PageRenderTime 31ms CodeModel.GetById 19ms RepoModel.GetById 1ms app.codeStats 0ms

/contrib/bind9/doc/arm/Bv9ARM.ch09.html

https://bitbucket.org/freebsd/freebsd-head/
HTML | 1103 lines | 1084 code | 2 blank | 17 comment | 0 complexity | bd48fcbfd5fde03cf67ddeb856b810c2 MD5 | raw file
Possible License(s): MPL-2.0-no-copyleft-exception, BSD-3-Clause, LGPL-2.0, LGPL-2.1, BSD-2-Clause, 0BSD, JSON, AGPL-1.0, GPL-2.0
  1. <!--
  2. - Copyright (C) 2004-2012 Internet Systems Consortium, Inc. ("ISC")
  3. - Copyright (C) 2000-2003 Internet Software Consortium.
  4. -
  5. - Permission to use, copy, modify, and/or distribute this software for any
  6. - purpose with or without fee is hereby granted, provided that the above
  7. - copyright notice and this permission notice appear in all copies.
  8. -
  9. - THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
  10. - REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
  11. - AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
  12. - INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
  13. - LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
  14. - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
  15. - PERFORMANCE OF THIS SOFTWARE.
  16. -->
  17. <!-- $Id$ -->
  18. <html>
  19. <head>
  20. <meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
  21. <title>Appendix A. Appendices</title>
  22. <meta name="generator" content="DocBook XSL Stylesheets V1.71.1">
  23. <link rel="start" href="Bv9ARM.html" title="BIND 9 Administrator Reference Manual">
  24. <link rel="up" href="Bv9ARM.html" title="BIND 9 Administrator Reference Manual">
  25. <link rel="prev" href="Bv9ARM.ch08.html" title="Chapter 8. Troubleshooting">
  26. <link rel="next" href="Bv9ARM.ch10.html" title="Manual pages">
  27. </head>
  28. <body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF">
  29. <div class="navheader">
  30. <table width="100%" summary="Navigation header">
  31. <tr><th colspan="3" align="center">Appendix A. Appendices</th></tr>
  32. <tr>
  33. <td width="20%" align="left">
  34. <a accesskey="p" href="Bv9ARM.ch08.html">Prev</a> </td>
  35. <th width="60%" align="center"> </th>
  36. <td width="20%" align="right"> <a accesskey="n" href="Bv9ARM.ch10.html">Next</a>
  37. </td>
  38. </tr>
  39. </table>
  40. <hr>
  41. </div>
  42. <div class="appendix" lang="en">
  43. <div class="titlepage"><div><div><h2 class="title">
  44. <a name="Bv9ARM.ch09"></a>Appendix A. Appendices</h2></div></div></div>
  45. <div class="toc">
  46. <p><b>Table of Contents</b></p>
  47. <dl>
  48. <dt><span class="sect1"><a href="Bv9ARM.ch09.html#id2603536">Acknowledgments</a></span></dt>
  49. <dd><dl><dt><span class="sect2"><a href="Bv9ARM.ch09.html#historical_dns_information">A Brief History of the <acronym class="acronym">DNS</acronym> and <acronym class="acronym">BIND</acronym></a></span></dt></dl></dd>
  50. <dt><span class="sect1"><a href="Bv9ARM.ch09.html#id2603707">General <acronym class="acronym">DNS</acronym> Reference Information</a></span></dt>
  51. <dd><dl><dt><span class="sect2"><a href="Bv9ARM.ch09.html#ipv6addresses">IPv6 addresses (AAAA)</a></span></dt></dl></dd>
  52. <dt><span class="sect1"><a href="Bv9ARM.ch09.html#bibliography">Bibliography (and Suggested Reading)</a></span></dt>
  53. <dd><dl>
  54. <dt><span class="sect2"><a href="Bv9ARM.ch09.html#rfcs">Request for Comments (RFCs)</a></span></dt>
  55. <dt><span class="sect2"><a href="Bv9ARM.ch09.html#internet_drafts">Internet Drafts</a></span></dt>
  56. <dt><span class="sect2"><a href="Bv9ARM.ch09.html#id2607124">Other Documents About <acronym class="acronym">BIND</acronym></a></span></dt>
  57. </dl></dd>
  58. <dt><span class="sect1"><a href="Bv9ARM.ch09.html#bind9.library">BIND 9 DNS Library Support</a></span></dt>
  59. <dd><dl>
  60. <dt><span class="sect2"><a href="Bv9ARM.ch09.html#id2608280">Prerequisite</a></span></dt>
  61. <dt><span class="sect2"><a href="Bv9ARM.ch09.html#id2608290">Compilation</a></span></dt>
  62. <dt><span class="sect2"><a href="Bv9ARM.ch09.html#id2608314">Installation</a></span></dt>
  63. <dt><span class="sect2"><a href="Bv9ARM.ch09.html#id2608345">Known Defects/Restrictions</a></span></dt>
  64. <dt><span class="sect2"><a href="Bv9ARM.ch09.html#id2608422">The dns.conf File</a></span></dt>
  65. <dt><span class="sect2"><a href="Bv9ARM.ch09.html#id2608449">Sample Applications</a></span></dt>
  66. <dt><span class="sect2"><a href="Bv9ARM.ch09.html#id2609490">Library References</a></span></dt>
  67. </dl></dd>
  68. </dl>
  69. </div>
  70. <div class="sect1" lang="en">
  71. <div class="titlepage"><div><div><h2 class="title" style="clear: both">
  72. <a name="id2603536"></a>Acknowledgments</h2></div></div></div>
  73. <div class="sect2" lang="en">
  74. <div class="titlepage"><div><div><h3 class="title">
  75. <a name="historical_dns_information"></a>A Brief History of the <acronym class="acronym">DNS</acronym> and <acronym class="acronym">BIND</acronym>
  76. </h3></div></div></div>
  77. <p>
  78. Although the "official" beginning of the Domain Name
  79. System occurred in 1984 with the publication of RFC 920, the
  80. core of the new system was described in 1983 in RFCs 882 and
  81. 883. From 1984 to 1987, the ARPAnet (the precursor to today's
  82. Internet) became a testbed of experimentation for developing the
  83. new naming/addressing scheme in a rapidly expanding,
  84. operational network environment. New RFCs were written and
  85. published in 1987 that modified the original documents to
  86. incorporate improvements based on the working model. RFC 1034,
  87. "Domain Names-Concepts and Facilities", and RFC 1035, "Domain
  88. Names-Implementation and Specification" were published and
  89. became the standards upon which all <acronym class="acronym">DNS</acronym> implementations are
  90. built.
  91. </p>
  92. <p>
  93. The first working domain name server, called "Jeeves", was
  94. written in 1983-84 by Paul Mockapetris for operation on DEC
  95. Tops-20
  96. machines located at the University of Southern California's
  97. Information
  98. Sciences Institute (USC-ISI) and SRI International's Network
  99. Information
  100. Center (SRI-NIC). A <acronym class="acronym">DNS</acronym> server for
  101. Unix machines, the Berkeley Internet
  102. Name Domain (<acronym class="acronym">BIND</acronym>) package, was
  103. written soon after by a group of
  104. graduate students at the University of California at Berkeley
  105. under
  106. a grant from the US Defense Advanced Research Projects
  107. Administration
  108. (DARPA).
  109. </p>
  110. <p>
  111. Versions of <acronym class="acronym">BIND</acronym> through
  112. 4.8.3 were maintained by the Computer
  113. Systems Research Group (CSRG) at UC Berkeley. Douglas Terry, Mark
  114. Painter, David Riggle and Songnian Zhou made up the initial <acronym class="acronym">BIND</acronym>
  115. project team. After that, additional work on the software package
  116. was done by Ralph Campbell. Kevin Dunlap, a Digital Equipment
  117. Corporation
  118. employee on loan to the CSRG, worked on <acronym class="acronym">BIND</acronym> for 2 years, from 1985
  119. to 1987. Many other people also contributed to <acronym class="acronym">BIND</acronym> development
  120. during that time: Doug Kingston, Craig Partridge, Smoot
  121. Carl-Mitchell,
  122. Mike Muuss, Jim Bloom and Mike Schwartz. <acronym class="acronym">BIND</acronym> maintenance was subsequently
  123. handled by Mike Karels and Řivind Kure.
  124. </p>
  125. <p>
  126. <acronym class="acronym">BIND</acronym> versions 4.9 and 4.9.1 were
  127. released by Digital Equipment
  128. Corporation (now Compaq Computer Corporation). Paul Vixie, then
  129. a DEC employee, became <acronym class="acronym">BIND</acronym>'s
  130. primary caretaker. He was assisted
  131. by Phil Almquist, Robert Elz, Alan Barrett, Paul Albitz, Bryan
  132. Beecher, Andrew
  133. Partan, Andy Cherenson, Tom Limoncelli, Berthold Paffrath, Fuat
  134. Baran, Anant Kumar, Art Harkin, Win Treese, Don Lewis, Christophe
  135. Wolfhugel, and others.
  136. </p>
  137. <p>
  138. In 1994, <acronym class="acronym">BIND</acronym> version 4.9.2 was sponsored by
  139. Vixie Enterprises. Paul
  140. Vixie became <acronym class="acronym">BIND</acronym>'s principal
  141. architect/programmer.
  142. </p>
  143. <p>
  144. <acronym class="acronym">BIND</acronym> versions from 4.9.3 onward
  145. have been developed and maintained
  146. by the Internet Systems Consortium and its predecessor,
  147. the Internet Software Consortium, with support being provided
  148. by ISC's sponsors.
  149. </p>
  150. <p>
  151. As co-architects/programmers, Bob Halley and
  152. Paul Vixie released the first production-ready version of
  153. <acronym class="acronym">BIND</acronym> version 8 in May 1997.
  154. </p>
  155. <p>
  156. BIND version 9 was released in September 2000 and is a
  157. major rewrite of nearly all aspects of the underlying
  158. BIND architecture.
  159. </p>
  160. <p>
  161. BIND versions 4 and 8 are officially deprecated.
  162. No additional development is done
  163. on BIND version 4 or BIND version 8.
  164. </p>
  165. <p>
  166. <acronym class="acronym">BIND</acronym> development work is made
  167. possible today by the sponsorship
  168. of several corporations, and by the tireless work efforts of
  169. numerous individuals.
  170. </p>
  171. </div>
  172. </div>
  173. <div class="sect1" lang="en">
  174. <div class="titlepage"><div><div><h2 class="title" style="clear: both">
  175. <a name="id2603707"></a>General <acronym class="acronym">DNS</acronym> Reference Information</h2></div></div></div>
  176. <div class="sect2" lang="en">
  177. <div class="titlepage"><div><div><h3 class="title">
  178. <a name="ipv6addresses"></a>IPv6 addresses (AAAA)</h3></div></div></div>
  179. <p>
  180. IPv6 addresses are 128-bit identifiers for interfaces and
  181. sets of interfaces which were introduced in the <acronym class="acronym">DNS</acronym> to facilitate
  182. scalable Internet routing. There are three types of addresses: <span class="emphasis"><em>Unicast</em></span>,
  183. an identifier for a single interface;
  184. <span class="emphasis"><em>Anycast</em></span>,
  185. an identifier for a set of interfaces; and <span class="emphasis"><em>Multicast</em></span>,
  186. an identifier for a set of interfaces. Here we describe the global
  187. Unicast address scheme. For more information, see RFC 3587,
  188. "Global Unicast Address Format."
  189. </p>
  190. <p>
  191. IPv6 unicast addresses consist of a
  192. <span class="emphasis"><em>global routing prefix</em></span>, a
  193. <span class="emphasis"><em>subnet identifier</em></span>, and an
  194. <span class="emphasis"><em>interface identifier</em></span>.
  195. </p>
  196. <p>
  197. The global routing prefix is provided by the
  198. upstream provider or ISP, and (roughly) corresponds to the
  199. IPv4 <span class="emphasis"><em>network</em></span> section
  200. of the address range.
  201. The subnet identifier is for local subnetting, much the
  202. same as subnetting an
  203. IPv4 /16 network into /24 subnets.
  204. The interface identifier is the address of an individual
  205. interface on a given network; in IPv6, addresses belong to
  206. interfaces rather than to machines.
  207. </p>
  208. <p>
  209. The subnetting capability of IPv6 is much more flexible than
  210. that of IPv4: subnetting can be carried out on bit boundaries,
  211. in much the same way as Classless InterDomain Routing
  212. (CIDR), and the DNS PTR representation ("nibble" format)
  213. makes setting up reverse zones easier.
  214. </p>
  215. <p>
  216. The Interface Identifier must be unique on the local link,
  217. and is usually generated automatically by the IPv6
  218. implementation, although it is usually possible to
  219. override the default setting if necessary. A typical IPv6
  220. address might look like:
  221. <span><strong class="command">2001:db8:201:9:a00:20ff:fe81:2b32</strong></span>
  222. </p>
  223. <p>
  224. IPv6 address specifications often contain long strings
  225. of zeros, so the architects have included a shorthand for
  226. specifying
  227. them. The double colon (`::') indicates the longest possible
  228. string
  229. of zeros that can fit, and can be used only once in an address.
  230. </p>
  231. </div>
  232. </div>
  233. <div class="sect1" lang="en">
  234. <div class="titlepage"><div><div><h2 class="title" style="clear: both">
  235. <a name="bibliography"></a>Bibliography (and Suggested Reading)</h2></div></div></div>
  236. <div class="sect2" lang="en">
  237. <div class="titlepage"><div><div><h3 class="title">
  238. <a name="rfcs"></a>Request for Comments (RFCs)</h3></div></div></div>
  239. <p>
  240. Specification documents for the Internet protocol suite, including
  241. the <acronym class="acronym">DNS</acronym>, are published as part of
  242. the Request for Comments (RFCs)
  243. series of technical notes. The standards themselves are defined
  244. by the Internet Engineering Task Force (IETF) and the Internet
  245. Engineering Steering Group (IESG). RFCs can be obtained online via FTP at:
  246. </p>
  247. <p>
  248. <a href="ftp://www.isi.edu/in-notes/" target="_top">
  249. ftp://www.isi.edu/in-notes/RFC<em class="replaceable"><code>xxxx</code></em>.txt
  250. </a>
  251. </p>
  252. <p>
  253. (where <em class="replaceable"><code>xxxx</code></em> is
  254. the number of the RFC). RFCs are also available via the Web at:
  255. </p>
  256. <p>
  257. <a href="http://www.ietf.org/rfc/" target="_top">http://www.ietf.org/rfc/</a>.
  258. </p>
  259. <div class="bibliography">
  260. <div class="titlepage"><div><div><h4 class="title">
  261. <a name="id2603895"></a>Bibliography</h4></div></div></div>
  262. <div class="bibliodiv">
  263. <h3 class="title">Standards</h3>
  264. <div class="biblioentry">
  265. <a name="id2603906"></a><p>[<abbr class="abbrev">RFC974</abbr>] <span class="author"><span class="firstname">C.</span> <span class="surname">Partridge</span>. </span><span class="title"><i>Mail Routing and the Domain System</i>. </span><span class="pubdate">January 1986. </span></p>
  266. </div>
  267. <div class="biblioentry">
  268. <a name="id2603929"></a><p>[<abbr class="abbrev">RFC1034</abbr>] <span class="author"><span class="firstname">P.V.</span> <span class="surname">Mockapetris</span>. </span><span class="title"><i>Domain Names &#8212; Concepts and Facilities</i>. </span><span class="pubdate">November 1987. </span></p>
  269. </div>
  270. <div class="biblioentry">
  271. <a name="id2603953"></a><p>[<abbr class="abbrev">RFC1035</abbr>] <span class="author"><span class="firstname">P. V.</span> <span class="surname">Mockapetris</span>. </span><span class="title"><i>Domain Names &#8212; Implementation and
  272. Specification</i>. </span><span class="pubdate">November 1987. </span></p>
  273. </div>
  274. </div>
  275. <div class="bibliodiv">
  276. <h3 class="title">
  277. <a name="proposed_standards"></a>Proposed Standards</h3>
  278. <div class="biblioentry">
  279. <a name="id2603989"></a><p>[<abbr class="abbrev">RFC2181</abbr>] <span class="author"><span class="firstname">R., R. Bush</span> <span class="surname">Elz</span>. </span><span class="title"><i>Clarifications to the <acronym class="acronym">DNS</acronym>
  280. Specification</i>. </span><span class="pubdate">July 1997. </span></p>
  281. </div>
  282. <div class="biblioentry">
  283. <a name="id2604016"></a><p>[<abbr class="abbrev">RFC2308</abbr>] <span class="author"><span class="firstname">M.</span> <span class="surname">Andrews</span>. </span><span class="title"><i>Negative Caching of <acronym class="acronym">DNS</acronym>
  284. Queries</i>. </span><span class="pubdate">March 1998. </span></p>
  285. </div>
  286. <div class="biblioentry">
  287. <a name="id2604041"></a><p>[<abbr class="abbrev">RFC1995</abbr>] <span class="author"><span class="firstname">M.</span> <span class="surname">Ohta</span>. </span><span class="title"><i>Incremental Zone Transfer in <acronym class="acronym">DNS</acronym></i>. </span><span class="pubdate">August 1996. </span></p>
  288. </div>
  289. <div class="biblioentry">
  290. <a name="id2604066"></a><p>[<abbr class="abbrev">RFC1996</abbr>] <span class="author"><span class="firstname">P.</span> <span class="surname">Vixie</span>. </span><span class="title"><i>A Mechanism for Prompt Notification of Zone Changes</i>. </span><span class="pubdate">August 1996. </span></p>
  291. </div>
  292. <div class="biblioentry">
  293. <a name="id2604089"></a><p>[<abbr class="abbrev">RFC2136</abbr>] <span class="authorgroup"><span class="firstname">P.</span> <span class="surname">Vixie</span>, <span class="firstname">S.</span> <span class="surname">Thomson</span>, <span class="firstname">Y.</span> <span class="surname">Rekhter</span>, and <span class="firstname">J.</span> <span class="surname">Bound</span>. </span><span class="title"><i>Dynamic Updates in the Domain Name System</i>. </span><span class="pubdate">April 1997. </span></p>
  294. </div>
  295. <div class="biblioentry">
  296. <a name="id2604145"></a><p>[<abbr class="abbrev">RFC2671</abbr>] <span class="authorgroup"><span class="firstname">P.</span> <span class="surname">Vixie</span>. </span><span class="title"><i>Extension Mechanisms for DNS (EDNS0)</i>. </span><span class="pubdate">August 1997. </span></p>
  297. </div>
  298. <div class="biblioentry">
  299. <a name="id2604171"></a><p>[<abbr class="abbrev">RFC2672</abbr>] <span class="authorgroup"><span class="firstname">M.</span> <span class="surname">Crawford</span>. </span><span class="title"><i>Non-Terminal DNS Name Redirection</i>. </span><span class="pubdate">August 1999. </span></p>
  300. </div>
  301. <div class="biblioentry">
  302. <a name="id2604198"></a><p>[<abbr class="abbrev">RFC2845</abbr>] <span class="authorgroup"><span class="firstname">P.</span> <span class="surname">Vixie</span>, <span class="firstname">O.</span> <span class="surname">Gudmundsson</span>, <span class="firstname">D.</span> <span class="surname">Eastlake</span>, <span class="lineage">3rd</span>, and <span class="firstname">B.</span> <span class="surname">Wellington</span>. </span><span class="title"><i>Secret Key Transaction Authentication for <acronym class="acronym">DNS</acronym> (TSIG)</i>. </span><span class="pubdate">May 2000. </span></p>
  303. </div>
  304. <div class="biblioentry">
  305. <a name="id2604260"></a><p>[<abbr class="abbrev">RFC2930</abbr>] <span class="authorgroup"><span class="firstname">D.</span> <span class="surname">Eastlake</span>, <span class="lineage">3rd</span>. </span><span class="title"><i>Secret Key Establishment for DNS (TKEY RR)</i>. </span><span class="pubdate">September 2000. </span></p>
  306. </div>
  307. <div class="biblioentry">
  308. <a name="id2604290"></a><p>[<abbr class="abbrev">RFC2931</abbr>] <span class="authorgroup"><span class="firstname">D.</span> <span class="surname">Eastlake</span>, <span class="lineage">3rd</span>. </span><span class="title"><i>DNS Request and Transaction Signatures (SIG(0)s)</i>. </span><span class="pubdate">September 2000. </span></p>
  309. </div>
  310. <div class="biblioentry">
  311. <a name="id2604320"></a><p>[<abbr class="abbrev">RFC3007</abbr>] <span class="authorgroup"><span class="firstname">B.</span> <span class="surname">Wellington</span>. </span><span class="title"><i>Secure Domain Name System (DNS) Dynamic Update</i>. </span><span class="pubdate">November 2000. </span></p>
  312. </div>
  313. <div class="biblioentry">
  314. <a name="id2604346"></a><p>[<abbr class="abbrev">RFC3645</abbr>] <span class="authorgroup"><span class="firstname">S.</span> <span class="surname">Kwan</span>, <span class="firstname">P.</span> <span class="surname">Garg</span>, <span class="firstname">J.</span> <span class="surname">Gilroy</span>, <span class="firstname">L.</span> <span class="surname">Esibov</span>, <span class="firstname">J.</span> <span class="surname">Westhead</span>, and <span class="firstname">R.</span> <span class="surname">Hall</span>. </span><span class="title"><i>Generic Security Service Algorithm for Secret
  315. Key Transaction Authentication for DNS
  316. (GSS-TSIG)</i>. </span><span class="pubdate">October 2003. </span></p>
  317. </div>
  318. </div>
  319. <div class="bibliodiv">
  320. <h3 class="title">
  321. <acronym class="acronym">DNS</acronym> Security Proposed Standards</h3>
  322. <div class="biblioentry">
  323. <a name="id2604428"></a><p>[<abbr class="abbrev">RFC3225</abbr>] <span class="authorgroup"><span class="firstname">D.</span> <span class="surname">Conrad</span>. </span><span class="title"><i>Indicating Resolver Support of DNSSEC</i>. </span><span class="pubdate">December 2001. </span></p>
  324. </div>
  325. <div class="biblioentry">
  326. <a name="id2604455"></a><p>[<abbr class="abbrev">RFC3833</abbr>] <span class="authorgroup"><span class="firstname">D.</span> <span class="surname">Atkins</span> and <span class="firstname">R.</span> <span class="surname">Austein</span>. </span><span class="title"><i>Threat Analysis of the Domain Name System (DNS)</i>. </span><span class="pubdate">August 2004. </span></p>
  327. </div>
  328. <div class="biblioentry">
  329. <a name="id2604491"></a><p>[<abbr class="abbrev">RFC4033</abbr>] <span class="authorgroup"><span class="firstname">R.</span> <span class="surname">Arends</span>, <span class="firstname">R.</span> <span class="surname">Austein</span>, <span class="firstname">M.</span> <span class="surname">Larson</span>, <span class="firstname">D.</span> <span class="surname">Massey</span>, and <span class="firstname">S.</span> <span class="surname">Rose</span>. </span><span class="title"><i>DNS Security Introduction and Requirements</i>. </span><span class="pubdate">March 2005. </span></p>
  330. </div>
  331. <div class="biblioentry">
  332. <a name="id2604625"></a><p>[<abbr class="abbrev">RFC4034</abbr>] <span class="authorgroup"><span class="firstname">R.</span> <span class="surname">Arends</span>, <span class="firstname">R.</span> <span class="surname">Austein</span>, <span class="firstname">M.</span> <span class="surname">Larson</span>, <span class="firstname">D.</span> <span class="surname">Massey</span>, and <span class="firstname">S.</span> <span class="surname">Rose</span>. </span><span class="title"><i>Resource Records for the DNS Security Extensions</i>. </span><span class="pubdate">March 2005. </span></p>
  333. </div>
  334. <div class="biblioentry">
  335. <a name="id2604690"></a><p>[<abbr class="abbrev">RFC4035</abbr>] <span class="authorgroup"><span class="firstname">R.</span> <span class="surname">Arends</span>, <span class="firstname">R.</span> <span class="surname">Austein</span>, <span class="firstname">M.</span> <span class="surname">Larson</span>, <span class="firstname">D.</span> <span class="surname">Massey</span>, and <span class="firstname">S.</span> <span class="surname">Rose</span>. </span><span class="title"><i>Protocol Modifications for the DNS
  336. Security Extensions</i>. </span><span class="pubdate">March 2005. </span></p>
  337. </div>
  338. </div>
  339. <div class="bibliodiv">
  340. <h3 class="title">Other Important RFCs About <acronym class="acronym">DNS</acronym>
  341. Implementation</h3>
  342. <div class="biblioentry">
  343. <a name="id2604763"></a><p>[<abbr class="abbrev">RFC1535</abbr>] <span class="author"><span class="firstname">E.</span> <span class="surname">Gavron</span>. </span><span class="title"><i>A Security Problem and Proposed Correction With Widely
  344. Deployed <acronym class="acronym">DNS</acronym> Software.</i>. </span><span class="pubdate">October 1993. </span></p>
  345. </div>
  346. <div class="biblioentry">
  347. <a name="id2604789"></a><p>[<abbr class="abbrev">RFC1536</abbr>] <span class="authorgroup"><span class="firstname">A.</span> <span class="surname">Kumar</span>, <span class="firstname">J.</span> <span class="surname">Postel</span>, <span class="firstname">C.</span> <span class="surname">Neuman</span>, <span class="firstname">P.</span> <span class="surname">Danzig</span>, and <span class="firstname">S.</span> <span class="surname">Miller</span>. </span><span class="title"><i>Common <acronym class="acronym">DNS</acronym> Implementation
  348. Errors and Suggested Fixes</i>. </span><span class="pubdate">October 1993. </span></p>
  349. </div>
  350. <div class="biblioentry">
  351. <a name="id2604857"></a><p>[<abbr class="abbrev">RFC1982</abbr>] <span class="authorgroup"><span class="firstname">R.</span> <span class="surname">Elz</span> and <span class="firstname">R.</span> <span class="surname">Bush</span>. </span><span class="title"><i>Serial Number Arithmetic</i>. </span><span class="pubdate">August 1996. </span></p>
  352. </div>
  353. <div class="biblioentry">
  354. <a name="id2604892"></a><p>[<abbr class="abbrev">RFC4074</abbr>] <span class="authorgroup"><span class="firstname">Y.</span> <span class="surname">Morishita</span> and <span class="firstname">T.</span> <span class="surname">Jinmei</span>. </span><span class="title"><i>Common Misbehaviour Against <acronym class="acronym">DNS</acronym>
  355. Queries for IPv6 Addresses</i>. </span><span class="pubdate">May 2005. </span></p>
  356. </div>
  357. </div>
  358. <div class="bibliodiv">
  359. <h3 class="title">Resource Record Types</h3>
  360. <div class="biblioentry">
  361. <a name="id2604938"></a><p>[<abbr class="abbrev">RFC1183</abbr>] <span class="authorgroup"><span class="firstname">C.F.</span> <span class="surname">Everhart</span>, <span class="firstname">L. A.</span> <span class="surname">Mamakos</span>, <span class="firstname">R.</span> <span class="surname">Ullmann</span>, and <span class="firstname">P.</span> <span class="surname">Mockapetris</span>. </span><span class="title"><i>New <acronym class="acronym">DNS</acronym> RR Definitions</i>. </span><span class="pubdate">October 1990. </span></p>
  362. </div>
  363. <div class="biblioentry">
  364. <a name="id2604996"></a><p>[<abbr class="abbrev">RFC1706</abbr>] <span class="authorgroup"><span class="firstname">B.</span> <span class="surname">Manning</span> and <span class="firstname">R.</span> <span class="surname">Colella</span>. </span><span class="title"><i><acronym class="acronym">DNS</acronym> NSAP Resource Records</i>. </span><span class="pubdate">October 1994. </span></p>
  365. </div>
  366. <div class="biblioentry">
  367. <a name="id2605033"></a><p>[<abbr class="abbrev">RFC2168</abbr>] <span class="authorgroup"><span class="firstname">R.</span> <span class="surname">Daniel</span> and <span class="firstname">M.</span> <span class="surname">Mealling</span>. </span><span class="title"><i>Resolution of Uniform Resource Identifiers using
  368. the Domain Name System</i>. </span><span class="pubdate">June 1997. </span></p>
  369. </div>
  370. <div class="biblioentry">
  371. <a name="id2605137"></a><p>[<abbr class="abbrev">RFC1876</abbr>] <span class="authorgroup"><span class="firstname">C.</span> <span class="surname">Davis</span>, <span class="firstname">P.</span> <span class="surname">Vixie</span>, <span class="firstname">T.</span>, and <span class="firstname">I.</span> <span class="surname">Dickinson</span>. </span><span class="title"><i>A Means for Expressing Location Information in the
  372. Domain
  373. Name System</i>. </span><span class="pubdate">January 1996. </span></p>
  374. </div>
  375. <div class="biblioentry">
  376. <a name="id2605191"></a><p>[<abbr class="abbrev">RFC2052</abbr>] <span class="authorgroup"><span class="firstname">A.</span> <span class="surname">Gulbrandsen</span> and <span class="firstname">P.</span> <span class="surname">Vixie</span>. </span><span class="title"><i>A <acronym class="acronym">DNS</acronym> RR for Specifying the
  377. Location of
  378. Services.</i>. </span><span class="pubdate">October 1996. </span></p>
  379. </div>
  380. <div class="biblioentry">
  381. <a name="id2605229"></a><p>[<abbr class="abbrev">RFC2163</abbr>] <span class="author"><span class="firstname">A.</span> <span class="surname">Allocchio</span>. </span><span class="title"><i>Using the Internet <acronym class="acronym">DNS</acronym> to
  382. Distribute MIXER
  383. Conformant Global Address Mapping</i>. </span><span class="pubdate">January 1998. </span></p>
  384. </div>
  385. <div class="biblioentry">
  386. <a name="id2605255"></a><p>[<abbr class="abbrev">RFC2230</abbr>] <span class="author"><span class="firstname">R.</span> <span class="surname">Atkinson</span>. </span><span class="title"><i>Key Exchange Delegation Record for the <acronym class="acronym">DNS</acronym></i>. </span><span class="pubdate">October 1997. </span></p>
  387. </div>
  388. <div class="biblioentry">
  389. <a name="id2605281"></a><p>[<abbr class="abbrev">RFC2536</abbr>] <span class="author"><span class="firstname">D.</span> <span class="surname">Eastlake</span>, <span class="lineage">3rd</span>. </span><span class="title"><i>DSA KEYs and SIGs in the Domain Name System (DNS)</i>. </span><span class="pubdate">March 1999. </span></p>
  390. </div>
  391. <div class="biblioentry">
  392. <a name="id2605307"></a><p>[<abbr class="abbrev">RFC2537</abbr>] <span class="author"><span class="firstname">D.</span> <span class="surname">Eastlake</span>, <span class="lineage">3rd</span>. </span><span class="title"><i>RSA/MD5 KEYs and SIGs in the Domain Name System (DNS)</i>. </span><span class="pubdate">March 1999. </span></p>
  393. </div>
  394. <div class="biblioentry">
  395. <a name="id2605334"></a><p>[<abbr class="abbrev">RFC2538</abbr>] <span class="authorgroup"><span class="firstname">D.</span> <span class="surname">Eastlake</span>, <span class="lineage">3rd</span> and <span class="firstname">O.</span> <span class="surname">Gudmundsson</span>. </span><span class="title"><i>Storing Certificates in the Domain Name System (DNS)</i>. </span><span class="pubdate">March 1999. </span></p>
  396. </div>
  397. <div class="biblioentry">
  398. <a name="id2605373"></a><p>[<abbr class="abbrev">RFC2539</abbr>] <span class="authorgroup"><span class="firstname">D.</span> <span class="surname">Eastlake</span>, <span class="lineage">3rd</span>. </span><span class="title"><i>Storage of Diffie-Hellman Keys in the Domain Name System (DNS)</i>. </span><span class="pubdate">March 1999. </span></p>
  399. </div>
  400. <div class="biblioentry">
  401. <a name="id2605403"></a><p>[<abbr class="abbrev">RFC2540</abbr>] <span class="authorgroup"><span class="firstname">D.</span> <span class="surname">Eastlake</span>, <span class="lineage">3rd</span>. </span><span class="title"><i>Detached Domain Name System (DNS) Information</i>. </span><span class="pubdate">March 1999. </span></p>
  402. </div>
  403. <div class="biblioentry">
  404. <a name="id2605433"></a><p>[<abbr class="abbrev">RFC2782</abbr>] <span class="author"><span class="firstname">A.</span> <span class="surname">Gulbrandsen</span>. </span><span class="author"><span class="firstname">P.</span> <span class="surname">Vixie</span>. </span><span class="author"><span class="firstname">L.</span> <span class="surname">Esibov</span>. </span><span class="title"><i>A DNS RR for specifying the location of services (DNS SRV)</i>. </span><span class="pubdate">February 2000. </span></p>
  405. </div>
  406. <div class="biblioentry">
  407. <a name="id2605476"></a><p>[<abbr class="abbrev">RFC2915</abbr>] <span class="author"><span class="firstname">M.</span> <span class="surname">Mealling</span>. </span><span class="author"><span class="firstname">R.</span> <span class="surname">Daniel</span>. </span><span class="title"><i>The Naming Authority Pointer (NAPTR) DNS Resource Record</i>. </span><span class="pubdate">September 2000. </span></p>
  408. </div>
  409. <div class="biblioentry">
  410. <a name="id2605509"></a><p>[<abbr class="abbrev">RFC3110</abbr>] <span class="author"><span class="firstname">D.</span> <span class="surname">Eastlake</span>, <span class="lineage">3rd</span>. </span><span class="title"><i>RSA/SHA-1 SIGs and RSA KEYs in the Domain Name System (DNS)</i>. </span><span class="pubdate">May 2001. </span></p>
  411. </div>
  412. <div class="biblioentry">
  413. <a name="id2605536"></a><p>[<abbr class="abbrev">RFC3123</abbr>] <span class="author"><span class="firstname">P.</span> <span class="surname">Koch</span>. </span><span class="title"><i>A DNS RR Type for Lists of Address Prefixes (APL RR)</i>. </span><span class="pubdate">June 2001. </span></p>
  414. </div>
  415. <div class="biblioentry">
  416. <a name="id2605559"></a><p>[<abbr class="abbrev">RFC3596</abbr>] <span class="authorgroup"><span class="firstname">S.</span> <span class="surname">Thomson</span>, <span class="firstname">C.</span> <span class="surname">Huitema</span>, <span class="firstname">V.</span> <span class="surname">Ksinant</span>, and <span class="firstname">M.</span> <span class="surname">Souissi</span>. </span><span class="title"><i><acronym class="acronym">DNS</acronym> Extensions to support IP
  417. version 6</i>. </span><span class="pubdate">October 2003. </span></p>
  418. </div>
  419. <div class="biblioentry">
  420. <a name="id2605617"></a><p>[<abbr class="abbrev">RFC3597</abbr>] <span class="author"><span class="firstname">A.</span> <span class="surname">Gustafsson</span>. </span><span class="title"><i>Handling of Unknown DNS Resource Record (RR) Types</i>. </span><span class="pubdate">September 2003. </span></p>
  421. </div>
  422. </div>
  423. <div class="bibliodiv">
  424. <h3 class="title">
  425. <acronym class="acronym">DNS</acronym> and the Internet</h3>
  426. <div class="biblioentry">
  427. <a name="id2605649"></a><p>[<abbr class="abbrev">RFC1101</abbr>] <span class="author"><span class="firstname">P. V.</span> <span class="surname">Mockapetris</span>. </span><span class="title"><i><acronym class="acronym">DNS</acronym> Encoding of Network Names
  428. and Other Types</i>. </span><span class="pubdate">April 1989. </span></p>
  429. </div>
  430. <div class="biblioentry">
  431. <a name="id2605674"></a><p>[<abbr class="abbrev">RFC1123</abbr>] <span class="author"><span class="surname">Braden</span>. </span><span class="title"><i>Requirements for Internet Hosts - Application and
  432. Support</i>. </span><span class="pubdate">October 1989. </span></p>
  433. </div>
  434. <div class="biblioentry">
  435. <a name="id2605697"></a><p>[<abbr class="abbrev">RFC1591</abbr>] <span class="author"><span class="firstname">J.</span> <span class="surname">Postel</span>. </span><span class="title"><i>Domain Name System Structure and Delegation</i>. </span><span class="pubdate">March 1994. </span></p>
  436. </div>
  437. <div class="biblioentry">
  438. <a name="id2605720"></a><p>[<abbr class="abbrev">RFC2317</abbr>] <span class="authorgroup"><span class="firstname">H.</span> <span class="surname">Eidnes</span>, <span class="firstname">G.</span> <span class="surname">de Groot</span>, and <span class="firstname">P.</span> <span class="surname">Vixie</span>. </span><span class="title"><i>Classless IN-ADDR.ARPA Delegation</i>. </span><span class="pubdate">March 1998. </span></p>
  439. </div>
  440. <div class="biblioentry">
  441. <a name="id2605766"></a><p>[<abbr class="abbrev">RFC2826</abbr>] <span class="authorgroup"><span class="surname">Internet Architecture Board</span>. </span><span class="title"><i>IAB Technical Comment on the Unique DNS Root</i>. </span><span class="pubdate">May 2000. </span></p>
  442. </div>
  443. <div class="biblioentry">
  444. <a name="id2605789"></a><p>[<abbr class="abbrev">RFC2929</abbr>] <span class="authorgroup"><span class="firstname">D.</span> <span class="surname">Eastlake</span>, <span class="lineage">3rd</span>, <span class="firstname">E.</span> <span class="surname">Brunner-Williams</span>, and <span class="firstname">B.</span> <span class="surname">Manning</span>. </span><span class="title"><i>Domain Name System (DNS) IANA Considerations</i>. </span><span class="pubdate">September 2000. </span></p>
  445. </div>
  446. </div>
  447. <div class="bibliodiv">
  448. <h3 class="title">
  449. <acronym class="acronym">DNS</acronym> Operations</h3>
  450. <div class="biblioentry">
  451. <a name="id2605847"></a><p>[<abbr class="abbrev">RFC1033</abbr>] <span class="author"><span class="firstname">M.</span> <span class="surname">Lottor</span>. </span><span class="title"><i>Domain administrators operations guide.</i>. </span><span class="pubdate">November 1987. </span></p>
  452. </div>
  453. <div class="biblioentry">
  454. <a name="id2605870"></a><p>[<abbr class="abbrev">RFC1537</abbr>] <span class="author"><span class="firstname">P.</span> <span class="surname">Beertema</span>. </span><span class="title"><i>Common <acronym class="acronym">DNS</acronym> Data File
  455. Configuration Errors</i>. </span><span class="pubdate">October 1993. </span></p>
  456. </div>
  457. <div class="biblioentry">
  458. <a name="id2605897"></a><p>[<abbr class="abbrev">RFC1912</abbr>] <span class="author"><span class="firstname">D.</span> <span class="surname">Barr</span>. </span><span class="title"><i>Common <acronym class="acronym">DNS</acronym> Operational and
  459. Configuration Errors</i>. </span><span class="pubdate">February 1996. </span></p>
  460. </div>
  461. <div class="biblioentry">
  462. <a name="id2605924"></a><p>[<abbr class="abbrev">RFC2010</abbr>] <span class="authorgroup"><span class="firstname">B.</span> <span class="surname">Manning</span> and <span class="firstname">P.</span> <span class="surname">Vixie</span>. </span><span class="title"><i>Operational Criteria for Root Name Servers.</i>. </span><span class="pubdate">October 1996. </span></p>
  463. </div>
  464. <div class="biblioentry">
  465. <a name="id2605960"></a><p>[<abbr class="abbrev">RFC2219</abbr>] <span class="authorgroup"><span class="firstname">M.</span> <span class="surname">Hamilton</span> and <span class="firstname">R.</span> <span class="surname">Wright</span>. </span><span class="title"><i>Use of <acronym class="acronym">DNS</acronym> Aliases for
  466. Network Services.</i>. </span><span class="pubdate">October 1997. </span></p>
  467. </div>
  468. </div>
  469. <div class="bibliodiv">
  470. <h3 class="title">Internationalized Domain Names</h3>
  471. <div class="biblioentry">
  472. <a name="id2606006"></a><p>[<abbr class="abbrev">RFC2825</abbr>] <span class="authorgroup"><span class="surname">IAB</span> and <span class="firstname">R.</span> <span class="surname">Daigle</span>. </span><span class="title"><i>A Tangled Web: Issues of I18N, Domain Names,
  473. and the Other Internet protocols</i>. </span><span class="pubdate">May 2000. </span></p>
  474. </div>
  475. <div class="biblioentry">
  476. <a name="id2606038"></a><p>[<abbr class="abbrev">RFC3490</abbr>] <span class="authorgroup"><span class="firstname">P.</span> <span class="surname">Faltstrom</span>, <span class="firstname">P.</span> <span class="surname">Hoffman</span>, and <span class="firstname">A.</span> <span class="surname">Costello</span>. </span><span class="title"><i>Internationalizing Domain Names in Applications (IDNA)</i>. </span><span class="pubdate">March 2003. </span></p>
  477. </div>
  478. <div class="biblioentry">
  479. <a name="id2606084"></a><p>[<abbr class="abbrev">RFC3491</abbr>] <span class="authorgroup"><span class="firstname">P.</span> <span class="surname">Hoffman</span> and <span class="firstname">M.</span> <span class="surname">Blanchet</span>. </span><span class="title"><i>Nameprep: A Stringprep Profile for Internationalized Domain Names</i>. </span><span class="pubdate">March 2003. </span></p>
  480. </div>
  481. <div class="biblioentry">
  482. <a name="id2606119"></a><p>[<abbr class="abbrev">RFC3492</abbr>] <span class="authorgroup"><span class="firstname">A.</span> <span class="surname">Costello</span>. </span><span class="title"><i>Punycode: A Bootstring encoding of Unicode
  483. for Internationalized Domain Names in
  484. Applications (IDNA)</i>. </span><span class="pubdate">March 2003. </span></p>
  485. </div>
  486. </div>
  487. <div class="bibliodiv">
  488. <h3 class="title">Other <acronym class="acronym">DNS</acronym>-related RFCs</h3>
  489. <div class="note" style="margin-left: 0.5in; margin-right: 0.5in;">
  490. <h3 class="title">Note</h3>
  491. <p>
  492. Note: the following list of RFCs, although
  493. <acronym class="acronym">DNS</acronym>-related, are not
  494. concerned with implementing software.
  495. </p>
  496. </div>
  497. <div class="biblioentry">
  498. <a name="id2606164"></a><p>[<abbr class="abbrev">RFC1464</abbr>] <span class="author"><span class="firstname">R.</span> <span class="surname">Rosenbaum</span>. </span><span class="title"><i>Using the Domain Name System To Store Arbitrary String
  499. Attributes</i>. </span><span class="pubdate">May 1993. </span></p>
  500. </div>
  501. <div class="biblioentry">
  502. <a name="id2606186"></a><p>[<abbr class="abbrev">RFC1713</abbr>] <span class="author"><span class="firstname">A.</span> <span class="surname">Romao</span>. </span><span class="title"><i>Tools for <acronym class="acronym">DNS</acronym> Debugging</i>. </span><span class="pubdate">November 1994. </span></p>
  503. </div>
  504. <div class="biblioentry">
  505. <a name="id2606212"></a><p>[<abbr class="abbrev">RFC1794</abbr>] <span class="author"><span class="firstname">T.</span> <span class="surname">Brisco</span>. </span><span class="title"><i><acronym class="acronym">DNS</acronym> Support for Load
  506. Balancing</i>. </span><span class="pubdate">April 1995. </span></p>
  507. </div>
  508. <div class="biblioentry">
  509. <a name="id2606306"></a><p>[<abbr class="abbrev">RFC2240</abbr>] <span class="author"><span class="firstname">O.</span> <span class="surname">Vaughan</span>. </span><span class="title"><i>A Legal Basis for Domain Name Allocation</i>. </span><span class="pubdate">November 1997. </span></p>
  510. </div>
  511. <div class="biblioentry">
  512. <a name="id2606329"></a><p>[<abbr class="abbrev">RFC2345</abbr>] <span class="authorgroup"><span class="firstname">J.</span> <span class="surname">Klensin</span>, <span class="firstname">T.</span> <span class="surname">Wolf</span>, and <span class="firstname">G.</span> <span class="surname">Oglesby</span>. </span><span class="title"><i>Domain Names and Company Name Retrieval</i>. </span><span class="pubdate">May 1998. </span></p>
  513. </div>
  514. <div class="biblioentry">
  515. <a name="id2606375"></a><p>[<abbr class="abbrev">RFC2352</abbr>] <span class="author"><span class="firstname">O.</span> <span class="surname">Vaughan</span>. </span><span class="title"><i>A Convention For Using Legal Names as Domain Names</i>. </span><span class="pubdate">May 1998. </span></p>
  516. </div>
  517. <div class="biblioentry">
  518. <a name="id2606398"></a><p>[<abbr class="abbrev">RFC3071</abbr>] <span class="authorgroup"><span class="firstname">J.</span> <span class="surname">Klensin</span>. </span><span class="title"><i>Reflections on the DNS, RFC 1591, and Categories of Domains</i>. </span><span class="pubdate">February 2001. </span></p>
  519. </div>
  520. <div class="biblioentry">
  521. <a name="id2606425"></a><p>[<abbr class="abbrev">RFC3258</abbr>] <span class="authorgroup"><span class="firstname">T.</span> <span class="surname">Hardie</span>. </span><span class="title"><i>Distributing Authoritative Name Servers via
  522. Shared Unicast Addresses</i>. </span><span class="pubdate">April 2002. </span></p>
  523. </div>
  524. <div class="biblioentry">
  525. <a name="id2606451"></a><p>[<abbr class="abbrev">RFC3901</abbr>] <span class="authorgroup"><span class="firstname">A.</span> <span class="surname">Durand</span> and <span class="firstname">J.</span> <span class="surname">Ihren</span>. </span><span class="title"><i>DNS IPv6 Transport Operational Guidelines</i>. </span><span class="pubdate">September 2004. </span></p>
  526. </div>
  527. </div>
  528. <div class="bibliodiv">
  529. <h3 class="title">Obsolete and Unimplemented Experimental RFC</h3>
  530. <div class="biblioentry">
  531. <a name="id2606494"></a><p>[<abbr class="abbrev">RFC1712</abbr>] <span class="authorgroup"><span class="firstname">C.</span> <span class="surname">Farrell</span>, <span class="firstname">M.</span> <span class="surname">Schulze</span>, <span class="firstname">S.</span> <span class="surname">Pleitner</span>, and <span class="firstname">D.</span> <span class="surname">Baldoni</span>. </span><span class="title"><i><acronym class="acronym">DNS</acronym> Encoding of Geographical
  532. Location</i>. </span><span class="pubdate">November 1994. </span></p>
  533. </div>
  534. <div class="biblioentry">
  535. <a name="id2606552"></a><p>[<abbr class="abbrev">RFC2673</abbr>] <span class="authorgroup"><span class="firstname">M.</span> <span class="surname">Crawford</span>. </span><span class="title"><i>Binary Labels in the Domain Name System</i>. </span><span class="pubdate">August 1999. </span></p>
  536. </div>
  537. <div class="biblioentry">
  538. <a name="id2606579"></a><p>[<abbr class="abbrev">RFC2874</abbr>] <span class="authorgroup"><span class="firstname">M.</span> <span class="surname">Crawford</span> and <span class="firstname">C.</span> <span class="surname">Huitema</span>. </span><span class="title"><i>DNS Extensions to Support IPv6 Address Aggregation
  539. and Renumbering</i>. </span><span class="pubdate">July 2000. </span></p>
  540. </div>
  541. </div>
  542. <div class="bibliodiv">
  543. <h3 class="title">Obsoleted DNS Security RFCs</h3>
  544. <div class="note" style="margin-left: 0.5in; margin-right: 0.5in;">
  545. <h3 class="title">Note</h3>
  546. <p>
  547. Most of these have been consolidated into RFC4033,
  548. RFC4034 and RFC4035 which collectively describe DNSSECbis.
  549. </p>
  550. </div>
  551. <div class="biblioentry">
  552. <a name="id2606695"></a><p>[<abbr class="abbrev">RFC2065</abbr>] <span class="authorgroup"><span class="firstname">D.</span> <span class="surname">Eastlake</span>, <span class="lineage">3rd</span> and <span class="firstname">C.</span> <span class="surname">Kaufman</span>. </span><span class="title"><i>Domain Name System Security Extensions</i>. </span><span class="pubdate">January 1997. </span></p>
  553. </div>
  554. <div class="biblioentry">
  555. <a name="id2606734"></a><p>[<abbr class="abbrev">RFC2137</abbr>] <span class="author"><span class="firstname">D.</span> <span class="surname">Eastlake</span>, <span class="lineage">3rd</span>. </span><span class="title"><i>Secure Domain Name System Dynamic Update</i>. </span><span class="pubdate">April 1997. </span></p>
  556. </div>
  557. <div class="biblioentry">
  558. <a name="id2606761"></a><p>[<abbr class="abbrev">RFC2535</abbr>] <span class="authorgroup"><span class="firstname">D.</span> <span class="surname">Eastlake</span>, <span class="lineage">3rd</span>. </span><span class="title"><i>Domain Name System Security Extensions</i>. </span><span class="pubdate">March 1999. </span></p>
  559. </div>
  560. <div class="biblioentry">
  561. <a name="id2606791"></a><p>[<abbr class="abbrev">RFC3008</abbr>] <span class="authorgroup"><span class="firstname">B.</span> <span class="surname">Wellington</span>. </span><span class="title"><i>Domain Name System Security (DNSSEC)
  562. Signing Authority</i>. </span><span class="pubdate">November 2000. </span></p>
  563. </div>
  564. <div class="biblioentry">
  565. <a name="id2606817"></a><p>[<abbr class="abbrev">RFC3090</abbr>] <span class="authorgroup"><span class="firstname">E.</span> <span class="surname">Lewis</span>. </span><span class="title"><i>DNS Security Extension Clarification on Zone Status</i>. </span><span class="pubdate">March 2001. </span></p>
  566. </div>
  567. <div class="biblioentry">
  568. <a name="id2606843"></a><p>[<abbr class="abbrev">RFC3445</abbr>] <span class="authorgroup"><span class="firstname">D.</span> <span class="surname">Massey</span> and <span class="firstname">S.</span> <span class="surname">Rose</span>. </span><span class="title"><i>Limiting the Scope of the KEY Resource Record (RR)</i>. </span><span class="pubdate">December 2002. </span></p>
  569. </div>
  570. <div class="biblioentry">
  571. <a name="id2606880"></a><p>[<abbr class="abbrev">RFC3655</abbr>] <span class="authorgroup"><span class="firstname">B.</span> <span class="surname">Wellington</span> and <span class="firstname">O.</span> <span class="surname">Gudmundsson</span>. </span><span class="title"><i>Redefinition of DNS Authenticated Data (AD) bit</i>. </span><span class="pubdate">November 2003. </span></p>
  572. </div>
  573. <div class="biblioentry">
  574. <a name="id2606916"></a><p>[<abbr class="abbrev">RFC3658</abbr>] <span class="authorgroup"><span class="firstname">O.</span> <span class="surname">Gudmundsson</span>. </span><span class="title"><i>Delegation Signer (DS) Resource Record (RR)</i>. </span><span class="pubdate">December 2003. </span></p>
  575. </div>
  576. <div class="biblioentry">
  577. <a name="id2606942"></a><p>[<abbr class="abbrev">RFC3755</abbr>] <span class="authorgroup"><span class="firstname">S.</span> <span class="surname">Weiler</span>. </span><span class="title"><i>Legacy Resolver Compatibility for Delegation Signer (DS)</i>. </span><span class="pubdate">May 2004. </span></p>
  578. </div>
  579. <div class="biblioentry">
  580. <a name="id2607037"></a><p>[<abbr class="abbrev">RFC3757</abbr>] <span class="authorgroup"><span class="firstname">O.</span> <span class="surname">Kolkman</span>, <span class="firstname">J.</span> <span class="surname">Schlyter</span>, and <span class="firstname">E.</span> <span class="surname">Lewis</span>. </span><span class="title"><i>Domain Name System KEY (DNSKEY) Resource Record
  581. (RR) Secure Entry Point (SEP) Flag</i>. </span><span class="pubdate">April 2004. </span></p>
  582. </div>
  583. <div class="biblioentry">
  584. <a name="id2607082"></a><p>[<abbr class="abbrev">RFC3845</abbr>] <span class="authorgroup"><span class="firstname">J.</span> <span class="surname">Schlyter</span>. </span><span class="title"><i>DNS Security (DNSSEC) NextSECure (NSEC) RDATA Format</i>. </span><span class="pubdate">August 2004. </span></p>
  585. </div>
  586. </div>
  587. </div>
  588. </div>
  589. <div class="sect2" lang="en">
  590. <div class="titlepage"><div><div><h3 class="title">
  591. <a name="internet_drafts"></a>Internet Drafts</h3></div></div></div>
  592. <p>
  593. Internet Drafts (IDs) are rough-draft working documents of
  594. the Internet Engineering Task Force. They are, in essence, RFCs
  595. in the preliminary stages of development. Implementors are
  596. cautioned not
  597. to regard IDs as archival, and they should not be quoted or cited
  598. in any formal documents unless accompanied by the disclaimer that
  599. they are "works in progress." IDs have a lifespan of six months
  600. after which they are deleted unless updated by their authors.
  601. </p>
  602. </div>
  603. <div class="sect2" lang="en">
  604. <div class="titlepage"><div><div><h3 class="title">
  605. <a name="id2607124"></a>Other Documents About <acronym class="acronym">BIND</acronym>
  606. </h3></div></div></div>
  607. <p></p>
  608. <div class="bibliography">
  609. <div class="titlepage"><div><div><h4 class="title">
  610. <a name="id2607133"></a>Bibliography</h4></div></div></div>
  611. <div class="biblioentry">
  612. <a name="id2607136"></a><p><span class="authorgroup"><span class="firstname">Paul</span> <span class="surname">Albitz</span> and <span class="firstname">Cricket</span> <span class="surname">Liu</span>. </span><span class="title"><i><acronym class="acronym">DNS</acronym> and <acronym class="acronym">BIND</acronym></i>. </span><span class="copyright">Copyright Š 1998 Sebastopol, CA: O'Reilly and Associates. </span></p>
  613. </div>
  614. </div>
  615. </div>
  616. </div>
  617. <div class="sect1" lang="en">
  618. <div class="titlepage"><div><div><h2 class="title" style="clear: both">
  619. <a name="bind9.library"></a>BIND 9 DNS Library Support</h2></div></div></div>
  620. <p>This version of BIND 9 "exports" its internal libraries so
  621. that they can be used by third-party applications more easily (we
  622. call them "export" libraries in this document). In addition to
  623. all major DNS-related APIs BIND 9 is currently using, the export
  624. libraries provide the following features:</p>
  625. <div class="itemizedlist"><ul type="disc">
  626. <li><p>The newly created "DNS client" module. This is a higher
  627. level API that provides an interface to name resolution,
  628. single DNS transaction with a particular server, and dynamic
  629. update. Regarding name resolution, it supports advanced
  630. features such as DNSSEC validation and caching. This module
  631. supports both synchronous and asynchronous mode.</p></li>
  632. <li><p>The new "IRS" (Information Retrieval System) library.
  633. It provides an interface to parse the traditional resolv.conf
  634. file and more advanced, DNS-specific configuration file for
  635. the rest of this package (see the description for the
  636. dns.conf file below).</p></li>
  637. <li><p>As part of the IRS library, newly implemented standard
  638. address-name mapping functions, getaddrinfo() and
  639. getnameinfo(), are provided. They use the DNSSEC-aware
  640. validating resolver backend, and could use other advanced
  641. features of the BIND 9 libraries such as caching. The
  642. getaddrinfo() function resolves both A and AAAA RRs
  643. concurrently (when the address family is unspecified).</p></li>
  644. <li><p>An experimental framework to support other event
  645. libraries than BIND 9's internal event task system.</p></li>
  646. </ul></div>
  647. <div class="sect2" lang="en">
  648. <div class="titlepage"><div><div><h3 class="title">
  649. <a name="id2608280"></a>Prerequisite</h3></div></div></div>
  650. <p>GNU make is required to build the export libraries (other
  651. part of BIND 9 can still be built with other types of make). In
  652. the reminder of this document, "make" means GNU make. Note that
  653. in some platforms you may need to invoke a different command name
  654. than "make" (e.g. "gmake") to indicate it's GNU make.</p>
  655. </div>
  656. <div class="sect2" lang="en">
  657. <div class="titlepage"><div><div><h3 class="title">
  658. <a name="id2608290"></a>Compilation</h3></div></div></div>
  659. <pre class="screen">
  660. $ <strong class="userinput"><code>./configure --enable-exportlib <em class="replaceable"><code>[other flags]</code></em></code></strong>
  661. $ <strong class="userinput"><code>make</code></strong>
  662. </pre>
  663. <p>
  664. This will create (in addition to usual BIND 9 programs) and a
  665. separate set of libraries under the lib/export directory. For
  666. example, <code class="filename">lib/export/dns/libdns.a</code> is the archive file of the
  667. export version of the BIND 9 DNS library. Sample application
  668. programs using the libraries will also be built under the
  669. lib/export/samples directory (see below).</p>
  670. </div>
  671. <div class="sect2" lang="en">
  672. <div class="titlepage"><div><div><h3 class="title">
  673. <a name="id2608314"></a>Installation</h3></div></div></div>
  674. <pre class="screen">
  675. $ <strong class="userinput"><code>cd lib/export</code></strong>
  676. $ <strong class="userinput"><code>make install</code></strong>
  677. </pre>
  678. <p>
  679. This will install library object files under the directory
  680. specified by the --with-export-libdir configure option (default:
  681. EPREFIX/lib/bind9), and header files under the directory
  682. specified by the --with-export-includedir configure option
  683. (default: PREFIX/include/bind9).
  684. Root privilege is normally required.
  685. "<span><strong class="command">make install</strong></span>" at the top directory will do the
  686. same.
  687. </p>
  688. <p>
  689. To see how to build your own
  690. application after the installation, see
  691. <code class="filename">lib/export/samples/Makefile-postinstall.in</code>.</p>
  692. </div>
  693. <div class="sect2" lang="en">
  694. <div class="titlepage"><div><div><h3 class="title">
  695. <a name="id2608345"></a>Known Defects/Restrictions</h3></div></div></div>
  696. <div class="itemizedlist"><ul type="disc">
  697. <li><p>Currently, win32 is not supported for the export
  698. library. (Normal BIND 9 application can be built as
  699. before).</p></li>
  700. <li>
  701. <p>The "fixed" RRset order is not (currently) supported in
  702. the export library. If you want to use "fixed" RRset order
  703. for, e.g. <span><strong class="command">named</strong></span> while still building the
  704. export library even without the fixed order support, build
  705. them separately:
  706. </p>
  707. <pre class="screen">
  708. $ <strong class="userinput"><code>./configure --enable-fixed-rrset <em class="replaceable"><code>[other flags, but not --enable-exportlib]</code></em></code></strong>
  709. $ <strong class="userinput"><code>make</code></strong>
  710. $ <strong class="userinput"><code>./configure --enable-exportlib <em class="replaceable"><code>[other flags, but not --enable-fixed-rrset]</code></em></code></strong>
  711. $ <strong class="userinput"><code>cd lib/export</code></strong>
  712. $ <strong class="userinput"><code>make</code></strong>
  713. </pre>
  714. <p>
  715. </p>
  716. </li>
  717. <li><p>The client module and the IRS library currently do not
  718. support DNSSEC validation using DLV (the underlying modules
  719. can handle it, but there is no tunable interface to enable
  720. the feature).</p></li>
  721. <li><p>RFC 5011 is not supported in the validating stub
  722. resolver of the export library. In fact, it is not clear
  723. whether it should: trust anchors would be a system-wide
  724. configuration which would be managed by an administrator,
  725. while the stub resolver will be used by ordinary applications
  726. run by a normal user.</p></li>
  727. <li><p>Not all common <code class="filename">/etc/resolv.conf</code>
  728. options are supported
  729. in the IRS library. The only available options in this
  730. version are "debug" and "ndots".</p></li>
  731. </ul></div>
  732. </div>
  733. <div class="sect2" lang="en">
  734. <div class="titlepage"><div><div><h3 class="title">
  735. <a name="id2608422"></a>The dns.conf File</h3></div></div></div>
  736. <p>The IRS library supports an "advanced" configuration file
  737. related to the DNS library for configuration parameters that
  738. would be beyond the capability of the
  739. <code class="filename">resolv.conf</code> file.
  740. Specifically, it is intended to provide DNSSEC related
  741. configuration parameters. By default the path to this
  742. configuration file is <code class="filename">/etc/dns.conf</code>.
  743. This module is very
  744. experimental and the configuration syntax or library interfaces
  745. may change in future versions. Currently, only the
  746. <span><strong class="command">trusted-keys</strong></span>
  747. statement is supported, whose syntax is the same as the same name
  748. of statement for <code class="filename">named.conf</code>. (See
  749. <a href="Bv9ARM.ch06.html#trusted-keys" title="trusted-keys Statement Grammar">the section called &#8220;<span><strong class="command">trusted-keys</strong></span> Statement Grammar&#8221;</a> for details.)</p>
  750. </div>
  751. <div class="sect2" lang="en">
  752. <div class="titlepage"><div><div><h3 class="title">
  753. <a name="id2608449"></a>Sample Applications</h3></div></div></div>
  754. <p>Some sample application programs using this API are
  755. provided for reference. The following is a brief description of
  756. these applications.
  757. </p>
  758. <div class="sect3" lang="en">
  759. <div class="titlepage"><div><div><h4 class="title">
  760. <a name="id2608457"></a>sample: a simple stub resolver utility</h4></div></div></div>
  761. <p>
  762. It sends a query of a given name (of a given optional RR type) to a
  763. specified recursive server, and prints the result as a list of
  764. RRs. It can also act as a validating stub resolver if a trust
  765. anchor is given via a set of command line options.</p>
  766. <p>
  767. Usage: sample [options] server_address hostname
  768. </p>
  769. <p>
  770. Options and Arguments:
  771. </p>
  772. <div class="variablelist"><dl>
  773. <dt><span class="term">
  774. -t RRtype
  775. </span></dt>
  776. <dd><p>
  777. specify the RR type of the query. The default is the A RR.
  778. </p></dd>
  779. <dt><span class="term">
  780. [-a algorithm] [-e] -k keyname -K keystring
  781. </span></dt>
  782. <dd>
  783. <p>
  784. specify a command-line DNS key to validate the answer. For
  785. example, to specify the following DNSKEY of example.com:
  786. </p>
  787. <div class="literallayout"><p><br>
  788.                 example.com. 3600 IN DNSKEY 257 3 5 xxx<br>
  789. </p></div>
  790. <p>
  791. specify the options as follows:
  792. </p>
  793. <pre class="screen">
  794. <strong class="userinput"><code>
  795. -e -k example.com -K "xxx"
  796. </code></strong>
  797. </pre>
  798. <p>
  799. -e means that this key is a zone's "key signing key" (as known
  800. as "secure Entry point").
  801. When -a is omitted rsasha1 will be used by default.
  802. </p>
  803. </dd>
  804. <dt><span class="term">
  805. -s domain:alt_server_address
  806. </span></dt>
  807. <dd><p>
  808. specify a separate recursive server address for the specific
  809. "domain". Example: -s example.com:2001:db8::1234
  810. </p></dd>
  811. <dt><span class="term">server_address</span></dt>
  812. <dd><p>
  813. an IP(v4/v6) address of the recursive server to which queries
  814. are sent.
  815. </p></dd>
  816. <dt><span class="term">hostname</span></dt>
  817. <dd><p>
  818. the domain name for the query
  819. </p></dd>
  820. </dl></div>
  821. </div>
  822. <div class="sect3" lang="en">
  823. <div class="titlepage"><div><div><h4 class="title">
  824. <a name="id2608548"></a>sample-async: a simple stub resolver, working asynchronously</h4></div></div></div>
  825. <p>
  826. Similar to "sample", but accepts a list
  827. of (query) domain names as a separate file and resolves the names
  828. asynchronously.</p>
  829. <p>
  830. Usage: sample-async [-s server_address] [-t RR_type] input_file</p>
  831. <p>
  832. Options and Arguments:
  833. </p>
  834. <div class="variablelist"><dl>
  835. <dt><span class="term">
  836. -s server_address
  837. </span></dt>
  838. <dd>
  839. an IPv4 address of the recursive server to which queries are sent.
  840. (IPv6 addresses are not supported in this implementation)
  841. </dd>
  842. <dt><span class="term">
  843. -t RR_type
  844. </span></dt>
  845. <dd>
  846. specify the RR type of the queries. The default is the A
  847. RR.
  848. </dd>
  849. <dt><span class="term">
  850. input_file
  851. </span></dt>
  852. <dd>
  853. a list of domain names to be resolved. each line
  854. consists of a single domain name. Example:
  855. <div class="literallayout"><p><br>
  856.   www.example.com<br>
  857.   mx.examle.net<br>
  858.   ns.xxx.example<br>
  859. </p></div>
  860. </dd>
  861. </dl></div>
  862. </div>
  863. <div class="sect3" lang="en">
  864. <div class="titlepage"><div><div><h4 class="title">
  865. <a name="id2608601"></a>sample-request: a simple DNS transaction client</h4></div></div></div>
  866. <p>
  867. It sends a query to a specified server, and
  868. prints the response with minimal processing. It doesn't act as a
  869. "stub resolver": it stops the processing once it gets any
  870. response from the server, whether it's a referral or an alias
  871. (CNAME or DNAME) that would require further queries to get the
  872. ultimate answer. In other words, this utility acts as a very
  873. simplified <span><strong class="command">dig</strong></span>.
  874. </p>
  875. <p>
  876. Usage: sample-request [-t RRtype] server_address hostname
  877. </p>
  878. <p>
  879. Options and Arguments:
  880. </p>
  881. <div class="variablelist"><dl>
  882. <dt><span class="term">
  883. -t RRtype
  884. </span></dt>
  885. <dd><p>
  886. specify the RR type of
  887. the queries. The default is the A RR.
  888. </p></dd>
  889. <dt><span class="term">
  890. server_address
  891. </span></dt>
  892. <dd><p>
  893. an IP(v4/v6)
  894. address of the recursive server to which the query is sent.
  895. </p></dd>
  896. <dt><span class="term">
  897. hostname
  898. </span></dt>
  899. <dd><p>
  900. the domain name for the query
  901. </p></dd>
  902. </dl></div>
  903. </div>
  904. <div class="sect3" lang="en">
  905. <div class="titlepage"><div><div><h4 class="title">
  906. <a name="id2608733"></a>sample-gai: getaddrinfo() and getnameinfo() test code</h4></div></div></div>
  907. <p>
  908. This is a test program
  909. to check getaddrinfo() and getnameinfo() behavior. It takes a
  910. host name as an argument, calls getaddrinfo() with the given host
  911. name, and calls getnameinfo() with the resulting IP addresses
  912. returned by getaddrinfo(). If the dns.conf file exists and
  913. defines a trust anchor, the underlying resolver will act as a
  914. validating resolver, and getaddrinfo()/getnameinfo() will fail
  915. with an EAI_INSECUREDATA error when DNSSEC validation fails.
  916. </p>
  917. <p>
  918. Usage: sample-gai hostname
  919. </p>
  920. </div>
  921. <div class="sect3" lang="en">
  922. <div class="titlepage"><div><div><h4 class="title">
  923. <a name="id2608748"></a>sample-update: a simple dynamic update client program</h4></div></div></div>
  924. <p>
  925. It accepts a single update command as a
  926. command-line argument, sends an update request message to the
  927. authoritative server, and shows the response from the server. In
  928. other words, this is a simplified <span><strong class="command">nsupdate</strong></span>.
  929. </p>
  930. <p>
  931. Usage: sample-update [options] (add|delete) "update data"
  932. </p>
  933. <p>
  934. Options and Arguments:
  935. </p>
  936. <div class="variablelist"><dl>
  937. <dt><span class="term">
  938. -a auth_server
  939. </span></dt>
  940. <dd><p>
  941. An IP address of the authoritative server that has authority
  942. for the zone containing the update name. This should normally
  943. be the primary authoritative server that accepts dynamic
  944. updates. It can also be a secondary server that is configured
  945. to forward update requests to the primary server.
  946. </p></dd>
  947. <dt><span class="term">
  948. -k keyfile
  949. </span></dt>
  950. <dd><p>
  951. A TSIG key file to secure the update transaction. The keyfile
  952. format is the same as that for the nsupdate utility.
  953. </p></dd>
  954. <dt><span class="term">
  955. -p prerequisite
  956. </span></dt>
  957. <dd><p>
  958. A prerequisite for the update (only one prerequisite can be
  959. specified). The prerequisite format is the same as that is
  960. accepted by the nsupdate utility.
  961. </p></dd>
  962. <dt><span class="term">
  963. -r recursive_server
  964. </span></dt>
  965. <dd><p>
  966. An IP address of a recursive server that this utility will
  967. use. A recursive server may be necessary to identify the
  968. authoritative server address to which the update request is
  969. sent.
  970. </p></dd>
  971. <dt><span class="term">
  972. -z zonename
  973. </span></dt>
  974. <dd><p>
  975. The domain name of the zone that contains
  976. </p></dd>
  977. <dt><span class="term">
  978. (add|delete)
  979. </span></dt>
  980. <dd><p>
  981. Specify the type of update operation. Either "add" or "delete"
  982. must be specified.
  983. </p></dd>
  984. <dt><span class="term">
  985. "update data"
  986. </span></dt>
  987. <dd><p>
  988. Specify the data to be updated. A typical example of the data
  989. would look like "name TTL RRtype RDATA".
  990. </p></dd>
  991. </dl></div>
  992. <div class="note" style="margin-left: 0.5in; margin-right: 0.5in;">
  993. <h3 class="title">Note</h3>In practice, either -a or -r must be specified. Others can
  994. be optional; the underlying library routine tries to identify the
  995. appropriate server and the zone name for the update.</div>
  996. <p>
  997. Examples: assuming the primary authoritative server of the
  998. dynamic.example.com zone has an IPv6 address 2001:db8::1234,
  999. </p>
  1000. <pre class="screen">
  1001. $ <strong class="userinput"><code>sample-update -a sample-update -k Kxxx.+nnn+mmmm.key add "foo.dynamic.example.com 30 IN A 192.168.2.1"</code></strong></pre>
  1002. <p>
  1003. adds an A RR for foo.dynamic.example.com using the given key.
  1004. </p>
  1005. <pre class="screen">
  1006. $ <strong class="userinput"><code>sample-update -a sample-update -k Kxxx.+nnn+mmmm.key delete "foo.dynamic.example.com 30 IN A"</code></strong></pre>
  1007. <p>
  1008. removes all A RRs for foo.dynamic.example.com using the given key.
  1009. </p>
  1010. <pre class="screen">
  1011. $ <strong class="userinput"><code>sample-update -a sample-update -k Kxxx.+nnn+mmmm.key delete "foo.dynamic.example.com"</code></strong></pre>
  1012. <p>
  1013. removes all RRs for foo.dynamic.example.com using the given key.
  1014. </p>
  1015. </div>
  1016. <div class="sect3" lang="en">
  1017. <div class="titlepage"><div><div><h4 class="title">
  1018. <a name="id2609426"></a>nsprobe: domain/name server checker in terms of RFC 4074</h4></div></div></div>
  1019. <p>
  1020. It checks a set
  1021. of domains to see the name servers of the domains behave
  1022. correctly in terms of RFC 4074. This is included in the set of
  1023. sample programs to show how the export library can be used in a
  1024. DNS-related application.
  1025. </p>
  1026. <p>
  1027. Usage: nsprobe [-d] [-v [-v...]] [-c cache_address] [input_file]
  1028. </p>
  1029. <p>
  1030. Options
  1031. </p>
  1032. <div class="variablelist"><dl>
  1033. <dt><span class="term">
  1034. -d
  1035. </span></dt>
  1036. <dd><p>
  1037. run in the "debug" mode. with this option nsprobe will dump
  1038. every RRs it receives.
  1039. </p></dd>
  1040. <dt><span class="term">
  1041. -v
  1042. </span></dt>
  1043. <dd><p>
  1044. increase verbosity of other normal log messages. This can be
  1045. specified multiple times
  1046. </p></dd>
  1047. <dt><span class="term">
  1048. -c cache_address
  1049. </span></dt>
  1050. <dd><p>
  1051. specify an IP address of a recursive (caching) name server.
  1052. nsprobe uses this server to get the NS RRset of each domain and
  1053. the A and/or AAAA RRsets for the name servers. The default
  1054. value is 127.0.0.1.
  1055. </p></dd>
  1056. <dt><span class="term">
  1057. input_file
  1058. </span></dt>
  1059. <dd><p>
  1060. a file name containing a list of domain (zone) names to be
  1061. probed. when omitted the standard input will be used. Each
  1062. line of the input file specifies a single domain name such as
  1063. "example.com". In general this domain name must be the apex
  1064. name of some DNS zone (unlike normal "host names" such as
  1065. "www.example.com"). nsprobe first identifies the NS RRsets for
  1066. the given domain name, and sends A and AAAA queries to these
  1067. servers for some "widely used" names under the zone;
  1068. specifically, adding "www" and "ftp" to the zone name.
  1069. </p></dd>
  1070. </dl></div>
  1071. </div>
  1072. </div>
  1073. <div class="sect2" lang="en">
  1074. <div class="titlepage"><div><div><h3 class="title">
  1075. <a name="id2609490"></a>Library References</h3></div></div></div>
  1076. <p>As of this writing, there is no formal "manual" of the
  1077. libraries, except this document, header files (some of them
  1078. provide pretty detailed explanations), and sample application
  1079. programs.</p>
  1080. </div>
  1081. </div>
  1082. </div>
  1083. <div class="navfooter">
  1084. <hr>
  1085. <table width="100%" summary="Navigation footer">
  1086. <tr>
  1087. <td width="40%" align="left">
  1088. <a accesskey="p" href="Bv9ARM.ch08.html">Prev</a> </td>
  1089. <td width="20%" align="center"> </td>
  1090. <td width="40%" align="right"> <a accesskey="n" href="Bv9ARM.ch10.html">Next</a>
  1091. </td>
  1092. </tr>
  1093. <tr>
  1094. <td width="40%" align="left" valign="top">Chapter 8. Troubleshooting </td>
  1095. <td width="20%" align="center"><a accesskey="h" href="Bv9ARM.html">Home</a></td>
  1096. <td width="40%" align="right" valign="top"> Manual pages</td>
  1097. </tr>
  1098. </table>
  1099. </div>
  1100. </body>
  1101. </html>