Skip to main content

DNSSEC Implementation in the CAIRN Testbed

Document Type Expired Internet-Draft (individual)
Expired & archived
Authors Dan Massey , Edward P. Lewis
Last updated 2021-06-08 (Latest revision 1999-10-22)
RFC stream (None)
Intended RFC status (None)
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:


This draft describes the operational and administrative considerations encountered as part of the migration from a traditional Domain Name Service (DNS) infrastructure to one based on DNS Security (DNSSEC). The information presented in this draft is based on the implementation of DNSSEC in the Collaborative Advanced Inter-agency Research Network (CAIRN) testbed. CAIRN is a DARPA funded testbed used by Government, University, and Commercial researchers to conduct Internet Protocol (IP) network based research. Additional information on the CAIRN testbed is available at Details on the DNSSEC implementation in CAIRN can be found at It is envisioned that the information presented in this draft can be used as a starting reference for sites interested in deploying DNSSEC. It is also hoped that reporting on the experience of CAIRN DNSSEC implementation will provide a forum for general discussions regarding DNSSEC implementation.


Dan Massey
Edward P. Lewis

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)