summaryrefslogtreecommitdiff
path: root/doc/draft/draft-ietf-dnssec-update2-00.txt
diff options
context:
space:
mode:
Diffstat (limited to 'doc/draft/draft-ietf-dnssec-update2-00.txt')
-rw-r--r--doc/draft/draft-ietf-dnssec-update2-00.txt871
1 files changed, 0 insertions, 871 deletions
diff --git a/doc/draft/draft-ietf-dnssec-update2-00.txt b/doc/draft/draft-ietf-dnssec-update2-00.txt
deleted file mode 100644
index 860f5fa9..00000000
--- a/doc/draft/draft-ietf-dnssec-update2-00.txt
+++ /dev/null
@@ -1,871 +0,0 @@
-
-
-INTERNET-DRAFT Donald E. Eastlake 3rd
-OBSOLETES RFC 2137 Transfinite Systems Company
-Expires: February 1999 August 1998
-
-
-
- Secure Domain Name System (DNS) Dynamic Update
- ------ ------ ---- ------ ----- ------- ------
-
-
-
-
-
-Status of This Document
-
- This draft, file name draft-ietf-dnssec-update2-00.txt, is intended
- to become a Proposed Standard RFC obsoleting RFC 2137. Distribution
- of this document is unlimited. Comments should be sent to the DNS
- security mailing list <dns-security@tis.com> or the author.
-
- This document is an Internet-Draft. Internet-Drafts are working
- documents of the Internet Engineering Task Force (IETF), its areas,
- and its working groups. Note that other groups may also distribute
- working documents as Internet-Drafts.
-
- Internet-Drafts are draft documents valid for a maximum of six
- months. Internet-Drafts may be updated, replaced, or obsoleted by
- other documents at any time. It is not appropriate to use Internet-
- Drafts as reference material or to cite them other than as a
- ``working draft'' or ``work in progress.''
-
- To view the entire list of current Internet-Drafts, please check the
- "1id-abstracts.txt" listing contained in the Internet-Drafts Shadow
- Directories on ftp.is.co.za (Africa), ftp.nordu.net (Northern
- Europe), ftp.nis.garr.it (Southern Europe), munnari.oz.au (Pacific
- Rim), ftp.ietf.org (US East Coast), or ftp.isi.edu (US West Coast).
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-Donald E. Eastlake 3rd [Page 1]
-
-
-INTERNET-DRAFT Secure DNS Update August 1998
-
-
-Abstract
-
- Revised Domain Name System (DNS) protocol extensions to authenticate
- the data in DNS and provide key distribution services have been
- defined in draft-ietf-dnssec-secext2-*.txt, which obsoletes the
- original DNS security protocol definition in RFC 2065. In addition,
- symetric key DNS transaction signatures have been defined in draft-
- ietf-dnsind-tsig-*.txt. Secure DNS Dynamic Update operations were
- also been defined [RFC 2137] in connection RFC 2065. This document
- updates secure dynamic update in light of draft-ietf-dnssec-secext2-
- *.txt and draft-ietf-dnsind-tsig-*.txt. It describes how to use
- digital signatures covering requests and data to secure updates and
- restrict updates to those authorized to perform them as indicated by
- the updater's possession of cryptographic keys.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-Donald E. Eastlake 3rd [Page 2]
-
-
-INTERNET-DRAFT Secure DNS Update August 1998
-
-
-Table of Contents
-
- Status of This Document....................................1
-
- Abstract...................................................2
-
- Table of Contents..........................................3
-
- 1. Introduction............................................4
- 1.1. Overview of DNS Dynamic Update........................4
- 1.2. Overview of Public Key DNS Security...................4
- 1.3 Overview of Secret Key DNS Security....................5
-
- 2. Two Basic Modes.........................................6
- 2.1. Mode A................................................6
- 2.2. Mode B................................................7
-
- 3. Keys....................................................8
- 3.1. Update Keys...........................................8
- 3.1.1. Public Update Key Name Scope........................8
- 3.1.2. Public Update Key Class Scope.......................8
- 3.1.3. Public Update Key Signatory Field...................9
- 3.2. Zone Keys and Update Modes...........................10
- 3.3. Wildcard Public Key Punch Through....................11
-
- 4. Update Signatures......................................13
- 4.1. Update Request Signatures............................13
- 4.2. Update Data Signatures...............................13
-
- 5. Security Considerations................................14
- 6. IANA Considerations....................................14
-
- References................................................15
- Author's Address..........................................15
- Expiration and File Name..................................15
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-Donald E. Eastlake 3rd [Page 3]
-
-
-INTERNET-DRAFT Secure DNS Update August 1998
-
-
-1. Introduction
-
- Dynamic update operations have been defined for the Domain Name
- System (DNS) in RFC 2136 but that RFC does not include a description
- of security for those updates. Public key means of securing DNS data
- and transactions and using it for public key distribution were
- defined in RFC 2065 which has been updated by draft-ietf-dnssec-
- sexect2-*.txt, and secret key means of securing DNS transactions are
- defined in draft-ietf-dnsind-tsig-*.txt.
-
- This document provides techniques based on the updated DNS security
- RFC draft-ietf-dnssec-sexect2-*.txt and draft-ietf-dnsind-tsig-*.txt
- to authenticate DNS updates of secure zones. (Secret key signatures
- could be used to authenticate updates on non-secured DNS zones. That
- case In not considered in this document.)
-
- Familiarity with the DNS system [RFC 1034, 1035] is assumed.
- Familiarity with the DNS security and dynamic update will be helpful.
-
-
-
-1.1. Overview of DNS Dynamic Update
-
- DNS dynamic update defines a new DNS opcode, new DNS request and
- response structure if that opcode is used, and new error codes. An
- update can specify complex combinations of deletion and insertion
- (with or without pre-existence testing) of resource records (RRs)
- with one or more owner names; however, all testing and changes for
- any particular DNS update request are restricted to a single zone.
- Updates occur at the primary server for a zone.
-
- The primary server for a dynamic zone must increment the zone SOA
- serial number when an update occurs or the next time the SOA is
- retrieved if one or more updates have occurred since the previous SOA
- retrieval and the updates themselves did not update the SOA.
-
-
-
-1.2. Overview of Public Key DNS Security
-
- DNS security authenticates data in the DNS by also storing digital
- signatures in the DNS as SIG resource records (RRs). A SIG RR
- provides a digital signature on the set of all RRs with the same
- owner name and class as the SIG and whose type is the type covered by
- the SIG. The SIG RR cryptographically binds the covered RR set to
- the signer, signature inception and expiration date, etc. There are
- one or more keys associated with every secure zone and all data in
- the secure zone is signed either by a zone key or by a dynamic update
- key tracing its authority to a zone key.
-
-
-
-Donald E. Eastlake 3rd [Page 4]
-
-
-INTERNET-DRAFT Secure DNS Update August 1998
-
-
- DNS security also defines transaction SIGs and request SIGs.
-
- Transaction SIGs appear at the end of a response. They authenticate
- the response and bind it to the corresponding request using the key
- of the host where the responding DNS server is.
-
- Request SIGs appear at the end of a request and authenticate the
- request with the key of the submitting entity.
-
- DNS security also permits the storage of public keys in the DNS via
- KEY RRs. These KEY RRs are also, of course, authenticated by SIG
- RRs. KEY RRs for zones may be stored in their superzone and/or their
- authoritive subzone servers so that the secure DNS tree of zones can
- be traversed by a security aware resolver.
-
-
-
-1.3 Overview of Secret Key DNS Security
-
- draft-ietf-dnsind-tsig-*.txt provides a means for two processes that
- share a secret key to authenticate DNS requests and responses sent
- between them by appending TSIG digital signature RRs to those
- requests and responses. Secret key digital signatures are generally
- much faster to calculate and verify than public key digital
- signatures. In addition, the need, in general, to cache KEY RRs and
- perform the KEY-SIG chain verifications is avoided.
-
- However, the cost for this speed and simplicity in TSIG use is the
- requirement to securely achieve key distribution or agreement between
- the communicating processes and to achieve agreement as to the
- authority represented by a correct TSIG on a requested using a
- partciular key.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-Donald E. Eastlake 3rd [Page 5]
-
-
-INTERNET-DRAFT Secure DNS Update August 1998
-
-
-2. Two Basic Modes
-
- A dynamic secure zone is any secure DNS zone that
- (1) has a zone KEY RR signatory field indicates that updates are
- implemented and either
- (2a) contains one or more KEY RRs that can authorize dynamic
- updates, i.e., entity or user KEY RRs with the signatory field
- non-zero, or
- (2b) has a primary server with one or more secret keys configured
- to authorize updates requests and shared with one or more
- update requesters.
-
- Note: 2a and 2b can both be true for a zone.
-
- There are two basic modes of dynamic secure zone which relate to the
- update strategy, mode A and mode B. A summary comparison table is
- given below and then each mode is described.
-
- SUMMARY OF DYNAMIC SECURE ZONE MODES
-
- CRITERIA: | MODE A | MODE B
- =========================+====================+===================
- Definition: | Zone Key Off line | Zone Key On line
- =========================+====================+===================
- Server Workload | Medium | High
- -------------------------+--------------------+-------------------
- Key Restrictions | Fine grain | Coarse grain
- -------------------------+--------------------+-------------------
- Dynamic Data Temporality | Transient | Permanent
- -------------------------+--------------------+-------------------
- Dynamic Key Rollover | No | Yes
- -------------------------+--------------------+-------------------
-
- NOTE: The Mode A / Mode B distinction only effects the validation
- and performance of update requests. It has no effect on retrievals.
-
-
-
-2.1. Mode A
-
- For mode A, the zone owner private key and static zone master file
- are kept off-line for maximum security of the static zone contents.
-
- As a consequence, any dynamicly added or changed RRs are signed in
- the secure zone by their authorizing dynamic update key and they are
- backed up, along with this SIG RR, in a separate online dynamic
- master file. In this type of zone, server computation is generally
- reduced since the server need only check signatures on the update
- data and request, which have already been signed by the updater
- (generally a much faster operation than signing data) and update the
-
-
-Donald E. Eastlake 3rd [Page 6]
-
-
-INTERNET-DRAFT Secure DNS Update August 1998
-
-
- NXT RRs which need to be changed, if any. Because the dynamicly
- added RRs retain their update KEY signed SIG, finer grained control
- of updates can be implemented via the KEY RR signatory field (unique
- name restriction and weak update key restriction). Because dynamic
- data is only stored in the online dynamic master file and only
- authenticated by dynamic keys which expire, updates are transient in
- nature. Key rollover for an entity that can authorize dynamic
- updates is more cumbersome since the authority of their key must be
- traceable to a zone key and so, in general, they must securely
- communicate a new key to the zone authority for manual transfer to
- the off line static master file. NOTE: for this mode the zone SOA and
- NXT RRs must be signed by a dynamic update key, which will be an end
- entity key with an owner name of the zone name, and that private key
- must be kept on line so that the SOA and NXTs can be changed for
- updates.
-
-
-
-2.2. Mode B
-
- For mode B, the zone owner private key and master file are kept on-
- line at the zone primary server. When authenticated updates succeed,
- SIGs under the zone key for the resulting data (as well as possible
- NXT and SOA changes) are calculated and these SIG (and possible
- SOA/NXT) changes are entered into the zone and the unified on-line
- master file.
-
- As a consequence, this mode generally requires more computational
- effort on the part of the server as it computes zone data signatures
- in addition to verifying the signatures on requests. Because signing
- generally takes more effort than verification, these signatures
- generally will take more effort to calculate than it would take to
- verify the data signatures required in Mode A. Because the zone key
- is used to sign all the zone data, the information as to who
- originated the current state of dynamic RR sets and even that data is
- the result of a dynamic update as opposed to coming from an original
- master file, is lost, making unavailable the fine grain control of
- some values of the KEY RR signatory field. In addition, the
- incorporation of the updates into the primary master file and their
- authentication by the zone key makes them permanent in nature.
- Maintaining the zone key on-line also means that dynamic update keys
- which are signed by the zone key can be dynamically updated in real
- time since the zone key is available to dynamically sign new values.
-
-
-
-
-
-
-
-
-
-Donald E. Eastlake 3rd [Page 7]
-
-
-INTERNET-DRAFT Secure DNS Update August 1998
-
-
-3. Keys
-
- Dynamic update requests depend on update keys as described in section
- 3.1 below. In addition, the zone secure dynamic update mode and
- availability of some options is indicated in the zone KEY(s).
- Finally, a special rule is used in searching for KEYs to validate
- updates as described in section 3.3.
-
-
-
-3.1. Update Keys
-
- All update requests to a secure zone must include signature(s) by one
- or more private or secret keys that together can authorize that
- update. In order for the Domain Name System (DNS) server executing
- the update request to confirm this (1) any secret keys must be know
- to it, along with the authority represented by the secret key, and
- (2) any private key or keys must have the corresponding public key or
- keys available to and authenticatable by that server as specially
- flagged KEY Resource Records (RRs).
-
- The scope of authority of any secret keys is as configured at the
- Server. Methods of describing and configuring such authority are not
- discussed in this document.
-
- The scope of authority of public update keys is indicated by their
- KEY RR owner name, class, and signatory field flags as described
- below. In addition, such KEY RRs MUST be entity or user keys and not
- have the authentication use prohibited bit on.
-
- All parts of the actual update MUST be within the scope/authority of
- at least one of the keys used for a request SIG or TSIG on the update
- request as described in section 4.
-
-
-
-3.1.1. Public Update Key Name Scope
-
- The owner name of any update authorizing KEY RR must (1) be the same
- as the owner name of any RRs being added or deleted or (2) a wildcard
- name including within its extended scope (see section 3.3) the name
- of any RRs being added or deleted and those RRs must be in the same
- zone.
-
-
-
-3.1.2. Public Update Key Class Scope
-
- The class of any update authorizing KEY RR must be the same as the
- class of any RR's being added or deleted.
-
-
-Donald E. Eastlake 3rd [Page 8]
-
-
-INTERNET-DRAFT Secure DNS Update August 1998
-
-
-3.1.3. Public Update Key Signatory Field
-
- The four bit "signatory field" (see draft-ietf-dnssec-secext2-*.txt)
- of any update authorizing KEY RR must be non-zero. The bits have the
- meanings described below for non-zone keys (see section 3.2 for zone
- type keys).
-
- UPDATE KEY RR SIGNATORY FIELD BITS
-
- 0 1 2 3
- +-----------+-----------+-----------+-----------+
- | zone | strong | unique | general |
- +-----------+-----------+-----------+-----------+
-
- Bit 0, zone control - If nonzero, this key is authorized to attach,
- detach, and move zones by creating and deleting NS, glue A, and
- zone KEY RR(s). If zero, the key can not authorize any update
- that would effect such RRs. This bit is meaningful for both
- type A and type B dynamic secure zones. An update attempting to
- add an NS or zone KEY RR to a node (i.e., make the node a
- delegation point) is illegal if there are any deeper nodes in
- the zone.
-
- NOTE: do not confuse the "zone" signatory field bit with the
- "zone" key type bit.
-
- Bit 1, strong update - If zero, the key can only authorize updates
- where any existing RRs of the same owner and class are
- authenticated by a SIG using the same key. If nonzero, this key
- is authorized to add and delete RRs even if there are other RRs
- with the same owner name and class that are authenticated by a
- SIG signed with a different dynamic update KEY. This bit is
- meaningful only for type A dynamic zones that have a zone KEY
- advertising that the feature is available. It is ignored in
- type B dynamic zones.
-
- Keeping this bit zero on multiple KEY RRs with the same or
- nested wild card owner names permits multiple entities to exist
- that can create and delete names but can not effect RRs with
- different owner names from any they created. In effect, this
- creates two levels of dynamic update key, strong and weak, where
- weak keys are prohibited from interfering with each other but a
- strong key can interfere with any weak keys or other strong
- keys.
-
- Bit 2, unique name update - This bit is useful only if the owner name
- is a wildcard. (Any dynamic update KEY with a non-wildcard name
- is, in effect, a unique name update key.) If zero, this key is
- authorized to add and updates RRs for any number of names within
- its wildcard scope. If nonzero, this key is authorized to add
-
-
-Donald E. Eastlake 3rd [Page 9]
-
-
-INTERNET-DRAFT Secure DNS Update August 1998
-
-
- and update RRs for only a single owner name. If there already
- exist RRs with one or more names signed by this key, they may be
- updated but no new name created until the number of existing
- names is reduced to zero. This bit is meaningful only for mode
- A dynamic zones that have a zone KEY advertising that the
- feature is available. It is ignored in mode B dynamic zones.
-
- This bit can be used to restrict a KEY from flooding a zone with
- new names. In conjunction with a local administratively imposed
- limit on the number of dynamic RRs with a particular name, it
- can completely restrict a KEY from flooding a zone with RRs.
-
- Bit 3, general update - The general update signatory field bit has no
- special meaning. If the other three bits are all zero, it must
- be one so that the field is non-zero to designate that the key
- is an update key. The meaning of all values of the signatory
- field with the general bit on and one or more other signatory
- field bits on is reserved.
-
- All the signatory bit update authorizations described above only
- apply if the update is within the name and class scope as per
- sections 3.1.1 and 3.1.2.
-
-
-
-3.2. Zone Keys and Update Modes
-
- Zone type keys are automatically authorized to sign anything in their
- zone, of course, regardless of the value of their signatory field.
- For zone keys, the signatory field bits have different means than
- they they do for update keys, as shown below. The signatory field
- MUST be zero if dynamic update is not supported for a secure zone and
- MUST be non-zero if it is.
-
-
- ZONE KEY RR SIGNATORY FIELD BITS
-
- 0 1 2 3
- +-----------+-----------+-----------+-----------+
- | mode | strong | unique | general |
- +-----------+-----------+-----------+-----------+
-
- Bit 0, mode - This bit indicates the update mode for this zone. Zero
- indicates mode A while a one indicates mode B.
-
- Bit 1, strong update - If nonzero, this indicates that the "strong"
- key feature described in section 3.1.3 above is implemented and
- enabled for this secure zone. If zero, the feature is not
- available and all update keys are treated as strong. Has no
- effect if the zone is a mode B secure update zone.
-
-
-Donald E. Eastlake 3rd [Page 10]
-
-
-INTERNET-DRAFT Secure DNS Update August 1998
-
-
- Bit 2, unique name update - If nonzero, this indicates that the
- "unique name" feature described in section 3.1.3 above is
- implemented and enabled for this secure zone. If zero, this
- feature is not available and no wildcard update key is treated
- as restricted to a single name. Has no effect if the zone is a
- mode B secure update zone.
-
- Bit 3, general - This bit has no special meaning. If dynamic update
- for a zone is supported and the other bits in the zone key
- signatory field are zero, it must be a one. The meaning of zone
- keys where the signatory field has the general bit and one or
- more other bits on is reserved.
-
- If there are multiple zone KEY RRs with non-zero signatory fields and
- zone policy is in transition, they might have different signatory
- field values. In that case, strong and unique name restrictions MUST
- be enforced as long as there is a non-expired zone key being
- advertised that indicates mode A with the strong or unique name bit
- on respectively. Mode B updates (i.e., no data signatures) MUST be
- supported as long as there is a non-expired zone key that indicates
- mode B. Mode A or mode ambiguous updates may be treated as mode B
- updates at server option if non-expired zone keys indicate that both
- are supported.
-
- A server that will be executing update operations on a zone, that is,
- the primary master server, MUST NOT advertize a zone key that will
- attract requests for a mode or features that it can not support.
-
-
-
-3.3. Wildcard Public Key Punch Through
-
- Just as a zone key is valid throughout the entire zone, public update
- keys with wildcard names are valid throughout their extended scope,
- within the zone. That is, they remain valid for any name that would
- match them, even existing specific names within their apparent scope.
-
- (If this were not so, then whenever a name within a wildcard scope
- was created by dynamic update using a wildcard named public update
- key for authorization, it would be necessary to first create a copy
- of the KEY RR with this name, because otherwise the existence of the
- more specific name would hide the authorizing KEY RR and would make
- later updates impossible. An updater could create such a KEY RR but
- could not zone sign it with their authorizing signer. They would
- have to sign it with the same key using the wildcard name as signer.
- (This would create update KEYs signed by update KEYs which was
- permitted in RFC 2065 but, for simplicity, is prohibit in draft-
- ietf-dnssec-secext2-*.txt which requires all KEYs to be signed by
- zone keys.) Thus in creating, for example, one hundred type A RRs
- authorized by a *.1.1.1.in-addr.arpa KEY RR, without key punch
-
-
-Donald E. Eastlake 3rd [Page 11]
-
-
-INTERNET-DRAFT Secure DNS Update August 1998
-
-
- through 100 As, 100 KEYs, and 200 SIGs would have to be created as
- opposed to merely 100 As and 100 SIGs with wildcard key punch
- through.)
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-Donald E. Eastlake 3rd [Page 12]
-
-
-INTERNET-DRAFT Secure DNS Update August 1998
-
-
-4. Update Signatures
-
- Two kinds of signatures can appear in updates. Request signatures,
- which are always required, cover the entire request and authenticate
- the DNS header, including opcode, counts, etc., as well as the data.
- Data signatures, on the other hand, appear only among the RRs to be
- added and are only required for mode A operation. These two types of
- signatures are described further below.
-
-
-
-4.1. Update Request Signatures
-
- An update can effect multiple owner names in a zone. It may be that
- these different names are covered by different public or secret
- dynamic update keys. For every owner name effected, the updater must
- know a private or secret key valid to authorize updates for that name
- (and the zone's class) and must prove this by appending request SIG
- and/or TSIG RRs under each such key.
-
- Request signatures occur in the Additional Information section. As
- specified in draft-ietf-dnssec-secext2-*.txt, a public request
- signature is a SIG RR occurring at the end of a request with a type
- covered field of zero. As specified in draft-ietf-dnsind-tsig-*.txt,
- a secret key request signature is a TSIG RR occuring at the end of
- the request. Each request SIG or TSIG signs the entire request,
- including DNS header, but excluding any other request signatures and
- with the ARCOUNT in the DNS header set to what it would be without
- the request signatures.
-
-
-
-4.2. Update Data Signatures
-
- Mode A dynamic secure zones require that the update requester provide
- SIG RRs that will authenticate the after-update state of all RR sets
- that are changed by the update and are non-empty after the update.
- These SIG RRs appear in the request as RRs to be added and the
- request must delete any previous data SIG RRs that are invalidated by
- the request.
-
- In Mode B dynamic secure zones, all zone data is authenticated by
- zone key SIG RRs. In this case, data signatures need not be included
- with the update. A prospective updater can determine which mode an
- updatable secure zone is using by examining the signatory field bits
- of the zone KEY RR or RRs (see section 3.2).
-
-
-
-
-
-
-Donald E. Eastlake 3rd [Page 13]
-
-
-INTERNET-DRAFT Secure DNS Update August 1998
-
-
-5. Security Considerations
-
- Any secure zone permitting dynamic updates is inherently less secure
- than a static secure zone maintained off line as recommended in
- draft-ietf-dnssec-secops-*.txt. If nothing else, secure dynamic
- update requires on line change to and re-signing of the zone SOA
- resource record (RR) to increase the SOA serial number. This means
- that compromise of the primary server host could lead to arbitrary
- serial number changes.
-
- Isolation of dynamic RRs to separate zones from those holding most
- static RRs can limit the damage that could occur from breach of a
- dynamic zone's security.
-
-
-
-6. IANA Considerations
-
- Allocations of values of the KEY RR Signatory field described herein
- as "reserved" requires an IETF consensus.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-Donald E. Eastlake 3rd [Page 14]
-
-
-INTERNET-DRAFT Secure DNS Update August 1998
-
-
-References
-
- [RFC1035] - Domain Names - Implementation and Specifications, P.
- Mockapetris, November 1987.
-
- [RFC1034] - Domain Names - Concepts and Facilities, P. Mockapetris,
- November 1987.
-
- [RFC2065] - Domain Name System Security Extensions. D. Eastlake, 3rd,
- C. Kaufman. January 1997
-
- [RFC2136] - Dynamic Updates in the Domain Name System (DNS UPDATE).
- P. Vixie, Ed., S. Thomson, Y. Rekhter, J. Bound. April 1997.
-
- [RFC2137] - Secure Domain Name System Dynamic Update. D. Eastlake.
- April 1997.
-
- draft-ietf-dnsind-tsig-*.txt
-
- draft-ietf-dnssec-secext2-*.txt.
-
- draft-ietf-dnssec-secops-*.txt.
-
-
-
-Author's Address
-
- Donald E. Eastlake, 3rd
- Transfinite Systems Company
- 318 Acton Street
- Carlisle, MA 01741 USA
-
- Telephone: +1 978-287-4877
- +1 978-371-7148 (fax)
- email: dee3@torque.pothole.com
-
-
-
-Expiration and File Name
-
- This draft expires February 1999.
-
- Its file name is draft-ietf-dnssec-update2-00.txt.
-
-
-
-
-
-
-
-
-
-Donald E. Eastlake 3rd [Page 15]
-