BIND 9.7.3 Release Notes HP-UX 11i v3 (761997-001, January 2014)

Table Of Contents
DNSSEC validation is set by default and can be unset explicitly
Previously, in BIND-9.7.3, the validation would turn on when the trusted-key directive was present
on the named.conf. Now, we can explicitly mention if the validation should be on/off using the
dnssec-validation global option.
SPF (Sender Policy Framework) support
The design intent of the SPF record is to allow a receiving MTA (Message Transfer Agent) to
interrogate the Name Server of the domain which appears in the email (the sender) and determine
if the originating IP of the mail (the source) is authorized to send mail for the sender's domain. The
mail sender is required to publish an SPF RR.
Support for new resource records
The following is the new resource records which BIND 9.7 supports:
IPSECKEY RR (RFC 4025): Provides a method for storing IPsec keying material in DNS. It also
suggests the host about the gateway information.
DHCID RR (RFC 4701): Using this resource record one can identify the DHCP client associated
with a particular hostname.
A (address) RR for CH Class. Used for BIND’s built-in server information zones, e.g.,
version.bind.
New binaries have been added
Most of them are tools for simplifying DNSSEC key management and others were introduced to
support new features in BIND 9.7. They include:
ddns-confgen: Like rndc-confgen simplifies the configuration required for rndc’ by generating
rndc.conf in a ready-to-use format, ddns-confgen simplifies DDNS (Dynamic DNS) by generating
configuration ready-to-use by nsupdate.
named-compilezone: This is used to take zonefile in text format and output it in raw’
format, which is the memory dump of the zonefile. The zonefile in this format can be loaded
into memory directly, thus improving zone load performance.
named-journalprint: Print the journal form in text format. Previously the journal file could
not be read since it was in binary (‘raw’) format.
isc-hmac-fixup: Fixes HMAC keys generated by older versions of BIND. Due to a bug in
BIND that caused TSIG keys which were longer than the digest length of the hash algorithm
to generate incorrect MAC codes which was incompatible with other DNS implementations.
For BIND 9.7, this bug has been corrected . In our case BIND 9.3.2 and BIND 9.2.0 HPUX
BIND users are affected.
nsec3hash : generate NSEC3 hash.
dnssec-revoke: Set the REVOKED bit on a DNSSEC key. This simplifies DNSSEC key
management in the sense that it also generates new keys after revoking the specified key.
dnssec-settime : Set the key timing metadata for a DNSSEC key. The ability to change
the meta.
dnssec-dsfromkey : Used to generate DS records from the DNSKEY contained in existing
keyset or key files.
This tool can also be used to generate the DS RR from the root’s KSK. The hash in the DS RR
can then be compared with the hash published at ITAR as a part of offline verification to
facilitate further DNSSEC operations.
genrandom: Generates files containing pseudo-random data. This binary is actually not
required for HPUX since it has its random device (/dev/random) which requires the KRNG
DNSSEC validation is set by default and can be unset explicitly 13