<?xml version="1.0" encoding="UTF-8"?><?rfc linefile="1:draft-icann-dnssec-trust-anchor.xml"?>
<!-- automatically generated by xml2rfc v1.35 on 2011-04-26T10:56:22Z -->
<?xml-stylesheet type='text/xsl' href='rfc2629.xslt' ?>
<!-- $Id: draft-icann-dnssec-trust-anchor.xml 1518 2011-04-26 10:45:58Z jabley $ -->
<!DOCTYPE rfc PUBLIC "-//IETF//DTD RFC 2629//EN"
"http://xml.resource.org/authoring/rfc2629.dtd" [
<!-- xml2rfc-processed-entity rfc1034 -->
<!-- xml2rfc-processed-entity rfc1035 -->
<!-- xml2rfc-processed-entity rfc2616 -->
<!-- xml2rfc-processed-entity rfc2818 -->
<!-- xml2rfc-processed-entity rfc2986 -->
<!-- xml2rfc-processed-entity rfc3339 -->
<!-- xml2rfc-processed-entity rfc4033 -->
<!-- xml2rfc-processed-entity rfc4034 -->
<!-- xml2rfc-processed-entity rfc4035 -->
<!-- xml2rfc-processed-entity rfc4509 -->
<!-- xml2rfc-processed-entity rfc4641 -->
<!-- xml2rfc-processed-entity rfc4880 -->
<!-- xml2rfc-processed-entity rfc5155 -->
<!-- xml2rfc-processed-entity rfc5702 -->
<!-- xml2rfc-processed-entity rfc5751 -->
<!-- xml2rfc-processed-entity ICANNDPS -->
<!-- xml2rfc-processed-entity FRONT -->
]>

<?rfc strict="yes" ?>
<?rfc toc="yes"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes"?>

<rfc category="info" docName="draft-jabley-dnssec-trust-anchor-02"
  ipr="trust200902">

  <?rfc linefile="1:draft-icann-dnssec-trust-anchor.front"?><front>
  <title abbrev="Root Zone Trust Anchor Publication">DNSSEC Trust
    Anchor Publication for the Root Zone</title>

  <author initials='J.' surname="Abley" fullname='Joe Abley'>
    <organization>ICANN</organization>
    <address>
      <postal>
        <street>4676 Admiralty Way, Suite 330</street>
        <city>Marina del Rey</city>
        <region>CA</region>
        <code>90292</code>
        <country>US</country>
      </postal>
      <phone>+1 519 670 9327</phone>
      <email>joe.abley@icann.org</email>
    </address>
  </author>

  <author fullname="Jakob Schlyter" initials="J." surname="Schlyter">
    <organization abbrev="Kirei">Kirei AB</organization>
    <address>
      <postal>
        <street>P.O. Box 53204</street>
        <city>Goteborg</city>
        <code>SE-400 16</code>
        <country>Sweden</country>
      </postal>
      <email>jakob@kirei.se</email>
    </address>
  </author>

  <date day="25" month="April" year="2011"/>

  <abstract>
    <t>The root zone of the Domain Name System (DNS) has been
      cryptographically signed using DNS Security Extensions
      (DNSSEC).</t>

    <t>In order to obtain secure answers from the root zone of the
      DNS using DNSSEC, a client must configure a suitable trust
      anchor.  This document describes how such trust anchors are
      published.</t>
  </abstract>
</front>
<?rfc linefile="33:draft-icann-dnssec-trust-anchor.xml"?>

  <middle>
    <section title="Introduction">
      <t>The Domain Name System (DNS) is described in <xref
	target="RFC1034" /> and <xref target="RFC1035" />. Security
	extensions to the DNS (DNSSEC) are described in <xref
	target="RFC4033" />, <xref target="RFC4034" />, <xref
	target="RFC4035" />, <xref target="RFC4509" />, <xref
	target="RFC5155" /> and <xref target="RFC5702" />.</t>

      <t>A discussion of operational practices relating to DNSSEC
        can be found in <xref target="RFC4641" />.</t>

      <t>In DNSSEC resource record sets (RRSets) are
	cryptographically-signed, such that a response to a query
        contains signatures which allow its integrity and authenticity
        to be verified. An individual signature is validated by
	following a chain of signatures to a key which is trusted
	for some extra-protocol reason.</t>

      <t>The publication of trust anchors for the root zone of the
	DNS is an IANA function performed by ICANN.  A detailed
	description of corresponding key management practices can
	be found in <xref target="DPS"/>, which can be retrieved
	from the IANA Repository located at <eref
	target="https://www.iana.org/dnssec/"/>.</t>

      <t>This document describes the distribution of DNSSEC trust
	anchors.  Whilst the data formats and the publication and
	retrieval methods described in this document might well be
	adapted for other uses, this document's focus is more
	specific and is concerned only with the distribution of
	trust anchors for the root zone.</t>
    </section>

    <section title="Root Zone Trust Anchor Publication">
      <t>Trust anchors for the root zone are published in two formats,
        each of which is described in this document:

         <list style="symbols">
	   <t>as the hashes of the corresponding DNSKEY records,
	     consistent with the defined presentation format of
	     Delegation Signer (DS) resource records <xref
	     target="RFC4034"/>, contained within an XML document,
	     as described in <xref target="xml"/>, and</t>

           <t>as Certificate Signing Requests (CSRs) in PKCS#10
             format <xref target="RFC2986"/>
             for further processing by Certification Authorities
             and validation of proof of possession of the corresponding
             private keys, as described in <xref target="pkcs10"/>.</t>
         </list>
       </t>

      <section title="XML" anchor="xml">
        <t>Trust anchors are published in an XML document whose schema
	  is described in <xref target="schema" />. The document
	  contains a complete set of trust anchors for the root
	  zone, including anchors suitable for immediate use and
	  also historical data. Each trust anchor optionally includes
	  Uniform Resource Locators (URLs) for retrieving corresponding
	  X.509 certificates.</t>

        <t>Examples of trust anchors packaged and signed for
          publication can be found in <xref target="examples" />.</t>
      </section>

      <section title="Certificate Signing Request (PKCS#10)" anchor="pkcs10">
        <t>To facilitate signing the trust anchor by a public key
          infrastructure, trust anchors are also published as
          Certificate Signing Requests (CSRs) in <xref
          target="RFC2986">PKCS#10 format</xref>.</t>

        <t>Each CSR will have a Subject with following attributes:
          <list style="hanging">
            <t hangText="O:">the string "ICANN".</t>

            <t hangText="OU:">the string "IANA".</t>

            <t hangText="CN:">the string "Root Zone KSK" followed
              by the time and date of key generation in the format
              specified in <xref target="RFC3339"/>,
              e.g. "Root Zone KSK 2010-06-16T21:19:24+00:00".</t>

            <t hangText="resourceRecord:">the hash of the public
              key consistent with the presentation format of the
              Delegation Signer (DS) <xref target="RFC4034"/>
              resource record (see <xref
              target="asn1-rr"/> for attribute definition).</t>
          </list>
        </t>
      </section>
    </section>

    <section anchor="mechanisms" title="Root Zone Trust Anchor Retrieval">
      <section title="HTTP" anchor="http">
        <t>Trust anchors are available for retrieval using HTTP <xref
          target="RFC2616" />.</t>

        <t>The URL for retrieving the CSR is
	  &lt;http://data.iana.org/root-anchors/key-label.csr&gt;,
	  with "key-label" replaced by the key label of the
	  corresponding KSK.</t>

        <t>The URL for retrieving the IANA-signed Certificate is
          &lt;http://data.iana.org/root-anchors/key-label.crt&gt;,
          with "key-label" again replaced as described above.</t>

        <t>The URL for retrieving the complete trust anchor set is
          <eref target="http://data.iana.org/root-anchors/root-anchors.xml"/>.</t>

        <t>The URL for a detached S/MIME <xref target="RFC5751"/> signature
          for the current trust anchor set is <eref
          target="http://data.iana.org/root-anchors/root-anchors.p7s"
          />.</t>

        <t>The URL for a detached OpenPGP <xref target="RFC4880"/>
          signature for the current trust anchor set is <eref
          target="http://data.iana.org/root-anchors/root-anchors.asc"
          />.</t>
      </section>

      <section title="HTTP Over TLS">
        <t>Trust anchors are available for retrieval using HTTP over TLS
          <xref target="RFC2818" />.</t>

        <t>The URLs specified in <xref target="http"/> are also
          available using HTTPS. That is:</t>

        <t>The URL for retrieving the CSR is
          &lt;https://data.iana.org/root-anchors/key-label.csr&gt;,
          with "key-label" replaced by the key label of the
          corresponding KSK.</t>

        <t>The URL for retrieving the IANA-signed Certificate is
          &lt;https://data.iana.org/root-anchors/key-label.crt&gt;,
          with "key-label" again replaced as described above.</t>

        <t>The URL for retrieving the complete trust anchor set is <eref
          target="https://data.iana.org/root-anchors/root-anchors.xml" />.</t>

        <t>The URL for a detached S/MIME <xref target="RFC5751"/> signature
          for the current trust anchor set is <eref
          target="https://data.iana.org/root-anchors/root-anchors.p7s"
          />.</t>

        <t>The URL for a detached OpenPGP <xref target="RFC4880"/>
          signature for the current trust anchor set is <eref
          target="https://data.iana.org/root-anchors/root-anchors.asc"
          />.</t>

	<t>TLS sessions are authenticated with certificates presented
	  from the server. No client certificate verification is
	  performed. The certificate presented by the server is
	  chosen such that it can be trusted using an X.509 trust
	  anchor that is believed to be well-known, e.g. one that
	  corresponds to a WebTrust-accredited Certificate Authority.
	  Other TLS authentication mechanisms may be considered in
	  the future.</t>

      </section>

      <section title="Signature Verification" anchor="sigs">
        <t>The OpenPGP <xref target="RFC4880"/> keys used to sign
          trust anchor documents carry signatures from personal
	  keys of staff who are able to personally attest to their
	  validity. Those staff members will continue to make their
	  personal keys freely available for examination by third
	  parties, e.g. by way of PGP key parties at operator and
	  IETF meetings. In this fashion a diverse set of paths
	  through the PGP web of trust will be maintained to the
	  trust anchor PGP keys.</t>

        <t>An OpenPGP keyring containing public keys pertinent to
          signature verification is published at <eref
          target="http://data.iana.org/root-anchors/icann.pgp" />.
          The public keys on that keyring will also be distributed
          widely, e.g.  to public PGP key servers.</t>

        <t>Certificates used to create S/MIME <xref target="RFC5751"/>
          signatures will be signed by a Certificate Authority (CA)
          administered by ICANN as the IANA functions operator and also
          optionally by well-known (e.g. WebTrust-certified) CAs to facilitate
          signature validation with widely-available X.509 trust anchors.</t>
      </section>
    </section>

    <section title="IANA Considerations">
      <t>Key Signing Key (KSK) management for the root zone is an
        IANA function. This document describes an initial set of
        publication mechanisms for trust anchors related to that
        management. In the future, additional publication schemes
        may be also be made available, in which case they will be
        described in a new document that updates this one.</t>

      <t>Existing mechanisms will not be deprecated without very
        strong technical justification.</t>

      <t>This document contains information about an existing
        service, and has no IANA actions.</t>
    </section>

    <section title="Security Considerations">
      <t>This document describes how DNSSEC trust anchors for the
        root zone of the DNS are published. It is to be expected
        that many DNSSEC clients will only configure a single trust
        anchor to perform validation, and that the trust anchor
        they use will be that of the root zone. As a consequence,
        reliable publication of trust anchors is important.</t>

      <t>This document aims to specify carefully the means by which
        such trust anchors are published, as an aid to the formats
        and retrieval methods described here being integrated
        usefully into user environments.</t>
    </section>

    <section title="Acknowledgements">        
      <t>Many pioneers paved the way for the deployment of DNSSEC
        in the root zone of the DNS, and the authors hereby acknowledge
        their substantial collective contribution.</t>

      <t>This document incorporates suggestions made by Paul Hoffman
        and Alfred Hoenes, whose contributions are appreciated.</t>
    </section>

  </middle>

  <back>
    <references title="Normative References">
      <?rfc linefile="1:http://xml.resource.org/public/rfc/bibxml/reference.RFC.1034.xml"?>

<reference anchor='RFC1034'>

<front>
<title abbrev='Domain Concepts and Facilities'>Domain names - concepts and facilities</title>
<author initials='P.' surname='Mockapetris' fullname='P. Mockapetris'>
<organization>Information Sciences Institute (ISI)</organization></author>
<date year='1987' day='1' month='November' /></front>

<seriesInfo name='STD' value='13' />
<seriesInfo name='RFC' value='1034' />
<format type='TXT' octets='129180' target='http://www.rfc-editor.org/rfc/rfc1034.txt' />
</reference>
<?rfc linefile="263:draft-icann-dnssec-trust-anchor.xml"?>
      <?rfc linefile="1:http://xml.resource.org/public/rfc/bibxml/reference.RFC.1035.xml"?>

<reference anchor='RFC1035'>

<front>
<title abbrev='Domain Implementation and Specification'>Domain names - implementation and specification</title>
<author initials='P.' surname='Mockapetris' fullname='P. Mockapetris'>
<organization>USC/ISI</organization>
<address>
<postal>
<street>4676 Admiralty Way</street>
<city>Marina del Rey</city>
<region>CA</region>
<code>90291</code>
<country>US</country></postal>
<phone>+1 213 822 1511</phone></address></author>
<date year='1987' day='1' month='November' /></front>

<seriesInfo name='STD' value='13' />
<seriesInfo name='RFC' value='1035' />
<format type='TXT' octets='125626' target='http://www.rfc-editor.org/rfc/rfc1035.txt' />
</reference>
<?rfc linefile="264:draft-icann-dnssec-trust-anchor.xml"?>
      <?rfc linefile="1:http://xml.resource.org/public/rfc/bibxml/reference.RFC.2616.xml"?>

<reference anchor='RFC2616'>

<front>
<title abbrev='HTTP/1.1'>Hypertext Transfer Protocol -- HTTP/1.1</title>
<author initials='R.' surname='Fielding' fullname='Roy T. Fielding'>
<organization abbrev='UC Irvine'>Department of Information and Computer Science</organization>
<address>
<postal>
<street>University of California, Irvine</street>
<city>Irvine</city>
<region>CA</region>
<code>92697-3425</code></postal>
<facsimile>+1(949)824-1715</facsimile>
<email>fielding@ics.uci.edu</email></address></author>
<author initials='J.' surname='Gettys' fullname='James Gettys'>
<organization abbrev='Compaq/W3C'>World Wide Web Consortium</organization>
<address>
<postal>
<street>MIT Laboratory for Computer Science, NE43-356</street>
<street>545 Technology Square</street>
<city>Cambridge</city>
<region>MA</region>
<code>02139</code></postal>
<facsimile>+1(617)258-8682</facsimile>
<email>jg@w3.org</email></address></author>
<author initials='J.' surname='Mogul' fullname='Jeffrey C. Mogul'>
<organization abbrev='Compaq'>Compaq Computer Corporation</organization>
<address>
<postal>
<street>Western Research Laboratory</street>
<street>250 University Avenue</street>
<city>Palo Alto</city>
<region>CA</region>
<code>94305</code></postal>
<email>mogul@wrl.dec.com</email></address></author>
<author initials='H.' surname='Frystyk' fullname='Henrik Frystyk Nielsen'>
<organization abbrev='W3C/MIT'>World Wide Web Consortium</organization>
<address>
<postal>
<street>MIT Laboratory for Computer Science, NE43-356</street>
<street>545 Technology Square</street>
<city>Cambridge</city>
<region>MA</region>
<code>02139</code></postal>
<facsimile>+1(617)258-8682</facsimile>
<email>frystyk@w3.org</email></address></author>
<author initials='L.' surname='Masinter' fullname='Larry Masinter'>
<organization abbrev='Xerox'>Xerox Corporation</organization>
<address>
<postal>
<street>MIT Laboratory for Computer Science, NE43-356</street>
<street>3333 Coyote Hill Road</street>
<city>Palo Alto</city>
<region>CA</region>
<code>94034</code></postal>
<email>masinter@parc.xerox.com</email></address></author>
<author initials='P.' surname='Leach' fullname='Paul J. Leach'>
<organization abbrev='Microsoft'>Microsoft Corporation</organization>
<address>
<postal>
<street>1 Microsoft Way</street>
<city>Redmond</city>
<region>WA</region>
<code>98052</code></postal>
<email>paulle@microsoft.com</email></address></author>
<author initials='T.' surname='Berners-Lee' fullname='Tim Berners-Lee'>
<organization abbrev='W3C/MIT'>World Wide Web Consortium</organization>
<address>
<postal>
<street>MIT Laboratory for Computer Science, NE43-356</street>
<street>545 Technology Square</street>
<city>Cambridge</city>
<region>MA</region>
<code>02139</code></postal>
<facsimile>+1(617)258-8682</facsimile>
<email>timbl@w3.org</email></address></author>
<date year='1999' month='June' />
<abstract>
<t>
   The Hypertext Transfer Protocol (HTTP) is an application-level
   protocol for distributed, collaborative, hypermedia information
   systems. It is a generic, stateless, protocol which can be used for
   many tasks beyond its use for hypertext, such as name servers and
   distributed object management systems, through extension of its
   request methods, error codes and headers . A feature of HTTP is
   the typing and negotiation of data representation, allowing systems
   to be built independently of the data being transferred.
</t>
<t>
   HTTP has been in use by the World-Wide Web global information
   initiative since 1990. This specification defines the protocol
   referred to as "HTTP/1.1", and is an update to RFC 2068 .
</t></abstract></front>

<seriesInfo name='RFC' value='2616' />
<format type='TXT' octets='422317' target='http://www.rfc-editor.org/rfc/rfc2616.txt' />
<format type='PS' octets='5529857' target='http://www.rfc-editor.org/rfc/rfc2616.ps' />
<format type='PDF' octets='550558' target='http://www.rfc-editor.org/rfc/rfc2616.pdf' />
<format type='HTML' octets='636125' target='http://xml.resource.org/public/rfc/html/rfc2616.html' />
<format type='XML' octets='493420' target='http://xml.resource.org/public/rfc/xml/rfc2616.xml' />
</reference>
<?rfc linefile="265:draft-icann-dnssec-trust-anchor.xml"?>
      <?rfc linefile="1:http://xml.resource.org/public/rfc/bibxml/reference.RFC.2818.xml"?>

<reference anchor='RFC2818'>

<front>
<title>HTTP Over TLS</title>
<author initials='E.' surname='Rescorla' fullname='E. Rescorla'>
<organization /></author>
<date year='2000' month='May' />
<abstract>
<t>This memo describes how to use Transport Layer Security (TLS) to secure Hypertext Transfer Protocol (HTTP) connections over the Internet.  This memo provides information for the Internet community.</t></abstract></front>

<seriesInfo name='RFC' value='2818' />
<format type='TXT' octets='15170' target='http://www.rfc-editor.org/rfc/rfc2818.txt' />
</reference>
<?rfc linefile="266:draft-icann-dnssec-trust-anchor.xml"?>
      <?rfc linefile="1:http://xml.resource.org/public/rfc/bibxml/reference.RFC.2986.xml"?>

<reference anchor='RFC2986'>

<front>
<title>PKCS #10: Certification Request Syntax Specification Version 1.7</title>
<author initials='M.' surname='Nystrom' fullname='M. Nystrom'>
<organization /></author>
<author initials='B.' surname='Kaliski' fullname='B. Kaliski'>
<organization /></author>
<date year='2000' month='November' />
<abstract>
<t>This memo represents a republication of PKCS #10 v1.7 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, and change control is retained within the PKCS process.  The body of this document, except for the security considerations section, is taken directly from the PKCS #9 v2.0 or the PKCS #10 v1.7 document.  This memo provides information for the Internet community.</t></abstract></front>

<seriesInfo name='RFC' value='2986' />
<format type='TXT' octets='27794' target='http://www.rfc-editor.org/rfc/rfc2986.txt' />
</reference>
<?rfc linefile="267:draft-icann-dnssec-trust-anchor.xml"?>
      <?rfc linefile="1:http://xml.resource.org/public/rfc/bibxml/reference.RFC.3339.xml"?>

<reference anchor='RFC3339'>

<front>
<title>Date and Time on the Internet: Timestamps</title>
<author initials='G.' surname='Klyne' fullname='Graham Klyne' role='editor'>
<organization>Clearswift Corporation</organization>
<address>
<postal>
<street>1310 Waterside</street>
<street>Arlington Business Park</street>
<city>Theale</city>
<region>Reading</region>
<code>RG7 4SA</code>
<country>UK</country></postal>
<phone>+44 11 8903 8903</phone>
<facsimile>+44 11 8903 9000</facsimile>
<email>GK@ACM.ORG</email></address></author>
<author initials='C.' surname='Newman' fullname='Chris Newman'>
<organization>Sun Microsystems</organization>
<address>
<postal>
<street>1050 Lakes Drive, Suite 250</street>
<city>West Covina</city>
<region>CA</region>
<code>91790</code>
<country>USA</country></postal>
<email>chris.newman@sun.com</email></address></author>
<date year='2002' month='July' />
<abstract>
<t>
   This document defines a date and time format for use in Internet
   protocols that is a profile of the ISO 8601 standard for
   representation of dates and times using the Gregorian calendar.
     </t></abstract></front>

<seriesInfo name='RFC' value='3339' />
<format type='TXT' octets='35064' target='http://www.rfc-editor.org/rfc/rfc3339.txt' />
<format type='HTML' octets='61277' target='http://xml.resource.org/public/rfc/html/rfc3339.html' />
<format type='XML' octets='37259' target='http://xml.resource.org/public/rfc/xml/rfc3339.xml' />
</reference>
<?rfc linefile="268:draft-icann-dnssec-trust-anchor.xml"?>
      <?rfc linefile="1:http://xml.resource.org/public/rfc/bibxml/reference.RFC.4033.xml"?>

<reference anchor='RFC4033'>

<front>
<title>DNS Security Introduction and Requirements</title>
<author initials='R.' surname='Arends' fullname='R. Arends'>
<organization /></author>
<author initials='R.' surname='Austein' fullname='R. Austein'>
<organization /></author>
<author initials='M.' surname='Larson' fullname='M. Larson'>
<organization /></author>
<author initials='D.' surname='Massey' fullname='D. Massey'>
<organization /></author>
<author initials='S.' surname='Rose' fullname='S. Rose'>
<organization /></author>
<date year='2005' month='March' />
<abstract>
<t>The Domain Name System Security Extensions (DNSSEC) add data origin authentication and data integrity to the Domain Name System.  This document introduces these extensions and describes their capabilities and limitations.  This document also discusses the services that the DNS security extensions do and do not provide.  Last, this document describes the interrelationships between the documents that collectively describe DNSSEC. [STANDARDS-TRACK]</t></abstract></front>

<seriesInfo name='RFC' value='4033' />
<format type='TXT' octets='52445' target='http://www.rfc-editor.org/rfc/rfc4033.txt' />
</reference>
<?rfc linefile="269:draft-icann-dnssec-trust-anchor.xml"?>
      <?rfc linefile="1:http://xml.resource.org/public/rfc/bibxml/reference.RFC.4034.xml"?>

<reference anchor='RFC4034'>

<front>
<title>Resource Records for the DNS Security Extensions</title>
<author initials='R.' surname='Arends' fullname='R. Arends'>
<organization /></author>
<author initials='R.' surname='Austein' fullname='R. Austein'>
<organization /></author>
<author initials='M.' surname='Larson' fullname='M. Larson'>
<organization /></author>
<author initials='D.' surname='Massey' fullname='D. Massey'>
<organization /></author>
<author initials='S.' surname='Rose' fullname='S. Rose'>
<organization /></author>
<date year='2005' month='March' />
<abstract>
<t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of resource records and protocol modifications that provide source authentication for the DNS. This document defines the public key (DNSKEY), delegation signer (DS), resource record digital signature (RRSIG), and authenticated denial of existence (NSEC) resource records. The purpose and format of each resource record is described in detail, and an example of each resource record is given.&lt;/t>&lt;t> This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t></abstract></front>

<seriesInfo name='RFC' value='4034' />
<format type='TXT' octets='63879' target='http://www.rfc-editor.org/rfc/rfc4034.txt' />
</reference>
<?rfc linefile="270:draft-icann-dnssec-trust-anchor.xml"?>
      <?rfc linefile="1:http://xml.resource.org/public/rfc/bibxml/reference.RFC.4035.xml"?>

<reference anchor='RFC4035'>

<front>
<title>Protocol Modifications for the DNS Security Extensions</title>
<author initials='R.' surname='Arends' fullname='R. Arends'>
<organization /></author>
<author initials='R.' surname='Austein' fullname='R. Austein'>
<organization /></author>
<author initials='M.' surname='Larson' fullname='M. Larson'>
<organization /></author>
<author initials='D.' surname='Massey' fullname='D. Massey'>
<organization /></author>
<author initials='S.' surname='Rose' fullname='S. Rose'>
<organization /></author>
<date year='2005' month='March' />
<abstract>
<t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of new resource records and protocol modifications that add data origin authentication and data integrity to the DNS. This document describes the DNSSEC protocol modifications. This document defines the concept of a signed zone, along with the requirements for serving and resolving by using DNSSEC. These techniques allow a security-aware resolver to authenticate both DNS resource records and authoritative DNS error indications.&lt;/t>&lt;t> This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t></abstract></front>

<seriesInfo name='RFC' value='4035' />
<format type='TXT' octets='130589' target='http://www.rfc-editor.org/rfc/rfc4035.txt' />
</reference>
<?rfc linefile="271:draft-icann-dnssec-trust-anchor.xml"?>
      <?rfc linefile="1:http://xml.resource.org/public/rfc/bibxml/reference.RFC.4509.xml"?>

<reference anchor='RFC4509'>

<front>
<title>Use of SHA-256 in DNSSEC Delegation Signer (DS) Resource Records (RRs)</title>
<author initials='W.' surname='Hardaker' fullname='W. Hardaker'>
<organization /></author>
<date year='2006' month='May' />
<abstract>
<t>This document specifies how to use the SHA-256 digest type in DNS Delegation Signer (DS) Resource Records (RRs).  DS records, when stored in a parent zone, point to DNSKEYs in a child zone. [STANDARDS-TRACK]</t></abstract></front>

<seriesInfo name='RFC' value='4509' />
<format type='TXT' octets='14155' target='http://www.rfc-editor.org/rfc/rfc4509.txt' />
</reference>
<?rfc linefile="272:draft-icann-dnssec-trust-anchor.xml"?>
      <?rfc linefile="1:http://xml.resource.org/public/rfc/bibxml/reference.RFC.4641.xml"?>

<reference anchor='RFC4641'>

<front>
<title>DNSSEC Operational Practices</title>
<author initials='O.' surname='Kolkman' fullname='O. Kolkman'>
<organization /></author>
<author initials='R.' surname='Gieben' fullname='R. Gieben'>
<organization /></author>
<date year='2006' month='September' />
<abstract>
<t>This document describes a set of practices for operating the DNS with security extensions (DNSSEC). The target audience is zone administrators deploying DNSSEC.&lt;/t>&lt;t> The document discusses operational aspects of using keys and signatures in the DNS. It discusses issues of key generation, key storage, signature generation, key rollover, and related policies.&lt;/t>&lt;t> This document obsoletes RFC 2541, as it covers more operational ground and gives more up-to-date requirements with respect to key sizes and the new DNSSEC specification. This memo provides information for the Internet community.</t></abstract></front>

<seriesInfo name='RFC' value='4641' />
<format type='TXT' octets='79894' target='http://www.rfc-editor.org/rfc/rfc4641.txt' />
</reference>
<?rfc linefile="273:draft-icann-dnssec-trust-anchor.xml"?>
      <?rfc linefile="1:http://xml.resource.org/public/rfc/bibxml/reference.RFC.4880.xml"?>

<reference anchor='RFC4880'>

<front>
<title>OpenPGP Message Format</title>
<author initials='J.' surname='Callas' fullname='J. Callas'>
<organization /></author>
<author initials='L.' surname='Donnerhacke' fullname='L. Donnerhacke'>
<organization /></author>
<author initials='H.' surname='Finney' fullname='H. Finney'>
<organization /></author>
<author initials='D.' surname='Shaw' fullname='D. Shaw'>
<organization /></author>
<author initials='R.' surname='Thayer' fullname='R. Thayer'>
<organization /></author>
<date year='2007' month='November' />
<abstract>
<t>This document is maintained in order to publish all necessary information needed to develop interoperable applications based on the OpenPGP format. It is not a step-by-step cookbook for writing an application. It describes only the format and methods needed to read, check, generate, and write conforming packets crossing any network. It does not deal with storage and implementation questions. It does, however, discuss implementation issues necessary to avoid security flaws.&lt;/t>&lt;t> OpenPGP software uses a combination of strong public-key and symmetric cryptography to provide security services for electronic communications and data storage. These services include confidentiality, key management, authentication, and digital signatures. This document specifies the message formats used in OpenPGP. [STANDARDS-TRACK]</t></abstract></front>

<seriesInfo name='RFC' value='4880' />
<format type='TXT' octets='203706' target='http://www.rfc-editor.org/rfc/rfc4880.txt' />
</reference>
<?rfc linefile="274:draft-icann-dnssec-trust-anchor.xml"?>
      <?rfc linefile="1:http://xml.resource.org/public/rfc/bibxml/reference.RFC.5155.xml"?>

<reference anchor='RFC5155'>

<front>
<title>DNS Security (DNSSEC) Hashed Authenticated Denial of Existence</title>
<author initials='B.' surname='Laurie' fullname='B. Laurie'>
<organization /></author>
<author initials='G.' surname='Sisson' fullname='G. Sisson'>
<organization /></author>
<author initials='R.' surname='Arends' fullname='R. Arends'>
<organization /></author>
<author initials='D.' surname='Blacka' fullname='D. Blacka'>
<organization /></author>
<date year='2008' month='March' />
<abstract>
<t>The Domain Name System Security (DNSSEC) Extensions introduced the NSEC resource record (RR) for authenticated denial of existence.  This document introduces an alternative resource record, NSEC3, which similarly provides authenticated denial of existence.  However, it also provides measures against zone enumeration and permits gradual expansion of delegation-centric zones. [STANDARDS-TRACK]</t></abstract></front>

<seriesInfo name='RFC' value='5155' />
<format type='TXT' octets='112338' target='http://www.rfc-editor.org/rfc/rfc5155.txt' />
</reference>
<?rfc linefile="275:draft-icann-dnssec-trust-anchor.xml"?>
      <?rfc linefile="1:http://xml.resource.org/public/rfc/bibxml/reference.RFC.5702.xml"?>

<reference anchor='RFC5702'>

<front>
<title>Use of SHA-2 Algorithms with RSA in DNSKEY and RRSIG Resource Records for DNSSEC</title>
<author initials='J.' surname='Jansen' fullname='J. Jansen'>
<organization /></author>
<date year='2009' month='October' />
<abstract>
<t>This document describes how to produce RSA/SHA-256 and RSA/SHA-512 DNSKEY and RRSIG resource records for use in the Domain Name System Security Extensions (RFC 4033, RFC 4034, and RFC 4035). [STANDARDS TRACK]</t></abstract></front>

<seriesInfo name='RFC' value='5702' />
<format type='TXT' octets='19425' target='http://www.rfc-editor.org/rfc/rfc5702.txt' />
</reference>
<?rfc linefile="276:draft-icann-dnssec-trust-anchor.xml"?>
      <?rfc linefile="1:http://xml.resource.org/public/rfc/bibxml/reference.RFC.5751.xml"?>

<reference anchor='RFC5751'>

<front>
<title>Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.2 Message Specification</title>
<author initials='B.' surname='Ramsdell' fullname='B. Ramsdell'>
<organization /></author>
<author initials='S.' surname='Turner' fullname='S. Turner'>
<organization /></author>
<date year='2010' month='January' />
<abstract>
<t>This document defines Secure/Multipurpose Internet Mail Extensions (S/MIME) version 3.2.  S/MIME provides a consistent way to send and receive secure MIME data.  Digital signatures provide authentication, message integrity, and non-repudiation with proof of origin.  Encryption provides data confidentiality.  Compression can be used to reduce data size.  This document obsoletes RFC 3851. [STANDARDS-TRACK]</t></abstract></front>

<seriesInfo name='RFC' value='5751' />
<format type='TXT' octets='98638' target='http://www.rfc-editor.org/rfc/rfc5751.txt' />
</reference>
<?rfc linefile="277:draft-icann-dnssec-trust-anchor.xml"?>
    </references>

    <references title="Informative References">
      <reference anchor="DPS">
        <?rfc linefile="1:../dps/icann-dps.front"?><front>
  <title abbrev="Root Zone KSK Operator DPS">DNSSEC Practice Statement for the Root Zone KSK Operator</title>

  <author fullname="Fredrik Ljunggren" initials="F." surname="Ljunggren">
    <organization abbrev="Kirei">Kirei AB</organization>
    <address>
      <postal>
        <street>P.O. Box 53204</street>
        <city>Goteborg</city>
        <code>SE-400 16</code>
        <country>Sweden</country>
      </postal>
      <email>fredrik@kirei.se</email>
    </address>
  </author>

  <author fullname="Tomofumi Okubo" initials="T." surname="Okubo">
    <organization abbrev="VeriSign">VeriSign Inc.</organization>
    <address>
      <postal>
        <street>21345 Ridgetop Circle</street>
        <city>Dulles</city>
        <region>VA</region>
        <code>20166-6503</code>
        <country>USA</country>
      </postal>
      <email>tookubo@verisign.com</email>
    </address>
  </author>

  <author fullname="Richard Lamb" initials="R." surname="Lamb">
    <organization abbrev="ICANN">Internet Corporation For Assigned Names and
    Numbers</organization>
    <address>
      <postal>
        <street>4676 Admiralty Way, Suite 330</street>
        <city>Marina del Ray</city>
        <region>CA</region>
        <code>90292</code>
        <country>USA</country>
      </postal>
      <email>richard.lamb@icann.org</email>
    </address>
  </author>

  <author fullname="Jakob Schlyter" initials="J." surname="Schlyter">
    <organization abbrev="Kirei">Kirei AB</organization>
    <address>
      <postal>
        <street>P.O. Box 53204</street>
        <city>Goteborg</city>
        <code>SE-400 16</code>
        <country>Sweden</country>
      </postal>
      <email>jakob@kirei.se</email>
    </address>
  </author>

  <date day="21" month="May" year="2010" />

  <keyword>DNS</keyword>
  <keyword>DNSSEC</keyword>

  <abstract>

    <t>This document is the DNSSEC Practice Statement (DPS) for the Root
    Zone Key Signing Key (KSK) Operator. It states the practices and
    provisions that are used to provide Root Zone Key Signing and Key
    Distribution services. These include, but are not limited to: issuing,
    managing, changing and distributing DNS keys in accordance with the
    specific requirements of the U.S. Department of Commerce.</t>

  </abstract>

  <note title="Copyright Notice">
    <t>Copyright 2009 by VeriSign, Inc., and by Internet Corporation For
    Assigned Names and Numbers. This work is based on the Certification
    Practice Statement, Copyright 1996-2004 by VeriSign, Inc. Used by
    Permission. All Rights Reserved.</t>
  </note>

  <note title="Trademark Notices">
    <t>ICANN is a registered trademark of The Internet Corporation for
    Assigned Names and Numbers.</t>
    <t>VERISIGN is a registered trademark of VeriSign, Inc.</t>
  </note>

</front>
<?rfc linefile="282:draft-icann-dnssec-trust-anchor.xml"?>
        <format type="TXT"
          target="https://www.iana.org/dnssec/icann-dps.txt" />
      </reference>
    </references>

    <section anchor="schema" title="Trust Anchor Publication Document Schema">
      <t>A Relax NG Compact Schema for the documents used to publish
        trust anchors can be found in <xref target="schemafig"/>.</t>

      <figure anchor="schemafig">
        <artwork>

datatypes xsd = "http://www.w3.org/2001/XMLSchema-datatypes"

start = element TrustAnchor {
    attribute id { xsd:string },
    attribute source { xsd:string },
    element Zone { xsd:string },

    keydigest+
}

keydigest = element KeyDigest {
    attribute id { xsd:string },
    attribute validFrom { xsd:dateTime },
    attribute validUntil { xsd:dateTime }?,

    element KeyTag {
            xsd:nonNegativeInteger { maxInclusive = "65535" } },
    element Algorithm {
            xsd:nonNegativeInteger { maxInclusive = "255" } },
    element DigestType {
            xsd:nonNegativeInteger { maxInclusive = "255" } },
    element Digest { xsd:hexBinary },

    element Certificate {
            attribute source { xsd:string },
            empty
    }+
}

       </artwork>
      </figure>
    </section>

    <section anchor="examples" title="Example Signed Trust Anchor Set">
      <t><xref target="eg1"/> describes two trust anchors for the
        root zone such as might be retrieved using the URL <eref
        target="https://data.iana.org/root-anchors/root-anchors.xml"/>.</t>

      <figure anchor="eg1">
        <artwork>

&lt;?xml version="1.0" encoding="UTF-8"?&gt;

&lt;TrustAnchor
    id="AD42165F-B099-4778-8F42-D34A1D41FD93"
    source="http://data.iana.org/root-anchors/root-anchors.xml"&gt;
  
    &lt;Zone&gt;.&lt;/Zone&gt;

    &lt;KeyDigest id="42"
               validFrom="2010-07-01T00:00:00-00:00"
               validUntil="2010-08-01T00:00:00-00:00"&gt;
        &lt;KeyTag&gt;34291&lt;/KeyTag&gt;
        &lt;Algorithm&gt;5&lt;/Algorithm&gt;
        &lt;DigestType&gt;1&lt;/DigestType&gt;
        &lt;Digest&gt;c8cb3d7fe518835490af8029c23efbce6b6ef3e2&lt;/Digest&gt;
    &lt;/KeyDigest&gt;

    &lt;KeyDigest id="53"
               validFrom="2010-08-01T00:00:00-00:00"&gt;
        &lt;KeyTag&gt;12345&lt;/KeyTag&gt;
        &lt;Algorithm&gt;5&lt;/Algorithm&gt;
        &lt;DigestType&gt;1&lt;/DigestType&gt;
        &lt;Digest&gt;a3cf809dbdbc835716ba22bdc370d2efa50f21c7&lt;/Digest&gt;
        &lt;Certificate
          source="http://data.iana.org/root-anchors/Kexample1.crt"/&gt;
        &lt;Certificate
          source="http://data.iana.org/root-anchors/Kexample2.crt"/&gt;
    &lt;/KeyDigest&gt;

&lt;/TrustAnchor&gt;

        </artwork>
      </figure>
    </section>

    <section anchor="asn1-rr" title="ASN.1 Module for DNS Resource Record">
      <figure>
        <artwork>

ResourceRecord
  { iso(1) identified-organization(3) dod(6) internet(1) security(5)
    mechanisms(5) pkix(7) id-mod(0) id-mod-dns-resource-record(70) }

DEFINITIONS IMPLICIT TAGS ::=

BEGIN

-- EXPORTS ALL --

IMPORTS

caseIgnoreMatch FROM SelectedAttributeTypes
    { joint-iso-itu-t ds(5) module(1) selectedAttributeTypes(5) 4 }

;

iana OBJECT IDENTIFIER ::= { iso(1) identified-organization(3)
    dod(6) internet(1) private(4) enterprise(1) 1000 }

iana-dns OBJECT IDENTIFIER ::= { iana 53 }

resourceRecord ATTRIBUTE ::= {
    WITH SYNTAX IA5String
    EQUALITY MATCHING RULE caseIgnoreIA5Match
    ID iana-dns
}
    
END

       </artwork>
      </figure>
    </section>

    <section title="Historical Note">
      <t>The first KSK for use in the root zone of the DNS was
	generated at a key ceremony at an ICANN Key Management Facility
	(KMF) in Culpeper, Virginia, USA on 2010-06-16.  This key
	entered production during a second key ceremony held at an
	ICANN KMF in El Segundo, California, USA on 2010-07-12.
	The resulting trust anchor was first published on 2010-07-15.</t>
    </section>

    <section title="About this Document">
      <t>[RFC Editor: please remove this section, including all
        subsections, prior to publication.]</t>

      <section title="Discussion">
        <t>This document is not the product of any IETF working
          group.  However, communities interested in similar technical
          work can be found at the IETF in the DNSOP and DNSEXT
          working groups.</t>

        <t>The team responsible for deployment of DNSSEC in the
          root zone can be reached at rootsign@icann.org.</t>

        <t>The authors also welcome feedback sent to them directly.</t>
      </section>

      <section title="Document History">
        <section title="draft-jabley-dnssec-trust-anchor-00">
          <t>This document is based on earlier documentation used
            within and published by the team responsible for DNSSEC
            deployment in the root zone. This is the first revision
            circulated with the intention of publication in the RFC
            series.</t>
        </section>

        <section title="draft-jabley-dnssec-trust-anchor-01">
          <t>Incorporated initial community suggestions. Editorial
            improvements. Allocate OID and clean up syntax of ASN.1
            module.</t>
        </section>

        <section title="draft-jabley-dnssec-trust-anchor-02">
          <t>Draft expired.</t>
        </section>

        <section title="draft-jabley-dnssec-trust-anchor-03">
          <t>Added the optional &lt;Certificate&gt; element to the XML
            schema to provide a mechanism for locating external
            X.509 certificates relating to a particular key.</t>
        </section>
      </section>
    </section>
  </back>
</rfc>
