2004
DOI: 10.17487/rfc3833
|View full text |Cite
|
Sign up to set email alerts
|

Threat Analysis of the Domain Name System (DNS)

Abstract: Threat Analysis of the Domain Name System (DNS) Status of this Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
110
0

Year Published

2005
2005
2013
2013

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 152 publications
(110 citation statements)
references
References 2 publications
0
110
0
Order By: Relevance
“…Many Internet security mechanisms, including host access control and defenses against spam and phishing, implicitly or explicitly depend on the integrity of the DNS infrastructure. Unfortunately, security was not one of the design considerations for DNS, and many attacks on DNS were reported over the years [3,12,15,19].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Many Internet security mechanisms, including host access control and defenses against spam and phishing, implicitly or explicitly depend on the integrity of the DNS infrastructure. Unfortunately, security was not one of the design considerations for DNS, and many attacks on DNS were reported over the years [3,12,15,19].…”
Section: Introductionmentioning
confidence: 99%
“…DNS cache poisoning results in a DNS resolver storing (i.e., caching) invalid or malicious mappings between symbolic names and IP addresses. Because the process of resolving a name depends on authoritative servers located elsewhere on the Internet (see Section 2.2), DNS protocol is intrinsically vulnerable to cache poisoning [3]. An attacker may poison the cache by compromising an authoritative DNS server or by forging a response to a recursive DNS query sent by a resolver to an authoritative server.…”
Section: Introductionmentioning
confidence: 99%
“…These mechanisms are described below. These services protect against most of the threats to the Domain Name System described in [RFC3833]. Please see Section 12 for a discussion of the limitations of these extensions.…”
Section: Services Provided By Dns Securitymentioning
confidence: 99%
“…See Threat Analysis of the Domain Name System [RFC3833] for a review of the various threats to the DNS.…”
Section: Enum Clients May Discard Naptrs That Have Octets In the Flagsmentioning
confidence: 99%