Domain Name System (DNS) Cookies
draft-eastlake-dnsext-cookies-04

The information below is for an old version of the document
Document Type Expired Internet-Draft (candidate for dnsop WG)
Last updated 2014-08-01 (latest revision 2014-01-28)
Replaced by draft-ietf-dnsop-cookies, rfc7873
Stream IETF
Intended RFC status (None)
Formats
Expired & archived
pdf htmlized bibtex
Stream WG state Call For Adoption By WG Issued
Document shepherd None
IESG IESG state Expired
Consensus Boilerplate Unknown
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at
https://www.ietf.org/archive/id/draft-eastlake-dnsext-cookies-04.txt

Abstract

DNS cookies are a lightweight DNS transaction security mechanism designed for incremental deployment. They provide limited protection to DNS servers and resolvers against a variety of increasingly common denial-of-service and amplification/forgery or cache poisoning attacks by off-path attackers. DNS Cookies are tolerant of NAT, NAT- PT, and anycast.

Authors

Donald Eastlake (d3e3e3@gmail.com)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)