<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.34 (Ruby 3.0.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

<!ENTITY RFC9364 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9364.xml">
<!ENTITY RFC5011 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5011.xml">
<!ENTITY RFC8145 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8145.xml">
<!ENTITY RFC7583 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7583.xml">
<!ENTITY RFC7646 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7646.xml">
<!ENTITY I-D.ietf-dnsop-ns-revalidation SYSTEM "https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-dnsop-ns-revalidation.xml">
<!ENTITY RFC4033 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4033.xml">
<!ENTITY RFC8247 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8247.xml">
<!ENTITY RFC8221 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8221.xml">
<!ENTITY RFC8624 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8624.xml">
<!ENTITY RFC8914 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8914.xml">
<!ENTITY RFC7958 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7958.xml">
<!ENTITY I-D.ietf-dnsop-rfc5011-security-considerations SYSTEM "https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-dnsop-rfc5011-security-considerations.xml">
<!ENTITY RFC6975 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6975.xml">
]>

<?rfc rfcedstyle="yes"?>
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc docmapping="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-dnsop-dnssec-validator-requirements-05" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="DRO Recommendations">Recommendations for DNSSEC Resolvers Operators</title>

    <author initials="D." surname="Migault" fullname="Daniel Migault">
      <organization>Ericsson</organization>
      <address>
        <postal>
          <street>8275 Trans Canada Route</street>
          <city>Saint Laurent, QC</city>
          <code>4S 0B6</code>
          <country>Canada</country>
        </postal>
        <email>daniel.migault@ericsson.com</email>
      </address>
    </author>
    <author initials="E." surname="Lewis" fullname="Edward Lewis">
      <organization>ICANN</organization>
      <address>
        <postal>
          <street></street>
          <city></city>
          <code></code>
          <country>USA</country>
        </postal>
        <email>edward.lewis@icann.org</email>
      </address>
    </author>
    <author initials="D." surname="York" fullname="Dan York">
      <organization>Internet Society</organization>
      <address>
        <postal>
          <street></street>
          <city></city>
          <code></code>
          <country>USA</country>
        </postal>
        <email>york@isoc.org</email>
      </address>
    </author>

    <date year="2023" month="June" day="10"/>

    <area>operational</area>
    <workgroup>dnsop</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 81?>

<t>The DNS Security Extensions (DNSSEC) defines a process for validating received
data and assert them authentic and complete as opposed to forged.</t>

<t>This document provides recommendations for DNSSEC Resolver Operators (DRO) to operate a DNSSEC resolver.</t>



    </abstract>



  </front>

  <middle>


<?line 88?>

<section anchor="sec-intro"><name>Introduction</name>

<t>A DNS resolver is a service that locates and returns information pertaining to a query issued by some other service, such as an application. By its nature, a DNS resolver is inquisitive, susceptible to misleading information it may receive.
To address this, DNS Security (DNSSEC) extensions <xref target="RFC9364"/> were defined to provide authenticity and integrity to responses, as well as to provide an authenticated notice for data that does not exist.</t>

<t>A DNS resolver operator is an organization or individual that runs a DNS resolver. The resolver may be for a small set of relying parties, for a large but bounded collection of customers, or it may be operated with no restriction on who or what may make use of it.
To enhance the value of the service, a DNS resolver operator implements various security controls, including the use of DNSSEC validation. For the sake of this document, the term DNSSEC Resolver Operator (DRO) is defined as the responsible operator of a DNS resolver that makes use of DNSSEC validation.</t>

<t>Operating DNSSEC validation involves making use of digital signatures generated by a DNSSEC signer.
Besides the simple cryptographic process of validating digital signatures there are a number of checks required due to the nature of the DNS protocol.
A well-written DNSSEC validating resolver will faithfully implement the DNSSEC processes needed, leaving an operator to manage a few items.</t>

<t>The items that a DRO needs to attend to are:</t>

<t><list style="symbols">
  <t>Time of day (current, wall-clock time)</t>
  <t>Trust anchors (positive and negative)</t>
  <t>Monitoring of the service, including abuse</t>
</list></t>

<t>This document will list recommended actions for DNSSEC validating resolver operators that will help achieve the goals of DNSSEC validation. First, the goals ought to be stated.</t>

<t>The primary goal of any operations endeavor is to provide a service within service level agreements intended to make relying parties happy with the performance of the service. For DNSSEC, this breaks into two parts, one of accurately achieving the protections offered by DNSSEC, the other, to avoid DNSSEC from accidentally being an impediment.</t>

<t>The recommendations will focus on preparation of the elements of a DNSSEC validating resolver, as described earlier in the diagram. In particular, there are recommendations related to service monitoring, time source, Trust Anchor Manager/Store, and DNS Resolver. The recommendations are categorized as at initialization, during runtime, and upon demand.</t>

</section>
<section anchor="terminology"><name>Terminology</name>

<t>This document uses the following terminology:</t>

<dl>
  <dt>DNSSEC validator:</dt>
  <dd>
    <t>the entity that performs DNS resolution and performs signature
validation.</t>
  </dd>
  <dt>Accurate validation:</dt>
  <dd>
    <t>validation that avoids false positives and catches true negatives.</t>
  </dd>
  <dt>Trust Anchor Data Store:</dt>
  <dd>
    <t>a module (of code) implementing functions related to the trust anchors
used by the validator. This is essentially a database allowing access,
monitoring of, and changes to trust anchors.</t>
  </dd>
  <dt>DNSSEC Resolver Operator (DRO):</dt>
  <dd>
    <t>The operator or anyone providing DNSSEC validation service and managing DNSSEC
Validators.</t>
  </dd>
</dl>

</section>
<section anchor="sec-dnssec-val-desc"><name>Overall View of DNSSEC Validating Resolver</name>

<t>To help orient this document, the following schematic is offered to show some of the interrelationships among the elements of a DNSSEC validating resolver. This drawing is merely a cartoon summary, not an implementation guide.</t>

<figure title="DNSSEC Validating Resolver Description"><sourcecode type="aaasvg"><![CDATA[
  +--------------+  +------------+ +---------------+ +--------------+
  |              |  |            | |               | |              |
  |   Service    |  |    Time    | | Cryptographic | | Trust Anchor |
  |   Monitoring |  |    Source  | |   Libraries   | | Manager/Store|
  |              |  |            | |               | |              |
  +--------------+  +------------+ +---------------+ +--------------+
          |                |               |              ^    ^
          v                v               v              |    |
  +--------------+  +------------------------------+      |    |
  |              |  |                              |      |    |
  |              |  |                              |      |    |
->| DNS Resolver |->|   DNSSEC Validation Engine   |<-----+    |
-<|              |<-|                              |           |
  |              |  |                              |           |
  +--------------+  +------------------------------+           |
          ^               ^ |             ^                    |
          |               | v             |                    |
          |         +------------+ +---------------+           |
          |         |            | |               |           |
          +---------| DNS Caches | | DNS Messages  |<----------+
                    |            | |               |
                    +------------+ +---------------+
]]></sourcecode></figure>

<t>Across the top row are elements that an operator needs to address to properly run a DNSSEC Validating Resolver.</t>

<dl>
  <dt>Service Monitoring:</dt>
  <dd>
    <t>Enforces acceptable use policy and enables management of the service
This is a generic module for all services, here featuring some DNS and DNSSEC specific concerns.</t>
  </dd>
  <dt>Time Source:</dt>
  <dd>
    <t>Provides the wall clock or absolute, time
DNS has always used relative time to manage the TTL of resource record sets in caches, DNSSEC introduced the need for absolute time to thwart replay attacks and to manage the lifetime of signatures.</t>
  </dd>
  <dt>Cryptographic Libraries:</dt>
  <dd>
    <t>Software library or a Hardware Security Module (HSM) implementing cryptography providing Due to the nature of cryptography, the implementation of this module may evolve over time or at least be subject to technical refresh.</t>
  </dd>
  <dt>Trust Anchor Manager/Store:</dt>
  <dd>
    <t>The database of trust anchors used as the basis from which DNSSEC operates
This module contains the foundation upon which DNSSEC evaluates received data sets. The contents of this module are essential for proper operation. For a general-purpose validator running on a public Internet, it may have a single entry, for the very top of the DNS name space (the root). Management of this may be left to automated processes that are carefully designed to address vulnerabilities related to automated trust management. For specific situations, the Trust Anchor Manager/Store will also manage local-policy supporting trust anchors as well. Careful operation of this module is crucial to the value of the DNSSEC validating resolver.</t>
  </dd>
</dl>

<t>The other modules fill out the diagram to give the above context:</t>

<dl>
  <dt>DNS Resolver:</dt>
  <dd>
    <t>The service interface offered to other services/applications/users
This is the generic DNS resolution service, consulting the cache for hits, and seeking new answers for misses.</t>
  </dd>
  <dt>DNSSEC Validation Engine:</dt>
  <dd>
    <t>This implements the DNSSEC validation process
The validation engine is assumed to faithfully implement the DNSSEC validation algorithm, relying on the information from the Time Source, Cryptographic Libraries, Trust Anchor Management/Store as well as what is held in the local cache or gained through messages.</t>
  </dd>
  <dt>DNS Caches:</dt>
  <dd>
    <t>Include positive and negative caches.
These are the ordinary caches used in DNS operations, including DNSSEC extended record types and management.</t>
  </dd>
  <dt>DNS Messages:</dt>
  <dd>
    <t>Existing DNS message passing
This covers the proper implementation and operation of DNS and DNSSEC message exchanges.</t>
  </dd>
</dl>

<t>Note that there may be other elements involved in a DNSSEC validating resolver.</t>

</section>
<section anchor="time-recommendations"><name>Time Recommendations</name>

<t>As DNSSEC uses wall-clock time to temporally limit the validity of RRSIG resource records, a DNSSEC validator needs a reliable time source. If a validator can be fooled into believing that the time is a point well into the past, an incorrect RRSIG resource record may be replayed and used, or an old key whose private component has since been exposed may be able to forge a falsified answer.</t>

<t>The range of these recommendations include devices that do not have an embedded Real Time Clock. Such devices need to have their system clocks updated upon power up before starting the DNSSEC validator.</t>

<t>At initialization: a DNSSEC validator needs to be able to establish reliable time without relying on DNSSEC validation. The latter clause is needed as the initialization step is being carried out to start DNSSEC validation, it is not assumed to be up and running at this point. One way to interpret this is that a time source (Network Time Protocol) ought to be identified by a numerical IP address and not a fully qualified domain name (which would require a DNS lookup).</t>

<t>During runtime: a DNSSEC validator operator ought to have controls in place to monitor the current time of a validator as well as monitor the number of validation failures that can be attributed to temporal violations. Updates to the current time ought to make use of secure environments, whether secure channels for NTP or as appropriate for the installation. Updates ought to be part of an automated process, running at appropriately frequent intervals.</t>

<t>Upon demand: a DNSSEC validator operator ought to be able to perform any of the runtime actions upon demand, for instance, to help diagnose a service failure.</t>

</section>
<section anchor="ta"><name>Trust Anchor Related Recommendations</name>

<t>The TA store implements a trust model. The default trust model consists in trusting a single TA which is the KSK of the root zone.</t>

<t>While not generally recommended, a DRO may consider alternative TAs, for example, when the secure delegation to these RRsets may not be validated for any reasons.
The trust model should at least ensure that any domain name in the DNS be covered by at least one TA.
As the number of top level domains is evolving overtime, it remains safe to keep the root zone as a security entry point in order to cover the full domain name space.
Upon considering TA, the DRO should carefully ensure that the TA meets all necessary operational criterias. This includes for example, having a bootstrapping mechanism, or having their signers committed to respect the <xref target="RFC5011"/> timing - at least when the DRO relies on automatic updates (see below).</t>

<t>TAs are usually represented by a DNSKEY or DS RRset and are involved in the signature validation process to determine whether the validation is successful or not.</t>

<t>At initialization: The DRO needs to ensure the resolver can only be started with a TA store that matches the trust model and that is up-to-date.
The DRO needs to securely retrieve and check the TA upon starting the resolver.
For the default trust model, for example, <xref target="UNBOUND-ANCHOR"/> or <xref target="ta-fetcher"/> implements <xref target="RFC7958"/> and ensures the resolver is configured with the up-to-date TA of the root zone. Similarly, the up-to-date default trust model is very commonly implemented by the software release in which case the DRO may simply rely on software update.</t>

<t>During runtime: The DRO needs to ensure the TA is up-to-date. This is achieved by enabling TA to be updated automatically as well as being able to check the status of the TA.
TA updates are not expected to be handled manually as this introduces a potentially huge vector for configuration errors as well as potential misunderstanding of ongoing operations.
Instead, the DRO should rely on automated procedures such as, for example, Automated Updates to DNSSEC Trust Anchors" <xref target="RFC5011"/> <xref target="I-D.ietf-dnsop-rfc5011-security-considerations"/> or software updates.
As <xref target="RFC5011"/> is an in-band mechanism, the DRO is expected to understand these risks <xref section="8" sectionFormat="comma" target="RFC5011"/>. Software update or other mechanisms may also be used.</t>

<t>Upon demand: The DRO should be able to check the status of the TA within its resolvers on a regular basis or when it is aware a TA roll over is ongoing.
This includes the TA stored in the running resolver as well as potential configuration files.
The TA used by the resolver is expected to be retrieved using "Signaling Trust Anchor Knowledge in DNS Security Extensions (DNSSEC)" <xref target="RFC8145"/>, and may re-use similar software as those used at the initialisation to retrieve and check the expected value of the TA.
The TA health check should associate a status to the TA - as defined in Section 3 of <xref target="RFC7583"/> - to ease the TA monitoring and potential analysis.
When an unexpected (old) TA is found, the health check should evaluate if the mismatch resulted from an ongoing normal roll over, a potential emergency key roll over, failed roll over or any other envisioned cases.
In any case restarting the resolver is expected to address any situation that cannot be addressed otherwise, which reinforces the recommendation to rely on TA bootstrapping mechanisms.</t>

<t>Note also that <xref target="RFC8145"/> also enables any authoritative server to check how the TA roll over is performed. Such cooperation is expected to be useful and benefit the overall operation of the DNS system.</t>

</section>
<section anchor="nta"><name>Negative Trust Anchors Related Recommendations</name>

<t>When the DNSSEC Resolver is not able to validate signatures because a key or DS has been published with an error, the DRO may temporarily disable the signature check for that key until the time the error is addressed.
Negative Trust Anchor (NTA) represents the only permitted intervention in the resolving process for a DRO.</t>

<t>The designation of NTA might be misleading, but NTA is not expected to be part of the trust model even though the NTA belongs to the TA store.</t>

<t>At initialization: Similarly to TA, the DRO is expected to automatically configure the resolver with the NTA.</t>

<t>Upon demand: the DRO is expected to automatically determine the used NTA and handle NTA as described in <xref target="RFC7646"/>.</t>

<t>A signature validation failure is either an attack or a failure in the signing operation on the authoritative servers.
The DRO is expected to confirm this offline before introducing the NTA.
This is likely to happen via a human confirmation which is based on information collected during running time.</t>

<t>At running time: The DRO should monitor the number of signature failures associated with each DNSKEY. These numbers are only hints and must not trigger automated insertion of NTA.</t>

</section>
<section anchor="cached-rrset-recommendations"><name>Cached RRset Recommendations</name>

<t>During runtime: A DRO is not expected to perform any operations over the cached RRSet.
A common concern DRO has is the consistency between the cached RRset with those published by the DNS system.
DRO should not implement or deploy any non standard mechanism.
<xref target="I-D.ietf-dnsop-ns-revalidation"/> is one of these mechanisms, for example.
Section 8.1 of <xref target="RFC4033"/> also mentions the ability by the resolver to set the upper bound of the TTL to the remaining signature validity period.
This value has usually a default value set by the resolver and the DRO may change that default value.</t>

<t>Upon demand: a DRO may have been informed that a rogue or unwilling DNSKEY has been published. In such a situation, the DRO should be able to remove the RRsets validated by the rogue DNSKEY - which may be done by flushing the full cache.</t>

</section>
<section anchor="cryptography-deprecation-recommendations"><name>Cryptography Deprecation Recommendations</name>

<t>As mentioned in <xref target="RFC8247"/> and <xref target="RFC8221"/> cryptography used one day is expected over time to be replaced by new and more robust cryptographic mechanisms.
In the case of DNSSEC signature protocols are likely to be updated over time.
In order to anticipate the sunset of one of the signature schemes, a DNSSEC validator may be willing to estimate the impact of deprecating one signature scheme.</t>

<t>Currently, interoperability and security are enforced via cryptographic recommendations <xref target="RFC8624"/> that are followed by both resolvers and authoritative servers.
The implementation of such guidance is ensured by the software vendors and the compliance of their releases.</t>

<t>At initialization: The DRO is expected to ensure recent software releases are used and that this release complies with the most recent cryptographic guidelines.</t>

<t>During runtime: a DRO may regularly request and monitor the signature scheme supported by an authoritative server.
In addition, when a validation fails because a deprecated algorithm is used, the DRO should return an "Unsupported DNSKEY Algorithm" as defined in <xref target="RFC8914"/> to the DNS client.</t>

<t>Note that one inconvenience to such a strategy is that it does not let one DRO take advantage of more recent cryptographic algorithms.
While currently not being widely used, a DRO may announce an authoritative server the supported signature schemes to the authoritative server <xref target="RFC6975"/> in the hope that future deployment of authoritative servers will be able to leverage it.</t>

</section>
<section anchor="invalid-reporting-recommendations"><name>Invalid Reporting Recommendations</name>

<t>A DNSSEC validator receiving a DNS response cannot make the difference between receiving an non-secure response versus an attack.
Dropping DNSSEC fields by misconfigured middle boxes, such as DS, RRRSIG is considered as an attack.
A DNSSEC validator is expected to perform secure DNS resolution and as such protects its stub client.
An invalid response may be the result of an attack or a misconfiguration, and the DRO may play an important role in sharing this information with the authoritative server or domain name owner.</t>

<t>At runtime: a DRO should monitor and report DNSSEC validation errors and inform the DNS client with "Extended DNS Errors" <xref target="RFC8914"/>.</t>

</section>
<section anchor="transport-recommendations"><name>Transport Recommendations</name>

<t>DNSSEC validation requires that the validator is able to reliably obtain necessary records, especially DNSKEY records. This should be done at initial configuration, and tested periodically.</t>

<t>This means the validator must ensure it is configured so that the UDP and TCP transports, and DNS resolver components, are compatible with the network paths that the majority of DNS queries traverse - which includes compatibility between DNS and transport parameters with the Maximum Transmission Unit (MTU).</t>

<t>In other words, make sure that:</t>

<t><list style="numbers">
  <t>DNS UDP bufsize (EDNS parameter) is set to a value compatible with network MTUs the queries and responses will encounter. If the validator advertises a bufsize &gt;&gt; MTU, responses with the IPv4 Don't Fragment (DF) bit set whose size R where MTU &lt; R &lt;= bufsize exceeds the MTU will be dropped by the router with MTU &lt; R.</t>
  <t>The validator's OS TCP configuration has its advertised Maximum Segment Size (MSS) set to a value compatible with network MTUs the queries and responses will encounter.</t>
</list></t>

<t><list style="symbols">
  <t>Having an advertised MSS set to a value &lt; MTU ensures that Path MTU Discovery is not required</t>
  <t>If PMTUD fails for any reason, or if the server responding does not maintain or use PMTUD, and advertised MSS &gt; MTU at any point in the path, TCP may encounter problems caused by IP fragmentation and reassembly.</t>
  <t>This is particularly relevant if there are any NAT type devices in the path, as those may not properly handle fragmentation and reassembly</t>
  <t>If all TCP segments are smaller than the path MTU, TCP will work reliably.</t>
</list></t>

<t>The avoidance of fragmentation in order to address known fragmentation-related security issues with DNS (leading to cache poisoning, for example) has resulted in the need to set the DF bit on UDP.
Validators will need to ensure their local environment can reliably get any critical DNSSEC records (notably DNSKEY) over UDP, or reliably get responses with TC=1 if overly large responses cannot be sent over UDP due to answers not fitting within the advertised bufsize payload.
Validators also need to ensure TCP works if it is needed, for the same situations.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>There is no IANA consideration for this document.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>The recommendations provide very limited ability for a DRO to alter or directly interfere with the validation process.
In many cases, it is believed that best practices are implemented by the software vendor and anything implemented by the DRO has a high chance of disrupting the resolution service or raising corner cases that would make analysis and troubleshooting very hard.
To a lesser extent, there is also a high chance that default values set by the software vendor may be the appropriate value to be used.</t>

<t>To alter the DNSSEC resolution, an attacker may provide information to the DRO to flush the KSK/ZSK and associated data from its cache. This generates additional DNSSEC resolution and additional validations, as RRSet that were cached require a DNSSEC resolution over the Internet.
This affects the resolution service by slowing down responses, and increases the load on the DNSSEC validator.</t>

<t>An attacker may ask the DNSSEC validator to consider a rogue TA, thus hijacking the DNS zone.</t>

<t>An attacker can advertise a "known insecure" KSK or ZSK is "back to secure" to prevent signature check to be performed correctly.</t>

<t>As a result, information considered by the DNSSEC validator should be from a trusted party. This trust party should have been authenticated, and the channel used to exchange the information should also be protected and authenticated.</t>

<t>The software used for the DNSSEC validator is not immune to bugs <xref target="ENT"/> and may become vulnerable independently of how it is operated.
As a result, DROs are expected to run resolvers from different pieces of software- usually different vendors.</t>

</section>
<section anchor="acknowledgment"><name>Acknowledgment</name>

<t>The need to address DNSSEC issues on the resolver occurred during multiple discussions including among others Ted Lemon, Ralph Weber,
Normen Kowalewski, Mikael Abrahamsson, Jim Gettys, Paul Wouters, Joe Abley, Michael Richardson, Vladimír Čunát, James Gannon, Andrew McConachie, Peter Thomassen, Florian Obser and Brian Dickson.</t>

<t>We also appreciated the support of the DNSOP chairs Tim Wicinski, Suzanne Woolf and Benno Overeinder.</t>

</section>


  </middle>

  <back>


    <references title='Normative References'>

&RFC9364;
&RFC5011;
&RFC8145;
&RFC7583;
&RFC7646;
&I-D.ietf-dnsop-ns-revalidation;
&RFC4033;
&RFC8247;
&RFC8221;
&RFC8624;
&RFC8914;


    </references>

    <references title='Informative References'>

<reference anchor="UNBOUND-ANCHOR" target="https://nlnetlabs.nl/documentation/unbound/unbound-anchor/">
  <front>
    <title>unbound-anchor - Unbound anchor utility</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="ENT" target="https://indico.dns-oarc.net/event/25/contributions/403/attachments/378/647/AFNIC_OARC_Dallas.pdf">
  <front>
    <title>ENT was here !!!</title>
    <author initials="V." surname="Levigneron" fullname="Vincent Levigneron">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="ta-fetcher" target="https://github.com/iana-org/get-trust-anchor">
  <front>
    <title>DNSSEC Trust Anchor Fetcher</title>
    <author initials="J. S. and K." surname="Davies" fullname="Jakob Schlyter and Kim Davies">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
&RFC7958;
&I-D.ietf-dnsop-rfc5011-security-considerations;
&RFC6975;


    </references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

