RFC 8145

Signaling Trust Anchor Knowledge in DNS Security Extensions (DNSSEC), April 2017

Canonical URL:
https://www.rfc-editor.org/rfc/rfc8145.txt
File formats:
Plain TextPDF
Status:
PROPOSED STANDARD
Authors:
D. Wessels
W. Kumari
P. Hoffman
Stream:
IETF
Source:
dnsop (ops)

Cite this RFC: TXT  |  XML

DOI:  10.17487/RFC8145

Discuss this RFC: Send questions or comments to dnsop@ietf.org

Other actions: Submit Errata  |  Find IPR Disclosures from the IETF


Abstract

The DNS Security Extensions (DNSSEC) were developed to provide origin authentication and integrity protection for DNS data by using digital signatures. These digital signatures can be verified by building a chain of trust starting from a trust anchor and proceeding down to a particular node in the DNS. This document specifies two different ways for validating resolvers to signal to a server which keys are referenced in their chain of trust. The data from such signaling allow zone administrators to monitor the progress of rollovers in a DNSSEC-signed zone.


For the definition of Status, see RFC 2026.

For the definition of Stream, see RFC 4844.


Download PDF Reader