summaryrefslogtreecommitdiff
path: root/doc/arm/managed-keys.xml
diff options
context:
space:
mode:
Diffstat (limited to 'doc/arm/managed-keys.xml')
-rw-r--r--doc/arm/managed-keys.xml46
1 files changed, 23 insertions, 23 deletions
diff --git a/doc/arm/managed-keys.xml b/doc/arm/managed-keys.xml
index 51949487fbb40..d1335eaf4b9d2 100644
--- a/doc/arm/managed-keys.xml
+++ b/doc/arm/managed-keys.xml
@@ -1,6 +1,5 @@
-<?xml version="1.0" encoding="utf-8"?>
<!--
- - Copyright (C) 2010 Internet Systems Consortium, Inc. ("ISC")
+ - Copyright (C) 2010, 2015 Internet Systems Consortium, Inc. ("ISC")
-
- Permission to use, copy, modify, and/or distribute this software for any
- purpose with or without fee is hereby granted, provided that the above
@@ -15,28 +14,29 @@
- PERFORMANCE OF THIS SOFTWARE.
-->
-<!-- $Id: managed-keys.xml,v 1.3 2010/02/03 23:49:07 tbox Exp $ -->
+<!-- $Id$ -->
+
+<!-- Converted by db4-upgrade version 1.0 -->
+<section xmlns="http://docbook.org/ns/docbook" version="5.0" xml:id="rfc5011.support"><info><title>Dynamic Trust Anchor Management</title></info>
-<sect1 id="rfc5011.support">
- <title>Dynamic Trust Anchor Management</title>
<para>BIND 9.7.0 introduces support for RFC 5011, dynamic trust
- anchor management. Using this feature allows
+ anchor management. Using this feature allows
<command>named</command> to keep track of changes to critical
DNSSEC keys without any need for the operator to make changes to
configuration files.</para>
- <sect2>
- <title>Validating Resolver</title>
+ <section><info><title>Validating Resolver</title></info>
+
<!-- TODO: command tag is overloaded for configuration and executables -->
<para>To configure a validating resolver to use RFC 5011 to
- maintain a trust anchor, configure the trust anchor using a
+ maintain a trust anchor, configure the trust anchor using a
<command>managed-keys</command> statement. Information about
- this can be found in
- <xref linkend="managed-keys" />.</para>
+ this can be found in
+ <xref linkend="managed-keys"/>.</para>
<!-- TODO: managed-keys examples
also in DNSSEC section above here in ARM -->
- </sect2>
- <sect2>
- <title>Authoritative Server</title>
+ </section>
+ <section><info><title>Authoritative Server</title></info>
+
<para>To set up an authoritative zone for RFC 5011 trust anchor
maintenance, generate two (or more) key signing keys (KSKs) for
the zone. Sign the zone with one of them; this is the "active"
@@ -52,21 +52,21 @@ also in DNSSEC section above here in ARM -->
timer has completed, the active KSK can be revoked, and the
zone can be "rolled over" to the newly accepted key.</para>
<para>The easiest way to place a stand-by key in a zone is to
- use the "smart signing" features of
- <command>dnssec-keygen</command> and
+ use the "smart signing" features of
+ <command>dnssec-keygen</command> and
<command>dnssec-signzone</command>. If a key with a publication
date in the past, but an activation date which is unset or in
- the future, "
+ the future, "
<command>dnssec-signzone -S</command>" will include the DNSKEY
record in the zone, but will not sign with it:</para>
<screen>
$ <userinput>dnssec-keygen -K keys -f KSK -P now -A now+2y example.net</userinput>
$ <userinput>dnssec-signzone -S -K keys example.net</userinput>
</screen>
- <para>To revoke a key, the new command
+ <para>To revoke a key, the new command
<command>dnssec-revoke</command> has been added. This adds the
- REVOKED bit to the key flags and re-generates the
- <filename>K*.key</filename> and
+ REVOKED bit to the key flags and re-generates the
+ <filename>K*.key</filename> and
<filename>K*.private</filename> files.</para>
<para>After revoking the active key, the zone must be signed
with both the revoked KSK and the new active KSK. (Smart
@@ -84,7 +84,7 @@ $ <userinput>dnssec-signzone -S -K keys example.net</userinput>
"<filename>Kexample.com.+005+10128</filename>".</para>
<para>If two keys have ID's exactly 128 apart, and one is
revoked, then the two key ID's will collide, causing several
- problems. To prevent this,
+ problems. To prevent this,
<command>dnssec-keygen</command> will not generate a new key if
another key is present which may collide. This checking will
only occur if the new keys are written to the same directory
@@ -96,5 +96,5 @@ $ <userinput>dnssec-signzone -S -K keys example.net</userinput>
<para>It is expected that a future release of BIND 9 will
address this problem in a different way, by storing revoked
keys with their original unrevoked key ID's.</para>
- </sect2>
-</sect1>
+ </section>
+</section>