RFC 9103
DNS Zone Transfer over TLS, August 2021
- File formats:
- Also available: XML file for editing
- Status:
- PROPOSED STANDARD
- Updates:
- RFC 1995, RFC 5936, RFC 7766
- Authors:
- W. Toorop
S. Dickinson
S. Sahib
P. Aras
A. Mankin - Stream:
- IETF
- Source:
- dprive (int)
Cite this RFC: TXT | XML | BibTeX
DOI: https://doi.org/10.17487/RFC9103
Discuss this RFC: Send questions or comments to the mailing list dns-privacy@ietf.org
Other actions: Submit Errata | Find IPR Disclosures from the IETF | View History of RFC 9103
Abstract
DNS zone transfers are transmitted in cleartext, which gives attackers the opportunity to collect the content of a zone by eavesdropping on network connections. The DNS Transaction Signature (TSIG) mechanism is specified to restrict direct zone transfer to authorized clients only, but it does not add confidentiality. This document specifies the use of TLS, rather than cleartext, to prevent zone content collection via passive monitoring of zone transfers: XFR over TLS (XoT). Additionally, this specification updates RFC 1995 and RFC 5936 with respect to efficient use of TCP connections and RFC 7766 with respect to the recommended number of connections between a client and server for each transport.
For the definition of Status, see RFC 2026.
For the definition of Stream, see RFC 8729.