[rfc-dist] RFC 9018 on Interoperable Domain Name System (DNS) Server Cookies

rfc-editor@rfc-editor.org Tue, 06 April 2021 05:42 UTC

Return-Path: <rfc-dist-bounces@rfc-editor.org>
X-Original-To: ietfarch-rfc-dist-archive@ietfa.amsl.com
Delivered-To: ietfarch-rfc-dist-archive@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 79A0D3A0A22 for <ietfarch-rfc-dist-archive@ietfa.amsl.com>; Mon, 5 Apr 2021 22:42:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.2
X-Spam-Level:
X-Spam-Status: No, score=-5.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, MAILING_LIST_MULTI=-1, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ay1L8aNiTVV3 for <ietfarch-rfc-dist-archive@ietfa.amsl.com>; Mon, 5 Apr 2021 22:42:48 -0700 (PDT)
Received: from rfc-editor.org (rfc-editor.org [4.31.198.49]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 35BF33A0A34 for <rfc-dist-archive-yuw6Xa6hiena@ietf.org>; Mon, 5 Apr 2021 22:42:47 -0700 (PDT)
Received: from rfcpa.amsl.com (localhost [IPv6:::1]) by rfc-editor.org (Postfix) with ESMTP id B1B8EF407B4; Mon, 5 Apr 2021 22:42:39 -0700 (PDT)
X-Original-To: rfc-dist@rfc-editor.org
Delivered-To: rfc-dist@rfc-editor.org
Received: by rfc-editor.org (Postfix, from userid 30) id 7B7A2F407B1; Mon, 5 Apr 2021 22:42:38 -0700 (PDT)
To: ietf-announce@ietf.org, rfc-dist@rfc-editor.org
X-PHP-Originating-Script: 1005:ams_util_lib.php
From: rfc-editor@rfc-editor.org
Message-Id: <20210406054238.7B7A2F407B1@rfc-editor.org>
Date: Mon, 05 Apr 2021 22:42:38 -0700
Subject: [rfc-dist] RFC 9018 on Interoperable Domain Name System (DNS) Server Cookies
X-BeenThere: rfc-dist@rfc-editor.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: RFC Announcements <rfc-dist.rfc-editor.org>
List-Unsubscribe: <https://www.rfc-editor.org/mailman/options/rfc-dist>, <mailto:rfc-dist-request@rfc-editor.org?subject=unsubscribe>
List-Archive: <http://www.rfc-editor.org/pipermail/rfc-dist/>
List-Post: <mailto:rfc-dist@rfc-editor.org>
List-Help: <mailto:rfc-dist-request@rfc-editor.org?subject=help>
List-Subscribe: <https://www.rfc-editor.org/mailman/listinfo/rfc-dist>, <mailto:rfc-dist-request@rfc-editor.org?subject=subscribe>
Cc: drafts-update-ref@iana.org, dnsop@ietf.org, rfc-editor@rfc-editor.org
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: rfc-dist-bounces@rfc-editor.org
Sender: rfc-dist <rfc-dist-bounces@rfc-editor.org>

A new Request for Comments is now available in online RFC libraries.

        
        RFC 9018

        Title:      Interoperable Domain Name System (DNS) 
                    Server Cookies 
        Author:     O. Sury,
                    W. Toorop,
                    D. Eastlake 3rd,
                    M. Andrews
        Status:     Standards Track
        Stream:     IETF
        Date:       April 2021
        Mailbox:    ondrej@isc.org,
                    willem@nlnetlabs.nl,
                    d3e3e3@gmail.com,
                    marka@isc.org
        Pages:      16
        Updates:    RFC 7873

        I-D Tag:    draft-ietf-dnsop-server-cookies-05.txt

        URL:        https://www.rfc-editor.org/info/rfc9018

        DOI:        10.17487/RFC9018

DNS Cookies, as specified in RFC 7873, are a lightweight DNS
transaction security mechanism that provide limited protection to DNS
servers and clients against a variety of denial-of-service
amplification, forgery, or cache-poisoning attacks by off-path
attackers.

This document updates RFC 7873 with precise directions for creating
Server Cookies so that an anycast server set including diverse
implementations will interoperate with standard clients, with
suggestions for constructing Client Cookies in a privacy-preserving
fashion, and with suggestions on how to update a Server Secret.  An
IANA registry listing the methods and associated pseudorandom
function suitable for creating DNS Server Cookies has been created
with the method described in this document as the first and, as of
the time of publication, only entry.

This document is a product of the Domain Name System Operations Working Group of the IETF.

This is now a Proposed Standard.

STANDARDS TRACK: This document specifies an Internet Standards Track
protocol for the Internet community, and requests discussion and suggestions
for improvements.  Please refer to the current edition of the Official
Internet Protocol Standards (https://www.rfc-editor.org/standards) for the 
standardization state and status of this protocol.  Distribution of this 
memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  https://www.ietf.org/mailman/listinfo/ietf-announce
  https://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see https://www.rfc-editor.org/search
For downloading RFCs, see https://www.rfc-editor.org/retrieve/bulk

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-editor@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC


_______________________________________________
rfc-dist mailing list
rfc-dist@rfc-editor.org
https://www.rfc-editor.org/mailman/listinfo/rfc-dist
http://www.rfc-editor.org