Olaf M. Kolkman wrote:
3.6  Private Key Storage

   It is recommended that, where possible, zone private keys and the
   zone file master copy be kept and used in off-line, non-network
   connected, physically secure machines only.  Periodically an
   application can be run to add authentication to a zone by adding
   and NSEC RRs.  Then the augmented file can be transferred,

   When relying on dynamic update to manage a signed zone, be aware
   that at least one zone's private key will have to reside on the

This reads funny... I suggest "...at least one of the zone's private keys..."

   master server.  This key is only as secure as the amount of
   exposure the server receives to unknown clients and the security of
   the host.  Although not mandatory one could administer the DNS in
   the following way. The master that processes the dynamic updates is
   unavailable from generic hosts on the Internet, it is not listed in
   the NS RR set although it's name appears in the SOA RRs MNAME field.
The nameservers in the NS RR set are able to receive zone updates through NOTIFY, IXFR, AXFR or out-of-band distribution mechanisms.
   This approach is known as the "hidden master" setup.


--
>>>ApacheCon Europe<<<                   http://www.apachecon.com/

http://www.apache-ssl.org/ben.html       http://www.thebunker.net/

"There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit." - Robert Woodruff
.
dnsop resources:_____________________________________________________
web user interface: http://darkwing.uoregon.edu/~llynch/dnsop.html
mhonarc archive: http://darkwing.uoregon.edu/~llynch/dnsop/index.html

Reply via email to