Survey of Domain Verification Techniques using DNS
draft-ietf-dnsop-domain-verification-techniques-00
Document | Type |
This is an older version of an Internet-Draft whose latest revision state is "Active".
Expired & archived
|
|
---|---|---|---|
Authors | Shivan Kaul Sahib , Shumon Huque , Paul Wouters | ||
Last updated | 2023-01-29 (Latest revision 2022-07-28) | ||
Replaces | draft-sahib-domain-verification-techniques | ||
RFC stream | Internet Engineering Task Force (IETF) | ||
Formats | |||
Reviews |
DNSDIR Early review
(of
-05)
by Jim Reid
Not ready
DNSDIR Early review
(of
-02)
by Jim Reid
Not ready
ARTART Early review
(of
-01)
by Barry Leiba
Ready w/nits
|
||
Additional resources | Mailing list discussion | ||
Stream | WG state | WG Document | |
Document shepherd | Tim Wicinski | ||
IESG | IESG state | Expired | |
Consensus boilerplate | Yes | ||
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | tjw.ietf@gmail.com |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
Many services on the Internet need to verify ownership or control of a domain in the Domain Name System (DNS) [RFC1034] [RFC1035]. This verification is often done by requesting a specific DNS record to be visible in the domain. This document surveys various techniques in wide use today, the pros and cons of each, and proposes some practices to avoid known problems.
Authors
Shivan Kaul Sahib
Shumon Huque
Paul Wouters
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)