Opportunistic Encryption with DANE Semantics and IPsec: IPSECA

The information below is for an old version of the document
Document Type Expired Internet-Draft (individual)
Authors Eric Osterweil  , Glen Wiley  , Dave Mitchell  , Andrew Newton 
Last updated 2015-03-01 (latest revision 2014-08-28)
Stream (None)
Expired & archived
pdf htmlized bibtex
Additional Resources
Stream Stream state (No stream defined)
Consensus Boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at


The query/response transactions of the Domain Name System (DNS) can disclose valuable meta-data about the online activities of DNS' users. The DNS Security Extensions (DNSSEC) provide object-level security, but do not attempt to secure the DNS transaction itself. For example, DNSSEC does not protect against information leakage, and only protects DNS data until the last validating recursive resolver. Stub resolvers are vulnerable to adversaries in the network between themselves and their validating resolver ("the last mile"). This document details a new DANE-like DNS Resource Record (RR) type called IPSECA, and explains how to use it to bootstrap DNS transactions through informing entries in IPsec Security Policy Databases (SPDs) and to subsequently verifying Security Associations (SAs) for OE IPsec tunnels.


Eric Osterweil (eosterweil@verisign.com)
Glen Wiley (gwiley@verisign.com)
Dave Mitchell (dave@singularity.cx)
Andrew Newton (andy@arin.net)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)