%% You should probably cite draft-livingood-dnsop-negative-trust-anchors-01 instead of this revision. @techreport{livingood-dnsop-negative-trust-anchors-00, number = {draft-livingood-dnsop-negative-trust-anchors-00}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-livingood-dnsop-negative-trust-anchors/00/}, author = {P Ebersman and Chris Griffiths and Warren "Ace" Kumari and Jason Livingood and Ralf Weber}, title = {{Definition and Use of DNSSEC Negative Trust Anchors}}, pagetotal = 17, year = 2014, month = sep, day = 25, abstract = {DNS Security Extensions (DNSSEC) is now entering widespread deployment. However, domain signing tools and processes are not yet as mature and reliable as is the case for non-DNSSEC-related domain administration tools and processes. One potential technique to mitigate this is to use a Negative Trust Anchor, which is defined in this document. This document discusses Trust Anchors for DNSSEC and defines a Negative Trust Anchor, which is potentially useful during the transition to ubiquitous DNSSEC deployment. These are configured locally on a particular instance of a validating DNS recursive resolver and can shield end users of such a resolver from the DNSSEC- related authoritative name server operational errors that appear to be somewhat typical during the transition to ubiquitous DNSSEC deployment. Negative Trust Anchors are intended to be temporary, and should not be distributed by IANA or any other organization outside of the administrative boundary of the organization locally implementing a Negative Trust Anchor. Finally, Negative Trust Anchors pertain only to DNSSEC and not to Public Key Infrastructures (PKI) such ad X.509.}, }