Lines Matching refs:Y

1 Y = Comprehensively Implemented, to the point appropriate for resolved
8 Y https://tools.ietf.org/html/rfc1034 → DOMAIN NAMES - CONCEPTS AND FACILITIES
9 Y https://tools.ietf.org/html/rfc1035 → DOMAIN NAMES - IMPLEMENTATION AND SPECIFICATION
11 Y https://tools.ietf.org/html/rfc1123 → Requirements for Internet Hosts — Application and Support
13 Y https://tools.ietf.org/html/rfc1536 → Common DNS Implementation Errors and Suggested Fixes
14 Y https://tools.ietf.org/html/rfc1876 → A Means for Expressing Location Information in the Domain N…
15 Y https://tools.ietf.org/html/rfc2181 → Clarifications to the DNS Specification
16 Y https://tools.ietf.org/html/rfc2308 → Negative Caching of DNS Queries (DNS NCACHE)
17 Y https://tools.ietf.org/html/rfc2782 → A DNS RR for specifying the location of services (DNS SRV)
19 Y https://tools.ietf.org/html/rfc3596 → DNS Extensions to Support IP Version 6
20 Y https://tools.ietf.org/html/rfc3597 → Handling of Unknown DNS Resource Record (RR) Types
21 Y https://tools.ietf.org/html/rfc4033 → DNS Security Introduction and Requirements
22 Y https://tools.ietf.org/html/rfc4034 → Resource Records for the DNS Security Extensions
23 Y https://tools.ietf.org/html/rfc4035 → Protocol Modifications for the DNS Security Extensions
25 Y https://tools.ietf.org/html/rfc4255 → Using DNS to Securely Publish Secure Shell (SSH) Key Finger…
26 Y https://tools.ietf.org/html/rfc4343 → Domain Name System (DNS) Case Insensitivity Clarification
28 Y https://tools.ietf.org/html/rfc4501 → Domain Name System Uniform Resource Identifiers
29 Y https://tools.ietf.org/html/rfc4509 → Use of SHA-256 in DNSSEC Delegation Signer (DS) Resource Re…
32 Y https://tools.ietf.org/html/rfc4795 → Link-Local Multicast Name Resolution (LLMNR)
33 Y https://tools.ietf.org/html/rfc5011 → Automated Updates of DNS Security (DNSSEC) Trust Anchors
34 Y https://tools.ietf.org/html/rfc5155 → DNS Security (DNSSEC) Hashed Authenticated Denial of Existe…
35 Y https://tools.ietf.org/html/rfc5452 → Measures for Making DNS More Resilient against Forged Answe…
36 Y https://tools.ietf.org/html/rfc5702 → Use of SHA-2 Algorithms with RSA in DNSKEY and RRSIG Resour…
37 Y https://tools.ietf.org/html/rfc5890 → Internationalized Domain Names for Applications (IDNA): Def…
38 Y https://tools.ietf.org/html/rfc5891 → Internationalized Domain Names in Applications (IDNA): Prot…
39 Y https://tools.ietf.org/html/rfc5966 → DNS Transport over TCP - Implementation Requirements
40 Y https://tools.ietf.org/html/rfc6303 → Locally Served DNS Zones
41 Y https://tools.ietf.org/html/rfc6604 → xNAME RCODE and Status Bits Clarification
42 Y https://tools.ietf.org/html/rfc6605 → Elliptic Curve Digital Signature Algorithm (DSA) for DNSSEC
45 Y https://tools.ietf.org/html/rfc6761 → Special-Use Domain Names
49 Y https://tools.ietf.org/html/rfc6840 → Clarifications and Implementation Notes for DNS Security (D…
50 Y https://tools.ietf.org/html/rfc6891 → Extension Mechanisms for DNS (EDNS(0))
51 Y https://tools.ietf.org/html/rfc6944 → Applicability Statement: DNS Security (DNSSEC) DNSKEY Algor…
52 Y https://tools.ietf.org/html/rfc6975 → Signaling Cryptographic Algorithm Understanding in DNS Secu…
53 Y https://tools.ietf.org/html/rfc7129 → Authenticated Denial of Existence in the DNS
54 Y https://tools.ietf.org/html/rfc7646 → Definition and Use of DNSSEC Negative Trust Anchors
56 Y https://tools.ietf.org/html/rfc8080 → Edwards-Curve Digital Security Algorithm (EdDSA) for DNSSEC