[dnsext] RFC 6975 on Signaling Cryptographic Algorithm Understanding in DNS Security Extensions (DNSSEC)

rfc-editor@rfc-editor.org Wed, 03 July 2013 21:12 UTC

Return-Path: <wwwrun@rfc-editor.org>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 712F311E8233; Wed, 3 Jul 2013 14:12:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.67
X-Spam-Level:
X-Spam-Status: No, score=-101.67 tagged_above=-999 required=5 tests=[AWL=0.330, BAYES_00=-2.599, J_CHICKENPOX_93=0.6, NO_RELAYS=-0.001, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Iw9Dex4KXCdi; Wed, 3 Jul 2013 14:12:32 -0700 (PDT)
Received: from rfc-editor.org (unknown [IPv6:2001:1890:123a::1:2f]) by ietfa.amsl.com (Postfix) with ESMTP id 150E211E80DC; Wed, 3 Jul 2013 14:12:32 -0700 (PDT)
Received: by rfc-editor.org (Postfix, from userid 30) id 31E35B1E003; Wed, 3 Jul 2013 14:10:44 -0700 (PDT)
To: ietf-announce@ietf.org, rfc-dist@rfc-editor.org
From: rfc-editor@rfc-editor.org
Message-Id: <20130703211044.31E35B1E003@rfc-editor.org>
Date: Wed, 03 Jul 2013 14:10:44 -0700
Cc: dnsext@ietf.org, rfc-editor@rfc-editor.org
Subject: [dnsext] RFC 6975 on Signaling Cryptographic Algorithm Understanding in DNS Security Extensions (DNSSEC)
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 03 Jul 2013 21:12:32 -0000

A new Request for Comments is now available in online RFC libraries.

        
        RFC 6975

        Title:      Signaling Cryptographic Algorithm Understanding in 
                    DNS Security Extensions (DNSSEC) 
        Author:     S. Crocker, S. Rose
        Status:     Standards Track
        Stream:     IETF
        Date:       July 2013
        Mailbox:    steve@shinkuro.com, 
                    scottr.nist@gmail.com
        Pages:      9
        Characters: 18353
        Updates/Obsoletes/SeeAlso:   None

        I-D Tag:    draft-ietf-dnsext-dnssec-algo-signal-10.txt

        URL:        http://www.rfc-editor.org/rfc/rfc6975.txt

The DNS Security Extensions (DNSSEC) were developed to provide origin
authentication and integrity protection for DNS data by using digital
signatures.  These digital signatures can be generated using
different algorithms.  This document specifies a way for validating
end-system resolvers to signal to a server which digital signature
and hash algorithms they support.  The extensions allow the signaling
of new algorithm uptake in client code to allow zone administrators
to know when it is possible to complete an algorithm rollover in a
DNSSEC-signed zone.

This document is a product of the DNS Extensions Working Group of the IETF.

This is now a Proposed Standard.

STANDARDS TRACK: This document specifies an Internet standards track
protocol for the Internet community,and requests discussion and suggestions
for improvements.  Please refer to the current edition of the Internet
Official Protocol Standards (STD 1) for the standardization state and
status of this protocol.  Distribution of this memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  http://www.ietf.org/mailman/listinfo/ietf-announce
  http://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see http://www.rfc-editor.org/rfcsearch.html.
For downloading RFCs, see http://www.rfc-editor.org/rfc.html.

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-editor@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC