DNS Zone Transfer-over-TLS
draft-hzpa-dprive-xfr-over-tls-02

Document Type Replaced Internet-Draft (dprive WG)
Last updated 2019-11-15 (latest revision 2019-07-08)
Replaced by draft-ietf-dprive-xfr-over-tls
Stream IETF
Intended RFC status (None)
Formats
Expired & archived
pdf htmlized bibtex
Stream WG state Adopted by a WG
Document shepherd No shepherd assigned
IESG IESG state Replaced by draft-ietf-dprive-xfr-over-tls
Consensus Boilerplate Unknown
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at
https://www.ietf.org/archive/id/draft-hzpa-dprive-xfr-over-tls-02.txt

Abstract

DNS zone transfers are transmitted in clear text, which gives attackers the opportunity to collect the content of a zone by eavesdropping on network connections. The DNS Transaction Signature (TSIG) mechanism is specified to restrict direct zone transfer to authorized clients only, but it does not add confidentiality. This document specifies use of DNS-over-TLS to prevent zone contents collection via passive monitoring of zone transfers.

Authors

Han Zhang (hzhang@salesforce.com)
Pallavi Aras (paras@salesforce.com)
Willem Toorop (willem@nlnetlabs.nl)
Sara Dickinson (sara@sinodun.com)
Allison Mankin (allison.mankin@gmail.com)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)