Using Dynamic DNS with BCC 1.2
155
no
vd
ocx
(e
n)
7 Ja
nua
ry 201
0
The -a option specifies the cryptographic algorithm. For dynamic DNS, this must be
HMAC-MD5.
The -b options specifies the number of bits in the key. You should use the strongest encryption
possible, which for HMAC-MD5 is 512.
The -n option is the name type. Because a computer is updating the DNS server, use the HOST
name type.
Replace
cluster_dns_name
with the name of the host. For BCC, the cluster node that hosts the
Novell Cluster Services Master IP Address resource updates the DNS server. Because this can
be any node in the cluster, use the fully qualified name of the cluster as the host name.
For example, enter
dnssec-keygen -a HMAC-MD5 -b 512 -n HOST
cluster1.clusters.site1.company.com
This generates the public and private key files:
K
cluster1.clusters.site1.company.com
.+157+
60303
.key
K
cluster1.clusters.site1.company.com
.+157+
60303
.private
where
60303
represents a randomly generated number created by the utility.
3
Store these files in a secure location, then continue with
Section E.2.2, “Configuring the DNS
Server with the Public Key,” on page 155
.
The DNS administrator uses these keys to configure your master DNS server.
E.2.2 Configuring the DNS Server with the Public Key
Modify the DNS Server configuration to use the public TSIG key you generated in
Section E.2.1,
“Creating the TSIG Keys for DNS Server Authentication,” on page 154
. You can place the public
key information directly in the
/etc/named.conf
file, but it is more secure to place it in a separate
location where the key file can be protected.
1
On the DNS Server, open a terminal console, then log in as the
root
user.
2
Open the
/etc/named.conf
file in a text editor, add the following line before the zone
configuration, then save the changes:
include "keys.conf";
3
Go the
/var/lib/named
directory, then use a text editor to create a
keys.conf
file.
4
In the
keys.conf
file, create a section for each public key you need to add.
The format of the key section is:
key <
cluster_dns_name
>. {
algorithm <cryptographic algorithm>;
secret "<the public key secret>";
};
The
cluster_dns_name
is the same name you used when creating the key with the dnssec-
keygen utility. This name is also found in the public key file that dnssec-keygen created.
The cryptographic algorithm must be HMAC-MD5.
The public key secret is the Base64-encoded secret found in the public key file that the dnssec-
keygen utility created. You can copy and paste the secret from the public key file to the
/var/
lib/named/keys.conf
file
Содержание BUSINESS CONTINUITY CLUSTERING 1.2.1 - ADMINISTRATION
Страница 4: ...4 BCC 1 2 1 Administration Guide for OES 2 SP2 Linux novdocx en 7 January 2010...
Страница 36: ...36 BCC 1 2 1 Administration Guide for OES 2 SP2 Linux novdocx en 7 January 2010...
Страница 56: ...56 BCC 1 2 1 Administration Guide for OES 2 SP2 Linux novdocx en 7 January 2010...
Страница 64: ...64 BCC 1 2 1 Administration Guide for OES 2 SP2 Linux novdocx en 7 January 2010...
Страница 70: ...70 BCC 1 2 1 Administration Guide for OES 2 SP2 Linux novdocx en 7 January 2010...
Страница 132: ...132 BCC 1 2 1 Administration Guide for OES 2 SP2 Linux novdocx en 7 January 2010...
Страница 146: ...146 BCC 1 2 1 Administration Guide for OES 2 SP2 Linux novdocx en 7 January 2010...
Страница 152: ...152 BCC 1 2 1 Administration Guide for OES 2 SP2 Linux novdocx en 7 January 2010...
Страница 166: ...166 BCC 1 2 1 Administration Guide for OES 2 SP2 Linux novdocx en 7 January 2010...
Страница 174: ...174 BCC 1 2 1 Administration Guide for OES 2 SP2 Linux novdocx en 7 January 2010...
Страница 176: ...176 BCC 1 2 1 Administration Guide for OES 2 SP2 Linux novdocx en 7 January 2010...
Страница 184: ...184 BCC 1 2 1 Administration Guide for OES 2 SP2 Linux novdocx en 7 January 2010...