rfc3007.Secure Domain Name System (DNS) Dynamic Update

合集下载

DNS大全

DNS大全

DNS大全DNS(Domain Name System)是域名解析服务器的意思,它在互联网的作用是把域名转换成为网络可以识别的IP地址。

目前国内电信运营商通过使用DNS劫持的方法,干扰用户正常上网,使得用户无法访问Google、Gmail、Google AdSense、Google Maps等常用服务,介绍一些其他国外的DNS服务器地址,供大家选择。

通常来说,香港、韩国、日本等国的DNS服务器速度会比较快,大家可以多用几个试试,尽量选择一个自己访问最快的DNS服务器,中国的电信运营商都是流氓,DNS服务器,早换早轻松。

港澳台DNS服务器地址香港:205.252.144.228208.151.69.65202.181.202.140202.181.224.2澳门:202.175.3.8202.175.3.3台湾:168.95.192.1168.95.1.1国外DNS服务器地址美国:208.67.222.222208.67.220.220165.87.13.129165.87.201.244205.171.3.65205.171.2.65198.41.0.4198.41.0.4198.32.64.12192.33.4.12192.203.230.10192.5.5.241192.112.36.4192.36.148.17192.58.128.30192.9.9.3193.0.14.129128.9.0.107128.8.10.9066.33.206.206.208.96.10.22166.33.216.216205.171.3.65205.171.2.65165.87.13.129165.87.201.244加拿大:209.166.160.36209.166.160.132英国:193.0.14.129日本202.12.27.33202.216.228.18韩国:164.124.101.31203.248.240.31168.126.63.60168.126.63.61新西兰:202.27.184.3泰国:209.166.160.132202.44.8.34202.44.8.2印度:202.138.103.100202.138.96.2国内各省市DNS服务器地址北京:202.96.199.133 202.96.0.133 202.106.0.20 202.106.148.1 202.97.16.195 202.138.96.2深圳:202.96.134.133 202.96.154.15广州:61.144.56.100 61.144.56.101广东:202.96.128.86 202.96.128.143上海:202.96.199.132 202.96.199.133 202.96.209.5 202.96.209.133天津:202.99.96.68 202.99.104.68广西:202.96.128.68 202.103.224.68 202.103.225.68河南:202.102.227.68 202.102.245.12 202.102.224.68河北:202.99.160.68福建:202.101.98.54 202.101.98.55厦门:202.101.103.55 202.101.103.54湖南:202.103.0.68 202.103.96.68 202.103.96.112湖北:202.103.0.68 202.103.0.117 202.103.24.68江苏:202.102.15.162 202.102.29.3 202.102.13.141 202.102.24.35浙江:202.96.102.3 202.96.96.68 202.96.104.18陕西:202.100.13.11 202.100.4.16 202.100.4.15 202.100.0.68山东:202.102.154.3 202.102.152.3 202.102.128.68 202.102.134.68山西:202.99.192.68 202.99.198.6四川:202.98.96.68 61.139.2.69重庆:61.128.128.68成都:202.98.96.68 202.98.96.69辽宁:202.98.0.68 202.96.75.68 202.96.75.64 202.96.69.38 202.96.86.18 202.96.86.24安徽:202.102.192.68 202.102.199.68 10.89.64.5吉林:202.98.5.68 202.98.14.18 202.98.14.19江西:202.101.224.68 202.109.129.2 202.101.240.36新疆:61.128.97.74 61.128.97.73贵州:202.98.192.68 10.157.2.15云南:202.98.96.68202.98.160.68黑龙江:202.97.229.133202.97.224.68219.150.32.132海南:202.100.192.68202.100.199.8宁夏:202.100.0.68202.100.96.68甘肃:202.100.72.13内蒙古:202.99.224.68青海:202.100.128.68全球路由DNS服务器全球只有13台路由DNS根服务器,在13台路由服务器中,名字分别为“A”至“M”,其中10台设置在美国,另外各有一台设置于英国、瑞典和日本。

江西省专升本试题参考答案(模拟+真题)

江西省专升本试题参考答案(模拟+真题)

模拟试卷(一)参考答案一、单项选择题(每题1分,共20分)1-5 CBBBD2主要性能指标:字长:计算机一次所处理的位数,CPU字长越长,表示他的功能越强。

主频:CPU工作的节拍是由主时钟控制的,主频越高,CPU的工作节拍越快主存容量:主存容量越大,处理问题能力越强。

存取周期:是指CPU进行一次读或写所需的时间。

运算速度:是指每秒钟所执行的指令。

常用百万条指令/秒作单位(MIPS)软硬件配置性能价格比外设扩展能力3、与110000000比较6-10 ACCCC7 800*600*7位 128需要7为二进制存储11-15 DAABD11、PowerPoint提供了普通视图、幻灯片视图、大纲视图、幻灯片浏览视图、备注页视图和幻灯片放映视图等6种视图模式。

普通视图采用三框式画面显示大纲、幻灯片和备注,以方便浏览与编辑。

幻灯片视图含有大纲窗格和幻灯片窗格,每个窗格的功用与普通视图相同。

在幻灯片窗格中只显示一张当前的幻灯片,主要用来对演示文稿中的每一张幻灯片进行详细的设计和编辑。

在此视图下,可以直接看到幻灯片的静态设计效果。

大纲视图含有大纲窗格、幻灯片缩图窗格和幻灯片备注页窗格。

在大纲窗格中显示演示文稿的文本内容和组织结构,不显示图形、图像、图表等对象。

在大纲视图下编辑演示文稿,可以调整各幻灯片的前后顺序;在一张幻灯片内可以调整标题的层次级别和前后次序;可以将某幻灯片的文本复制或移动到其他幻灯片中。

在幻灯片浏览视图中,按幻灯片序号顺序显示演示文稿中全部幻灯片的缩图。

在幻灯片浏览视图下,可以复制、删除幻灯片,调整幻灯片的顺序,但不能对个别幻灯片的内容进行编辑、修改。

双击某一选定的幻灯片缩图可以切换到显示此幻灯片的幻灯片视图模式。

12、计算指的是算数计算,就是考察优先级14、搜索引擎,通常指的是收集了因特网上几千万到几十亿个网页并对网页中的每一个词(即关键词)进行索引,建立索引数据库的全文搜索引擎。

当用户查找某个关键词的时候,所有在页面内容中包含了该关键词的网页都将作为搜索结果被搜出来。

下一代DNS系统Foundation介绍

下一代DNS系统Foundation介绍

下一代DNS系统Foundation介绍(Nominum)DNS(Domain Name System)是Internet中一个非常重要的部分,在TCP/IP 的世界中,都是以IP 地址识别主机,虽然这种表示方法适合路由器等来使用,但是并不适合人们去记忆,因此,一般来说,网络中的主机都被指定了一个独一无二的名称,也就是域名(Domain Name)。

然而这又带来了另外一个问题,这些名称不易为路由器等处理,也不含可找到主机的位置信息。

所以需要一种系统在IP地址和机器的名称间建立一种对应关系,DNS系统也就应运而生了。

当然在早期的时候,并没有很复杂,只是在一台中央授权机器上建立名称与IP地址的对应关系。

到了80年代中期,DNS才真正发展起来,目前在全球所采用的DNS大多都是由ISC (Internet Software Consortium)发布的BIND(Berkeley Internet Name Domain)。

但是由于先天性的原因,BIND系统有着很多无法克服的问题。

全球领先的DNS方案提供商Nominum 在其经验和倾听了很多用户意见的基础上,推出了下一代的DNS系统Foundation,按功能划分,该系统包括CNS(Caching Name Server)、ANS(Authoritative Name Server)和FMC (Foundation Management Center),目前已经被世界众多知名电信公司和企业所采用。

一 BIND的问题作为一款公开代码的DNS服务程序,BIND在现行的DNS的系统中,得到了的非常广泛的使用。

Nominum公司在2000年九月向ISC发布了BIND 9.0,到2003中期,大约三分之一的主要英特网连接的DNS 服务器都运行BIND 9。

BIND 9 被事实证明的确比BIND 8更好,包括提高了安全性、可维护性、以及向对BIND 8的兼容性等。

但是随着网络迅速的发展,人们不断的发现BIND已经不适应在如今复杂的网络环境下提供DNS服务了。

DNS服务器配置使用 及全国DNS地址大全

DNS服务器配置使用 及全国DNS地址大全

DNS服务器配置使用及全国DNS地址大全一、DNS的由来:DNS的全称是Domain Name System当您连上一个网址在UR里打上的时候可以说就是使用了DNS的服务了。

但如果您知道这个的IP地址直接输入220.181.6.19也同样可以到达这个网址。

其实电脑使用的只是IP地址而已(最终也是0和1啦)这个只是让人们容易记忆而设的。

因为我们人类对一些比较有意义的文字记忆(如)比记忆那些毫无头绪的号码(如220.181.6.19)往往容易得多。

DNS的作用就是为我们在文字和IP之间担当了翻译而免除了强记号码的痛苦。

在早期的IP网路世界里面每台电脑都只用IP地址来表示不久人们就发现这样很难记忆於是一些UNIX的使用者就建立一个HOSTS对应表将IP和主机名字对应起来这样用户只需输入电脑名字就可以代替IP来进行沟通了。

如果你安装了Linux系统在/etc下面就可以找到这个hosts档案了在NT的系统里你也可以在\winnt\system32\drivers\etc下面找到它。

不过这个HOSTS档是要由管理者手工维护的最大的问题是无法适用於大型网路而且更新也是件非常头痛的事情。

这就是DNS大派用场的时候了。

补充:知道网址,在DOS下用什么命令查到对应的IP呀?[例如:查询:]用ping命令是可以的。

执行结果如下:D:\》ping Pinging [220.181.6.19]with 32 bytes of data:Reply from 220.181.6.19:bytes=32 time=20ms TTL=53 Reply from 220.181.6.19:bytes=32 time=10ms TTL=53 Reply from 220.181.6.19:bytes=32 time=20ms TTL=53 Reply from 220.181.6.19:bytes=32 time=10ms TTL=53 Ping statistics for 220.181.6.1:Packets:Sent = 4,Received = 4,Lost = 0 (0% loss),Approximate round trip times in milli-seconds:Minimum = 34ms,Maximum = 36ms,Average = 35ms 从上面可以看出,的IP是220.181.6.1。

域名系统中常见的错误类型与解决方法(七)

域名系统中常见的错误类型与解决方法(七)

域名系统中常见的错误类型与解决方法引言:互联网的快速发展给我们的日常生活带来了很多便利,而域名系统(Domain Name System,简称DNS)作为互联网的基础设施之一,起到了非常重要的作用。

然而,由于各种原因,域名系统在使用过程中常常会出现错误,给用户带来不便。

本文将从常见的错误类型和解决方法两个方面来探讨如何有效应对这些问题。

一、域名解析错误域名未注册:当我们在浏览器中输入一个未注册的域名时,浏览器会提示“无法找到该网页”的错误。

这意味着该域名尚未被注册,无法被解析为对应的IP地址。

解决方法:检查域名是否正确,若正确,可尝试重新输入或者联系域名注册商进行咨询和注册。

域名解析错误:有时候,我们的域名已经注册且存在,但在解析时仍然出现错误,浏览器会显示“DNS解析失败”或“服务器找不到”的错误。

解决方法:首先,检查网络连接是否正常,尝试刷新页面或清除浏览器缓存。

如果问题仍然存在,可以尝试使用其他DNS服务器进行解析,比如谷歌的公共DNS服务器或阿里云的DNS服务。

二、域名转发错误域名转发错误:有时候,我们在配置域名转发时,可能会出现错误导致域名无法正确跳转到指定的网站。

解决方法:首先,检查域名转发配置是否正确,确认转发目标URL是否准确。

如果配置无误,但问题仍然存在,可以尝试暂时取消转发功能,等待DNS服务器更新后再重新配置。

301重定向错误:在进行网站迁移或改版时,我们通常使用301重定向将旧域名指向新域名,但有时候重定向并没有生效。

解决方法:检查重定向配置是否正确,确保重定向代码是否正确放置在.htaccess文件中(如果使用Apache服务器)。

如果依然无法解决,可以联系域名提供商或服务器托管方寻求技术支持。

三、域名劫持与防护DNS劫持:DNS劫持是指黑客或恶意软件篡改了DNS解析结果,使得用户在访问某个网站时被导向到错误的页面,从而进行欺诈等活动。

解决方法:可以尝试更改DNS服务器地址为可信的服务器,或使用DNS加密服务提高安全性。

name or service not known异常处理方法总结 -回复

name or service not known异常处理方法总结 -回复

name or service not known异常处理方法总结-回复关于“[name or service not known]异常处理方法总结”的问题,以下将逐步回答和解答问题。

首先,[name or service not known]异常通常指的是无法解析域名或者服务名。

当计算机在尝试解析域名或服务名时,如果发现无法找到相应的资源或服务器,则会抛出此异常。

这可能是由于网络配置问题、DNS 服务器故障、主机不可达等原因导致的。

接下来,我们将通过以下步骤来解决此异常:1. 检查网络连接:首先,确保计算机的网络连接正常。

可以尝试通过ping命令或者访问其他网站来检查是否能够成功连接到互联网。

如果网络连接存在问题,则需要调查和解决网络故障,例如检查网络配置、重启路由器等。

2. 检查DNS设置:DNS(Domain Name System)用于将域名转换为IP地址。

当计算机无法解析域名时,可能是由于DNS设置不正确或者DNS服务器故障导致的。

可以通过以下方法来解决DNS相关问题:- 检查DNS服务器设置:在Windows系统中,可以通过查看“网络和共享中心”中的网络适配器设置,确保DNS服务器设置正确。

在Linux 系统中,可以查看“/etc/resolv.conf”文件来确认DNS服务器设置正确。

- 更换DNS服务器:如果DNS服务器故障或者无法正常工作,可以尝试使用其他公共的DNS服务器,例如Google的8.8.8.8和8.8.4.4,或者OpenDNS的208.67.222.222和208.67.220.220。

3. 检查主机可达性:当计算机无法解析服务名时,可能是因为目标主机不可达或者网络路径中间存在故障导致的。

可以通过以下方法来解决主机不可达的问题:- 检查目标主机的网络连接:确保目标主机的网络连接正常。

可以尝试通过ping命令或者访问该主机的其他服务来检查是否能够成功连接到目标主机。

DNSSEC原理及实践

DNSSEC原理及实践

DNSSEC原理及实践DNSSEC(Domain Name System Security Extensions)是一种用于域名系统的安全扩展,它可以提供数据完整性、认证和防止DNS缓存中毒等功能。

在DNSSEC中,使用了公钥加密的技术来对域名解析返回的数据进行签名,以确保数据的完整性和可信性。

1.首先,域名的注册人需要在域名注册处申请并获取DNSSEC的公钥。

这个公钥会被发布到DNS的区域文件中。

2.当用户发起DNS请求时,DNS服务器首先会返回一个NS记录,以指示域名的权威DNS服务器。

3.客户端接下来会向权威DNS服务器发送DNS请求,请求域名的资源记录。

4.权威DNS服务器会对请求的资源记录进行签名,并返回签名过的资源记录给客户端。

5.客户端收到响应后,会使用DNSSEC公钥验证服务器返回的签名,以确保数据的完整性和可信性。

实践上,为了实现DNSSEC,以下是一些常见的步骤:1.在注册商处进行DNSSEC配置:首先需要登录域名注册商提供的控制面板,找到DNSSEC配置选项。

在这里,注册人可以启用DNSSEC并获取公钥。

2. 生成公私钥对:公私钥对是用于对域名解析返回的数据进行签名和验证的,可以使用一些工具生成公私钥对。

常见的工具包括OpenSSL和BIND DNS软件套件。

3.将公钥添加到DNS区域文件:注册人将获取到的公钥添加到DNS区域文件中,并发布到DNS服务器上。

这样,在查询域名时,服务器就会返回被签名过的DNS记录。

4.配置验证链:为了确保DNSSEC的可信性,需要配置DNS验证链(DS记录)。

注册人需要将公钥的散列值添加到顶级域名服务器的验证链中。

5.配置注册人验证:注册人还需要配置总DNS服务器的验证。

这样,当DNS查询请求到达总DNS服务器时,服务器可以使用私钥对响应进行签名。

需要注意的是,为了实现完整的DNSSEC,必须在域名的所有层次上都配置验证链。

这包括顶级域名服务器、次级域名服务器以及权威DNS服务器。

CISCO官方配置手册IPV6-DHCP

CISCO官方配置手册IPV6-DHCP
Finding Support Information for Platforms and Cisco IOS and Catalyst OS Software Images Use Cisco Feature Navigator to find information about platform support and Cisco IOS and Catalyst OS software image support. To access Cisco Feature Navigator, go to /go/cfn. An account on is not required.
Implementing IPv6 for Cisco IOS Software
22
Implementing DHCP for IPv6
Information About Implementing DHCP for IPv6

Client and Server Identification
Each DHCP for IPv6 client and server is identified by a DHCP unique identifier (DUID). The DUID is carried in the client identifier and server identifier options. The DUID is unique across all DHCP clients and servers, and it is stable for any specific client or server. DHCP for IPv6 uses DUIDs based on link-layer addresses for both the client and server identifier. The device uses the MAC address from the lowest-numbered interface to form the DUID. The network interface is assumed to be permanently attached to the device.
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Network Working Group B. Wellington Request for Comments: 3007 Nominum Updates: 2535, 2136 November 2000 Obsoletes: 2137Category: Standards TrackSecure Domain Name System (DNS) Dynamic UpdateStatus of this MemoThis document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions forimprovements. Please refer to the current edition of the "InternetOfficial Protocol Standards" (STD 1) for the standardization stateand status of this protocol. Distribution of this memo is unlimited. Copyright NoticeCopyright (C) The Internet Society (2000). All Rights Reserved. AbstractThis document proposes a method for performing secure Domain NameSystem (DNS) dynamic updates. The method described here is intended to be flexible and useful while requiring as few changes to theprotocol as possible. The authentication of the dynamic updatemessage is separate from later DNSSEC validation of the data. Secure communication based on authenticated requests and transactions isused to provide authorization.The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT","SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119 [RFC2119].1 - IntroductionThis document defines a means to secure dynamic updates of the Domain Name System (DNS), allowing only authorized sources to make changesto a zone’s contents. The existing unsecured dynamic updateoperations form the basis for this work.Familiarity with the DNS system [RFC1034, RFC1035] and dynamic update [RFC2136] is helpful and is assumed by this document. In addition,knowledge of DNS security extensions [RFC2535], SIG(0) transactionsecurity [RFC2535, RFC2931], and TSIG transaction security [RFC2845] is recommended.Wellington Standards Track [Page 1]This document updates portions of RFC 2535, in particular section3.1.2, and RFC 2136. This document obsoletes RFC 2137, an alternate proposal for secure dynamic update, due to implementation experience.1.1 - Overview of DNS Dynamic UpdateDNS dynamic update defines a new DNS opcode and a new interpretation of the DNS message if that opcode is used. An update can specifyinsertions or deletions of data, along with prerequisites necessaryfor the updates to occur. All tests and changes for a DNS updaterequest are restricted to a single zone, and are performed at theprimary server for the zone. The primary server for a dynamic zonemust increment the zone SOA serial number when an update occurs orbefore the next retrieval of the SOA.1.2 - Overview of DNS Transaction SecurityExchanges of DNS messages which include TSIG [RFC2845] or SIG(0)[RFC2535, RFC2931] records allow two DNS entities to authenticate DNS requests and responses sent between them. A TSIG MAC (messageauthentication code) is derived from a shared secret, and a SIG(0) is generated from a private key whose public counterpart is stored inDNS. In both cases, a record containing the message signature/MAC is included as the final resource record in a DNS message. Keyedhashes, used in TSIG, are inexpensive to calculate and verify.Public key encryption, as used in SIG(0), is more scalable as thepublic keys are stored in DNS.1.3 - Comparison of data authentication and message authenticationMessage based authentication, using TSIG or SIG(0), providesprotection for the entire message with a single signing and singleverification which, in the case of TSIG, is a relatively inexpensive MAC creation and check. For update requests, this signature canestablish, based on policy or key negotiation, the authority to make the request.DNSSEC SIG records can be used to protect the integrity of individual RRs or RRsets in a DNS message with the authority of the zone owner. However, this cannot sufficiently protect the dynamic update request. Using SIG records to secure RRsets in an update request isincompatible with the design of update, as described below, and would in any case require multiple expensive public key signatures andverifications.Wellington Standards Track [Page 2]SIG records do not cover the message header, which includes recordcounts. Therefore, it is possible to maliciously insert or removeRRsets in an update request without causing a verification failure.If SIG records were used to protect the prerequisite section, itwould be impossible to determine whether the SIGs themselves were aprerequisite or simply used for validation.In the update section of an update request, signing requests to addan RRset is straightforward, and this signature could be permanently used to protect the data, as specified in [RFC2535]. However, if an RRset is deleted, there is no data for a SIG to cover.1.4 - Data and message signaturesAs specified in [RFC3008], the DNSSEC validation process performed by a resolver MUST NOT process any non-zone keys unless local policydictates otherwise. When performing secure dynamic update, all zone data modified in a signed zone MUST be signed by a relevant zone key. This completely disassociates authentication of an update requestfrom authentication of the data itself.The primary usefulness of host and user keys, with respect to DNSSEC, is to authenticate messages, including dynamic updates. Thus, hostand user keys MAY be used to generate SIG(0) records to authenticate updates and MAY be used in the TKEY [RFC2930] process to generateTSIG shared secrets. In both cases, no SIG records generated bynon-zone keys will be used in a DNSSEC validation process unlesslocal policy dictates.Authentication of data, once it is present in DNS, only involvesDNSSEC zone keys and signatures generated by them.1.5 - Signatory strength[RFC2535, section 3.1.2] defines the signatory field of a key as the final 4 bits of the flags field, but does not define its value. This proposal leaves this field undefined. Updating [RFC2535], this field SHOULD be set to 0 in KEY records, and MUST be ignored.2 - AuthenticationTSIG or SIG(0) records MUST be included in all secure dynamic update messages. This allows the server to verifiably determine theoriginator of a message. If the message contains authentication inthe form of a SIG(0), the identity of the sender (that is, theprincipal) is the owner of the KEY RR that generated the SIG(0). If the message contains a TSIG generated by a statically configured Wellington Standards Track [Page 3]shared secret, the principal is the same as or derived from theshared secret name. If the message contains a TSIG generated by adynamically configured shared secret, the principal is the same asthe one that authenticated the TKEY process; if the TKEY process was unauthenticated, no information is known about the principal, and the associated TSIG shared secret MUST NOT be used for secure dynamicupdate.SIG(0) signatures SHOULD NOT be generated by zone keys, sincetransactions are initiated by a host or user, not a zone.DNSSEC SIG records (other than SIG(0)) MAY be included in an updatemessage, but MUST NOT be used to authenticate the update request.If an update fails because it is signed with an unauthorized key, the server MUST indicate failure by returning a message with RCODEREFUSED. Other TSIG, SIG(0), or dynamic update errors are returnedas specified in the appropriate protocol description.3 - PolicyAll policy is configured by the zone administrator and enforced bythe zone’s primary name server. Policy dictates the authorizedactions that an authenticated principal can take. Policy checks are based on the principal and the desired action, where the principal is derived from the message signing key and applied to dynamic updatemessages signed with that key.The server’s policy defines criteria which determine if the key used to sign the update is permitted to perform the requested updates. By default, a principal MUST NOT be permitted to make any changes tozone data; any permissions MUST be enabled though configuration.The policy is fully implemented in the primary zone server’sconfiguration for several reasons. This removes limitations imposed by encoding policy into a fixed number of bits (such as the KEY RR’s signatory field). Policy is only relevant in the server applying it, so there is no reason to expose it. Finally, a change in policy or a new type of policy should not affect the DNS protocol or data format, and should not cause interoperability failures.3.1 - Standard policiesImplementations SHOULD allow access control policies to use theprincipal as an authorization token, and MAY also allow policies togrant permission to a signed message regardless of principal. Wellington Standards Track [Page 4]A common practice would be to restrict the permissions of a principal by domain name. That is, a principal could be permitted to add,delete, or modify entries corresponding to one or more domain names. Implementations SHOULD allow per-name access control, and SHOULDprovide a concise representation of the principal’s own name, itssubdomains, and all names in the zone.Additionally, a server SHOULD allow restricting updates by RR type,so that a principal could add, delete, or modify specific recordtypes at certain names. Implementations SHOULD allow per-type access control, and SHOULD provide concise representations of all types and all "user" types, where a user type is defined as one that does notaffect the operation of DNS itself.3.1.1 - User typesUser types include all data types except SOA, NS, SIG, and NXT. SOA and NS records SHOULD NOT be modified by normal users, since thesetypes create or modify delegation points. The addition of SIGrecords can lead to attacks resulting in additional workload forresolvers, and the deletion of SIG records could lead to extra workfor the server if the zone SIG was deleted. Note that these records are not forbidden, but not recommended for normal users.NXT records MUST NOT be created, modified, or deleted by dynamicupdate, as their update may cause instability in the protocol. This is an update to RFC 2136.Issues concerning updates of KEY records are discussed in theSecurity Considerations section.3.2 - Additional policiesUsers are free to implement any policies. Policies may be asspecific or general as desired, and as complex as desired. They may depend on the principal or any other characteristics of the signedmessage.4 - Interaction with DNSSECAlthough this protocol does not change the way updates to securezones are processed, there are a number of issues that should beclarified.Wellington Standards Track [Page 5]4.1 - Adding SIGsAn authorized update request MAY include SIG records with each RRset. Since SIG records (except SIG(0) records) MUST NOT be used forauthentication of the update message, they are not required.If a principal is authorized to update SIG records and there are SIG records in the update, the SIG records are added withoutverification. The server MAY examine SIG records and drop SIGs witha temporal validity period in the past.4.2 - Deleting SIGsIf a principal is authorized to update SIG records and the updatespecifies the deletion of SIG records, the server MAY choose tooverride the authority and refuse the update. For example, theserver may allow all SIG records not generated by a zone key to bedeleted.4.3 - Non-explicit updates to SIGsIf the updated zone is secured, the RRset affected by an updateoperation MUST, at the completion of the update, be signed inaccordance with the zone’s signing policy. This will usually require one or more SIG records to be generated by one or more zone keyswhose private components MUST be online [RFC3008].When the contents of an RRset are updated, the server MAY delete all associated SIG records, since they will no longer be valid.4.4 - Effects on the zoneIf any changes are made, the server MUST, if necessary, generate anew SOA record and new NXT records, and sign these with theappropriate zone keys. Changes to NXT records by secure dynamicupdate are explicitly forbidden. SOA updates are allowed, since the maintenance of SOA parameters is outside of the scope of the DNSprotocol.5 - Security ConsiderationsThis document requires that a zone key and possibly othercryptographic secret material be held in an on-line, network-connected host, most likely a name server. This material is at themercy of host security to remain a secret. Exposing this secret puts DNS data at risk of masquerade attacks. The data at risk is that in both zones served by the machine and delegated from this machine. Wellington Standards Track [Page 6]Allowing updates of KEY records may lead to undesirable results,since a principal may be allowed to insert a public key withoutholding the private key, and possibly masquerade as the key owner.6 - AcknowledgementsThe author would like to thank the following people for review andinformative comments (in alphabetical order):Harald AlvestrandDonald EastlakeOlafur GudmundssonAndreas GustafssonBob HalleyStuart KwanEd Lewis7 - References[RFC1034] Mockapetris, P., "Domain Names - Concepts and Facilities", STD 13, RFC 1034, November 1987.[RFC1035] Mockapetris, P., "Domain Names - Implementation andSpecification", STD 13, RFC 1035, November 1987.[RFC2136] Vixie (Ed.), P., Thomson, S., Rekhter, Y. and J. Bound,"Dynamic Updates in the Domain Name System", RFC 2136,April 1997.[RFC2137] Eastlake, D., "Secure Domain Name System Dynamic Update", RFC 2137, April 1997.[RFC2535] Eastlake, G., "Domain Name System Security Extensions",RFC 2535, March 1999.[RFC2845] Vixie, P., Gudmundsson, O., Eastlake, D. and B.Wellington, "Secret Key Transaction Signatures for DNS(TSIG)", RFC 2845, May 2000.[RFC2930] Eastlake, D., "Secret Key Establishment for DNS (TKEYRR)", RFC 2930, September 2000.[RFC2931] Eastlake, D., "DNS Request and Transaction Signatures(SIG(0)s)", RFC 2931, September 2000.[RFC3008] Wellington, B., "Domain Name System Security (DNSSEC)Signing Authority", RFC 3008, November 2000.Wellington Standards Track [Page 7]8 - Author’s AddressBrian WellingtonNominum, Inc.950 Charter StreetRedwood City, CA 94063Phone: +1 650 381 6022EMail: Brian.Wellington@Wellington Standards Track [Page 8]9. Full Copyright StatementCopyright (C) The Internet Society (2000). All Rights Reserved.This document and translations of it may be copied and furnished toothers, and derivative works that comment on or otherwise explain it or assist in its implementation may be prepared, copied, publishedand distributed, in whole or in part, without restriction of anykind, provided that the above copyright notice and this paragraph are included on all such copies and derivative works. However, thisdocument itself may not be modified in any way, such as by removingthe copyright notice or references to the Internet Society or otherInternet organizations, except as needed for the purpose ofdeveloping Internet standards in which case the procedures forcopyrights defined in the Internet Standards process must befollowed, or as required to translate it into languages other thanEnglish.The limited permissions granted above are perpetual and will not berevoked by the Internet Society or its successors or assigns.This document and the information contained herein is provided on an "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERINGTASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDINGBUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATIONHEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OFMERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.AcknowledgementFunding for the RFC Editor function is currently provided by theInternet Society.Wellington Standards Track [Page 9]。

相关文档
最新文档