Hi all,
     We submitted a draft about DNS delegation confirmation.      In the 
current DNS delegation mechanism, a delegated zone/child zone can specify any 
NS records at the zone apex without requiring confirmation from the zone 
maintaining Glue records of these NS record. This could be exploited to lunch 
new types of attacks such as NXNSattack.      This draft suggests a lightweight 
and backward-compatible mechanism to mitigate the risk of these attacks.
     Any comments are welcome!


zuop...@cnnic.cn
 
From: internet-drafts
Date: 2024-01-02 14:42
To: Peng Zuo; Zhiwei Yan
Subject: New Version Notification for 
draft-zuo-dnsop-delegation-confirmation-00.txt
A new version of Internet-Draft draft-zuo-dnsop-delegation-confirmation-00.txt
has been successfully submitted by Zhiwei Yan and posted to the
IETF repository.
 
Name:     draft-zuo-dnsop-delegation-confirmation
Revision: 00
Title:    A lightweight DNS delegation confirmation protocol
Date:     2024-01-01
Group:    Individual Submission
Pages:    13
URL:      
https://www.ietf.org/archive/id/draft-zuo-dnsop-delegation-confirmation-00.txt
Status:   
https://datatracker.ietf.org/doc/draft-zuo-dnsop-delegation-confirmation/
HTMLized: 
https://datatracker.ietf.org/doc/html/draft-zuo-dnsop-delegation-confirmation
 
 
Abstract:
 
   Delegation occurs when an NS record is added in the parent zone for
   the child origin.  In the current DNS delegation mechanism, a
   delegated zone/child zone (see Section1.1 for definition of delegated
   zone) can specify any NS records at the zone apex without requiring
   confirmation from the zone maintaining Glue records of the NS record.
   Recently, new types of attacks that exploit this flaw have been
   discovered.  This draft suggests a protocol-level solution for DNS
   delegation confirmation to reduce the risk of these attacks.
 
 
 
The IETF Secretariat
 
 
 
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to