Tweak recent additions to the ARM

This commit is contained in:
Michał Kępień
2021-12-06 15:51:24 +01:00
committed by Petr Špaček
parent 135c324311
commit 2c628b792c

View File

@@ -2100,15 +2100,16 @@ Boolean Options
default is ``no``. Setting this option to ``yes`` leaves ``named``
vulnerable to replay attacks.
.. _reject_000_label:
``reject-000-label``
This can be used to control whether NSEC records which have the
``next`` field starting with the ``\\000`` label are cached for
``synth-from-dnssec``. There are a number of DNSSEC implementations
that generate bad NSEC type maps where the ``next`` field starts with
the ``\\000`` label and between BIND 9.18 and BIND 9.20 there will be
a campaign to get these servers corrected. In BIND 9.18 this defaults
to ``yes``. In BIND 9.20 (BIND 9.19) this will default to ``no`` and
in BIND 9.22 (BIND 9.21) this option will be removed.
This controls whether NSEC records whose Next Owner Name field starts
with a ``\000`` label are cached for use by the ``synth-from-dnssec``
feature. The default is ``yes``, which means these records are not
used for negative response synthesis. This is a temporary measure to
improve interoperability with authoritative servers that generate
incorrect NSEC records. The default value of this option may change
in a future release, or it may be removed altogether.
``querylog``
Query logging provides a complete log of all incoming queries and all query
@@ -2256,19 +2257,11 @@ Boolean Options
have been proved to be correct using DNSSEC.
The default is ``yes``.
``server <prefix> { broken-nsec yes; };`` can be used to stop
named caching broken NSEC records from negative responses from servers
that emit broken NSEC records with missing types that actually exist.
``reject-000-label`` can be used to control whether NSEC records
which have the ``next`` field starting with the ``\\000`` label
are cached for ``synth-from-dnssec``. There are a number of
DNSSEC implementations that generate bad NSEC type maps where
the ``next`` field starts with the ``\\000`` label and between
BIND 9.18 and BIND 9.20 there will be a campaign to get these
servers corrected. In BIND 9.18 this defaults to ``yes``. In
BIND 9.20 (BIND 9.19) this will default to ``no`` and in BIND 9.22
(BIND 9.21) this option will be removed.
The ``reject-000-label`` :ref:`option <reject_000_label>` and the
``broken-nsec`` :ref:`server configuration clause
<server_broken_nsec>` can be used to prevent broken NSEC records from
causing incorrect negative responses to be synthesized when
``synth-from-dnssec`` is set to ``yes``.
.. note:: DNSSEC validation must be enabled for this option to be effective.
This initial implementation only covers synthesis of answers from
@@ -2443,13 +2436,16 @@ for details on how to specify IP address lists.
statement set in ``options`` or ``view``. If not specified, the
default is to allow transfers to all hosts.
The transport level limitations can also be specified. In
particular, zone transfers can be restricted to a specific port and
DNS transport protocol by using the options ``port`` and
``transport``. Zone transfers are currently only possible via the
TCP and TLS transports; either option can be specified.
The transport level limitations can also be specified. In particular,
zone transfers can be restricted to a specific port and/or DNS
transport protocol by using the options ``port`` and ``transport``.
Either option can be specified; if both are used, both constraints
must be satisfied in order for the transfer to be allowed. Zone
transfers are currently only possible via the TCP and TLS transports.
For example: ``allow-transfer port 853 transport tls { any; };``
allows outgoing zone transfers to any host using the TLS transport
over port 853.
``blackhole``
This specifies a list of addresses which the server does not accept queries
@@ -4560,11 +4556,15 @@ If a remote server is giving out bad data, marking it
as bogus prevents further queries to it. The default value of
``bogus`` is ``no``.
If a remote server is giving out broken NSEC records with type maps
that are missing types that actually exist, ``broken-nsec`` can be
used to stop NSEC records from negative responses from the given
servers being cached and thus available to ``synth-from-dnssec``.
The default value is ``no``.
.. _server_broken_nsec:
The ``broken-nsec`` clause determines whether the NSEC records found in
negative responses sent by the remote server are ignored for the purpose
of synthesizing negative responses or not. The default is ``no``.
Setting this to ``yes`` can be used to prevent broken NSEC records from
causing incorrect negative responses to be synthesized when
``synth-from-dnssec`` is set to ``yes``. This option may be removed in a
future release.
The ``provide-ixfr`` clause determines whether the local server, acting
as primary, responds with an incremental zone transfer when the given