index revision bf8d171a66c201f8cbf23e2ee6db58ae0eb0316a
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein 952: DOD INTERNET HOST TABLE SPECIFICATION
b0e8629055a766d4555a005a283c2889a5974945Mark Andrews1032: DOMAIN ADMINISTRATORS GUIDE
75c0816e8295e180f4bc7f10db3d0d880383bc1cMark Andrews1033: DOMAIN ADMINISTRATORS OPERATIONS GUIDE
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein1034: DOMAIN NAMES - CONCEPTS AND FACILITIES
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein1035: DOMAIN NAMES - IMPLEMENTATION AND SPECIFICATION
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein1101: DNS Encoding of Network Names and Other Types
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein1122: Requirements for Internet Hosts -- Communication Layers
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein1123: Requirements for Internet Hosts -- Application and Support
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein1183: New DNS RR Definitions (AFSDB, RP, X25, ISDN and RT)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein1348: DNS NSAP RRs
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein1535: A Security Problem and Proposed Correction
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein With Widely Deployed DNS Software
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein1536: Common DNS Implementation Errors and Suggested Fixes
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein1537: Common DNS Data File Configuration Errors
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein1591: Domain Name System Structure and Delegation
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein1611: DNS Server MIB Extensions
a1b05dea35aa30b152a47115e18bbe679d3fcf19Mark Andrews1612: DNS Resolver MIB Extensions
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein1706: DNS NSAP Resource Records
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein1712: DNS Encoding of Geographical Location
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein1750: Randomness Recommendations for Security
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein1876: A Means for Expressing Location Information in the Domain Name System
e21a2904f02a03fa06b6db04d348f65fe9c67b2bMark Andrews1886: DNS Extensions to support IP version 6
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein1912: Common DNS Operational and Configuration Errors
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein1982: Serial Number Arithmetic
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein1995: Incremental Zone Transfer in DNS
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein1996: A Mechanism for Prompt Notification of Zone Changes (DNS NOTIFY)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2052: A DNS RR for specifying the location of services (DNS SRV)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2104: HMAC: Keyed-Hashing for Message Authentication
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2119: Key words for use in RFCs to Indicate Requirement Levels
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2133: Basic Socket Interface Extensions for IPv6
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2136: Dynamic Updates in the Domain Name System (DNS UPDATE)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2137: Secure Domain Name System Dynamic Update
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2163: Using the Internet DNS to Distribute MIXER
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Conformant Global Address Mapping (MCGAM)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2168: Resolution of Uniform Resource Identifiers using the Domain Name System
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2181: Clarifications to the DNS Specification
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2230: Key Exchange Delegation Record for the DNS
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2308: Negative Caching of DNS Queries (DNS NCACHE)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2317: Classless IN-ADDR.ARPA delegation
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2373: IP Version 6 Addressing Architecture
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2374: An IPv6 Aggregatable Global Unicast Address Format
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2375: IPv6 Multicast Address Assignments
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2418: IETF Working Group Guidelines and Procedures
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2535: Domain Name System Security Extensions
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2536: DSA KEYs and SIGs in the Domain Name System (DNS)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2537: RSA/MD5 KEYs and SIGs in the Domain Name System (DNS)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2538: Storing Certificates in the Domain Name System (DNS)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2539: Storage of Diffie-Hellman Keys in the Domain Name System (DNS)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2540: Detached Domain Name System (DNS) Information
b0e8629055a766d4555a005a283c2889a5974945Mark Andrews2541: DNS Security Operational Considerations
b0e8629055a766d4555a005a283c2889a5974945Mark Andrews2553: Basic Socket Interface Extensions for IPv6
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2671: Extension Mechanisms for DNS (EDNS0)
b0e8629055a766d4555a005a283c2889a5974945Mark Andrews2672: Non-Terminal DNS Name Redirection
b0e8629055a766d4555a005a283c2889a5974945Mark Andrews2673: Binary Labels in the Domain Name System
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2782: A DNS RR for specifying the location of services (DNS SRV)
b0e8629055a766d4555a005a283c2889a5974945Mark Andrews2825: A Tangled Web: Issues of I18N, Domain Names, and the
a1b05dea35aa30b152a47115e18bbe679d3fcf19Mark Andrews Other Internet protocols
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2826: IAB Technical Comment on the Unique DNS Root
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2845: Secret Key Transaction Authentication for DNS (TSIG)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2874: DNS Extensions to Support IPv6 Address Aggregation and Renumbering
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2915: The Naming Authority Pointer (NAPTR) DNS Resource Record
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2929: Domain Name System (DNS) IANA Considerations
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews2930: Secret Key Establishment for DNS (TKEY RR)
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews2931: DNS Request and Transaction Signatures ( SIG(0)s )
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein3007: Secure Domain Name System (DNS) Dynamic Update
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein3008: Domain Name System Security (DNSSEC) Signing Authority
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein3056: Connection of IPv6 Domains via IPv4 Clouds
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein3071: Reflections on the DNS, RFC 1591, and Categories of Domains
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein3090: DNS Security Extension Clarification on Zone Status
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein3110: RSA/SHA-1 SIGs and RSA KEYs in the Domain Name System (DNS)
b0e8629055a766d4555a005a283c2889a5974945Mark Andrews3123: A DNS RR Type for Lists of Address Prefixes (APL RR)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein3152: Delegation of IP6.ARPA
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein3197: Applicability Statement for DNS MIB Extensions
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein3225: Indicating Resolver Support of DNSSEC
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein3226: DNSSEC and IPv6 A6 aware server/resolver message size requirements
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein3258: Distributing Authoritative Name Servers via Shared Unicast Addresses
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein3363: Representing Internet Protocol version 6 (IPv6)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Addresses in the Domain Name System (DNS)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein3364: Tradeoffs in Domain Name System (DNS) Support
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein for Internet Protocol version 6 (IPv6)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein3425: Obsoleting IQUERY
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein3445: Limiting the Scope of the KEY Resource Record (RR)
727f5b8846457a33d06f515a10a7e1aa849ddf18Andreas Gustafsson3467: Role of the Domain Name System (DNS)
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce3490: Internationalizing Domain Names In Applications (IDNA)
8e245ec21beee31a780de9b89ba1e8bb2b9f4c9aAndreas Gustafsson3491: Nameprep: A Stringprep Profile for Internationalized Domain Names (IDN)
727f5b8846457a33d06f515a10a7e1aa849ddf18Andreas Gustafsson3492: Punycode:A Bootstring encoding of Unicode for
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce Internationalized Domain Names in Applications (IDNA)
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce3493: Basic Socket Interface Extensions for IPv6
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce3513: Internet Protocol Version 6 (IPv6) Addressing Architecture
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce3596: DNS Extensions to Support IP Version 6
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce3597: Handling of Unknown DNS Resource Record (RR) Types
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce3645: Generic Security Service Algorithm for
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce Secret Key Transaction Authentication for DNS (GSS-TSIG)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein3655: Redefinition of DNS Authenticated Data (AD) bit
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein3658: Delegation Signer (DS) Resource Record (RR)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein3755: Legacy Resolver Compatibility for Delegation Signer (DS)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein3757: Domain Name System KEY (DNSKEY) Resource Record (RR)
b0e8629055a766d4555a005a283c2889a5974945Mark Andrews Secure Entry Point (SEP) Flag
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein3833: Threat Analysis of the Domain Name System (DNS)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein3845: DNS Security (DNSSEC) NextSECure (NSEC) RDATA Format
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein3901: DNS IPv6 Transport Operational Guidelines
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein4025: A Method for Storing IPsec Keying Material in DNS
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein4033: DNS Security Introduction and Requirements
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein4034: Resource Records for the DNS Security Extensions
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein4035: Protocol Modifications for the DNS Security Extensions
8e245ec21beee31a780de9b89ba1e8bb2b9f4c9aAndreas Gustafsson4074: Common Misbehavior Against DNS Queries for IPv6 Addresses
575e532437cf7f203707765e21767db92fa1e480Mark Andrews4159: Deprecation of "ip6.int"
8e245ec21beee31a780de9b89ba1e8bb2b9f4c9aAndreas Gustafsson4193: Unique Local IPv6 Unicast Addresses
8e245ec21beee31a780de9b89ba1e8bb2b9f4c9aAndreas Gustafsson4255: Using DNS to Securely Publish Secure Shell (SSH) Key Fingerprints
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce4294: IPv6 Node Requirements
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce4339: IPv6 Host Configuration of DNS Server Information Approaches
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce4343: Domain Name System (DNS) Case Insensitivity Clarification
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce4367: What's in a Name: False Assumptions about DNS Names
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce4398: Storing Certificates in the Domain Name System (DNS)
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce4431: The DNSSEC Lookaside Validation (DLV) DNS Resource Record
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce4408: Sender Policy Framework (SPF) for Authorizing Use of Domains
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce in E-Mail, Version 1
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce4470: Minimally Covering NSEC Records and DNSSEC On-line Signing
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce4471: Derivation of DNS Name Predecessor and Successor
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce4472: Operational Considerations and Issues with IPv6 DNS
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce4509: Use of SHA-256 in DNSSEC Delegation Signer (DS) Resource Records (RRs)
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce4634: US Secure Hash Algorithms (SHA and HMAC-SHA)
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce4635: HMAC SHA TSIG Algorithm Identifiers
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce4641: DNSSEC Operational Practices
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce4648: The Base16, Base32, and Base64 Data Encodings
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce4697: Observed DNS Resolution Misbehavior
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce4701: A DNS Resource Record (RR) for Encoding
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce Dynamic Host Configuration Protocol (DHCP) Information (DHCID RR)
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce4892: Requirements for a Mechanism Identifying a Name Server Instance
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce4955: DNS Security (DNSSEC) Experiments
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce4956: DNS Security (DNSSEC) Opt-In
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce5001: DNS Name Server Identifier (NSID) Option
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce5011: Automated Updates of DNS Security (DNSSEC) Trust Anchors
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce5155: DNS Security (DNSSEC) Hashed Authenticated Denial of Existence
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein5205: Host Identity Protocol (HIP) Domain Name System (DNS) Extension
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein5395: Domain Name System (DNS) IANA Considerations
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein5452: Measures for Making DNS More Resilient against Forged Answers
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein5507: Design Choices When Expanding the DNS
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein5625: DNS Proxy Implementation Guidelines
b0e8629055a766d4555a005a283c2889a5974945Mark Andrews5702: Use of SHA-2 Algorithms with RSA in
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein DNSKEY and RRSIG Resource Records for DNSSEC
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein5933: Use of GOST Signature Algorithms in DNSKEY
71c66a876ecca77923638d3f94cc0783152b2f03Mark Andrews and RRSIG Resource Records for DNSSEC
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein5936: DNS Zone Transfer Protocol (AXFR)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein5952: A Recommendation for IPv6 Address Text Representation
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein5966: DNS Transport over TCP - Implementation Requirements
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein6052: IPv6 Addressing of IPv4/IPv6 Translators
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein6147: DNS64: DNS Extensions for Network Address Translation
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein from IPv6 Clients to IPv4 Servers
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein6168: Requirements for Management of Name Servers for the DNS
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein6303: Locally Served DNS Zones
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein6605: Elliptic Curve Digital Signature Algorithm (DSA) for DNSSEC
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein6672: DNAME Redirection in the DNS
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein6698: The DNS-Based Authentication of Named Entities (DANE)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Transport Layer Security (TLS) Protocol: TLSA
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein6742: DNS Resource Records for the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Identifier-Locator Network Protocol (ILNP)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein6840: Clarifications and Implementation Notes for DNS Security (DNSSEC)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein6844: DNS Certification Authority Authorization (CAA) Resource Record
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein6891: Extension Mechanisms for DNS (EDNS(0))
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein7043: Resource Records for EUI-48 and EUI-64 Addresses in the DNS
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein7314: Extension Mechanisms for DNS (EDNS) EXPIRE Option
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein7534: AS112 Nameserver Operations
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein7477: Child-to-Parent Synchronization in DNS
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein7535: AS112 Redirection Using DNAME
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein7793: Adding 100.64.0.0/10 Prefixes to the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein IPv4 Locally-Served DNS Zones Registry
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein7830: The EDNS(0) Padding Option