{"id":76139,"date":"2018-03-16T17:15:35","date_gmt":"2018-03-16T17:15:35","guid":{"rendered":"https:\/\/www.internetsociety.org\/blog\/2018\/03\/rough-guide-ietf-101-dnssec-dane-dns-security-privacy\/"},"modified":"2025-11-14T15:13:19","modified_gmt":"2025-11-14T15:13:19","slug":"rough-guide-ietf-101-dnssec-dane-dns-security-privacy","status":"publish","type":"post","link":"https:\/\/www.internetsociety.org\/fr\/blog\/2018\/03\/rough-guide-ietf-101-dnssec-dane-dns-security-privacy\/","title":{"rendered":"Le Guide de r\u00e9f\u00e9rence de l\u2018IETF 101: DNSSEC, DANE, la S\u00e9curit\u00e9 DNS et la Confidentialit\u00e9"},"content":{"rendered":"<p>\u00c7a va \u00eatre une semaine de folie \u00e0 Londres cette semaine dans le monde de la s\u00e9curit\u00e9 et de la confidentialit\u00e9 du DNS! Dans le cadre de notre guide de l\u2018IETF 101, (\u00a0<a href=\"https:\/\/www.internetsociety.org\/events\/ietf\/ietf-101\/\">Rough Guide to IETF 101<\/a>) voici un aper\u00e7u rapide de ce qui se passe dans le monde du DNS. (Voir<a href=\"https:\/\/datatracker.ietf.org\/meeting\/101\/agenda.html\"> l&rsquo;ordre du jour comple<\/a>t en ligne pour tout le reste.)<\/p>\n<p><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2018\/03\/rough-guide-ietf-101-dnssec-dane-dns-security-privacy\/\">Savoir plus en cliquant ici<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00c7a va \u00eatre une semaine de folie \u00e0 Londres cette semaine dans le monde de la s\u00e9curit\u00e9 et de la confidentialit\u00e9 du DNS! Dans le cadre de notre guide de l\u2018IETF 101, (\u00a0Rough Guide to IETF 101) voici un aper\u00e7u rapide de ce qui se passe dans le monde du DNS. (Voir l&rsquo;ordre du jour [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":76140,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[178,6187,2581,2583,151,169,4909,4775,183,146],"tags":[6265,6240,6056,3376],"region_news_regions":[6029],"content_category":[6101],"ppma_author":[4048],"class_list":["post-76139","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-securite","category-comment-fonctionne-internet","category-domain-name-system-dns-fr","category-extensions-de-securite-du-dns","category-ietf-fr-2","category-les-normes-internet-ouvertes","category-renforcer-internet","category-securite-fr","category-technologie","category-deploy360-fr","tag-domain-name-system-dns","tag-extensions-de-securite-dns-dnssec","tag-ietf-meetings-fr","tag-ietf-fr","region_news_regions-mondial","content_category-blog-type"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/DNSSEC-for-Tech-Matters.png",470,230,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/DNSSEC-for-Tech-Matters-150x150.png",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/DNSSEC-for-Tech-Matters-300x147.png",300,147,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/DNSSEC-for-Tech-Matters.png",470,230,false],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/DNSSEC-for-Tech-Matters.png",470,230,false],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/DNSSEC-for-Tech-Matters.png",470,230,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/DNSSEC-for-Tech-Matters.png",470,230,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/DNSSEC-for-Tech-Matters-250x122.png",250,122,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/DNSSEC-for-Tech-Matters.png",470,230,false],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/DNSSEC-for-Tech-Matters.png",300,147,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/DNSSEC-for-Tech-Matters.png",400,196,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/DNSSEC-for-Tech-Matters.png",470,230,false]},"uagb_author_info":{"display_name":"Dan York","author_link":"https:\/\/www.internetsociety.org\/fr\/author\/york\/"},"uagb_comment_info":0,"uagb_excerpt":"\u00c7a va \u00eatre une semaine de folie \u00e0 Londres cette semaine dans le monde de la s\u00e9curit\u00e9 et de la confidentialit\u00e9 du DNS! Dans le cadre de notre guide de l\u2018IETF 101, (\u00a0Rough Guide to IETF 101) voici un aper\u00e7u rapide de ce qui se passe dans le monde du DNS. (Voir l&rsquo;ordre du jour\u2026","authors":[{"term_id":4048,"user_id":14,"is_guest":0,"slug":"york","display_name":"Dan York","avatar_url":{"url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","url2x":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g2x"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/76139","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/comments?post=76139"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/76139\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media\/76140"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media?parent=76139"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/categories?post=76139"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/tags?post=76139"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/region_news_regions?post=76139"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/content_category?post=76139"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/ppma_author?post=76139"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}