RFC 6975
Signaling Cryptographic Algorithm Understanding in DNS Security Extensions (DNSSEC), July 2013
Cite this RFC: TXT | XML | BibTeX
DOI: https://doi.org/10.17487/RFC6975
Discuss this RFC: Send questions or comments to the mailing list dnsext@ietf.org
Other actions: Submit Errata | Find IPR Disclosures from the IETF | View History of RFC 6975
Abstract
The DNS Security Extensions (DNSSEC) were developed to provide origin authentication and integrity protection for DNS data by using digital signatures. These digital signatures can be generated using different algorithms. This document specifies a way for validating end-system resolvers to signal to a server which digital signature and hash algorithms they support. The extensions allow the signaling of new algorithm uptake in client code to allow zone administrators to know when it is possible to complete an algorithm rollover in a DNSSEC-signed zone.
For the definition of Status, see RFC 2026.
For the definition of Stream, see RFC 8729.