2009
DOI: 10.17487/rfc5625
|View full text |Cite
|
Sign up to set email alerts
|

DNS Proxy Implementation Guidelines

Abstract: This document provides guidelines for the implementation of DNS proxies, as found in broadband gateways and other similar network devices.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2010
2010
2023
2023

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 14 publications
(11 citation statements)
references
References 3 publications
0
11
0
Order By: Relevance
“…Despite their wide deployment, few standards exist that regulate what functions home gateways should perform and how they should perform them. The relevant standards bodies have ignored home gateways in the past, and only recently begun to document best current practices for some of the functions they perform, such as translating various protocols [3,11,29] or DNS proxying [4].…”
Section: Introductionmentioning
confidence: 99%
“…Despite their wide deployment, few standards exist that regulate what functions home gateways should perform and how they should perform them. The relevant standards bodies have ignored home gateways in the past, and only recently begun to document best current practices for some of the functions they perform, such as translating various protocols [3,11,29] or DNS proxying [4].…”
Section: Introductionmentioning
confidence: 99%
“…Worse still, some network devices deliberately refuse to handle DNS packets containing EDNS0 options. Other issues relating to UDP transport and packet size are discussed in [RFC5625].…”
Section: Discussionmentioning
confidence: 99%
“…There are many "middleboxes" in use today that interfere with TCP over port 53 [RFC5625]. This document does not propose any solutions, other than to make it absolutely clear that TCP is a valid transport for DNS and support for it is a requirement for all implementations.…”
Section: Appendix a Summary Of Advantages And Disadvantages To Usingmentioning
confidence: 99%
“…To minimize these types of attacks when using a restricted port set, the MAP CE's NAT44 filtering behavior SHOULD be "Address-Dependent Filtering" as described in Section 5 of [RFC4787]. Furthermore, the MAP CEs SHOULD use a DNS transport proxy [RFC5625] function to handle DNS traffic and source such traffic from IPv6 interfaces not assigned to MAP.…”
Section: Nat44 Considerationsmentioning
confidence: 99%