<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.6 (Ruby 3.2.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc docmapping="yes"?>

<rfc ipr="trust200902" docName="draft-hardaker-dnsop-rfc8624-bis-02" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="title">DNSSEC Cryptographic Algorithms</title>

    <author initials="W." surname="Hardaker" fullname="Wes Hardaker">
      <organization>USC/ISI</organization>
      <address>
        <email>ietf@hardakers.net</email>
      </address>
    </author>
    <author initials="W." surname="Kumari" fullname="Warren Kumari">
      <organization>Google</organization>
      <address>
        <email>warren@kumari.net</email>
      </address>
    </author>

    <date year="2024" month="February" day="27"/>

    
    
    

    <abstract>


<?line 54?>

<t>[EDITOR NOTE: This document does not change the status (MUST, MAY,
   RECOMMENDED, etc) of any of the algorithms listed in <xref target="RFC8624"></xref>; that is
   the work of future documents.  Instead, this document moves
   the canonical list of algorithms from <xref target="RFC8624"></xref> to an IANA registry.
   This is done for two reasons: 1) to allow the list to be updated more
   easily, and, much more importantly, 2) to allow the list to be more
   easily referenced.]</t>

<t>The DNSSEC protocol makes use of various cryptographic algorithms to provide
   authentication of DNS data and proof of non-existence.  To ensure
   interoperability between DNS resolvers and DNS authoritative servers, it is
   necessary to specify both a set of algorithm implementation requirements and
   usage guidelines to ensure that there is at least one algorithm that all
   implementations support.  This document updates <xref target="RFC8624"></xref> by moving the
   canonical source of algorithm implementation requirements and usage guidance
   for DNSSEC from <xref target="RFC8624"></xref> to an IANA registry.  Future extensions
   to this registry can be made under new, incremental update RFCs.</t>



    </abstract>



  </front>

  <middle>


<?line 74?>

<section anchor="introduction"><name>Introduction</name>

<t>DNS Security Extensions (DNSSEC) <xref target="RFC4034"></xref> is used to provide
   authentication of DNS data.  The DNSSEC signing algorithms are
   defined by various RFCs, including <xref target="RFC4034"></xref>, <xref target="RFC5155"></xref>, <xref target="RFC5702"></xref>,
   <xref target="RFC5933"></xref>, <xref target="RFC6605"></xref>, <xref target="RFC8080"></xref>.  To ensure interoperability, a set
   of "mandatory-to-implement" DNSKEY algorithms are defined in
   <xref target="RFC8624"></xref>.  To make the current status of the algorithms
   more easily accessible and understandable, this document moves the
   canonical status of the algorithms from <xref target="RFC8624"></xref> to the IANA DNSSEC
   algorithm registries.  [ Editor: This is similar to the process used
   for the <xref target="TLS-ciphersuites"></xref> registry, where the canonical list of
   ciphersuites is in the IANA registry, and the RFCs reference the IANA
   registry. ]</t>

<t>This document simply moves the canonical list of algorithms from
   <xref target="RFC8624"></xref> to the IANA registry, and defines the registry policies
   for updating the registry. It does not change the status of any of
   the algorithms listed in <xref target="RFC8624"></xref>; this is left to future
   documents.</t>

<section anchor="document-audience"><name>Document Audience</name>

<t>The recommendations of this document mostly target DNSSEC
   implementers, as implementations need to meet both high security
   expectations as well as high interoperability between various vendors
   and with different versions.  Interoperability requires a smooth
   transition to more secure algorithms.  This perspective may differ
   from that of a user who wishes to deploy and configure DNSSEC
   with only the safest algorithm.  On the other hand, the comments and
   recommendations in this document are also expected to be useful for
   such users.</t>

</section>
<section anchor="updating-algorithm-implementation-requirements-and-usage-guidance"><name>Updating Algorithm Implementation Requirements and Usage Guidance</name>

<t>The field of cryptography evolves continuously.  New, stronger
   algorithms appear, and existing algorithms may be found to be less
   secure then originally thought.  Therefore, algorithm
   implementation requirements and usage guidance need to be updated
   from time to time in order to reflect the new reality.
   Cryptographic algorithm choices implemented in and required by
   software must be conservative to minimize the risk of algorithm
   compromise.</t>

</section>
<section anchor="updating-algorithm-requirement-levels"><name>Updating Algorithm Requirement Levels</name>

<t>By the time a DNSSEC cryptographic algorithm is made mandatory-to-implement,
   it should already be available in most implementations. This document
   attempts to identify and introduce those algorithms for future
   mandatory-to-implement status.  There is no guarantee that algorithms in use
   today will become mandatory to implement in the future.  Published
   algorithms are continuously subjected to cryptographic attack and may become
   too weak, or even be completely broken, before this document is updated.</t>

<t>It is expected that the deprecation of an algorithm will be performed
   gradually.  This provides time for implementations to update
   their implemented algorithms while remaining interoperable.  Unless
   there are strong security reasons, an algorithm is expected to be
   downgraded from MUST to NOT RECOMMENDED or MAY, instead of directly
   from MUST to MUST NOT.  Similarly, an algorithm that has not been
   mentioned as mandatory-to-implement is expected to be first introduced
   as RECOMMENDED instead of a MUST.</t>

<t>Since the effect of using an unknown DNSKEY algorithm is that the
   zone is treated as insecure, it is recommended that algorithms
   downgraded to NOT RECOMMENDED or lower not be used by authoritative
   nameservers and DNSSEC signers to create new DNSKEY's.  This will
   allow for deprecated algorithms to become used less and less over
   time.  Once an algorithm has reached a sufficiently low level of
   deployment, it can be marked as MUST NOT, so that recursive resolvers
   can remove support for validating it.</t>

<t>Validating recursive resolvers are encouraged to retain support for all
   algorithms not marked as MUST NOT.</t>

</section>
<section anchor="requirements-notation"><name>Requirements notation</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY",
   and "OPTIONAL" in this document are to be interpreted as described
   in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear
   in all capitals, as shown here.</t>

<t><xref target="RFC2119"></xref> considers the term SHOULD equivalent to RECOMMENDED, and
   SHOULD NOT equivalent to NOT RECOMMENDED.  The authors of this
   document have chosen to use the terms RECOMMENDED and NOT
   RECOMMENDED, as this more clearly expresses the recommendations to
   implementers.</t>

</section>
</section>
<section anchor="adding-recommended-columns-to-existing-iana-tables"><name>Adding "Recommended" Columns to existing IANA tables</name>

<t>Per this document, the following "Recommended" columns have been
   added to the following DNSSEC algorithm tables registered with
   IANA:</t>

<texttable>
      <ttcol align='left'>Table</ttcol>
      <ttcol align='left'>Column added</ttcol>
      <c>Domain Security Algorithm Numbers</c>
      <c>Recommended for DNSSSEC Signing</c>
      <c>Domain sSecurity Algorithm Numbers</c>
      <c>Recommended for DNSSSEC Validation</c>
      <c>Digest Algorithms</c>
      <c>&#160;</c>
</texttable>

<t>Adding a new entry to the "DNS System Algorithm Numbers" registry
   with a recommended value of MAY in both the "Recommended for
   DNSSSEC Signing" and "Recommended for DNSSSEC Validation" columns
   requires RFC publication.  Adding a new entry to, or changing
   existing values in the "DNS System Algorithm Numbers" registry with
   a value in the "Recommended for DNSSSEC Signing" or "Recommended
   for DNSSSEC Validation" columns other than MAY requires a Standards
   Action.</t>

<t>Adding a new entry to the "Digest Algorithms" registry with a
   recommended value of MAY in the "Recommended" column requires RFC
   publication.  Adding a new entry to the "Digest Algorithms"
   registry with a value in the "Recommended" column other than MAY
   requires a Standards Action.</t>

<t>If an item is not marked as "RECOMMENDED", it does not necessarily
   mean that it is flawed; rather, it indicates that the item either
   has not been through the IETF consensus process, has limited
   applicability, or is intended only for specific use cases.</t>

<t>The following sections state the initial values to be populated
   into these rows, with values transcribed from <xref target="RFC8624"></xref>.</t>

</section>
<section anchor="dns-system-algorithm-numbers-column-values"><name>DNS System Algorithm Numbers Column Values</name>

<t>Initial recommendation columns of implementation recommendations
   for the "Domain Name System Security (DNSSEC) Algorithm Numbers"
   are show in Table 1.</t>

<texttable>
      <ttcol align='left'>&#160;</ttcol>
      <ttcol align='left'>&#160;</ttcol>
      <ttcol align='left'>Recommended for</ttcol>
      <ttcol align='left'>Recommended for</ttcol>
      <c>Number</c>
      <c>Mnemonics</c>
      <c>DNSSEC Signing</c>
      <c>DNSSEC Validation</c>
      <c>1</c>
      <c>RSAMD5</c>
      <c>MUST NOT</c>
      <c>MUST NOT</c>
      <c>3</c>
      <c>DSA</c>
      <c>MUST NOT</c>
      <c>MUST NOT</c>
      <c>5</c>
      <c>RSASHA1</c>
      <c>MUST NOT</c>
      <c>SHOULD NOT</c>
      <c>6</c>
      <c>DSA-NSEC3-SHA1</c>
      <c>MUST NOT</c>
      <c>MUST NOT</c>
      <c>7</c>
      <c>RSASHA1-NSEC3-SHA1</c>
      <c>MUST NOT</c>
      <c>SHOULD NOT</c>
      <c>8</c>
      <c>RSASHA256</c>
      <c>MUST</c>
      <c>MUST</c>
      <c>10</c>
      <c>RSASHA512</c>
      <c>NOT</c>
      <c>MUST</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>RECOMMENDED</c>
      <c>&#160;</c>
      <c>12</c>
      <c>ECC-GOST</c>
      <c>MUST NOT</c>
      <c>MUST NOT</c>
      <c>13</c>
      <c>ECDSAP256SHA256</c>
      <c>MUST</c>
      <c>MUST</c>
      <c>14</c>
      <c>ECDSAP384SHA384</c>
      <c>MAY</c>
      <c>RECOMMENDED</c>
      <c>15</c>
      <c>ED25519</c>
      <c>RECOMMENDED</c>
      <c>RECOMMENDED</c>
      <c>16</c>
      <c>ED448</c>
      <c>MAY</c>
      <c>RECOMMENDED</c>
</texttable>

<figure><artwork><![CDATA[
                                Table 1
]]></artwork></figure>

</section>
<section anchor="dnssec-delegation-signer-ds-resource-record-rr-type-digest-algorithms-column-values"><name>DNSSEC Delegation Signer (DS) Resource Record (RR) Type Digest Algorithms Column Values</name>

<t>Initial recommendation columns of implementation recommendations
   for the "DNSSEC Delegation Signer (DS) Resource Record (RR) Type
   Digest Algorithms" registry are shown in Table 2.</t>

<texttable>
      <ttcol align='left'>Number</ttcol>
      <ttcol align='left'>Mnemonics</ttcol>
      <ttcol align='left'>DNSSEC Delegation</ttcol>
      <ttcol align='left'>DNSSEC Validation</ttcol>
      <c>0</c>
      <c>NULL (CDS only)</c>
      <c>MUST NOT [*]</c>
      <c>MUST NOT [*]</c>
      <c>1</c>
      <c>SHA-1</c>
      <c>MUST NOT</c>
      <c>MUST</c>
      <c>2</c>
      <c>SHA-256</c>
      <c>MUST</c>
      <c>MUST</c>
      <c>3</c>
      <c>GOST R 34.11-94</c>
      <c>MUST NOT</c>
      <c>MAY</c>
      <c>4</c>
      <c>SHA-384</c>
      <c>MAY</c>
      <c>RECOMMENDED</c>
</texttable>

<figure><artwork><![CDATA[
                                Table 2
]]></artwork></figure>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>The security of cryptographic systems depends on both the strength of
   the cryptographic algorithms chosen and the strength of the keys used
   with those algorithms.  The security also depends on the engineering
   of the protocol used by the system to ensure that there are no non-
   cryptographic ways to bypass the security of the overall system.</t>

<t>This document concerns itself with the selection of cryptographic
   algorithms for the use of DNSSEC, specifically with the selection of
   "mandatory-to-implement" algorithms.  The algorithms identified in
   this document as MUST or RECOMMENDED to implement are not known to be
   broken at the current time, and cryptographic research so far leads
   us to believe that they are likely to remain secure into the
   foreseeable future.  However, this isn't necessarily forever, and it
   is expected that new revisions of this document will be issued from
   time to time to reflect the current best practices in this area.</t>

<t>Retiring an algorithm too soon would result in a zone signed with the
   retired algorithm being downgraded to the equivalent of an unsigned
   zone.  Therefore, algorithm deprecation must be done very slowly and
   only after careful consideration and measurement of its use.</t>

</section>
<section anchor="operational-considerations"><name>Operational Considerations</name>

<t>DNSKEY algorithm rollover in a live zone is a complex process.  See
   <xref target="RFC6781"></xref> and <xref target="RFC7583"></xref> for guidelines on how to perform algorithm
   rollovers.</t>

<t>DS algorithm rollover in a live zone is also a complex process.
   Upgrading algorithm at the same time as rolling the new KSK key will
   lead to DNSSEC validation failures, and users MUST upgrade the DS
   algorithm first before rolling the Key Signing Key.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>The IANA is requested to update the <xref target="DNSKEY-IANA"></xref> and <xref target="DS-IANA"></xref> registries
  as follows:</t>

<t><list style="symbols">
  <t>Add "Recommended for DNSSSEC Signing" and "Recommended for DNSSSEC
Validation" columns to the "DNS Security Algorithm Numbers"
registry (<xref target="DNSKEY-IANA"></xref>) and populate these columens with the
values from Table 1.</t>
  <t>Add a "Recommended" column to the "Digest Algorithms" registry
(<xref target="DS-IANA"></xref>) and populate this column with the values from Table 2.</t>
  <t>Update the registration policy for the <xref target="DNSKEY-IANA"></xref> registry to
match the text describing update requirements above.  <vspace blankLines='1'/>
{Ed: We're not sure if this is the right policy, and this requires
a good discussion with the WG. The purpose of much of this
document is so that we can introduce TheNextBestAlgorithm by
documenting TheNextBestAlgorithm in a new RFC and having it
updating the IANA registry, instead of having to update
RFC8624-bis-bis-bis-bis. We also, obviously, don't want someone to
do something silly and mark an algorithm as "Recommended" without
a good reason. This implies Standards Track. On the other hand we
want to allow the ISE to add new algorithms (like the latest GOST
algorithm), and, rightly or wrongly, the ISE doesn't publishes Std
Track RFCs. Standards Action or IESG Approval seems like a
reasonable compromise, but I'm not sure if it's the right one. We
hope to present this to the WG at IEFT119 and get feedback.}</t>
</list></t>

</section>
<section anchor="acknowledgments"><name>Acknowledgments</name>

<t>This document is based on, and extends, RFC 8624, which was authored by
  Paul Wouters, and Ondrej Sury.</t>

</section>


  </middle>

  <back>


    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>

<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>

<reference anchor="RFC8624">
  <front>
    <title>Algorithm Implementation Requirements and Usage Guidance for DNSSEC</title>
    <author fullname="P. Wouters" initials="P." surname="Wouters"/>
    <author fullname="O. Sury" initials="O." surname="Sury"/>
    <date month="June" year="2019"/>
    <abstract>
      <t>The DNSSEC protocol makes use of various cryptographic algorithms in order to provide authentication of DNS data and proof of nonexistence. To ensure interoperability between DNS resolvers and DNS authoritative servers, it is necessary to specify a set of algorithm implementation requirements and usage guidelines to ensure that there is at least one algorithm that all implementations support. This document defines the current algorithm implementation requirements and usage guidance for DNSSEC. This document obsoletes RFC 6944.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8624"/>
  <seriesInfo name="DOI" value="10.17487/RFC8624"/>
</reference>


<reference anchor="DNSKEY-IANA" target="https://www.iana.org/assignments/dns-sec-alg-numbers/dns-sec-alg-numbers.xhtml">
  <front>
    <title>Domain Name System Security (DNSSEC) Algorithm Numbers</title>
    <author initials="" surname="IANA" fullname="IANA">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="DS-IANA" target="http://www.iana.org/assignments/ds-rr-types">
  <front>
    <title>Delegation Signer (DS) Resource Record (RR) Type Digest Algorithms</title>
    <author initials="" surname="IANA" fullname="IANA">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>


    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC4034">
  <front>
    <title>Resource Records for the DNS Security Extensions</title>
    <author fullname="R. Arends" initials="R." surname="Arends"/>
    <author fullname="R. Austein" initials="R." surname="Austein"/>
    <author fullname="M. Larson" initials="M." surname="Larson"/>
    <author fullname="D. Massey" initials="D." surname="Massey"/>
    <author fullname="S. Rose" initials="S." surname="Rose"/>
    <date month="March" year="2005"/>
    <abstract>
      <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of resource records and protocol modifications that provide source authentication for the DNS. This document defines the public key (DNSKEY), delegation signer (DS), resource record digital signature (RRSIG), and authenticated denial of existence (NSEC) resource records. The purpose and format of each resource record is described in detail, and an example of each resource record is given.</t>
      <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4034"/>
  <seriesInfo name="DOI" value="10.17487/RFC4034"/>
</reference>

<reference anchor="RFC5155">
  <front>
    <title>DNS Security (DNSSEC) Hashed Authenticated Denial of Existence</title>
    <author fullname="B. Laurie" initials="B." surname="Laurie"/>
    <author fullname="G. Sisson" initials="G." surname="Sisson"/>
    <author fullname="R. Arends" initials="R." surname="Arends"/>
    <author fullname="D. Blacka" initials="D." surname="Blacka"/>
    <date month="March" year="2008"/>
    <abstract>
      <t>The Domain Name System Security (DNSSEC) Extensions introduced the NSEC resource record (RR) for authenticated denial of existence. This document introduces an alternative resource record, NSEC3, which similarly provides authenticated denial of existence. However, it also provides measures against zone enumeration and permits gradual expansion of delegation-centric zones. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5155"/>
  <seriesInfo name="DOI" value="10.17487/RFC5155"/>
</reference>

<reference anchor="RFC5702">
  <front>
    <title>Use of SHA-2 Algorithms with RSA in DNSKEY and RRSIG Resource Records for DNSSEC</title>
    <author fullname="J. Jansen" initials="J." surname="Jansen"/>
    <date month="October" year="2009"/>
    <abstract>
      <t>This document describes how to produce RSA/SHA-256 and RSA/SHA-512 DNSKEY and RRSIG resource records for use in the Domain Name System Security Extensions (RFC 4033, RFC 4034, and RFC 4035). [STANDARDS TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5702"/>
  <seriesInfo name="DOI" value="10.17487/RFC5702"/>
</reference>

<reference anchor="RFC5933">
  <front>
    <title>Use of GOST Signature Algorithms in DNSKEY and RRSIG Resource Records for DNSSEC</title>
    <author fullname="V. Dolmatov" initials="V." role="editor" surname="Dolmatov"/>
    <author fullname="A. Chuprina" initials="A." surname="Chuprina"/>
    <author fullname="I. Ustinov" initials="I." surname="Ustinov"/>
    <date month="July" year="2010"/>
    <abstract>
      <t>This document describes how to produce digital signatures and hash functions using the GOST R 34.10-2001 and GOST R 34.11-94 algorithms for DNSKEY, RRSIG, and DS resource records, for use in the Domain Name System Security Extensions (DNSSEC). [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5933"/>
  <seriesInfo name="DOI" value="10.17487/RFC5933"/>
</reference>

<reference anchor="RFC6605">
  <front>
    <title>Elliptic Curve Digital Signature Algorithm (DSA) for DNSSEC</title>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <author fullname="W.C.A. Wijngaards" initials="W.C.A." surname="Wijngaards"/>
    <date month="April" year="2012"/>
    <abstract>
      <t>This document describes how to specify Elliptic Curve Digital Signature Algorithm (DSA) keys and signatures in DNS Security (DNSSEC). It lists curves of different sizes and uses the SHA-2 family of hashes for signatures. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6605"/>
  <seriesInfo name="DOI" value="10.17487/RFC6605"/>
</reference>

<reference anchor="RFC6781">
  <front>
    <title>DNSSEC Operational Practices, Version 2</title>
    <author fullname="O. Kolkman" initials="O." surname="Kolkman"/>
    <author fullname="W. Mekking" initials="W." surname="Mekking"/>
    <author fullname="R. Gieben" initials="R." surname="Gieben"/>
    <date month="December" year="2012"/>
    <abstract>
      <t>This document describes a set of practices for operating the DNS with security extensions (DNSSEC). The target audience is zone administrators deploying DNSSEC.</t>
      <t>The document discusses operational aspects of using keys and signatures in the DNS. It discusses issues of key generation, key storage, signature generation, key rollover, and related policies.</t>
      <t>This document obsoletes RFC 4641, as it covers more operational ground and gives more up-to-date requirements with respect to key sizes and the DNSSEC operations.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6781"/>
  <seriesInfo name="DOI" value="10.17487/RFC6781"/>
</reference>

<reference anchor="RFC7583">
  <front>
    <title>DNSSEC Key Rollover Timing Considerations</title>
    <author fullname="S. Morris" initials="S." surname="Morris"/>
    <author fullname="J. Ihren" initials="J." surname="Ihren"/>
    <author fullname="J. Dickinson" initials="J." surname="Dickinson"/>
    <author fullname="W. Mekking" initials="W." surname="Mekking"/>
    <date month="October" year="2015"/>
    <abstract>
      <t>This document describes the issues surrounding the timing of events in the rolling of a key in a DNSSEC-secured zone. It presents timelines for the key rollover and explicitly identifies the relationships between the various parameters affecting the process.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7583"/>
  <seriesInfo name="DOI" value="10.17487/RFC7583"/>
</reference>

<reference anchor="RFC8080">
  <front>
    <title>Edwards-Curve Digital Security Algorithm (EdDSA) for DNSSEC</title>
    <author fullname="O. Sury" initials="O." surname="Sury"/>
    <author fullname="R. Edmonds" initials="R." surname="Edmonds"/>
    <date month="February" year="2017"/>
    <abstract>
      <t>This document describes how to specify Edwards-curve Digital Security Algorithm (EdDSA) keys and signatures in DNS Security (DNSSEC). It uses EdDSA with the choice of two curves: Ed25519 and Ed448.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8080"/>
  <seriesInfo name="DOI" value="10.17487/RFC8080"/>
</reference>


<reference anchor="TLS-ciphersuites" target="https://www.iana.org/assignments/tls-parameters/tls-parameters.xhtml#tls-parameters-4">
  <front>
    <title>Transport Layer Security (TLS) Parameters</title>
    <author initials="" surname="IANA" fullname="IANA">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>


    </references>


<?line 334?>

<section anchor="changelog"><name>ChangeLog</name>

<section anchor="changes-since-rfc8624"><name>Changes since RFC8624</name>

<t><list style="symbols">
  <t>The primary purpose of this revision is to introduce the new
columns to existing registries.  It makes no changes to the
previously defined values.</t>
  <t>Merged in RFC9157 updates.</t>
  <t>Set authors as Wes Hardaker, Warren Kumari.</t>
</list></t>

</section>
</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

