On Thu, Apr 23, 2009 at 06:32:38PM +0800, i),h?* wrote:
> Hi, folks.
>  
> As we all know, DNSSEC provides origin authentication and integrity assurance 
> services for DNS data exchanged between DNS resolver and name-sever, while 
> DNSSEC fails to give a means by which the DNS queries or responses 
> transmitted between a host and a recursive server could be guaranteed 
> integrity and authentication. For example, a malicious attacker might hijack 
> the DNS query form a host and fake a response which will help he commit 
> phishing. So I wonder, is there someone having a certain solution, more 
> exactly a software implementation on host, to protect against such attack?
> 
> 2009-04-23 
> 
> m...@cnnic.cn


As mentioned elsewhere,  TSiG, GSS-TSiG,  and IPSEC are all forms of channel 
security. The 
unfortunate truth is, these are unwieldy when managing large numbers of 
connections.  for a 
slightly more scaleable solution, you might consider SIG(0).  -  All of these 
are defined in
RFC's and there are several interoperable implementations.

Other channel security ideas that are floating around (but have nto gained 
traction in the
IETF or market) are:

        EDNS-PING
        DNS-CURVE



--bill
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to