxÏÞ—ß§'Y|`ˆ‰Ó‰‰õ>Нíä™f@{¿¯ò¶¨6~…όگße(YþÑSä7L{Ìõ8æ+J¨ï6ì´÷{*§õÝCh°ûçÇþ‹ÒM˜]YÚÖ®5¨ö[ïoûŽÁ®_ñø>7ɪCLv˜{L÷H˜ð¨÷Qy‘‘ÜV’Ayÿ¢¨óÊÞÇWíác¶þn>µUÀÜgg¿,×mYuObfL}gšû¬$k1ÍaÖ1Í#q`š£ÞG͹"Æ·všË ùºmŽÍQ÷Jè á·/ðÐhè¦#úù,k…l%³ 1 |ú=¤±80Pï#LŒÉ€‚)Ç0¯Šžá5µ'‹E¹^‡gÚáÁ«¾BÐÏ»á.¨æò–Åh‡1TÁØ #s=AѾӯ#¿iá¬TÆþÃëež|Ú“†QPV©HS¨w¿ver¢Xækí—®~<û[׬#KW_m‰Ô+‘J°C ƒ:#ŒE‚@C]{²ŒHßh§³~wæüM·3G‡m9Iób_m@󊤒ìÒ Þ|úm¨‘ °us=¾ÓŸîÞEŒïWywqqvj':ûñ Ì7ƒÊ%?•©ÑA +‹µÁPá_ù™óœ˜ØûÆ»Õõ Î…~‰‰&Áº"15s_êb["_ø3yoÿgTªendstream endobj 966 0 obj << /Type /Page @@ -2734,7 +2734,7 @@ endobj 1000 0 obj << /Type /Annot /Border[0 0 0]/H/I/C[1 0 0] -/Rect [527.6238 304.567 539.579 313.6728] +/Rect [527.6238 304.6667 539.579 313.6728] /Subtype /Link /A << /S /GoTo /D (subsection.3.3.2) >> >> endobj @@ -4188,10 +4188,10 @@ stream xÚíÙÍOÛ0 ð{þŠé!ÆÏß¾2Á$L¹1QS>&šv-ÝöçÏ!µkV硈öÂ"„Ÿß³ßOi’BNÝäFÊȵDRùtžÑüÞ½÷9ƒí˜Â*âQgevzÁun‰ULåå]4—!ÔÈËúæäÓ—«òüª¼žÜ–—Ùy&åíŒ?³›[š×.ÿeF ·Fæ¿Ý?”€µ,ŸgBr"çþ•§ì:û&ŒÞ} M-DrC¤a:±Æ¢•XwhÜTZZ¢8ã/+9#À&…àö¤©æ³ºø±Ø¬šêi¹zlžÝëJI!)ý˜„µïÿ§ù’q·¯Fï6x¯[«û¼;ø÷ÏÇqà~ÿöçoŠïâA¤ Áø 顉Ò<¾å³Þ,ëêyæ6G‹æè®Þâå0˜WˆñŠJôóJ‚ñBÓ^\ÍÀz^¢ãµjê©;ó¿Ó:´·¼ùŽöbÞ⎃2ýÞ…`ÞÐôÁ›+C+e¼7Ù¦?½eŒXmŠvPK‘LÍ]7òÕ¬ ÚÉôvähô }§;Œ1‡±P¶ßa¢Ì!š>8 @y‡jwÞ+Zl÷³fRpàã9î°¨ü¶Fb¨â¶‚†~T‰B0ThzJ¹#•ð¨t‡ª®›õ•QzÔtMa¿‡jŠM¯ú ºÿÊ?U¢ O4M,…pãh:MÕjYµ7“‚©ñJ옟€¡ƒyE¯¸Á û¯üS…`¼Ðô—–Ä -n,mÇË£VUS/æíÇŸ}–ßúÁ°¢@VÜZвV¢š>ÀRœXKý-%£¬Çõ´x˜WÓâ;¥ìÏfé|YEH”ßóÁ¢¢@LTÜSTT¢Lš>ˆ’ŒP.ýM#ÿl6åÕúaRXÎÇSÕQ`ù+ -Ä`Åúa% +n,mÇË£VUS/æíÇŸ}–ßúÁ°¢@VÜZвV¢š>ÀRœXKý-%£¬Çõ´x˜WÓâ;¥ìÏfé|YEH”ßóÁ¢¢@LTÜSЪ_T¢Lš>ˆ’ŒP.ýM#ÿl6åÕúaRXÎÇSÕQ`ù+ +Ä`ÅEa% Ùƒžß -QÔÅ%á»_ VJxÿ»¯5„&Ü–^.§Æ1W:ç’´sµ‹ýÕ»Ôí ¨ò¿ã|ì–endstream +QÔÅ%á»_ VJxÿ»¯5„&Ü–^.§Æ1W:ç’´sµ‹ýÕ»Ôí ¨ò¿æìì—endstream endobj 1210 0 obj << /Type /Page @@ -4856,25 +4856,20 @@ endobj /ProcSet [ /PDF /Text ] >> endobj 1330 0 obj << -/Length 3160 +/Length 3231 /Filter /FlateDecode >> stream -xÚÕZK“ã6¾÷¯ð-">$е§Ùd&Û©Ú™dº÷U“9ȶl+‘¥Ž%wO§òã H‰zXž©ì%åƒ) -$ø€b‹~l‘DA(´\(-ƒ(dÑbs¼ {x÷Ý ³4+G´ò©þöpóõ¡:Ð1;o®$“„-¶–ßüýÕ¯ßß®x.Ep»ŠâpùöÕ?^SÏ=¼Š¢å¿Å7ïÞ¾¹ûîŸï_Ý*¹|¸{÷öv¥B-aäõ±ï~xÝ»¿ýøðýÍë‡V -_R -á×›ÃÅþþ&„N¢Å3<„Óš/Ž72A$…p=ÅÍýÍí„Þ[3tJs‘H‚(ájBuœ{ªc‚I,’…Št.Œî¶/ezÌ7·+Éøòü¸M›¬¦‡ç¼(°%–eE=EUî³µ×ýŸnY²Ìvç:Û‚ò”VË»½i–ä·ªÌh¢CjçÞR˜jKi¹íF€Foæñ-b„±a‘ßüÓÎ,¹Úªã -É+G±b,ÐQÄI°|‡t»ì”•‰&öÉ€'<²WM^•·+©e^ã¼Ìí3H÷h%Y´}F<$ú¹:ŸÊ´ ޟµIH²¶=¤ß-u6u’a È6 u‘zLXíÀ†[¾{⢒aÊÓsnxF›E˜Ã16hC°e6vC숴|¡Fö)¯›¼ÜÓS+)>8I±M’bkm{H¨cõ„f1ðJØ©*Œ¥Ô¤U·D+ʵL|£¡-ãv*TEýR‚=Ça¸ü°ÚYZ~´OdQäã ¸úDØ*‘ˆz‹p$‰Ò–hjš(ÐJÅ–`S¤u=1ˆÀÿ¢ès§yʳç)fD [ˆèãÇCõ -¦ -Ì©·%©·ç"‚Ižôô{oô½âÚ)þ“ßC£5|pæ‚í]u¢FJ„A·l¹!gšô=2p°o)Éq¤°Ç´n—°Më Žkf ÈŒp”?q.É&°EÓ´ŽïãÃý˜mrœÊ¸„ˆU7Eçî0¶uwolZÔµ†N ª·"ѹugñµï—¹uË>Ö‰Kë¤Îçp˜¥OiI;öiÎýâxá,¹â>Ùel©P°²jòÝË„K8‚¤`bwj“ÇQ à4×fK5ÖfÏ߸‚ƒ^ʨ¯Î÷YቛúöÝÃÝ›ÿRû˜Õuºw{o¼j„ó3ÛÏa ëkÛï‘Íl¿£B~OÙ¦*wù~´t¤Ç×–vTã¥ûñœú -˜é-ý>+ªU%b«h 7èCûó)%WÇÎöü‚¶‰@°Ñ .ÁLÃx:ŸÐËõ¹¡Îme©*ÛA~× ÷N;‡¿jmã–]ò>ÎeOÆÁµ¦s[@}¡žCú”QŸ=¯ç$„8¦¦÷;‰Ø× -õ¦Ô±;tŒ-.x ±Ú]4âŒã&ˆ#U;²çƒãÃ?°˜c)¥Ç‚°iŸQoy>®‰ÁdYíH<†ÈÀ¿’¼³M -±˜ÅÈÆbÞS•oëé—Yf¦©\(gŒÃ×–îXm ¾nœeàËü謦B§Ú€êËÅIÀ8»ßød—¬¥2N“6õh]¸)„¾²®£¯Û÷.)ƒ„Möþ7¦>§¼q'LvzÊ,ê Oh󛺯÷VuCwR_Tä5LÅ׎'ŸlF}Ž -¥øõœ^Šj?áà/cî?€I&{ª)…;Ÿ~žò$ 0%]bAyÈèä` ¸5/¨£Úß/¡Þ—ôu™®)H×K: ÚÊë®Ó¨‚úA!{@,L"PEá7dn~y&ÿÝÒ¸Mu|„í\çEÞ¼Ü2Æ–‘1n7Å.†äˆÀj\;VA&Õ‡ºMÚ†2uÕÏ0Ÿt¹Es¨ÎÎ×K?ÎÙŸYÙÌ ¤piI+\脳^ífq‡ªÝ¢ „fm ¦h2ûíDRvéÐ - ½V hà?3šßÚ΢Ï>=ù&o -;Ù6'ÀÜØ£º¦s`®° »¶œ‚ ]Ù¾:½L µ‚“ÔT̨Ʋ˜N, é @¿3Y<]ʬ˜˜q% BQ‘çû¹‡q ¼SàĹ6ÒÑÕ¨•ÊÎK'ø¶?- ”ÖÜù!¤pbà115„ -R37µ1k˜Õl‹âeï^:®üU@óà~‰§yf‚—¬þëÔj0DJÇØè†R‘zZ7!õ@7E(ˆc™ÔýSsRc@À¥RŸ£±HC¾¹/£´Œ Ÿ í® ´Ov¥[*SÀ9·k—ÈC¶óûj“nÙï+<„grz`#TkÌ&°7ÄALDøR ]83N§!Üa,Žç%m©Æ’ö÷QÄA¨!¹é‰ú-ˆzPoOKl¸£ÎÛ¯jê2ÒÛ6Âó6Û¥ç¢1 e:ϾFÛÆ6*VÁ.p!YßeGçóÖ01,팳 -/'¥TpmkOÔ–”?ŸÒ¶‰¬™h"‘EÎæYÉÀ½!e¸fƒÙŒ :*ëh§ª‚X뢱‘Ÿ$_dkê’qÈ6#²y‰Zª±Dýd’'X–}‘ÈÖ„L\ICm ßàçíæÉléé© ÓN`¨$]aÄ–{úz&dLTÇAÞзÐ?jWmE’ìÙõ¶><£ëÖç“]¶¾–ŠÂüêÑáßã8~„cFI)®0à¨Æ²é$P<ppo8¡Û»0qƶ‚•1.–Çô¬Ýa #BØÛ³SR›J26l câ5|îJÜðpL·™[†öé¼?PG{?T?§6ìŸ-þIÌ’¾éÜýçÍ{ÄAÕm%> yœêâe Éô–úÑ ÍÿÁºŠ¢Tî*“âà–²-éãƒÝ £,Ž;>€áF• «Ç‰“—aÅ)vA[n¸Ì8máBõB¡© "„€I¸Å¿²3?’Æ7Yíʆë‘7æxmÛ2gÙ mΧҔ!âHØ2¾§ªžk€12öeŸ@¥T9…^UÓa@ȶQ¦ŽÝ¦¼0q)Få0yMb@TëÎöCjeÀì¥È‡>JÇý -ïÑäCà(üšã{d3Žï¨ˆÑ¢ùÇŸe sü!ßç€N{îsÞ%ûЙAß9~AÉ¢tÈ–ïƒ# 98 CMÏäã4£çãØÑú8.ã|_Tv9ãΗ½½õqÁ"*ÉaÃú76m1w í´#š F%>ì¶·wÐZÛAÄuQ¸Yáé’bœžn&«£]Ô-ÖÝt«Ù5è6Ñ÷n¸?¬Î•-í)‡¤u“žãyàhl´’(œÇØò¶OèkPƒ·ÈJ|ÔÄÔàÌ=§GYTƲµ ‚¢ÙÚ&9PA°kYR»–öòHJ>ðæþÊ^½ÀƒSm˜†Æ†ÐׄL¤ðÑÆÜ¶hcï\‹fW¸Hñk…/Ÿì2®´T&æ?¥›ìbÝp~ݶn8ZwºnØ[ø®ÜØË°®`sèk·ë³W©)²§ÌÝ,¿¸âÍL̓Ô!ˆ~MuÙŒêUOuƒø¿ËDü¹ƒ=ÖZ^áÎQ¹ë+8 ƒ8 “>{÷YSOêµêçµëÜÁØ\¥Ê†ÆiqžÑ:SÀÉÕ Ø£º¬sGdo'íb(6¿¬#-ÛWfCúÊÞºÿ/]†3“‹êìšÊ<²9*d~WœëÃEŸ_·uñѺÓ.Þ[ø .œ}†âLcF5øe‚ºUùd3ªqTj»§Òø8àIâÐSµº8!›¹P 7](nÙðBYΕ XÂļZª±F% †íž"Ú.ç:Yîssóˆ}F~Óé…4>í°b ï¾}{O ³¿MIQ…;ýy’îS&Èû¹N’é dzdÈ¿lJ·[9oL›t¶Wƒ¶Z>"Ša!~æ#$p_óDjæ#$KÔ[sÊþÆ6§„ÎÖ†J˜65_¥ICÃYšŒðæ›6¤c&š†W¦0ƒäÕŽþóÆNTŸ×Ûê˜æ¥ Úcí[W·N<0¤)ƒ#.ézÐd*NXa}˜±/5I7¬rWYöóÄ FñîâiêcRˆ0ðgbkÂ…s›?ü¡i÷ýTH’x"BÈ¿¸VŽ)ÔqÞ~‘:fý|·îendstream +xÚÕZK“ÛF¾Ï¯Ð-šªˆa?Èfמ¼~d'Uk'žÙW9>p(JbL‘ŠHÍX[ùñ4ºùe—÷’šÃ4!t¾@²…lž/´\(-½ÀgÁ"Ùßø‹-üöã ³<+Ç´êrýõáæ‡7B-´§C.6µ"Ï"¶xXX¾üÛ‹Ÿ^¿¿]ñÀ_ +ïv„þòí‹¿¿&Ê=üË:Ž—ïÞ¾¹ûñï_Ü*¹|¸{÷öv¥|-aæõ¹ï~~Ýλ¿ýøðÓÍë‡fÝ2_à~¿ùðÑ_¬aÃ?ÝøžÐQ°x†ßcZóÅþFÂ¤Ž’ßÜßüÒ,ØùÕL²\ "/ˆ¸š0çÓ1Á¼(ÑBÚÆvësï³äv%_žë¸N+zxÎòGbY”DÉËb›iü˜Òÿã-‹–éæT¥k0žÒjy·¡_êeùoY¤´Ð.¶k'»–ZÓC\¬Û`QЛuô!÷üPÁfQßìóƈ\mŽå~…ì‹•ãX1æé à´±lƒ|›ô˜ ì‰î$x`.uV·+¨eVáÿp™ÙgØÝ÷0Šªhif{Èô[y:qNÔ_}Ÿç)É€Èòh)dß5ë’ˆdA˜(Ò¤&™g „µ¸Õ»·]42€`à£Ày|ÎŒÎè³`óßhŒ:™Á=;#.Î4H?gU[zjvŠn§8¦âèÑRhSûò Ýb%Ì—pR-”xBÁ`Ê®U—͸µŒºníÃX†íbhê\€K‡¾¿ü°Jò4.>Ú'rƒ èB +D†…ߨ‘˜zR¸ö¢HiË4µLài¥BËäqUM,#Á øÒež²ôyJái„búøñãЂi… ³n¸Æîʼnà€f’G}ß¹õV|@oÅÿý0hœœÓàxSiÓ?B¢[¶LÈÍ™æ“ܼ\J +)laW5¢ŽI¢¹fÌÇù+ç’ÜG´Lþð» ø_Ò$Ã¥L`ˆPµK´As› ïÌóª¤Ñ0ÀøvKt{ÝÙðD”íGgfƒ³¯‡ 冪‹<œfùci'Ã9Ía01ůa—ír6\¸±¢¬³ÍyÂÇ%\DR°?qÄ ÉCˆ¸SçÙpÙ8®àº—2è›ó}Z¥xS⡾}÷p÷æ?4Þ§UoÝÙ›¨¡ýÌñsßS׸eš9zâAMiR›l;(O…á¼PÇ3ÚÏeàÆW FGèû4/c4íÞa z`ÜlOǘ‰ÍÍc“{à \€˜‰(8¡—§šˆëÒr•–@±ÖNï\™v®ÔÊf,>8·ä}lKŸLPkM7¶6 z&Ê.~J‰fojÀ6 ÉÁÃ΀Ωè÷…A¤ÕÀKÔ˜›ÀÅ8Åâ‚{Ǿ=?³qƤ +BÇö¼súbÂá „9•bzÌ ¶)Q‹Óþ‘Œ–å†ìÁCÈi ðûÈØ´Ç4‰!³¸X[œ{*³u5p÷"MmÔ¥Kbà^q˜Úðí˵ÁÔÄyþ˜íÀr*iªº©Ou9¨ÀF^Àxp%¬ºl—«ájLRÇõ©ºœÐ(8¥?5ºŽóŸyœGWÛp Û÷b?gëÛõUVòøl˜»C‡:åt$Ç.j"8Ûã˜\¤Ã½Í(‚ªyÌ]- #JòÓÚ–*LI€öpù.„ïR¿“ÌøA›^ R$;2ÈEƒ3ñ‘ û³ƒó@%S¹§§ç]–ìì”Ú’bˉOÙL Gò€/€è©ê~2C;!k%`¯‘K…íŠ<²ûCjß°J-«ô˜™Ò~´U¶™&Ü4Õbpó#\L#hl°Èüг ŒRN‡Cy¬«©<¬©„y¤]%ü=AV»¬vˆ