Skip to main content

Zone Hopping: A method to prevent zone-walking in DNSSEC
draft-fbw-dnsop-dnszonehop-00

Document Type Expired Internet-Draft (individual)
Expired & archived
Authors Fatema Bannat Wala , Stephan K Bohacek , Nick Buraglio
Last updated 2025-01-22 (Latest revision 2024-07-21)
RFC stream (None)
Intended RFC status (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

DNS Security Extension (DNSSEC) as defined by [RFC9364] was developed to address significant security integrity flaws in DNS. Within certain circumstances, information leakage may be possible stemming from a known DNSSEC vulnerability that facilitates a process known as zone walking, which enables the efficient collection of all FQDNs from a given environment. This document describes the problem space as outlined in [IEEE-ZoneHopping] and offers a potential solution, called Zone-Hopping, to aid in addressing the domain information leakage capable via Zone-walking while preserving the integrity of the records for which DNSSEC was originally introduced.

Authors

Fatema Bannat Wala
Stephan K Bohacek
Nick Buraglio

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)