2000
DOI: 10.17487/rfc2845
|View full text |Cite
|
Sign up to set email alerts
|

Secret Key Transaction Authentication for DNS (TSIG)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
41
0

Year Published

2005
2005
2020
2020

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 68 publications
(41 citation statements)
references
References 0 publications
0
41
0
Order By: Relevance
“…On top of that, we defined some new resource records such as HID and PK to store the host ID and public key, respectively. The DNR records are created by DNS UPDATE [9] using a TSIG (transactional signature) [10] for protecting the message integrity. Both the DNR and HNR queries (and responses) issued (and received) by the LNS are structured in formats similar to a DNSSEC query (and response).…”
Section: Methodsmentioning
confidence: 99%
“…On top of that, we defined some new resource records such as HID and PK to store the host ID and public key, respectively. The DNR records are created by DNS UPDATE [9] using a TSIG (transactional signature) [10] for protecting the message integrity. Both the DNR and HNR queries (and responses) issued (and received) by the LNS are structured in formats similar to a DNSSEC query (and response).…”
Section: Methodsmentioning
confidence: 99%
“…If the Mobile Node can detect that the certificate is not trustworthy, the attack will be foiled when the Mobile Node attempts to set up the IKE SA. Explicit security measures between the DNS server and host, such as DNSSEC [19] or TSIG/TKEY [20] [21], can mitigate the risk of 1) and 2), but these security measures are not widely deployed on end nodes. These security measures are not sufficient to protect the Home Agent address against DoS attack, however, because a node having a legitimate security association with the DNS server could nevertheless intentionally or inadvertently cause the Home Agent address to become the target of DoS.…”
Section: Mn Identitymentioning
confidence: 99%
“…If one of these RCODEs is returned, the updater MUST terminate its update attempt. Other RCODEs [13] may indicate that there are problems with the key being used and may mean to try a different key, if available, or to terminate the operation. Because some errors may indicate a misconfiguration of the updater or the DNS server, the updater MAY attempt to signal to its administrator that an error has occurred, e.g., through a log message.…”
Section: Error Return Codesmentioning
confidence: 99%
“…Both DHCP clients and servers SHOULD use some form of update request authentication (e.g., TSIG [13]) when performing DNS updates.…”
Section: Security Considerationsmentioning
confidence: 99%