| Summary: | При изменении имени компьютера создаётся некорректный ddns-key.conf | ||
|---|---|---|---|
| Product: | Sisyphus | Reporter: | jqt4 <jqt4> |
| Component: | alterator-bind | Assignee: | Anton V. Boyarshinov <boyarsh> |
| Status: | CLOSED FIXED | QA Contact: | qa-sisyphus |
| Severity: | normal | ||
| Priority: | P5 | CC: | boyarsh |
| Version: | unstable | ||
| Hardware: | x86_64 | ||
| OS: | Linux | ||
|
Description
jqt4@altlinux.org
2023-01-27 19:22:50 MSK
Лог сравнения help'ов старого и нового bind'ов:
$ diff -u ../../help-9.11.log ../../help-9.16.log
--- ../../help-9.11.log 2023-01-30 17:52:16.743546892 +0400
+++ ../../help-9.16.log 2023-01-30 17:53:05.858303207 +0400
@@ -2,41 +2,30 @@
Usage:
dnssec-keygen [options] name
-Version: 9.11.37
+Version: 9.16.35
name: owner of the key
Options:
-K <directory>: write keys into directory
+ -k <policy>: generate keys for dnssec-policy
+ -l <file>: configuration file with dnssec-policy statement
-a <algorithm>:
- RSA | RSAMD5 | DSA | RSASHA1 | NSEC3RSASHA1 | NSEC3DSA |
- RSASHA256 | RSASHA512 | ECCGOST |
+ RSASHA1 | NSEC3RSASHA1 |
+ RSASHA256 | RSASHA512 |
ECDSAP256SHA256 | ECDSAP384SHA384 |
- ED25519 | ED448 | DH |
- HMAC-MD5 | HMAC-SHA1 | HMAC-SHA224 | HMAC-SHA256 |
- HMAC-SHA384 | HMAC-SHA512
- (default: RSASHA1, or NSEC3RSASHA1 if using -3)
+ ED25519 | ED448 | DH
-3: use NSEC3-capable algorithm
-b <key size in bits>:
- RSAMD5: [512..4096]
- RSASHA1: [512..4096]
- NSEC3RSASHA1: [512..4096]
- RSASHA256: [512..4096]
+ RSASHA1: [1024..4096]
+ NSEC3RSASHA1: [1024..4096]
+ RSASHA256: [1024..4096]
RSASHA512: [1024..4096]
DH: [128..4096]
- DSA: [512..1024] and divisible by 64
- NSEC3DSA: [512..1024] and divisible by 64
- ECCGOST: ignored
ECDSAP256SHA256: ignored
ECDSAP384SHA384: ignored
ED25519: ignored
ED448: ignored
- HMAC-MD5: [1..512]
- HMAC-SHA1: [1..160]
- HMAC-SHA224: [1..224]
- HMAC-SHA256: [1..256]
- HMAC-SHA384: [1..384]
- HMAC-SHA512: [1..512]
- (if using the default algorithm, key size
- defaults to 2048 for KSK, or 1024 for all others)
+ (key size defaults are set according to
+ algorithm and usage (ZSK or KSK)
-n <nametype>: ZONE | HOST | ENTITY | USER | OTHER
(DNSKEY generation defaults to ZONE)
-c <class>: (default: IN)
@@ -47,7 +36,6 @@
-g <generator>: use specified generator (DH only)
-L <ttl>: default key TTL
-p <protocol>: (default: 3 [dnssec])
- -r <randomdev>: a file containing random data
-s <strength>: strength value this key signs DNS records with (default: 0)
-T <rrtype>: DNSKEY | KEY (default: DNSKEY; use KEY for SIG(0))
-t <type>: AUTHCONF | NOAUTHCONF | NOAUTH | NOCONF (default: AUTHCONF)
|