DNS Redirect for Protection from Malware
draft-livingood-dns-malwareprotect-02
Document | Type |
Expired Internet-Draft
(individual)
Expired & archived
|
|
---|---|---|---|
Authors | Tom Creighton , Chris Griffiths , Jason Livingood , Ralf Weber | ||
Last updated | 2010-10-22 | ||
RFC stream | (None) | ||
Intended RFC status | (None) | ||
Formats | |||
Stream | Stream state | (No stream defined) | |
Consensus boilerplate | Unknown | ||
RFC Editor Note | (None) | ||
IESG | IESG state | Expired | |
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
The objective of this document is to describe the design of so-called DNS-based malware protection services deployed by Internet Service Providers (ISPs), DNS Application Service Providers (ASPs), and other organizations. These organizations provide so-called DNS-based malware protection services via their recursive DNS servers. This document specifically and narrowly addresses those cases where these DNS servers are being utilized to provide a service for end users which blocks domains hosting malicious software, and makes recommendations concerning operation of such a service.
Authors
Tom Creighton
Chris Griffiths
Jason Livingood
Ralf Weber
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)