<?xml version="1.0" encoding="utf-8"?>
<!-- name="GENERATOR" content="github.com/mmarkdown/mmark Mmark Markdown Processor - mmark.miek.nl" -->
<rfc version="3" ipr="trust200902" docName="draft-analyst-dns-dip-rr-00" submissionType="IETF" category="std" xml:lang="en" xmlns:xi="http://www.w3.org/2001/XInclude" indexInclude="true">

<front>
<title>DNS Resource Records for the Data Interoperability Protocol</title><seriesInfo value="draft-analyst-dns-dip-rr-00" stream="IETF" status="standard" name="Internet-Draft"></seriesInfo>
<author initials="X." surname="Lee" fullname="Xiaodong Lee"><organization abbrev="ICT">Institute of Computing Technology, Chinese Academy of Sciences</organization><address><postal><street></street>
</postal><email>XL@ict.ac.cn</email>
</address></author><author initials="B." surname="Peng" fullname="Botao Peng"><organization abbrev="ICT">Institute of Computing Technology, Chinese Academy of Sciences</organization><address><postal><street></street>
</postal><email>pengbotao@ict.ac.cn</email>
</address></author><author initials="Y" surname="Fu" fullname="Yufan Fu"><organization abbrev="ICT;UCAS">Institute of Computing Technology, Chinese Academy of Sciences</organization><address><postal><street></street>
</postal><email>fuyufan20z@ict.ac.cn</email>
</address></author><author initials="Y." surname="Wang" fullname="Yumeng Wang"><organization abbrev="ICT;UCAS">Institute of Computing Technology, Chinese Academy of Sciences</organization><address><postal><street></street>
</postal><email>wangyumeng24s@ict.ac.cn</email>
</address></author><date year="2025" month="October" day="31"></date>
<area>Internet</area>
<workgroup></workgroup>

<abstract>
<t>This document specifies a set of new DNS Resource Record (RR) types to support the Data Interoperability Protocol (DIP). DIP models entities as &quot;Data Objects&quot; (DOs) indexed by &quot;Data Object Identifiers&quot; (DOIs), which are syntactically equivalent to DNS domain names. The RR types specified herein-DLR, DOPK, DOAUTH, DODIGEST, DOCG, and DOALGO-are designed to hold key attributes of a DO. This approach addresses the inherent limitations of repurposing existing RR types (such as TXT) with respect to structured data representation, efficiency in handling binary data, and query granularity. The result is a native, efficient, and extensible mechanism for discovering and managing DO metadata via the DNS.</t>
</abstract>

</front>

<middle>

<section anchor="introduction"><name>Introduction</name>

<section anchor="background-the-evolution-towards-data-interoperability"><name>Background:The Evolution Towards Data Interoperability</name>
<t>The history of the Internet is marked by the progressive refinement of its core interoperability unit. In its early stages, the TCP/IP suite addressed the challenge of reliable data transmission between hosts over unreliable networks, defining the paradigm of &quot;host interconnection.&quot; Subsequently, protocols such as HTTP and DNS enabled the &quot;website interconnection&quot; era by providing a structured way to organize and locate information. We are now entering a new phase, where the central challenge is to enable secure, trusted, and rights-respecting &quot;data interconnection&quot; within a global, untrusted network environment.</t>
<t>However, the full potential of data as a key economic factor is currently hindered by significant obstacles, including data silos, disputes over data sovereignty, data misuse, and privacy breaches. To address these challenges, a new foundational protocol is needed to establish a unified framework that facilitates the secure flow and collaboration of data across diverse entities and jurisdictions, while ensuring that data owners retain control over their assets.</t>
</section>

<section anchor="the-data-interoperability-protocol-dip"><name>The Data Interoperability Protocol(DIP)</name>
<t>The Data Interoperability Protocol (DIP) is proposed as a standardized solution to the aforementioned challenges. DIP abstracts any entity in the real or digital world-including individuals, organizations, devices, services, or even an abstract dataset-into a unified construct known as a &quot;Data Object&quot; (DO).</t>
<t>Each DO is identified by a globally unique &quot;Data Object Identifier&quot; (DOI). A core design principle of DIP is that <strong>a DOI is syntactically and semantically equivalent to a DNS domain name</strong>. This design allows DIP to directly leverage the DNS-the world's largest, most stable, and most widely distributed naming and resolution system-as its trust anchor.</t>
<t>A DO is fully described by a set of &quot;Data Object Attributes&quot; (DOAs). These attributes are structured metadata that define the core characteristics of the DO, such as its network-reachable address (locator), credentials for authentication (public key), access control policies (authorization), a value for content integrity verification (digest), and compliance governance requirements (classification, algorithm governance).</t>
</section>

<section anchor="rationale-for-new-dns-resource-record-types"><name>Rationale for New DNS Resource Record Types</name>
<t>Given that a DOI is equivalent to a DNS domain name, storing DOAs in the DNS and using the DNS protocol for their publication and resolution is a logical and technically advantageous choice. The DNS's hierarchical structure, high availability, scalability, and mature global operational ecosystem provide a robust infrastructure for DIP's metadata registration and resolution needs.</t>
<t>A seemingly straightforward implementation approach would be to utilize existing DNS Resource Record (RR) types, such as the TXT record defined in <xref target="RFC1035"></xref>. However, upon careful analysis, this approach presents significant deficiencies that fail to meet DIP's requirements for structure, efficiency, and security:</t>

<ul>
<li><t><strong>Lack of Structure and Semantics</strong>: The RDATA of a TXT record is fundamentally a sequence of unstructured characters. Encoding DIP's complex, structured attributes (such as an authorization policy with multiple fields) into a TXT record would necessitate complex, non-standard, application-layer parsing logic. This is highly prone to ambiguity and interoperability issues between different implementations. Moreover, the <tt>TXT</tt> mnemonic itself provides no semantic information about the purpose of the data it contains.</t>
</li>
<li><t><strong>Inefficiency</strong>: DIP attributes include native binary data, such as cryptographic public keys and digital signatures. Storing such data in a TXT record requires text-based encoding (e.g., Base64 or hexadecimal), which significantly increases the size of the RDATA and imposes unnecessary computational overhead for encoding and decoding on both clients and servers.</t>
</li>
<li><t><strong>Coarse Query Granularity</strong>: If multiple attributes are bundled into a single TXT record, a client needing only a specific attribute (e.g., only the public key) must still request and receive the entire record's content. The client must then parse and extract the desired piece of information locally. This is wasteful of both network bandwidth and client-side processing resources.</t>
</li>
</ul>
<t>To overcome these limitations and to build an efficient, clear, extensible, and semantically precise foundation for the Data Interoperability Protocol, this document proposes a set of new, dedicated DNS Resource Record (RR) types. Each new RR type corresponds exactly to a core Data Object Attribute (e.g., DLR, DOPK, DOAUTH). This approach provides a solution that is native to structured and binary data, allows for fine-grained queries, and aligns closely with the design philosophy of the DNS.</t>
</section>
</section>

<section anchor="definitions"><name>Definitions</name>

<section anchor="requirements-language"><name>Requirements Language</name>
<t>The key words &quot;MUST&quot;, &quot;MUST NOT&quot;, &quot;REQUIRED&quot;, &quot;SHALL&quot;, &quot;SHALL NOT&quot;, &quot;SHOULD&quot;, &quot;SHOULD NOT&quot;, &quot;RECOMMENDED&quot;, &quot;MAY&quot;, and &quot;OPTIONAL&quot; in this document are to be interpreted as described in <xref target="RFC2119"></xref>;<xref target="RFC8174"></xref>.</t>
</section>

<section anchor="defined-terms"><name>Defined Terms</name>
<t>This document uses the following terms:</t>

<ul spacing="compact">
<li><strong>DIP</strong>: Data Interoperability Protocol.</li>
<li><strong>DO</strong>: Data Object, a structured digital representation of the objective world. Data objects do not distinguish between people, institutions, or objects, and consist of data objects and data object contents.</li>
<li><strong>DOI</strong>: Data Object Identifier, a unique identifier for a data object, which is the index of data object attributes.</li>
<li><strong>DOA</strong>: Data Object Attribute, information related to a data object, such as locators, ownership information.</li>
<li><strong>DLR</strong>: Data Locator, used to locate the information entry of data object content or related resources, pointing to identity or content resources related to the data object.</li>
</ul>
</section>
</section>

<section anchor="data-object-attribute-resource-record-types"><name>Data Object Attribute Resource Record Types</name>

<section anchor="the-dlr-data-locator-resource-record"><name>The DLR (Data Locator) Resource Record</name>
<t>The <tt>DLR</tt> RR specifies a locator for the Data Object's content or associated resources. This is typically a URI.</t>

<ul>
<li><t><strong>Mnemonic</strong>: DLR</t>
</li>
<li><t><strong>Type Code</strong>: TBD1 (to be assigned by IANA)</t>
</li>
<li><t><strong>RDATA Format</strong>:
A single, variable-length field containing the URI, encoded as a <tt>&lt;character-string&gt;</tt> as defined in <xref target="RFC1035"></xref>, Section 3.3.</t>
</li>
<li><t><strong>Presentation Format</strong>:
<tt>&lt;URI&gt;</tt></t>
</li>
<li><t><strong>Example</strong>:</t>
</li>
</ul>

<sourcecode type="dns"><![CDATA[  fuxizhiku.example.com.  DLR  
  "https://data.example.com/space/fuxizhiku/content"
]]></sourcecode>
</section>

<section anchor="the-dopk-data-object-public-key-resource-record"><name>The DOPK (Data Object Public Key) Resource Record</name>
<t>The <tt>DOPK</tt> RR stores the public key associated with a Data Object, used for identity authentication and cryptographic operations.</t>

<ul>
<li><t><strong>Mnemonic</strong>: DOPK</t>
</li>
<li><t><strong>Type Code</strong>: TBD2 (to be assigned by IANA)</t>
</li>
<li><t><strong>RDATA Format</strong>:</t>
</li>
</ul>

<sourcecode type="asciidoc"><![CDATA[  +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
  |   Algorithm (8 bits)  |                     /
  +--+--+--+--+--+--+--+--+                     /
  /                   Public Key                  /
  /                                               /
  +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
]]></sourcecode>

<ul>
<li>
<dl>
<dt>Algorithm</dt>
<dd><t>An 8-bit identifier for the public key's cryptographic algorithm. Values are managed by IANA in a new registry. Initial values:</t>
</dd>
</dl>

<ul spacing="compact">
<li><tt>1</tt>: RSA</li>
<li><tt>2</tt>: ECDSA/P-256</li>
<li><tt>3</tt>: Ed25519</li>
</ul></li>
<li><t><strong>Public Key</strong>: Variable-length binary data of the public key. The format is algorithm-specific.</t>
</li>
<li><t><strong>Presentation Format</strong>:
<tt>&lt;Algorithm&gt; &lt;Base64-encoded Public Key&gt;</tt></t>
</li>
<li><t><strong>Example</strong> (line breaks for clarity):</t>
</li>
</ul>

<sourcecode type="dns"><![CDATA[  user1.example.com.  DOPK  1 ( AQAB... )
]]></sourcecode>
</section>

<section anchor="the-doauth-data-object-authorization-resource-record"><name>The DOAUTH (Data Object Authorization) Resource Record</name>
<t>The <tt>DOAUTH</tt> RR defines an authorization (right) granted to a subject (another Data Object) over the owner Data Object.</t>

<ul>
<li><t><strong>Mnemonic</strong>: DOAUTH</t>
</li>
<li><t><strong>Type Code</strong>: TBD3 (to be assigned by IANA)</t>
</li>
<li><t><strong>RDATA Format</strong>:</t>
</li>
</ul>

<sourcecode type="pgsql"><![CDATA[  +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
  |         Type (8 bits)         |               /
  +--+--+--+--+--+--+--+--+--+--+--+               /
  /          Subject DOI (domain-name)            /
  ...
]]></sourcecode>

<ul>
<li><strong>Type</strong>: An 8-bit unsigned integer defining the authorization type.</li>
<li><strong>Subject DOI</strong>: The domain name of the Data Object being granted the authorization.</li>
<li><strong>Permission DOI</strong>: The domain name of a Data Object whose content describes the detailed permissions.</li>
<li><strong>Creator DOI</strong>: The domain name of the Data Object that created this authorization record.</li>
<li><strong>Parent DOI</strong>: An optional parent Data Object, represented as a domain name. If not present, this field is the root domain &quot;.&quot;.</li>
<li><strong>Key</strong>: An encrypted symmetric key for accessing the DO content.</li>
<li><t><strong>Confirmation</strong>: The subject's signature over the DO content digest.</t>
</li>
<li><t><strong>Presentation Format</strong>:
<tt>&lt;Type&gt; &lt;Subject DOI&gt; &lt;Permission DOI&gt; &lt;Creator DOI&gt; &lt;Parent DOI&gt; ( &lt;Base64-encoded Key&gt; ) ( &lt;Base64-encoded Confirmation&gt; )</tt></t>
</li>
<li><t><strong>Example</strong>:</t>
</li>
</ul>

<sourcecode type="dns"><![CDATA[  data1.example.com. DOAUTH 192 user1.example.com. 
  perm1.example.com. owner1.example.com. . 
  ( dGhpcyBpcyBhIGtleQ== ) ( dGhpcyBpcyBhIHNpZw== )
]]></sourcecode>
</section>

<section anchor="the-dodigest-data-object-digest-resource-record"><name>The DODIGEST (Data Object Digest) Resource Record</name>
<t>The <tt>DODIGEST</tt> RR contains a cryptographic digest (hash) of the Data Object's content.</t>

<ul>
<li><t><strong>Mnemonic</strong>: DODIGEST</t>
</li>
<li><t><strong>Type Code</strong>: TBD4 (to be assigned by IANA)</t>
</li>
<li><t><strong>RDATA Format</strong>:</t>
</li>
</ul>

<sourcecode type="asciidoc"><![CDATA[  +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
  |   Algorithm (8 bits)  |                     /
  +--+--+--+--+--+--+--+--+                     /
  /                     Digest                    /
  /                                               /
  +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
]]></sourcecode>

<ul>
<li>
<dl>
<dt>Algorithm</dt>
<dd><t>An 8-bit identifier for the digest algorithm. Initial values:</t>
</dd>
</dl>

<ul spacing="compact">
<li><tt>1</tt>: SHA-256</li>
<li><tt>2</tt>: SHA-384</li>
<li><tt>3</tt>: SHA-512</li>
</ul></li>
<li><t><strong>Digest</strong>: Variable-length binary data of the content digest.</t>
</li>
<li><t><strong>Presentation Format</strong>:
<tt>&lt;Algorithm&gt; &lt;Hex-encoded Digest&gt;</tt></t>
</li>
<li><t><strong>Example</strong>:</t>
</li>
</ul>

<sourcecode type="dns"><![CDATA[  data1.example.com.  DODIGEST  1 
  e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
]]></sourcecode>
</section>

<section anchor="the-docg-data-object-classification-and-grading-resource-record"><name>The DOCG (Data Object Classification and Grading) Resource Record</name>
<t>The <tt>DOCG</tt> RR specifies the classification and grade of the Data Object.</t>

<ul>
<li><t><strong>Mnemonic</strong>: DOCG</t>
</li>
<li><t><strong>Type Code</strong>: TBD5 (to be assigned by IANA)</t>
</li>
<li><t><strong>RDATA Format</strong>:</t>
</li>
</ul>

<sourcecode type="asciidoc"><![CDATA[  +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
  |            Class (16 bits)                  |
  +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
  |            Grade (16 bits)                  |
  +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
]]></sourcecode>

<ul>
<li><strong>Class</strong>: A 16-bit unsigned integer representing the data category.</li>
<li><t><strong>Grade</strong>: A 16-bit unsigned integer representing the data security level.</t>
</li>
<li><t><strong>Presentation Format</strong>:
<tt>&lt;Class&gt; &lt;Grade&gt;</tt></t>
</li>
<li><t><strong>Example</strong>:</t>
</li>
</ul>

<sourcecode type="dns"><![CDATA[  data1.example.com.  DOCG  2048 33792
]]></sourcecode>
</section>

<section anchor="the-doalgo-data-object-algorithm-governance-resource-record"><name>The DOALGO (Data Object Algorithm Governance) Resource Record</name>
<t>The <tt>DOALGO</tt> RR specifies the permitted algorithms for processing the Data Object.</t>

<ul>
<li><t><strong>Mnemonic</strong>: DOALGO</t>
</li>
<li><t><strong>Type Code</strong>: TBD6 (to be assigned by IANA)</t>
</li>
<li><t><strong>RDATA Format</strong>:</t>
</li>
</ul>

<sourcecode type="asciidoc"><![CDATA[  +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
  |        Algorithm Type (16 bits)             |
  +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
  |         Algorithm ID (16 bits)              |
  +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
]]></sourcecode>

<ul>
<li><strong>Algorithm Type</strong>: A 16-bit unsigned integer representing the algorithm category.</li>
<li><t><strong>Algorithm ID</strong>: A 16-bit unsigned integer representing the specific algorithm.</t>
</li>
<li><t><strong>Presentation Format</strong>:
<tt>&lt;Algorithm Type&gt; &lt;Algorithm ID&gt;</tt></t>
</li>
<li><t><strong>Example</strong>:</t>
</li>
</ul>

<sourcecode type="dns"><![CDATA[  data1.example.com.  DOALGO  1024 4097
]]></sourcecode>
</section>
</section>

<section anchor="mechanism"><name>Mechanism</name>

<section anchor="declaration-trigger-scenarios"><name>Declaration Trigger Scenarios</name>
<t>In the entire process of data interoperability, when involving core operations such as data object attribute registration, access authorization, and content query, the declaration of corresponding DNS resource records must be triggered. The specific scenarios are as follows:</t>
<t>   <strong>Data object initialization phase:</strong>  When the data owner completes identity registration for the data object, they must simultaneously declare DLR, DOPK records, and DODIGEST, and optionally provide DOAUTH, DOCG, and DOALOG information to clarify the data storage address and identity authentication credentials, ensuring that the data object can be located and identified.</t>
<t>    <strong>Authorization relationship change phase:</strong> When the data owner grants or revokes data usage rights and ownership to users, the DOAUTH record must be declared to record key information such as authorization type and principal DOI, ensuring that the authorization relationship is traceable and verifiable.</t>
<t>    <strong>Data content update phase:</strong> After the data object content is modified, the DODIGEST record must be re-declared to update the content digest information, ensuring that the data integrity can be verified through the digest during subsequent queries and avoiding the use of tampered data.</t>
<t>   <strong>Security policy configuration phase:</strong> When the data classification and grading are adjusted (e.g., from &quot;general data&quot; to &quot;important data&quot;) or the allowed algorithms are changed, the DOCG and DOALGO records must be declared respectively to clarify the data security level and algorithm usage scope, supporting compliance detection and access control.</t>
</section>

<section anchor="declaration-effectiveness-mechanism"><name>Declaration Effectiveness Mechanism</name>
<t>The declaration operation takes effect through a four-step process of &quot;submission - verification - storage - synchronization&quot; to ensure that the records are authentic, usable, and trusted throughout the entire process. The specific mechanism is as follows:</t>
<t>    <strong>Declaration submission:</strong> The data owner or authorized principal submits a record declaration request to the data identification system through the data interoperability client in accordance with the format requirements of the corresponding RR type. The request must include the principal's private key signature for identity verification.</t>
<t>   <strong>Legality verification:</strong>  After receiving the request, the data identification system first verifies the validity of the submitter's signature through the DOPK record to confirm the identity is legal; then checks the record format (e.g., whether DLR conforms to URI specifications, whether the category/level values of DOCG are within predefined ranges) to ensure the record content is compliant.</t>
<t>    <strong>Trusted storage:</strong> After successful verification, the identification system stores the record in the DNS zone and automatically associates it with the data object's DOI (unique identifier) to form a &quot;DOI - resource record&quot; mapping relationship; at the same time, it triggers the DNSSEC signature process to add a digital signature to the record, ensuring that integrity can be verified during subsequent queries.</t>
<t>    <strong>Synchronized across the entire network</strong>The identification system synchronizes the newly declared records to associated DNS server nodes in accordance with the DNS protocol's zone transfer mechanism, ensuring that data users can obtain the latest and consistent record information when querying in different network environments, avoiding interoperability failures due to unsynchronized records.</t>
</section>

<section anchor="record-usage-constraints"><name>Record Usage Constraints</name>
<t>In the use of record query, invocation, etc., the following constraint rules must be followed to ensure data security and operational compliance:</t>
<t>   <strong>Query permission constraints:</strong> Only principals that have passed identity authentication and obtained authorization (such as data users registered in the DOAUTH record) can query sensitive records such as DOAUTH and DODIGEST; when unauthorized principals query, the data identification system will return a &quot;insufficient permission&quot; error to avoid leakage of sensitive information.</t>
<t>    <strong>Timeliness constraints:</strong> Records such as DODIGEST and DOCG must be consistent with the actual state of the data object. When the data content or security level changes, the principal must update the records within 24 hours; records that are not updated beyond the time limit will be marked as &quot;record to be verified&quot; in the query response, reminding users to verify the current state of the data.</t>
<t>    <strong>Associated usage constraints:</strong> Before querying data content, the storage address must be obtained through the DLR record, and then the content integrity must be verified through the DODIGEST record. The two must be used together; if the address pointed to by DLR is inaccessible or the digest verification fails, the data access operation must be terminated to prevent obtaining invalid or tampered data.</t>
<t>    <strong>Compliance adaptation constraints:</strong> The algorithms declared in the DOALGO record must be adapted to the data classification and grading (DOCG). For example, &quot;core data&quot; only allows the use of encryption algorithms that meet national secret standards; if the algorithm does not match the level, the data exchange service will determine it as &quot;non-compliant&quot; during compliance detection and block the data exchange process.</t>
</section>
</section>

<section anchor="security-considerations"><name>Security Considerations</name>
<t>The DNS resource records defined in this document contain sensitive information, including public keys, authorization policies, and data locators. The integrity and authenticity of these records are critical for the security of the Data Interoperability Protocol.</t>
<t>It is therefore <bcp14>REQUIRED</bcp14> that zones containing these RR types be protected using DNSSEC (<xref target="RFC4033"></xref>;<xref target="RFC4034"></xref>;<xref target="RFC4035"></xref>). Clients querying for these records <bcp14>MUST</bcp14> perform DNSSEC validation to ensure that the responses have not been tampered with.</t>
<t>The publication of authorization information (<tt>DOAUTH</tt>) in the public DNS may have privacy implications, as it reveals relationships between data owners and users. Implementers and zone administrators should be aware of these implications and use these records in accordance with applicable privacy policies and regulations.</t>
<t>The <tt>DOPK</tt> record publishes a public key. The security of the corresponding private key is the responsibility of the Data Object's owner and is outside the scope of this document. Compromise of a private key will allow an attacker to impersonate the Data Object.</t>
</section>

<section anchor="iana-considerations"><name>IANA Considerations</name>
<t>This document requests IANA to take the following actions:</t>

<ol spacing="compact">
<li>Assign RR type codes for <tt>DLR</tt>, <tt>DOPK</tt>, <tt>DOAUTH</tt>, <tt>DODIGEST</tt>, <tt>DOCG</tt>, and <tt>DOALGO</tt> from the &quot;Resource Record (RR) TYPEs&quot; registry.</li>
</ol>
<t>| Record   | Value | Meaning                          |
   | -------- | ----- | -------------------------------- |
   | DLR      | TBD1  | Data Object Locator              |
   | DOPK     | TBD2  | Data Object Public Key           |
   | DOAUTH   | TBD3  | Data Object Authorization        |
   | DODIGEST | TBD4  | Data Object Digest               |
   | DOCG     | TBD5  | Data Object Class &amp; Grade        |
   | DOALGO   | TBD6  | Data Object Algorithm Governance |</t>

<ol spacing="compact" start="2">
<li>Create a new registry named &quot;DOPK and DODIGEST Algorithm Identifiers&quot;. This registry will manage algorithm identifiers for the <tt>DOPK</tt> and <tt>DODIGEST</tt> RRs. Initial registrations are provided in Sections 3 and 5 of this document. The policy for this registry <bcp14>SHOULD</bcp14> be &quot;Specification Required&quot; <xref target="RFC8126"></xref>.</li>
</ol>
</section>

</middle>

<back>
<references><name>Normative References</name>
<xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.1035.xml"/>
<xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml"/>
<xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4033.xml"/>
<xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4034.xml"/>
<xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4035.xml"/>
<xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8126.xml"/>
<xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml"/>
</references>

<section anchor="acknowledgements" numbered="false"><name>Acknowledgements</name>
<t>The authors would like to thank the World Internet Conference (WIC) for providing valuable platforms for technical exchange and discussion, which contributed to the refinement of ideas in this document.</t>
</section>

</back>

</rfc>
