<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.17 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-dnsop-rfc7958bis-03" category="info" consensus="true" submissionType="IETF" obsoletes="7958" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.21.0 -->
  <front>
    <title abbrev="Root Zone Trust Anchor Publication">DNSSEC Trust Anchor Publication for the Root Zone</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-dnsop-rfc7958bis-03"/>
    <author initials="J." surname="Abley" fullname="Joe Abley">
      <organization>Cloudflare</organization>
      <address>
        <postal>
          <city>Amsterdam</city>
          <country>Netherlands</country>
        </postal>
        <email>jabley@cloudflare.com</email>
      </address>
    </author>
    <author initials="J." surname="Schlyter" fullname="Jakob Schlyter">
      <organization>Kirei AB</organization>
      <address>
        <email>jakob@kirei.se</email>
      </address>
    </author>
    <author initials="G." surname="Bailey" fullname="Guillaume Bailey">
      <organization>Independent</organization>
      <address>
        <email>guillaumebailey@outlook.com</email>
      </address>
    </author>
    <author initials="P." surname="Hoffman" fullname="Paul Hoffman">
      <organization>ICANN</organization>
      <address>
        <email>paul.hoffman@icann.org</email>
      </address>
    </author>
    <date year="2024" month="July" day="08"/>
    <abstract>
      <?line 69?>

<t>The root zone of the Domain Name System (DNS) is
cryptographically signed using DNS Security Extensions (DNSSEC).</t>
      <t>In order to obtain secure answers from the root zone of the DNS using
DNSSEC, a client must configure a suitable trust anchor. 
This document describes the format and publication mechanisms IANA uses to distribute the DNSSEC trust anchors.</t>
      <t>This document obsoletes RFC 7958.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-dnsop-rfc7958bis/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/paulehoffman/draft-bash-rfc7958bis"/>.</t>
    </note>
  </front>
  <middle>
    <?line 80?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Domain Name System (DNS) is described in <xref target="RFC1034"/> and <xref target="RFC1035"/>.
DNS Security Extensions (DNSSEC) are described in <xref target="RFC9364"/>.</t>
      <t>In the DNSSEC protocol, Resource Record Sets (RRSets) are signed
cryptographically.  This means that a response to a query contains
signatures that allow the integrity and authenticity of the RRSet to
be verified.  DNSSEC signatures are validated by following a chain of
signatures to a "trust anchor".  The reason for trusting a trust
anchor is outside the DNSSEC protocol, but having one or more trust
anchors is required for the DNSSEC protocol to work.</t>
      <t>The publication of trust anchors for the root zone of the DNS is an
IANA function performed by ICANN, through its affiliate Public Technical Identifiers (PTI). A detailed description of
corresponding key management practices can be found in <xref target="DPS"/>.</t>
      <t>This document describes the formats and distribution methods of
DNSSEC trust anchors that is used by IANA for the root zone of
the DNS.  Other organizations might have different formats
and mechanisms for distributing DNSSEC trust anchors for the root
zone; however, most operators and software vendors have chosen to
rely on the IANA trust anchors.</t>
      <t>The formats and distribution methods described in this document are a
complement to, not a substitute for, the automated DNSSEC trust
anchor update protocol described in <xref target="RFC5011"/>.  That protocol allows
for secure in-band succession of trust anchors when trust has already
been established.  This document describes one way to establish an
initial trust anchor that can be used by RFC 5011.</t>
      <t>This document obsoletes <xref target="RFC7958"/>.</t>
      <section anchor="definitions">
        <name>Definitions</name>
        <t>The term "trust anchor" is used in many different contexts in the
security community.  Many of the common definitions conflict because
they are specific to a specific system, such as just for DNSSEC or
just for S/MIME messages.</t>
        <t>In cryptographic systems with hierarchical structure, a trust anchor
is an authoritative entity for which trust is assumed and not
derived.  The format of the entity differs in different systems, but
the basic idea, the decision to trust this entity is made outside of the system that relies on it,
is common to
all the common uses of the term "trust anchor".</t>
        <t>The root zone trust anchor formats published by IANA are defined in
<xref target="ta_formats"/>.  <xref target="RFC4033"/> defines a trust anchor as "A configured DNSKEY
RR or DS RR hash of a DNSKEY RR".  Note that the formats defined here
do not match the definition of "trust anchor" from <xref target="RFC4033"/>;
however, a system that wants to convert the trusted material from
IANA into a Delegation Signer (DS) RR can do so.</t>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
      <section anchor="changes-from-rfc-7958">
        <name>Changes from RFC 7958</name>
        <t>This version of the document includes the following changes:</t>
        <ul spacing="normal">
          <li>
            <t>There is a significant technical change from erratum 5932 &lt;https://www.rfc-editor.org/errata/eid5932&gt;.
This is in the seventh paragraph of <xref target="xml_semantics"/>.</t>
          </li>
          <li>
            <t>Added the optional public key element.</t>
          </li>
          <li>
            <t>Removed the certificates and certificate signing mechanisms.</t>
          </li>
          <li>
            <t>Removed the detached OpenPGP signature mechanism.</t>
          </li>
          <li>
            <t>The reference to the DNSSEC Practice Statement <xref target="DPS"/> was updated.</t>
          </li>
          <li>
            <t>Say explicitly that the XML documents might have XML comments in them.</t>
          </li>
          <li>
            <t>Clarified the use of the detached CMS signature.</t>
          </li>
          <li>
            <t>Added an IANA Considerations section.</t>
          </li>
          <li>
            <t>Simplified the description of using the validFrom and validUntil attributes.</t>
          </li>
          <li>
            <t>There was a bit of editorial cleanup.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="ta_formats">
      <name>IANA DNSSEC Root Zone Trust Anchor Format and Semantics</name>
      <t>IANA publishes trust anchors for the root zone as an XML document that contains the hashes of the DNSKEY records
and optionally the keys from the DNSKEY records.</t>
      <t>This format and the semantics associated are described in
the rest of this section.</t>
      <t>Note that the XML document can have XML comments.
For example, IANA might use these comments to add pointers to important information on the IANA web site.
XML comments are only used as human-readable commentary, not extensions to the grammar.</t>
      <t>The XML document contains a set of hashes for the DNSKEY records that
can be used to validate the root zone.  The hashes are consistent
with the defined presentation format of a DS resource.</t>
      <t>The XML document also can contain the keys from the DNSKEY records.
The keys are consistent with the defined presentation format of a DNSKEY resource.</t>
      <t>Note that the hashes are mandatory in the syntax, but the keys are optional.</t>
      <section anchor="xml_syntax">
        <name>XML Syntax</name>
        <t>A RELAX NG Compact Schema <xref target="RELAX-NG"/> for the documents used to
publish trust anchors is:</t>
        <artwork><![CDATA[
datatypes xsd = "http://www.w3.org/2001/XMLSchema-datatypes"

start = element TrustAnchor {
    attribute id { xsd:string },
    attribute source { xsd:string },
    element Zone { xsd:string },

    keydigest+
}

keydigest = element KeyDigest {
    attribute id { xsd:string },
    attribute validFrom { xsd:dateTime },
    attribute validUntil { xsd:dateTime }?,

    element KeyTag {
            xsd:nonNegativeInteger { maxInclusive = "65535" } },
    element Algorithm {
            xsd:nonNegativeInteger { maxInclusive = "255" } },
    element DigestType {
            xsd:nonNegativeInteger { maxInclusive = "255" } },
    element Digest { xsd:hexBinary },
    element PublicKey { xsd:base64Binary }?
}
]]></artwork>
      </section>
      <section anchor="xml_semantics">
        <name>XML Semantics</name>
        <t>The <tt>TrustAnchor</tt> element is the container for all of the trust anchors
in the file.</t>
        <t>The <tt>id</tt> attribute in the TrustAnchor element is an opaque string that
identifies the set of trust anchors.  Its value has no particular
semantics.  Note that the <tt>id</tt> element in the TrustAnchor element is
different than the <tt>id</tt> element in the KeyDigest element, described
below.</t>
        <t>The <tt>source</tt> attribute in the TrustAnchor element gives information
about where to obtain the TrustAnchor container.  It is likely to be
a URL and is advisory only.</t>
        <t>The Zone element in the TrustAnchor element states to which DNS zone
this container applies.  The root zone is indicated by a single
period (.) character without any quotation marks.</t>
        <t>The TrustAnchor element contains one or more KeyDigest elements.
Each KeyDigest element represents the digest of a past, current, or
potential future DNSKEY record of the zone defined in the Zone element.</t>
        <t>The <tt>id</tt> attribute in the KeyDigest element is an opaque string that
identifies the hash.
Note that the <tt>id</tt> element in the KeyDigest element is different than
the <tt>id</tt> element in the TrustAnchor element described above.</t>
        <t>The <tt>validFrom</tt> and <tt>validUntil</tt> attributes in the KeyDigest element specify
the range of times that the KeyDigest element can be used as a trust anchor.</t>
        <t>Note that the <tt>validUntil</tt> attribute of the KeyDigest element is optional.
If the relying party is using a trust anchor that has a KeyDigest element
that does not have a <tt>validUntil</tt> attribute, it can change to a trust anchor
with a KeyDigest element that does have a <tt>validUntil</tt> attribute,
as long as that trust anchor's <tt>validUntil</tt> attribute is in the future and the
DNSKEY elements of the KeyDigest are the same as the previous trust anchor.</t>
        <t>Relying parties <bcp14>SHOULD NOT</bcp14> use a KeyDigest outside of the time range given
in the <tt>validFrom</tt> and <tt>validUntil</tt> attributes.</t>
        <t>The KeyTag element in the KeyDigest element contains the key tag for
the DNSKEY record represented in this KeyDigest.</t>
        <t>The Algorithm element in the KeyDigest element contains the signing
algorithm identifier for the DNSKEY record represented in this
KeyDigest.</t>
        <t>The DigestType element in the KeyDigest element contains the digest
algorithm identifier for the DNSKEY record represented in this
KeyDigest.</t>
        <t>The Digest element in the KeyDigest element contains the hexadecimal
representation of the hash for the DNSKEY record represented in this
KeyDigest.</t>
        <t>The PublicKey element in the KeyDigest element contains the base64
representation of the public key represented in this KeyDigest.
The PublicKey is optional and is new in this version of the specification.
It can be useful when IANA has a trust anchor that has not yet been published
in the DNS root.</t>
      </section>
      <section anchor="conversion-example">
        <name>Converting from XML to DS Records</name>
        <t>The display format for the DS record that is the equivalent of a
KeyDigest element can be constructed by marshaling the KeyTag,
Algorithm, DigestType, and Digest elements.  For example, assume that
the TrustAnchor element contains:</t>
        <sourcecode type="XML"><![CDATA[
<?xml version="1.0" encoding="UTF-8"?>
<TrustAnchor
   id="AD42165F-3B1A-4778-8F42-D34A1D41FD93"
   source="http://data.iana.org/root-anchors/root-anchors.xml">
<Zone>.</Zone>
<KeyDigest id="Kjqmt7v" validFrom="2010-07-15T00:00:00+00:00">
<KeyTag>19036</KeyTag>
<Algorithm>8</Algorithm>
<DigestType>2</DigestType>
<Digest>
49AAC11D7B6F6446702E54A1607371607A1A41855200FD2CE1CDDE32F24E8FB5
</Digest>
<PublicKey>
AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjF
FVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoX
bfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaD
X6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpz
W5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relS
Qageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulq
QxA+Uk1ihz0=
</PublicKey>
</KeyDigest>
</TrustAnchor>
]]></sourcecode>
        <t>The DS record would be:</t>
        <sourcecode type="Zone"><![CDATA[
. IN DS 19036 8 2
   49AAC11D7B6F6446702E54A1607371607A1A41855200FD2CE1CDDE32F24E8FB5
]]></sourcecode>
      </section>
      <section anchor="converting-from-xml-to-dnskey-records">
        <name>Converting from XML to DNSKEY Records</name>
        <t>The display format for the DNSKEY record that is the equivalent of a KeyDigest element can be constructed by marshaling the
Algorithm and PublicKey elements with some constants.
For example, assume that the TrustAnchor element is the same as in <xref target="conversion-example"/>.
The DNSKEY record would be:</t>
        <sourcecode type="Zone"><![CDATA[
. IN DNSKEY 257 3 8
   AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjF
   FVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoX
   bfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaD
   X6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpz
   W5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relS
   Qageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulq
   QxA+Uk1ihz0=   
]]></sourcecode>
        <t>The published trust anchor does not provide values for DNSKEY protocol or flags.
For the purpose of this mechanism, clients can assume valid trust anchors will be have the ZONE and SEP flag bits set to 1.</t>
      </section>
      <section anchor="xml-example">
        <name>XML Example</name>
        <t>The following describes two fictitious trust anchors for the root zone.</t>
        <sourcecode type="XML"><![CDATA[
<?xml version="1.0" encoding="UTF-8"?>

<!-- Note that these trust anchors are fictitious. -->

<TrustAnchor
    id="AD42165F-B099-4778-8F42-D34A1D41FD93"
    source="http://data.iana.org/root-anchors/root-anchors.xml">
    <Zone>.</Zone>
    <KeyDigest id="42"
               validFrom="2010-07-01T00:00:00-00:00"
               validUntil="2010-08-01T00:00:00-00:00"> <!-- This key
    is no longer valid, since validUntil is in the past -->
        <KeyTag>34291</KeyTag>
        <Algorithm>5</Algorithm>
        <DigestType>1</DigestType>
        <Digest>c8cb3d7fe518835490af8029c23efbce6b6ef3e2</Digest>
    </KeyDigest>
    <KeyDigest id="53"
               validFrom="2010-08-01T00:00:00-00:00">
        <KeyTag>12345</KeyTag>
        <Algorithm>5</Algorithm>
        <DigestType>1</DigestType>
        <Digest>a3cf809dbdbc835716ba22bdc370d2efa50f21c7</Digest>
    </KeyDigest>
</TrustAnchor>
]]></sourcecode>
      </section>
    </section>
    <section anchor="retrieving">
      <name>Root Zone Trust Anchor Retrieval</name>
      <section anchor="retrieving-trust-anchors-with-https-and-http">
        <name>Retrieving Trust Anchors with HTTPS and HTTP</name>
        <t>Trust anchors are available for retrieval using HTTPS and HTTP.</t>
        <t>In this section, all URLs are given using the "https:" scheme.  If
HTTPS cannot be used, replace the "https:" scheme with "http:".</t>
        <t>The URL for retrieving the set of hashes in the XML file described in <xref target="ta_formats"/> is
&lt;https://data.iana.org/root-anchors/root-anchors.xml&gt;.</t>
      </section>
      <section anchor="trusting_anchors">
        <name>Accepting DNSSEC Trust Anchors</name>
        <t>A validator operator can choose whether or not to accept the trust
anchors described in this document using whatever policy they want.
In order to help validator operators verify the content and origin of
trust anchors they receive, IANA uses digital signatures that chain
to an ICANN-controlled Certificate Authority (CA) over the trust
anchor data.</t>
        <t>It is important to note that the ICANN CA is not a DNSSEC trust
anchor.  Instead, it is an optional mechanism for verifying the
content and origin of the XML and certificate trust anchors.</t>
        <t>The content and origin of the XML file can be verified using a
digital signature on the file.  IANA provides a detached
Cryptographic Message Syntax (CMS) <xref target="RFC5652"/> signature that chains to
the ICANN CA with the XML file.<br/>
This can be useful for validator operators who have received a copy
of the ICANN CA's public key in a trusted out-of-band fashion.
The URL for a detached CMS signature
for the XML file is
&lt;https://data.iana.org/root-anchors/root-anchors.p7s&gt;.</t>
        <t>Another method IANA uses to help validator operators verify the
content and origin of trust anchors they receive is to use the
Transport Layer Security (TLS) protocol for distributing the trust
anchors.  Currently, the CA used for data.iana.org is well known,
that is, one that is a WebTrust-accredited CA.  If a system
retrieving the trust anchors trusts the CA that IANA uses for the
"data.iana.org" web server, HTTPS <bcp14>SHOULD</bcp14> be used instead of HTTP in
order to have assurance of data origin.</t>
      </section>
      <section anchor="changes-in-the-trust-model-for-distribution">
        <name>Changes in the Trust Model for Distribution</name>
        <t>IANA used to distribute the trust anchors as a self-signed PGP message
and as a self-issued certificate signing request; this was described in <xref target="RFC7958"/>.
This document removes those methods because they relied on a trust model
that mixed out-of-band trust of authentication keys with out-of-band trust of the DNSSEC root keys.
Note, however, that cryptographic assurance for the contents of the trust anchor now
comes from the web PKI or the IANA CA as described in <xref target="trusting_anchors"/>.
This cryptographic assurance is bolstered by informal comparisons made by users of the
trust anchors, such as software vendors comparing the trust anchor files they are using.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document describes how DNSSEC trust anchors for the root zone of
the DNS are published.  Many DNSSEC clients will only configure IANA-issued
trust anchors for the DNS root to perform validation.  As a
consequence, reliable publication of trust anchors is important.</t>
      <t>This document aims to specify carefully the means by which such trust
anchors are published, with the goal of making it easier for those
trust anchors to be integrated into user environments.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>Each time IANA produces a new trust anchor,
it <bcp14>MUST</bcp14> publish that trust anchor using the format described in this document.</t>
      <t>IANA <bcp14>MAY</bcp14> delay the publication of a new trust anchor for operational reasons,
such as having a newly-created key in multiple facilities.</t>
      <t>When a trust anchor that was previously published is no longer suitable for use,
IANA <bcp14>MUST</bcp14> update the trust anchor document accordingly by setting a <tt>validUntil</tt> date for that trust anchor.
The <tt>validUntil</tt> attribute that is added <bcp14>MAY</bcp14> be a date in the past or in the future, depending on IANA's operational choices.</t>
      <t>More information about IANA's policies and procedures for how the cryptographic keys for the DNS root zone are managed
(also known as "DNSSEC Practice Statements" or "DPSs")
can be found at <eref target="https://www.iana.org/dnssec/procedures">https://www.iana.org/dnssec/procedures</eref>.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC1034">
          <front>
            <title>Domain names - concepts and facilities</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised basic definition of The Domain Name System. It obsoletes RFC-882. This memo describes the domain style names and their used for host address look up and electronic mail forwarding. It discusses the clients and servers in the domain name system and the protocol used between them.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1034"/>
          <seriesInfo name="DOI" value="10.17487/RFC1034"/>
        </reference>
        <reference anchor="RFC1035">
          <front>
            <title>Domain names - implementation and specification</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1035"/>
          <seriesInfo name="DOI" value="10.17487/RFC1035"/>
        </reference>
        <reference anchor="RFC4033">
          <front>
            <title>DNS Security Introduction and Requirements</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>The Domain Name System Security Extensions (DNSSEC) add data origin authentication and data integrity to the Domain Name System. This document introduces these extensions and describes their capabilities and limitations. This document also discusses the services that the DNS security extensions do and do not provide. Last, this document describes the interrelationships between the documents that collectively describe DNSSEC. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4033"/>
          <seriesInfo name="DOI" value="10.17487/RFC4033"/>
        </reference>
        <reference anchor="RFC5011">
          <front>
            <title>Automated Updates of DNS Security (DNSSEC) Trust Anchors</title>
            <author fullname="M. StJohns" initials="M." surname="StJohns"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>This document describes a means for automated, authenticated, and authorized updating of DNSSEC "trust anchors". The method provides protection against N-1 key compromises of N keys in the trust point key set. Based on the trust established by the presence of a current anchor, other anchors may be added at the same place in the hierarchy, and, ultimately, supplant the existing anchor(s).</t>
              <t>This mechanism will require changes to resolver management behavior (but not resolver resolution behavior), and the addition of a single flag bit to the DNSKEY record. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="74"/>
          <seriesInfo name="RFC" value="5011"/>
          <seriesInfo name="DOI" value="10.17487/RFC5011"/>
        </reference>
        <reference anchor="RFC5652">
          <front>
            <title>Cryptographic Message Syntax (CMS)</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the Cryptographic Message Syntax (CMS). This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="70"/>
          <seriesInfo name="RFC" value="5652"/>
          <seriesInfo name="DOI" value="10.17487/RFC5652"/>
        </reference>
        <reference anchor="RFC7958">
          <front>
            <title>DNSSEC Trust Anchor Publication for the Root Zone</title>
            <author fullname="J. Abley" initials="J." surname="Abley"/>
            <author fullname="J. Schlyter" initials="J." surname="Schlyter"/>
            <author fullname="G. Bailey" initials="G." surname="Bailey"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>The root zone of the Domain Name System (DNS) has been cryptographically signed using DNS Security Extensions (DNSSEC).</t>
              <t>In order to obtain secure answers from the root zone of the DNS using DNSSEC, a client must configure a suitable trust anchor. This document describes the format and publication mechanisms IANA has used to distribute the DNSSEC trust anchors.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7958"/>
          <seriesInfo name="DOI" value="10.17487/RFC7958"/>
        </reference>
        <reference anchor="RFC9364">
          <front>
            <title>DNS Security Extensions (DNSSEC)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>This document describes the DNS Security Extensions (commonly called "DNSSEC") that are specified in RFCs 4033, 4034, and 4035, as well as a handful of others. One purpose is to introduce all of the RFCs in one place so that the reader can understand the many aspects of DNSSEC. This document does not update any of those RFCs. A second purpose is to state that using DNSSEC for origin authentication of DNS data is the best current practice. A third purpose is to provide a single reference for other documents that want to refer to DNSSEC.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="237"/>
          <seriesInfo name="RFC" value="9364"/>
          <seriesInfo name="DOI" value="10.17487/RFC9364"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="DPS" target="https://www.iana.org/dnssec/procedures">
          <front>
            <title>DNSSEC Practice Statement for the Root Zone KSK Operator</title>
            <author>
              <organization>Root Zone KSK Operator Policy Management Authority</organization>
            </author>
            <date year="2020"/>
          </front>
        </reference>
        <reference anchor="RELAX-NG" target="https://www.oasis-open.org/committees/relax-ng/compact-20021121.html">
          <front>
            <title>RELAX NG Compact Syntax</title>
            <author initials="J." surname="Clark" fullname="James Clark">
              <organization/>
            </author>
            <date year="2002"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 472?>

<section anchor="historical-note">
      <name>Historical Note</name>
      <t>The first KSK for use in the root zone of the DNS was
generated at a key ceremony at the ICANN Key Management Facility
(KMF) in Culpeper, Virginia, USA on 2010-06-16.  This key
entered production during a second key ceremony held at an
ICANN KMF in El Segundo, California, USA on 2010-07-12.
The resulting trust anchor was first published on 2010-07-15.</t>
      <t>The second KSK for use in the root zone of the DNS was
generated at key ceremony #27 at the ICANN KMF in Culpeper, Virginia, USA on 2016-10-27.
This key entered production during key ceremony #28 held at
the ICANN KMF in El Segundo, California, USA on 2017-02-02.
The resulting trust anchor was first published on 2018-11-11.</t>
      <t>More information about the key ceremonies,
including full records of previous ceremonies and plans for future ceremonies,
can be found at &lt;https://www.iana.org/dnssec/ceremonies&gt;.</t>
    </section>
    <section anchor="acknowledgemwents">
      <name>Acknowledgemwents</name>
      <t>Many pioneers paved the way for the deployment of DNSSEC in the root
zone of the DNS, and the authors hereby acknowledge their substantial
collective contribution.</t>
      <t>RFC 7958 incorporated suggestions made by Alfred Hoenes and Russ
Housley, whose contributions are appreciated.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
