Skip to main content

CGA-TSIG/e: Algorithms for Secure DNS Authentication and Optional DNS Confidentiality
draft-rafiee-intarea-cga-tsig-11

The information below is for an old version of the document.
Document Type
This is an older version of an Internet-Draft whose latest revision state is "Expired".
Expired & archived
Authors Hosnieh Rafiee , Martin von Loewis , Christoph Meinel
Last updated 2015-04-27 (Latest revision 2014-10-24)
Replaces draft-rafiee-cga-tsig
RFC stream (None)
Formats
Reviews
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

This document describes a new mechanism for secure DNS authentication and DNS data confidentiality in various scenarios. The purpose of this document is to reduce human interaction during different DNS scenarios such as the communications of resolvers to stub resolvers, recursive resolvers to Authoritative Name Server, Dynamic DNS updates, (especially updating PTR and FQDN records). The aim of this document is to assist DNSSEC to protect the last miles of Internet easier. This document supports both IPv4 and IPv6 enabled networks.

Authors

Hosnieh Rafiee
Martin von Loewis
Christoph Meinel

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)