Skip to main content

Intermediate Security Failures in DNSSEC
draft-ietf-dnssec-secfail-00

Document Type Expired Internet-Draft (dnssec WG)
Expired & archived
Authors Ólafur Guðmundsson , Brian Wellington
Last updated 1998-08-06
RFC stream Internet Engineering Task Force (IETF)
Intended RFC status (None)
Formats
Additional resources Mailing list discussion
Stream WG state WG Document
Document shepherd (None)
IESG IESG state Expired
Consensus boilerplate Unknown
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

This document identifies the situations where a signature verification fails in a recursive security aware DNS server, and how DNS servers should handle these cases, and the errors that should be reported to DNS resolvers. This document proposes a new error to be returned by DNSSEC capable servers. A DNSSEC server acting as a recursive server MUST validate the signatures on RRsets in a response it passes on; this draft addresses the case when the data it receives fails signature verification. The end resolver must be notified of this occurence in such a way that it will not confuse it with another error.

Authors

Ólafur Guðmundsson
Brian Wellington

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)