|
|
|
1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 3 3
|
|
0 1 2 3 4 5 6 7 8 9 0 1
2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
flags
|
protocol | algorithm |
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
/
|
|
/
public key
/
|
|
/
/
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-|
|
|
Flags:
|
|
0
1 2 3 4
5 6 7 8
9 0 1 2
3 4 5
|
|
+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
|
|
| A/C | Z |
XT| Z | Z | NAMTYP| Z | Z | Z | Z | SIG |
|
|
+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
|
|
|
|
When dealing
with ZONE data NAMTYPE is set to 01.
|
|
If bit 0 and 1
are both 0 then the key can be used for authentication and
confidentiality. DNSSEC
normally sets these two bits to 0.
|
|
|
|
If bit 0 and 1
are set, then there is NO key and the RR stops after the algorithm octet.
|
|
Flags 0XC100 =
49408
|
|
|
|
Protocol: For
DNSSEC the protocol is 3. IPSEC would have 4 in the protocol field.
|
|
|
|
Algorithm: 1 RSA/MD5 [RFC 2537]
|
|
2 Diffie-Hellman
[RFC 2539] - optional, key only
|
|
3
DSA [RFC 2536] Ð Mandatory in implementations
|
|
4
reserved for elliptic curve crypto
|
|
5 RSA/SHA1 [RFC3110] Ð Mandatory in
implementations
|
|
|
|
There are
developments to restrict the use of KEYs to DNSSEC only. So only allow
protocol 3 and drop some of the flags see:
draft-ietf-dnsext--restrict-key-for-dnssec-??.txt
|