The Concise Guide to DNS and BIND

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Salamon, Andra, DNS Tricks and Tips 

SANS Institute

    Web site 

scalability

    BIND 9  2nd  3rd 

scaliblity

    DNS 

scanning

    interfaces

        BIND  2nd 

Schneir, Bruce, Applied Cryptography(col) Protocols, Algorithms, and Source Code in C, 2nd Edition 

scripts

    named

        writing 

    named-bootconf 

    ndc

        writing  2nd 

searches

    OS resolvers 

secondary servers

    RFC 2182 

secure_(underscore)zone (BIND 4)  2nd 

securing

    keys 

    zones  2nd 

security 

    bad servers  2nd 

    BIND  2nd  3rd  4th  5th  6th  7th 

    BIND 9 

    BIND versions

        hiding  2nd 

    blackholing  2nd 

    DNS information  2nd  3rd  4th 

    DNSSEC 

    mailing lists 

    resource usage  2nd  3rd  4th  5th 

    resources 

    TSIGS 

    zone transfers  2nd  3rd 

security enhancements

    BIND 9

        DNSDEC 

        DNSSEC 

        TSIG  2nd  3rd  4th  5th  6th 

Security Focus (Bugtraq)

    Web site 

seeding

    dynamic zones 

semicolon (

    )

        comments 

        listing multiple servers 

serial numbers

    editing 

    slave servers  2nd 

    SOA records 

serial-queries option 

server statement 

    syntax 

serverity clause 

servers

    adding resolving  2nd 

    bad

        security  2nd 

    cache 

    DHCP

        DNS update clients 

        dynamic updates  2nd 

    DNS

        determining amount internally 

        myths about  2nd  3rd 

        updates 

    lame  2nd  3rd 

    master 

        defined 

    recursive 

    resources

        limits  2nd 

    secondary

        RFC 2182 

    slave  2nd 

        adding  2nd 

        data 

        defined 

        serial numbers  2nd 

        setting up 

        updating 

    slaves

        updating 

    stealth  2nd 

    Web

        moving  2nd  3rd 

servers (multiple)

    listing

        semicolon (;) 

Service Locator resource record  [See SRV]2nd  [See SRV]

setting up

    choot enviroment  2nd  3rd  4th 

    DNS

        domains  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th 

        networks  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th 

    slave servers 

    stub zones  2nd 

    working named configuration 

severity

    BIND logs  2nd 

severs

    debugging 

shell scripting

    dig  2nd 

    DNS  2nd 

    nslookup 

Shell-style comments

    BIND 

SIG (Signature) resource record

    RFC 2065 

signals

    ncd  2nd 

Signature resource record  [See SIG]

SINK (The Kitchen Sink Record) resource record 

sizes

    caches 

slash, slash (//)

    C++-style comments 

slash, star (/*)

    C-style comments 

slave servers  2nd 

    adding  2nd 

    data 

    defined 

    NOTIFY

        updating 

    serial number  2nd 

    setting up 

    updating 

slave zones 

slaves

    masters

        connecting to 

snooper

    network traffic 

SOA (Start of Authority) resource record

    RFC 1035  2nd 

SOA records

    serial numbers 

SOA resource records

    DNS 

    extended outages 

SOA stub query 

SOA TTL 

software

    dnswalk 

sorting

    addresses 

        BIND  2nd  3rd 

        BIND 4 

        BIND 8 

    records

        bands 

    resource records  2nd  3rd 

sortlist directive 

sortlists 

    addresses  2nd 

split DNS 

    firewalls  2nd  3rd  4th 

spoofing 

    BIND  2nd  3rd  4th 

src directory

    BIND 

SRV (Service Locator) resource record

    RFC 2052  2nd 

Stahl, M.

    DOD Internet Host Table Specification (quotes) 

Stahl, M., RFC 1032  2nd 

Stahl, M., RFC 953 

star, slash (*/)

    C-style comments 

Start of Authority resource record  [See SOA]2nd  [See SOA]

starting

    BIND

        ndc command  2nd  3rd 

statements

    acl

        ACLs 

        syntax 

    BIND 8  2nd 

    controls 

        syntax 

    include 

    key 

        syntax 

    logging  2nd  3rd 

        categories  2nd  3rd  4th 

        channels  2nd  3rd 

        clauses  2nd 

        configurations 

        syntax 

    options

        Boolean statement  2nd  3rd  4th  5th  6th  7th  8th  9th 

        pathnames  2nd 

        peridic task intervals  2nd 

        resource limits  2nd 

        syntax  2nd 

    server 

        syntax 

    topology  2nd 

    trusted-keys  2nd 

    zone

        classes 

        syntax 

        zone types  2nd 

    zones

        options  2nd  3rd 

statistics

    BIND  2nd  3rd  4th 

status

    ndc  2nd 

STDs(Internet Standard) 

stealth servers  2nd 

Stevens, Richars W., UNIX Network Programming (ital) 

structures

    tree

        DNS  2nd 

stub queries

    NS 

    SOA 

stub zones

    root zones

        combining  2nd 

    setting up  2nd 

subdomain zones 

subdomains 

switches

    -F 

synchronous

    UNIX resolvers 

Syslog

    logging facility

        BIND  2nd 

syslog clause 

Категории