STD 93, RFC 8945 on Secret Key Transaction Authentication for DNS (TSIG) Mon, 30 November 2020 23:19 UTC

Return-Path: <>
Received: from localhost (localhost []) by (Postfix) with ESMTP id B8BF33A07C3; Mon, 30 Nov 2020 15:19:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id 4W1mYhXuFxUW; Mon, 30 Nov 2020 15:19:50 -0800 (PST)
Received: from ( []) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by (Postfix) with ESMTPS id 525E93A07DE; Mon, 30 Nov 2020 15:19:50 -0800 (PST)
Received: by (Postfix, from userid 30) id 077DEF40752; Mon, 30 Nov 2020 15:19:49 -0800 (PST)
X-PHP-Originating-Script: 1005:ams_util_lib.php
Content-type: text/plain; charset=UTF-8
Message-Id: <>
Date: Mon, 30 Nov 2020 15:19:49 -0800 (PST)
Archived-At: <>
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IETF announcement list. No discussions." <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Mon, 30 Nov 2020 23:19:52 -0000

A new Request for Comments is now available in online RFC libraries.

        STD 93        
        RFC 8945

        Title:      Secret Key Transaction Authentication for 
                    DNS (TSIG) 
        Author:     F. Dupont, 
                    S. Morris,
                    P. Vixie, 
                    D. Eastlake 3rd,
                    O. Gudmundsson, 
                    B. Wellington
        Status:     Standards Track
        Stream:     IETF
        Date:       November 2020
        Pages:      22
        Obsoletes:  RFC 2845, RFC 4635
        See Also:   STD 93

        I-D Tag:    draft-ietf-dnsop-rfc2845bis-09.txt


        DOI:        10.17487/RFC8945

This document describes a protocol for transaction-level
authentication using shared secrets and one-way hashing.  It can be
used to authenticate dynamic updates to a DNS zone as coming from an
approved client or to authenticate responses as coming from an
approved name server.

No recommendation is made here for distributing the shared secrets;
it is expected that a network administrator will statically configure
name servers and clients using some out-of-band mechanism.

This document obsoletes RFCs 2845 and 4635.

This document is a product of the Domain Name System Operations Working Group of the IETF.

This is now an Internet Standard.

STANDARDS TRACK: This document specifies an Internet Standards Track
protocol for the Internet community, and requests discussion and suggestions
for improvements.  Please refer to the current edition of the Official
Internet Protocol Standards ( for the 
standardization state and status of this protocol.  Distribution of this 
memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see

For searching the RFC series, see
For downloading RFCs, see

Requests for special distribution should be addressed to either the
author of the RFC in question, or to  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.

The RFC Editor Team
Association Management Solutions, LLC