Applicability Statement: DNS Security (DNSSEC) DNSKEY Algorithm Implementation Status
draft-ietf-dnsext-dnssec-algo-imp-status-01

The information below is for an old version of the document
Document Type Active Internet-Draft (dnsext WG)
Last updated 2012-03-26
Replaces draft-srose-dnssec-algo-imp-status
Stream IETF
Intended RFC status (None)
Formats plain text pdf html bibtex
Reviews
Stream WG state WG Document
Document shepherd None
IESG IESG state I-D Exists
Consensus Boilerplate Unknown
Telechat date
Responsible AD (None)
Send notices to (None)
DNS Extensions Working Group                                     S. Rose
Internet-Draft                                                      NIST
Updates: 2536, 2539, 3110, 4034, 4398,                    March 26, 2012
5155, 5702, 5933 (if approved)
Intended status: BCP
Expires: September 27, 2012

    Applicability Statement: DNS Security (DNSSEC) DNSKEY Algorithm
                         Implementation Status
              draft-ietf-dnsext-dnssec-algo-imp-status-01

Abstract

   The DNS Security Extensions (DNSSEC) requires the use of
   cryptographic algorithm suites for generating digital signatures over
   DNS data.  There is currently an IANA registry for these algorithms
   that is incomplete in that it lacks the recommended implementation
   status of each algorithm.  This document provides an applicability
   statement on algorithm implementation status for DNSSEC component
   software.  This document lists each algorithm's status based on the
   current reference.  In the case that an algorithm is specified
   without an implementation status, this document assigns one.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on September 27, 2012.

Copyright Notice

   Copyright (c) 2012 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents

Rose                   Expires September 27, 2012               [Page 1]
Internet-Draft              Algorithm-Status                  March 2012

   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . . . 3
     1.1.  Requirements Language . . . . . . . . . . . . . . . . . . . 3

   2.  The DNS Security Algorithm Implementation Status Lists  . . . . 3
     2.1.  Algorithm Implementation Status Assignement Rationale . . . 3
     2.2.  DNSSEC Implementation Status Table  . . . . . . . . . . . . 4
     2.3.  Specifying New Algorithms and Updating Status of
           Existing Entries  . . . . . . . . . . . . . . . . . . . . . 4

   3.  IANA Considerations . . . . . . . . . . . . . . . . . . . . . . 5

   4.  Security Considerations . . . . . . . . . . . . . . . . . . . . 5

   5.  References  . . . . . . . . . . . . . . . . . . . . . . . . . . 5
     5.1.  Normative References  . . . . . . . . . . . . . . . . . . . 5
     5.2.  Informative References  . . . . . . . . . . . . . . . . . . 6

Rose                   Expires September 27, 2012               [Page 2]
Internet-Draft              Algorithm-Status                  March 2012

1.  Introduction

   The Domain Name System (DNS) Security Extensions (DNSSEC) [RFC4033],
   [RFC4034], [RFC4035], [RFC4509], [RFC5155], and [RFC5702] uses
   digital signatures over DNS data to provide source authentication and
   integrity protection.  DNSSEC uses an IANA registry to list codes for
   digital signature algorithms (consisting of a cryptographic algorithm
   and one-way hash function).

   The original list of algorithm status is found in [RFC4034].  Other
   DNSSEC RFC's have added new algorithms or changed the status of
   algorithms in the registry.  However, implementers must read through
   all the documents in order to discover which algorithms are
   considered wise to implement, which are not, and which algorithms may
   become widely used in the future.  This document includes the current
   implementation status for certain algorithms.

   This implementation status indication is only to be considered for
   implementation, not deployment or operations.  Operators are free to
   deploy any digital signature algorithm available in implementations
   or algorithms chosen by local security policies.  This status is to
   measure compliance to this document only.

   This document updates the following: [RFC2536], [RFC2539], [RFC3110],
Show full document text