Dear All,

A new draft has been submitted addressing the issue of DNS Cookies in
multi-vendor anycast deployments.

DNS Cookies are currently impractical in such deployments, because one
implementation - even though it shares its secret with another
implementation - cannot validate the Server Cookies constructed by that
other implementation, because their methods for constructing Server
Cookies differ.

This draft provides precise directions for creating Server Cookies to
align the implementations.  This draft introduces a registry for methods
suitable for Cookie construction.  This draft deprecates all previous
methods of creating Server Cookies and introduces an inter-operable
method (version 1) employing the SipHash-2.4 pseudorandom function.

This is an update on draft-sury-toorop-dns-cookies-algorithms-00 draft
based on the experience we gained during the hackathon at IETF105. Mark
Andrews and Donald Eastlake are added as co-authors.

Willem


-------- Forwarded Message --------
Subject: New Version Notification for
draft-sury-toorop-dnsop-server-cookies-00.txt
Date: Wed, 26 Jun 2019 04:12:58 -0700
From: internet-dra...@ietf.org
To: Mark Andrews <ma...@isc.org>, Willem Toorop <wil...@nlnetlabs.nl>,
Donald E. Eastlake 3rd <d3e...@gmail.com>, Ondrej Sury <ond...@isc.org>,
Donald Eastlake <d3e...@gmail.com>


A new version of I-D, draft-sury-toorop-dnsop-server-cookies-00.txt
has been successfully submitted by Willem Toorop and posted to the
IETF repository.

Name:           draft-sury-toorop-dnsop-server-cookies
Revision:       00
Title:          Interoperable Domain Name System (DNS) Server Cookies
Document date:  2019-06-26
Group:          Individual Submission
Pages:          14
URL:
https://www.ietf.org/internet-drafts/draft-sury-toorop-dnsop-server-cookies-00.txt
Status:
https://datatracker.ietf.org/doc/draft-sury-toorop-dnsop-server-cookies/
Htmlized:
https://tools.ietf.org/html/draft-sury-toorop-dnsop-server-cookies-00
Htmlized:
https://datatracker.ietf.org/doc/html/draft-sury-toorop-dnsop-server-cookies


Abstract:
   DNS cookies, as specified in RFC 7873, are a lightweight DNS
   transaction security mechanism that provides limited protection to
   DNS servers and clients against a variety of denial-of-service and
   amplification, forgery, or cache poisoning attacks by off-path
   attackers.

   This document provides precise directions for creating Server Cookies
   so that an anycast server set including diverse implementations will
   interoperate with standard clients.

   This document updates [RFC7873]




Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

The IETF Secretariat

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to