Skip to main content

Domain Name System (DNS) Cookies
draft-eastlake-dnsext-cookies-04

The information below is for an old version of the document.
Document Type Expired Internet-Draft (candidate for dnsop WG)
Author Donald E. Eastlake 3rd
Last updated 2014-08-01 (Latest revision 2014-01-28)
Replaced by draft-ietf-dnsop-cookies, RFC 7873
Stream Internet Engineering Task Force (IETF)
Formats
Expired & archived
plain text htmlized pdfized bibtex
Stream WG state Call For Adoption By WG Issued
Document shepherd (None)
IESG IESG state Expired
Consensus boilerplate Unknown
Telechat date (None)
Responsible AD (None)
Send notices to (None)
This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at:
https://www.ietf.org/archive/id/draft-eastlake-dnsext-cookies-04.txt

Abstract

DNS cookies are a lightweight DNS transaction security mechanism designed for incremental deployment. They provide limited protection to DNS servers and resolvers against a variety of increasingly common denial-of-service and amplification/forgery or cache poisoning attacks by off-path attackers. DNS Cookies are tolerant of NAT, NAT- PT, and anycast.

Authors

Donald E. Eastlake 3rd

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)