index revision e3db607c92cd958a6bd8410f93dcc7e104ed0143
6ea1b817e31b89a627e146fe69e23ea0a64c89ecBob Halley 952: DOD INTERNET HOST TABLE SPECIFICATION
2a1d6afad5c725cbc796c10f1d2b9041eda9f077Automatic Updater1032: DOMAIN ADMINISTRATORS GUIDE
75c0816e8295e180f4bc7f10db3d0d880383bc1cMark Andrews1033: DOMAIN ADMINISTRATORS OPERATIONS GUIDE
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein1034: DOMAIN NAMES - CONCEPTS AND FACILITIES
4a14ce5ba00ab7bc55c99ffdcf59c7a4ab902721Automatic Updater1035: DOMAIN NAMES - IMPLEMENTATION AND SPECIFICATION
6ea1b817e31b89a627e146fe69e23ea0a64c89ecBob Halley1101: DNS Encoding of Network Names and Other Types
6ea1b817e31b89a627e146fe69e23ea0a64c89ecBob Halley1122: Requirements for Internet Hosts -- Communication Layers
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein1123: Requirements for Internet Hosts -- Application and Support
8a66318e41ed14c5a88130e8c362610e8faa2121Mark Andrews1183: New DNS RR Definitions (AFSDB, RP, X25, ISDN and RT)
8a66318e41ed14c5a88130e8c362610e8faa2121Mark Andrews1348: DNS NSAP RRs
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein1535: A Security Problem and Proposed Correction
8a66318e41ed14c5a88130e8c362610e8faa2121Mark Andrews With Widely Deployed DNS Software
8a66318e41ed14c5a88130e8c362610e8faa2121Mark Andrews1536: Common DNS Implementation Errors and Suggested Fixes
8a66318e41ed14c5a88130e8c362610e8faa2121Mark Andrews1537: Common DNS Data File Configuration Errors
8a66318e41ed14c5a88130e8c362610e8faa2121Mark Andrews1591: Domain Name System Structure and Delegation
6ea1b817e31b89a627e146fe69e23ea0a64c89ecBob Halley1611: DNS Server MIB Extensions
2a1d6afad5c725cbc796c10f1d2b9041eda9f077Automatic Updater1612: DNS Resolver MIB Extensions
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein1706: DNS NSAP Resource Records
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein1712: DNS Encoding of Geographical Location
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein1750: Randomness Recommendations for Security
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein1876: A Means for Expressing Location Information in the Domain Name System
e21a2904f02a03fa06b6db04d348f65fe9c67b2bMark Andrews1886: DNS Extensions to support IP version 6
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein1912: Common DNS Operational and Configuration Errors
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein1982: Serial Number Arithmetic
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews1995: Incremental Zone Transfer in DNS
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein1996: A Mechanism for Prompt Notification of Zone Changes (DNS NOTIFY)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2052: A DNS RR for specifying the location of services (DNS SRV)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2104: HMAC: Keyed-Hashing for Message Authentication
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2119: Key words for use in RFCs to Indicate Requirement Levels
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2133: Basic Socket Interface Extensions for IPv6
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2136: Dynamic Updates in the Domain Name System (DNS UPDATE)
2a1d6afad5c725cbc796c10f1d2b9041eda9f077Automatic Updater2137: Secure Domain Name System Dynamic Update
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2163: Using the Internet DNS to Distribute MIXER
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Conformant Global Address Mapping (MCGAM)
2a1d6afad5c725cbc796c10f1d2b9041eda9f077Automatic Updater2168: Resolution of Uniform Resource Identifiers using the Domain Name System
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2181: Clarifications to the DNS Specification
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2230: Key Exchange Delegation Record for the DNS
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2308: Negative Caching of DNS Queries (DNS NCACHE)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2317: Classless IN-ADDR.ARPA delegation
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2373: IP Version 6 Addressing Architecture
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2374: An IPv6 Aggregatable Global Unicast Address Format
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2375: IPv6 Multicast Address Assignments
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2418: IETF Working Group Guidelines and Procedures
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2535: Domain Name System Security Extensions
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2536: DSA KEYs and SIGs in the Domain Name System (DNS)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2537: RSA/MD5 KEYs and SIGs in the Domain Name System (DNS)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2538: Storing Certificates in the Domain Name System (DNS)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2539: Storage of Diffie-Hellman Keys in the Domain Name System (DNS)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2540: Detached Domain Name System (DNS) Information
2a1d6afad5c725cbc796c10f1d2b9041eda9f077Automatic Updater2541: DNS Security Operational Considerations
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2553: Basic Socket Interface Extensions for IPv6
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2671: Extension Mechanisms for DNS (EDNS0)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2672: Non-Terminal DNS Name Redirection
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2673: Binary Labels in the Domain Name System
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2782: A DNS RR for specifying the location of services (DNS SRV)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2825: A Tangled Web: Issues of I18N, Domain Names, and the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Other Internet protocols
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2826: IAB Technical Comment on the Unique DNS Root
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2845: Secret Key Transaction Authentication for DNS (TSIG)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2874: DNS Extensions to Support IPv6 Address Aggregation and Renumbering
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2915: The Naming Authority Pointer (NAPTR) DNS Resource Record
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2929: Domain Name System (DNS) IANA Considerations
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2930: Secret Key Establishment for DNS (TKEY RR)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein2931: DNS Request and Transaction Signatures ( SIG(0)s )
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein3007: Secure Domain Name System (DNS) Dynamic Update
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein3008: Domain Name System Security (DNSSEC) Signing Authority
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein3056: Connection of IPv6 Domains via IPv4 Clouds
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein3071: Reflections on the DNS, RFC 1591, and Categories of Domains
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein3090: DNS Security Extension Clarification on Zone Status
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein3110: RSA/SHA-1 SIGs and RSA KEYs in the Domain Name System (DNS)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein3123: A DNS RR Type for Lists of Address Prefixes (APL RR)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein3152: Delegation of IP6.ARPA
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein3197: Applicability Statement for DNS MIB Extensions
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein3225: Indicating Resolver Support of DNSSEC
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein3226: DNSSEC and IPv6 A6 aware server/resolver message size requirements
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein3258: Distributing Authoritative Name Servers via Shared Unicast Addresses
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein3363: Representing Internet Protocol version 6 (IPv6)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Addresses in the Domain Name System (DNS)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein3364: Tradeoffs in Domain Name System (DNS) Support
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein for Internet Protocol version 6 (IPv6)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein3425: Obsoleting IQUERY
8ec3c085233cedb22b05da36e2773c8f357a7e45Automatic Updater3445: Limiting the Scope of the KEY Resource Record (RR)
8ec3c085233cedb22b05da36e2773c8f357a7e45Automatic Updater3467: Role of the Domain Name System (DNS)
8ec3c085233cedb22b05da36e2773c8f357a7e45Automatic Updater3490: Internationalizing Domain Names In Applications (IDNA)
8ec3c085233cedb22b05da36e2773c8f357a7e45Automatic Updater3491: Nameprep: A Stringprep Profile for Internationalized Domain Names (IDN)
8ec3c085233cedb22b05da36e2773c8f357a7e45Automatic Updater3492: Punycode:A Bootstring encoding of Unicode for
8ec3c085233cedb22b05da36e2773c8f357a7e45Automatic Updater Internationalized Domain Names in Applications (IDNA)
8ec3c085233cedb22b05da36e2773c8f357a7e45Automatic Updater3493: Basic Socket Interface Extensions for IPv6
8ec3c085233cedb22b05da36e2773c8f357a7e45Automatic Updater3513: Internet Protocol Version 6 (IPv6) Addressing Architecture
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein3596: DNS Extensions to Support IP Version 6
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein3597: Handling of Unknown DNS Resource Record (RR) Types
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein3645: Generic Security Service Algorithm for
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Secret Key Transaction Authentication for DNS (GSS-TSIG)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein3655: Redefinition of DNS Authenticated Data (AD) bit
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein3658: Delegation Signer (DS) Resource Record (RR)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein3755: Legacy Resolver Compatibility for Delegation Signer (DS)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein3757: Domain Name System KEY (DNSKEY) Resource Record (RR)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Secure Entry Point (SEP) Flag
a1b05dea35aa30b152a47115e18bbe679d3fcf19Mark Andrews3833: Threat Analysis of the Domain Name System (DNS)
a1b05dea35aa30b152a47115e18bbe679d3fcf19Mark Andrews3845: DNS Security (DNSSEC) NextSECure (NSEC) RDATA Format
a1b05dea35aa30b152a47115e18bbe679d3fcf19Mark Andrews3901: DNS IPv6 Transport Operational Guidelines
a1b05dea35aa30b152a47115e18bbe679d3fcf19Mark Andrews4025: A Method for Storing IPsec Keying Material in DNS
a1b05dea35aa30b152a47115e18bbe679d3fcf19Mark Andrews4033: DNS Security Introduction and Requirements
a1b05dea35aa30b152a47115e18bbe679d3fcf19Mark Andrews4034: Resource Records for the DNS Security Extensions
a1b05dea35aa30b152a47115e18bbe679d3fcf19Mark Andrews4035: Protocol Modifications for the DNS Security Extensions
a1b05dea35aa30b152a47115e18bbe679d3fcf19Mark Andrews4074: Common Misbehavior Against DNS Queries for IPv6 Addresses
a1b05dea35aa30b152a47115e18bbe679d3fcf19Mark Andrews4159: Deprecation of "ip6.int"
a1b05dea35aa30b152a47115e18bbe679d3fcf19Mark Andrews4193: Unique Local IPv6 Unicast Addresses
a1b05dea35aa30b152a47115e18bbe679d3fcf19Mark Andrews4255: Using DNS to Securely Publish Secure Shell (SSH) Key Fingerprints
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein4294: IPv6 Node Requirements
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein4339: IPv6 Host Configuration of DNS Server Information Approaches
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein4343: Domain Name System (DNS) Case Insensitivity Clarification
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein4367: What's in a Name: False Assumptions about DNS Names
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein4398: Storing Certificates in the Domain Name System (DNS)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein4431: The DNSSEC Lookaside Validation (DLV) DNS Resource Record
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein4408: Sender Policy Framework (SPF) for Authorizing Use of Domains
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein in E-Mail, Version 1
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein4470: Minimally Covering NSEC Records and DNSSEC On-line Signing
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein4471: Derivation of DNS Name Predecessor and Successor
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein4472: Operational Considerations and Issues with IPv6 DNS
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein4509: Use of SHA-256 in DNSSEC Delegation Signer (DS) Resource Records (RRs)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein4634: US Secure Hash Algorithms (SHA and HMAC-SHA)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein4635: HMAC SHA TSIG Algorithm Identifiers
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein4641: DNSSEC Operational Practices
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein4648: The Base16, Base32, and Base64 Data Encodings
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein4697: Observed DNS Resolution Misbehavior
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein4701: A DNS Resource Record (RR) for Encoding
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Dynamic Host Configuration Protocol (DHCP) Information (DHCID RR)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein4892: Requirements for a Mechanism Identifying a Name Server Instance
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein4955: DNS Security (DNSSEC) Experiments
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein4956: DNS Security (DNSSEC) Opt-In
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein5001: DNS Name Server Identifier (NSID) Option
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein5011: Automated Updates of DNS Security (DNSSEC) Trust Anchors
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein5155: DNS Security (DNSSEC) Hashed Authenticated Denial of Existence
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein5205: Host Identity Protocol (HIP) Domain Name System (DNS) Extension
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein5395: Domain Name System (DNS) IANA Considerations
c4d99a62407cebca29653666ae11f87e4f56ebbcAutomatic Updater5452: Measures for Making DNS More Resilient against Forged Answers
c4d99a62407cebca29653666ae11f87e4f56ebbcAutomatic Updater5507: Design Choices When Expanding the DNS
c4d99a62407cebca29653666ae11f87e4f56ebbcAutomatic Updater5625: DNS Proxy Implementation Guidelines
c4d99a62407cebca29653666ae11f87e4f56ebbcAutomatic Updater5702: Use of SHA-2 Algorithms with RSA in
c4d99a62407cebca29653666ae11f87e4f56ebbcAutomatic Updater DNSKEY and RRSIG Resource Records for DNSSEC
c4d99a62407cebca29653666ae11f87e4f56ebbcAutomatic Updater5933: Use of GOST Signature Algorithms in DNSKEY
c4d99a62407cebca29653666ae11f87e4f56ebbcAutomatic Updater and RRSIG Resource Records for DNSSEC
c4d99a62407cebca29653666ae11f87e4f56ebbcAutomatic Updater5936: DNS Zone Transfer Protocol (AXFR)
c4d99a62407cebca29653666ae11f87e4f56ebbcAutomatic Updater5952: A Recommendation for IPv6 Address Text Representation
c4d99a62407cebca29653666ae11f87e4f56ebbcAutomatic Updater5966: DNS Transport over TCP - Implementation Requirements
c4d99a62407cebca29653666ae11f87e4f56ebbcAutomatic Updater6052: IPv6 Addressing of IPv4/IPv6 Translators
c4d99a62407cebca29653666ae11f87e4f56ebbcAutomatic Updater6147: DNS64: DNS Extensions for Network Address Translation
c4d99a62407cebca29653666ae11f87e4f56ebbcAutomatic Updater from IPv6 Clients to IPv4 Servers
c4d99a62407cebca29653666ae11f87e4f56ebbcAutomatic Updater6168: Requirements for Management of Name Servers for the DNS
c4d99a62407cebca29653666ae11f87e4f56ebbcAutomatic Updater6303: Locally Served DNS Zones
c4d99a62407cebca29653666ae11f87e4f56ebbcAutomatic Updater6605: Elliptic Curve Digital Signature Algorithm (DSA) for DNSSEC
c4d99a62407cebca29653666ae11f87e4f56ebbcAutomatic Updater6672: DNAME Redirection in the DNS
c4d99a62407cebca29653666ae11f87e4f56ebbcAutomatic Updater6698: The DNS-Based Authentication of Named Entities (DANE)
c4d99a62407cebca29653666ae11f87e4f56ebbcAutomatic Updater Transport Layer Security (TLS) Protocol: TLSA
c4d99a62407cebca29653666ae11f87e4f56ebbcAutomatic Updater6742: DNS Resource Records for the
c4d99a62407cebca29653666ae11f87e4f56ebbcAutomatic Updater Identifier-Locator Network Protocol (ILNP)
c4d99a62407cebca29653666ae11f87e4f56ebbcAutomatic Updater6840: Clarifications and Implementation Notes for DNS Security (DNSSEC)
c4d99a62407cebca29653666ae11f87e4f56ebbcAutomatic Updater6844: DNS Certification Authority Authorization (CAA) Resource Record
c4d99a62407cebca29653666ae11f87e4f56ebbcAutomatic Updater6891: Extension Mechanisms for DNS (EDNS(0))
c4d99a62407cebca29653666ae11f87e4f56ebbcAutomatic Updater7043: Resource Records for EUI-48 and EUI-64 Addresses in the DNS
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein7314: Extension Mechanisms for DNS (EDNS) EXPIRE Option
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein7534: AS112 Nameserver Operations
d71e2e0c61df16ff37c9934c371a4a60c08974f7Mark Andrews7477: Child-to-Parent Synchronization in DNS
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein7535: AS112 Redirection Using DNAME
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein7793: Adding 100.64.0.0/10 Prefixes to the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein IPv4 Locally-Served DNS Zones Registry
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein7830: The EDNS(0) Padding Option
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein7873: Domain Name System (DNS) Cookies
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein8020: NXDOMAIN: There Really Is Nothing Underneath
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein