Concise Guide to DNS and BIND, The |
By Nicolai Langfeldt |
| |
Publisher | : Que |
Pub Date | : September 20, 2000 |
ISBN | : 0-7897-2273-9 |
Pages | : 346 |
| Copyright |
| | About the Author |
| | About the Technical Editor |
| | Acknowledgments |
| | Tell Us What You Think! |
| | Introduction |
| | | About This Book |
| | | The Internet Before DNS |
| | | DNS to the Rescue |
| | | The Versions of BIND |
| | | If It's Worth Doing, It's Worth Doing Right |
|
| | Part I: Basic DNS |
| | | Chapter 1. DNS Concepts |
| | | DNS Is a Hierarchic, Distributed Database |
| | | What Is a Domain? |
| | | Zones and Delegation |
| | | Reverse Zones |
| | | Duplication and Distribution of Zones |
| | | How Resolution Works |
| | | DNS as a Tree |
|
| | | Chapter 2. DNS in Practice |
| | | The BIND Software |
| | | Configuring BIND |
| | | Testing It All |
| | | Resolver Setup |
| | | A Zone |
| | | Subdomains and Delegation |
| | | Reverse Delegations for Classless Nets |
| | | Secondary Servers |
| | | NOTIFY |
|
| | | Chapter 3. Maintenance and Enhancements |
| | | More Practical Details |
| | | Maintaining and Changing Zones |
| | | DNS Round Robin and Load Distribution |
| | | The Trouble with CNAME Records |
| | | Wildcard Records |
| | | Logs and Debugging |
| | | Adding More Domains |
| | | Contingency Planning |
| | | Practical Uses of Forwarding |
| | | Maintaining the root.hints File |
|
| | | Chapter 4. Getting a Domain |
| | | Top-Level Domains and Their Owners |
| | | Getting the Domain |
| | | Paying for Everything |
|
|
| | Part II: Advanced DNS |
| | | Chapter 5. Using Dig and nslookup |
| | | Dig |
| | | nslookup |
|
| | | Chapter 6. Troubleshooting DNS |
| | | Staying Out of Trouble |
| | | Network Problems |
| | | Delegation Problems |
| | | Reverse Lookup Problems |
| | | Masters, Slaves, and Serial Numbers |
| | | Caching and TTLs |
| | | Zone Data Mistakes |
| | | The Log File(s) |
|
| | | Chapter 7. The DNS Tool Chest |
| | | The Internet |
| | | Maintenance Tools |
| | | Quality Control |
|
| | | Chapter 8. Security Concerns |
| | | About Security |
| | | How Secure Is DNS and BIND? |
| | | Resource Use |
| | | chroot and Least Privilege |
| | | Query ID Pool |
| | | Hiding Your BIND Version |
| | | BIND 9 and DNSSEC |
| | | DNS on Firewalls |
| | | Firewall Rules and DNS |
| | | Split DNS, NAT, and Network Hiding |
|
| | | Chapter 9. Dynamic DNS |
| | | Of RRsets |
| | | Of Masters and Slaves |
| | | Accepting and Doing Updates |
| | | Slave Server Issues |
| | | Reverse Zones |
| | | A One Host Zone |
| | | DHCP |
|
| | | Chapter 10. DNS and Dial-Up Connections |
| | | Moderating BIND |
| | | Cutting Off BIND |
|
| | | Chapter 11. DNS on a Closed Network |
| | | In a Simple Network |
| | | Internal Rootservers |
| | | Slave and Cache Servers |
| | | Structuring Your DNS |
|
| | | Chapter 12. Interfacing DNS in Programs |
| | | The UNIX Resolver |
| | | DNS from Perl |
| | | DNS from Python |
| | | DNS in Shell Scripts |
| | | Asynchronous Resolving |
|
| | | Chapter 13. Resource Records |
| | | RRs in Current Use |
| | | Experimental RRs |
| | | Obsolete RRs |
|
|
| | Part III: About BIND |
| | | Chapter 14. A Guide to BIND 4 |
| | | Migrating from BIND 4 to BIND 8 |
| | | ndc in BIND 4 |
| | | Configuring BIND 4 |
| | | Miscellaneous |
|
| | | Chapter 15. Compiling and Maintaining BIND |
| | | About BIND |
| | | Getting BIND |
| | | Keeping It Current |
| | | Compiling BIND |
| | | Installing BIND |
| | | Customizing for Chrooted Environments |
|
| | | Chapter 16. BIND 9 |
| | | The Goals of BIND 9 |
| | | Why Use BIND 9? |
| | | Compiling BIND 9 |
| | | The Documentation |
| | | Running BIND 9 |
| | | New Resource Limits |
| | | Views |
| | | New RRs |
| | | Scalability |
| | | Security Enhancements |
| | | IPv6 Support |
|
| | | Chapter 17. Miscellany |
| | | How ncd Works |
| | | Address Sorting |
| | | Checknames, Legal Hostnames |
| | | The Limits of BIND |
| | | The Housekeeping of BIND |
| | | The Rest of the Options |
|
|
| | Part IV: Appendixes |
| | | Appendix A. Named.Conf Man Page |
| | | NAMED.CONF(5) System Programmer's Manual NAMED.CONF(5) |
| | | Name |
| | | named.conf configuration file for named(8) |
| | | Converting from BIND 4.9.x |
| | | Address Match Lists |
| | | The Logging Statement |
| | | The Options Statement |
| | | The Zone Statement |
| | | The acl Statement |
| | | The key Statement |
| | | The trusted-keys Statement |
| | | The server Statement |
| | | The controls Statement |
| | | The include Statement |
| | | Examples |
| | | Files |
| | | See Also |
|
| | | Appendix B. Bibliography |
| | | Books |
| | | RFCs |
|
|
| | Index |