<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 2.6.8) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-ietf-dnsop-dnssec-bcp-04" category="bcp" consensus="true" submissionType="IETF" tocDepth="4" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="DNSSEC">DNS Security Extensions (DNSSEC)</title>

    <author initials="P." surname="Hoffman" fullname="Paul Hoffman">
      <organization>ICANN</organization>
      <address>
        <email>paul.hoffman@icann.org</email>
      </address>
    </author>

    <date year="2022" month="October" day="05"/>

    
    
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document describes the DNS security extensions (commonly called "DNSSEC") that are
specified RFCs 4033, 4034, 4035, and a handful of others. One purpose is to introduce
all of the RFCs in one place so that the reader can understand the many aspects of DNSSEC.
This document does not update any of those RFCs.
Another purpose is to move DNSSEC to Best Current Practice status.</t>

<t>This document is currently maintained at https://github.com/paulehoffman/draft-hoffman-dnssec.
Issues and pull requests are welcomed.</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>The core specification for what we know as DNSSEC (the combination of <xref target="RFC4033"/>,
<xref target="RFC4034"/>, and <xref target="RFC4035"/>) describes a set of protocols that provide origin
authentication to data in the DNS. <xref target="RFC6840"/> updates and extends those core RFCs,
but does not fundamentally change the way that DNSSEC works.</t>

<t>This document lists many (but not all) of the RFCs that should be considered by someone
creating an implementation of, or someone deploying, modern DNSSEC.
It uses terminology from those documents without defining that terminology.
It also points to the relevant IANA registry groups that relate to DNSSEC.
It does not, however, point to standards that rely on zones needing to be signed by DNSSEC
such as DANE <xref target="RFC6698"/>.</t>

<section anchor="dnssec-as-a-best-current-practice"><name>DNSSEC as a Best Current Practice</name>

<t>The DNSSEC set of protocols is the best current practice for adding
origin authentication of data in the DNS. To date, no standards-track RFCs offer any other
method for such origin authentication of data in the DNS.</t>

<t>More than 15 years after the DNSSEC specification was published,
it is still not widely deployed. Recent estimates are that fewer than 10% of the domain names
used for web sites are signed, and only around a third of queries to recursive resolvers
are validated. However, this low level of implementation does not affect whether DNSSEC
is a best current practice; it just indicates that the value of deploying DNSSEC is often
considered lower than the cost.
Nonetheless, the significant deployment of DNSSEC beneath some top-level domains (TLDs),
and the near-universal deployment of DNSSEC for the TLDs in the DNS root zone,
demonstrate that DNSSEC is suitable for implementation by both ordinary and highly sophisticated domain owners.</t>

</section>
<section anchor="implementing-dnssec"><name>Implementing DNSSEC</name>

<t>Developers of validating resolvers and authoritative servers,
as well as operators of validating resolvers and authoritative servers,
need to know the parts of the DNSSEC protocol that would affect them.
They should read the DNSSEC core documents, and probably at least be familiar
with the extensions.
Developers will probably need to be very familiar with the algorithm documents as well.</t>

<t>As a side note, some of the DNSSEC-related RFCs have significant errata, so reading the
RFCs should also include looking for the related errata.</t>

</section>
</section>
<section anchor="dnssec-core-documents"><name>DNSSEC Core Documents</name>

<t>What we today call "DNSSEC" is formally version 3 of the DNSSEC specification.
However, earlier versions of DNSSEC were thinly deployed and significantly less
visible than the current DNSSEC specification. Throughout this document, "DNSSEC"
means version 3 of the protocol initially defined in <xref target="RFC4033"/>, <xref target="RFC4034"/>, and <xref target="RFC4035"/>.</t>

<t>The three initial core documents generally cover different topics:</t>

<t><list style="symbols">
  <t><xref target="RFC4033"/> is an overview of DNSSEC, including how it might change the resolution of DNS queries.</t>
  <t><xref target="RFC4034"/> specifies the DNS resource records used in DNSSEC.
It obsoletes many RFCs for earlier versions of DNSSEC.</t>
  <t><xref target="RFC4035"/> covers the modifications to the DNS protocol incurred by DNSSEC.
These include signing zones, serving signed zones, resolving in light of
DNSSEC, and authenticating DNSSEC-signed data.</t>
</list></t>

<t>At the time this set of core documents was published, someone could create a DNSSEC
implementation of signing software, of an DNSSEC-aware authoritative server, and/or
a DNSSEC-aware recursive resolver from the three core documents, plus a few older
RFCs specifying the cryptography used. Those two older documents are:</t>

<t><list style="symbols">
  <t><xref target="RFC2536"/> defines how to use the DSA signature algorithm (although it refers to other
documents for the details).
DSA was thinly implemented and can safely be ignored by DNSSEC implementations.</t>
  <t><xref target="RFC3110"/> defines how to use the RSA signature algorithm (although refers to other
documents for the details).
RSA is still among the most popular signing algorithm for DNSSEC.</t>
</list></t>

<t>It is important to note that later RFCs update the core documents. As just one example,
<xref target="RFC9077"/> changes how TTL values are calculated in DNSSEC processing.</t>

<section anchor="addition-to-the-dnssec-core"><name>Addition to the DNSSEC Core</name>

<t>As with any major protocol, developers and operators discovered issues with the original
core documents over the years.
<xref target="RFC6840"/> is an omnibus update to the original core documents and thus itself has
become a core document.
In addition to covering new requirements from new DNSSEC RFCs, it describes many important
security and interoperability issues that arose during the deployment of the initial
specifications, particularly after the DNS root was signed in 2010.
It also lists some errors in the examples of the core specifications.</t>

<t><xref target="RFC6840"/> brings a few additions into the core of DNSSEC.
It makes NSEC3 <xref target="RFC5155"/> as much a part of DNSSEC as NSEC is.
It also makes the SHA-2 hash function defined in <xref target="RFC4509"/> and <xref target="RFC5702"/> part of the core.</t>

</section>
</section>
<section anchor="additional-cryptographic-algorithms-and-dnssec"><name>Additional Cryptographic Algorithms and DNSSEC</name>

<t>Cryptography improves over time, and new algorithms get adopted by various Internet protocols.
Two new  signing algorithms have been adopted by the DNSSEC community: ECDSA <xref target="RFC6605"/> and EdDSA <xref target="RFC8080"/>.
ECDSA and EdDSA have become very popular signing algorithms in recent years.
The GOST signing algorithm <xref target="RFC5933"/> was also adopted, but has seen very limited use, likely
because it is a national algorithm specific to a very small number of countries.
<!-- RFC 5933 is being updated (soon?) by draft-ietf-dnsop-rfc5933-bis --></t>

<t>Implementation developers who want to know which algorithms to implement in DNSSEC software
should refer to <xref target="RFC8624"/>.
Note that this specification is only about what algorithms should and should not be included
in implementations: it is not advice for which algorithms that zone operators should and
should not sign with, nor which algorithms recursive resolver operators should or should not
validate.</t>

</section>
<section anchor="extensions-to-dnssec"><name>Extensions to DNSSEC</name>

<t>The DNSSEC community has extended the DNSSEC core and the cryptographic algorithms both
in terms of describing good operational practices and in new protocols. Some of the
RFCs that describe these extensions include:</t>

<t><list style="symbols">
  <t><xref target="RFC5011"/> describes a method to help resolvers update their DNSSEC trust anchors in an
automated fashion. This method was used in 2018 to update the DNS root trust anchor.</t>
  <t><xref target="RFC6781"/> is a compendium of operational practices that may not be obvious from reading
just the core specifications.</t>
  <t><xref target="RFC7344"/> describes using the CDS and CDNSKEY resource records to help automate the maintenance
of DS records in the parents of signed zones.</t>
  <t><xref target="RFC8078"/> extends <xref target="RFC7344"/> by showing how to do initial setup of trusted relationships
between signed parent and child zones.</t>
  <t><xref target="RFC8198"/> describes how a validating resolver can emit fewer queries in signed zones that
use NSEC and NSEC3 for negative caching.</t>
  <t><xref target="RFC9077"/> updates <xref target="RFC8198"/> with respect to the time-to-live (TTL) fields in signed records.</t>
</list></t>

</section>
<section anchor="additional-documents-of-interest"><name>Additional Documents of Interest</name>

<t>The documents listed above constitute the core of DNSSEC, the additional cryptographic algorithms,
and the major extensions to DNSSEC.
This section lists some additional documents that someone interested in implementing or operating
DNSSEC might find of value.</t>

<!-- Adapted from https://gist.github.com/moonshiner/0746776f2351ae9c8e3edb3373ee39c6
with other input from the WG mailing list -->

<t><list style="symbols">
  <t><xref target="RFC4470"/> "describes how to construct DNSSEC NSEC resource records that cover a smaller range of
names than called for by <xref target="RFC4034"/>. By generating and signing these records on demand, authoritative name
servers can effectively stop the disclosure of zone contents otherwise made possible by walking the chain of NSEC records in a
signed zone.".</t>
  <t><xref target="RFC6975"/> "specifies a way for validating end-system resolvers to signal to a server which digital signature
and hash algorithms they support".</t>
  <t><xref target="RFC7129"/> "provides additional background commentary and some context for the NSEC and NSEC3
mechanisms used by DNSSEC to provide authenticated denial-of-existence responses".
This background is particularly important for understanding NSEC and NSEC3 usage.</t>
  <t><xref target="RFC7583"/> "describes the issues surrounding the timing of events in the rolling of a key in a DNSSEC-secured zone".</t>
  <t><xref target="RFC7646"/> "defines Negative Trust Anchors (NTAs), which can be used to mitigate DNSSEC validation failures by disabling
DNSSEC validation at specified domains".</t>
  <t><xref target="RFC7958"/> "describes the format and publication mechanisms IANA has used to distribute the DNSSEC trust anchors".</t>
  <t><xref target="RFC8027"/> "describes problems that a Validating DNS resolver, stub-resolver, or application might run into within
a non-compliant infrastructure".</t>
  <t><xref target="RFC8145"/> "specifies two different ways for validating resolvers to signal to a server which keys are
referenced in their chain of trust".</t>
  <t><xref target="RFC8499"/> is a list of terminology used when talking about the DNS; sections 10 and 11 cover DNSSEC.</t>
  <t><xref target="RFC8509"/> "specifies a mechanism that will allow an end user and third parties to determine the trusted key
state for the root key of the resolvers that handle that user's DNS queries".</t>
  <t><xref target="RFC8901"/> "presents deployment models that accommodate this scenario [when each DNS
provider independently signs zone data with their own keys] and describes these key-management requirements".</t>
  <t><xref target="RFC9276"/> "provides guidance on setting NSEC3 parameters based on recent operational
deployment experience".</t>
</list></t>

<t>There will certainly be other RFCs related to DNSSEC that are published after this one.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>IANA already has three registry groups that relate to DNSSEC:</t>

<t><list style="symbols">
  <t><eref target="https://www.iana.org/assignments/dns-sec-alg-numbers">DNSSEC algorithm numbers</eref></t>
  <t><eref target="https://www.iana.org/assignments/dnssec-nsec3-parameters">DNSSEC NSEC3 parameters</eref></t>
  <t><eref target="https://www.iana.org/assignments/ds-rr-types">DNSSEC DS RRtype digest algorithms</eref></t>
</list></t>

<t>The rules for the DNSSEC algorithm registry were set in the core RFCs and
updated by <xref target="RFC6014"/>, <xref target="RFC6725"/>, and <xref target="RFC9157"/>.</t>

<t>This document does not update or create any registry groups or registries.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>All of the security considerations from all of the RFCs referenced in this document
apply here.</t>

</section>


  </middle>

  <back>


    <references title='Normative References'>





<reference anchor='RFC3110' target='https://www.rfc-editor.org/info/rfc3110'>
<front>
<title>RSA/SHA-1 SIGs and RSA KEYs in the Domain Name System (DNS)</title>
<author fullname='D. Eastlake 3rd' initials='D.' surname='Eastlake 3rd'><organization/></author>
<date month='May' year='2001'/>
<abstract><t>This document describes how to produce RSA/SHA1 SIG resource records (RRs) in Section 3 and, so as to completely replace RFC 2537, describes how to produce RSA KEY RRs in Section 2.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3110'/>
<seriesInfo name='DOI' value='10.17487/RFC3110'/>
</reference>



<reference anchor='RFC4033' target='https://www.rfc-editor.org/info/rfc4033'>
<front>
<title>DNS Security Introduction and Requirements</title>
<author fullname='R. Arends' initials='R.' surname='Arends'><organization/></author>
<author fullname='R. Austein' initials='R.' surname='Austein'><organization/></author>
<author fullname='M. Larson' initials='M.' surname='Larson'><organization/></author>
<author fullname='D. Massey' initials='D.' surname='Massey'><organization/></author>
<author fullname='S. Rose' initials='S.' surname='Rose'><organization/></author>
<date month='March' year='2005'/>
<abstract><t>The Domain Name System Security Extensions (DNSSEC) add data origin authentication and data integrity to the Domain Name System.  This document introduces these extensions and describes their capabilities and limitations.  This document also discusses the services that the DNS security extensions do and do not provide.  Last, this document describes the interrelationships between the documents that collectively describe DNSSEC.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4033'/>
<seriesInfo name='DOI' value='10.17487/RFC4033'/>
</reference>



<reference anchor='RFC4034' target='https://www.rfc-editor.org/info/rfc4034'>
<front>
<title>Resource Records for the DNS Security Extensions</title>
<author fullname='R. Arends' initials='R.' surname='Arends'><organization/></author>
<author fullname='R. Austein' initials='R.' surname='Austein'><organization/></author>
<author fullname='M. Larson' initials='M.' surname='Larson'><organization/></author>
<author fullname='D. Massey' initials='D.' surname='Massey'><organization/></author>
<author fullname='S. Rose' initials='S.' surname='Rose'><organization/></author>
<date month='March' year='2005'/>
<abstract><t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC).  The DNS Security Extensions are a collection of resource records and protocol modifications that provide source authentication for the DNS.  This document defines the public key (DNSKEY), delegation signer (DS), resource record digital signature (RRSIG), and authenticated denial of existence (NSEC) resource records.  The purpose and format of each resource record is described in detail, and an example of each resource record is given. </t><t> This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4034'/>
<seriesInfo name='DOI' value='10.17487/RFC4034'/>
</reference>



<reference anchor='RFC4035' target='https://www.rfc-editor.org/info/rfc4035'>
<front>
<title>Protocol Modifications for the DNS Security Extensions</title>
<author fullname='R. Arends' initials='R.' surname='Arends'><organization/></author>
<author fullname='R. Austein' initials='R.' surname='Austein'><organization/></author>
<author fullname='M. Larson' initials='M.' surname='Larson'><organization/></author>
<author fullname='D. Massey' initials='D.' surname='Massey'><organization/></author>
<author fullname='S. Rose' initials='S.' surname='Rose'><organization/></author>
<date month='March' year='2005'/>
<abstract><t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC).  The DNS Security Extensions are a collection of new resource records and protocol modifications that add data origin authentication and data integrity to the DNS.  This document describes the DNSSEC protocol modifications.  This document defines the concept of a signed zone, along with the requirements for serving and resolving by using DNSSEC.  These techniques allow a security-aware resolver to authenticate both DNS resource records and authoritative DNS error indications. </t><t> This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4035'/>
<seriesInfo name='DOI' value='10.17487/RFC4035'/>
</reference>



<reference anchor='RFC4509' target='https://www.rfc-editor.org/info/rfc4509'>
<front>
<title>Use of SHA-256 in DNSSEC Delegation Signer (DS) Resource Records (RRs)</title>
<author fullname='W. Hardaker' initials='W.' surname='Hardaker'><organization/></author>
<date month='May' year='2006'/>
<abstract><t>This document specifies how to use the SHA-256 digest type in DNS Delegation Signer (DS) Resource Records (RRs).  DS records, when stored in a parent zone, point to DNSKEYs in a child zone.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4509'/>
<seriesInfo name='DOI' value='10.17487/RFC4509'/>
</reference>



<reference anchor='RFC5155' target='https://www.rfc-editor.org/info/rfc5155'>
<front>
<title>DNS Security (DNSSEC) Hashed Authenticated Denial of Existence</title>
<author fullname='B. Laurie' initials='B.' surname='Laurie'><organization/></author>
<author fullname='G. Sisson' initials='G.' surname='Sisson'><organization/></author>
<author fullname='R. Arends' initials='R.' surname='Arends'><organization/></author>
<author fullname='D. Blacka' initials='D.' surname='Blacka'><organization/></author>
<date month='March' year='2008'/>
<abstract><t>The Domain Name System Security (DNSSEC) Extensions introduced the NSEC resource record (RR) for authenticated denial of existence. This document introduces an alternative resource record, NSEC3, which similarly provides authenticated denial of existence.  However, it also provides measures against zone enumeration and permits gradual expansion of delegation-centric zones.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5155'/>
<seriesInfo name='DOI' value='10.17487/RFC5155'/>
</reference>



<reference anchor='RFC5702' target='https://www.rfc-editor.org/info/rfc5702'>
<front>
<title>Use of SHA-2 Algorithms with RSA in DNSKEY and RRSIG Resource Records for DNSSEC</title>
<author fullname='J. Jansen' initials='J.' surname='Jansen'><organization/></author>
<date month='October' year='2009'/>
<abstract><t>This document describes how to produce RSA/SHA-256 and RSA/SHA-512 DNSKEY and RRSIG resource records for use in the Domain Name System Security Extensions (RFC 4033, RFC 4034, and RFC 4035).  [STANDARDS TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5702'/>
<seriesInfo name='DOI' value='10.17487/RFC5702'/>
</reference>



<reference anchor='RFC6840' target='https://www.rfc-editor.org/info/rfc6840'>
<front>
<title>Clarifications and Implementation Notes for DNS Security (DNSSEC)</title>
<author fullname='S. Weiler' initials='S.' role='editor' surname='Weiler'><organization/></author>
<author fullname='D. Blacka' initials='D.' role='editor' surname='Blacka'><organization/></author>
<date month='February' year='2013'/>
<abstract><t>This document is a collection of technical clarifications to the DNS Security (DNSSEC) document set.  It is meant to serve as a resource to implementors as well as a collection of DNSSEC errata that existed at the time of writing.</t><t>This document updates the core DNSSEC documents (RFC 4033, RFC 4034, and RFC 4035) as well as the NSEC3 specification (RFC 5155).  It also defines NSEC3 and SHA-2 (RFC 4509 and RFC 5702) as core parts of the DNSSEC specification.</t></abstract>
</front>
<seriesInfo name='RFC' value='6840'/>
<seriesInfo name='DOI' value='10.17487/RFC6840'/>
</reference>




    </references>

    <references title='Informative References'>





<reference anchor='RFC2536' target='https://www.rfc-editor.org/info/rfc2536'>
<front>
<title>DSA KEYs and SIGs in the Domain Name System (DNS)</title>
<author fullname='D. Eastlake 3rd' initials='D.' surname='Eastlake 3rd'><organization/></author>
<date month='March' year='1999'/>
<abstract><t>A standard method for storing US Government Digital Signature Algorithm keys and signatures in the Domain Name System is described which utilizes DNS KEY and SIG resource records.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='2536'/>
<seriesInfo name='DOI' value='10.17487/RFC2536'/>
</reference>



<reference anchor='RFC4470' target='https://www.rfc-editor.org/info/rfc4470'>
<front>
<title>Minimally Covering NSEC Records and DNSSEC On-line Signing</title>
<author fullname='S. Weiler' initials='S.' surname='Weiler'><organization/></author>
<author fullname='J. Ihren' initials='J.' surname='Ihren'><organization/></author>
<date month='April' year='2006'/>
<abstract><t>This document describes how to construct DNSSEC NSEC resource records that cover a smaller range of names than called for by RFC 4034.  By generating and signing these records on demand, authoritative name servers can effectively stop the disclosure of zone contents otherwise made possible by walking the chain of NSEC records in a signed zone.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4470'/>
<seriesInfo name='DOI' value='10.17487/RFC4470'/>
</reference>



<reference anchor='RFC5011' target='https://www.rfc-editor.org/info/rfc5011'>
<front>
<title>Automated Updates of DNS Security (DNSSEC) Trust Anchors</title>
<author fullname='M. StJohns' initials='M.' surname='StJohns'><organization/></author>
<date month='September' year='2007'/>
<abstract><t>This document describes a means for automated, authenticated, and authorized updating of DNSSEC &quot;trust anchors&quot;.  The method provides protection against N-1 key compromises of N keys in the trust point key set.  Based on the trust established by the presence of a current anchor, other anchors may be added at the same place in the hierarchy, and, ultimately, supplant the existing anchor(s).</t><t>This mechanism will require changes to resolver management behavior (but not resolver resolution behavior), and the addition of a single flag bit to the DNSKEY record.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='74'/>
<seriesInfo name='RFC' value='5011'/>
<seriesInfo name='DOI' value='10.17487/RFC5011'/>
</reference>



<reference anchor='RFC5933' target='https://www.rfc-editor.org/info/rfc5933'>
<front>
<title>Use of GOST Signature Algorithms in DNSKEY and RRSIG Resource Records for DNSSEC</title>
<author fullname='V. Dolmatov' initials='V.' role='editor' surname='Dolmatov'><organization/></author>
<author fullname='A. Chuprina' initials='A.' surname='Chuprina'><organization/></author>
<author fullname='I. Ustinov' initials='I.' surname='Ustinov'><organization/></author>
<date month='July' year='2010'/>
<abstract><t>This document describes how to produce digital signatures and hash functions using the GOST R 34.10-2001 and GOST R 34.11-94 algorithms for DNSKEY, RRSIG, and DS resource records, for use in the Domain Name System Security Extensions (DNSSEC).  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5933'/>
<seriesInfo name='DOI' value='10.17487/RFC5933'/>
</reference>



<reference anchor='RFC6014' target='https://www.rfc-editor.org/info/rfc6014'>
<front>
<title>Cryptographic Algorithm Identifier Allocation for DNSSEC</title>
<author fullname='P. Hoffman' initials='P.' surname='Hoffman'><organization/></author>
<date month='November' year='2010'/>
<abstract><t>This document specifies how DNSSEC cryptographic algorithm identifiers in the IANA registries are allocated.  It changes the requirement from &quot;standard required&quot; to &quot;RFC Required&quot;.  It does not change the list of algorithms that are recommended or required for DNSSEC implementations.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6014'/>
<seriesInfo name='DOI' value='10.17487/RFC6014'/>
</reference>



<reference anchor='RFC6605' target='https://www.rfc-editor.org/info/rfc6605'>
<front>
<title>Elliptic Curve Digital Signature Algorithm (DSA) for DNSSEC</title>
<author fullname='P. Hoffman' initials='P.' surname='Hoffman'><organization/></author>
<author fullname='W.C.A. Wijngaards' initials='W.C.A.' surname='Wijngaards'><organization/></author>
<date month='April' year='2012'/>
<abstract><t>This document describes how to specify Elliptic Curve Digital Signature Algorithm (DSA) keys and signatures in DNS Security (DNSSEC).  It lists curves of different sizes and uses the SHA-2 family of hashes for signatures.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6605'/>
<seriesInfo name='DOI' value='10.17487/RFC6605'/>
</reference>



<reference anchor='RFC6698' target='https://www.rfc-editor.org/info/rfc6698'>
<front>
<title>The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA</title>
<author fullname='P. Hoffman' initials='P.' surname='Hoffman'><organization/></author>
<author fullname='J. Schlyter' initials='J.' surname='Schlyter'><organization/></author>
<date month='August' year='2012'/>
<abstract><t>Encrypted communication on the Internet often uses Transport Layer Security (TLS), which depends on third parties to certify the keys used.  This document improves on that situation by enabling the administrators of domain names to specify the keys used in that domain's TLS servers.  This requires matching improvements in TLS client software, but no change in TLS server software.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6698'/>
<seriesInfo name='DOI' value='10.17487/RFC6698'/>
</reference>



<reference anchor='RFC6725' target='https://www.rfc-editor.org/info/rfc6725'>
<front>
<title>DNS Security (DNSSEC) DNSKEY Algorithm IANA Registry Updates</title>
<author fullname='S. Rose' initials='S.' surname='Rose'><organization/></author>
<date month='August' year='2012'/>
<abstract><t>The DNS Security Extensions (DNSSEC) require the use of cryptographic algorithm suites for generating digital signatures over DNS data. The algorithms specified for use with DNSSEC are reflected in an IANA-maintained registry.  This document presents a set of changes for some entries of the registry.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6725'/>
<seriesInfo name='DOI' value='10.17487/RFC6725'/>
</reference>



<reference anchor='RFC6781' target='https://www.rfc-editor.org/info/rfc6781'>
<front>
<title>DNSSEC Operational Practices, Version 2</title>
<author fullname='O. Kolkman' initials='O.' surname='Kolkman'><organization/></author>
<author fullname='W. Mekking' initials='W.' surname='Mekking'><organization/></author>
<author fullname='R. Gieben' initials='R.' surname='Gieben'><organization/></author>
<date month='December' year='2012'/>
<abstract><t>This document describes a set of practices for operating the DNS with security extensions (DNSSEC).  The target audience is zone administrators deploying DNSSEC.</t><t>The document discusses operational aspects of using keys and signatures in the DNS.  It discusses issues of key generation, key storage, signature generation, key rollover, and related policies.</t><t>This document obsoletes RFC 4641, as it covers more operational ground and gives more up-to-date requirements with respect to key sizes and the DNSSEC operations.</t></abstract>
</front>
<seriesInfo name='RFC' value='6781'/>
<seriesInfo name='DOI' value='10.17487/RFC6781'/>
</reference>



<reference anchor='RFC6975' target='https://www.rfc-editor.org/info/rfc6975'>
<front>
<title>Signaling Cryptographic Algorithm Understanding in DNS Security Extensions (DNSSEC)</title>
<author fullname='S. Crocker' initials='S.' surname='Crocker'><organization/></author>
<author fullname='S. Rose' initials='S.' surname='Rose'><organization/></author>
<date month='July' year='2013'/>
<abstract><t>The DNS Security Extensions (DNSSEC) were developed to provide origin authentication and integrity protection for DNS data by using digital signatures.  These digital signatures can be generated using different algorithms.  This document specifies a way for validating end-system resolvers to signal to a server which digital signature and hash algorithms they support.  The extensions allow the signaling of new algorithm uptake in client code to allow zone administrators to know when it is possible to complete an algorithm rollover in a DNSSEC-signed zone.</t></abstract>
</front>
<seriesInfo name='RFC' value='6975'/>
<seriesInfo name='DOI' value='10.17487/RFC6975'/>
</reference>



<reference anchor='RFC7129' target='https://www.rfc-editor.org/info/rfc7129'>
<front>
<title>Authenticated Denial of Existence in the DNS</title>
<author fullname='R. Gieben' initials='R.' surname='Gieben'><organization/></author>
<author fullname='W. Mekking' initials='W.' surname='Mekking'><organization/></author>
<date month='February' year='2014'/>
<abstract><t>Authenticated denial of existence allows a resolver to validate that a certain domain name does not exist.  It is also used to signal that a domain name exists but does not have the specific resource record (RR) type you were asking for.  When returning a negative DNS Security Extensions (DNSSEC) response, a name server usually includes up to two NSEC records.  With NSEC version 3 (NSEC3), this amount is three.</t><t>This document provides additional background commentary and some context for the NSEC and NSEC3 mechanisms used by DNSSEC to provide authenticated denial-of-existence responses.</t></abstract>
</front>
<seriesInfo name='RFC' value='7129'/>
<seriesInfo name='DOI' value='10.17487/RFC7129'/>
</reference>



<reference anchor='RFC7344' target='https://www.rfc-editor.org/info/rfc7344'>
<front>
<title>Automating DNSSEC Delegation Trust Maintenance</title>
<author fullname='W. Kumari' initials='W.' surname='Kumari'><organization/></author>
<author fullname='O. Gudmundsson' initials='O.' surname='Gudmundsson'><organization/></author>
<author fullname='G. Barwood' initials='G.' surname='Barwood'><organization/></author>
<date month='September' year='2014'/>
<abstract><t>This document describes a method to allow DNS Operators to more easily update DNSSEC Key Signing Keys using the DNS as a communication channel.  The technique described is aimed at delegations in which it is currently hard to move information from the Child to Parent.</t></abstract>
</front>
<seriesInfo name='RFC' value='7344'/>
<seriesInfo name='DOI' value='10.17487/RFC7344'/>
</reference>



<reference anchor='RFC7583' target='https://www.rfc-editor.org/info/rfc7583'>
<front>
<title>DNSSEC Key Rollover Timing Considerations</title>
<author fullname='S. Morris' initials='S.' surname='Morris'><organization/></author>
<author fullname='J. Ihren' initials='J.' surname='Ihren'><organization/></author>
<author fullname='J. Dickinson' initials='J.' surname='Dickinson'><organization/></author>
<author fullname='W. Mekking' initials='W.' surname='Mekking'><organization/></author>
<date month='October' year='2015'/>
<abstract><t>This document describes the issues surrounding the timing of events in the rolling of a key in a DNSSEC-secured zone.  It presents timelines for the key rollover and explicitly identifies the relationships between the various parameters affecting the process.</t></abstract>
</front>
<seriesInfo name='RFC' value='7583'/>
<seriesInfo name='DOI' value='10.17487/RFC7583'/>
</reference>



<reference anchor='RFC7646' target='https://www.rfc-editor.org/info/rfc7646'>
<front>
<title>Definition and Use of DNSSEC Negative Trust Anchors</title>
<author fullname='P. Ebersman' initials='P.' surname='Ebersman'><organization/></author>
<author fullname='W. Kumari' initials='W.' surname='Kumari'><organization/></author>
<author fullname='C. Griffiths' initials='C.' surname='Griffiths'><organization/></author>
<author fullname='J. Livingood' initials='J.' surname='Livingood'><organization/></author>
<author fullname='R. Weber' initials='R.' surname='Weber'><organization/></author>
<date month='September' year='2015'/>
<abstract><t>DNS Security Extensions (DNSSEC) is now entering widespread deployment.  However, domain signing tools and processes are not yet as mature and reliable as those for non-DNSSEC-related domain administration tools and processes.  This document defines Negative Trust Anchors (NTAs), which can be used to mitigate DNSSEC validation failures by disabling DNSSEC validation at specified domains.</t></abstract>
</front>
<seriesInfo name='RFC' value='7646'/>
<seriesInfo name='DOI' value='10.17487/RFC7646'/>
</reference>



<reference anchor='RFC7958' target='https://www.rfc-editor.org/info/rfc7958'>
<front>
<title>DNSSEC Trust Anchor Publication for the Root Zone</title>
<author fullname='J. Abley' initials='J.' surname='Abley'><organization/></author>
<author fullname='J. Schlyter' initials='J.' surname='Schlyter'><organization/></author>
<author fullname='G. Bailey' initials='G.' surname='Bailey'><organization/></author>
<author fullname='P. Hoffman' initials='P.' surname='Hoffman'><organization/></author>
<date month='August' year='2016'/>
<abstract><t>The root zone of the Domain Name System (DNS) has been cryptographically signed using DNS Security Extensions (DNSSEC).</t><t>In order to obtain secure answers from the root zone of the DNS using DNSSEC, a client must configure a suitable trust anchor.  This document describes the format and publication mechanisms IANA has used to distribute the DNSSEC trust anchors.</t></abstract>
</front>
<seriesInfo name='RFC' value='7958'/>
<seriesInfo name='DOI' value='10.17487/RFC7958'/>
</reference>



<reference anchor='RFC8027' target='https://www.rfc-editor.org/info/rfc8027'>
<front>
<title>DNSSEC Roadblock Avoidance</title>
<author fullname='W. Hardaker' initials='W.' surname='Hardaker'><organization/></author>
<author fullname='O. Gudmundsson' initials='O.' surname='Gudmundsson'><organization/></author>
<author fullname='S. Krishnaswamy' initials='S.' surname='Krishnaswamy'><organization/></author>
<date month='November' year='2016'/>
<abstract><t>This document describes problems that a Validating DNS resolver, stub-resolver, or application might run into within a non-compliant infrastructure.  It outlines potential detection and mitigation techniques.  The scope of the document is to create a shared approach to detect and overcome network issues that a DNSSEC software/system may face.</t></abstract>
</front>
<seriesInfo name='BCP' value='207'/>
<seriesInfo name='RFC' value='8027'/>
<seriesInfo name='DOI' value='10.17487/RFC8027'/>
</reference>



<reference anchor='RFC8078' target='https://www.rfc-editor.org/info/rfc8078'>
<front>
<title>Managing DS Records from the Parent via CDS/CDNSKEY</title>
<author fullname='O. Gudmundsson' initials='O.' surname='Gudmundsson'><organization/></author>
<author fullname='P. Wouters' initials='P.' surname='Wouters'><organization/></author>
<date month='March' year='2017'/>
<abstract><t>RFC 7344 specifies how DNS trust can be maintained across key rollovers in-band between parent and child.  This document elevates RFC 7344 from Informational to Standards Track.  It also adds a method for initial trust setup and removal of a secure entry point.</t><t>Changing a domain's DNSSEC status can be a complicated matter involving multiple unrelated parties.  Some of these parties, such as the DNS operator, might not even be known by all the organizations involved.  The inability to disable DNSSEC via in-band signaling is seen as a problem or liability that prevents some DNSSEC adoption at a large scale.  This document adds a method for in-band signaling of these DNSSEC status changes.</t><t>This document describes reasonable policies to ease deployment of the initial acceptance of new secure entry points (DS records).</t><t>It is preferable that operators collaborate on the transfer or move of a domain.  The best method is to perform a Key Signing Key (KSK) plus Zone Signing Key (ZSK) rollover.  If that is not possible, the method using an unsigned intermediate state described in this document can be used to move the domain between two parties.  This leaves the domain temporarily unsigned and vulnerable to DNS spoofing, but that is preferred over the alternative of validation failures due to a mismatched DS and DNSKEY record.</t></abstract>
</front>
<seriesInfo name='RFC' value='8078'/>
<seriesInfo name='DOI' value='10.17487/RFC8078'/>
</reference>



<reference anchor='RFC8080' target='https://www.rfc-editor.org/info/rfc8080'>
<front>
<title>Edwards-Curve Digital Security Algorithm (EdDSA) for DNSSEC</title>
<author fullname='O. Sury' initials='O.' surname='Sury'><organization/></author>
<author fullname='R. Edmonds' initials='R.' surname='Edmonds'><organization/></author>
<date month='February' year='2017'/>
<abstract><t>This document describes how to specify Edwards-curve Digital Security Algorithm (EdDSA) keys and signatures in DNS Security (DNSSEC).  It uses EdDSA with the choice of two curves: Ed25519 and Ed448.</t></abstract>
</front>
<seriesInfo name='RFC' value='8080'/>
<seriesInfo name='DOI' value='10.17487/RFC8080'/>
</reference>



<reference anchor='RFC8145' target='https://www.rfc-editor.org/info/rfc8145'>
<front>
<title>Signaling Trust Anchor Knowledge in DNS Security Extensions (DNSSEC)</title>
<author fullname='D. Wessels' initials='D.' surname='Wessels'><organization/></author>
<author fullname='W. Kumari' initials='W.' surname='Kumari'><organization/></author>
<author fullname='P. Hoffman' initials='P.' surname='Hoffman'><organization/></author>
<date month='April' year='2017'/>
<abstract><t>The DNS Security Extensions (DNSSEC) were developed to provide origin authentication and integrity protection for DNS data by using digital signatures.  These digital signatures can be verified by building a chain of trust starting from a trust anchor and proceeding down to a particular node in the DNS.  This document specifies two different ways for validating resolvers to signal to a server which keys are referenced in their chain of trust.  The data from such signaling allow zone administrators to monitor the progress of rollovers in a DNSSEC-signed zone.</t></abstract>
</front>
<seriesInfo name='RFC' value='8145'/>
<seriesInfo name='DOI' value='10.17487/RFC8145'/>
</reference>



<reference anchor='RFC8198' target='https://www.rfc-editor.org/info/rfc8198'>
<front>
<title>Aggressive Use of DNSSEC-Validated Cache</title>
<author fullname='K. Fujiwara' initials='K.' surname='Fujiwara'><organization/></author>
<author fullname='A. Kato' initials='A.' surname='Kato'><organization/></author>
<author fullname='W. Kumari' initials='W.' surname='Kumari'><organization/></author>
<date month='July' year='2017'/>
<abstract><t>The DNS relies upon caching to scale; however, the cache lookup generally requires an exact match.  This document specifies the use of NSEC/NSEC3 resource records to allow DNSSEC-validating resolvers to generate negative answers within a range and positive answers from wildcards.  This increases performance, decreases latency, decreases resource utilization on both authoritative and recursive servers, and increases privacy.  Also, it may help increase resilience to certain DoS attacks in some circumstances.</t><t>This document updates RFC 4035 by allowing validating resolvers to generate negative answers based upon NSEC/NSEC3 records and positive answers in the presence of wildcards.</t></abstract>
</front>
<seriesInfo name='RFC' value='8198'/>
<seriesInfo name='DOI' value='10.17487/RFC8198'/>
</reference>



<reference anchor='RFC8499' target='https://www.rfc-editor.org/info/rfc8499'>
<front>
<title>DNS Terminology</title>
<author fullname='P. Hoffman' initials='P.' surname='Hoffman'><organization/></author>
<author fullname='A. Sullivan' initials='A.' surname='Sullivan'><organization/></author>
<author fullname='K. Fujiwara' initials='K.' surname='Fujiwara'><organization/></author>
<date month='January' year='2019'/>
<abstract><t>The Domain Name System (DNS) is defined in literally dozens of different RFCs.  The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has sometimes changed in the decades since the DNS was first defined.  This document gives current definitions for many of the terms used in the DNS in a single document.</t><t>This document obsoletes RFC 7719 and updates RFC 2308.</t></abstract>
</front>
<seriesInfo name='BCP' value='219'/>
<seriesInfo name='RFC' value='8499'/>
<seriesInfo name='DOI' value='10.17487/RFC8499'/>
</reference>



<reference anchor='RFC8509' target='https://www.rfc-editor.org/info/rfc8509'>
<front>
<title>A Root Key Trust Anchor Sentinel for DNSSEC</title>
<author fullname='G. Huston' initials='G.' surname='Huston'><organization/></author>
<author fullname='J. Damas' initials='J.' surname='Damas'><organization/></author>
<author fullname='W. Kumari' initials='W.' surname='Kumari'><organization/></author>
<date month='December' year='2018'/>
<abstract><t>The DNS Security Extensions (DNSSEC) were developed to provide origin authentication and integrity protection for DNS data by using digital signatures.  These digital signatures can be verified by building a chain of trust starting from a trust anchor and proceeding down to a particular node in the DNS.  This document specifies a mechanism that will allow an end user and third parties to determine the trusted key state for the root key of the resolvers that handle that user's DNS queries.  Note that this method is only applicable for determining which keys are in the trust store for the root key.</t></abstract>
</front>
<seriesInfo name='RFC' value='8509'/>
<seriesInfo name='DOI' value='10.17487/RFC8509'/>
</reference>



<reference anchor='RFC8624' target='https://www.rfc-editor.org/info/rfc8624'>
<front>
<title>Algorithm Implementation Requirements and Usage Guidance for DNSSEC</title>
<author fullname='P. Wouters' initials='P.' surname='Wouters'><organization/></author>
<author fullname='O. Sury' initials='O.' surname='Sury'><organization/></author>
<date month='June' year='2019'/>
<abstract><t>The DNSSEC protocol makes use of various cryptographic algorithms in order to provide authentication of DNS data and proof of nonexistence.  To ensure interoperability between DNS resolvers and DNS authoritative servers, it is necessary to specify a set of algorithm implementation requirements and usage guidelines to ensure that there is at least one algorithm that all implementations support.  This document defines the current algorithm implementation requirements and usage guidance for DNSSEC.  This document obsoletes RFC 6944.</t></abstract>
</front>
<seriesInfo name='RFC' value='8624'/>
<seriesInfo name='DOI' value='10.17487/RFC8624'/>
</reference>



<reference anchor='RFC8901' target='https://www.rfc-editor.org/info/rfc8901'>
<front>
<title>Multi-Signer DNSSEC Models</title>
<author fullname='S. Huque' initials='S.' surname='Huque'><organization/></author>
<author fullname='P. Aras' initials='P.' surname='Aras'><organization/></author>
<author fullname='J. Dickinson' initials='J.' surname='Dickinson'><organization/></author>
<author fullname='J. Vcelak' initials='J.' surname='Vcelak'><organization/></author>
<author fullname='D. Blacka' initials='D.' surname='Blacka'><organization/></author>
<date month='September' year='2020'/>
<abstract><t>Many enterprises today employ the service of multiple DNS providers to distribute their authoritative DNS service. Deploying DNSSEC in such an environment may present some challenges, depending on the configuration and feature set in use. In particular, when each DNS provider independently signs zone data with their own keys, additional key-management mechanisms are necessary. This document presents deployment models that accommodate this scenario and describes these key-management requirements. These models do not require any changes to the behavior of validating resolvers, nor do they impose the new key-management requirements on authoritative servers not involved in multi-signer configurations.</t></abstract>
</front>
<seriesInfo name='RFC' value='8901'/>
<seriesInfo name='DOI' value='10.17487/RFC8901'/>
</reference>



<reference anchor='RFC9077' target='https://www.rfc-editor.org/info/rfc9077'>
<front>
<title>NSEC and NSEC3: TTLs and Aggressive Use</title>
<author fullname='P. van Dijk' initials='P.' surname='van Dijk'><organization/></author>
<date month='July' year='2021'/>
<abstract><t>Due to a combination of unfortunate wording in earlier documents, aggressive use of NSEC and NSEC3 records may deny the existence of names far beyond the intended lifetime of a denial. This document changes the definition of the NSEC and NSEC3 TTL to correct that situation. This document updates RFCs 4034, 4035, 5155, and 8198.</t></abstract>
</front>
<seriesInfo name='RFC' value='9077'/>
<seriesInfo name='DOI' value='10.17487/RFC9077'/>
</reference>



<reference anchor='RFC9157' target='https://www.rfc-editor.org/info/rfc9157'>
<front>
<title>Revised IANA Considerations for DNSSEC</title>
<author fullname='P. Hoffman' initials='P.' surname='Hoffman'><organization/></author>
<date month='December' year='2021'/>
<abstract><t>This document changes the review requirements needed to get DNSSEC algorithms and resource records added to IANA registries. It updates RFC 6014 to include hash algorithms for Delegation Signer (DS) records and NextSECure version 3 (NSEC3) parameters (for Hashed Authenticated Denial of Existence). It also updates RFCs 5155 and 6014, which have requirements for DNSSEC algorithms, and updates RFC 8624 to clarify the implementation recommendation related to the algorithms described in RFCs that are not on the standards track. The rationale for these changes is to bring the requirements for DS records and hash algorithms used in NSEC3 in line with the requirements for all other DNSSEC algorithms.</t></abstract>
</front>
<seriesInfo name='RFC' value='9157'/>
<seriesInfo name='DOI' value='10.17487/RFC9157'/>
</reference>



<reference anchor='RFC9276' target='https://www.rfc-editor.org/info/rfc9276'>
<front>
<title>Guidance for NSEC3 Parameter Settings</title>
<author fullname='W. Hardaker' initials='W.' surname='Hardaker'><organization/></author>
<author fullname='V. Dukhovni' initials='V.' surname='Dukhovni'><organization/></author>
<date month='August' year='2022'/>
<abstract><t>NSEC3 is a DNSSEC mechanism providing proof of nonexistence by asserting that there are no names that exist between two domain names within a zone.  Unlike its counterpart NSEC, NSEC3 avoids directly disclosing the bounding domain name pairs.  This document provides guidance on setting NSEC3 parameters based on recent operational deployment experience.  This document updates RFC 5155 with guidance about selecting NSEC3 iteration and salt parameters.</t></abstract>
</front>
<seriesInfo name='BCP' value='236'/>
<seriesInfo name='RFC' value='9276'/>
<seriesInfo name='DOI' value='10.17487/RFC9276'/>
</reference>




    </references>


<section anchor="acknowledgements"><name>Acknowledgements</name>

<t>The DNS world owes a depth of gratitude to the authors and other contributors
to the core DNSSEC documents, and to the notable DNSSEC extensions.</t>

<t>In addition, the following people made significant contributions to early versions
of this document: Ben Schwartz and Duane Wessels.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

