亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? draft-ietf-dnsext-axfr-clarify-05.txt

?? 非常好的dns解析軟件
?? TXT
字號:
INTERNET-DRAFT                                      Andreas Gustafssondraft-ietf-dnsext-axfr-clarify-05.txt                     Nominum Inc.                                                         November 2002               DNS Zone Transfer Protocol ClarificationsStatus of this Memo   This document is an Internet-Draft and is in full conformance with   all provisions of Section 10 of RFC2026.   Internet-Drafts are working documents of the Internet Engineering   Task Force (IETF), its areas, and its working groups.  Note that   other groups may also distribute working documents as Internet-   Drafts.   Internet-Drafts are draft documents valid for a maximum of six months   and may be updated, replaced, or obsoleted by other documents at any   time.  It is inappropriate to use Internet-Drafts as reference   material or to cite them other than as "work in progress."   The list of current Internet-Drafts can be accessed at   http://www.ietf.org/ietf/1id-abstracts.txt   The list of Internet-Draft Shadow Directories can be accessed at   http://www.ietf.org/shadow.html.Abstract   In the Domain Name System, zone data is replicated among   authoritative DNS servers by means of the "zone transfer" protocol,   also known as the "AXFR" protocol.  This memo clarifies, updates, and   adds missing detail to the original AXFR protocol specification in   RFC1034.1. Introduction   The original definition of the DNS zone transfer protocol consists of   a single paragraph in [RFC1034] section 4.3.5 and some additional   notes in [RFC1035] section 6.3.  It is not sufficiently detailed to   serve as the sole basis for constructing interoperable   implementations.  This document is an attempt to provide a more   complete definition of the protocol.  Where the text in RFC1034   conflicts with existing practice, the existing practice has been   codified in the interest of interoperability.Expires May 2003                                                [Page 1]draft-ietf-dnsext-axfr-clarify-05.txt                      November 2002   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this   document are to be interpreted as described in [RFC 2119].2. The zone transfer request   To initiate a zone transfer, the slave server sends a zone transfer   request to the master server over a reliable transport such as TCP.   The form of this request is specified in sufficient detail in RFC1034   and needs no further clarification.   Implementers are advised that one server implementation in widespread   use sends AXFR requests where the TCP message envelope size exceeds   the DNS request message size by two octets.3. The zone transfer response   If the master server is unable or unwilling to provide a zone   transfer, it MUST respond with a single DNS message containing an   appropriate RCODE other than NOERROR.  If the master is not   authoritative for the requested zone, the RCODE SHOULD be 9   (NOTAUTH).   Slave servers should note that some master server implementations   will simply close the connection when denying the slave access to the   zone.  Therefore, slaves MAY interpret an immediate graceful close of   the TCP connection as equivalent to a "Refused" response (RCODE 5).   If a zone transfer can be provided, the master server sends one or   more DNS messages containing the zone data as described below.3.1. Multiple answers per message   The zone data in a zone transfer response is a sequence of answer   RRs.  These RRs are transmitted in the answer section(s) of one or   more DNS response messages.   The AXFR protocol definition in RFC1034 does not make a clear   distinction between response messages and answer RRs.  Historically,   DNS servers always transmitted a single answer RR per message.  This   encoding is wasteful due to the overhead of repeatedly sending DNS   message headers and the loss of domain name compression   opportunities.  To improve efficiency, some newer servers support a   mode where multiple RRs are transmitted in a single DNS response   message.   A master MAY transmit multiple answer RRs per response message up to   the largest number that will fit within the 65535 byte limit on TCPExpires May 2003                                                [Page 2]draft-ietf-dnsext-axfr-clarify-05.txt                      November 2002   DNS message size.  In the case of a small zone, this can cause the   entire transfer to be transmitted in a single response message.   Slaves MUST accept messages containing any number of answer RRs.  For   compatibility with old slaves, masters that support sending multiple   answers per message SHOULD be configurable to revert to the   historical mode of one answer per message, and the configuration   SHOULD be settable on a per-slave basis.3.2. DNS message header contents   RFC1034 does not specify the contents of the DNS message header of   the zone transfer response messages.  The header of each message MUST   be as follows:       ID      Copy from request       QR      1       OPCODE  QUERY       AA      1, but MAY be 0 when RCODE is not NOERROR       TC      0       RD      Copy from request, or 0       RA      Set according to availability of recursion, or 0       Z       0       AD      0       CD      0       RCODE   NOERROR on success, error code otherwise   The slave MUST check the RCODE in each message and abort the transfer   if it is not NOERROR.  It SHOULD check the ID of the first message   received and abort the transfer if it does not match the ID of the   request.  The ID SHOULD be ignored in subsequent messages, and fields   other than RCODE and ID SHOULD be ignored in all messages, to ensure   interoperability with certain older implementations which transmit   incorrect or arbitrary values in these fields.3.3. Additional section and SIG processing   Zone transfer responses are not subject to any kind of additional   section processing or automatic inclusion of SIG records.  SIG RRs in   the zone data are treated exactly the same as any other RR type.3.4. The question section   RFC1034 does not specify whether zone transfer response messages have   a question section or not.  The initial message of a zone transfer   response SHOULD have a question section identical to that in the   request.  Subsequent messages SHOULD NOT have a question section,   though the final message MAY.  The receiving slave server MUST acceptExpires May 2003                                                [Page 3]draft-ietf-dnsext-axfr-clarify-05.txt                      November 2002   any combination of messages with and without a question section.3.5. The authority section   The master server MUST transmit messages with an empty authority   section.  Slaves MUST ignore any authority section contents they may   receive from masters that do not comply with this requirement.3.6. The additional section   The additional section MAY contain additional RRs such as transaction   signatures.  The slave MUST ignore any unexpected RRs in the   additional section.  It MUST NOT treat additional section RRs as zone   data.4. Zone data   The purpose of the zone transfer mechanism is to exactly replicate at   each slave the set of RRs associated with a particular zone at its   primary master.  An RR is associated with a zone by being loaded from   the master file of that zone at the primary master server, or by some   other, equivalent method for configuring zone data.   This replication shall be complete and unaltered, regardless of how   many and which intermediate masters/slaves are involved, and   regardless of what other zones those intermediate masters/slaves do   or do not serve, and regardless of what data may be cached in   resolvers associated with the intermediate masters/slaves.   Therefore, in a zone transfer the master MUST send exactly those   records that are associated with the zone, whether or not their owner   names would be considered to be "in" the zone for purposes of   resolution, and whether or not they would be eligible for use as glue   in responses.  The transfer MUST NOT include any RRs that are not   associated with the zone, such as RRs associated with zones other   than the one being transferred or present in the cache of the local   resolver, even if their owner names are in the zone being transferred   or are pointed to by NS records in the zone being transferred.   The slave MUST associate the RRs received in a zone transfer with the   specific zone being transferred, and maintain that association for   purposes of acting as a master in outgoing transfers.5. Transmission order   RFC1034 states that "The first and last messages must contain the   data for the top authoritative node of the zone".  This is not   consistent with existing practice.  All known master implementationsExpires May 2003                                                [Page 4]draft-ietf-dnsext-axfr-clarify-05.txt                      November 2002   send, and slave implementations expect to receive, the zone's SOA RR   as the first and last record of the transfer.   Therefore, the quoted sentence is hereby superseded by the sentence   "The first and last RR transmitted must be the SOA record of the   zone".   The initial and final SOA record MUST be identical, with the possible   exception of case and compression.  In particular, they MUST have the   same serial number.  The slave MUST consider the transfer to be   complete when, and only when, it has received the message containing   the second SOA record.   The transmission order of all other RRs in the zone is undefined.   Each of them SHOULD be transmitted only once, and slaves MUST ignore   any duplicate RRs received.6. Security Considerations   The zone transfer protocol as defined in [RFC1034] and clarified by   this memo does not have any built-in mechanisms for the slave to   securely verify the identity of the master server and the integrity   of the transferred zone data.  The use of a cryptographic mechanism   for ensuring authenticity and integrity, such as TSIG [RFC2845],   IPSEC, or TLS, is RECOMMENDED.   The zone transfer protocol allows read-only public access to the   complete zone data.  Since data in the DNS is public by definition,   this is generally acceptable.  Sites that wish to avoid disclosing   their full zone data MAY restrict zone transfer access to authorized   slaves.   These clarifications are not believed to themselves introduce any new   security problems, nor to solve any existing ones.Acknowledgements   Many people have contributed input and commentary to earlier versions   of this document, including but not limited to Bob Halley, Dan   Bernstein, Eric A. Hall, Josh Littlefield, Kevin Darcy, Robert Elz,   Levon Esibov, Mark Andrews, Michael Patton, Peter Koch, Sam   Trenholme, and Brian Wellington.References   [RFC1034] - Domain Names - Concepts and Facilities, P. Mockapetris,   November 1987.Expires May 2003                                                [Page 5]draft-ietf-dnsext-axfr-clarify-05.txt                      November 2002   [RFC1035] - Domain Names - Implementation and Specifications, P.   Mockapetris, November 1987.   [RFC2119] - Key words for use in RFCs to Indicate Requirement Levels,   S. Bradner, BCP 14, March 1997.   [RFC2845] - Secret Key Transaction Authentication for DNS (TSIG).  P.   Vixie, O. Gudmundsson, D. Eastlake, B. Wellington, May 2000.Author's Address   Andreas Gustafsson   Nominum Inc.   2385 Bay Rd   Redwood City, CA 94063   USA   Phone: +1 650 381 6004   Email: gson@nominum.comFull Copyright Statement   Copyright (C) The Internet Society (2000 - 2002).  All Rights Reserved.   This document and translations of it may be copied and furnished to   others, and derivative works that comment on or otherwise explain it   or assist in its implmentation may be prepared, copied, published and   distributed, in whole or in part, without restriction of any kind,   provided that the above copyright notice and this paragraph are   included on all such copies and derivative works.  However, this   document itself may not be modified in any way, such as by removing   the copyright notice or references to the Internet Society or other   Internet organizations, except as needed for the purpose of   developing Internet standards in which case the procedures for   copyrights defined in the Internet Standards process must be   followed, or as required to translate it into languages other than   English.   The limited permissions granted above are perpetual and will not be   revoked by the Internet Society or its successors or assigns.   This document and the information contained herein is provided on an   "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING   TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING   BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION   HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OFExpires May 2003                                                [Page 6]draft-ietf-dnsext-axfr-clarify-05.txt                      November 2002   MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE."Expires May 2003                                                [Page 7]

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
日本va欧美va欧美va精品| 亚洲国产精品激情在线观看| 国产精品久久免费看| 五月天激情综合| 成人动漫中文字幕| 日韩一级免费观看| 亚洲一区二区av在线| 成人免费毛片片v| 日韩一区二区三区精品视频| 亚洲国产美国国产综合一区二区| 成人免费福利片| 精品福利二区三区| 日韩成人av影视| 在线视频你懂得一区二区三区| 日本一区二区不卡视频| 狠狠色丁香久久婷婷综| 欧美精品日韩综合在线| 亚洲一区二区五区| 一本到不卡精品视频在线观看| 国产精品你懂的在线| 国产一本一道久久香蕉| 日韩美女在线视频 | 精品福利一二区| 蜜桃视频一区二区| 在线不卡a资源高清| 午夜影视日本亚洲欧洲精品| 色天使色偷偷av一区二区| 亚洲欧洲日韩av| 成人免费视频免费观看| 久久亚洲精品小早川怜子| 看电影不卡的网站| 欧美一区二区私人影院日本| 玉足女爽爽91| 色婷婷av一区二区三区软件| 一区二区三区久久| 在线看国产一区二区| 亚洲精品国产视频| 色天天综合久久久久综合片| 一区二区免费在线| 欧美综合一区二区| 亚洲大型综合色站| 欧美美女一区二区在线观看| 亚洲大尺度视频在线观看| 欧美日本不卡视频| 麻豆一区二区在线| 精品精品欲导航| 国内精品久久久久影院色| 26uuu亚洲| 国产aⅴ精品一区二区三区色成熟| 国产午夜亚洲精品羞羞网站| 成人天堂资源www在线| 17c精品麻豆一区二区免费| 99精品桃花视频在线观看| 亚洲女人的天堂| 欧美亚洲国产bt| 日本女人一区二区三区| 欧美成人精品1314www| 国产一区999| 中文字幕一区二区三区不卡 | 国内精品伊人久久久久av一坑| 久久男人中文字幕资源站| 成人午夜视频网站| 亚洲欧美另类久久久精品 | 国产精品99久久久久久久女警| 欧美国产亚洲另类动漫| 91麻豆免费看| 丝袜亚洲另类丝袜在线| 欧美大片顶级少妇| 粉嫩一区二区三区性色av| 亚洲免费成人av| 欧美精品黑人性xxxx| 国产精品一区专区| 亚洲人成7777| 欧美日本视频在线| 国产资源精品在线观看| 国产精品久久久一本精品| 在线观看精品一区| 另类人妖一区二区av| 国产精品午夜在线| 欧美老女人第四色| 国产精品自在在线| 亚洲激情校园春色| 欧美成人一区二区三区| 99久久综合国产精品| 天堂久久久久va久久久久| wwww国产精品欧美| 日本久久电影网| 国产综合成人久久大片91| 亚洲精品国产一区二区精华液| 日韩美一区二区三区| 91蜜桃婷婷狠狠久久综合9色| 日韩不卡免费视频| 国产精品久久久久久福利一牛影视 | 国产精品白丝jk黑袜喷水| 一区二区三区四区av| 精品卡一卡二卡三卡四在线| 99久久婷婷国产综合精品电影| 日韩国产一区二| 国产精品欧美一区二区三区| 3d动漫精品啪啪| 99国产精品一区| 久久99国产精品麻豆| 亚洲一二三四久久| 国产日韩av一区| 制服.丝袜.亚洲.另类.中文 | 首页综合国产亚洲丝袜| 中日韩免费视频中文字幕| 欧美一区二区在线免费观看| 91在线观看高清| 国产一区二区三区免费播放| 亚洲一级二级在线| 中文字幕在线观看一区二区| 欧美一区二区三区视频在线| 99re成人精品视频| 国产一区二区福利视频| 五月天网站亚洲| 亚洲免费观看视频| 久久精品欧美一区二区三区麻豆| 555www色欧美视频| 欧美少妇xxx| 91视频免费播放| 国产激情视频一区二区三区欧美| 日本一道高清亚洲日美韩| 一区二区三区精品在线观看| 国产日韩精品视频一区| 精品国产青草久久久久福利| 欧美日韩日日骚| 在线国产亚洲欧美| 99久久99精品久久久久久 | 亚洲一区二区三区影院| 国产精品成人一区二区艾草 | 欧美精品一区二区不卡 | 色素色在线综合| av电影在线观看一区| 国产一区二区三区不卡在线观看 | 中文字幕av一区 二区| 欧美不卡一二三| 日韩一区二区三区电影| 欧美日韩日本视频| 欧美日韩在线观看一区二区| 91女神在线视频| 成人动漫av在线| 不卡影院免费观看| 成人免费毛片嘿嘿连载视频| 国产乱子轮精品视频| 精品一区二区三区视频| 免费在线看成人av| 日本亚洲视频在线| 免费观看在线综合| 免费观看成人av| 美女视频黄 久久| 麻豆精品一二三| 韩国女主播一区二区三区| 老司机精品视频在线| 麻豆91在线看| 精品一区二区三区在线观看国产| 免费精品99久久国产综合精品| 日本一区中文字幕| 久久精品国产亚洲a| 国产原创一区二区三区| 国产在线一区观看| 国产精品一区二区在线观看网站 | 免费久久精品视频| 激情文学综合网| 国产一区在线观看视频| 韩日欧美一区二区三区| 国产精品中文字幕日韩精品| 国产精品自拍在线| 成人免费毛片a| kk眼镜猥琐国模调教系列一区二区| eeuss鲁一区二区三区| 色婷婷综合五月| 欧美写真视频网站| 91精品一区二区三区久久久久久 | 91成人免费网站| 欧美精三区欧美精三区| 日韩欧美www| 国产午夜精品一区二区三区视频| 国产精品美女久久久久aⅴ| 1区2区3区国产精品| 亚洲曰韩产成在线| 日本在线不卡视频一二三区| 国产一区在线视频| 97国产一区二区| 欧美情侣在线播放| 久久午夜色播影院免费高清| 国产精品色噜噜| 一区二区三区四区在线| 日韩电影在线一区二区| 激情偷乱视频一区二区三区| 粉嫩av一区二区三区粉嫩| 色丁香久综合在线久综合在线观看| 欧美午夜电影网| 精品国产伦理网| 中文字幕中文乱码欧美一区二区| 亚洲一区二区三区国产| 极品美女销魂一区二区三区免费| 波波电影院一区二区三区| 欧美日韩日日摸| 欧美国产日韩精品免费观看|