This protocol allows for transaction level authentication using shared secrets and one way hashing. It can be used to authenticate dynamic updates as coming from an approved client, or to authenticate responses as coming from an approved recursive name server.
RFC Downloads
Cited By
- Gibb R, Madhavapeddy A and Crowcroft J Where on Earth is the Spatial Name System? Proceedings of the 22nd ACM Workshop on Hot Topics in Networks, (79-86)
- Cao J, Ma M, Wang X and Liu H (2017). A Selective Re-Query Case Sensitive Encoding Scheme Against DNS Cache Poisoning Attacks, Wireless Personal Communications: An International Journal, 94:3, (1263-1279), Online publication date: 1-Jun-2017.
- Korczyński M, Król M and van Eeten M Zone Poisoning Proceedings of the 2016 Internet Measurement Conference, (271-278)
- Danielis P, Altmann V, Skodzik J, Wegner T, Koerner A and Timmermann D (2015). P-DONAS, ACM Transactions on Internet Technology, 15:3, (1-21), Online publication date: 28-Sep-2015.
- Zhu Z, Wakikawa R, Cheshire S and Zhang L Home as you go Proceedings of the 7th Asian Internet Engineering Conference, (89-95)
- Dagon D, Antonakakis M, Vixie P, Jinmei T and Lee W Increased DNS forgery resistance through 0x20-bit encoding Proceedings of the 15th ACM conference on Computer and communications security, (211-222)
- Le D, Lei J and Fu X A new decentralized mobility management service architecture for ipv6-based networks Proceedings of the 3rd ACM workshop on Wireless multimedia networking and performance modeling, (54-61)
- Vixie P (2007). DNS Complexity, Queue, 5:3, (24-29), Online publication date: 1-Apr-2007.
- Cheung S (2006). Denial of Service against the Domain Name System, IEEE Security and Privacy, 4:1, (40-45), Online publication date: 1-Jan-2006.
- Deegan T, Crowcroft J and Warfield A (2005). The main name system, ACM SIGCOMM Computer Communication Review, 35:5, (5-14), Online publication date: 6-Oct-2005.
- Suzuki S, Shinjo Y, Hirotsu T, Kato K and Itano K Name-Level approach for egress network access control Proceedings of the 4th international conference on Networking - Volume Part II, (284-296)
- Ateniese G and Mangard S A new approach to DNS security (DNSSEC) Proceedings of the 8th ACM conference on Computer and Communications Security, (86-95)
Recommendations
ID-based secret-key cryptography
This paper introduces ID-based secret-key cryptography, in which secret keys are privately and uniquely binded to an identity. This enables to extend public-key cryptography features at the high throughput rate of secret-key cryptography. As ...
Secret Public Key Protocols Revisited
Security ProtocolsPassword-based protocols are important and popular means of providing human-to-machine authentication. The concept of secret public keys was proposed more than a decade ago as a means of securing password-based authentication protocols against off-line ...