RFC 5155 - DNS Security (DNSSEC) Hashed Authenticated Denial of Existence
Published: March 2008
Category: Standards Track
Authors: B. Laurie, G. Sisson, R. Arends (Nominet), D. Blacka (VeriSign, Inc.)
Status of This Memo
This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited.
Abstract
The Domain Name System Security (DNSSEC) Extensions introduced the NSEC resource record (RR) for authenticated denial of existence. This document introduces an alternative resource record, NSEC3, which similarly provides authenticated denial of existence. However, it also provides measures against zone enumeration and permits gradual expansion of delegation-centric zones.
Contents
- 1. Introduction
- 2. Backwards Compatibility
- 3. The NSEC3 Resource Record
- 4. The NSEC3PARAM Resource Record
- 5. Calculation of the Hash
- 6. Opt-Out
- 7. Authoritative Server Considerations
- 7.1. Zone Signing
- 7.2. Zone Serving
- 7.2.1. Closest Encloser Proof
- 7.2.2. Name Error Responses
- 7.2.3. No Data Responses, QTYPE is not DS
- 7.2.4. No Data Responses, QTYPE is DS
- 7.2.5. Wildcard No Data Responses
- 7.2.6. Wildcard Answer Responses
- 7.2.7. Referrals to Unsigned Subzones
- 7.2.8. Responding to Queries for NSEC3 Owner Names
- 7.2.9. Server Response to a Run-Time Collision
- 7.3. Secondary Servers
- 7.4. Zones Using Unknown Hash Algorithms
- 7.5. Dynamic Update
- 8. Validator Considerations
- 8.1. Responses with Unknown Hash Types
- 8.2. Verifying NSEC3 RRs
- 8.3. Closest Encloser Proof
- 8.4. Validating Name Error Responses
- 8.5. Validating No Data Responses, QTYPE is not DS
- 8.6. Validating No Data Responses, QTYPE is DS
- 8.7. Validating Wildcard No Data Responses
- 8.8. Validating Wildcard Answer Responses
- 8.9. Validating Referrals to Unsigned Subzones
- 9. Resolver Considerations
- 10. Special Considerations
- 11. IANA Considerations
- 12. Security Considerations
- 13. References
- Appendix A. Example Zone
- Appendix B. Example Responses
- Appendix C. Special Considerations
- Authors' Addresses
Related Resources
- Official RFC:
https://www.rfc-editor.org/rfc/rfc5155.txt - RFC DataTracker:
https://datatracker.ietf.org/doc/html/rfc5155