skip to main content
Bibliometrics
Skip Abstract Section
Abstract

This protocol allows for transaction level authentication using shared secrets and one way hashing. It can be used to authenticate dynamic updates as coming from an approved client, or to authenticate responses as coming from an approved recursive name server.

RFC Downloads

Cited By

  1. ACM
    Gibb R, Madhavapeddy A and Crowcroft J Where on Earth is the Spatial Name System? Proceedings of the 22nd ACM Workshop on Hot Topics in Networks, (79-86)
  2. Cao J, Ma M, Wang X and Liu H (2017). A Selective Re-Query Case Sensitive Encoding Scheme Against DNS Cache Poisoning Attacks, Wireless Personal Communications: An International Journal, 94:3, (1263-1279), Online publication date: 1-Jun-2017.
  3. ACM
    Korczyński M, Król M and van Eeten M Zone Poisoning Proceedings of the 2016 Internet Measurement Conference, (271-278)
  4. ACM
    Danielis P, Altmann V, Skodzik J, Wegner T, Koerner A and Timmermann D (2015). P-DONAS, ACM Transactions on Internet Technology, 15:3, (1-21), Online publication date: 28-Sep-2015.
  5. ACM
    Zhu Z, Wakikawa R, Cheshire S and Zhang L Home as you go Proceedings of the 7th Asian Internet Engineering Conference, (89-95)
  6. ACM
    Dagon D, Antonakakis M, Vixie P, Jinmei T and Lee W Increased DNS forgery resistance through 0x20-bit encoding Proceedings of the 15th ACM conference on Computer and communications security, (211-222)
  7. ACM
    Le D, Lei J and Fu X A new decentralized mobility management service architecture for ipv6-based networks Proceedings of the 3rd ACM workshop on Wireless multimedia networking and performance modeling, (54-61)
  8. ACM
    Vixie P (2007). DNS Complexity, Queue, 5:3, (24-29), Online publication date: 1-Apr-2007.
  9. Cheung S (2006). Denial of Service against the Domain Name System, IEEE Security and Privacy, 4:1, (40-45), Online publication date: 1-Jan-2006.
  10. ACM
    Deegan T, Crowcroft J and Warfield A (2005). The main name system, ACM SIGCOMM Computer Communication Review, 35:5, (5-14), Online publication date: 6-Oct-2005.
  11. Suzuki S, Shinjo Y, Hirotsu T, Kato K and Itano K Name-Level approach for egress network access control Proceedings of the 4th international conference on Networking - Volume Part II, (284-296)
  12. ACM
    Ateniese G and Mangard S A new approach to DNS security (DNSSEC) Proceedings of the 8th ACM conference on Computer and Communications Security, (86-95)
Contributors

Recommendations