| Additional
notes: |
|
| ¥ Always use TSIG to secure zone transfers
between primary and secondary. |
|
| ¥ Dynamic updates and DNSSEC opens up specific
set of problems. |
|
| ¥ Shared secret also called symmetric key
cryptography. |
|
| ¥ Symmetric key cryptography is fast. It can be
used Ôon the flyÕ. |
|