<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.25 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-bash-rfc7958bis-00" category="info" submissionType="independent" obsoletes="7958" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="Root Zone Trust Anchor Publication">DNSSEC Trust Anchor Publication for the Root Zone</title>

    <author initials="J." surname="Abley" fullname="Joe Abley">
      <organization>Cloudflare</organization>
      <address>
        <postal>
          <city>Amsterdam</city>
          <country>Netherlands</country>
        </postal>
        <email>jabley@cloudflare.com</email>
      </address>
    </author>
    <author initials="J." surname="Schlyter" fullname="Jakob Schlyter">
      <organization>Kirei AB</organization>
      <address>
        <email>jakob@kirei.se</email>
      </address>
    </author>
    <author initials="G." surname="Bailey" fullname="Guillaume Bailey">
      <organization>Independent</organization>
      <address>
        <email>guillaumebailey@outlook.com</email>
      </address>
    </author>
    <author initials="P." surname="Hoffman" fullname="Paul Hoffman">
      <organization>ICANN</organization>
      <address>
        <email>paul.hoffman@icann.org</email>
      </address>
    </author>

    <date year="2023" month="March" day="13"/>

    
    
    <keyword>Internet-Draft</keyword>

    <abstract>


<!-- Notes for co-authors

PH: There was discussion in the algorithm rollover design team about adding comments to the XML file.
We know that developers read the file, and the comments could be helpful to them to understand things like
where they can find out more information about the future rollover.

PH: I would like to re-open the discussion of whether IANA should be publishing the PKIX and CSR files,
and when. Duane Wessels has charts that show that some resolvers are using the future trust anchor
keys before they are published in the root zone. That could happen if they pull the keys from the
key ceremony records, but it could also happen if IANA publishes the keys in the PKIX and CSR files.

PH: Appendix A needs to be filled in with the actual steps that happened for KSK 2017.

PH: Maybe get rid of the two figure numbers because they aren't used everywhere and they
are not referenced except for right above the figures.

PH: Make the wording the present active tense throughout.
For example, "is cryptographically signed" instead of "has been cryptographically signed".

-->

<t>The root zone of the Domain Name System (DNS) has been
cryptographically signed using DNS Security Extensions (DNSSEC).</t>

<t>In order to obtain secure answers from the root zone of the DNS using
DNSSEC, a client must configure a suitable trust anchor.  This
document describes the format and publication mechanisms IANA has
used to distribute the DNSSEC trust anchors.</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>The Domain Name System (DNS) is described in <xref target="RFC1034"/> and <xref target="RFC1035"/>.
DNS Security Extensions (DNSSEC) are described in <xref target="RFC9364"/>.</t>

<t>In the DNSSEC protocol, Resource Record Sets (RRSets) are signed
cryptographically.  This means that a response to a query contains
signatures that allow the integrity and authenticity of the RRSet to
be verified.  DNSSEC signatures are validated by following a chain of
signatures to a "trust anchor".  The reason for trusting a trust
anchor is outside the DNSSEC protocol, but having one or more trust
anchors is required for the DNSSEC protocol to work.</t>

<t>The publication of trust anchors for the root zone of the DNS is an
IANA function performed by ICANN.  A detailed description of
corresponding key management practices can be found in <xref target="DPS"/>, which
can be retrieved from the IANA Repository at
&lt;https://www.iana.org/dnssec/&gt;.</t>

<t>This document describes the formats and distribution methods of
DNSSEC trust anchors that have been used by IANA for the root zone of
the DNS since 2010.  Other organizations might have different formats
and mechanisms for distributing DNSSEC trust anchors for the root
zone; however, most operators and software vendors have chosen to
rely on the IANA trust anchors.</t>

<t>The formats and distribution methods described in this document are a
complement to, not a substitute for, the automated DNSSEC trust
anchor update protocol described in <xref target="RFC5011"/>.  That protocol allows
for secure in-band succession of trust anchors when trust has already
been established.  This document describes one way to establish an
initial trust anchor that can be used by RFC 5011.</t>

<section anchor="definitions"><name>Definitions</name>

<t>The term "trust anchor" is used in many different contexts in the
security community.  Many of the common definitions conflict because
they are specific to a specific system, such as just for DNSSEC or
just for S/MIME messages.</t>

<t>In cryptographic systems with hierarchical structure, a trust anchor
is an authoritative entity for which trust is assumed and not
derived.  The format of the entity differs in different systems, but
the basic idea, that trust is assumed and not derived, is common to
all the common uses of the term "trust anchor".</t>

<t>The root zone trust anchor formats published by IANA are defined in
<xref target="ta_formats"/>.  <xref target="RFC4033"/> defines a trust anchor as "A configured DNSKEY
RR or DS RR hash of a DNSKEY RR".  Note that the formats defined here
do not match the definition of "trust anchor" from <xref target="RFC4033"/>;
however, a system that wants to convert the trusted material from
IANA into a Delegation Signer (DS) RR can do so.</t>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

</section>
<section anchor="changes-from-rfc-7958"><name>Changes from RFC 7958</name>

<t>This version of the document includes the following changes:</t>

<t><list style="symbols">
  <t>There is a signficant technical change from erratum 5932 &lt;https://www.rfc-editor.org/errata/eid5932&gt;.
This is in the seventh paragraph of <xref target="xml_semantics"/>.</t>
  <t>The reference to the DNSSEC Practice Statement <xref target="DPS"/> was updated.</t>
</list></t>

</section>
</section>
<section anchor="ta_formats"><name>IANA DNSSEC Root Zone Trust Anchor Formats and Semantics</name>

<t>IANA publishes trust anchors for the root zone in three formats:</t>

<t><list style="symbols">
  <t>an XML document that contains the hashes of the DNSKEY records</t>
  <t>certificates in PKIX format <xref target="RFC5280"/> that contain DS records and
the full public key of DNSKEY records</t>
  <t>Certificate Signing Requests (CSRs) in PKCS #10 format <xref target="RFC2986"/>
that contain DS records and the full public key of DNSKEY records</t>
</list></t>

<t>These formats and the semantics associated with each are described in
the rest of this section.</t>

<section anchor="hashes"><name>Hashes in XML</name>

<t>The XML document contains a set of hashes for the DNSKEY records that
can be used to validate the root zone.  The hashes are consistent
with the defined presentation format of DS resource .</t>

<section anchor="xml_syntax"><name>XML Syntax</name>

<t>A RELAX NG Compact Schema <xref target="RELAX-NG"/> for the documents used to
publish trust anchors is given in Figure 1.</t>

<figure><artwork><![CDATA[
datatypes xsd = "http://www.w3.org/2001/XMLSchema-datatypes"

start = element TrustAnchor {
    attribute id { xsd:string },
    attribute source { xsd:string },
    element Zone { xsd:string },

    keydigest+
}

keydigest = element KeyDigest {
    attribute id { xsd:string },
    attribute validFrom { xsd:dateTime },
    attribute validUntil { xsd:dateTime }?,

    element KeyTag {
            xsd:nonNegativeInteger { maxInclusive = "65535" } },
    element Algorithm {
            xsd:nonNegativeInteger { maxInclusive = "255" } },
    element DigestType {
            xsd:nonNegativeInteger { maxInclusive = "255" } },
    element Digest { xsd:hexBinary }
}
                           Figure 1
]]></artwork></figure>

</section>
<section anchor="xml_semantics"><name>XML Semantics</name>

<t>The TrustAnchor element is the container for all of the trust anchors
in the file.</t>

<t>The id attribute in the TrustAnchor element is an opaque string that
identifies the set of trust anchors.  Its value has no particular
semantics.  Note that the id element in the TrustAnchor element is
different than the id element in the KeyDigest element, described
below.</t>

<t>The source attribute in the TrustAnchor element gives information
about where to obtain the TrustAnchor container.  It is likely to be
a URL and is advisory only.</t>

<t>The Zone element in the TrustAnchor element states to which DNS zone
this container applies.  The root zone is indicated by a single
period (.) character without any quotation marks.</t>

<t>The TrustAnchor element contains one or more KeyDigest elements.
Each KeyDigest element represents the digest of a DNSKEY record in
the zone defined in the Zone element.</t>

<t>The id attribute in the KeyDigest element is an opaque string that
identifies the hash.  Its value is used in the file names and URI of
the other trust anchor formats.  This is described in <xref target="retrieving"/>.
For example, if the value of the id attribute in the KeyDigest
element is "Kjqmt7v", the URI for the CSR that is associated with
this hash will be &lt;https://data.iana.org/root-anchors/Kjqmt7v.csr&gt;.
Note that the id element in the KeyDigest element is different than
the id element in the TrustAnchor element described above.</t>

<t>The validFrom and validUntil attributes in the KeyDigest element specify
the range of times that the KeyDigest element can be used as a trust anchor.
Note that the validUntil attribute of the KeyDigest element is optional.
If the relying party is using a trust anchor that has a KeyDigest element
that does not have a validUntil attribute, it can change to a trust anchor
with a KeyDigest element that does have a validUntil attribute,
as long as that trust anchor's validUntil attribute is in the future and the
DNSKEY elements of the KeyDigest are the same as the previous trust anchor.
Relying parties <bcp14>SHOULD NOT</bcp14> use a KeyDigest outside of the time range given
in the validFrom and validUntil attributes.</t>

<t>The KeyTag element in the KeyDigest element contains the key tag for
the DNSKEY record represented in this KeyDigest.</t>

<t>The Algorithm element in the KeyDigest element contains the signing
algorithm identifier for the DNSKEY record represented in this
KeyDigest.</t>

<t>The DigestType element in the KeyDigest element contains the digest
algorithm identifier for the DNSKEY record represented in this
KeyDigest.</t>

<t>The Digest element in the KeyDigest element contains the hexadecimal
representation of the hash for the DNSKEY record represented in this
KeyDigest.</t>

</section>
<section anchor="converting-from-xml-to-ds-records"><name>Converting from XML to DS Records</name>

<t>The display format for the DS record that is the equivalent of a
KeyDigest element can be constructed by marshaling the KeyTag,
Algorithm, DigestType, and Digest elements.  For example, assume that
the TrustAnchor element contains:</t>

<figure><artwork><![CDATA[
<?xml version="1.0" encoding="UTF-8"?>
<TrustAnchor
   id="AD42165F-3B1A-4778-8F42-D34A1D41FD93"
   source="http://data.iana.org/root-anchors/root-anchors.xml">
<Zone>.</Zone>
<KeyDigest id="Kjqmt7v" validFrom="2010-07-15T00:00:00+00:00">
<KeyTag>19036</KeyTag>
<Algorithm>8</Algorithm>
<DigestType>2</DigestType>
<Digest>
49AAC11D7B6F6446702E54A1607371607A1A41855200FD2CE1CDDE32F24E8FB5
</Digest>
</KeyDigest>
</TrustAnchor>
]]></artwork></figure>

<t>The DS record would be:</t>

<figure><artwork><![CDATA[
. IN DS 19036 8 2
   49AAC11D7B6F6446702E54A1607371607A1A41855200FD2CE1CDDE32F24E8FB5
]]></artwork></figure>

</section>
<section anchor="xml-example"><name>XML Example</name>

<t>Figure 2 describes two fictitious trust anchors for the root zone.</t>

<figure><artwork><![CDATA[
<?xml version="1.0" encoding="UTF-8"?>

<TrustAnchor
    id="AD42165F-B099-4778-8F42-D34A1D41FD93"
    source="http://data.iana.org/root-anchors/root-anchors.xml">
    <Zone>.</Zone>
    <KeyDigest id="42"
               validFrom="2010-07-01T00:00:00-00:00"
               validUntil="2010-08-01T00:00:00-00:00">
        <KeyTag>34291</KeyTag>
        <Algorithm>5</Algorithm>
        <DigestType>1</DigestType>
        <Digest>c8cb3d7fe518835490af8029c23efbce6b6ef3e2</Digest>
    </KeyDigest>
    <KeyDigest id="53"
               validFrom="2010-08-01T00:00:00-00:00">
        <KeyTag>12345</KeyTag>
        <Algorithm>5</Algorithm>
        <DigestType>1</DigestType>
        <Digest>a3cf809dbdbc835716ba22bdc370d2efa50f21c7</Digest>
    </KeyDigest>
</TrustAnchor>

                           Figure 2
]]></artwork></figure>

</section>
</section>
<section anchor="certs"><name>Certificates</name>

<t>Each public key that can be used as a trust anchor is represented as
a certificate in PKIX format.  Each certificate is signed by the
ICANN certificate authority.  The SubjectPublicKeyInfo in the
certificate represents the public key of the Key Signing Key (KSK).
The Subject field has the following attributes:</t>

<dl>
  <dt>O:</dt>
  <dd>
    <t>the string "ICANN".</t>
  </dd>
  <dt>OU:</dt>
  <dd>
    <t>the string "IANA".</t>
  </dd>
  <dt>CN:</dt>
  <dd>
    <t>the string "Root Zone KSK" followed by the time and date of key
generation in the format specified in <xref target="RFC3339"/>.  For example, a
CN might be "Root Zone KSK 2010-06-16T21:19:24+00:00".</t>
  </dd>
  <dt>resourceRecord:</dt>
  <dd>
    <t>a string in the presentation format of the DS resource record for the DNSSEC public key.</t>
  </dd>
</dl>

<t>The "resourceRecord" attribute in the Subject is defined as follows:</t>

<figure><artwork><![CDATA[
ResourceRecord
  { iso(1) identified-organization(3) dod(6) internet(1) security(5)
    mechanisms(5) pkix(7) id-mod(0) id-mod-dns-resource-record(70) }

DEFINITIONS IMPLICIT TAGS ::=

BEGIN

-- EXPORTS ALL --

IMPORTS

caseIgnoreMatch FROM SelectedAttributeTypes
    { joint-iso-itu-t ds(5) module(1) selectedAttributeTypes(5) 4 }

;

iana OBJECT IDENTIFIER ::= { iso(1) identified-organization(3)
    dod(6) internet(1) private(4) enterprise(1) 1000 }

iana-dns OBJECT IDENTIFIER ::= { iana 53 }

resourceRecord ATTRIBUTE ::= {
    WITH SYNTAX IA5String
    EQUALITY MATCHING RULE caseIgnoreMatch
    ID iana-dns
}

END

]]></artwork></figure>

</section>
<section anchor="certificate-signing-requests"><name>Certificate Signing Requests</name>

<t>Each public key that can be used as a trust anchor is represented as
a CSR in PKCS #10 format.  The SubjectPublicKeyInfo and Subject field
are the same as for certificates (see <xref target="certs"/> above).</t>

</section>
</section>
<section anchor="retrieving"><name>Root Zone Trust Anchor Retrieval</name>

<section anchor="retrieving-trust-anchors-with-https-and-http"><name>Retrieving Trust Anchors with HTTPS and HTTP</name>

<t>Trust anchors are available for retrieval using HTTPS and HTTP.</t>

<t>In this section, all URLs are given using the "https:" scheme.  If
HTTPS cannot be used, replace the "https:" scheme with "http:".</t>

<t>The URL for retrieving the set of hashes described in <xref target="hashes"/> is
&lt;https://data.iana.org/root-anchors/root-anchors.xml&gt;.</t>

<t>The URL for retrieving the PKIX certificate described in <xref target="xml_syntax"/>
is &lt;https://data.iana.org/root-anchors/KEYDIGEST-ID.crt&gt;, with the
string "KEYDIGEST-ID" replacing the "id" attribute from the KeyDigest
element from the XML file, as described in <xref target="xml_semantics"/>.</t>

<t>The URL for retrieving the CSR described in <xref target="certs"/> is
&lt;https://data.iana.org/root-anchors/KEYDIGEST-ID.csr&gt;, with the
string "KEYDIGEST-ID" replacing the "id" attribute from the KeyDigest
element from the XML file, as described in <xref target="xml_semantics"/>.</t>

</section>
</section>
<section anchor="trusting_anchors"><name>Accepting DNSSEC Trust Anchors</name>

<t>A validator operator can choose whether or not to accept the trust
anchors described in this document using whatever policy they want.
In order to help validator operators verify the content and origin of
trust anchors they receive, IANA uses digital signatures that chain
to an ICANN-controlled Certificate Authority (CA) over the trust
anchor data.</t>

<t>It is important to note that the ICANN CA is not a DNSSEC trust
anchor.  Instead, it is an optional mechanism for verifying the
content and origin of the XML and certificate trust anchors.  It is
also important to note that the ICANN CA cannot be used to verify the
origin of the trust anchor in the CSR format.</t>

<t>The content and origin of the XML file can be verified using a
digital signature on the file.  IANA provides a detached
Cryptographic Message Syntax (CMS) <xref target="RFC5652"/> signature that chains to
the ICANN CA with the XML file.  The URL for a detached CMS signature
for the XML file is
&lt;https://data.iana.org/root-anchors/root-anchors.p7s&gt;.</t>

<t>[ Need to check with IANA on the paragraph below ]</t>

<t>(IANA also provided a detached OpenPGP <xref target="RFC4880"/> signature as a
second parallel verification mechanism for the first trust anchor
publication but has indicated that it will not use this parallel
mechanism in the future.)</t>

<t>Another method IANA uses to help validator operators verify the
content and origin of trust anchors they receive is to use the
Transport Layer Security (TLS) protocol for distributing the trust
anchors.  Currently, the CA used for data.iana.org is well known,
that is, one that is a WebTrust-accredited CA.  If a system
retrieving the trust anchors trusts the CA that IANA uses for the
"data.iana.org" web server, HTTPS <bcp14>SHOULD</bcp14> be used instead of HTTP in
order to have assurance of data origin.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document defines id-mod-dns-resource-record, value 70 (see
<xref target="certs"/>), in the "SMI Security for PKIX Module Identifier"
registry.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>This document describes how DNSSEC trust anchors for the root zone of
the DNS are published.  Many DNSSEC clients will only configure IANA-
issued trust anchors for the DNS root to perform validation.  As a
consequence, reliable publication of trust anchors is important.</t>

<t>This document aims to specify carefully the means by which such trust
anchors are published, with the goal of making it easier for those
trust anchors to be integrated into user environments.</t>

</section>


  </middle>

  <back>


    <references title='Normative References'>





<reference anchor='RFC1034'>
<front>
<title>Domain names - concepts and facilities</title>
<author fullname='P. Mockapetris' initials='P.' surname='Mockapetris'><organization/></author>
<date month='November' year='1987'/>
<abstract><t>This RFC is the revised basic definition of The Domain Name System.  It obsoletes RFC-882.  This memo describes the domain style names and their used for host address look up and electronic mail forwarding.  It discusses the clients and servers in the domain name system and the protocol used between them.</t></abstract>
</front>
<seriesInfo name='STD' value='13'/>
<seriesInfo name='RFC' value='1034'/>
<seriesInfo name='DOI' value='10.17487/RFC1034'/>
</reference>



<reference anchor='RFC1035'>
<front>
<title>Domain names - implementation and specification</title>
<author fullname='P. Mockapetris' initials='P.' surname='Mockapetris'><organization/></author>
<date month='November' year='1987'/>
<abstract><t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System.  It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t></abstract>
</front>
<seriesInfo name='STD' value='13'/>
<seriesInfo name='RFC' value='1035'/>
<seriesInfo name='DOI' value='10.17487/RFC1035'/>
</reference>



<reference anchor='RFC2986'>
<front>
<title>PKCS #10: Certification Request Syntax Specification Version 1.7</title>
<author fullname='M. Nystrom' initials='M.' surname='Nystrom'><organization/></author>
<author fullname='B. Kaliski' initials='B.' surname='Kaliski'><organization/></author>
<date month='November' year='2000'/>
<abstract><t>This memo represents a republication of PKCS #10 v1.7 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, and change control is retained within the PKCS process.  The body of this document, except for the security considerations section, is taken directly from the PKCS #9 v2.0 or the PKCS #10 v1.7 document.  This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name='RFC' value='2986'/>
<seriesInfo name='DOI' value='10.17487/RFC2986'/>
</reference>



<reference anchor='RFC3339'>
<front>
<title>Date and Time on the Internet: Timestamps</title>
<author fullname='G. Klyne' initials='G.' surname='Klyne'><organization/></author>
<author fullname='C. Newman' initials='C.' surname='Newman'><organization/></author>
<date month='July' year='2002'/>
<abstract><t>This document defines a date and time format for use in Internet protocols that is a profile of the ISO 8601 standard for representation of dates and times using the Gregorian calendar.</t></abstract>
</front>
<seriesInfo name='RFC' value='3339'/>
<seriesInfo name='DOI' value='10.17487/RFC3339'/>
</reference>



<reference anchor='RFC4033'>
<front>
<title>DNS Security Introduction and Requirements</title>
<author fullname='R. Arends' initials='R.' surname='Arends'><organization/></author>
<author fullname='R. Austein' initials='R.' surname='Austein'><organization/></author>
<author fullname='M. Larson' initials='M.' surname='Larson'><organization/></author>
<author fullname='D. Massey' initials='D.' surname='Massey'><organization/></author>
<author fullname='S. Rose' initials='S.' surname='Rose'><organization/></author>
<date month='March' year='2005'/>
<abstract><t>The Domain Name System Security Extensions (DNSSEC) add data origin authentication and data integrity to the Domain Name System.  This document introduces these extensions and describes their capabilities and limitations.  This document also discusses the services that the DNS security extensions do and do not provide.  Last, this document describes the interrelationships between the documents that collectively describe DNSSEC.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4033'/>
<seriesInfo name='DOI' value='10.17487/RFC4033'/>
</reference>



<reference anchor='RFC5011'>
<front>
<title>Automated Updates of DNS Security (DNSSEC) Trust Anchors</title>
<author fullname='M. StJohns' initials='M.' surname='StJohns'><organization/></author>
<date month='September' year='2007'/>
<abstract><t>This document describes a means for automated, authenticated, and authorized updating of DNSSEC &quot;trust anchors&quot;.  The method provides protection against N-1 key compromises of N keys in the trust point key set.  Based on the trust established by the presence of a current anchor, other anchors may be added at the same place in the hierarchy, and, ultimately, supplant the existing anchor(s).</t><t>This mechanism will require changes to resolver management behavior (but not resolver resolution behavior), and the addition of a single flag bit to the DNSKEY record.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='74'/>
<seriesInfo name='RFC' value='5011'/>
<seriesInfo name='DOI' value='10.17487/RFC5011'/>
</reference>



<reference anchor='RFC5280'>
<front>
<title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
<author fullname='D. Cooper' initials='D.' surname='Cooper'><organization/></author>
<author fullname='S. Santesson' initials='S.' surname='Santesson'><organization/></author>
<author fullname='S. Farrell' initials='S.' surname='Farrell'><organization/></author>
<author fullname='S. Boeyen' initials='S.' surname='Boeyen'><organization/></author>
<author fullname='R. Housley' initials='R.' surname='Housley'><organization/></author>
<author fullname='W. Polk' initials='W.' surname='Polk'><organization/></author>
<date month='May' year='2008'/>
<abstract><t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5280'/>
<seriesInfo name='DOI' value='10.17487/RFC5280'/>
</reference>



<reference anchor='RFC5652'>
<front>
<title>Cryptographic Message Syntax (CMS)</title>
<author fullname='R. Housley' initials='R.' surname='Housley'><organization/></author>
<date month='September' year='2009'/>
<abstract><t>This document describes the Cryptographic Message Syntax (CMS).  This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='70'/>
<seriesInfo name='RFC' value='5652'/>
<seriesInfo name='DOI' value='10.17487/RFC5652'/>
</reference>



<reference anchor='RFC9364'>
<front>
<title>DNS Security Extensions (DNSSEC)</title>
<author fullname='P. Hoffman' initials='P.' surname='Hoffman'><organization/></author>
<date month='February' year='2023'/>
<abstract><t>This document describes the DNS Security Extensions (commonly called &quot;DNSSEC&quot;) that are specified in RFCs 4033, 4034, and 4035, as well as a handful of others. One purpose is to introduce all of the RFCs in one place so that the reader can understand the many aspects of DNSSEC. This document does not update any of those RFCs. A second purpose is to state that using DNSSEC for origin authentication of DNS data is the best current practice. A third purpose is to provide a single reference for other documents that want to refer to DNSSEC.</t></abstract>
</front>
<seriesInfo name='BCP' value='237'/>
<seriesInfo name='RFC' value='9364'/>
<seriesInfo name='DOI' value='10.17487/RFC9364'/>
</reference>



<reference anchor='RFC2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='March' year='1997'/>
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor='RFC8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author fullname='B. Leiba' initials='B.' surname='Leiba'><organization/></author>
<date month='May' year='2017'/>
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>




    </references>

    <references title='Informative References'>





<reference anchor='RFC4880'>
<front>
<title>OpenPGP Message Format</title>
<author fullname='J. Callas' initials='J.' surname='Callas'><organization/></author>
<author fullname='L. Donnerhacke' initials='L.' surname='Donnerhacke'><organization/></author>
<author fullname='H. Finney' initials='H.' surname='Finney'><organization/></author>
<author fullname='D. Shaw' initials='D.' surname='Shaw'><organization/></author>
<author fullname='R. Thayer' initials='R.' surname='Thayer'><organization/></author>
<date month='November' year='2007'/>
<abstract><t>This document is maintained in order to publish all necessary information needed to develop interoperable applications based on the OpenPGP format.  It is not a step-by-step cookbook for writing an application.  It describes only the format and methods needed to read, check, generate, and write conforming packets crossing any network.  It does not deal with storage and implementation questions. It does, however, discuss implementation issues necessary to avoid security flaws.</t><t>OpenPGP software uses a combination of strong public-key and symmetric cryptography to provide security services for electronic communications and data storage.  These services include confidentiality, key management, authentication, and digital signatures.  This document specifies the message formats used in OpenPGP.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4880'/>
<seriesInfo name='DOI' value='10.17487/RFC4880'/>
</reference>


<reference anchor="DPS" target="https://www.iana.org/dnssec/procedures/ksk-operator/ksk-dps-20201104.html">
  <front>
    <title>DNSSEC Practice Statement for the Root Zone KSK Operator</title>
    <author >
      <organization>Root Zone KSK Operator Policy Management Authority</organization>
    </author>
    <date year="2020"/>
  </front>
</reference>
<reference anchor="RELAX-NG" target="https://www.oasis-open.org/committees/relax-ng/compact-20021121.html">
  <front>
    <title>RELAX NG Compact Syntax</title>
    <author initials="J." surname="Clark" fullname="James Clark">
      <organization></organization>
    </author>
    <date year="2002"/>
  </front>
</reference>


    </references>


<section anchor="historical-note"><name>Historical Note</name>

<t>The first KSK for use in the root zone of the DNS was
generated at a key ceremony at an ICANN Key Management Facility
(KMF) in Culpeper, Virginia, USA on 2010-06-16.  This key
entered production during a second key ceremony held at an
ICANN KMF in El Segundo, California, USA on 2010-07-12.
The resulting trust anchor was first published on 2010-07-15.</t>

<t>The second KSK for use in the root zone of the DNS was
[ MORE GOES HERE ].</t>

</section>
<section anchor="acknowledgemwents"><name>Acknowledgemwents</name>

<t>Many pioneers paved the way for the deployment of DNSSEC in the root
zone of the DNS, and the authors hereby acknowledge their substantial
collective contribution.</t>

<t>This document incorporates suggestions made by Alfred Hoenes and Russ
Housley, whose contributions are appreciated.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

