Connected: An Internet Encyclopedia
9. Security Considerations

Up: Connected: An Internet Encyclopedia
Up: Requests For Comments
Up: RFC 2065
Prev: 8.2 Resolver Conformance
Next: References

9. Security Considerations

9. Security Considerations

This document describes technical details of extensions to the Domain Name System (DNS) protocol to provide data integrity and origin authentication, public key distribution, and optional transaction and request security.

It should be noted that, at most, these extensions guarantee the validity of resource records, including KEY resource records, retrieved from the DNS. They do not magically solve other security problems. For example, using secure DNS you can have high confidence in the IP address you retrieve for a host name; however, this does not stop someone for substituting an unauthorized host at that address or capturing packets sent to that address and falsely responding with packets apparently from that address. Any reasonably complete security system will require the protection of many additional facets of the Internet.


Next: References

Connected: An Internet Encyclopedia
9. Security Considerations