DNS Zone Transfer-over-TLS
draft-hzpa-dprive-xfr-over-tls-02
Document | Type | Replaced Internet-Draft (dprive WG) | |
---|---|---|---|
Authors | Han Zhang , Pallavi Aras , Willem Toorop , Sara Dickinson , Allison Mankin | ||
Last updated | 2019-11-15 (latest revision 2019-07-08) | ||
Replaced by | draft-ietf-dprive-xfr-over-tls | ||
Stream | Internent Engineering Task Force (IETF) | ||
Intended RFC status | (None) | ||
Formats |
Expired & archived
pdf
htmlized (tools)
htmlized
bibtex
|
||
Stream | WG state | Adopted by a WG | |
Document shepherd | No shepherd assigned | ||
IESG | IESG state | Replaced by draft-ietf-dprive-xfr-over-tls | |
Consensus Boilerplate | Unknown | ||
Telechat date | |||
Responsible AD | (None) | ||
Send notices to | (None) |
https://www.ietf.org/archive/id/draft-hzpa-dprive-xfr-over-tls-02.txt
Abstract
DNS zone transfers are transmitted in clear text, which gives attackers the opportunity to collect the content of a zone by eavesdropping on network connections. The DNS Transaction Signature (TSIG) mechanism is specified to restrict direct zone transfer to authorized clients only, but it does not add confidentiality. This document specifies use of DNS-over-TLS to prevent zone contents collection via passive monitoring of zone transfers.
Authors
Han Zhang
(hzhang@salesforce.com)
Pallavi Aras
(paras@salesforce.com)
Willem Toorop
(willem@nlnetlabs.nl)
Sara Dickinson
(sara@sinodun.com)
Allison Mankin
(allison.mankin@gmail.com)
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)