DNS Zone Transfer using DNS Stateful Operations
draft-zatda-dprive-xfr-using-dso-00
Document | Type |
Expired Internet-Draft
(individual)
Expired & archived
|
|
---|---|---|---|
Authors | Han Zhang , Pallavi Aras , Willem Toorop , Sara Dickinson , Allison Mankin | ||
Last updated | 2020-01-09 (Latest revision 2019-07-08) | ||
RFC stream | (None) | ||
Intended RFC status | (None) | ||
Formats | |||
Stream | Stream state | (No stream defined) | |
Consensus boilerplate | Unknown | ||
RFC Editor Note | (None) | ||
IESG | IESG state | Expired | |
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
DNS zone transfers are transmitted in clear text, which gives attackers the opportunity to collect the content of a zone by eavesdropping on network connections. This document specifies use of DNS Stateful Operations to enable a subscribe/publish mechanism for zone transfers reducing the over head introduced by NOTITY/SOA interactions prior to zone transfer request. This additionally prevents zone contents collection via passive monitoring of zone transfers by restricting XFR using DSO to require TLS.
Authors
Han Zhang
Pallavi Aras
Willem Toorop
Sara Dickinson
Allison Mankin
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)