datatracker.ietf.org
Sign in
Version 5.3.0, 2014-04-12
Report a bug

Using Secure DNS to Associate Certificates with Domain Names For TLS
draft-hoffman-keys-linkage-from-dns-03

Document type: Expired Internet-Draft (individual)
Document stream: No stream defined
Last updated: 2010-10-04
Intended RFC status: Unknown
Other versions: (expired, archived): plain text, pdf, html

Stream State:No stream defined
Document shepherd: No shepherd assigned

IESG State: Expired
Responsible AD: (None)
Send notices to: No addresses provided

This Internet-Draft is no longer active. Unofficial copies of old Internet-Drafts can be found here:
http://tools.ietf.org/id/draft-hoffman-keys-linkage-from-dns

Abstract

TLS and DTLS use certificates for authenticating the server. Users want their applications to verify that the certificate provided by the TLS server is in fact associated with the domain name they expect. Instead of trusting a certificate authority to have made this association correctly, the user might instead trust the authoritative DNS server for the domain name to make that association. This document describes how to use secure DNS to associate the TLS server's certificate with the the intended domain name.

Authors

Paul Hoffman <paul.hoffman@vpnc.org>
Jakob Schlyter <jakob@kirei.se>
Warren Kumari <warren@kumari.net>
Adam Langley <agl@google.com>

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid)