The Concise Guide to DNS and BIND
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] Salamon, Andra, DNS Tricks and Tips SANS Institute Web site scalability BIND 9 2nd 3rd scaliblity DNS scanning interfaces BIND 2nd Schneir, Bruce, Applied Cryptography(col) Protocols, Algorithms, and Source Code in C, 2nd Edition scripts named writing named-bootconf ndc writing 2nd searches OS resolvers secondary servers RFC 2182 secure_(underscore)zone (BIND 4) 2nd securing keys zones 2nd security bad servers 2nd BIND 2nd 3rd 4th 5th 6th 7th BIND 9 BIND versions hiding 2nd blackholing 2nd DNS information 2nd 3rd 4th DNSSEC mailing lists resource usage 2nd 3rd 4th 5th resources TSIGS zone transfers 2nd 3rd security enhancements BIND 9 DNSDEC DNSSEC TSIG 2nd 3rd 4th 5th 6th Security Focus (Bugtraq) Web site seeding dynamic zones semicolon ( ) comments listing multiple servers serial numbers editing slave servers 2nd SOA records serial-queries option server statement syntax serverity clause servers adding resolving 2nd bad security 2nd cache DHCP DNS update clients dynamic updates 2nd DNS determining amount internally myths about 2nd 3rd updates lame 2nd 3rd master defined recursive resources limits 2nd secondary RFC 2182 slave 2nd adding 2nd data defined serial numbers 2nd setting up updating slaves updating stealth 2nd Web moving 2nd 3rd servers (multiple) listing semicolon (;) Service Locator resource record [See SRV]2nd [See SRV] setting up choot enviroment 2nd 3rd 4th DNS domains 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th networks 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th slave servers stub zones 2nd working named configuration severity BIND logs 2nd severs debugging shell scripting dig 2nd DNS 2nd nslookup Shell-style comments BIND SIG (Signature) resource record RFC 2065 signals ncd 2nd Signature resource record [See SIG] SINK (The Kitchen Sink Record) resource record sizes caches slash, slash (//) C++-style comments slash, star (/*) C-style comments slave servers 2nd adding 2nd data defined NOTIFY updating serial number 2nd setting up updating slave zones slaves masters connecting to snooper network traffic SOA (Start of Authority) resource record RFC 1035 2nd SOA records serial numbers SOA resource records DNS extended outages SOA stub query SOA TTL software dnswalk sorting addresses BIND 2nd 3rd BIND 4 BIND 8 records bands resource records 2nd 3rd sortlist directive sortlists addresses 2nd split DNS firewalls 2nd 3rd 4th spoofing BIND 2nd 3rd 4th src directory BIND SRV (Service Locator) resource record RFC 2052 2nd Stahl, M. DOD Internet Host Table Specification (quotes) Stahl, M., RFC 1032 2nd Stahl, M., RFC 953 star, slash (*/) C-style comments Start of Authority resource record [See SOA]2nd [See SOA] starting BIND ndc command 2nd 3rd statements acl ACLs syntax BIND 8 2nd controls syntax include key syntax logging 2nd 3rd categories 2nd 3rd 4th channels 2nd 3rd clauses 2nd configurations syntax options Boolean statement 2nd 3rd 4th 5th 6th 7th 8th 9th pathnames 2nd peridic task intervals 2nd resource limits 2nd syntax 2nd server syntax topology 2nd trusted-keys 2nd zone classes syntax zone types 2nd zones options 2nd 3rd statistics BIND 2nd 3rd 4th status ndc 2nd STDs(Internet Standard) stealth servers 2nd Stevens, Richars W., UNIX Network Programming (ital) structures tree DNS 2nd stub queries NS SOA stub zones root zones combining 2nd setting up 2nd subdomain zones subdomains switches -F synchronous UNIX resolvers Syslog logging facility BIND 2nd syslog clause |