<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.18 (Ruby 3.3.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-dnsop-rfc7958bis-04" category="info" consensus="true" submissionType="IETF" obsoletes="7958" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.21.0 -->
  <front>
    <title abbrev="Root Zone Trust Anchor Publication">DNSSEC Trust Anchor Publication for the Root Zone</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-dnsop-rfc7958bis-04"/>
    <author initials="J." surname="Abley" fullname="Joe Abley">
      <organization>Cloudflare</organization>
      <address>
        <postal>
          <city>Amsterdam</city>
          <country>Netherlands</country>
        </postal>
        <email>jabley@cloudflare.com</email>
      </address>
    </author>
    <author initials="J." surname="Schlyter" fullname="Jakob Schlyter">
      <organization>Kirei AB</organization>
      <address>
        <email>jakob@kirei.se</email>
      </address>
    </author>
    <author initials="G." surname="Bailey" fullname="Guillaume Bailey">
      <organization>Independent</organization>
      <address>
        <email>guillaumebailey@outlook.com</email>
      </address>
    </author>
    <author initials="P." surname="Hoffman" fullname="Paul Hoffman">
      <organization>ICANN</organization>
      <address>
        <email>paul.hoffman@icann.org</email>
      </address>
    </author>
    <date year="2024" month="August" day="09"/>
    <abstract>
      <?line 70?>

<t>The root zone of the global Domain Name System (DNS) is
cryptographically signed using DNS Security Extensions (DNSSEC).</t>
      <t>In order to obtain secure answers from the root zone of the DNS using
DNSSEC, a client must configure a suitable trust anchor. 
This document describes the format and publication mechanisms IANA uses to distribute the DNSSEC trust anchors.</t>
      <t>This document obsoletes RFC 7958.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-dnsop-rfc7958bis/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/paulehoffman/draft-bash-rfc7958bis"/>.</t>
    </note>
  </front>
  <middle>
    <?line 81?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The global Domain Name System (DNS) is described in <xref target="RFC1034"/> and <xref target="RFC1035"/>.
DNS Security Extensions (DNSSEC) are described in <xref target="RFC9364"/>.</t>
      <t>In the DNSSEC protocol, Resource Record Sets (RRSets) are signed
cryptographically.  This means that a response to a query contains
signatures that allow the integrity and authenticity of the RRSet to
be verified.  DNSSEC signatures are validated by following a chain of
signatures to a "trust anchor".  The reason for trusting a trust
anchor is outside the DNSSEC protocol, but having one or more trust
anchors is required for the DNSSEC protocol to work.</t>
      <t>The publication of trust anchors for the root zone of the DNS is an
IANA function performed by ICANN, through its affiliate Public Technical Identifiers (PTI). A detailed description of
corresponding key management practices can be found in <xref target="DPS"/>.</t>
      <t>This document describes the formats and distribution methods of
DNSSEC trust anchors that is used by IANA for the root zone of
the DNS.  Other organizations might have different formats
and mechanisms for distributing DNSSEC trust anchors for the root
zone; however, most operators and software vendors have chosen to
rely on the IANA trust anchors.</t>
      <t>The formats and distribution methods described in this document are a
complement to, not a substitute for, the automated DNSSEC trust
anchor update protocol described in <xref target="RFC5011"/>.  That protocol allows
for secure in-band succession of trust anchors when trust has already
been established.  This document describes one way to establish an
initial trust anchor that can be used by RFC 5011.</t>
      <t>This document obsoletes <xref target="RFC7958"/>.</t>
      <section anchor="definitions">
        <name>Definitions</name>
        <t>The term "trust anchor" is used in many different contexts in the
security community.  Many of the common definitions conflict because
they are specific to a specific system, such as just for DNSSEC or
just for S/MIME messages.</t>
        <t>In cryptographic systems with hierarchical structure, a trust anchor
is an authoritative entity for which trust is assumed and not
derived.  The format of the entity differs in different systems, but
the basic idea, the decision to trust this entity is made outside of the system that relies on it,
is common to
all the common uses of the term "trust anchor".</t>
        <t>The root zone trust anchor formats published by IANA are defined in
<xref target="ta_formats"/>.  <xref target="RFC4033"/> defines a trust anchor as "A configured DNSKEY
RR or DS RR hash of a DNSKEY RR".  Note that the formats defined here
do not match the definition of "trust anchor" from <xref target="RFC4033"/>;
however, a system that wants to convert the trusted material from
IANA into a Delegation Signer (DS) RR can do so.</t>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
      <section anchor="changes-from-rfc-7958">
        <name>Changes from RFC 7958</name>
        <t>This version of the document includes the following changes:</t>
        <ul spacing="normal">
          <li>
            <t>There is a significant technical change from erratum 5932 &lt;https://www.rfc-editor.org/errata/eid5932&gt;.
This is in the seventh paragraph of <xref target="xml_semantics"/>.</t>
          </li>
          <li>
            <t>Added the optional public key element.</t>
          </li>
          <li>
            <t>Removed the certificates and certificate signing mechanisms.</t>
          </li>
          <li>
            <t>Removed the detached OpenPGP signature mechanism.</t>
          </li>
          <li>
            <t>The reference to the DNSSEC Practice Statement <xref target="DPS"/> was updated.</t>
          </li>
          <li>
            <t>Say explicitly that the XML documents might have XML comments in them.</t>
          </li>
          <li>
            <t>Clarified the use of the detached CMS signature.</t>
          </li>
          <li>
            <t>Updated the IANA Considerations section to indicate requirements on IANA.</t>
          </li>
          <li>
            <t>Simplified the description of using the validFrom and validUntil attributes.</t>
          </li>
          <li>
            <t>There was a bit of editorial cleanup.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="ta_formats">
      <name>IANA DNSSEC Root Zone Trust Anchor Format and Semantics</name>
      <t>IANA publishes trust anchors for the root zone as an XML document that contains the hashes of the DNSKEY records
and optionally the keys from the DNSKEY records.</t>
      <t>This format and the semantics associated are described in
the rest of this section.</t>
      <t>Note that the XML document can have XML comments.
For example, IANA might use these comments to add pointers to important information on the IANA web site.
XML comments are only used as human-readable commentary, not extensions to the grammar.</t>
      <t>The XML document contains a set of hashes for the DNSKEY records that
can be used to validate the root zone.  The hashes are consistent
with the defined presentation format of a DS resource.</t>
      <t>The XML document also can contain the keys from the DNSKEY records.
The keys are consistent with the defined presentation format of a DNSKEY resource.</t>
      <t>Note that the hashes are mandatory in the syntax, but the keys are optional.</t>
      <section anchor="xml_syntax">
        <name>XML Syntax</name>
        <t>A RELAX NG Compact Schema <xref target="RELAX-NG"/> for the documents used to
publish trust anchors is:</t>
        <artwork><![CDATA[
datatypes xsd = "http://www.w3.org/2001/XMLSchema-datatypes"

start = element TrustAnchor {
  attribute id { xsd:string },
  attribute source { xsd:string },
  element Zone { xsd:string },
  keydigest+
}

keydigest = element KeyDigest {
  attribute id { xsd:string },
  attribute validFrom { xsd:dateTime },
  attribute validUntil { xsd:dateTime }?,

  element KeyTag {
      xsd:nonNegativeInteger { maxInclusive = "65535" } },
  element Algorithm {
      xsd:nonNegativeInteger { maxInclusive = "255" } },
  element DigestType {
      xsd:nonNegativeInteger { maxInclusive = "255" } },
  element Digest { xsd:hexBinary },  
  publickeyinfo?
}

publickeyinfo =
  element PublicKey { xsd:base64Binary },
  element Flags {
     xsd:nonNegativeInteger { maxInclusive = "65535" } }
]]></artwork>
      </section>
      <section anchor="xml_semantics">
        <name>XML Semantics</name>
        <t>The <tt>TrustAnchor</tt> element is the container for all of the trust anchors
in the file.</t>
        <t>The <tt>id</tt> attribute in the TrustAnchor element is an opaque string that
identifies the set of trust anchors.  Its value has no particular
semantics.  Note that the <tt>id</tt> element in the TrustAnchor element is
different than the <tt>id</tt> element in the KeyDigest element, described
below.</t>
        <t>The <tt>source</tt> attribute in the TrustAnchor element gives information
about where to obtain the TrustAnchor container.  It is likely to be
a URL and is advisory only.</t>
        <t>The Zone element in the TrustAnchor element states to which DNS zone
this container applies.
The element is in presentation format as specified in <xref target="RFC1035"/>, including the trailing dot.
The root zone is indicated by a single
period (.) character without any quotation marks.</t>
        <t>The TrustAnchor element contains one or more KeyDigest elements.
Each KeyDigest element represents the digest of a past, current, or
potential future DNSKEY record of the zone defined in the Zone element.
The values for the elements in the KeyDigest element are defined in <xref target="RFC4034"/>.
The IANA registries for these values are described in <xref target="RFC9157"/>.</t>
        <t>The <tt>id</tt> attribute in the KeyDigest element is an opaque string that
identifies the hash.
Note that the <tt>id</tt> element in the KeyDigest element is different than
the <tt>id</tt> element in the TrustAnchor element described above.</t>
        <t>The <tt>validFrom</tt> and <tt>validUntil</tt> attributes in the KeyDigest element specify
the range of times that the KeyDigest element can be used as a trust anchor.</t>
        <t>Note that the <tt>validUntil</tt> attribute of the KeyDigest element is optional.
If the relying party is using a trust anchor that has a KeyDigest element
that does not have a <tt>validUntil</tt> attribute, it can change to a trust anchor
with a KeyDigest element that does have a <tt>validUntil</tt> attribute,
as long as that trust anchor's <tt>validUntil</tt> attribute is in the future and the
KeyTag, Algorithm, DigestType, and Digest elements of the KeyDigest are the same as the previous trust anchor.</t>
        <t>Relying parties <bcp14>SHOULD NOT</bcp14> use a KeyDigest outside of the time range given
in the <tt>validFrom</tt> and <tt>validUntil</tt> attributes.</t>
        <t>The KeyTag element in the KeyDigest element contains the key tag for
the DNSKEY record represented in this KeyDigest.</t>
        <t>The Algorithm element in the KeyDigest element contains the DNSSEC signing
algorithm identifier for the DNSKEY record represented in this
KeyDigest.</t>
        <t>The DigestType element in the KeyDigest element contains the DNSSEC digest
algorithm identifier for the DNSKEY record represented in this
KeyDigest.</t>
        <t>The Digest element in the KeyDigest element contains the hexadecimal
representation of the hash for the DNSKEY record represented in this
KeyDigest.</t>
        <t>The publickeyinfo named pattern in the KeyDigest element contains two mandatory elements:
the base64 representation of the public key for the DNSKEY record represented in this KeyDigest,
and the flags of the DNSKEY record represented in this KeyDigest.
The publickeyinfo named pattern is optional and is new in this version of the specification.
It can be useful when IANA has a trust anchor that has not yet been published
in the DNS root, and for calculating a comparison to the Digest element.</t>
      </section>
      <section anchor="xml-example">
        <name>XML Example</name>
        <t>The following is an example of what the trust anchor file might look like.
The full public key is only given for the trust anchor that does not have
a validFrom ttime in the past.</t>
        <sourcecode type="XML"><![CDATA[
<?xml version="1.0" encoding="UTF-8"?>
<TrustAnchor id="E9724F53-1851-4F86-85E5-F1392102940B"
  source="http://data.iana.org/root-anchors/root-anchors.xml">
  <Zone>.</Zone>
  <KeyDigest id="Kjqmt7v"
      validFrom="2010-07-15T00:00:00+00:00"
      validUntil="2019-01-11T00:00:00+00:00">  <!-- This key
      is no longer valid, since validUntil is in the past -->
    <KeyTag>19036</KeyTag>
    <Algorithm>8</Algorithm>
    <DigestType>2</DigestType>
    <Digest>
49AAC11D7B6F6446702E54A1607371607A1A41855200FD2CE1CDDE32F24E8FB5
    </Digest>
  </KeyDigest>
  <KeyDigest id="Klajeyz" validFrom="2017-02-02T00:00:00+00:00">
    <KeyTag>20326</KeyTag>
    <Algorithm>8</Algorithm>
    <DigestType>2</DigestType>
    <Digest>
E06D44B80B8F1D39A95C0B0D7C65D08458E880409BBC683457104237C7F8EC8D
    </Digest>
    <PublicKey>
      AwEAAaz/tAm8yTn4Mfeh5eyI96WSVexTBAvkMgJzkKTOiW1vkIbzxeF3+/4Rg
      WOq7HrxRixHlFlExOLAJr5emLvN7SWXgnLh4+B5xQlNVz8Og8kvArMtNROxVQ
      uCaSnIDdD5LKyWbRd2n9WGe2R8PzgCmr3EgVLrjyBxWezF0jLHwVN8efS3rCj
      /EWgvIWgb9tarpVUDK/b58Da+sqqls3eNbuv7pr+eoZG+SrDK6nWeL3c6H5Ap
      xz7LjVc1uTIdsIXxuOLYA4/ilBmSVIzuDWfdRUfhHdY6+cn8HFRm+2hM8AnXG
      Xws9555KrUB5qihylGa8subX2Nn6UwNR1AkUTV74bU=
    </PublicKey>
    <Flags>257</Flags>
  </KeyDigest>
</TrustAnchor>
]]></sourcecode>
        <t>The DS record derived from this example would be:</t>
        <sourcecode type="Zone"><![CDATA[
. IN DS 20326 8 2
   E06D44B80B8F1D39A95C0B0D7C65D08458E880409BBC683457104237C7F8EC8D
]]></sourcecode>
        <t>Note that this DS record set only has one record because the record that would have included
the key tag 19036 is already invalid based on the validUntil attribute's value.</t>
      </section>
    </section>
    <section anchor="retrieving">
      <name>Root Zone Trust Anchor Retrieval</name>
      <section anchor="retrieving-trust-anchors-with-https-and-http">
        <name>Retrieving Trust Anchors with HTTPS and HTTP</name>
        <t>Trust anchors are available for retrieval using HTTPS and HTTP.</t>
        <t>In this section, all URLs are given using the "https:" scheme.  If
HTTPS cannot be used, replace the "https:" scheme with "http:".</t>
        <t>The URL for retrieving the set of hashes in the XML file described in <xref target="ta_formats"/> is
&lt;https://data.iana.org/root-anchors/root-anchors.xml&gt;.</t>
      </section>
      <section anchor="trusting_anchors">
        <name>Accepting DNSSEC Trust Anchors</name>
        <t>A validator operator can choose whether or not to accept the trust
anchors described in this document using whatever policy they want.
In order to help validator operators verify the content and origin of
trust anchors they receive, IANA uses digital signatures that chain
to an ICANN-controlled Certificate Authority (CA) over the trust
anchor data.</t>
        <t>It is important to note that the ICANN CA is not a DNSSEC trust
anchor.  Instead, it is an optional mechanism for verifying the
content and origin of the XML and certificate trust anchors.</t>
        <t>The content and origin of the XML file can be verified using a
digital signature on the file.  IANA provides a detached
Cryptographic Message Syntax (CMS) <xref target="RFC5652"/> signature that chains to
the ICANN CA with the XML file.<br/>
This can be useful for validator operators who have received a copy
of the ICANN CA's public key in a trusted out-of-band fashion.
The URL for a detached CMS signature
for the XML file is
&lt;https://data.iana.org/root-anchors/root-anchors.p7s&gt;.</t>
        <t>Another method IANA uses to help validator operators verify the
content and origin of trust anchors they receive is to use the
Transport Layer Security (TLS) protocol for distributing the trust
anchors.  Currently, the CA used for data.iana.org is well known,
that is, one that is a WebTrust-accredited CA.  If a system
retrieving the trust anchors trusts the CA that IANA uses for the
"data.iana.org" web server, HTTPS <bcp14>SHOULD</bcp14> be used instead of HTTP in
order to have assurance of data origin.</t>
        <t>A KeyDigest element can contain both a Digest and a publickeyinfo named pattern.
If the Digest element would not be a proper DS record for a DNSKEY record represented by the publickeyinfo named pattern,
relying parties <bcp14>MUST NOT</bcp14> use that KeyDigest as a trust anchor.</t>
      </section>
      <section anchor="changes-in-the-trust-model-for-distribution">
        <name>Changes in the Trust Model for Distribution</name>
        <t>IANA used to distribute the trust anchors as a self-signed PGP message
and as a self-issued certificate signing request; this was described in <xref target="RFC7958"/>.
This document removes those methods because they relied on a trust model
that mixed out-of-band trust of authentication keys with out-of-band trust of the DNSSEC root keys.
Note, however, that cryptographic assurance for the contents of the trust anchor now
comes from the web PKI or the IANA CA as described in <xref target="trusting_anchors"/>.
This cryptographic assurance is bolstered by informal comparisons made by users of the
trust anchors, such as software vendors comparing the trust anchor files they are using.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document describes how DNSSEC trust anchors for the root zone of
the DNS are published.  Many DNSSEC clients will only configure IANA-issued
trust anchors for the DNS root to perform validation.  As a
consequence, reliable publication of trust anchors is important.</t>
      <t>This document aims to specify carefully the means by which such trust
anchors are published, with the goal of making it easier for those
trust anchors to be integrated into user environments.
Some of the methods described (such as accessing over the web
with or without verifying the signature on the file) have different security properties;
users of the trust anchor file need to consider these when choosing whether to load the set of trust anchors.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>Each time IANA produces a new trust anchor,
it <bcp14>MUST</bcp14> publish that trust anchor using the format described in this document.</t>
      <t>IANA <bcp14>MAY</bcp14> delay the publication of a new trust anchor for operational reasons,
such as having a newly-created key in multiple facilities.</t>
      <t>When a trust anchor that was previously published is no longer suitable for use,
IANA <bcp14>MUST</bcp14> update the trust anchor document accordingly by setting a <tt>validUntil</tt> date for that trust anchor.
The <tt>validUntil</tt> attribute that is added <bcp14>MAY</bcp14> be a date in the past or in the future, depending on IANA's operational choices.</t>
      <t>More information about IANA's policies and procedures for how the cryptographic keys for the DNS root zone are managed
(also known as "DNSSEC Practice Statements" or "DPSs")
can be found at <eref target="https://www.iana.org/dnssec/procedures">https://www.iana.org/dnssec/procedures</eref>.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC1034">
          <front>
            <title>Domain names - concepts and facilities</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised basic definition of The Domain Name System. It obsoletes RFC-882. This memo describes the domain style names and their used for host address look up and electronic mail forwarding. It discusses the clients and servers in the domain name system and the protocol used between them.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1034"/>
          <seriesInfo name="DOI" value="10.17487/RFC1034"/>
        </reference>
        <reference anchor="RFC1035">
          <front>
            <title>Domain names - implementation and specification</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1035"/>
          <seriesInfo name="DOI" value="10.17487/RFC1035"/>
        </reference>
        <reference anchor="RFC4033">
          <front>
            <title>DNS Security Introduction and Requirements</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>The Domain Name System Security Extensions (DNSSEC) add data origin authentication and data integrity to the Domain Name System. This document introduces these extensions and describes their capabilities and limitations. This document also discusses the services that the DNS security extensions do and do not provide. Last, this document describes the interrelationships between the documents that collectively describe DNSSEC. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4033"/>
          <seriesInfo name="DOI" value="10.17487/RFC4033"/>
        </reference>
        <reference anchor="RFC4034">
          <front>
            <title>Resource Records for the DNS Security Extensions</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of resource records and protocol modifications that provide source authentication for the DNS. This document defines the public key (DNSKEY), delegation signer (DS), resource record digital signature (RRSIG), and authenticated denial of existence (NSEC) resource records. The purpose and format of each resource record is described in detail, and an example of each resource record is given.</t>
              <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4034"/>
          <seriesInfo name="DOI" value="10.17487/RFC4034"/>
        </reference>
        <reference anchor="RFC5011">
          <front>
            <title>Automated Updates of DNS Security (DNSSEC) Trust Anchors</title>
            <author fullname="M. StJohns" initials="M." surname="StJohns"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>This document describes a means for automated, authenticated, and authorized updating of DNSSEC "trust anchors". The method provides protection against N-1 key compromises of N keys in the trust point key set. Based on the trust established by the presence of a current anchor, other anchors may be added at the same place in the hierarchy, and, ultimately, supplant the existing anchor(s).</t>
              <t>This mechanism will require changes to resolver management behavior (but not resolver resolution behavior), and the addition of a single flag bit to the DNSKEY record. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="74"/>
          <seriesInfo name="RFC" value="5011"/>
          <seriesInfo name="DOI" value="10.17487/RFC5011"/>
        </reference>
        <reference anchor="RFC5652">
          <front>
            <title>Cryptographic Message Syntax (CMS)</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the Cryptographic Message Syntax (CMS). This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="70"/>
          <seriesInfo name="RFC" value="5652"/>
          <seriesInfo name="DOI" value="10.17487/RFC5652"/>
        </reference>
        <reference anchor="RFC7958">
          <front>
            <title>DNSSEC Trust Anchor Publication for the Root Zone</title>
            <author fullname="J. Abley" initials="J." surname="Abley"/>
            <author fullname="J. Schlyter" initials="J." surname="Schlyter"/>
            <author fullname="G. Bailey" initials="G." surname="Bailey"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>The root zone of the Domain Name System (DNS) has been cryptographically signed using DNS Security Extensions (DNSSEC).</t>
              <t>In order to obtain secure answers from the root zone of the DNS using DNSSEC, a client must configure a suitable trust anchor. This document describes the format and publication mechanisms IANA has used to distribute the DNSSEC trust anchors.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7958"/>
          <seriesInfo name="DOI" value="10.17487/RFC7958"/>
        </reference>
        <reference anchor="RFC9157">
          <front>
            <title>Revised IANA Considerations for DNSSEC</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>This document changes the review requirements needed to get DNSSEC algorithms and resource records added to IANA registries. It updates RFC 6014 to include hash algorithms for Delegation Signer (DS) records and NextSECure version 3 (NSEC3) parameters (for Hashed Authenticated Denial of Existence). It also updates RFCs 5155 and 6014, which have requirements for DNSSEC algorithms, and updates RFC 8624 to clarify the implementation recommendation related to the algorithms described in RFCs that are not on the standards track. The rationale for these changes is to bring the requirements for DS records and hash algorithms used in NSEC3 in line with the requirements for all other DNSSEC algorithms.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9157"/>
          <seriesInfo name="DOI" value="10.17487/RFC9157"/>
        </reference>
        <reference anchor="RFC9364">
          <front>
            <title>DNS Security Extensions (DNSSEC)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>This document describes the DNS Security Extensions (commonly called "DNSSEC") that are specified in RFCs 4033, 4034, and 4035, as well as a handful of others. One purpose is to introduce all of the RFCs in one place so that the reader can understand the many aspects of DNSSEC. This document does not update any of those RFCs. A second purpose is to state that using DNSSEC for origin authentication of DNS data is the best current practice. A third purpose is to provide a single reference for other documents that want to refer to DNSSEC.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="237"/>
          <seriesInfo name="RFC" value="9364"/>
          <seriesInfo name="DOI" value="10.17487/RFC9364"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="DPS" target="https://www.iana.org/dnssec/procedures">
          <front>
            <title>DNSSEC Practice Statement for the Root Zone KSK Operator</title>
            <author>
              <organization>Root Zone KSK Operator Policy Management Authority</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RELAX-NG" target="https://www.oasis-open.org/committees/relax-ng/compact-20021121.html">
          <front>
            <title>RELAX NG Compact Syntax</title>
            <author initials="J." surname="Clark" fullname="James Clark">
              <organization/>
            </author>
            <date year="2002"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 449?>

<section anchor="historical-note">
      <name>Historical Note</name>
      <t>The first KSK for use in the root zone of the DNS was
generated at a key ceremony at the ICANN Key Management Facility
(KMF) in Culpeper, Virginia, USA on 2010-06-16.  This key
entered production during a second key ceremony held at an
ICANN KMF in El Segundo, California, USA on 2010-07-12.
The resulting trust anchor was first published on 2010-07-15.</t>
      <t>The second KSK for use in the root zone of the DNS was
generated at key ceremony #27 at the ICANN KMF in Culpeper, Virginia, USA on 2016-10-27.
This key entered production during key ceremony #28 held at
the ICANN KMF in El Segundo, California, USA on 2017-02-02.
The resulting trust anchor was first published on 2018-11-11.</t>
      <t>More information about the key ceremonies,
including full records of previous ceremonies and plans for future ceremonies,
can be found at &lt;https://www.iana.org/dnssec/ceremonies&gt;.</t>
    </section>
    <section anchor="acknowledgemwents">
      <name>Acknowledgemwents</name>
      <t>Many pioneers paved the way for the deployment of DNSSEC in the root
zone of the DNS, and the authors hereby acknowledge their substantial
collective contribution.</t>
      <t>RFC 7958 incorporated suggestions made by Alfred Hoenes and Russ
Housley, whose contributions are appreciated.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
