Jump to first page
 -3
Outline
nIntroduction
nDNSSEC mechanisms
uto authenticate servers (TSIG / SIG0)
uto establish authenticity and integrity of data
FQuick overview
FNew RRs
FUsing public key cryptography to sign a single zone
FDelegating signing authority ; building chains of trust
FKey exchange and rollovers
nConclusions
n