Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

In 2017, security problems were discovered in two nameservers strictly that were following  [RFC2845] and   and [RFC4635] (i.e.that is, TSIG and HMAC-SHA extension) specifications were discoveredstrictly. The implementations were fixed but, and to avoid similar problems in the future, the two specification documents were updated and merged, producing these revised specifications ; the result is the revised specification for TSIG.

The second area where the secret key based key–based MACs specified in this document can be used is to authenticate DNS-update requests as well as and transaction responses, providing . This approach would be a lightweight alternative to the protocol described by in [RFC3007].

Note
titleNote

Use of TSIG presumes prior agreement between that the resolver and server involved as to have already agreed about the algorithm and key to be usedthey will use.