From: Peter van Dijk Date: Fri, 17 Feb 2012 12:54:01 +0000 (+0000) Subject: Document ALLOW-AXFR-FROM; remove some more leftovers from the old ACL stuff; make... X-Git-Tag: auth-3.1-rc1~111 X-Git-Url: https://granicus.if.org/sourcecode?a=commitdiff_plain;h=2ca6909c1f1cda8b7582ff5df2cb86f8293a6227;p=pdns Document ALLOW-AXFR-FROM; remove some more leftovers from the old ACL stuff; make sure all domainmetadata entries in the doc chapter have a link; other minor cleanups git-svn-id: svn://svn.powerdns.com/pdns/trunk/pdns@2415 d19b8d6e-7fed-0310-83ef-9ca221ded41b --- diff --git a/pdns/docs/pdns.xml b/pdns/docs/pdns.xml index ffdfffe53..bc11414f4 100644 --- a/pdns/docs/pdns.xml +++ b/pdns/docs/pdns.xml @@ -11151,21 +11151,46 @@ zone "powerdnssec.org" { protection of subsequent AXFR zone content messages. + AXFR ACLs + + Starting with the PowerDNS Authoritative Server 3.1, per-zone AXFR ACLs can be stored in the domainmetadata table. + + + Each ACL row can list one subnet (v4 or v6), or the magical value 'AUTO-NS' that tries to allow all potential slaves in. + + + Example: + +sql> select id from domains where name='example.com'; +7 +sql> insert into domainmetadata (domain_id, kind, content) values (7,'ALLOW-AXFR-FROM','AUTO-NS'); +sql> insert into domainmetadata (domain_id, kind, content) values (7,'ALLOW-AXFR-FROM','2001:db8::/48'); + + + Per zone settings aka Domain Metadata - Starting with the PowerDNS Authoritative Server, each served zone can have "metadata". Such metadata determines + Starting with the PowerDNS Authoritative Server 3.0, each served zone can have "metadata". Such metadata determines how this zone behaves in certain circumstances. Domain metadata is only available for DNSSEC capable backends! Make sure to enable the proper '-dnssec' setting to benefit, and to have performed the DNSSEC schema update. - Each metadata item is described elsewhere in the documentation, and the following settings are available: + Most of these metadata items are described elsewhere in the documentation. The following settings are available: + + ALLOW-AXFR-FROM + + + Per-zone AXFR ACLs (see ). + + + AXFR-MASTER-TSIG - Use this named TSIG key to retrieve this zone from its master. + Use this named TSIG key to retrieve this zone from its master (see ). @@ -11173,7 +11198,7 @@ zone "powerdnssec.org" { LUA-AXFR-SCRIPT - Script to be used to edit incoming AXFRs. + Script to be used to edit incoming AXFRs (see ). @@ -11181,7 +11206,7 @@ zone "powerdnssec.org" { NSEC3NARROW - Determines if this zone operates in NSEC3 'narrow' mode. + Determines if this zone operates in NSEC3 'narrow' mode (see 'set-nsec3' in ). @@ -11190,7 +11215,7 @@ zone "powerdnssec.org" { NSEC3 parameters of a DNSSEC zone. Will be used to synthesize the NSEC3PARAM record. If present, NSEC3 is used, if not - present, zones default to NSEC. + present, zones default to NSEC (see 'set-nsec3' in ). @@ -11199,7 +11224,7 @@ zone "powerdnssec.org" { PRESIGNED - This zone carries DNSSEC RRSIGs (signatures), and is presigned. + This zone carries DNSSEC RRSIGs (signatures), and is presigned (see 'set-presigned' in ). @@ -11228,7 +11253,7 @@ zone "powerdnssec.org" { TSIG-ALLOW-AXFR - Allow these named TSIG keys to AXFR this zone. + Allow these named TSIG keys to AXFR this zone (see ). @@ -12730,7 +12755,7 @@ end where a domain comes from. - Modifying a slave zone using a script + Modifying a slave zone using a script As of version 3.0, the PowerDNS Authoritative Server can invoke a Lua script on an incoming AXFR zone transfer. The user-defined function axfrfilter within your script is invoked for each resource record read during the transfer, @@ -15805,15 +15830,6 @@ insert into domains (id,name,type) values (domains_id_sequence.nextval,'netherla - The AccessControlList Table - - There is the beginning of an ACL feature, implemented in this table. At this time, it's used - by PowerDNS for only one thing: outgoing AXFR permission by IP address. In your schema, you - will probably want to implement ACLs entirely in PL/SQL. In the reference schema, this table - stores a simple list of ACL parameters for which we set allow to 1. - - - The Tables for Cryptographic Keys We have two of them: TSIGKeys for symmetric TSIG keys, and @@ -16354,39 +16370,6 @@ UPDATE Zones SET notified_serial = :serial WHERE id = :zoneid - - oracle-check-acl-query - - - A PL/SQL block that sets :allow to 1 if the action - :acltype is allowed to be performed when :aclkey - is :aclval, 0 otherwise. - - - At the moment, this is only used for outgoing AXFR, in which case - :acltype is allow-axfr, - :aclkey is the name of the requested zone, and - :aclval is the IP address of the requesting client. - - - Default implementation: - - -BEGIN - IF EXISTS ( - SELECT 1 FROM AccessControlList - WHERE acl_type = :acltype - AND acl_key = :aclkey - AND acl_val = :aclval - ) THEN - :allow := 1; - ELSE - :allow := 0; - END IF; -END; - - - oracle-also-notify-query