Signaling Authoritative DNS Encryption
draft-rescorla-dprive-adox-latest-00
Document | Type |
Expired Internet-Draft
(individual)
Expired & archived
|
|
---|---|---|---|
Authors | Tommy Pauly , Eric Rescorla , David Schinazi , Christopher A. Wood | ||
Last updated | 2021-08-30 (Latest revision 2021-02-26) | ||
RFC stream | (None) | ||
Intended RFC status | (None) | ||
Formats | |||
Stream | Stream state | (No stream defined) | |
Consensus boilerplate | Unknown | ||
RFC Editor Note | (None) | ||
IESG | IESG state | Expired | |
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
This document defines a mechanism for signaling that a given authoritative DNS server is reachable by encrypted DNS. Discussion Venues This note is to be removed before publishing as an RFC. Discussion of this document takes place on the DNS PRIVate Exchange Working Group mailing list (dns-privacy@ietf.org), which is archived at https://mailarchive.ietf.org/arch/browse/dns-privacy/. Source for this draft and an issue tracker can be found at https://github.com/ekr/draft-rescorla-dprive-adox.
Authors
Tommy Pauly
Eric Rescorla
David Schinazi
Christopher A. Wood
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)