<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 4.0.1) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

<!ENTITY RFC3110 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3110.xml">
<!ENTITY RFC4033 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4033.xml">
<!ENTITY RFC4034 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4034.xml">
<!ENTITY RFC4035 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4035.xml">
<!ENTITY RFC4509 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4509.xml">
<!ENTITY RFC5155 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5155.xml">
<!ENTITY RFC5702 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5702.xml">
<!ENTITY RFC6840 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6840.xml">
<!ENTITY RFC2065 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2065.xml">
<!ENTITY RFC2535 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2535.xml">
<!ENTITY RFC2536 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2536.xml">
<!ENTITY RFC4470 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4470.xml">
<!ENTITY RFC5011 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5011.xml">
<!ENTITY RFC6014 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6014.xml">
<!ENTITY RFC6605 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6605.xml">
<!ENTITY RFC6698 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6698.xml">
<!ENTITY RFC6725 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6725.xml">
<!ENTITY RFC6781 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6781.xml">
<!ENTITY RFC6975 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6975.xml">
<!ENTITY RFC7129 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7129.xml">
<!ENTITY RFC7344 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7344.xml">
<!ENTITY RFC7583 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7583.xml">
<!ENTITY RFC7646 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7646.xml">
<!ENTITY RFC8027 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8027.xml">
<!ENTITY RFC8078 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8078.xml">
<!ENTITY RFC8080 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8080.xml">
<!ENTITY RFC8145 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8145.xml">
<!ENTITY RFC8198 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8198.xml">
<!ENTITY RFC8509 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8509.xml">
<!ENTITY RFC8901 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8901.xml">
<!ENTITY RFC9077 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9077.xml">
<!ENTITY RFC9157 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9157.xml">
<!ENTITY RFC9276 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9276.xml">
<!ENTITY RFC9499 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9499.xml">
<!ENTITY RFC9558 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9558.xml">
<!ENTITY RFC9615 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9615.xml">
<!ENTITY RFC9718 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9718.xml">
<!ENTITY RFC9824 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9824.xml">
<!ENTITY RFC9859 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9859.xml">
<!ENTITY RFC9904 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9904.xml">
<!ENTITY RFC9905 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9905.xml">
<!ENTITY RFC9906 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9906.xml">
<!ENTITY I-D.ietf-dnsop-cds-consistency SYSTEM "https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-dnsop-cds-consistency.xml">
<!ENTITY I-D.ietf-dnsop-ds-automation SYSTEM "https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-dnsop-ds-automation.xml">
]>


<rfc ipr="trust200902" docName="draft-ietf-dnsop-rfc9364bis-00" category="bcp" consensus="true" submissionType="IETF" obsoletes="9364">
  <front>
    <title abbrev="DNSSEC">DNS Security Extensions (DNSSEC)</title>

    <author initials="P." surname="Hoffman" fullname="Paul Hoffman">
      <organization>ICANN</organization>
      <address>
        <email>paul.hoffman@icann.org</email>
      </address>
    </author>

    <date year="2026" month="February" day="13"/>

    
    
    

    <abstract>


<?line 65?>

<t>This document describes the DNS Security Extensions (commonly called
"DNSSEC") that are specified in RFCs 4033, 4034, and 4035, as well as
a handful of others.  One purpose is to introduce all of the RFCs in
one place so that the reader can understand the many aspects of
DNSSEC.  This document does not update any of those RFCs.  A second
purpose is to state that using DNSSEC for origin authentication of
DNS data is the best current practice.  A third purpose is to provide
a single reference for other documents that want to refer to DNSSEC.</t>

<t>This document obsoletes RFC 9364.</t>

<t>This document is being tracked at (https://github.com/paulehoffman/rfc9364bis).</t>



    </abstract>



  </front>

  <middle>


<?line 80?>

<section anchor="introduction"><name>Introduction</name>

<t>The core specification for what we know as DNSSEC (the combination of
<xref target="RFC4033"/>, <xref target="RFC4034"/>, and <xref target="RFC4035"/>) describes a set of protocols
that provide origin authentication of DNS data.  <xref target="RFC6840"/> updates
and extends those core RFCs but does not fundamentally change the way
that DNSSEC works.</t>

<t>This document lists RFCs that should be considered by someone
creating an implementation of, or someone deploying, DNSSEC as it is
currently standardized.  Although an effort was made to be thorough,
the reader should not assume this list is comprehensive.  It uses
terminology from those documents without defining that terminology.
It also points to the relevant IANA registry groups that relate to
DNSSEC.  It does not, however, point to standards that rely on zones
needing to be signed by DNSSEC, such as DNS-Based Authentication of
Named Entities (DANE) <xref target="RFC6698"/>.</t>

<section anchor="dnssec-as-a-best-current-practice"><name>DNSSEC as a Best Current Practice</name>

<t>Using the DNSSEC set of protocols is the best current practice for
adding origin authentication of DNS data.  To date, no Standards
Track RFCs offer any other method for such origin authentication of
data in the DNS.</t>

<t>More than 15 years after the DNSSEC specification was published, it
is still not widely deployed.  Recent estimates are that fewer than
10% of the domain names used for websites are signed, and only around
a third of queries go to recursive resolvers that validate.  However,
this low level of deployment does not affect whether using DNSSEC is
a best current practice; it just indicates that the value of
deploying DNSSEC is often considered lower than the cost.
Nonetheless, the significant deployment of DNSSEC beneath some top-
level domains (TLDs) and the near-universal deployment of DNSSEC for
the TLDs in the DNS root zone demonstrate that DNSSEC is applicable
for implementation by both ordinary and highly sophisticated domain
owners.</t>

</section>
<section anchor="implementing-dnssec"><name>Implementing DNSSEC</name>

<t>Developers of validating resolvers and authoritative servers, as well
as operators of validating resolvers and authoritative servers, need
to know the parts of the DNSSEC protocol that would affect them.
They should read the DNSSEC core documents and probably at least be
familiar with the extensions.  Developers will probably need to be
very familiar with the algorithm documents as well.</t>

<t>As a side note, some of the DNSSEC-related RFCs have significant
errata, so reading the RFCs should also include looking for the
related errata.</t>

</section>
</section>
<section anchor="dnssec-core-documents"><name>DNSSEC Core Documents</name>

<t>What we refer to as "DNSSEC" is the third iteration of the DNSSEC
specification; <xref target="RFC2065"/> was the first, and <xref target="RFC2535"/> was the second.
Earlier iterations have not been deployed on a significant scale.
Throughout this document, "DNSSEC" means the protocol initially
defined in <xref target="RFC4033"/>, <xref target="RFC4034"/>, and <xref target="RFC4035"/>.</t>

<t>The three initial core documents generally cover different topics:</t>

<t><list style="symbols">
  <t><xref target="RFC4033"/> is an overview of DNSSEC, including how it might change
the resolution of DNS queries.</t>
  <t><xref target="RFC4034"/> specifies the DNS resource records used in DNSSEC.  It
obsoletes many RFCs about earlier versions of DNSSEC.</t>
  <t><xref target="RFC4035"/> covers the modifications to the DNS protocol incurred by
DNSSEC.  These include signing zones, serving signed zones,
resolving in light of DNSSEC, and authenticating DNSSEC-signed
data.</t>
</list></t>

<t>At the time this set of core documents was published, someone could
create a DNSSEC implementation of signing software, of a DNSSEC-aware
authoritative server, and/or of a DNSSEC-aware recursive resolver
from the three core documents, plus a few older RFCs specifying the
cryptography used.  Those two older documents are the following:</t>

<t><list style="symbols">
  <t><xref target="RFC2536"/> defines how to use the DSA signature algorithm (although
it refers to other documents for the details).  DSA was thinly
implemented and can safely be ignored by DNSSEC implementations.</t>
  <t><xref target="RFC3110"/> defines how to use the RSA signature algorithm (although
refers to other documents for the details).  RSA is still among
the most popular signing algorithms for DNSSEC.</t>
</list></t>

<t>It is important to note that later RFCs update the core documents.
As just one example, <xref target="RFC9077"/> changes how TTL values are calculated
in DNSSEC processing.</t>

<section anchor="addition-to-the-dnssec-core"><name>Addition to the DNSSEC Core</name>

<t>As with any major protocol, developers and operators discovered
issues with the original core documents over the years.  <xref target="RFC6840"/> is
an omnibus update to the original core documents and thus itself has
become a core document.  In addition to covering new requirements
from new DNSSEC RFCs, it describes many important security and
interoperability issues that arose during the deployment of the
initial specifications, particularly after the DNS root was signed in
2010.  It also lists some errors in the examples of the core
specifications.</t>

<t><xref target="RFC6840"/> brings a few additions into the core of DNSSEC.  It makes
NSEC3 <xref target="RFC5155"/> as much a part of DNSSEC as NSEC is.  It also makes
the SHA-256 and SHA-512 hash functions defined in <xref target="RFC4509"/> and
<xref target="RFC5702"/> part of the core.</t>

</section>
</section>
<section anchor="additional-cryptographic-algorithms-and-dnssec"><name>Additional Cryptographic Algorithms and DNSSEC</name>

<t>Current cryptographic algorithms typically weaken over time as
computing power improves and new cryptoanalysis emerges.  Two new
signing algorithms have been adopted by the DNSSEC community:
Elliptic Curve Digital Signature Algorithm (ECDSA) <xref target="RFC6605"/> and
Edwards-curve Digital Signature Algorithm (EdDSA) <xref target="RFC8080"/>.  ECDSA
and EdDSA have become very popular signing algorithms in recent
years.  The GOST signing algorithm <xref target="RFC9558"/> was also adopted but
has seen very limited use, likely because it is a national algorithm
specific to a very small number of countries;
<xref target="RFC9906"/> deprecated its use.</t>

<t>Implementation developers who want to know which algorithms to
implement in DNSSEC software should refer to <xref target="RFC9904"/>.  Note that
this specification is only about what algorithms should and should
not be included in implementations, i.e., it is not advice about
which algorithms zone operators should or should not use for signing,
nor which algorithms recursive resolver operators should or should
not use for validation.</t>

<t><xref target="RFC9905"/> updates <xref target="RFC4034"/> and <xref target="RFC4035"/>.</t>

</section>
<section anchor="extensions-to-dnssec"><name>Extensions to DNSSEC</name>

<t>The DNSSEC community has extended the DNSSEC core and the
cryptographic algorithms, both in terms of describing good
operational practices and in new protocols.  Some of the RFCs that
describe these extensions include the following:</t>

<t><list style="symbols">
  <t><xref target="RFC5011"/> describes a method to help resolvers update their DNSSEC
trust anchors in an automated fashion.  This method was used in
2018 to update the DNS root trust anchor.</t>
  <t><xref target="RFC6781"/> is a compendium of operational practices that may not be
obvious from reading just the core specifications.</t>
  <t><xref target="RFC7344"/> describes using the CDS and CDNSKEY resource records to
help automate the maintenance of DS records in the parents of
signed zones.
(This document is being updated by <xref target="I-D.ietf-dnsop-cds-consistency"/> in the DNSOP Working Group.)</t>
  <t><xref target="RFC8078"/> extends <xref target="RFC7344"/> by showing how to do initial setup of
trusted relationships between signed parent and child zones.</t>
  <t><xref target="RFC8198"/> describes how a validating resolver can emit fewer
queries in signed zones that use NSEC and NSEC3 for negative
caching.</t>
  <t><xref target="RFC9077"/> updates <xref target="RFC8198"/> with respect to the TTL fields in
signed records.</t>
  <t><xref target="RFC9824"/> "describes a technique to generate a signed DNS response
on demand for a nonexistent name by claiming that the name exists but
doesn't have any data for the queried record type".</t>
</list></t>

</section>
<section anchor="additional-documents-of-interest"><name>Additional Documents of Interest</name>

<t>The documents listed above constitute the core of DNSSEC, the
additional cryptographic algorithms, and the major extensions to
DNSSEC.  This section lists some additional documents that someone
interested in implementing or operating DNSSEC might find of value:</t>

<t><list style="symbols">
  <t><xref target="RFC4470"/> "describes how to construct DNSSEC NSEC resource records
that cover a smaller range of names than called for by <xref target="RFC4034"/>.
By generating and signing these records on demand, authoritative
name servers can effectively stop the disclosure of zone contents
otherwise made possible by walking the chain of NSEC records in a
signed zone".</t>
  <t><xref target="RFC6975"/> "specifies a way for validating end-system resolvers to
signal to a server which digital signature and hash algorithms
they support".</t>
  <t><xref target="RFC7129"/> "provides additional background commentary and some
context for the NSEC and NSEC3 mechanisms used by DNSSEC to
provide authenticated denial-of-existence responses".  This
background is particularly important for understanding NSEC and
NSEC3 usage.</t>
  <t><xref target="RFC7583"/> "describes the issues surrounding the timing of events
in the rolling of a key in a DNSSEC-secured zone".</t>
  <t><xref target="RFC7646"/> "defines Negative Trust Anchors (NTAs), which can be
used to mitigate DNSSEC validation failures by disabling DNSSEC
validation at specified domains".</t>
  <t><xref target="RFC8027"/> "describes problems that a Validating DNS resolver,
stub-resolver, or application might run into within a non-
compliant infrastructure".</t>
  <t><xref target="RFC8145"/> "specifies two different ways for validating resolvers
to signal to a server which keys are referenced in their chain of
trust".</t>
  <t><xref target="RFC9499"/> contains lists of terminology used when talking about
DNS; Sections 10 and 11 cover DNSSEC.</t>
  <t><xref target="RFC8509"/> "specifies a mechanism that will allow an end user and
third parties to determine the trusted key state for the root key
of the resolvers that handle that user's DNS queries".</t>
  <t><xref target="RFC8901"/> "presents deployment models that accommodate this
scenario [when each DNS provider independently signs zone data
with their own keys] and describes these key-management
requirements".</t>
  <t><xref target="RFC9276"/> "provides guidance on setting NSEC3 parameters based on
recent operational deployment experience".</t>
  <t><xref target="RFC9615"/> "allows managed DNS operators to securely announce
DNSSEC key parameters for zones under their management, including for
zones that are not currently securely delegated".</t>
  <t><xref target="RFC9718"/> "describes the format and publication mechanisms IANA
has used to distribute the DNSSEC trust anchors".</t>
  <t><xref target="RFC9859"/> "generalizes and extends the use of DNS NOTIFY ... to allow other types of actions that were previously lacking a trigger mechanism to be triggered via the DNS." The primary action described in the RFC is a new DSYNC record that indicates that "a parent would like child operators to send them a NOTIFY message upon publication of a new CDS/CDNSKEY/CSYNC RRset".</t>
</list></t>

<t>There will certainly be other RFCs related to DNSSEC that are
published after this one.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>IANA already has three registry groups that relate to DNSSEC:</t>

<t><list style="symbols">
  <t><eref target="https://www.iana.org/assignments/dns-sec-alg-numbers">DNSSEC algorithm numbers</eref></t>
  <t><eref target="https://www.iana.org/assignments/dnssec-nsec3-parameters">DNSSEC NSEC3 parameters</eref></t>
  <t><eref target="https://www.iana.org/assignments/ds-rr-types">DNSSEC DS RRtype digest algorithms</eref></t>
</list></t>

<t>The rules for the DNSSEC algorithm registry were set in the core RFCs
and updated by <xref target="RFC6014"/>, <xref target="RFC6725"/>, and <xref target="RFC9157"/>.</t>

<t><xref target="RFC9904"/> updates <xref target="RFC9157"/>.</t>

<t>This document does not update or create any registry groups or
registries.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>All of the security considerations from all of the RFCs referenced in
this document apply here.</t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">

&RFC3110;
&RFC4033;
&RFC4034;
&RFC4035;
&RFC4509;
&RFC5155;
&RFC5702;
&RFC6840;


    </references>

    <references title='Informative References' anchor="sec-informative-references">

&RFC2065;
&RFC2535;
&RFC2536;
&RFC4470;
&RFC5011;
&RFC6014;
&RFC6605;
&RFC6698;
&RFC6725;
&RFC6781;
&RFC6975;
&RFC7129;
&RFC7344;
&RFC7583;
&RFC7646;
&RFC8027;
&RFC8078;
&RFC8080;
&RFC8145;
&RFC8198;
&RFC8509;
&RFC8901;
&RFC9077;
&RFC9157;
&RFC9276;
&RFC9499;
&RFC9558;
&RFC9615;
&RFC9718;
&RFC9824;
&RFC9859;
&RFC9904;
&RFC9905;
&RFC9906;
&I-D.ietf-dnsop-cds-consistency;
&I-D.ietf-dnsop-ds-automation;


    </references>

</references>


<?line 310?>

<section anchor="changes-since-rfc-9364"><name>Changes Since RFC 9364</name>

<t>This document obsoletes RFC 9364, which is BCP 237.
The changes from that document are:</t>

<t><list style="symbols">
  <t><xref target="RFC9558"/> was added to this document</t>
  <t>RFC 7958 became <xref target="RFC9718"/></t>
  <t>RFC 8499 became <xref target="RFC9499"/></t>
  <t>RFC 8624 became <xref target="RFC9904"/></t>
  <t>Added <xref target="RFC9615"/></t>
  <t>Added <xref target="RFC9824"/></t>
  <t>Added <xref target="RFC9859"/></t>
  <t>Added <xref target="RFC9905"/></t>
  <t>Added <xref target="RFC9906"/></t>
</list></t>

<t>The following draft is in the RFC Editor's queue for publication:</t>

<t><list style="symbols">
  <t><xref target="I-D.ietf-dnsop-cds-consistency"/>, "Clarifications on CDS/CDNSKEY and CSYNC Consistency", which updates <xref target="RFC7344"/>.</t>
</list></t>

<t>The following draft is currently in the DNSOP Working Group and will likley progress to later become RFCs:</t>

<t><list style="symbols">
  <t><xref target="I-D.ietf-dnsop-ds-automation"/>, "Operational Recommendations for DS Automation"</t>
</list></t>

</section>
<section anchor="acknowledgements"><name>Acknowledgements</name>

<t>The DNS world owes a depth of gratitude to the authors and other
contributors to the core DNSSEC documents and to the notable DNSSEC
extensions.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

