Skip to main content

Transaction SIGnature (TSIG) using CGA Algorithm in IPv6
draft-rafiee-cga-tsig-00

Document Type Replaced Internet-Draft (individual)
Expired & archived
Authors Hosnieh Rafiee , Martin von Loewis , Christoph Meinel
Last updated 2012-12-21 (Latest revision 2012-10-02)
Replaced by draft-rafiee-intarea-cga-tsig
RFC stream (None)
Intended RFC status (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Replaced by draft-rafiee-intarea-cga-tsig
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

The first step of Transaction SIGnature (TSIG) (RFC 2845) is to generate a shared secret and exchange it manually between a DNS server and a host. This document, CGA-TSIG, proposes a possible way to automate the now manual process for the authentication of a node with a DNS server during the DNS Update process by using the same parameters as are used in generating a secure address in IPv6 networks, i.e., Cryptographically Generated Addresses (CGA) (RFC 3972). CGA-TSIG facilitates this authentication process and reduces the time needed for DNS Updates. The current signature generation process and verification mechanism in TSIG are thus replaced with CGA. This algorithm is added, as an extension, to TSIG to eliminate the human intervention needed for generation and exchange of keys between a DNS server and a host when SEcure Neighbor Discovery (SEND) (RFC 3971) is used.

Authors

Hosnieh Rafiee
Martin von Loewis
Christoph Meinel

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)