Pro DNS and BIND

  • Authors
  • Ron Aitchison

Table of contents

  1. Front Matter
    Pages i-xxxi
  2. Principles and Overview

    1. Front Matter
      Pages 1-1
    2. Pages 39-59
    3. Pages 61-75
    4. Pages 77-92
  3. Get Something Running

    1. Front Matter
      Pages 93-93
    2. Pages 95-119
    3. Pages 121-153
    4. Pages 155-181
  4. DNS Security

    1. Front Matter
      Pages 233-233
    2. Pages 283-328
  5. Reference

    1. Front Matter
      Pages 329-329
    2. Pages 405-471
  6. Proqramming

    1. Front Matter
      Pages 473-473

About this book

Introduction

Pro DNS and BIND guides you through the challenging array of features surrounding DNS, with a special focus on BIND, the world's most popular DNS implementation. This book unravels the mysteries of DNS, offering insight into origins, evolution, and key concepts like domain names and zone files. This book focuses on running DNS systems based on BIND 9.3.0 the first stable release that includes support for the latest DNSSEC (DNSSEC.bis) standards and a major functional upgrade from previous BIND 9 releases.

If you administer a DNS system or are thinking about running one, or if you need to upgrade to support IPv6 DNS, need to secure a DNS for zone transfer, dynamic update, or other reasons, or if you need to implement DNSSEC, or simply want to understand the DNS system, then this book provides you with a single point of reference. Pro DNS and BIND starts with simple concepts, then moves on to full security-aware DNSSEC configurations. Various features, parameters, and resource records are described and, in the majority of cases, illustrated with one or more examples.

The book contains a complete reference to zone files, Resource Records, and BINDs configuration file parameters. You can treat the book as as a simple paint-by-numbers guide to everything from a simple caching DNS, to the most complex secure DNS (DNSSEC) implementation. Background information is still included for when you need to know what to do and why you have to do it, and so that you can modify processes to meet your unique needs.

Keywords

IPv6 programming security software standards

Bibliographic information