RFC 8145
Signaling Trust Anchor Knowledge in DNS Security Extensions (DNSSEC), April 2017
- File formats:
- Status:
- PROPOSED STANDARD
- Updated by:
- RFC 8553
- Authors:
- D. Wessels
W. Kumari
P. Hoffman - Stream:
- IETF
- Source:
- dnsop (ops)
Cite this RFC: TXT | XML | BibTeX
DOI: https://doi.org/10.17487/RFC8145
Discuss this RFC: Send questions or comments to the mailing list dnsop@ietf.org
Other actions: Submit Errata | Find IPR Disclosures from the IETF | View History of RFC 8145
Abstract
The DNS Security Extensions (DNSSEC) were developed to provide origin authentication and integrity protection for DNS data by using digital signatures. These digital signatures can be verified by building a chain of trust starting from a trust anchor and proceeding down to a particular node in the DNS. This document specifies two different ways for validating resolvers to signal to a server which keys are referenced in their chain of trust. The data from such signaling allow zone administrators to monitor the progress of rollovers in a DNSSEC-signed zone.
For the definition of Status, see RFC 2026.
For the definition of Stream, see RFC 8729.