Domain Name System (DNS) Cookies
draft-eastlake-dnsext-cookies-03

The information below is for an old version of the document
Document Type Expired Internet-Draft (individual)
Last updated 2008-02-25 (latest revision 2007-08-22)
Replaced by draft-ietf-dnsop-cookies, rfc7873
Stream (None)
Intended RFC status (None)
Formats
Expired & archived
plain text pdf html bibtex
Stream Stream state (No stream defined)
Consensus Boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at
https://www.ietf.org/archive/id/draft-eastlake-dnsext-cookies-03.txt

Abstract

DNS cookies are a light-weight DNS transaction security mechanism designed for incremental deployment. They provide limited protection to DNS servers and resolvers against a variety of increasingly common denial-of-service and cache poisoning or forgery attacks by off-path attackers. DNS Cookies are tolerant of NAT, NAT-PT, and Anycast.

Authors

Donald Eastlake (Donald.Eastlake@motorola.com)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)