BIND 9.7.3 Release Notes HP-UX 11i v3 (761997-001, January 2014)

Table Of Contents
are presented in the form of their hashes. This prevented the zone information to leak. The client
would itself generate a hash of the QNAME and would verify using the hashes in the proof.
NSEC3 requires more computation than NSEC, and hence is recommended to be used only if
zone enumeration is a real concern.
BIND 9.7 has provided facilities for a signed zone with NSEC chain to be converted to NSEC3
chain and vice versa.
Generating NSEC3 chain
Convenient methods have been provided to sign using NSEC3 algorithm:
dnssec-signzone takes a u option to convert an NSEC signed zone to NSEC3 and vice
versa,
Dynamically add an NSEC3PARAM (new record introduced to facilitate NSEC3 chain
generation, on the fly) record. When the BIND 9.7 name server finds this record for a secure
zone it will generate the NSEC3 chain. The NSEC chain will be replaced only after the
generation is complete.
New record for NSEC3
New private-type records are introduced that communicates the state of the NSEC3 signing process.
By default its name is TYPE65534. This is a temporary record and is planned to be released in
the future versions when a standard is proposed for the same. New option sig-signing-type
is introduced to specify private RDATA type.
The data field contained in this record is a 5 octet number that has the following format:
Table 1
0000ECF705
complete flag (octet
5)
removal flag (octet
4)
key id in network
(octet 2 and 3)
algorithm (octet 1)
Documented interpretations of the octet values
When signing is complete, these records will have a nonzero value for the final octet.
If the first octet is zero then the record indicates changes to the NSEC3 chains are in
progress.
NOTE: Chains can be converted from NSEC3 to NSEC for secure zones that are generated
using NSEC3-compatible algorithms. RSASHA1 that is the default algorithm for standard DNSSEC
tools like dnssec-keygen and dnssec-signzone is not NSEC3-compatible.
A new algorithm NSEC3RSASHA1 has been introduced to have the compatibility.
By default, dnssec-keygen generates RSASHA1. To generate keys with NSEC3 capable
algorithms, use -3 that switches the default to NSEC3RSASHA1.
Automatic zone re-signing
BIND 9.7 supports for periodic resigning of a secure zone, in which dynamic updates have not
been re-signed as a result of some update action.
New options sig-signing-nodes and sig-signing-signatures were introduced to
break-up the work performed during re-signing.
8 BIND 9.7.3 release notes