<?xml version='1.0' encoding='utf-8'?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" version="3" category="std" consensus="true" docName="draft-ietf-dnsop-obsolete-dlv-02" indexInclude="true" ipr="trust200902" number="8749" prepTime="2020-03-27T10:20:23" scripts="Common,Latin" sortRefs="true" submissionType="IETF" symRefs="true" tocDepth="3" tocInclude="true" updates="6698, 6840" xml:lang="en">
  <link href="https://datatracker.ietf.org/doc/draft-ietf-dnsop-obsolete-dlv-02" rel="prev"/>
  <link href="https://dx.doi.org/10.17487/rfc8749" rel="alternate"/>
  <link href="urn:issn:2070-1721" rel="alternate"/>
  <front>
    <title abbrev="Obsolete DLV">Moving DNSSEC Lookaside Validation (DLV) to Historic Status</title>
    <seriesInfo name="RFC" value="8749" stream="IETF"/>
    <author initials="W." surname="Mekking" fullname="W. (Matthijs) Mekking">
      <organization showOnFrontPage="true">ISC</organization>
      <address>
        <postal>
          <street/>
          <country>Netherlands</country>
        </postal>
        <email>matthijs@isc.org</email>
      </address>
    </author>
    <author initials="D." surname="Mahoney" fullname="Dan Mahoney">
      <organization showOnFrontPage="true">ISC</organization>
      <address>
        <postal>
          <street/>
          <country>US</country>
        </postal>
        <email>dmahoney@isc.org</email>
      </address>
    </author>
    <date month="03" year="2020"/>
    <area>Operations and Management</area>
    <workgroup>DNS Operations</workgroup>
    <keyword>DNS</keyword>
    <keyword>DNSSEC</keyword>
    <keyword>DLV</keyword>
    <abstract pn="section-abstract">
      <t pn="section-abstract-1">This document retires DNSSEC Lookaside Validation (DLV) and reclassifies
RFCs 4431 and 5074 as Historic. Furthermore, this document updates RFC 6698 by
excluding the DLV resource record from certificates and updates RFC 6840 by
excluding the DLV registries from the trust anchor selection.</t>
    </abstract>
    <boilerplate>
      <section anchor="status-of-memo" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.1">
        <name slugifiedName="name-status-of-this-memo">Status of This Memo</name>
        <t pn="section-boilerplate.1-1">
            This is an Internet Standards Track document.
        </t>
        <t pn="section-boilerplate.1-2">
            This document is a product of the Internet Engineering Task Force
            (IETF).  It represents the consensus of the IETF community.  It has
            received public review and has been approved for publication by
            the Internet Engineering Steering Group (IESG).  Further
            information on Internet Standards is available in Section 2 of 
            RFC 7841.
        </t>
        <t pn="section-boilerplate.1-3">
            Information about the current status of this document, any
            errata, and how to provide feedback on it may be obtained at
            <eref target="https://www.rfc-editor.org/info/rfc8749" brackets="none"/>.
        </t>
      </section>
      <section anchor="copyright" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.2">
        <name slugifiedName="name-copyright-notice">Copyright Notice</name>
        <t pn="section-boilerplate.2-1">
            Copyright (c) 2020 IETF Trust and the persons identified as the
            document authors. All rights reserved.
        </t>
        <t pn="section-boilerplate.2-2">
            This document is subject to BCP 78 and the IETF Trust's Legal
            Provisions Relating to IETF Documents
            (<eref target="https://trustee.ietf.org/license-info" brackets="none"/>) in effect on the date of
            publication of this document. Please review these documents
            carefully, as they describe your rights and restrictions with
            respect to this document. Code Components extracted from this
            document must include Simplified BSD License text as described in
            Section 4.e of the Trust Legal Provisions and are provided without
            warranty as described in the Simplified BSD License.
        </t>
      </section>
    </boilerplate>
    <toc>
      <section anchor="toc" numbered="false" removeInRFC="false" toc="exclude" pn="section-toc.1">
        <name slugifiedName="name-table-of-contents">Table of Contents</name>
        <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1">
          <li pn="section-toc.1-1.1">
            <t keepWithNext="true" pn="section-toc.1-1.1.1"><xref derivedContent="1" format="counter" sectionFormat="of" target="section-1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-introduction">Introduction</xref></t>
          </li>
          <li pn="section-toc.1-1.2">
            <t keepWithNext="true" pn="section-toc.1-1.2.1"><xref derivedContent="2" format="counter" sectionFormat="of" target="section-2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-requirements-language">Requirements Language</xref></t>
          </li>
          <li pn="section-toc.1-1.3">
            <t keepWithNext="true" pn="section-toc.1-1.3.1"><xref derivedContent="3" format="counter" sectionFormat="of" target="section-3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-discussion">Discussion</xref></t>
          </li>
          <li pn="section-toc.1-1.4">
            <t keepWithNext="true" pn="section-toc.1-1.4.1"><xref derivedContent="4" format="counter" sectionFormat="of" target="section-4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-moving-dlv-to-historic-stat">Moving DLV to Historic Status</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.4.2">
              <li pn="section-toc.1-1.4.2.1">
                <t keepWithNext="true" pn="section-toc.1-1.4.2.1.1"><xref derivedContent="4.1" format="counter" sectionFormat="of" target="section-4.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-documents-that-reference-th">Documents That Reference the DLV RFCs</xref></t>
                <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.4.2.1.2">
                  <li pn="section-toc.1-1.4.2.1.2.1">
                    <t keepWithNext="true" pn="section-toc.1-1.4.2.1.2.1.1"><xref derivedContent="4.1.1" format="counter" sectionFormat="of" target="section-4.1.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-documents-that-reference-rf">Documents That Reference RFC 4431</xref></t>
                  </li>
                  <li pn="section-toc.1-1.4.2.1.2.2">
                    <t keepWithNext="true" pn="section-toc.1-1.4.2.1.2.2.1"><xref derivedContent="4.1.2" format="counter" sectionFormat="of" target="section-4.1.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-documents-that-reference-rfc">Documents That Reference RFC 5074</xref></t>
                  </li>
                </ul>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.5">
            <t keepWithNext="true" pn="section-toc.1-1.5.1"><xref derivedContent="5" format="counter" sectionFormat="of" target="section-5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-iana-considerations">IANA Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.6">
            <t keepWithNext="true" pn="section-toc.1-1.6.1"><xref derivedContent="6" format="counter" sectionFormat="of" target="section-6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-security-considerations">Security Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.7">
            <t keepWithNext="true" pn="section-toc.1-1.7.1"><xref derivedContent="7" format="counter" sectionFormat="of" target="section-7"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-normative-references">Normative References</xref></t>
          </li>
          <li pn="section-toc.1-1.8">
            <t keepWithNext="true" pn="section-toc.1-1.8.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.a"/><xref derivedContent="" format="title" sectionFormat="of" target="name-acknowledgements">Acknowledgements</xref></t>
          </li>
          <li pn="section-toc.1-1.9">
            <t keepWithNext="true" pn="section-toc.1-1.9.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.b"/><xref derivedContent="" format="title" sectionFormat="of" target="name-authors-addresses">Authors' Addresses</xref></t>
          </li>
        </ul>
      </section>
    </toc>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" toc="include" removeInRFC="false" pn="section-1">
      <name slugifiedName="name-introduction">Introduction</name>
      <t pn="section-1-1">DNSSEC Lookaside Validation (DLV) was introduced to assist with the
      adoption of DNSSEC <xref target="RFC4033" format="default" sectionFormat="of" derivedContent="RFC4033"/> <xref target="RFC4034" format="default" sectionFormat="of" derivedContent="RFC4034"/> <xref target="RFC4035" format="default" sectionFormat="of" derivedContent="RFC4035"/> in a time when the root zone and many top-level
      domains (TLDs) were unsigned.
   DLV allowed entities with signed zones under an unsigned parent zone
   or entities with registrars that did not accept DS records to
   publish trust anchors outside of the normal DNS delegation chain.
The root zone was signed in July 2010, and as of May 2019,
      1389 out of 1531 TLDs have a secure delegation from the root; thus, DLV
      has served its purpose and can now retire.</t>
    </section>
    <section anchor="terminology" numbered="true" toc="include" removeInRFC="false" pn="section-2">
      <name slugifiedName="name-requirements-language">Requirements Language</name>
      <t pn="section-2-1">
    The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>",
    "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>",
    "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>", 
    "<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are
    to be interpreted as 
    described in BCP 14 <xref target="RFC2119" format="default" sectionFormat="of" derivedContent="RFC2119"/> <xref target="RFC8174" format="default" sectionFormat="of" derivedContent="RFC8174"/>
    when, and only when, they appear in all capitals, as shown here.
      </t>
    </section>
    <section anchor="discussion" numbered="true" toc="include" removeInRFC="false" pn="section-3">
      <name slugifiedName="name-discussion">Discussion</name>
      <t pn="section-3-1">One could argue that DLV is still useful because there are still some unsigned
TLDs and entities under those zones that will not benefit from signing their zone.
However, keeping the DLV mechanism also has disadvantages:</t>
      <ul spacing="normal" bare="false" empty="false" pn="section-3-2">
        <li pn="section-3-2.1">It reduces the pressure to get the parent zone signed.</li>
        <li pn="section-3-2.2">It reduces the pressure on registrars to accept DS records.</li>
        <li pn="section-3-2.3">It complicates validation code.</li>
      </ul>
      <t pn="section-3-3">In addition, not every validator actually implemented DLV (only BIND 9 and
Unbound), so even if an entity can use DLV to set up an alternate path to its
trust anchor, its effect is limited. Furthermore, there was one well-known DLV
registry (dlv.isc.org), which was deprecated (replaced with a signed
empty zone) on September 30, 2017. With the absence of a well-known DLV
registry service, it is unlikely that there is a real benefit for the protocol
on the Internet nowadays.</t>
      <t pn="section-3-4">One other possible reason to keep DLV is to distribute trust anchors
for private enterprises. There are no known uses of DLV for this.</t>
      <t pn="section-3-5">All things considered, it is probably not worth the effort of maintaining
the DLV mechanism.</t>
    </section>
    <section anchor="moving-dlv-to-historic-status" numbered="true" toc="include" removeInRFC="false" pn="section-4">
      <name slugifiedName="name-moving-dlv-to-historic-stat">Moving DLV to Historic Status</name>
      <t pn="section-4-1">There are two RFCs that specify DLV:</t>
      <ol spacing="normal" type="1" start="1" pn="section-4-2">
        <li pn="section-4-2.1" derivedCounter="1.">RFC 4431 <xref target="RFC4431" format="default" sectionFormat="of" derivedContent="RFC4431"/> specifies the
	DLV resource record.</li>
        <li pn="section-4-2.2" derivedCounter="2.">RFC 5074 <xref target="RFC5074" format="default" sectionFormat="of" derivedContent="RFC5074"/> specifies the
	DLV mechanism for publishing trust 
anchors outside the DNS delegation chain and how validators can use them
to validate DNSSEC-signed data.</li>
      </ol>
      <t pn="section-4-3">This document moves both RFC 4431 <xref target="RFC4431" format="default" sectionFormat="of" derivedContent="RFC4431"/> and RFC 5074 <xref target="RFC5074" format="default" sectionFormat="of" derivedContent="RFC5074"/> to 
Historic status. This is a clear signal to implementers that the DLV
resource record and the DLV mechanism <bcp14>SHOULD NOT</bcp14> be implemented or deployed.</t>
      <section anchor="documents-that-reference-the-dlv-rfcs" numbered="true" toc="include" removeInRFC="false" pn="section-4.1">
        <name slugifiedName="name-documents-that-reference-th">Documents That Reference the DLV RFCs</name>
        <t pn="section-4.1-1">The RFCs being moved to Historic status are referenced by a couple
of other RFCs. 
   The sections below describe the changes to those documents
   due to the DLV RFCs being reclassified as Historic.
</t>
        <section anchor="documents-that-reference-rfc-4431" numbered="true" toc="include" removeInRFC="false" pn="section-4.1.1">
          <name slugifiedName="name-documents-that-reference-rf">Documents That Reference RFC 4431</name>
          <t pn="section-4.1.1-1">One RFC makes reference to RFC 4431 <xref target="RFC4431" format="default" sectionFormat="of" derivedContent="RFC4431"/>.</t>
          <section anchor="rfc-5074" numbered="true" toc="exclude" removeInRFC="false" pn="section-4.1.1.1">
            <name slugifiedName="name-rfc-5074">RFC 5074</name>
            <t pn="section-4.1.1.1-1">RFC 5074 ("DNSSEC Lookaside Validation (DLV)") <xref target="RFC5074" format="default" sectionFormat="of" derivedContent="RFC5074"/> describes the DLV mechanism itself. This
            document moves RFC 5074 <xref target="RFC5074" format="default" sectionFormat="of" derivedContent="RFC5074"/>
            to Historic status as well.</t>
          </section>
        </section>
        <section anchor="documents-that-reference-rfc-5074" numbered="true" toc="include" removeInRFC="false" pn="section-4.1.2">
          <name slugifiedName="name-documents-that-reference-rfc">Documents That Reference RFC 5074</name>
          <t pn="section-4.1.2-1">Three RFCs make reference to RFC 5074 <xref target="RFC5074" format="default" sectionFormat="of" derivedContent="RFC5074"/>.</t>
          <section anchor="rfc-6698" numbered="true" toc="exclude" removeInRFC="false" pn="section-4.1.2.1">
            <name slugifiedName="name-rfc-6698">RFC 6698</name>
            <t pn="section-4.1.2.1-1">RFC 6698 ("The DNS-Based Authentication of Named Entities (DANE)
            Transport Layer Security (TLS) Protocol: TLSA") <xref target="RFC6698" format="default" sectionFormat="of" derivedContent="RFC6698"/> specifies:</t>
            <blockquote pn="section-4.1.2.1-2">DNSSEC forms certificates (the binding of an identity to a key) by
  combining a DNSKEY, DS, or DLV resource record with an
  associated RRSIG
  record. These records then form a signing chain extending from the
  client's trust anchors to the RR of interest.</blockquote>
            <t pn="section-4.1.2.1-3">This document updates RFC 6698 <xref target="RFC6698" format="default" sectionFormat="of" derivedContent="RFC6698"/> to exclude the DLV resource record from
certificates.</t>
          </section>
          <section anchor="rfc-6840" numbered="true" toc="exclude" removeInRFC="false" pn="section-4.1.2.2">
            <name slugifiedName="name-rfc-6840">RFC 6840</name>
            <t pn="section-4.1.2.2-1">RFC 6840 ("Clarifications and Implementation Notes for DNS Security
            (DNSSEC)") <xref target="RFC6840" format="default" sectionFormat="of" derivedContent="RFC6840"/> states
            that when trust anchors come from different sources, a validator
            may choose between them based on the perceived reliability of
            those sources. But in reality, this does not happen in validators
            (both BIND 9 and Unbound have an option for a DLV trust anchor
            that can be used solely as a fallback).</t>
            <t pn="section-4.1.2.2-2">This document updates RFC 6840 <xref target="RFC6840" format="default" sectionFormat="of" derivedContent="RFC6840"/> to exclude the DLV registries
            from the trust anchor selection.</t>
          </section>
          <section anchor="rfc-8198" numbered="true" toc="exclude" removeInRFC="false" pn="section-4.1.2.3">
            <name slugifiedName="name-rfc-8198">RFC 8198</name>
            <t pn="section-4.1.2.3-1">RFC 8198 ("Aggressive Use of
	    DNSSEC-Validated Cache") <xref target="RFC8198" format="default" sectionFormat="of" derivedContent="RFC8198"/> only
references RFC 5074 <xref target="RFC5074" format="default" sectionFormat="of" derivedContent="RFC5074"/> because
aggressive negative caching was first proposed
there.</t>
          </section>
        </section>
      </section>
    </section>
    <section anchor="iana-considerations" numbered="true" toc="include" removeInRFC="false" pn="section-5">
      <name slugifiedName="name-iana-considerations">IANA Considerations</name>
      <t pn="section-5-1">IANA has updated the annotation of the DLV RR type (code 32769) to
"Obsolete" in the "Domain Name System (DNS) Parameters" registry.</t>
    </section>
    <section anchor="security-considerations" numbered="true" toc="include" removeInRFC="false" pn="section-6">
      <name slugifiedName="name-security-considerations">Security Considerations</name>
      <t pn="section-6-1"> Once the DLV mechanism is retired, zones that rely on DLV for their
      validation will be treated as insecure.  The chance that this scenario
      actually occurs is very low, since no well-known DLV registry
      exists.</t>
    </section>
  </middle>
  <back>
    <references pn="section-7">
      <name slugifiedName="name-normative-references">Normative References</name>
      <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" quoteTitle="true" derivedAnchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author initials="S." surname="Bradner" fullname="S. Bradner">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="1997" month="March"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC4033" target="https://www.rfc-editor.org/info/rfc4033" quoteTitle="true" derivedAnchor="RFC4033">
        <front>
          <title>DNS Security Introduction and Requirements</title>
          <author initials="R." surname="Arends" fullname="R. Arends">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="R." surname="Austein" fullname="R. Austein">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="M." surname="Larson" fullname="M. Larson">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="D." surname="Massey" fullname="D. Massey">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="S." surname="Rose" fullname="S. Rose">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2005" month="March"/>
          <abstract>
            <t>The Domain Name System Security Extensions (DNSSEC) add data origin authentication and data integrity to the Domain Name System.  This document introduces these extensions and describes their capabilities and limitations.  This document also discusses the services that the DNS security extensions do and do not provide.  Last, this document describes the interrelationships between the documents that collectively describe DNSSEC.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4033"/>
        <seriesInfo name="DOI" value="10.17487/RFC4033"/>
      </reference>
      <reference anchor="RFC4034" target="https://www.rfc-editor.org/info/rfc4034" quoteTitle="true" derivedAnchor="RFC4034">
        <front>
          <title>Resource Records for the DNS Security Extensions</title>
          <author initials="R." surname="Arends" fullname="R. Arends">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="R." surname="Austein" fullname="R. Austein">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="M." surname="Larson" fullname="M. Larson">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="D." surname="Massey" fullname="D. Massey">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="S." surname="Rose" fullname="S. Rose">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2005" month="March"/>
          <abstract>
            <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC).  The DNS Security Extensions are a collection of resource records and protocol modifications that provide source authentication for the DNS.  This document defines the public key (DNSKEY), delegation signer (DS), resource record digital signature (RRSIG), and authenticated denial of existence (NSEC) resource records.  The purpose and format of each resource record is described in detail, and an example of each resource record is given. </t>
            <t> This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4034"/>
        <seriesInfo name="DOI" value="10.17487/RFC4034"/>
      </reference>
      <reference anchor="RFC4035" target="https://www.rfc-editor.org/info/rfc4035" quoteTitle="true" derivedAnchor="RFC4035">
        <front>
          <title>Protocol Modifications for the DNS Security Extensions</title>
          <author initials="R." surname="Arends" fullname="R. Arends">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="R." surname="Austein" fullname="R. Austein">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="M." surname="Larson" fullname="M. Larson">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="D." surname="Massey" fullname="D. Massey">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="S." surname="Rose" fullname="S. Rose">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2005" month="March"/>
          <abstract>
            <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC).  The DNS Security Extensions are a collection of new resource records and protocol modifications that add data origin authentication and data integrity to the DNS.  This document describes the DNSSEC protocol modifications.  This document defines the concept of a signed zone, along with the requirements for serving and resolving by using DNSSEC.  These techniques allow a security-aware resolver to authenticate both DNS resource records and authoritative DNS error indications. </t>
            <t> This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4035"/>
        <seriesInfo name="DOI" value="10.17487/RFC4035"/>
      </reference>
      <reference anchor="RFC4431" target="https://www.rfc-editor.org/info/rfc4431" quoteTitle="true" derivedAnchor="RFC4431">
        <front>
          <title>The DNSSEC Lookaside Validation (DLV) DNS Resource Record</title>
          <author initials="M." surname="Andrews" fullname="M. Andrews">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="S." surname="Weiler" fullname="S. Weiler">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2006" month="February"/>
          <abstract>
            <t>This document defines a new DNS resource record, called the DNSSEC Lookaside Validation (DLV) RR, for publishing DNSSEC trust anchors outside of the DNS delegation chain.  This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4431"/>
        <seriesInfo name="DOI" value="10.17487/RFC4431"/>
      </reference>
      <reference anchor="RFC5074" target="https://www.rfc-editor.org/info/rfc5074" quoteTitle="true" derivedAnchor="RFC5074">
        <front>
          <title>DNSSEC Lookaside Validation (DLV)</title>
          <author initials="S." surname="Weiler" fullname="S. Weiler">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2007" month="November"/>
          <abstract>
            <t>DNSSEC Lookaside Validation (DLV) is a mechanism for publishing DNS Security (DNSSEC) trust anchors outside of the DNS delegation chain. It allows validating resolvers to validate DNSSEC-signed data from zones whose ancestors either aren't signed or don't publish Delegation Signer (DS) records for their children.  This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5074"/>
        <seriesInfo name="DOI" value="10.17487/RFC5074"/>
      </reference>
      <reference anchor="RFC6698" target="https://www.rfc-editor.org/info/rfc6698" quoteTitle="true" derivedAnchor="RFC6698">
        <front>
          <title>The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA</title>
          <author initials="P." surname="Hoffman" fullname="P. Hoffman">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="J." surname="Schlyter" fullname="J. Schlyter">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2012" month="August"/>
          <abstract>
            <t>Encrypted communication on the Internet often uses Transport Layer Security (TLS), which depends on third parties to certify the keys used.  This document improves on that situation by enabling the administrators of domain names to specify the keys used in that domain's TLS servers.  This requires matching improvements in TLS client software, but no change in TLS server software.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6698"/>
        <seriesInfo name="DOI" value="10.17487/RFC6698"/>
      </reference>
      <reference anchor="RFC6840" target="https://www.rfc-editor.org/info/rfc6840" quoteTitle="true" derivedAnchor="RFC6840">
        <front>
          <title>Clarifications and Implementation Notes for DNS Security (DNSSEC)</title>
          <author initials="S." surname="Weiler" fullname="S. Weiler" role="editor">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="D." surname="Blacka" fullname="D. Blacka" role="editor">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2013" month="February"/>
          <abstract>
            <t>This document is a collection of technical clarifications to the DNS Security (DNSSEC) document set.  It is meant to serve as a resource to implementors as well as a collection of DNSSEC errata that existed at the time of writing.</t>
            <t>This document updates the core DNSSEC documents (RFC 4033, RFC 4034, and RFC 4035) as well as the NSEC3 specification (RFC 5155).  It also defines NSEC3 and SHA-2 (RFC 4509 and RFC 5702) as core parts of the DNSSEC specification.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6840"/>
        <seriesInfo name="DOI" value="10.17487/RFC6840"/>
      </reference>
      <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" quoteTitle="true" derivedAnchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author initials="B." surname="Leiba" fullname="B. Leiba">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2017" month="May"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
      <reference anchor="RFC8198" target="https://www.rfc-editor.org/info/rfc8198" quoteTitle="true" derivedAnchor="RFC8198">
        <front>
          <title>Aggressive Use of DNSSEC-Validated Cache</title>
          <author initials="K." surname="Fujiwara" fullname="K. Fujiwara">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="A." surname="Kato" fullname="A. Kato">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="W." surname="Kumari" fullname="W. Kumari">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2017" month="July"/>
          <abstract>
            <t>The DNS relies upon caching to scale; however, the cache lookup generally requires an exact match.  This document specifies the use of NSEC/NSEC3 resource records to allow DNSSEC-validating resolvers to generate negative answers within a range and positive answers from wildcards.  This increases performance, decreases latency, decreases resource utilization on both authoritative and recursive servers, and increases privacy.  Also, it may help increase resilience to certain DoS attacks in some circumstances.</t>
            <t>This document updates RFC 4035 by allowing validating resolvers to generate negative answers based upon NSEC/NSEC3 records and positive answers in the presence of wildcards.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8198"/>
        <seriesInfo name="DOI" value="10.17487/RFC8198"/>
      </reference>
    </references>
    <section anchor="acknowledgements" numbered="false" toc="include" removeInRFC="false" pn="section-appendix.a">
      <name slugifiedName="name-acknowledgements">Acknowledgements</name>
      <t pn="section-appendix.a-1">The authors thank <contact fullname="Ondřej Surý"/> for the initial review.</t>
    </section>
    <section anchor="authors-addresses" numbered="false" removeInRFC="false" toc="include" pn="section-appendix.b">
      <name slugifiedName="name-authors-addresses">Authors' Addresses</name>
      <author initials="W." surname="Mekking" fullname="W. (Matthijs) Mekking">
        <organization showOnFrontPage="true">ISC</organization>
        <address>
          <postal>
            <street/>
            <country>Netherlands</country>
          </postal>
          <email>matthijs@isc.org</email>
        </address>
      </author>
      <author initials="D." surname="Mahoney" fullname="Dan Mahoney">
        <organization showOnFrontPage="true">ISC</organization>
        <address>
          <postal>
            <street/>
            <country>US</country>
          </postal>
          <email>dmahoney@isc.org</email>
        </address>
      </author>
    </section>
  </back>
</rfc>
