Document where updates and DNSSEC records are stored

Make clear that inline-signing stores DNSSEC records in a signed
version of the zone, using the zone's filename plus ".signed" extension.

Tell that dynamic zones store updates in the zone's filename.

DNSSEC records for dynamic zones also go in the zone's filename, unless
inline-signing is enabled.

Then, dnssec-policy assumes inline-signing, but only if the zone is
not dynamic.

(cherry picked from commit 8860f6b4ff)
This commit is contained in:
Matthijs Mekking 2022-06-17 10:21:15 +02:00
parent d2b83e8b4a
commit 0ba0ef4e20

View file

@ -2105,6 +2105,9 @@ Boolean Options
This option may only be activated at the zone level; if configured
at the view or options level, it must be set to ``off``.
The DNSSEC records are written to the zone's filename set in ``file``,
unless ``inline-signing`` is enabled.
.. _dnssec-validation-option:
``dnssec-validation``
@ -2456,6 +2459,8 @@ for details on how to specify IP address lists.
and inherited by zones, this could lead to some zones unintentionally
allowing updates.
Updates are written to the zone's filename that is set in ``file``.
``allow-update-forwarding``
When set in the ``zone`` statement for a secondary zone, this specifies which
hosts are allowed to submit Dynamic DNS updates and have them be
@ -5233,6 +5238,13 @@ Multiple key and signing policies can be configured. To attach a policy
to a zone, add a ``dnssec-policy`` option to the ``zone`` statement,
specifying the name of the policy that should be used.
By default, ``dnssec-policy`` assumes ``inline-signing``. This means that
a signed version of the zone is maintained separately and is written out to
a different file on disk (the zone's filename plus a ``.signed`` extension).
If the zone is dynamic because it is configured with an ``update-policy`` or
``allow-update``, the DNSSEC records are written to the filename set in the original zone's ``file``, unless ``inline-signing`` is explicitly set.
Key rollover timing is computed for each key according to the key
lifetime defined in the KASP. The lifetime may be modified by zone TTLs
and propagation delays, to prevent validation failures. When a key
@ -6116,10 +6128,12 @@ Zone Options
See the description of ``serial-update-method`` in :ref:`options`.
``inline-signing``
If ``yes``, this enables "bump in the wire" signing of a zone, where
an unsigned zone is transferred in or loaded from disk and a signed
If ``yes``, BIND 9 maintains a separate signed version of the zone.
An unsigned zone is transferred in or loaded from disk and the signed
version of the zone is served with, possibly, a different serial
number. This behavior is disabled by default.
number. The signed version of the zone is stored in a file that is
the zone's filename (set in ``file``) with a ``.signed`` extension.
This behavior is disabled by default.
``multi-master``
See the description of ``multi-master`` in :ref:`boolean_options`.
@ -6140,7 +6154,8 @@ Dynamic Update Policies
BIND 9 supports two methods of granting clients the right to
perform dynamic updates to a zone, configured by the ``allow-update``
or ``update-policy`` options.
or ``update-policy`` options. In both cases, BIND 9 writes the updates
to the zone's filename set in ``file``.
The ``allow-update`` clause is a simple access control list. Any client
that matches the ACL is granted permission to update any record in the