The Secret Key Transaction Authentication for DNS (TSIG) protocol provides transaction level authentication for DNS. TSIG is extensible through the definition of new algorithms. This document specifies an algorithm based on the Generic Security Service Application Program Interface (GSS-API) (RFC2743). This document updates RFC 2845.
RFC Downloads
Cited By
- Korczyński M, Król M and van Eeten M Zone Poisoning Proceedings of the 2016 Internet Measurement Conference, (271-278)
- Broido A, Hyun Y, Fomenkov M and claffy k (2019). The windows of pivate DNS updates, ACM SIGCOMM Computer Communication Review, 36:3, (93-98), Online publication date: 5-Jul-2006.
- Suzuki S, Shinjo Y, Hirotsu T, Kato K and Itano K Name-Level approach for egress network access control Proceedings of the 4th international conference on Networking - Volume Part II, (284-296)
Recommendations
Secret Public Key Protocols Revisited
Security ProtocolsPassword-based protocols are important and popular means of providing human-to-machine authentication. The concept of secret public keys was proposed more than a decade ago as a means of securing password-based authentication protocols against off-line ...