"zsk" သို့ ကိုးရီးယား သို့ဘာသာပြန်ပါ

အင်္ဂလိပ်စာ မှ ကိုးရီးယား သို့စကားစု "zsk" ကိုဘာသာပြန်ဆိုထားသော 24 ဘာသာပြန်ဆိုမှု၏ 24 ကိုပြထားသည်။

zsk ၏ အင်္ဂလိပ်စာ မှ ကိုးရီးယား သို့ ဘာသာပြန်ခြင်း

အင်္ဂလိပ်စာ
ကိုးရီးယား

EN The zone operator also needs to make their public ZSK available by adding it to their name server in a DNSKEY record.

KO 구간 오퍼레이터는 또한 공개 키를 이름 서버의 DNSKEY 레코드에 추가해 공개 ZSK를 이용할 수 있게 만들어야 합니다.

စကားအသုံးအနှုန်း gugan opeoleiteoneun ttohan gong-gae kileul ileum seobeoui DNSKEY lekodeue chugahae gong-gae ZSKleul iyonghal su issge mandeul-eoya habnida.

အင်္ဂလိပ်စာ ကိုးရီးယား
dnskey dnskey

EN The resolver can then pull the DNSKEY record containing the public ZSK from the name server

KO 이제 확인자는 공개 ZSK가 있는 DNSKEY 레코드를 이름 서버에서 끌어올 수 있습니다

စကားအသုံးအနှုန်း ije hwag-injaneun gong-gae ZSKga issneun DNSKEY lekodeuleul ileum seobeoeseo kkeul-eool su issseubnida

အင်္ဂလိပ်စာ ကိုးရီးယား
dnskey dnskey

EN Together, the RRset, RRSIG, and public ZSK can validate the response.

KO RRset, RRSIG, 공개 ZSK가 함께 응답을 검증할 수 있습니다.

စကားအသုံးအနှုန်း RRset, RRSIG, gong-gae ZSKga hamkke eungdab-eul geomjeunghal su issseubnida.

EN If we trust the zone-signing key in the DNSKEY record, we can trust all the records in the zone. But, what if the zone-signing key was compromised? We need a way to validate the public ZSK.

KO DNSKEY 레코드의 구간 서명 키를 신뢰한다면 구간의 모든 레코드를 신뢰할 수 있습니다. 하지만 구간 서명 키가 손상되었다면 어떨까요? 공개 ZSK를 검증할 방법이 필요할 것입니다.

စကားအသုံးအနှုန်း DNSKEY lekodeuui gugan seomyeong kileul sinloehandamyeon gugan-ui modeun lekodeuleul sinloehal su issseubnida. hajiman gugan seomyeong kiga sonsangdoeeossdamyeon eotteolkkayo? gong-gae ZSKleul geomjeunghal bangbeob-i pil-yohal geos-ibnida.

အင်္ဂလိပ်စာ ကိုးရီးယား
dnskey dnskey

EN Just like the public ZSK, the name server publishes the public KSK in another DNSKEY record, which gives us the DNSKEY RRset shown above

KO 공개 ZSK와 마찬가지로 이름 서버는 공개 KSK를 다른 DNSKEY 레코드에 게시하는데, 이를 통해 위에 표시된 것과 같은 DNSKEY RRset이 만들어집니다

စကားအသုံးအနှုန်း gong-gae ZSKwa machangajilo ileum seobeoneun gong-gae KSKleul daleun DNSKEY lekodeue gesihaneunde, ileul tonghae wie pyosidoen geosgwa gat-eun DNSKEY RRset-i mandeul-eojibnida

အင်္ဂလိပ်စာ ကိုးရီးယား
dnskey dnskey

EN Both the public KSK and public ZSK are signed by the private KSK

KO 공개 KSK와 공개 ZSK 모두 비공개 KSK가 서명합니다

စကားအသုံးအနှုန်း gong-gae KSKwa gong-gae ZSK modu bigong-gae KSKga seomyeonghabnida

EN Resolvers can then use the public KSK to validate the public ZSK.

KO 이제 확인자는 공개 KSK를 이용해 공개 ZSK를 검증합니다.

စကားအသုံးအနှုန်း ije hwag-injaneun gong-gae KSKleul iyonghae gong-gae ZSKleul geomjeunghabnida.

EN Request the DNSKEY records containing the public ZSK and public KSK, which also returns the RRSIG for the DNSKEY RRset.

KO 공개 ZSK와 공개 KSK가 들어 있는 DNSKEY 레코드를 요청하면 DNSKEY RRset의 RRSIG도 함께 반환됩니다.

စကားအသုံးအနှုန်း gong-gae ZSKwa gong-gae KSKga deul-eo issneun DNSKEY lekodeuleul yocheonghamyeon DNSKEY RRset-ui RRSIGdo hamkke banhwandoebnida.

အင်္ဂလိပ်စာ ကိုးရီးယား
dnskey dnskey

EN Verify the RRSIG of the requested RRset with the public ZSK.

KO 공개 ZSK로, 요청한 RRset의 RRSIG를 확인합니다.

စကားအသုံးအနှုန်း gong-gae ZSKlo, yocheonghan RRset-ui RRSIGleul hwag-inhabnida.

KO 이에 비해 ZSK를 교체하는 일은 훨씬 용이합니다

စကားအသုံးအနှုန်း ie bihae ZSKleul gyochehaneun il-eun hwolssin yong-ihabnida

EN This allows us to use a smaller ZSK without compromising the security of the server, minimizing the amount of data that the server has to send with each response.

KO 이렇게 함으로써, 서버의 보안을 손상하지 않으면서 ZSK의 크기를 줄여 서버가 각 응답에 함께 보낼 데이터 양을 줄일 수 있는 것입니다.

စကားအသုံးအနှုန်း ileohge ham-eulosseo, seobeoui boan-eul sonsanghaji anh-eumyeonseo ZSKui keugileul jul-yeo seobeoga gag eungdab-e hamkke bonael deiteo yang-eul jul-il su issneun geos-ibnida.

EN The ceremony produces an RRSIG record that can be used to verify the root name server’s public KSK and ZSK

KO 이 서명식에서 루트 이름 서버의 공개 KSK 및 ZSK를 확인하는 데 이용할 RRSIG 레코드가 만들어집니다

စကားအသုံးအနှုန်း i seomyeongsig-eseo luteu ileum seobeoui gong-gae KSK mich ZSKleul hwag-inhaneun de iyonghal RRSIG lekodeuga mandeul-eojibnida

EN The zone operator also needs to make their public ZSK available by adding it to their name server in a DNSKEY record.

KO 구간 오퍼레이터는 또한 공개 키를 이름 서버의 DNSKEY 레코드에 추가해 공개 ZSK를 이용할 수 있게 만들어야 합니다.

စကားအသုံးအနှုန်း gugan opeoleiteoneun ttohan gong-gae kileul ileum seobeoui DNSKEY lekodeue chugahae gong-gae ZSKleul iyonghal su issge mandeul-eoya habnida.

အင်္ဂလိပ်စာ ကိုးရီးယား
dnskey dnskey

EN The resolver can then pull the DNSKEY record containing the public ZSK from the name server

KO 이제 확인자는 공개 ZSK가 있는 DNSKEY 레코드를 이름 서버에서 끌어올 수 있습니다

စကားအသုံးအနှုန်း ije hwag-injaneun gong-gae ZSKga issneun DNSKEY lekodeuleul ileum seobeoeseo kkeul-eool su issseubnida

အင်္ဂလိပ်စာ ကိုးရီးယား
dnskey dnskey

EN Together, the RRset, RRSIG, and public ZSK can validate the response.

KO RRset, RRSIG, 공개 ZSK가 함께 응답을 검증할 수 있습니다.

စကားအသုံးအနှုန်း RRset, RRSIG, gong-gae ZSKga hamkke eungdab-eul geomjeunghal su issseubnida.

EN If we trust the zone-signing key in the DNSKEY record, we can trust all the records in the zone. But, what if the zone-signing key was compromised? We need a way to validate the public ZSK.

KO DNSKEY 레코드의 구간 서명 키를 신뢰한다면 구간의 모든 레코드를 신뢰할 수 있습니다. 하지만 구간 서명 키가 손상되었다면 어떨까요? 공개 ZSK를 검증할 방법이 필요할 것입니다.

စကားအသုံးအနှုန်း DNSKEY lekodeuui gugan seomyeong kileul sinloehandamyeon gugan-ui modeun lekodeuleul sinloehal su issseubnida. hajiman gugan seomyeong kiga sonsangdoeeossdamyeon eotteolkkayo? gong-gae ZSKleul geomjeunghal bangbeob-i pil-yohal geos-ibnida.

အင်္ဂလိပ်စာ ကိုးရီးယား
dnskey dnskey

EN Just like the public ZSK, the name server publishes the public KSK in another DNSKEY record, which gives us the DNSKEY RRset shown above

KO 공개 ZSK와 마찬가지로 이름 서버는 공개 KSK를 다른 DNSKEY 레코드에 게시하는데, 이를 통해 위에 표시된 것과 같은 DNSKEY RRset이 만들어집니다

စကားအသုံးအနှုန်း gong-gae ZSKwa machangajilo ileum seobeoneun gong-gae KSKleul daleun DNSKEY lekodeue gesihaneunde, ileul tonghae wie pyosidoen geosgwa gat-eun DNSKEY RRset-i mandeul-eojibnida

အင်္ဂလိပ်စာ ကိုးရီးယား
dnskey dnskey

EN Both the public KSK and public ZSK are signed by the private KSK

KO 공개 KSK와 공개 ZSK 모두 비공개 KSK가 서명합니다

စကားအသုံးအနှုန်း gong-gae KSKwa gong-gae ZSK modu bigong-gae KSKga seomyeonghabnida

EN Resolvers can then use the public KSK to validate the public ZSK.

KO 이제 확인자는 공개 KSK를 이용해 공개 ZSK를 검증합니다.

စကားအသုံးအနှုန်း ije hwag-injaneun gong-gae KSKleul iyonghae gong-gae ZSKleul geomjeunghabnida.

EN Request the DNSKEY records containing the public ZSK and public KSK, which also returns the RRSIG for the DNSKEY RRset.

KO 공개 ZSK와 공개 KSK가 들어 있는 DNSKEY 레코드를 요청하면 DNSKEY RRset의 RRSIG도 함께 반환됩니다.

စကားအသုံးအနှုန်း gong-gae ZSKwa gong-gae KSKga deul-eo issneun DNSKEY lekodeuleul yocheonghamyeon DNSKEY RRset-ui RRSIGdo hamkke banhwandoebnida.

အင်္ဂလိပ်စာ ကိုးရီးယား
dnskey dnskey

EN Verify the RRSIG of the requested RRset with the public ZSK.

KO 공개 ZSK로, 요청한 RRset의 RRSIG를 확인합니다.

စကားအသုံးအနှုန်း gong-gae ZSKlo, yocheonghan RRset-ui RRSIGleul hwag-inhabnida.

KO 이에 비해 ZSK를 교체하는 일은 훨씬 용이합니다

စကားအသုံးအနှုန်း ie bihae ZSKleul gyochehaneun il-eun hwolssin yong-ihabnida

EN This allows us to use a smaller ZSK without compromising the security of the server, minimizing the amount of data that the server has to send with each response.

KO 이렇게 함으로써, 서버의 보안을 손상하지 않으면서 ZSK의 크기를 줄여 서버가 각 응답에 함께 보낼 데이터 양을 줄일 수 있는 것입니다.

စကားအသုံးအနှုန်း ileohge ham-eulosseo, seobeoui boan-eul sonsanghaji anh-eumyeonseo ZSKui keugileul jul-yeo seobeoga gag eungdab-e hamkke bonael deiteo yang-eul jul-il su issneun geos-ibnida.

EN The ceremony produces an RRSIG record that can be used to verify the root name server’s public KSK and ZSK

KO 이 서명식에서 루트 이름 서버의 공개 KSK 및 ZSK를 확인하는 데 이용할 RRSIG 레코드가 만들어집니다

စကားအသုံးအနှုန်း i seomyeongsig-eseo luteu ileum seobeoui gong-gae KSK mich ZSKleul hwag-inhaneun de iyonghal RRSIG lekodeuga mandeul-eojibnida

ဘာသာပြန်ချက်များကို 24 မှ 24 ကိုပြနေသည်