On Thu, Apr 23, 2009 at 06:32:38PM +0800, i),h?* wrote:
> Hi, folks.
>
> As we all know, DNSSEC provides origin authentication and integrity assurance
> services for DNS data exchanged between DNS resolver and name-sever, while
> DNSSEC fails to give a means by which the DNS queries or responses
> transmitted between a host and a recursive server could be guaranteed
> integrity and authentication. For example, a malicious attacker might hijack
> the DNS query form a host and fake a response which will help he commit
> phishing. So I wonder, is there someone having a certain solution, more
> exactly a software implementation on host, to protect against such attack?
>
> 2009-04-23
>
> [email protected]
As mentioned elsewhere, TSiG, GSS-TSiG, and IPSEC are all forms of channel
security. The
unfortunate truth is, these are unwieldy when managing large numbers of
connections. for a
slightly more scaleable solution, you might consider SIG(0). - All of these
are defined in
RFC's and there are several interoperable implementations.
Other channel security ideas that are floating around (but have nto gained
traction in the
IETF or market) are:
EDNS-PING
DNS-CURVE
--bill
_______________________________________________
DNSOP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dnsop