:iscman:`named` at startup. See :ref:`dynamic_update_policies` for more details.
Dynamic updates using Kerberos-signed requests can be made using the
-TKEY/GSS protocol, either by setting the :any:`tkey-gssapi-keytab` option
-or by setting both the :any:`tkey-gssapi-credential` and
-:any:`tkey-domain` options. Once enabled, Kerberos-signed requests are
-matched against the update policies for the zone, using the Kerberos
-principal as the signer for the request.
+TKEY/GSS protocol, by setting the :any:`tkey-gssapi-keytab` option.
+Once enabled, Kerberos-signed requests are matched against the update
+policies for the zone, using the Kerberos principal as the signer for
+the request.
Updating of secure zones (zones using DNSSEC) follows :rfc:`3007`: RRSIG,
NSEC, and NSEC3 records affected by updates are automatically regenerated
tcp-receive-buffer <integer>;
tcp-send-buffer <integer>;
tkey-domain <quoted_string>;
- tkey-gssapi-credential <quoted_string>;
+ tkey-gssapi-credential <quoted_string>; // deprecated
tkey-gssapi-keytab <quoted_string>;
tls-port <integer>;
transfer-format ( many-answers | one-answer );
{ "tcp-send-buffer", &cfg_type_uint32, 0 },
{ "tkey-dhkey", NULL, CFG_CLAUSEFLAG_ANCIENT },
{ "tkey-domain", &cfg_type_qstring, 0 },
- { "tkey-gssapi-credential", &cfg_type_qstring, 0 },
+ { "tkey-gssapi-credential", &cfg_type_qstring,
+ CFG_CLAUSEFLAG_DEPRECATED },
{ "tkey-gssapi-keytab", &cfg_type_qstring, 0 },
{ "transfer-message-size", &cfg_type_uint32, 0 },
{ "transfers-in", &cfg_type_uint32, 0 },