Using Early Data in DNS over TLS
draft-ietf-dprive-early-data-00
Document | Type | Expired Internet-Draft (dprive WG) | |
---|---|---|---|
Author | Alessandro Ghedini | ||
Last updated | 2020-10-24 (latest revision 2020-04-22) | ||
Replaces | draft-ghedini-dprive-early-data | ||
Stream | IETF | ||
Intended RFC status | (None) | ||
Formats |
Expired & archived
pdf
htmlized (tools)
htmlized
bibtex
|
||
Stream | WG state | WG Document | |
Document shepherd | No shepherd assigned | ||
IESG | IESG state | Expired | |
Consensus Boilerplate | Unknown | ||
Telechat date | |||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of
the expired Internet-Draft can be found at
https://www.ietf.org/archive/id/draft-ietf-dprive-early-data-00.txt
https://www.ietf.org/archive/id/draft-ietf-dprive-early-data-00.txt
Abstract
This document illustrates the risks of using TLS 1.3 early data with DNS over TLS, and specifies behaviors that can be adopted by clients and servers to reduce those risks.
Authors
Alessandro Ghedini (alessandro@cloudflare.com)
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)