25.02.2013 Views

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

-p port Specifies that dig should send the query to<br />

a port other than well-known DNS port 53.<br />

-x address Instructs dig to do a reverse lookup on the<br />

specified address.<br />

name The name of the resource record to be looked up.<br />

type The type of query required. This can be any of the st<strong>and</strong>ard<br />

resource record types (see Table 12-2 on page 438).<br />

12.2 Dynamic Domain Name System<br />

The Domain Name System described in 12.1, “Domain Name System (DNS)” on<br />

page 426 is a static implementation without recommendations with regard to<br />

security. In order to implement DNS dynamically, take advantage of DHCP, <strong>and</strong><br />

still to be able to locate any specific host by means of a meaningful label (such as<br />

its host name), the following extensions to DNS are required:<br />

► A method for the host name to address a mapping entry for a client in the<br />

domain name server to be updated after the client has obtained an address<br />

from a DHCP server<br />

► A method for the reverse address to host name mapping to take place after<br />

the client obtains its address<br />

► Updates to the DNS to take effect immediately, without the need for<br />

intervention by an administrator<br />

► Updates to the DNS to be authenticated to prevent unauthorized hosts from<br />

accessing the network <strong>and</strong> to stop imposters from using an existing host<br />

name <strong>and</strong> remapping the address entry for the unsuspecting host to that of its<br />

own<br />

► A method for primary <strong>and</strong> secondary DNS servers to quickly forward <strong>and</strong><br />

receive changes as entries are being updated dynamically by clients<br />

However, implementation of a Dynamic Domain Name System (DDNS) can<br />

introduce problems if the environment is not secure. One method of security<br />

employed by DNS is the use of Secret Key Transaction Authentication (TSIG),<br />

defined in RFC 2845. This can be used to authenticate dynamic updates from<br />

clients, or authenticate responses coming from a recursive server. Additionally,<br />

these messages can now be protected for integrity <strong>and</strong> confidentiality through<br />

using TSIG over the Generic Security Service (GSS-TSIG). This extension, <strong>and</strong><br />

the associated algorithms needed to implement GSS-TSIG, are defined in RFC<br />

3645.<br />

Chapter 12. Directory <strong>and</strong> naming protocols 453

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!