<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.39 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-bash-rfc7958bis-01" category="info" submissionType="independent" obsoletes="7958" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="Root Zone Trust Anchor Publication">DNSSEC Trust Anchor Publication for the Root Zone</title>

    <author initials="J." surname="Abley" fullname="Joe Abley">
      <organization>Cloudflare</organization>
      <address>
        <postal>
          <city>Amsterdam</city>
          <country>Netherlands</country>
        </postal>
        <email>jabley@cloudflare.com</email>
      </address>
    </author>
    <author initials="J." surname="Schlyter" fullname="Jakob Schlyter">
      <organization>Kirei AB</organization>
      <address>
        <email>jakob@kirei.se</email>
      </address>
    </author>
    <author initials="G." surname="Bailey" fullname="Guillaume Bailey">
      <organization>Independent</organization>
      <address>
        <email>guillaumebailey@outlook.com</email>
      </address>
    </author>
    <author initials="P." surname="Hoffman" fullname="Paul Hoffman">
      <organization>ICANN</organization>
      <address>
        <email>paul.hoffman@icann.org</email>
      </address>
    </author>

    <date year="2023" month="September" day="07"/>

    
    
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 64?>

<!-- Notes for co-authors

PH: There was discussion in the algorithm rollover design team about adding comments to the XML file.
We know that developers read the file, and the comments could be helpful to them to understand things like
where they can find out more information about the future rollover.

PH: I would like to re-open the discussion of whether IANA should be publishing the PKIX and CSR files,
and when. Duane Wessels has charts that show that some resolvers are using the future trust anchor
keys before they are published in the root zone. That could happen if they pull the keys from the
key ceremony records, but it could also happen if IANA publishes the keys in the PKIX and CSR files.

PH: Appendix A needs to be filled in with the actual steps that happened for KSK 2017.

PH: Maybe get rid of the two figure numbers because they aren't used everywhere and they
are not referenced except for right above the figures.

PH: Make the wording the present active tense throughout.
For example, "is cryptographically signed" instead of "has been cryptographically signed".

-->

<t>The root zone of the Domain Name System (DNS) has been
cryptographically signed using DNS Security Extensions (DNSSEC).</t>

<t>In order to obtain secure answers from the root zone of the DNS using
DNSSEC, a client must configure a suitable trust anchor.  This
document describes the format and publication mechanisms IANA has
used to distribute the DNSSEC trust anchors.</t>



    </abstract>



  </front>

  <middle>


<?line 95?>

<section anchor="introduction"><name>Introduction</name>

<t>The Domain Name System (DNS) is described in <xref target="RFC1034"/> and <xref target="RFC1035"/>.
DNS Security Extensions (DNSSEC) are described in <xref target="RFC9364"/>.</t>

<t>In the DNSSEC protocol, Resource Record Sets (RRSets) are signed
cryptographically.  This means that a response to a query contains
signatures that allow the integrity and authenticity of the RRSet to
be verified.  DNSSEC signatures are validated by following a chain of
signatures to a "trust anchor".  The reason for trusting a trust
anchor is outside the DNSSEC protocol, but having one or more trust
anchors is required for the DNSSEC protocol to work.</t>

<t>The publication of trust anchors for the root zone of the DNS is an
IANA function performed by ICANN, through its affiliate Public Technical Identifiers (PTI). A detailed description of
corresponding key management practices can be found in <xref target="DPS"/>, which
can be retrieved from the IANA Repository at
&lt;https://www.iana.org/dnssec/&gt;.</t>

<t>This document describes the formats and distribution methods of
DNSSEC trust anchors that have been used by IANA for the root zone of
the DNS since 2010.  Other organizations might have different formats
and mechanisms for distributing DNSSEC trust anchors for the root
zone; however, most operators and software vendors have chosen to
rely on the IANA trust anchors.</t>

<t>The formats and distribution methods described in this document are a
complement to, not a substitute for, the automated DNSSEC trust
anchor update protocol described in <xref target="RFC5011"/>.  That protocol allows
for secure in-band succession of trust anchors when trust has already
been established.  This document describes one way to establish an
initial trust anchor that can be used by RFC 5011.</t>

<section anchor="definitions"><name>Definitions</name>

<t>The term "trust anchor" is used in many different contexts in the
security community.  Many of the common definitions conflict because
they are specific to a specific system, such as just for DNSSEC or
just for S/MIME messages.</t>

<t>In cryptographic systems with hierarchical structure, a trust anchor
is an authoritative entity for which trust is assumed and not
derived.  The format of the entity differs in different systems, but
the basic idea, that trust is assumed and not derived, is common to
all the common uses of the term "trust anchor".</t>

<t>The root zone trust anchor formats published by IANA are defined in
<xref target="ta_formats"/>.  <xref target="RFC4033"/> defines a trust anchor as "A configured DNSKEY
RR or DS RR hash of a DNSKEY RR".  Note that the formats defined here
do not match the definition of "trust anchor" from <xref target="RFC4033"/>;
however, a system that wants to convert the trusted material from
IANA into a Delegation Signer (DS) RR can do so.</t>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
<section anchor="changes-from-rfc-7958"><name>Changes from RFC 7958</name>

<t>This version of the document includes the following changes:</t>

<t><list style="symbols">
  <t>There is a signficant technical change from erratum 5932 &lt;https://www.rfc-editor.org/errata/eid5932&gt;.
This is in the seventh paragraph of <xref target="xml_semantics"/>.</t>
  <t>Added the optional public key element</t>
  <t>The reference to the DNSSEC Practice Statement <xref target="DPS"/> was updated.</t>
  <t>Say explicitly that the XML documents might have XML comments in them.</t>
</list></t>

</section>
</section>
<section anchor="ta_formats"><name>IANA DNSSEC Root Zone Trust Anchor Formats and Semantics</name>

<t>IANA publishes trust anchors for the root zone as an XML document that contains the hashes of the DNSKEY records.</t>

<t>This format and the semantics associated are described in
the rest of this section.</t>

<section anchor="hashes"><name>Hashes and Keys in XML</name>

<t>Note that the XML document can have XML comments.
For example, IANA might use these comments to add pointers to important information on the IANA web site.
XML comments are only used as human-readable commentary, not extensions to the grammar.</t>

<t>The XML document contains a set of hashes for the DNSKEY records that
can be used to validate the root zone.  The hashes are consistent
with the defined presentation format of DS resource.</t>

<t>The XML document also can contain the keys from the DNSKEY records.
The keys are consistent with the defined presentation format of DNSKEY resource.</t>

<t>Note that the hashes are mandatory in the syntax, but the keys are optional.</t>

<section anchor="xml_syntax"><name>XML Syntax</name>

<t>A RELAX NG Compact Schema <xref target="RELAX-NG"/> for the documents used to
publish trust anchors is given in Figure 1.</t>

<figure><artwork><![CDATA[
datatypes xsd = "http://www.w3.org/2001/XMLSchema-datatypes"

start = element TrustAnchor {
    attribute id { xsd:string },
    attribute source { xsd:string },
    element Zone { xsd:string },

    keydigest+
}

keydigest = element KeyDigest {
    attribute id { xsd:string },
    attribute validFrom { xsd:dateTime },
    attribute validUntil { xsd:dateTime }?,

    element KeyTag {
            xsd:nonNegativeInteger { maxInclusive = "65535" } },
    element Algorithm {
            xsd:nonNegativeInteger { maxInclusive = "255" } },
    element DigestType {
            xsd:nonNegativeInteger { maxInclusive = "255" } },
    element Digest { xsd:hexBinary },
    element PublicKey { xsd:base64Binary }?
}
                           Figure 1
]]></artwork></figure>

</section>
<section anchor="xml_semantics"><name>XML Semantics</name>

<t>The TrustAnchor element is the container for all of the trust anchors
in the file.</t>

<t>The id attribute in the TrustAnchor element is an opaque string that
identifies the set of trust anchors.  Its value has no particular
semantics.  Note that the id element in the TrustAnchor element is
different than the id element in the KeyDigest element, described
below.</t>

<t>The source attribute in the TrustAnchor element gives information
about where to obtain the TrustAnchor container.  It is likely to be
a URL and is advisory only.</t>

<t>The Zone element in the TrustAnchor element states to which DNS zone
this container applies.  The root zone is indicated by a single
period (.) character without any quotation marks.</t>

<t>The TrustAnchor element contains one or more KeyDigest elements.
Each KeyDigest element represents the digest of a DNSKEY record in
the zone defined in the Zone element.</t>

<t>The id attribute in the KeyDigest element is an opaque string that
identifies the hash.
Note that the id element in the KeyDigest element is different than
the id element in the TrustAnchor element described above.</t>

<t>The validFrom and validUntil attributes in the KeyDigest element specify
the range of times that the KeyDigest element can be used as a trust anchor.
Note that the validUntil attribute of the KeyDigest element is optional.
If the relying party is using a trust anchor that has a KeyDigest element
that does not have a validUntil attribute, it can change to a trust anchor
with a KeyDigest element that does have a validUntil attribute,
as long as that trust anchor's validUntil attribute is in the future and the
DNSKEY elements of the KeyDigest are the same as the previous trust anchor.
Relying parties <bcp14>SHOULD NOT</bcp14> use a KeyDigest outside of the time range given
in the validFrom and validUntil attributes.</t>

<t>The KeyTag element in the KeyDigest element contains the key tag for
the DNSKEY record represented in this KeyDigest.</t>

<t>The Algorithm element in the KeyDigest element contains the signing
algorithm identifier for the DNSKEY record represented in this
KeyDigest.</t>

<t>The DigestType element in the KeyDigest element contains the digest
algorithm identifier for the DNSKEY record represented in this
KeyDigest.</t>

<t>The Digest element in the KeyDigest element contains the hexadecimal
representation of the hash for the DNSKEY record represented in this
KeyDigest.</t>

<t>The PublicKey element in the KeyDigest element contains the base64
representation of the public key represented in this KeyDigest.
The PublicKey is optional and is new in this version of the specification.</t>

</section>
<section anchor="conversion-example"><name>Converting from XML to DS Records</name>

<t>The display format for the DS record that is the equivalent of a
KeyDigest element can be constructed by marshaling the KeyTag,
Algorithm, DigestType, and Digest elements.  For example, assume that
the TrustAnchor element contains:</t>

<figure><artwork><![CDATA[
<?xml version="1.0" encoding="UTF-8"?>
<TrustAnchor
   id="AD42165F-3B1A-4778-8F42-D34A1D41FD93"
   source="http://data.iana.org/root-anchors/root-anchors.xml">
<Zone>.</Zone>
<KeyDigest id="Kjqmt7v" validFrom="2010-07-15T00:00:00+00:00">
<KeyTag>19036</KeyTag>
<Algorithm>8</Algorithm>
<DigestType>2</DigestType>
<Digest>
49AAC11D7B6F6446702E54A1607371607A1A41855200FD2CE1CDDE32F24E8FB5
</Digest>
<PublicKey>
AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjF
FVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoX
bfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaD
X6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpz
W5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relS
Qageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulq
QxA+Uk1ihz0=
</PublicKey>
</KeyDigest>
</TrustAnchor>
]]></artwork></figure>

<t>The DS record would be:</t>

<figure><artwork><![CDATA[
. IN DS 19036 8 2
   49AAC11D7B6F6446702E54A1607371607A1A41855200FD2CE1CDDE32F24E8FB5
]]></artwork></figure>

</section>
<section anchor="converting-from-xml-to-dnskey-records"><name>Converting from XML to DNSKEY Records</name>

<t>The display format for the DNSKEY record that is the equivalent of a KeyDigest element can be constructed by marshaling the
Algorithm and PublicKey elements with some constants.
For example, assume that the TrustAnchor element is the same as in <xref target="conversion-example"/>.
The DNSKEY record would be:</t>

<figure><artwork><![CDATA[
. IN DNSKEY 257 3 8
   AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjF
   FVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoX
   bfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaD
   X6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpz
   W5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relS
   Qageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulq
   QxA+Uk1ihz0=   
]]></artwork></figure>

</section>
<section anchor="xml-example"><name>XML Example</name>

<t>Figure 2 describes two fictitious trust anchors for the root zone.</t>

<figure><artwork><![CDATA[
<?xml version="1.0" encoding="UTF-8"?>

<!-- Note that these trust anchors are fictitious. -->

<TrustAnchor
    id="AD42165F-B099-4778-8F42-D34A1D41FD93"
    source="http://data.iana.org/root-anchors/root-anchors.xml">
    <Zone>.</Zone>
    <KeyDigest id="42"
               validFrom="2010-07-01T00:00:00-00:00"
               validUntil="2010-08-01T00:00:00-00:00"> <!-- This key
    is no longer valid, since validUntil is in the past -->
        <KeyTag>34291</KeyTag>
        <Algorithm>5</Algorithm>
        <DigestType>1</DigestType>
        <Digest>c8cb3d7fe518835490af8029c23efbce6b6ef3e2</Digest>
    </KeyDigest>
    <KeyDigest id="53"
               validFrom="2010-08-01T00:00:00-00:00">
        <KeyTag>12345</KeyTag>
        <Algorithm>5</Algorithm>
        <DigestType>1</DigestType>
        <Digest>a3cf809dbdbc835716ba22bdc370d2efa50f21c7</Digest>
    </KeyDigest>
</TrustAnchor>

                           Figure 2
]]></artwork></figure>

</section>
</section>
</section>
<section anchor="retrieving"><name>Root Zone Trust Anchor Retrieval</name>

<section anchor="retrieving-trust-anchors-with-https-and-http"><name>Retrieving Trust Anchors with HTTPS and HTTP</name>

<t>Trust anchors are available for retrieval using HTTPS and HTTP.</t>

<t>In this section, all URLs are given using the "https:" scheme.  If
HTTPS cannot be used, replace the "https:" scheme with "http:".</t>

<t>The URL for retrieving the set of hashes described in <xref target="hashes"/> is
&lt;https://data.iana.org/root-anchors/root-anchors.xml&gt;.</t>

</section>
</section>
<section anchor="trusting_anchors"><name>Accepting DNSSEC Trust Anchors</name>

<t>A validator operator can choose whether or not to accept the trust
anchors described in this document using whatever policy they want.
In order to help validator operators verify the content and origin of
trust anchors they receive, IANA uses digital signatures that chain
to an ICANN-controlled Certificate Authority (CA) over the trust
anchor data.</t>

<t>It is important to note that the ICANN CA is not a DNSSEC trust
anchor.  Instead, it is an optional mechanism for verifying the
content and origin of the XML and certificate trust anchors.</t>

<t>The content and origin of the XML file can be verified using a
digital signature on the file.  IANA provides a detached
Cryptographic Message Syntax (CMS) <xref target="RFC5652"/> signature that chains to
the ICANN CA with the XML file.  The URL for a detached CMS signature
for the XML file is
&lt;https://data.iana.org/root-anchors/root-anchors.p7s&gt;.</t>

<t>Another method IANA uses to help validator operators verify the
content and origin of trust anchors they receive is to use the
Transport Layer Security (TLS) protocol for distributing the trust
anchors.  Currently, the CA used for data.iana.org is well known,
that is, one that is a WebTrust-accredited CA.  If a system
retrieving the trust anchors trusts the CA that IANA uses for the
"data.iana.org" web server, HTTPS <bcp14>SHOULD</bcp14> be used instead of HTTP in
order to have assurance of data origin.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>This document describes how DNSSEC trust anchors for the root zone of
the DNS are published.  Many DNSSEC clients will only configure IANA-
issued trust anchors for the DNS root to perform validation.  As a
consequence, reliable publication of trust anchors is important.</t>

<t>This document aims to specify carefully the means by which such trust
anchors are published, with the goal of making it easier for those
trust anchors to be integrated into user environments.</t>

</section>


  </middle>

  <back>


    <references title='Normative References'>



<reference anchor="RFC1034">
  <front>
    <title>Domain names - concepts and facilities</title>
    <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
    <date month="November" year="1987"/>
    <abstract>
      <t>This RFC is the revised basic definition of The Domain Name System. It obsoletes RFC-882. This memo describes the domain style names and their used for host address look up and electronic mail forwarding. It discusses the clients and servers in the domain name system and the protocol used between them.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="13"/>
  <seriesInfo name="RFC" value="1034"/>
  <seriesInfo name="DOI" value="10.17487/RFC1034"/>
</reference>

<reference anchor="RFC1035">
  <front>
    <title>Domain names - implementation and specification</title>
    <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
    <date month="November" year="1987"/>
    <abstract>
      <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="13"/>
  <seriesInfo name="RFC" value="1035"/>
  <seriesInfo name="DOI" value="10.17487/RFC1035"/>
</reference>

<reference anchor="RFC4033">
  <front>
    <title>DNS Security Introduction and Requirements</title>
    <author fullname="R. Arends" initials="R." surname="Arends"/>
    <author fullname="R. Austein" initials="R." surname="Austein"/>
    <author fullname="M. Larson" initials="M." surname="Larson"/>
    <author fullname="D. Massey" initials="D." surname="Massey"/>
    <author fullname="S. Rose" initials="S." surname="Rose"/>
    <date month="March" year="2005"/>
    <abstract>
      <t>The Domain Name System Security Extensions (DNSSEC) add data origin authentication and data integrity to the Domain Name System. This document introduces these extensions and describes their capabilities and limitations. This document also discusses the services that the DNS security extensions do and do not provide. Last, this document describes the interrelationships between the documents that collectively describe DNSSEC. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4033"/>
  <seriesInfo name="DOI" value="10.17487/RFC4033"/>
</reference>

<reference anchor="RFC5011">
  <front>
    <title>Automated Updates of DNS Security (DNSSEC) Trust Anchors</title>
    <author fullname="M. StJohns" initials="M." surname="StJohns"/>
    <date month="September" year="2007"/>
    <abstract>
      <t>This document describes a means for automated, authenticated, and authorized updating of DNSSEC "trust anchors". The method provides protection against N-1 key compromises of N keys in the trust point key set. Based on the trust established by the presence of a current anchor, other anchors may be added at the same place in the hierarchy, and, ultimately, supplant the existing anchor(s).</t>
      <t>This mechanism will require changes to resolver management behavior (but not resolver resolution behavior), and the addition of a single flag bit to the DNSKEY record. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="74"/>
  <seriesInfo name="RFC" value="5011"/>
  <seriesInfo name="DOI" value="10.17487/RFC5011"/>
</reference>

<reference anchor="RFC5652">
  <front>
    <title>Cryptographic Message Syntax (CMS)</title>
    <author fullname="R. Housley" initials="R." surname="Housley"/>
    <date month="September" year="2009"/>
    <abstract>
      <t>This document describes the Cryptographic Message Syntax (CMS). This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="70"/>
  <seriesInfo name="RFC" value="5652"/>
  <seriesInfo name="DOI" value="10.17487/RFC5652"/>
</reference>

<reference anchor="RFC9364">
  <front>
    <title>DNS Security Extensions (DNSSEC)</title>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <date month="February" year="2023"/>
    <abstract>
      <t>This document describes the DNS Security Extensions (commonly called "DNSSEC") that are specified in RFCs 4033, 4034, and 4035, as well as a handful of others. One purpose is to introduce all of the RFCs in one place so that the reader can understand the many aspects of DNSSEC. This document does not update any of those RFCs. A second purpose is to state that using DNSSEC for origin authentication of DNS data is the best current practice. A third purpose is to provide a single reference for other documents that want to refer to DNSSEC.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="237"/>
  <seriesInfo name="RFC" value="9364"/>
  <seriesInfo name="DOI" value="10.17487/RFC9364"/>
</reference>

<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>

<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>




    </references>

    <references title='Informative References'>

<reference anchor="DPS" target="https://www.iana.org/dnssec/procedures">
  <front>
    <title>DNSSEC Practice Statement for the Root Zone KSK Operator</title>
    <author >
      <organization>Root Zone KSK Operator Policy Management Authority</organization>
    </author>
    <date year="2020"/>
  </front>
</reference>
<reference anchor="RELAX-NG" target="https://www.oasis-open.org/committees/relax-ng/compact-20021121.html">
  <front>
    <title>RELAX NG Compact Syntax</title>
    <author initials="J." surname="Clark" fullname="James Clark">
      <organization></organization>
    </author>
    <date year="2002"/>
  </front>
</reference>


    </references>


<?line 441?>

<section anchor="historical-note"><name>Historical Note</name>

<t>The first KSK for use in the root zone of the DNS was
generated at a key ceremony at an ICANN Key Management Facility
(KMF) in Culpeper, Virginia, USA on 2010-06-16.  This key
entered production during a second key ceremony held at an
ICANN KMF in El Segundo, California, USA on 2010-07-12.
The resulting trust anchor was first published on 2010-07-15.</t>

<t>The second KSK for use in the root zone of the DNS was
[ MORE GOES HERE ].</t>

</section>
<section anchor="acknowledgemwents"><name>Acknowledgemwents</name>

<t>Many pioneers paved the way for the deployment of DNSSEC in the root
zone of the DNS, and the authors hereby acknowledge their substantial
collective contribution.</t>

<t>This document incorporates suggestions made by Alfred Hoenes and Russ
Housley, whose contributions are appreciated.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

