DNS Security Extensions (DNSSEC)
RFC 9364
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2023-02-14
|
06 | (System) | Received changes through RFC Editor sync (created alias RFC 9364, changed abstract to 'This document describes the DNS Security Extensions (commonly called "DNSSEC") that … Received changes through RFC Editor sync (created alias RFC 9364, changed abstract to 'This document describes the DNS Security Extensions (commonly called "DNSSEC") that are specified in RFCs 4033, 4034, and 4035, as well as a handful of others. One purpose is to introduce all of the RFCs in one place so that the reader can understand the many aspects of DNSSEC. This document does not update any of those RFCs. A second purpose is to state that using DNSSEC for origin authentication of DNS data is the best current practice. A third purpose is to provide a single reference for other documents that want to refer to DNSSEC.', changed pages to 10, changed standardization level to Best Current Practice, changed state to RFC, added RFC published event at 2023-02-14, changed IESG state to RFC Published, created alias BCP 237) |
2023-02-14
|
06 | (System) | RFC published |
2023-02-13
|
06 | (System) | RFC Editor state changed to AUTH48-DONE from AUTH48 |
2023-02-07
|
06 | (System) | RFC Editor state changed to AUTH48 |
2023-01-18
|
06 | (System) | RFC Editor state changed to RFC-EDITOR from EDIT |
2022-12-02
|
06 | (System) | RFC Editor state changed to EDIT from MISSREF |
2022-10-27
|
06 | (System) | RFC Editor state changed to MISSREF from EDIT |
2022-10-26
|
06 | (System) | IANA Action state changed to No IANA Actions from In Progress |
2022-10-26
|
06 | (System) | RFC Editor state changed to EDIT |
2022-10-26
|
06 | (System) | IESG state changed to RFC Ed Queue from Approved-announcement sent |
2022-10-26
|
06 | (System) | Announcement was received by RFC Editor |
2022-10-26
|
06 | (System) | IANA Action state changed to In Progress |
2022-10-26
|
06 | (System) | Removed all action holders (IESG state changed) |
2022-10-26
|
06 | Cindy Morgan | IESG state changed to Approved-announcement sent from IESG Evaluation::AD Followup |
2022-10-26
|
06 | Cindy Morgan | IESG has approved the document |
2022-10-26
|
06 | Cindy Morgan | Closed "Approve" ballot |
2022-10-26
|
06 | Cindy Morgan | Ballot approval text was generated |
2022-10-25
|
06 | Lars Eggert | [Ballot comment] # GEN AD review of draft-ietf-dnsop-dnssec-bcp-05 CC @larseggert Thanks to Linda Dunbar for the General Area Review Team (Gen-ART) review (https://mailarchive.ietf.org/arch/msg/gen-art/TNMpPSf36E8i5Nt96FoRSlbjPFA). … [Ballot comment] # GEN AD review of draft-ietf-dnsop-dnssec-bcp-05 CC @larseggert Thanks to Linda Dunbar for the General Area Review Team (Gen-ART) review (https://mailarchive.ietf.org/arch/msg/gen-art/TNMpPSf36E8i5Nt96FoRSlbjPFA). ## Nits All comments below are about very minor potential issues that you may choose to address in some way - or ignore - as you see fit. Some were flagged by automated tools (via https://github.com/larseggert/ietf-reviewtool), so there will likely be some false positives. There is no need to let me know what you did with these suggestions. ### Outdated references Reference `[RFC2535]` to `RFC2535`, which was obsoleted by `RFC4033`, `RFC4034`, and `RFC4035` (this may be on purpose). Reference `[RFC2065]` to `RFC2065`, which was obsoleted by `RFC2535` (this may be on purpose). ## Notes This review is in the ["IETF Comments" Markdown format][ICMF], You can use the [`ietf-comments` tool][ICT] to automatically convert this review into individual GitHub issues. Review generated by the [`ietf-reviewtool`][IRT]. [ICMF]: https://github.com/mnot/ietf-comments/blob/main/format.md [ICT]: https://github.com/mnot/ietf-comments [IRT]: https://github.com/larseggert/ietf-reviewtool |
2022-10-25
|
06 | Lars Eggert | [Ballot Position Update] Position for Lars Eggert has been changed to No Objection from Discuss |
2022-10-24
|
06 | (System) | Changed action holders to Warren Kumari (IESG state changed) |
2022-10-24
|
06 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2022-10-24
|
06 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed |
2022-10-24
|
06 | Paul Hoffman | New version available: draft-ietf-dnsop-dnssec-bcp-06.txt |
2022-10-24
|
06 | Paul Hoffman | New version accepted (logged-in submitter: Paul Hoffman) |
2022-10-24
|
06 | Paul Hoffman | Uploaded new revision |
2022-10-20
|
05 | Murray Kucherawy | [Ballot comment] After IESG discussion, I'm updating my comment: I support Lars' DISCUSS. What's curious here is that this seems to be trying to elevate … [Ballot comment] After IESG discussion, I'm updating my comment: I support Lars' DISCUSS. What's curious here is that this seems to be trying to elevate the status of DNSSEC without actually doing that. It feels like the wrong way to go about it. But maybe there are some precedents here I don't know about. I'm happy to be guided if there's history I'm missing. |
2022-10-20
|
05 | Murray Kucherawy | Ballot comment text updated for Murray Kucherawy |
2022-10-20
|
05 | Murray Kucherawy | [Ballot comment] I support Lars' DISCUSS. What's curious here is that this seems to be trying to elevate the status of DNSSEC without actually doing … [Ballot comment] I support Lars' DISCUSS. What's curious here is that this seems to be trying to elevate the status of DNSSEC without actually doing that. It feels like the wrong way to go about it. But maybe there are some precedents here I don't know about. I'm happy to be guided if there's history I'm missing. |
2022-10-20
|
05 | Murray Kucherawy | Ballot comment text updated for Murray Kucherawy |
2022-10-20
|
05 | Alvaro Retana | [Ballot comment] I support Lars' DISCUSS. |
2022-10-20
|
05 | Alvaro Retana | Ballot comment text updated for Alvaro Retana |
2022-10-20
|
05 | (System) | Changed action holders to Paul Hoffman, Warren Kumari (IESG state changed) |
2022-10-20
|
05 | Cindy Morgan | IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation |
2022-10-20
|
05 | Andrew Alston | [Ballot Position Update] New position, No Objection, has been recorded for Andrew Alston |
2022-10-20
|
05 | Lars Eggert | [Ballot discuss] # GEN AD review of draft-ietf-dnsop-dnssec-bcp-05 CC @larseggert Thanks to Linda Dunbar for the General Area Review Team (Gen-ART) review (https://mailarchive.ietf.org/arch/msg/gen-art/TNMpPSf36E8i5Nt96FoRSlbjPFA). … [Ballot discuss] # GEN AD review of draft-ietf-dnsop-dnssec-bcp-05 CC @larseggert Thanks to Linda Dunbar for the General Area Review Team (Gen-ART) review (https://mailarchive.ietf.org/arch/msg/gen-art/TNMpPSf36E8i5Nt96FoRSlbjPFA). ## Discuss ### "Abstract", paragraph 1 ``` This document describes the DNS security extensions (commonly called "DNSSEC") that are specified RFCs 4033, 4034, 4035, and a handful of others. One purpose is to introduce all of the RFCs in one place so that the reader can understand the many aspects of DNSSEC. This document does not update any of those RFCs. Another purpose is to move DNSSEC to Best Current Practice status. ``` I don't understand what "move DNSSEC to Best Current Practice status" means in terms of the standards track. I'm all for advancing the RFC set that makes up DNSSEC along the standards track, but BCP it not part of that track. Publishing a BCP that normatively references some DNSSEC RFCs isn't doing anything in terms of moving them forward. ### Section 1.1, paragraph 2 ``` The DNSSEC set of protocols is the best current practice for adding origin authentication of data in the DNS. To date, no standards- track RFCs offer any other method for such origin authentication of data in the DNS. ``` Just because no other standards track RFCs compete with DNSSEC does not mean it is a BCP. A BCP is something else, i.e. "The BCP subseries of the RFC series is designed to be a way to standardize practices and the results of community deliberations." [RFC2026] ### Section 1.1, paragraph 1 ``` However, this low level of implementation does not affect whether DNSSEC is a best current practice; it just indicates that the value of deploying DNSSEC is often considered lower than the cost. ``` Protocols aren't BCPs. HTTP isn't the "best current practice" for transporting HTML either. |
2022-10-20
|
05 | Lars Eggert | [Ballot comment] ## Nits All comments below are about very minor potential issues that you may choose to address in some way - or ignore … [Ballot comment] ## Nits All comments below are about very minor potential issues that you may choose to address in some way - or ignore - as you see fit. Some were flagged by automated tools (via https://github.com/larseggert/ietf-reviewtool), so there will likely be some false positives. There is no need to let me know what you did with these suggestions. ### Outdated references Reference `[RFC2535]` to `RFC2535`, which was obsoleted by `RFC4033`, `RFC4034`, and `RFC4035` (this may be on purpose). Reference `[RFC2065]` to `RFC2065`, which was obsoleted by `RFC2535` (this may be on purpose). ## Notes This review is in the ["IETF Comments" Markdown format][ICMF], You can use the [`ietf-comments` tool][ICT] to automatically convert this review into individual GitHub issues. Review generated by the [`ietf-reviewtool`][IRT]. [ICMF]: https://github.com/mnot/ietf-comments/blob/main/format.md [ICT]: https://github.com/mnot/ietf-comments [IRT]: https://github.com/larseggert/ietf-reviewtool |
2022-10-20
|
05 | Lars Eggert | [Ballot Position Update] New position, Discuss, has been recorded for Lars Eggert |
2022-10-19
|
05 | Paul Wouters | [Ballot comment] Old DISCUSS (resolved by Paul H in github, pending revised ID) Since draft-ietf-dnsop-rfc5933-bis is in IETF Last Call now, I think it is … [Ballot comment] Old DISCUSS (resolved by Paul H in github, pending revised ID) Since draft-ietf-dnsop-rfc5933-bis is in IETF Last Call now, I think it is worth waiting on and updating this text: The GOST signing algorithm [RFC5933] was also adopted, but has seen very limited use, likely because it is a national algorithm specific to a very small number of countries. To add a reference that RFCXXX updates the GOST algorithms for DNSSEC (but that it is uncertain at this point whether it will be widely adopted) I could be convinced for this document to not wait, but then I do think this paragraph should state that it is NOT RECOMMENDED to implement RFC5933 since the underlying GOST algorithms have been deprecated by its issuer. One purpose is to introduce all of the RFCs in one place so that the reader can understand the many aspects of DNSSEC. This document does not update any of those RFCs. Another purpose is to move DNSSEC to Best Current Practice status. I think another purpose not mentioned, which for me was a main motivator for this document, is to provide a single RFC reference for other documents that want to point to "DNSSEC" using a single reference instead of referring to the 3 core components (in an incomplete way) More than 15 years after the DNSSEC specification was published, it is still not widely deployed. Recent estimates are that fewer than 10% of the domain names used for web sites are signed, and only around a third of queries to recursive resolvers are validated. What is the value of this paragraph? You wouldn't want to have a single IPv6 reference RFC say this either :) This document will be "the reference RFC" for a long time. It should not have dated/outdated statistics in it. However, this low level of implementation does not affect whether DNSSEC is a best current practice I don't think the level of implementation is low. It is actually quite high. Practically all DNS software implements it. I think you meant deployment ? NITS: which algorithms recursive resolver operators should or should not validate. change to: which algorithms recursive resolver operations should or should not use for validation (the algorithms themselves are not validated) |
2022-10-19
|
05 | Paul Wouters | [Ballot Position Update] Position for Paul Wouters has been changed to Yes from Discuss |
2022-10-19
|
05 | Murray Kucherawy | [Ballot comment] I'm not sure how I feel about this being a BCP. If it's more of an index to other DNSSEC standards documents, shouldn't … [Ballot comment] I'm not sure how I feel about this being a BCP. If it's more of an index to other DNSSEC standards documents, shouldn't it be Informational? If the core documents are Standards Track, doesn't that mean DNSSEC is a (proposed) standard, not a BCP? Can it be both? If we ever promote the core documents to full standard, what becomes of this document's status? Maybe there are some precedents here I don't know about. I'm happy to be guided if there's history I'm missing. |
2022-10-19
|
05 | Murray Kucherawy | [Ballot Position Update] New position, No Objection, has been recorded for Murray Kucherawy |
2022-10-19
|
05 | Zaheduzzaman Sarker | [Ballot comment] Thanks for working on this specification. I think a BCP would be helpful. I have two minor comments - - Section 1: if … [Ballot comment] Thanks for working on this specification. I think a BCP would be helpful. I have two minor comments - - Section 1: if we can elaborate on "modern DNSSEC" that would be more useful to understand the characteristic of the modern DNSSEC rather just calling it modern. - Section 1.2: it says - "reading the RFCs should also include looking for the related errata", may be it better to clarify if we mean all the erratas with all the states or just verified ones. |
2022-10-19
|
05 | Zaheduzzaman Sarker | [Ballot Position Update] New position, No Objection, has been recorded for Zaheduzzaman Sarker |
2022-10-18
|
05 | Éric Vyncke | [Ballot comment] # Éric Vyncke, INT AD, comments for draft-ietf-dnsop-dnssec-bcp-05 CC @evyncke Thank you for the work put into this document. It is short and … [Ballot comment] # Éric Vyncke, INT AD, comments for draft-ietf-dnsop-dnssec-bcp-05 CC @evyncke Thank you for the work put into this document. It is short and contains a lot of useful information. Please find below some non-blocking COMMENT points . Special thanks to Tim Wicinski for the shepherd's detailed write-up including WG consensus and justification of the intended status. Please note that Nicolai Leymann is the DNS directorate reviewer (at my request) and the review status is 'ready': https://datatracker.ietf.org/doc/review-ietf-dnsop-dnssec-bcp-05-dnsdir-telechat-leymann-2022-10-14/ Please note that Sheng Jiang is the Internet directorate reviewer (at my request) and the review status is 'ready': https://datatracker.ietf.org/doc/review-ietf-dnsop-dnssec-bcp-05-intdir-telechat-jiang-2022-10-16/ I hope that this review helps to improve the document, Regards, -éric ## COMMENTS ### BCP Status ? In the light of Geoff Huston's https://stats.labs.apnic.net/dnssec?s=Validating&d=Auto&w=30 , promoting DNSSEC to BCP seems to be wishful thinking (alas :-( ...). No need to reply or to restart a debate. An informational document would probably be better suited. ### Section 2 `"DNSSEC" means the protocol initially defined in [RFC4033], [RFC4034], and [RFC4035].` The use of 'initially' is weird for a third generation, suggest to remove it. ## Notes This review is in the ["IETF Comments" Markdown format][ICMF], You can use the [`ietf-comments` tool][ICT] to automatically convert this review into individual GitHub issues. [ICMF]: https://github.com/mnot/ietf-comments/blob/main/format.md [ICT]: https://github.com/mnot/ietf-comments |
2022-10-18
|
05 | Éric Vyncke | [Ballot Position Update] New position, Yes, has been recorded for Éric Vyncke |
2022-10-17
|
05 | Paul Wouters | [Ballot discuss] Since draft-ietf-dnsop-rfc5933-bis is in IETF Last Call now, I think it is worth waiting on and updating this text: The GOST signing … [Ballot discuss] Since draft-ietf-dnsop-rfc5933-bis is in IETF Last Call now, I think it is worth waiting on and updating this text: The GOST signing algorithm [RFC5933] was also adopted, but has seen very limited use, likely because it is a national algorithm specific to a very small number of countries. To add a reference that RFCXXX updates the GOST algorithms for DNSSEC (but that it is uncertain at this point whether it will be widely adopted) I could be convinced for this document to not wait, but then I do think this paragraph should state that it is NOT RECOMMENDED to implement RFC5933 since the underlying GOST algorithms have been deprecated by its issuer. |
2022-10-17
|
05 | Paul Wouters | [Ballot comment] One purpose is to introduce all of the RFCs in one place so that the reader can understand the many aspects … [Ballot comment] One purpose is to introduce all of the RFCs in one place so that the reader can understand the many aspects of DNSSEC. This document does not update any of those RFCs. Another purpose is to move DNSSEC to Best Current Practice status. I think another purpose not mentioned, which for me was a main motivator for this document, is to provide a single RFC reference for other documents that want to point to "DNSSEC" using a single reference instead of referring to the 3 core components (in an incomplete way) More than 15 years after the DNSSEC specification was published, it is still not widely deployed. Recent estimates are that fewer than 10% of the domain names used for web sites are signed, and only around a third of queries to recursive resolvers are validated. What is the value of this paragraph? You wouldn't want to have a single IPv6 reference RFC say this either :) This document will be "the reference RFC" for a long time. It should not have dated/outdated statistics in it. However, this low level of implementation does not affect whether DNSSEC is a best current practice I don't think the level of implementation is low. It is actually quite high. Practically all DNS software implements it. I think you meant deployment ? NITS: which algorithms recursive resolver operators should or should not validate. change to: which algorithms recursive resolver operations should or should not use for validation (the algorithms themselves are not validated) |
2022-10-17
|
05 | Paul Wouters | [Ballot Position Update] New position, Discuss, has been recorded for Paul Wouters |
2022-10-17
|
05 | Roman Danyliw | [Ballot comment] Thank you to Catherine Meadows for the SECDIR review. ** Section 1.1 Recent estimates are that fewer than 10% of the … [Ballot comment] Thank you to Catherine Meadows for the SECDIR review. ** Section 1.1 Recent estimates are that fewer than 10% of the domain names used for web sites are signed, and only around a third of queries to recursive resolvers are validated. Since this is a point-in-time measurement, this document would age better with a reference to these figures. ** Section 1.1 However, this low level of implementation does not affect whether DNSSEC is a best current practice; it just indicates that the value of deploying DNSSEC is often considered lower than the cost. Nonetheless, the significant deployment of DNSSEC beneath some top- level domains (TLDs), and the near-universal deployment of DNSSEC for the TLDs in the DNS root zone, demonstrate that DNSSEC is suitable for implementation by both ordinary and highly sophisticated domain owners. Editorial style. The first sentence states that most of the Internet doesn’t see the value of DNSSEC relative to the cost. The second sentence suggests that it is “suitable for … ordinary domain owners.” I might have used the word “applicable for …” because for me, part of suitability is that it is that the cost is acceptable for many in the target population (which the first sentence suggests it is not) ** Section 2. Earlier iterations have not been deployed on a significant scale. Consider if the text can qualify the differences in scale from the one posed on Section 1.1 (i.e., <10% of the domain). ** Section 3. Cryptography improves over time, and new algorithms get adopted by various Internet protocols. Consider rephrasing this statement. Overtime, existing cryptographic algorithms typically weaken as computing power and new cryptoanalysis emerges. |
2022-10-17
|
05 | Roman Danyliw | [Ballot Position Update] New position, No Objection, has been recorded for Roman Danyliw |
2022-10-17
|
05 | Alvaro Retana | [Ballot Position Update] New position, No Objection, has been recorded for Alvaro Retana |
2022-10-17
|
05 | John Scudder | [Ballot comment] Thanks, Paul, for this useful and easy-to-read document. Thanks also to Tim Wicinski for putting in the work to build the excellent evaluation … [Ballot comment] Thanks, Paul, for this useful and easy-to-read document. Thanks also to Tim Wicinski for putting in the work to build the excellent evaluation table. ## COMMENT ### Section 1 ~~~ This document lists many (but not all) of the RFCs that should be considered by someone creating an implementation of, or someone deploying, modern DNSSEC. ~~~ Why not list all the ones that should be considered? That seems like a bit of a tease! But maybe (probably?) you meant that the list is not guaranteed comprehensive, in which case perhaps something like this ~~~ This document lists RFCs that should be considered by someone creating an implementation of, or someone deploying, modern DNSSEC. Although an effort was made to be thorough, it would be unwise for the reader to assume this list is comprehensive. ~~~ could be used. But maybe you meant exactly what you wrote, in which case, OK. |
2022-10-17
|
05 | John Scudder | [Ballot Position Update] New position, Yes, has been recorded for John Scudder |
2022-10-17
|
05 | Robert Wilton | [Ballot comment] Thanks for this document, I think that it is helpful, and was easy to read. More generally, out of scope for this work, … [Ballot comment] Thanks for this document, I think that it is helpful, and was easy to read. More generally, out of scope for this work, it would be nice to an updated document describing all the core aspects of DNS, that would probably be helpful to the wider community. I appreciate that such an undertaking would be a significant amount of less appealing work though ... Regards, Rob |
2022-10-17
|
05 | Robert Wilton | [Ballot Position Update] New position, No Objection, has been recorded for Robert Wilton |
2022-10-16
|
05 | Sheng Jiang | Request for Telechat review by INTDIR Completed: Ready. Reviewer: Sheng Jiang. Sent review to list. |
2022-10-14
|
05 | Nicolai Leymann | Request for Telechat review by DNSDIR Completed: Ready. Reviewer: Nicolai Leymann. Sent review to list. |
2022-10-14
|
05 | Bernie Volz | Request for Telechat review by INTDIR is assigned to Sheng Jiang |
2022-10-14
|
05 | Bernie Volz | Request for Telechat review by INTDIR is assigned to Sheng Jiang |
2022-10-13
|
05 | Amanda Baber | IANA Review state changed to IANA OK - No Actions Needed from Version Changed - Review Needed |
2022-10-12
|
05 | Éric Vyncke | Requested Telechat review by INTDIR |
2022-10-10
|
05 | Erik Kline | [Ballot Position Update] New position, Yes, has been recorded for Erik Kline |
2022-10-10
|
05 | Jim Reid | Request for Telechat review by DNSDIR is assigned to Nicolai Leymann |
2022-10-10
|
05 | Jim Reid | Request for Telechat review by DNSDIR is assigned to Nicolai Leymann |
2022-10-10
|
05 | Cindy Morgan | Placed on agenda for telechat - 2022-10-20 |
2022-10-10
|
05 | Warren Kumari | Ballot has been issued |
2022-10-10
|
05 | Warren Kumari | [Ballot Position Update] New position, Yes, has been recorded for Warren Kumari |
2022-10-10
|
05 | Warren Kumari | Created "Approve" ballot |
2022-10-10
|
05 | Warren Kumari | IESG state changed to IESG Evaluation from Waiting for AD Go-Ahead |
2022-10-10
|
05 | Paul Hoffman | New version available: draft-ietf-dnsop-dnssec-bcp-05.txt |
2022-10-10
|
05 | Paul Hoffman | New version accepted (logged-in submitter: Paul Hoffman) |
2022-10-10
|
05 | Paul Hoffman | Uploaded new revision |
2022-10-05
|
04 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed |
2022-10-05
|
04 | Paul Hoffman | New version available: draft-ietf-dnsop-dnssec-bcp-04.txt |
2022-10-05
|
04 | Paul Hoffman | New version accepted (logged-in submitter: Paul Hoffman) |
2022-10-05
|
04 | Paul Hoffman | Uploaded new revision |
2022-10-05
|
03 | (System) | IESG state changed to Waiting for AD Go-Ahead from In Last Call |
2022-10-03
|
03 | Linda Dunbar | Request for Last Call review by GENART Completed: Ready with Issues. Reviewer: Linda Dunbar. Sent review to list. |
2022-10-03
|
03 | (System) | IANA Review state changed to IANA OK - No Actions Needed from IANA - Review Needed |
2022-10-03
|
03 | David Dong | (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: The IANA Functions Operator has reviewed draft-ietf-dnsop-dnssec-bcp-03, which is currently in Last Call, and has the following comments: We … (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: The IANA Functions Operator has reviewed draft-ietf-dnsop-dnssec-bcp-03, which is currently in Last Call, and has the following comments: We understand that this document doesn't require any registry actions. While it's often helpful for a document's IANA Considerations section to remain in place upon publication even if there are no actions, if the authors strongly prefer to remove it, we do not object. If this assessment is not accurate, please respond as soon as possible. For definitions of IANA review states, please see: https://datatracker.ietf.org/help/state/draft/iana-review Thank you, David Dong IANA Services Specialist |
2022-09-30
|
03 | Catherine Meadows | Request for Last Call review by SECDIR Completed: Has Nits. Reviewer: Catherine Meadows. Sent review to list. |
2022-09-25
|
03 | Gyan Mishra | Request for Last Call review by OPSDIR Completed: Ready. Reviewer: Gyan Mishra. Sent review to list. |
2022-09-23
|
03 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Catherine Meadows |
2022-09-23
|
03 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Catherine Meadows |
2022-09-21
|
03 | Jean Mahoney | Request for Last Call review by GENART is assigned to Linda Dunbar |
2022-09-21
|
03 | Jean Mahoney | Request for Last Call review by GENART is assigned to Linda Dunbar |
2022-09-21
|
03 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Gyan Mishra |
2022-09-21
|
03 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Gyan Mishra |
2022-09-21
|
03 | Cindy Morgan | IANA Review state changed to IANA - Review Needed |
2022-09-21
|
03 | Cindy Morgan | The following Last Call announcement was sent out (ends 2022-10-05): From: The IESG To: IETF-Announce CC: dnsop-chairs@ietf.org, dnsop@ietf.org, draft-ietf-dnsop-dnssec-bcp@ietf.org, tjw.ietf@gmail.com, warren@kumari.net … The following Last Call announcement was sent out (ends 2022-10-05): From: The IESG To: IETF-Announce CC: dnsop-chairs@ietf.org, dnsop@ietf.org, draft-ietf-dnsop-dnssec-bcp@ietf.org, tjw.ietf@gmail.com, warren@kumari.net Reply-To: last-call@ietf.org Sender: Subject: Last Call: (DNS Security Extensions (DNSSEC)) to Best Current Practice The IESG has received a request from the Domain Name System Operations WG (dnsop) to consider the following document: - 'DNS Security Extensions (DNSSEC)' as Best Current Practice The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the last-call@ietf.org mailing lists by 2022-10-05. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract This document describes the DNS security extensions (commonly called "DNSSEC") that are specified RFCs 4033, 4034, 4035, and a handful of others. One purpose is to introduce all of the RFCs in one place so that the reader can understand the many aspects of DNSSEC. This document does not update any of those RFCs. Another purpose is to move DNSSEC to Best Current Practice status. This document is currently maintained at https://github.com/paulehoffman/draft-hoffman-dnssec. Issues and pull requests are welcomed. The file can be obtained via https://datatracker.ietf.org/doc/draft-ietf-dnsop-dnssec-bcp/ No IPR declarations have been submitted directly on this I-D. The document contains these normative downward references. See RFC 3967 for additional information: rfc5702: Use of SHA-2 Algorithms with RSA in DNSKEY and RRSIG Resource Records for DNSSEC (Proposed Standard - Internet Engineering Task Force (IETF)) rfc5155: DNS Security (DNSSEC) Hashed Authenticated Denial of Existence (Proposed Standard - Internet Engineering Task Force (IETF)) rfc4509: Use of SHA-256 in DNSSEC Delegation Signer (DS) Resource Records (RRs) (Proposed Standard - Internet Engineering Task Force (IETF)) rfc6840: Clarifications and Implementation Notes for DNS Security (DNSSEC) (Proposed Standard - Internet Engineering Task Force (IETF)) rfc4035: Protocol Modifications for the DNS Security Extensions (Proposed Standard - Internet Engineering Task Force (IETF)) rfc4034: Resource Records for the DNS Security Extensions (Proposed Standard - Internet Engineering Task Force (IETF)) rfc4033: DNS Security Introduction and Requirements (Proposed Standard - Internet Engineering Task Force (IETF)) rfc3110: RSA/SHA-1 SIGs and RSA KEYs in the Domain Name System (DNS) (Proposed Standard - Internet Engineering Task Force (IETF)) |
2022-09-21
|
03 | Cindy Morgan | IESG state changed to In Last Call from Last Call Requested |
2022-09-21
|
03 | Cindy Morgan | Last call announcement was generated |
2022-09-20
|
03 | Warren Kumari | Last call was requested |
2022-09-20
|
03 | Warren Kumari | Last call announcement was generated |
2022-09-20
|
03 | Warren Kumari | Ballot approval text was generated |
2022-09-20
|
03 | (System) | Changed action holders to Warren Kumari (IESG state changed) |
2022-09-20
|
03 | Warren Kumari | IESG state changed to Last Call Requested from Publication Requested |
2022-09-20
|
03 | Warren Kumari | Ballot writeup was changed |
2022-09-20
|
03 | Warren Kumari | Ballot writeup was changed |
2022-09-09
|
03 | Tim Wicinski | # Document Shepherd Write-Up for draft-ietf-dnsop-dnssec-bcp In doing the write for this document, the shepherd went and searched for all RFCs which had DNSSEC in … # Document Shepherd Write-Up for draft-ietf-dnsop-dnssec-bcp In doing the write for this document, the shepherd went and searched for all RFCs which had DNSSEC in the title or abstract, along with a few others and built this table to make sure this BCP was capturing all relevant information. https://gist.github.com/moonshiner/0746776f2351ae9c8e3edb3373ee39c6 ## Document History 1. Document was not considered in any other WG. 2. There was no controvesy about this document that caused the WG to not adopt. 3. There are no threats of appeals, or extreme discontent. 4. There are significant number of DNSSEC implemnetations currently. ## Additional Reviews 5. Document contents don't interact with technologies in other working groups or organizations. 6. Document does not require any formal expert reviews. 7. No Yang module 8. This document contains no sections which require any automated checks. ## Document Shepherd Checks 9. This document is needed, it is clearly written and complete, and ready for the Area Director. 10. The shepherd feels any area reviews would be best served by the ops and sec areas. 11. This document is requested as a Best Current Practice. This is the proper type for this document. The Datatrack reflects this. 12. Authors are aware of the IPR disclosures; and there are no such IPR disclosures. 13. The author has shown their willingness to be listed as such. 14. There are no I-D nits in this document. 15. All informative references are correct and do not need to be normative. 16. All normative references are freely available. 17. There are no normative downward references 18. All normative references have been published. 19. This document will not change the status of existings RFCs. 20. Review of the IANA considerations section is consistent with this document. It identifies existing registries and the RFCs they are defined in. 21. No new IANA Registries |
2022-09-09
|
03 | Tim Wicinski | Responsible AD changed to Warren Kumari |
2022-09-09
|
03 | Tim Wicinski | IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up |
2022-09-09
|
03 | Tim Wicinski | IESG state changed to Publication Requested from I-D Exists |
2022-09-09
|
03 | Tim Wicinski | IESG process started in state Publication Requested |
2022-09-09
|
03 | Tim Wicinski | # Document Shepherd Write-Up for draft-ietf-dnsop-dnssec-bcp In doing the write for this document, the shepherd went and searched for all RFCs which had DNSSEC in … # Document Shepherd Write-Up for draft-ietf-dnsop-dnssec-bcp In doing the write for this document, the shepherd went and searched for all RFCs which had DNSSEC in the title or abstract, along with a few others and built this table to make sure this BCP was capturing all relevant information. https://gist.github.com/moonshiner/0746776f2351ae9c8e3edb3373ee39c6 ## Document History 1. Document was not considered in any other WG. 2. There was no controvesy about this document that caused the WG to not adopt. 3. There are no threats of appeals, or extreme discontent. 4. There are significant number of DNSSEC implemnetations currently. ## Additional Reviews 5. Document contents don't interact with technologies in other working groups or organizations. 6. Document does not require any formal expert reviews. 7. No Yang module 8. This document contains no sections which require any automated checks. ## Document Shepherd Checks 9. This document is needed, it is clearly written and complete, and ready for the Area Director. 10. The shepherd feels any area reviews would be best served by the ops and sec areas. 11. This document is requested as a Best Current Practice. This is the proper type for this document. The Datatrack reflects this. 12. Authors are aware of the IPR disclosures; and there are no such IPR disclosures. 13. The author has shown their willingness to be listed as such. 14. There are no I-D nits in this document. 15. All informative references are correct and do not need to be normative. 16. All normative references are freely available. 17. There are no normative downward references 18. All normative references have been published. 19. This document will not change the status of existings RFCs. 20. Review of the IANA considerations section is consistent with this document. It identifies existing registries and the RFCs they are defined in. 21. No new IANA Registries |
2022-08-18
|
03 | Tim Wicinski | IETF WG state changed to WG Consensus: Waiting for Write-Up from In WG Last Call |
2022-08-11
|
03 | Paul Hoffman | New version available: draft-ietf-dnsop-dnssec-bcp-03.txt |
2022-08-11
|
03 | Paul Hoffman | New version accepted (logged-in submitter: Paul Hoffman) |
2022-08-11
|
03 | Paul Hoffman | Uploaded new revision |
2022-08-02
|
02 | Tim Wicinski | Changed document external resources from: github_repo https://github.com/paulehoffman/draft-hoffman-dnssec to: github_repo https://github.com/paulehoffman/draft-hoffman-dnssec related_implementations https://twitter.com/ietf_wg_dnsop |
2022-08-02
|
02 | Tim Wicinski | Changed document external resources from: github_repo https://github.com/paulehoffman/draft-hoffman-dnssec related_implementations https://twitter.com/ietf_wg_dnsop to: github_repo https://github.com/paulehoffman/draft-hoffman-dnssec |
2022-08-02
|
02 | Tim Wicinski | Changed document external resources from: github_repo https://github.com/paulehoffman/draft-hoffman-dnssec to: github_repo https://github.com/paulehoffman/draft-hoffman-dnssec related_implementations https://twitter.com/ietf_wg_dnsop |
2022-07-28
|
02 | Tim Wicinski | IETF WG state changed to In WG Last Call from WG Document |
2022-07-27
|
02 | Tim Wicinski | Added to session: IETF-114: dnsop Thu-1330 |
2022-07-27
|
02 | Tim Wicinski | Notification list changed to tjw.ietf@gmail.com because the document shepherd was set |
2022-07-27
|
02 | Tim Wicinski | Document shepherd changed to Tim Wicinski |
2022-07-23
|
02 | Tim Wicinski | Changed consensus to Yes from Unknown |
2022-07-23
|
02 | Tim Wicinski | Intended Status changed to Best Current Practice from None |
2022-07-10
|
02 | Paul Hoffman | New version available: draft-ietf-dnsop-dnssec-bcp-02.txt |
2022-07-10
|
02 | Paul Hoffman | New version accepted (logged-in submitter: Paul Hoffman) |
2022-07-10
|
02 | Paul Hoffman | Uploaded new revision |
2022-04-14
|
01 | Paul Hoffman | New version available: draft-ietf-dnsop-dnssec-bcp-01.txt |
2022-04-14
|
01 | (System) | New version accepted (logged-in submitter: Paul Hoffman) |
2022-04-14
|
01 | Paul Hoffman | Uploaded new revision |
2022-04-07
|
00 | Tim Wicinski | Changed document external resources from: None to: github_repo https://github.com/paulehoffman/draft-hoffman-dnssec |
2022-04-07
|
00 | Tim Wicinski | This document now replaces draft-hoffman-dnssec instead of None |
2022-04-07
|
00 | Paul Hoffman | New version available: draft-ietf-dnsop-dnssec-bcp-00.txt |
2022-04-07
|
00 | (System) | WG -00 approved |
2022-04-07
|
00 | Paul Hoffman | Set submitter to "Paul Hoffman ", replaces to draft-hoffman-dnssec and sent approval email to group chairs: dnsop-chairs@ietf.org |
2022-04-07
|
00 | Paul Hoffman | Uploaded new revision |