<?xml version="1.0" encoding="UTF-8"?>
<reference anchor="I-D.huston-kskroll-sentinel" target="https://datatracker.ietf.org/doc/html/draft-huston-kskroll-sentinel-04">
   <front>
      <title>A Sentinel for Detecting Trusted Keys in DNSSEC</title>
      <author initials="G." surname="Huston" fullname="Geoff Huston">
         <organization>APNIC</organization>
      </author>
      <author initials="J. L. S." surname="Damas" fullname="Joao Luis Silva Damas">
         <organization>APNIC</organization>
      </author>
      <author initials="W." surname="Kumari" fullname="Warren Kumari">
         <organization>Google</organization>
      </author>
      <date month="November" day="13" year="2017" />
      <abstract>
	 <t>   The DNS Security Extensions (DNSSEC) were developed to provide origin
   authentication and integrity protection for DNS data by using digital
   signatures.  These digital signatures can be verified by building a
   chain of trust starting from a trust anchor and proceeding down to a
   particular node in the DNS.  This document specifies a mechanism that
   will allow an end user to determine the trusted key state of the
   resolvers that handle the user&#x27;s DNS queries.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-huston-kskroll-sentinel-04" />
   
</reference>
