<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.8) -->
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-hardaker-dnsop-intentionally-temporary-insec-02" category="bcp" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="Intentionally Temporarily Degraded or Insecure">Intentionally Temporarily Degraded or Insecure</title>
    <seriesInfo name="Internet-Draft" value="draft-hardaker-dnsop-intentionally-temporary-insec-02"/>
    <author initials="W." surname="Hardaker" fullname="Wes Hardaker">
      <organization>Google</organization>
      <address>
        <email>ietf@hardakers.net</email>
      </address>
    </author>
    <date year="2026" month="January" day="05"/>
    <abstract>
      <?line 40?>

<t>Performing DNSKEY algorithm transitions with DNSSEC signing is
unfortunately challenging to get right in practice without decent
tooling support.  This document weighs the correct, completely secure
way of rolling keys against an alternate, significantly simplified,
method that takes a zone through an insecure state first.</t>
    </abstract>
  </front>
  <middle>
    <?line 48?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Performing DNSKEY <xref target="RFC4035"/> algorithm transitions with DNSSEC
<xref target="RFC4033"/> signing is unfortunately challenging to get right in
practice without decent tooling support.  This document weighs the
correct, completely secure way of rolling keys against an alternate,
significantly simplified, method that takes a zone through an insecure
state.</t>
      <t>Section 4.1.4 of <xref target="RFC6781"/> describes the necessary steps required
when a new signing key is published for a zone that uses a different
signing algorithm than the currently published keys.  These are the
steps that MUST be followed when zone owners wish to have
uninterrupted DNSSEC protection for their zones.  The steps in this
document are designed to ensure that all DNSKEY records and all DS
<xref target="RFC4509"/> records (and the rest of a zone records) are properly
validatable by validating resolvers throughout the entire process.
Whenever possible, this procedure SHOULD be followed.</t>
      <t>Unfortunately, there are a number of these steps that are challenging
to accomplish either because the timing is tricky to get right or
because current software doesn't support automating the process
easily.  Some examples:</t>
      <ol spacing="normal" type="1"><li>
          <t>The second step in Section 4.1.4 of <xref target="RFC6781"/> requires that a new
key with the new algorithm (which we refer to as K_new) be created,
but not yet published.  This step requires that both the old key
(K_old) and K_new both sign and generate signatures for the zone,
but without K_new actually being published in the zone even though
its signatures.  Put another way, only K_old can exist in the zone
even though signatures from both keys must be included.  After this
odd mix has been published for a sufficient time length, based on
the TTL, can K_new be safely introduced and published into the zone
as well.</t>
        </li>
        <li>
          <t>Sometimes one of the goals is to transfer zone management to new
authoritative server software. But, if the newly desired algorithm
isn't supported in the existing (to be replaced) DNSSEC signing
software, then the transfer to the new software must be
accomplished first.  However, if there isn't an overlap between the
algorithms available in both software sets, it becomes practically
impossible to even transfer the zone since neither software set can
use both K_old and K_new.</t>
        </li>
      </ol>
      <t>Although some DNSSEC signing solutions may automate the algorithm
rollover steps (making operator involvement unnecessary), many other
tools do not yet support automated algorithm updates.  In these
environments, the most challenging step is requiring that certain
RRSIGs be published without the corresponding DNSKEYs that created
them.  This will likely require operators to use a text editor on the
contents of a signed zone to carefully select zone records to extract
before publication.  This introduces potentially significant operator
error(s).</t>
      <t>This document proposes an alternate approach that MAY be used to
perform algorithm DNSKEY rollovers in these situations, which is
potentially more operationally robust but less secure.</t>
      <section anchor="requirements-notation">
        <name>Requirements notation</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY",
   and "OPTIONAL" in this document are to be interpreted as described
   in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear
   in all capitals, as shown here.</t>
      </section>
    </section>
    <section anchor="transitioning-temporarily-through-insecurity">
      <name>Transitioning temporarily through insecurity</name>
      <t>An alternate approach to properly rolling DNSKEYs to a new algorithm,
is to intentionally make the zone become insecure while the DNSKEYs
and algorithms are swapped.  At a high level, this means removing all
DS records from the parent zone first, then remove the old key and
introduce the new key with its new algorithm during this period.  Zone
TTLs can be significantly shortened during this period to minimize the
period of insecurity.</t>
      <t>Below are the enumerated steps required by this alternate transition
mechanism.  Note that there are still two critical waiting time
requirements (steps 2 and 6) that must be followed carefully.</t>
      <ol spacing="normal" type="1"><li>
          <t>Optional: lower the TTLs of both the zone's DS record, and the TTL
of the DNSKEY RRset.  Note that in some operational deployments the
parent zone may set the TTL of the DS record.</t>
        </li>
        <li>
          <t>Remove all DS records from the parent zone.</t>
        </li>
        <li>
          <t>Ensure the zone is considered unsigned by all validating resolvers
by waiting 2 times the maximum TTL length for the DS record, and/or
2 times the largest TTL found in the zone (whichever is larger).
This is the most critical timing as all records associated with
K_old must be cleared from validating resolver caches.  (The author
of this document failed to wait the required time once.  It was not
pretty.)</t>
        </li>
        <li>
          <t>Replace the old DNSKEY(s) using the old algorithm with new
DNSKEY(s) using the new algorithm(s) in the zone and publish the
zone.</t>
        </li>
        <li>
          <t>Wait 2 times the largest TTL found in the zone to ensure
the new DNSKEYs will be found by validating resolvers.</t>
        </li>
        <li>
          <t>Add the DS record(s) for the new DNSKEYs to the parent zone.</t>
        </li>
        <li>
          <t>If the TTLs were modified in the optional step 1, change them back
to their preferred values.</t>
        </li>
      </ol>
    </section>
    <section anchor="operational-considerations">
      <name>Operational considerations</name>
      <t>The process of replacing a DNSKEY with an older algorithm <xref target="RFC9904"/>,
such as RSAMD5 <xref target="RFC4034"/> or RSASHA1 <xref target="RFC9905"/> with a more modern
one <xref target="RFC9904"/> such as RSASHA512 <xref target="RFC5702"/> or ECDSAP256SHA256
<xref target="RFC6605"/> can be a daunting task if the zone's current tooling
doesn't provide an easy-to-use solution.  For example, this may be the
case for zone owners using command line tools integrated into their
zone production environment.</t>
      <t>This document describes an alternative approach to rolling DNSKEY
algorithms that may be significantly less prone to operational
mistakes.  However, it is paramount that operators understand of the
security considerations of using this approach.</t>
      <t>The document recommends waiting 2 times TTL values in certain cases
for added assurance that the waiting period is long enough for caches
to expire.  In reality, waiting slightly longer than 1 TTL may be
sufficient but requires accepting added risks with propagation timing
and clock synchronization.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security considerations</name>
      <t>DNSSEC provides data integrity protection for DNS data.  This document
specifically calls out a reason why a zone owner may desire to
deliberately turn off this protection while changing the zone's
DNSKEY's cryptographic algorithms.  Thus, this technique is
potentially harmful if an attacker knows when this will occur and can
use that time window to launch DNS modification attacks (for example,
cache poisoning attacks) against validating resolvers or other
validating DNS infrastructure.</t>
      <t>Most importantly, this will deliberately break certain types of DNS
records that must be validatable for them to be effective.  This
includes for example, but not limited to, all DS records for the
zone's own children, DANE <xref target="RFC6698"/><xref target="RFC7671"/><xref target="RFC7672"/>, PGP key
fingerprints <xref target="RFC7929"/>, and SSHFP<xref target="RFC4255"/> fingerprints.  Zone
owners must carefully consider which records within their zone and
their zone's children depend on DNSSEC being available before using
the procedure outlined in this document.</t>
      <t>Given all of this, it leaves the question of: "why would a zone owner
want to deliberately turn off security temporarily then?", to which
there is one principal answer: if the the complexity of executing an
algorithm role the correct way is difficult (or impossible), then the
chances of introducing an error that causes an operational outage may
be significantly higher than the chances of the zone being attacked
during the insecure transition period.  Simply put, an invalid zone
created by a botched algorithm roll is potentially worse than an
unsigned but still available zone.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC1035">
          <front>
            <title>Domain names - implementation and specification</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1035"/>
          <seriesInfo name="DOI" value="10.17487/RFC1035"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC4033">
          <front>
            <title>DNS Security Introduction and Requirements</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>The Domain Name System Security Extensions (DNSSEC) add data origin authentication and data integrity to the Domain Name System. This document introduces these extensions and describes their capabilities and limitations. This document also discusses the services that the DNS security extensions do and do not provide. Last, this document describes the interrelationships between the documents that collectively describe DNSSEC. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4033"/>
          <seriesInfo name="DOI" value="10.17487/RFC4033"/>
        </reference>
        <reference anchor="RFC4035">
          <front>
            <title>Protocol Modifications for the DNS Security Extensions</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of new resource records and protocol modifications that add data origin authentication and data integrity to the DNS. This document describes the DNSSEC protocol modifications. This document defines the concept of a signed zone, along with the requirements for serving and resolving by using DNSSEC. These techniques allow a security-aware resolver to authenticate both DNS resource records and authoritative DNS error indications.</t>
              <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4035"/>
          <seriesInfo name="DOI" value="10.17487/RFC4035"/>
        </reference>
        <reference anchor="RFC4509">
          <front>
            <title>Use of SHA-256 in DNSSEC Delegation Signer (DS) Resource Records (RRs)</title>
            <author fullname="W. Hardaker" initials="W." surname="Hardaker"/>
            <date month="May" year="2006"/>
            <abstract>
              <t>This document specifies how to use the SHA-256 digest type in DNS Delegation Signer (DS) Resource Records (RRs). DS records, when stored in a parent zone, point to DNSKEYs in a child zone. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4509"/>
          <seriesInfo name="DOI" value="10.17487/RFC4509"/>
        </reference>
        <reference anchor="RFC6781">
          <front>
            <title>DNSSEC Operational Practices, Version 2</title>
            <author fullname="O. Kolkman" initials="O." surname="Kolkman"/>
            <author fullname="W. Mekking" initials="W." surname="Mekking"/>
            <author fullname="R. Gieben" initials="R." surname="Gieben"/>
            <date month="December" year="2012"/>
            <abstract>
              <t>This document describes a set of practices for operating the DNS with security extensions (DNSSEC). The target audience is zone administrators deploying DNSSEC.</t>
              <t>The document discusses operational aspects of using keys and signatures in the DNS. It discusses issues of key generation, key storage, signature generation, key rollover, and related policies.</t>
              <t>This document obsoletes RFC 4641, as it covers more operational ground and gives more up-to-date requirements with respect to key sizes and the DNSSEC operations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6781"/>
          <seriesInfo name="DOI" value="10.17487/RFC6781"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC4034">
          <front>
            <title>Resource Records for the DNS Security Extensions</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of resource records and protocol modifications that provide source authentication for the DNS. This document defines the public key (DNSKEY), delegation signer (DS), resource record digital signature (RRSIG), and authenticated denial of existence (NSEC) resource records. The purpose and format of each resource record is described in detail, and an example of each resource record is given.</t>
              <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4034"/>
          <seriesInfo name="DOI" value="10.17487/RFC4034"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC7929">
          <front>
            <title>DNS-Based Authentication of Named Entities (DANE) Bindings for OpenPGP</title>
            <author fullname="P. Wouters" initials="P." surname="Wouters"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>OpenPGP is a message format for email (and file) encryption that lacks a standardized lookup mechanism to securely obtain OpenPGP public keys. DNS-Based Authentication of Named Entities (DANE) is a method for publishing public keys in DNS. This document specifies a DANE method for publishing and locating OpenPGP public keys in DNS for a specific email address using a new OPENPGPKEY DNS resource record. Security is provided via Secure DNS, however the OPENPGPKEY record is not a replacement for verification of authenticity via the "web of trust" or manual verification. The OPENPGPKEY record can be used to encrypt an email that would otherwise have to be sent unencrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7929"/>
          <seriesInfo name="DOI" value="10.17487/RFC7929"/>
        </reference>
        <reference anchor="RFC7671">
          <front>
            <title>The DNS-Based Authentication of Named Entities (DANE) Protocol: Updates and Operational Guidance</title>
            <author fullname="V. Dukhovni" initials="V." surname="Dukhovni"/>
            <author fullname="W. Hardaker" initials="W." surname="Hardaker"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>This document clarifies and updates the DNS-Based Authentication of Named Entities (DANE) TLSA specification (RFC 6698), based on subsequent implementation experience. It also contains guidance for implementers, operators, and protocol developers who want to use DANE records.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7671"/>
          <seriesInfo name="DOI" value="10.17487/RFC7671"/>
        </reference>
        <reference anchor="RFC7672">
          <front>
            <title>SMTP Security via Opportunistic DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS)</title>
            <author fullname="V. Dukhovni" initials="V." surname="Dukhovni"/>
            <author fullname="W. Hardaker" initials="W." surname="Hardaker"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>This memo describes a downgrade-resistant protocol for SMTP transport security between Message Transfer Agents (MTAs), based on the DNS-Based Authentication of Named Entities (DANE) TLSA DNS record. Adoption of this protocol enables an incremental transition of the Internet email backbone to one using encrypted and authenticated Transport Layer Security (TLS).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7672"/>
          <seriesInfo name="DOI" value="10.17487/RFC7672"/>
        </reference>
        <reference anchor="RFC6698">
          <front>
            <title>The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="J. Schlyter" initials="J." surname="Schlyter"/>
            <date month="August" year="2012"/>
            <abstract>
              <t>Encrypted communication on the Internet often uses Transport Layer Security (TLS), which depends on third parties to certify the keys used. This document improves on that situation by enabling the administrators of domain names to specify the keys used in that domain's TLS servers. This requires matching improvements in TLS client software, but no change in TLS server software. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6698"/>
          <seriesInfo name="DOI" value="10.17487/RFC6698"/>
        </reference>
        <reference anchor="RFC4255">
          <front>
            <title>Using DNS to Securely Publish Secure Shell (SSH) Key Fingerprints</title>
            <author fullname="J. Schlyter" initials="J." surname="Schlyter"/>
            <author fullname="W. Griffin" initials="W." surname="Griffin"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document describes a method of verifying Secure Shell (SSH) host keys using Domain Name System Security (DNSSEC). The document defines a new DNS resource record that contains a standard SSH key fingerprint. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4255"/>
          <seriesInfo name="DOI" value="10.17487/RFC4255"/>
        </reference>
        <reference anchor="RFC9904">
          <front>
            <title>DNSSEC Cryptographic Algorithm Recommendation Update Process</title>
            <author fullname="W. Hardaker" initials="W." surname="Hardaker"/>
            <author fullname="W. Kumari" initials="W." surname="Kumari"/>
            <date month="November" year="2025"/>
            <abstract>
              <t>The DNSSEC protocol makes use of various cryptographic algorithms to provide authentication of DNS data and proof of nonexistence. To ensure interoperability between DNS resolvers and DNS authoritative servers, it is necessary to specify both a set of algorithm implementation requirements and usage guidelines to ensure that there is at least one algorithm that all implementations support. This document replaces and obsoletes RFC 8624 and moves the canonical source of algorithm implementation requirements and usage guidance for DNSSEC from RFC 8624 to the IANA DNSSEC algorithm registries. This is done to allow the list of requirements to be more easily updated and referenced. Extensions to these registries can be made in future RFCs. This document also updates RFC 9157 and incorporates the revised IANA DNSSEC considerations from that RFC.</t>
              <t>This document does not change the recommendation status (MUST, MAY, RECOMMENDED, etc.) of the algorithms listed in RFC 8624; that is the work of future documents.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9904"/>
          <seriesInfo name="DOI" value="10.17487/RFC9904"/>
        </reference>
        <reference anchor="RFC9905">
          <front>
            <title>Deprecating the Use of SHA-1 in DNSSEC Signature Algorithms</title>
            <author fullname="W. Hardaker" initials="W." surname="Hardaker"/>
            <author fullname="W. Kumari" initials="W." surname="Kumari"/>
            <date month="November" year="2025"/>
            <abstract>
              <t>This document deprecates the use of the RSASHA1 and
RSASHA1-NSEC3-SHA1 algorithms for the creation of DNS Public Key
(DNSKEY) and Resource Record Signature (RRSIG) records.</t>
              <t>It updates RFCs 4034 and 5155 as it deprecates the use of these
algorithms.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9905"/>
          <seriesInfo name="DOI" value="10.17487/RFC9905"/>
        </reference>
        <reference anchor="RFC5702">
          <front>
            <title>Use of SHA-2 Algorithms with RSA in DNSKEY and RRSIG Resource Records for DNSSEC</title>
            <author fullname="J. Jansen" initials="J." surname="Jansen"/>
            <date month="October" year="2009"/>
            <abstract>
              <t>This document describes how to produce RSA/SHA-256 and RSA/SHA-512 DNSKEY and RRSIG resource records for use in the Domain Name System Security Extensions (RFC 4033, RFC 4034, and RFC 4035). [STANDARDS TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5702"/>
          <seriesInfo name="DOI" value="10.17487/RFC5702"/>
        </reference>
        <reference anchor="RFC6605">
          <front>
            <title>Elliptic Curve Digital Signature Algorithm (DSA) for DNSSEC</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="W.C.A. Wijngaards" initials="W.C.A." surname="Wijngaards"/>
            <date month="April" year="2012"/>
            <abstract>
              <t>This document describes how to specify Elliptic Curve Digital Signature Algorithm (DSA) keys and signatures in DNS Security (DNSSEC). It lists curves of different sizes and uses the SHA-2 family of hashes for signatures. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6605"/>
          <seriesInfo name="DOI" value="10.17487/RFC6605"/>
        </reference>
      </references>
    </references>
    <?line 208?>

<section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The author has discussed the pros and cons of this approach with
multiple people, including:</t>
      <ul spacing="normal">
        <li>
          <t>Vladimír Čunát</t>
        </li>
        <li>
          <t>Peter van Dijk</t>
        </li>
        <li>
          <t>Viktor Dukhovni</t>
        </li>
        <li>
          <t>Warren Kumari.</t>
        </li>
        <li>
          <t>Scott Rose</t>
        </li>
        <li>
          <t>Tuomo Soini</t>
        </li>
        <li>
          <t>Paul Wouters</t>
        </li>
      </ul>
    </section>
    <section anchor="github-version-of-this-document">
      <name>Github Version of this document</name>
      <t>While this document is under development, it can be viewed, tracked,
issued, pushed with PRs, ... here:</t>
      <t>https://github.com/hardaker/draft-hardaker-dnsop-intentionally-temporarily-insecure</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
