summaryrefslogtreecommitdiff
path: root/doc/arm/Bv9ARM.ch07.html
diff options
context:
space:
mode:
Diffstat (limited to 'doc/arm/Bv9ARM.ch07.html')
-rw-r--r--doc/arm/Bv9ARM.ch07.html57
1 files changed, 40 insertions, 17 deletions
diff --git a/doc/arm/Bv9ARM.ch07.html b/doc/arm/Bv9ARM.ch07.html
index 411e5725..958d1d57 100644
--- a/doc/arm/Bv9ARM.ch07.html
+++ b/doc/arm/Bv9ARM.ch07.html
@@ -83,7 +83,7 @@ HREF="Bv9ARM.ch07.html#Access_Control_Lists"
></DT
><DT
>7.2. <A
-HREF="Bv9ARM.ch07.html#AEN3819"
+HREF="Bv9ARM.ch07.html#AEN3954"
><B
CLASS="command"
>chroot</B
@@ -95,8 +95,8 @@ UNIX servers)</A
></DT
><DT
>7.3. <A
-HREF="Bv9ARM.ch07.html#AEN3865"
->Dynamic Updates</A
+HREF="Bv9ARM.ch07.html#dynamic_update_security"
+>Dynamic Update Security</A
></DT
></DL
></DIV
@@ -180,7 +180,7 @@ CLASS="sect1"
><H1
CLASS="sect1"
><A
-NAME="AEN3819"
+NAME="AEN3954"
>7.2. <B
CLASS="command"
>chroot</B
@@ -259,7 +259,7 @@ CLASS="sect2"
><H2
CLASS="sect2"
><A
-NAME="AEN3842"
+NAME="AEN3977"
>7.2.1. The <B
CLASS="command"
>chroot</B
@@ -315,7 +315,7 @@ CLASS="sect2"
><H2
CLASS="sect2"
><A
-NAME="AEN3857"
+NAME="AEN3992"
>7.2.2. Using the <B
CLASS="command"
>setuid</B
@@ -346,21 +346,44 @@ CLASS="sect1"
><H1
CLASS="sect1"
><A
-NAME="AEN3865"
->7.3. Dynamic Updates</A
+NAME="dynamic_update_security"
+>7.3. Dynamic Update Security</A
></H1
><P
->Access to the dynamic update facility should be strictly limited.
-In earlier versions of <SPAN
+>Access to the dynamic
+update facility should be strictly limited. In earlier versions of
+<SPAN
CLASS="acronym"
>BIND</SPAN
-> the only way to do this was based on
-the IP address of the host requesting the update. <SPAN
-CLASS="acronym"
->BIND9</SPAN
-> also
-supports authenticating updates cryptographically by means of transaction
-signatures (TSIG). The use of TSIG is strongly recommended.</P
+> the only way to do this was based on the IP
+address of the host requesting the update, by listing an IP address or
+network prefix in the <B
+CLASS="command"
+>allow-update</B
+> zone option.
+This method is insecure since the source address of the update UDP packet
+is easily forged. Also note that if the IP addresses allowed by the
+<B
+CLASS="command"
+>allow-update</B
+> option include the address of a slave
+server which performs forwarding of dynamic updates, the master can be
+trivially attacked by sending the update to the slave, which will
+forward it to the master with its own source IP address causing the
+master to approve it without question.</P
+><P
+>For these reasons, we strongly recommend that updates be
+cryptographically authenticated by means of transaction signatures
+(TSIG). That is, the <B
+CLASS="command"
+>allow-update</B
+> option should
+list only TSIG key names, not IP addresses or network
+prefixes. Alternatively, the new <B
+CLASS="command"
+>update-policy</B
+>
+option can be used.</P
><P
>Some sites choose to keep all dynamically updated DNS data
in a subdomain and delegate that subdomain to a separate zone. This