<?xml version='1.0' encoding='utf-8'?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" version="3" ipr="trust200902" docName="draft-ietf-dnsop-must-not-sha1-10" number="9905" category="std" consensus="true" submissionType="IETF" updates="4034, 5155" obsoletes="" xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true" prepTime="2025-11-30T16:05:21" indexInclude="true" scripts="Common,Latin" tocDepth="3">
  <link href="https://datatracker.ietf.org/doc/draft-ietf-dnsop-must-not-sha1-10" rel="prev"/>
  <link href="https://dx.doi.org/10.17487/rfc9905" rel="alternate"/>
  <link href="urn:issn:2070-1721" rel="alternate"/>
  <front>
    <title abbrev="Deprecating SHA-1 in DNSSEC Signature Algorithms">Deprecating the Use of SHA-1 in DNSSEC Signature Algorithms</title>
    <seriesInfo name="RFC" value="9905" stream="IETF"/>
    <author initials="W." surname="Hardaker" fullname="Wes Hardaker">
      <organization showOnFrontPage="true">USC/ISI</organization>
      <address>
        <email>ietf@hardakers.net</email>
      </address>
    </author>
    <author initials="W." surname="Kumari" fullname="Warren Kumari">
      <organization showOnFrontPage="true">Google</organization>
      <address>
        <email>warren@kumari.net</email>
      </address>
    </author>
    <date month="11" year="2025"/>
    <area>OPS</area>
    <workgroup>dnsop</workgroup>
    <abstract pn="section-abstract">
      <t indent="0" pn="section-abstract-1">This document deprecates the use of the RSASHA1 and RSASHA1-NSEC3-SHA1
algorithms for the creation of DNS Public Key (DNSKEY) and Resource
Record Signature (RRSIG) records.</t>
      <t indent="0" pn="section-abstract-2">It updates RFCs 4034 and 5155 as it deprecates the use of these algorithms.</t>
    </abstract>
    <boilerplate>
      <section anchor="status-of-memo" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.1">
        <name slugifiedName="name-status-of-this-memo">Status of This Memo</name>
        <t indent="0" pn="section-boilerplate.1-1">
            This is an Internet Standards Track document.
        </t>
        <t indent="0" pn="section-boilerplate.1-2">
            This document is a product of the Internet Engineering Task Force
            (IETF).  It represents the consensus of the IETF community.  It has
            received public review and has been approved for publication by
            the Internet Engineering Steering Group (IESG).  Further
            information on Internet Standards is available in Section 2 of 
            RFC 7841.
        </t>
        <t indent="0" pn="section-boilerplate.1-3">
            Information about the current status of this document, any
            errata, and how to provide feedback on it may be obtained at
            <eref target="https://www.rfc-editor.org/info/rfc9905" brackets="none"/>.
        </t>
      </section>
      <section anchor="copyright" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.2">
        <name slugifiedName="name-copyright-notice">Copyright Notice</name>
        <t indent="0" pn="section-boilerplate.2-1">
            Copyright (c) 2025 IETF Trust and the persons identified as the
            document authors. All rights reserved.
        </t>
        <t indent="0" pn="section-boilerplate.2-2">
            This document is subject to BCP 78 and the IETF Trust's Legal
            Provisions Relating to IETF Documents
            (<eref target="https://trustee.ietf.org/license-info" brackets="none"/>) in effect on the date of
            publication of this document. Please review these documents
            carefully, as they describe your rights and restrictions with
            respect to this document. Code Components extracted from this
            document must include Revised BSD License text as described in
            Section 4.e of the Trust Legal Provisions and are provided without
            warranty as described in the Revised BSD License.
        </t>
      </section>
    </boilerplate>
    <toc>
      <section anchor="toc" numbered="false" removeInRFC="false" toc="exclude" pn="section-toc.1">
        <name slugifiedName="name-table-of-contents">Table of Contents</name>
        <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1">
          <li pn="section-toc.1-1.1">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.1"><xref derivedContent="1" format="counter" sectionFormat="of" target="section-1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-introduction">Introduction</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.1.2">
              <li pn="section-toc.1-1.1.2.1">
                <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.2.1.1"><xref derivedContent="1.1" format="counter" sectionFormat="of" target="section-1.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-requirements-notation">Requirements Notation</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.2">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.2.1"><xref derivedContent="2" format="counter" sectionFormat="of" target="section-2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-deprecating-sha-1-from-dnss">Deprecating SHA-1 from DNSSEC Signatures and Delegation RRs</xref></t>
          </li>
          <li pn="section-toc.1-1.3">
            <t indent="0" pn="section-toc.1-1.3.1"><xref derivedContent="3" format="counter" sectionFormat="of" target="section-3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-security-considerations">Security Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.4">
            <t indent="0" pn="section-toc.1-1.4.1"><xref derivedContent="4" format="counter" sectionFormat="of" target="section-4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-operational-considerations">Operational Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.5">
            <t indent="0" pn="section-toc.1-1.5.1"><xref derivedContent="5" format="counter" sectionFormat="of" target="section-5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-iana-considerations">IANA Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.6">
            <t indent="0" pn="section-toc.1-1.6.1"><xref derivedContent="6" format="counter" sectionFormat="of" target="section-6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-normative-references">Normative References</xref></t>
          </li>
          <li pn="section-toc.1-1.7">
            <t indent="0" pn="section-toc.1-1.7.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.a"/><xref derivedContent="" format="title" sectionFormat="of" target="name-acknowledgments">Acknowledgments</xref></t>
          </li>
          <li pn="section-toc.1-1.8">
            <t indent="0" pn="section-toc.1-1.8.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.b"/><xref derivedContent="" format="title" sectionFormat="of" target="name-authors-addresses">Authors' Addresses</xref></t>
          </li>
        </ul>
      </section>
    </toc>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" removeInRFC="false" toc="include" pn="section-1">
      <name slugifiedName="name-introduction">Introduction</name>
      <t indent="0" pn="section-1-1">The security of the protection provided by the SHA-1 algorithm <xref target="RFC3174" format="default" sectionFormat="of" derivedContent="RFC3174"/> has been slowly diminishing
over time as various forms of attacks have weakened its cryptographic
underpinning.  DNSSEC <xref target="RFC9364" format="default" sectionFormat="of" derivedContent="RFC9364"/> (originally defined in <xref target="RFC3110" format="default" sectionFormat="of" derivedContent="RFC3110"/>) made extensive use
of SHA-1, for example, as a
cryptographic hash algorithm in Resource Record Signature (RRSIG) and Delegation Signer (DS)
records. Since then, multiple other algorithms with
stronger cryptographic strength have become widely available for DS records 
and for RRSIG and DNS Public Key (DNSKEY) records <xref target="RFC4034" format="default" sectionFormat="of" derivedContent="RFC4034"/>.
Operators are encouraged to consider switching to one of the recommended algorithms 
listed in the "DNS Security Algorithm
   Numbers" <xref target="DNSKEY-IANA" format="default" sectionFormat="of" derivedContent="DNSKEY-IANA"/> and "DNS Security Algorithm
   Numbers" <xref target="DS-IANA" format="default" sectionFormat="of" derivedContent="DS-IANA"/> registries, respectively.
Further, support for validating SHA-1-based signatures has been
removed from some systems. As a result, SHA-1 as part of a signature algorithm 
is no longer fully interoperable
in the context of DNSSEC. As adequate alternatives exist, the use of SHA-1 is
no longer advisable.</t>
      <t indent="0" pn="section-1-2">This document thus deprecates the use of RSASHA1 and
RSASHA1-NSEC3-SHA1 for DNS Security Algorithms.</t>
      <section anchor="requirements-notation" numbered="true" removeInRFC="false" toc="include" pn="section-1.1">
        <name slugifiedName="name-requirements-notation">Requirements Notation</name>
        <t indent="0" pn="section-1.1-1">
    The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
    "<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
    described in BCP 14 <xref target="RFC2119" format="default" sectionFormat="of" derivedContent="RFC2119"/> <xref target="RFC8174" format="default" sectionFormat="of" derivedContent="RFC8174"/> 
    when, and only when, they appear in all capitals, as shown here.
        </t>
      </section>
    </section>
    <section anchor="deprecating-sha-1-from-dnssec-signatures-and-delegation-rrs" numbered="true" removeInRFC="false" toc="include" pn="section-2">
      <name slugifiedName="name-deprecating-sha-1-from-dnss">Deprecating SHA-1 from DNSSEC Signatures and Delegation RRs</name>
      <t indent="0" pn="section-2-1">The RSASHA1 <xref target="RFC4034" format="default" sectionFormat="of" derivedContent="RFC4034"/> and RSASHA1-NSEC3-SHA1 <xref target="RFC5155" format="default" sectionFormat="of" derivedContent="RFC5155"/> algorithms <bcp14>MUST NOT</bcp14>
be used when creating DS records.  Operators of validating resolvers <bcp14>MUST</bcp14> treat RSASHA1
and RSASHA1-NSEC3-SHA1 DS records as insecure.  If no other DS records of
accepted cryptographic algorithms are available, the DNS records below the
delegation point <bcp14>MUST</bcp14> be treated as insecure.</t>
      <t indent="0" pn="section-2-2">The RSASHA1 <xref target="RFC4034" format="default" sectionFormat="of" derivedContent="RFC4034"/> and RSASHA1-NSEC3-SHA1 <xref target="RFC5155" format="default" sectionFormat="of" derivedContent="RFC5155"/> algorithms <bcp14>MUST NOT</bcp14> be
used when creating DNSKEY and RRSIG records.  Validating resolver implementations
(<xref target="RFC9499" sectionFormat="comma" section="10" format="default" derivedLink="https://rfc-editor.org/rfc/rfc9499#section-10" derivedContent="RFC9499"/>) <bcp14>MUST</bcp14> continue to support validation using these
algorithms as they are diminishing in use but still actively in use for some
domains as of this publication. Operators of validating resolvers <bcp14>MUST</bcp14> treat DNSSEC signing algorithms RSASHA1 and RSASHA1-NSEC3-SHA1 as unsupported, rendering responses insecure if they cannot be validated by other supported signing algorithms.</t>
    </section>
    <section anchor="security-considerations" numbered="true" removeInRFC="false" toc="include" pn="section-3">
      <name slugifiedName="name-security-considerations">Security Considerations</name>
      <t indent="0" pn="section-3-1">This document deprecates the use of RSASHA1 and RSASHA1-NSEC3-SHA1 for
DNSSEC delegation and DNSSEC signing since these algorithms are no
longer considered to be secure.</t>
    </section>
    <section anchor="operational-considerations" numbered="true" removeInRFC="false" toc="include" pn="section-4">
      <name slugifiedName="name-operational-considerations">Operational Considerations</name>
      <t indent="0" pn="section-4-1">Zone owners currently making use of SHA-1-based algorithms should
immediately switch to algorithms with stronger cryptographic algorithms,
such as the recommended algorithms in the IANA registries <xref target="DNSKEY-IANA" format="default" sectionFormat="of" derivedContent="DNSKEY-IANA"/> <xref target="DS-IANA" format="default" sectionFormat="of" derivedContent="DS-IANA"/>.</t>
      <t indent="0" pn="section-4-2">Operators should take care when deploying software packages and
operating systems that may have already removed support for the SHA-1
algorithm.  In these situations, software may need to be manually built
and deployed by an operator to continue supporting the required levels
indicated by the "Use for DNSSEC Validation" and "Implement for DNSSEC
Validation" columns, which this document is not changing.</t>
    </section>
    <section anchor="iana-considerations" numbered="true" removeInRFC="false" toc="include" pn="section-5">
      <name slugifiedName="name-iana-considerations">IANA Considerations</name>
      <t indent="0" pn="section-5-1">IANA has updated the SHA-1 (1) entry in the "Digest Algorithms" registry <xref target="DS-IANA" format="default" sectionFormat="of" derivedContent="DS-IANA"/> <xref target="RFC9904" format="default" sectionFormat="of" derivedContent="RFC9904"/> as follows and has added this document as a reference for the entry:</t>
      <dl spacing="compact" indent="3" newline="false" pn="section-5-2">
        <dt pn="section-5-2.1">Value:</dt>
        <dd pn="section-5-2.2"> 1</dd>
        <dt pn="section-5-2.3"> Description:</dt>
        <dd pn="section-5-2.4"> SHA-1</dd>
        <dt pn="section-5-2.5"> Use for DNSSEC Delegation:</dt>
        <dd pn="section-5-2.6">
          <bcp14>MUST NOT</bcp14></dd>
        <dt pn="section-5-2.7"> Use for DNSSEC Validation:</dt>
        <dd pn="section-5-2.8">
          <bcp14>RECOMMENDED</bcp14></dd>
        <dt pn="section-5-2.9"> Implement for DNSSEC Delegation:</dt>
        <dd pn="section-5-2.10">
          <bcp14>MUST NOT</bcp14></dd>
        <dt pn="section-5-2.11"> Implement for DNSSEC Validation:</dt>
        <dd pn="section-5-2.12">
          <bcp14>MUST</bcp14></dd>
      </dl>
      <t indent="0" pn="section-5-3">  IANA has updated the RSASHA1 (5) and RSASHA1-NSEC3-SHA1 (7)
  algorithm entries in the "DNS Security Algorithm Numbers" registry
  <xref target="DNSKEY-IANA" format="default" sectionFormat="of" derivedContent="DNSKEY-IANA"/> <xref target="RFC9904" format="default" sectionFormat="of" derivedContent="RFC9904"/> as follows and has added this document as a
  reference for the entries:
</t>
      <dl spacing="compact" indent="3" newline="false" pn="section-5-4">
        <dt pn="section-5-4.1"> Number:</dt>
        <dd pn="section-5-4.2"> 5</dd>
        <dt pn="section-5-4.3">Description:</dt>
        <dd pn="section-5-4.4"> RSA/SHA-1</dd>
        <dt pn="section-5-4.5">Mnemonic:</dt>
        <dd pn="section-5-4.6"> RSASHA1</dd>
        <dt pn="section-5-4.7">Zone Signing:</dt>
        <dd pn="section-5-4.8"> Y</dd>
        <dt pn="section-5-4.9">Trans. Sec.:</dt>
        <dd pn="section-5-4.10"> Y</dd>
        <dt pn="section-5-4.11">Use for DNSSEC Signing:</dt>
        <dd pn="section-5-4.12">
          <bcp14>MUST NOT</bcp14></dd>
        <dt pn="section-5-4.13">Use for DNSSEC Validation:</dt>
        <dd pn="section-5-4.14">
          <bcp14>RECOMMENDED</bcp14></dd>
        <dt pn="section-5-4.15">Implement for DNSSEC Signing:</dt>
        <dd pn="section-5-4.16">
          <bcp14>NOT RECOMMENDED</bcp14></dd>
        <dt pn="section-5-4.17">Implement for DNSSEC Validation:</dt>
        <dd pn="section-5-4.18">
          <bcp14>MUST</bcp14></dd>
      </dl>
      <dl spacing="compact" indent="3" newline="false" pn="section-5-5">
        <dt pn="section-5-5.1">Number:</dt>
        <dd pn="section-5-5.2"> 7</dd>
        <dt pn="section-5-5.3"> Description:</dt>
        <dd pn="section-5-5.4"> RSASHA1-NSEC3-SHA1</dd>
        <dt pn="section-5-5.5">Mnemonic:</dt>
        <dd pn="section-5-5.6"> RSASHA1-NSEC3-SHA1</dd>
        <dt pn="section-5-5.7">Zone Signing: </dt>
        <dd pn="section-5-5.8">Y</dd>
        <dt pn="section-5-5.9">Trans. Sec.:</dt>
        <dd pn="section-5-5.10"> Y</dd>
        <dt pn="section-5-5.11">Use for DNSSEC Signing:</dt>
        <dd pn="section-5-5.12">
          <bcp14>MUST NOT</bcp14></dd>
        <dt pn="section-5-5.13">Use for DNSSEC Validation:</dt>
        <dd pn="section-5-5.14">
          <bcp14>RECOMMENDED</bcp14></dd>
        <dt pn="section-5-5.15">Implement for DNSSEC Signing:</dt>
        <dd pn="section-5-5.16">
          <bcp14>NOT RECOMMENDED</bcp14></dd>
        <dt pn="section-5-5.17">Implement for DNSSEC Validation:</dt>
        <dd pn="section-5-5.18">
          <bcp14>MUST</bcp14></dd>
      </dl>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references" pn="section-6">
      <name slugifiedName="name-normative-references">Normative References</name>
      <reference anchor="DNSKEY-IANA" target="https://www.iana.org/assignments/dns-sec-alg-numbers" quoteTitle="true" derivedAnchor="DNSKEY-IANA">
        <front>
          <title>DNS Security Algorithm Numbers</title>
          <author initials="" surname="IANA" fullname="IANA">
            <organization showOnFrontPage="true"/>
          </author>
        </front>
      </reference>
      <reference anchor="DS-IANA" target="http://www.iana.org/assignments/ds-rr-types" quoteTitle="true" derivedAnchor="DS-IANA">
        <front>
          <title>Digest Algorithms</title>
          <author initials="" surname="IANA" fullname="IANA">
            <organization showOnFrontPage="true"/>
          </author>
        </front>
      </reference>
      <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" quoteTitle="true" derivedAnchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t indent="0">In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC3110" target="https://www.rfc-editor.org/info/rfc3110" quoteTitle="true" derivedAnchor="RFC3110">
        <front>
          <title>RSA/SHA-1 SIGs and RSA KEYs in the Domain Name System (DNS)</title>
          <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
          <date month="May" year="2001"/>
          <abstract>
            <t indent="0">This document describes how to produce RSA/SHA1 SIG resource records (RRs) in Section 3 and, so as to completely replace RFC 2537, describes how to produce RSA KEY RRs in Section 2. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3110"/>
        <seriesInfo name="DOI" value="10.17487/RFC3110"/>
      </reference>
      <reference anchor="RFC3174" target="https://www.rfc-editor.org/info/rfc3174" quoteTitle="true" derivedAnchor="RFC3174">
        <front>
          <title>US Secure Hash Algorithm 1 (SHA1)</title>
          <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
          <author fullname="P. Jones" initials="P." surname="Jones"/>
          <date month="September" year="2001"/>
          <abstract>
            <t indent="0">The purpose of this document is to make the SHA-1 (Secure Hash Algorithm 1) hash algorithm conveniently available to the Internet community. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3174"/>
        <seriesInfo name="DOI" value="10.17487/RFC3174"/>
      </reference>
      <reference anchor="RFC4034" target="https://www.rfc-editor.org/info/rfc4034" quoteTitle="true" derivedAnchor="RFC4034">
        <front>
          <title>Resource Records for the DNS Security Extensions</title>
          <author fullname="R. Arends" initials="R." surname="Arends"/>
          <author fullname="R. Austein" initials="R." surname="Austein"/>
          <author fullname="M. Larson" initials="M." surname="Larson"/>
          <author fullname="D. Massey" initials="D." surname="Massey"/>
          <author fullname="S. Rose" initials="S." surname="Rose"/>
          <date month="March" year="2005"/>
          <abstract>
            <t indent="0">This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of resource records and protocol modifications that provide source authentication for the DNS. This document defines the public key (DNSKEY), delegation signer (DS), resource record digital signature (RRSIG), and authenticated denial of existence (NSEC) resource records. The purpose and format of each resource record is described in detail, and an example of each resource record is given.</t>
            <t indent="0">This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4034"/>
        <seriesInfo name="DOI" value="10.17487/RFC4034"/>
      </reference>
      <reference anchor="RFC5155" target="https://www.rfc-editor.org/info/rfc5155" quoteTitle="true" derivedAnchor="RFC5155">
        <front>
          <title>DNS Security (DNSSEC) Hashed Authenticated Denial of Existence</title>
          <author fullname="B. Laurie" initials="B." surname="Laurie"/>
          <author fullname="G. Sisson" initials="G." surname="Sisson"/>
          <author fullname="R. Arends" initials="R." surname="Arends"/>
          <author fullname="D. Blacka" initials="D." surname="Blacka"/>
          <date month="March" year="2008"/>
          <abstract>
            <t indent="0">The Domain Name System Security (DNSSEC) Extensions introduced the NSEC resource record (RR) for authenticated denial of existence. This document introduces an alternative resource record, NSEC3, which similarly provides authenticated denial of existence. However, it also provides measures against zone enumeration and permits gradual expansion of delegation-centric zones. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5155"/>
        <seriesInfo name="DOI" value="10.17487/RFC5155"/>
      </reference>
      <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" quoteTitle="true" derivedAnchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t indent="0">RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
      <reference anchor="RFC9364" target="https://www.rfc-editor.org/info/rfc9364" quoteTitle="true" derivedAnchor="RFC9364">
        <front>
          <title>DNS Security Extensions (DNSSEC)</title>
          <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
          <date month="February" year="2023"/>
          <abstract>
            <t indent="0">This document describes the DNS Security Extensions (commonly called "DNSSEC") that are specified in RFCs 4033, 4034, and 4035, as well as a handful of others. One purpose is to introduce all of the RFCs in one place so that the reader can understand the many aspects of DNSSEC. This document does not update any of those RFCs. A second purpose is to state that using DNSSEC for origin authentication of DNS data is the best current practice. A third purpose is to provide a single reference for other documents that want to refer to DNSSEC.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="237"/>
        <seriesInfo name="RFC" value="9364"/>
        <seriesInfo name="DOI" value="10.17487/RFC9364"/>
      </reference>
      <reference anchor="RFC9499" target="https://www.rfc-editor.org/info/rfc9499" quoteTitle="true" derivedAnchor="RFC9499">
        <front>
          <title>DNS Terminology</title>
          <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
          <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
          <date month="March" year="2024"/>
          <abstract>
            <t indent="0">The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
            <t indent="0">This document updates RFC 2308 by clarifying the definitions of "forwarder" and "QNAME". It obsoletes RFC 8499 by adding multiple terms and clarifications. Comprehensive lists of changed and new definitions can be found in Appendices A and B.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="219"/>
        <seriesInfo name="RFC" value="9499"/>
        <seriesInfo name="DOI" value="10.17487/RFC9499"/>
      </reference>
      <reference anchor="RFC9904" target="https://www.rfc-editor.org/info/rfc9904" quoteTitle="true" derivedAnchor="RFC9904">
        <front>
          <title>DNSSEC Cryptographic Algorithm Recommendation Update Process</title>
          <author initials="W." surname="Hardaker" fullname="Wes Hardaker">
            <organization showOnFrontPage="true">USC/ISI</organization>
          </author>
          <author initials="W." surname="Kumari" fullname="Warren Kumari">
            <organization showOnFrontPage="true">Google</organization>
          </author>
          <date month="November" year="2025"/>
        </front>
        <seriesInfo name="RFC" value="9904"/>
        <seriesInfo name="DOI" value="10.17487/RFC9904"/>
      </reference>
    </references>
    <section anchor="acknowledgments" numbered="false" removeInRFC="false" toc="include" pn="section-appendix.a">
      <name slugifiedName="name-acknowledgments">Acknowledgments</name>
      <t indent="0" pn="section-appendix.a-1">The authors appreciate the comments and suggestions from the
      following IETF participants in helping produce this document: <contact fullname="Mark Andrews"/>, <contact fullname="Steve Crocker"/>, <contact fullname="Peter Dickson"/>, <contact fullname="Thomas Graf"/>, <contact fullname="Paul Hoffman"/>, <contact fullname="Russ Housley"/>, <contact fullname="Shumon Huque"/>, <contact fullname="Barry Leiba"/>, <contact fullname="S. Moonesamy"/>, <contact fullname="Yoav Nir"/>, <contact fullname="Florian Obser"/>, <contact fullname="Peter Thomassen"/>,
      <contact fullname="Stefan Ubbink"/>, <contact fullname="Paul Wouters"/>,
      <contact fullname="Tim Wicinski"/>, and the many members of the DNSOP
      Working Group that discussed this specification.</t>
    </section>
    <section anchor="authors-addresses" numbered="false" removeInRFC="false" toc="include" pn="section-appendix.b">
      <name slugifiedName="name-authors-addresses">Authors' Addresses</name>
      <author initials="W." surname="Hardaker" fullname="Wes Hardaker">
        <organization showOnFrontPage="true">USC/ISI</organization>
        <address>
          <email>ietf@hardakers.net</email>
        </address>
      </author>
      <author initials="W." surname="Kumari" fullname="Warren Kumari">
        <organization showOnFrontPage="true">Google</organization>
        <address>
          <email>warren@kumari.net</email>
        </address>
      </author>
    </section>
  </back>
</rfc>
