2005
DOI: 10.17487/rfc4025
|View full text |Cite
|
Sign up to set email alerts
|

A Method for Storing IPsec Keying Material in DNS

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
25
0

Year Published

2006
2006
2017
2017

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 28 publications
(27 citation statements)
references
References 12 publications
0
25
0
Order By: Relevance
“…The (public) HI is stored in a new Resource Record (RR) type, to be defined. This RR type is likely to be quite similar to the IPSECKEY RR [6].…”
Section: Storing Host Identifiers In Dnsmentioning
confidence: 76%
“…The (public) HI is stored in a new Resource Record (RR) type, to be defined. This RR type is likely to be quite similar to the IPSECKEY RR [6].…”
Section: Storing Host Identifiers In Dnsmentioning
confidence: 76%
“…A mechanism to automatically deploy certificates and keying material for VPN infrastructures is the use of the global Domain Name System (DNS) [42,43], or preferably the more secure version DNSSEC [44,45]. An opportunistic variant, where IPsec protection is only used if a DNS IPSECKEY record is available, is specified in [46].…”
Section: Key Distribution Via Dnssecmentioning
confidence: 99%
“…It may also be desirable to store IPsec keying material corresponding to an IP address in the reverse DNS, as justified and described in [RFC4025].…”
Section: Applicability Of Reverse Dnsmentioning
confidence: 99%