/contrib/bind9/doc/misc/dnssec

https://bitbucket.org/freebsd/freebsd-head/ · #! · 84 lines · 56 code · 28 blank · 0 comment · 0 complexity · a66d49f522f66da79cbb38d03225e2b3 MD5 · raw file

  1. Copyright (C) 2004 Internet Systems Consortium, Inc. ("ISC")
  2. Copyright (C) 2000-2002 Internet Software Consortium.
  3. See COPYRIGHT in the source root or http://isc.org/copyright.html for terms.
  4. DNSSEC Release Notes
  5. This document summarizes the state of the DNSSEC implementation in
  6. this release of BIND9.
  7. OpenSSL Library Required
  8. To support DNSSEC, BIND 9 must be linked with version 0.9.6e or newer of
  9. the OpenSSL library. As of BIND 9.2, the library is no longer
  10. included in the distribution - it must be provided by the operating
  11. system or installed separately.
  12. To build BIND 9 with OpenSSL, use "configure --with-openssl". If
  13. the OpenSSL library is installed in a nonstandard location, you can
  14. specify a path as in "configure --with-openssl=/var".
  15. Key Generation and Signing
  16. The tools for generating DNSSEC keys and signatures are now in the
  17. bin/dnssec directory. Documentation for these programs can be found
  18. in doc/arm/Bv9ARM.4.html and the man pages.
  19. The random data used in generating DNSSEC keys and signatures comes
  20. from either /dev/random (if the OS supports it) or keyboard input.
  21. Alternatively, a device or file containing entropy/random data can be
  22. specified.
  23. Serving Secure Zones
  24. When acting as an authoritative name server, BIND9 includes KEY, SIG
  25. and NXT records in responses as specified in RFC2535 when the request
  26. has the DO flag set in the query.
  27. Secure Resolution
  28. Basic support for validation of DNSSEC signatures in responses has
  29. been implemented but should still be considered experimental.
  30. When acting as a caching name server, BIND9 is capable of performing
  31. basic DNSSEC validation of positive as well as nonexistence responses.
  32. This functionality is enabled by including a "trusted-keys" clause
  33. in the configuration file, containing the top-level zone key of the
  34. the DNSSEC tree.
  35. Validation of wildcard responses is not currently supported. In
  36. particular, a "name does not exist" response will validate
  37. successfully even if it does not contain the NXT records to prove the
  38. nonexistence of a matching wildcard.
  39. Proof of insecure status for insecure zones delegated from secure
  40. zones works when the zones are completely insecure. Privately
  41. secured zones delegated from secure zones will not work in all cases,
  42. such as when the privately secured zone is served by the same server
  43. as an ancestor (but not parent) zone.
  44. Handling of the CD bit in queries is now fully implemented. Validation
  45. is not attempted for recursive queries if CD is set.
  46. Secure Dynamic Update
  47. Dynamic update of secure zones has been implemented, but may not be
  48. complete. Affected NXT and SIG records are updated by the server when
  49. an update occurs. Advanced access control is possible using the
  50. "update-policy" statement in the zone definition.
  51. Secure Zone Transfers
  52. BIND 9 does not implement the zone transfer security mechanisms of
  53. RFC2535 section 5.6, and we have no plans to implement them in the
  54. future as we consider them inferior to the use of TSIG or SIG(0) to
  55. ensure the integrity of zone transfers.
  56. $Id: dnssec,v 1.19 2004/03/05 05:04:53 marka Exp $