2.2.10.2.13 DNSSRV_SKWANSEC_STATS

The DNSSRV_SKWANSEC_STATS structure has DNS server statistics related to security context  processing. This structure MUST be formatted as follows:


0


1


2


3


4


5


6


7


8


9

1
0


1


2


3


4


5


6


7


8


9

2
0


1


2


3


4


5


6


7


8


9

3
0


1

Header

...

SecContextCreate

SecContextFree

SecContextQueue

SecContextQueueInNego

SecContextQueueNegoComplete

SecContextQueueLength

SecContextDequeue

SecContextTimeout

SecPackAlloc

SecPackFree

SecTkeyInvalid

SecTkeyBadTime

SecTsigFormerr

SecTsigEcho

SecTsigBadKey

SecTsigVerifySuccess

SecTsigVerifyFailed

Header (8 bytes): A structure of type DNSSRV_STAT_HEADER (section 2.2.10.2.1).

SecContextCreate (4 bytes): The number of security contexts created by the server since the server was started.

SecContextFree (4 bytes): The number of security contexts released by the server since the server was started.

SecContextQueue (4 bytes): The total number of security contexts in the queue for negotiation on the server since the server was started.

SecContextQueueInNego (4 bytes): The number of security contexts entered in negotiation since the server was started.

SecContextQueueNegoComplete (4 bytes): The number of security contexts that have completed negotiation since the server was started.

SecContextQueueLength (4 bytes): The number of security contexts currently queued.

SecContextDequeue (4 bytes): The total number of security contexts removed from the queue for negotiation since the server was started.

SecContextTimeout (4 bytes): The total number of security contexts in the negotiation list that timed out since the server was started.

SecPackAlloc (4 bytes): The number of buffers allocated by the server for use with GSS-API signature validation.

SecPackFree (4 bytes): The number of buffers for use with GSS-API signature validation released by the server.

SecTkeyInvalid (4 bytes): The number of secure DNS update messages from which TKEY was successfully retrieved.

SecTkeyBadTime (4 bytes): The number of secure DNS update messages that had TKEY with a skewed time stamp.

SecTsigFormerr (4 bytes): The number of TSIG records from which signature extraction failed.

SecTsigEcho (4 bytes): The number of echo TSIG records received by the server, indicating that the remote server is not security aware. [RFC2845]

SecTsigBadKey (4 bytes): The number of TSIG records received for which the cached security context could not be found.

SecTsigVerifySuccess (4 bytes): The number of TSIG records received for which the signature was successfully verified.

SecTsigVerifyFailed (4 bytes): The number of TSIG records received for which signature verification failed.