<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.7) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

<!ENTITY RFC3110 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3110.xml">
<!ENTITY RFC4033 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4033.xml">
<!ENTITY RFC4034 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4034.xml">
<!ENTITY RFC4035 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4035.xml">
<!ENTITY RFC4509 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4509.xml">
<!ENTITY RFC5155 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5155.xml">
<!ENTITY RFC5702 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5702.xml">
<!ENTITY RFC6840 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6840.xml">
<!ENTITY RFC2065 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2065.xml">
<!ENTITY RFC2535 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2535.xml">
<!ENTITY RFC2536 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2536.xml">
<!ENTITY RFC4470 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4470.xml">
<!ENTITY RFC5011 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5011.xml">
<!ENTITY RFC6014 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6014.xml">
<!ENTITY RFC6605 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6605.xml">
<!ENTITY RFC6698 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6698.xml">
<!ENTITY RFC6725 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6725.xml">
<!ENTITY RFC6781 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6781.xml">
<!ENTITY RFC6975 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6975.xml">
<!ENTITY RFC7129 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7129.xml">
<!ENTITY RFC7344 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7344.xml">
<!ENTITY RFC7583 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7583.xml">
<!ENTITY RFC7646 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7646.xml">
<!ENTITY RFC8027 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8027.xml">
<!ENTITY RFC8078 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8078.xml">
<!ENTITY RFC8080 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8080.xml">
<!ENTITY RFC8145 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8145.xml">
<!ENTITY RFC8198 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8198.xml">
<!ENTITY RFC8509 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8509.xml">
<!ENTITY RFC8901 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8901.xml">
<!ENTITY RFC9077 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9077.xml">
<!ENTITY RFC9157 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9157.xml">
<!ENTITY RFC9276 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9276.xml">
<!ENTITY RFC9499 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9499.xml">
<!ENTITY RFC9558 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9558.xml">
<!ENTITY RFC9615 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9615.xml">
<!ENTITY RFC9718 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9718.xml">
<!ENTITY RFC9824 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9824.xml">
<!ENTITY RFC9904 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9904.xml">
<!ENTITY RFC9905 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9905.xml">
<!ENTITY RFC9906 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9906.xml">
<!ENTITY I-D.ietf-dnsop-cds-consistency SYSTEM "https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-dnsop-cds-consistency.xml">
<!ENTITY I-D.ietf-dnsop-ds-automation SYSTEM "https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-dnsop-ds-automation.xml">
]>


<rfc ipr="trust200902" docName="draft-hoffman-rfc9364bis-02" category="bcp" consensus="true" submissionType="IETF" obsoletes="9364">
  <front>
    <title abbrev="DNSSEC">DNS Security Extensions (DNSSEC)</title>

    <author initials="P." surname="Hoffman" fullname="Paul Hoffman">
      <organization>ICANN</organization>
      <address>
        <email>paul.hoffman@icann.org</email>
      </address>
    </author>

    <date year="2025" month="November" day="30"/>

    
    
    

    <abstract>


<?line 64?>

<t>This document describes the DNS Security Extensions (commonly called
"DNSSEC") that are specified in RFCs 4033, 4034, and 4035, as well as
a handful of others.  One purpose is to introduce all of the RFCs in
one place so that the reader can understand the many aspects of
DNSSEC.  This document does not update any of those RFCs.  A second
purpose is to state that using DNSSEC for origin authentication of
DNS data is the best current practice.  A third purpose is to provide
a single reference for other documents that want to refer to DNSSEC.</t>

<t>This document obsoletes RFC 9364.</t>

<t>This document is being tracked at (https://github.com/paulehoffman/rfc9364bis).</t>



    </abstract>



  </front>

  <middle>


<?line 79?>

<section anchor="introduction"><name>Introduction</name>

<t>The core specification for what we know as DNSSEC (the combination of
<xref target="RFC4033"/>, <xref target="RFC4034"/>, and <xref target="RFC4035"/>) describes a set of protocols
that provide origin authentication of DNS data.  <xref target="RFC6840"/> updates
and extends those core RFCs but does not fundamentally change the way
that DNSSEC works.</t>

<t>This document lists RFCs that should be considered by someone
creating an implementation of, or someone deploying, DNSSEC as it is
currently standardized.  Although an effort was made to be thorough,
the reader should not assume this list is comprehensive.  It uses
terminology from those documents without defining that terminology.
It also points to the relevant IANA registry groups that relate to
DNSSEC.  It does not, however, point to standards that rely on zones
needing to be signed by DNSSEC, such as DNS-Based Authentication of
Named Entities (DANE) <xref target="RFC6698"/>.</t>

<section anchor="dnssec-as-a-best-current-practice"><name>DNSSEC as a Best Current Practice</name>

<t>Using the DNSSEC set of protocols is the best current practice for
adding origin authentication of DNS data.  To date, no Standards
Track RFCs offer any other method for such origin authentication of
data in the DNS.</t>

<t>More than 15 years after the DNSSEC specification was published, it
is still not widely deployed.  Recent estimates are that fewer than
10% of the domain names used for websites are signed, and only around
a third of queries go to recursive resolvers that validate.  However,
this low level of deployment does not affect whether using DNSSEC is
a best current practice; it just indicates that the value of
deploying DNSSEC is often considered lower than the cost.
Nonetheless, the significant deployment of DNSSEC beneath some top-
level domains (TLDs) and the near-universal deployment of DNSSEC for
the TLDs in the DNS root zone demonstrate that DNSSEC is applicable
for implementation by both ordinary and highly sophisticated domain
owners.</t>

</section>
<section anchor="implementing-dnssec"><name>Implementing DNSSEC</name>

<t>Developers of validating resolvers and authoritative servers, as well
as operators of validating resolvers and authoritative servers, need
to know the parts of the DNSSEC protocol that would affect them.
They should read the DNSSEC core documents and probably at least be
familiar with the extensions.  Developers will probably need to be
very familiar with the algorithm documents as well.</t>

<t>As a side note, some of the DNSSEC-related RFCs have significant
errata, so reading the RFCs should also include looking for the
related errata.</t>

</section>
</section>
<section anchor="dnssec-core-documents"><name>DNSSEC Core Documents</name>

<t>What we refer to as "DNSSEC" is the third iteration of the DNSSEC
specification; <xref target="RFC2065"/> was the first, and <xref target="RFC2535"/> was the second.
Earlier iterations have not been deployed on a significant scale.
Throughout this document, "DNSSEC" means the protocol initially
defined in <xref target="RFC4033"/>, <xref target="RFC4034"/>, and <xref target="RFC4035"/>.</t>

<t>The three initial core documents generally cover different topics:</t>

<t><list style="symbols">
  <t><xref target="RFC4033"/> is an overview of DNSSEC, including how it might change
the resolution of DNS queries.</t>
  <t><xref target="RFC4034"/> specifies the DNS resource records used in DNSSEC.  It
obsoletes many RFCs about earlier versions of DNSSEC.</t>
  <t><xref target="RFC4035"/> covers the modifications to the DNS protocol incurred by
DNSSEC.  These include signing zones, serving signed zones,
resolving in light of DNSSEC, and authenticating DNSSEC-signed
data.</t>
</list></t>

<t>At the time this set of core documents was published, someone could
create a DNSSEC implementation of signing software, of a DNSSEC-aware
authoritative server, and/or of a DNSSEC-aware recursive resolver
from the three core documents, plus a few older RFCs specifying the
cryptography used.  Those two older documents are the following:</t>

<t><list style="symbols">
  <t><xref target="RFC2536"/> defines how to use the DSA signature algorithm (although
it refers to other documents for the details).  DSA was thinly
implemented and can safely be ignored by DNSSEC implementations.</t>
  <t><xref target="RFC3110"/> defines how to use the RSA signature algorithm (although
refers to other documents for the details).  RSA is still among
the most popular signing algorithms for DNSSEC.</t>
</list></t>

<t>It is important to note that later RFCs update the core documents.
As just one example, <xref target="RFC9077"/> changes how TTL values are calculated
in DNSSEC processing.</t>

<section anchor="addition-to-the-dnssec-core"><name>Addition to the DNSSEC Core</name>

<t>As with any major protocol, developers and operators discovered
issues with the original core documents over the years.  <xref target="RFC6840"/> is
an omnibus update to the original core documents and thus itself has
become a core document.  In addition to covering new requirements
from new DNSSEC RFCs, it describes many important security and
interoperability issues that arose during the deployment of the
initial specifications, particularly after the DNS root was signed in
2010.  It also lists some errors in the examples of the core
specifications.</t>

<t><xref target="RFC6840"/> brings a few additions into the core of DNSSEC.  It makes
NSEC3 <xref target="RFC5155"/> as much a part of DNSSEC as NSEC is.  It also makes
the SHA-256 and SHA-512 hash functions defined in <xref target="RFC4509"/> and
<xref target="RFC5702"/> part of the core.</t>

</section>
</section>
<section anchor="additional-cryptographic-algorithms-and-dnssec"><name>Additional Cryptographic Algorithms and DNSSEC</name>

<t>Current cryptographic algorithms typically weaken over time as
computing power improves and new cryptoanalysis emerges.  Two new
signing algorithms have been adopted by the DNSSEC community:
Elliptic Curve Digital Signature Algorithm (ECDSA) <xref target="RFC6605"/> and
Edwards-curve Digital Signature Algorithm (EdDSA) <xref target="RFC8080"/>.  ECDSA
and EdDSA have become very popular signing algorithms in recent
years.  The GOST signing algorithm <xref target="RFC9558"/> was also adopted but
has seen very limited use, likely because it is a national algorithm
specific to a very small number of countries;
<xref target="RFC9906"/> deprecated its use.</t>

<t>Implementation developers who want to know which algorithms to
implement in DNSSEC software should refer to <xref target="RFC9904"/>.  Note that
this specification is only about what algorithms should and should
not be included in implementations, i.e., it is not advice about
which algorithms zone operators should or should not use for signing,
nor which algorithms recursive resolver operators should or should
not use for validation.</t>

<t><xref target="RFC9905"/> updates <xref target="RFC4034"/> and <xref target="RFC4035"/>.</t>

</section>
<section anchor="extensions-to-dnssec"><name>Extensions to DNSSEC</name>

<t>The DNSSEC community has extended the DNSSEC core and the
cryptographic algorithms, both in terms of describing good
operational practices and in new protocols.  Some of the RFCs that
describe these extensions include the following:</t>

<t><list style="symbols">
  <t><xref target="RFC5011"/> describes a method to help resolvers update their DNSSEC
trust anchors in an automated fashion.  This method was used in
2018 to update the DNS root trust anchor.</t>
  <t><xref target="RFC6781"/> is a compendium of operational practices that may not be
obvious from reading just the core specifications.</t>
  <t><xref target="RFC7344"/> describes using the CDS and CDNSKEY resource records to
help automate the maintenance of DS records in the parents of
signed zones.
(This document is being updated by <xref target="I-D.ietf-dnsop-cds-consistency"/> in the DNSOP Working Group.)</t>
  <t><xref target="RFC8078"/> extends <xref target="RFC7344"/> by showing how to do initial setup of
trusted relationships between signed parent and child zones.</t>
  <t><xref target="RFC8198"/> describes how a validating resolver can emit fewer
queries in signed zones that use NSEC and NSEC3 for negative
caching.</t>
  <t><xref target="RFC9077"/> updates <xref target="RFC8198"/> with respect to the TTL fields in
signed records.</t>
  <t><xref target="RFC9824"/> "describes a technique to generate a signed DNS response
on demand for a nonexistent name by claiming that the name exists but
doesn't have any data for the queried record type".</t>
</list></t>

</section>
<section anchor="additional-documents-of-interest"><name>Additional Documents of Interest</name>

<t>The documents listed above constitute the core of DNSSEC, the
additional cryptographic algorithms, and the major extensions to
DNSSEC.  This section lists some additional documents that someone
interested in implementing or operating DNSSEC might find of value:</t>

<t><list style="symbols">
  <t><xref target="RFC4470"/> "describes how to construct DNSSEC NSEC resource records
that cover a smaller range of names than called for by <xref target="RFC4034"/>.
By generating and signing these records on demand, authoritative
name servers can effectively stop the disclosure of zone contents
otherwise made possible by walking the chain of NSEC records in a
signed zone".</t>
  <t><xref target="RFC6975"/> "specifies a way for validating end-system resolvers to
signal to a server which digital signature and hash algorithms
they support".</t>
  <t><xref target="RFC7129"/> "provides additional background commentary and some
context for the NSEC and NSEC3 mechanisms used by DNSSEC to
provide authenticated denial-of-existence responses".  This
background is particularly important for understanding NSEC and
NSEC3 usage.</t>
  <t><xref target="RFC7583"/> "describes the issues surrounding the timing of events
in the rolling of a key in a DNSSEC-secured zone".</t>
  <t><xref target="RFC7646"/> "defines Negative Trust Anchors (NTAs), which can be
used to mitigate DNSSEC validation failures by disabling DNSSEC
validation at specified domains".</t>
  <t><xref target="RFC8027"/> "describes problems that a Validating DNS resolver,
stub-resolver, or application might run into within a non-
compliant infrastructure".</t>
  <t><xref target="RFC8145"/> "specifies two different ways for validating resolvers
to signal to a server which keys are referenced in their chain of
trust".</t>
  <t><xref target="RFC9499"/> contains lists of terminology used when talking about
DNS; Sections 10 and 11 cover DNSSEC.</t>
  <t><xref target="RFC8509"/> "specifies a mechanism that will allow an end user and
third parties to determine the trusted key state for the root key
of the resolvers that handle that user's DNS queries".</t>
  <t><xref target="RFC8901"/> "presents deployment models that accommodate this
scenario [when each DNS provider independently signs zone data
with their own keys] and describes these key-management
requirements".</t>
  <t><xref target="RFC9276"/> "provides guidance on setting NSEC3 parameters based on
recent operational deployment experience".</t>
  <t><xref target="RFC9615"/> "allows managed DNS operators to securely announce
DNSSEC key parameters for zones under their management, including for
zones that are not currently securely delegated".</t>
  <t><xref target="RFC9718"/> "describes the format and publication mechanisms IANA
has used to distribute the DNSSEC trust anchors".</t>
</list></t>

<t>There will certainly be other RFCs related to DNSSEC that are
published after this one.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>IANA already has three registry groups that relate to DNSSEC:</t>

<t><list style="symbols">
  <t><eref target="https://www.iana.org/assignments/dns-sec-alg-numbers">DNSSEC algorithm numbers</eref></t>
  <t><eref target="https://www.iana.org/assignments/dnssec-nsec3-parameters">DNSSEC NSEC3 parameters</eref></t>
  <t><eref target="https://www.iana.org/assignments/ds-rr-types">DNSSEC DS RRtype digest algorithms</eref></t>
</list></t>

<t>The rules for the DNSSEC algorithm registry were set in the core RFCs
and updated by <xref target="RFC6014"/>, <xref target="RFC6725"/>, and <xref target="RFC9157"/>.</t>

<t><xref target="RFC9904"/> updates <xref target="RFC9157"/>.</t>

<t>This document does not update or create any registry groups or
registries.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>All of the security considerations from all of the RFCs referenced in
this document apply here.</t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">

&RFC3110;
&RFC4033;
&RFC4034;
&RFC4035;
&RFC4509;
&RFC5155;
&RFC5702;
&RFC6840;


    </references>

    <references title='Informative References' anchor="sec-informative-references">

&RFC2065;
&RFC2535;
&RFC2536;
&RFC4470;
&RFC5011;
&RFC6014;
&RFC6605;
&RFC6698;
&RFC6725;
&RFC6781;
&RFC6975;
&RFC7129;
&RFC7344;
&RFC7583;
&RFC7646;
&RFC8027;
&RFC8078;
&RFC8080;
&RFC8145;
&RFC8198;
&RFC8509;
&RFC8901;
&RFC9077;
&RFC9157;
&RFC9276;
&RFC9499;
&RFC9558;
&RFC9615;
&RFC9718;
&RFC9824;
&RFC9904;
&RFC9905;
&RFC9906;
&I-D.ietf-dnsop-cds-consistency;
&I-D.ietf-dnsop-ds-automation;


    </references>

</references>


<?line 308?>

<section anchor="changes-since-rfc-9364"><name>Changes Since RFC 9364</name>

<t>This document obsoletes RFC 9364, which is BCP 237.
The changes from that document are:</t>

<t><list style="symbols">
  <t><xref target="RFC9558"/> was added to this document</t>
  <t>RFC 7958 became <xref target="RFC9718"/></t>
  <t>RFC 8499 became <xref target="RFC9499"/></t>
  <t>RFC 8624 became <xref target="RFC9904"/></t>
  <t><xref target="RFC9615"/> was added to this document</t>
  <t>Added <xref target="RFC9824"/></t>
  <t>Added <xref target="RFC9905"/></t>
  <t>Added <xref target="RFC9906"/></t>
</list></t>

<t>The following drafts are currently in the DNSOP Working Group and will likley progress to later become RFCs:</t>

<t><list style="symbols">
  <t><xref target="I-D.ietf-dnsop-cds-consistency"/>, "Clarifications on CDS/CDNSKEY and CSYNC Consistency", which updates <xref target="RFC7344"/>.</t>
  <t><xref target="I-D.ietf-dnsop-ds-automation"/>, "Operational Recommendations for DS Automation"</t>
</list></t>

</section>
<section anchor="acknowledgements"><name>Acknowledgements</name>

<t>The DNS world owes a depth of gratitude to the authors and other
contributors to the core DNSSEC documents and to the notable DNSSEC
extensions.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

