Skip to main content

Split-View DNSSEC Operational Practices
draft-krishnaswamy-dnsop-dnssec-split-view-04

Document Type Expired Internet-Draft (individual)
Expired & archived
Author Suresh Krishnaswamy
Last updated 2007-03-06
RFC stream (None)
Intended RFC status (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

The security extensions to the Domain Name System (DNSSEC) allow for integrity protection, whereby it is possible to make a determination of the verity of data returned from the Domain Name System in response to a query. Current operation of the Domain Name System also allows for the creation of multiple views of data, where the answer returned in response to a query is dependent on the origin of the query. Data integrity and the ability to return possibly conflicting values as in split-views may be construed to be mutually conflicting goals; but this apparent dichotomy is resolvable in practice through careful configuration. This document provides recommendations for configuring a manageable split-view DNSSEC environment in a representative enterprise network.

Authors

Suresh Krishnaswamy

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)