<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.6.5 (Ruby 2.6.8) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-hoffman-more-private-algs-01" category="std" consensus="true" submissionType="IETF" updates="4034" tocDepth="4" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="More Private Algs">More Private Algorithms  for DNSSEC</title>

    <author initials="P." surname="Hoffman" fullname="Paul Hoffman">
      <organization>ICANN</organization>
      <address>
        <email>paul.hoffman@icann.org</email>
      </address>
    </author>

    <date year="2022" month="March" day="24"/>

    
    
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>RFC 4034 allocates one value in the IANA registry for DNSSEC algorithm numbers for
private algorithms.
That may be too few for experimentation where multiple yet-to-be-assigned algorithms
are used.
This document assigns seven more values for this use case.</t>

<t>This document is currently maintained at https://github.com/paulehoffman/draft-hoffman-more-private-algs.
Issues and pull requests are welcomed.
If the document is later adopted by a working group, a new repository will likely
be created.</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>Section A.1 of <xref target="RFC4034"/> assigns value 253 as "Private [PRIVATEDNS]".
Section A.1.1 describes this value:</t>

<figure><artwork><![CDATA[
Algorithm number 253 is reserved for private use and will never be
assigned to a specific algorithm.  The public key area in the DNSKEY
RR and the signature area in the RRSIG RR begin with a wire encoded
domain name, which MUST NOT be compressed.  The domain name indicates
the private algorithm to use, and the remainder of the public key
area is determined by that algorithm.  Entities should only use
domain names they control to designate their private algorithms.
]]></artwork></figure>

<t>In the coming years, it is likely that there will be experimentation with new DNSSEC signing
algorithms for post-quantum cryptography.
At the time this document is written, it is possible that there will be many such
algorithms in experimental use at the same time.
If that comes to pass, it would be useful to have a handful of private use algorithms
to use at the same time, such as for experimenting with zones that will have multiple
simultaneous signing algorithms.</t>

<t>This document updates <xref target="RFC4034"/> to add seven more private use algorithms.
Unlike private use algorithm 253, there is no restriction on the public key area in the DNSKEY
RR and the signature area in the RRSIG RR.
Thus, there are no domain names embdded in the public key or signature like there are
with private use algorithm 253.
This update brings the total number of
private use algorithms that use the same format to eight.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document requests that IANA allocate seven additional values,
245 through 251,
in the "DNS Security Algorithm Numbers"
registry (https://www.iana.org/assignments/dns-sec-alg-numbers/).</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>Allocating private use values does not cause any significant security considerations.</t>

</section>


  </middle>

  <back>


    <references title='Normative References'>





<reference anchor='RFC4034' target='https://www.rfc-editor.org/info/rfc4034'>
<front>
<title>Resource Records for the DNS Security Extensions</title>
<author fullname='R. Arends' initials='R.' surname='Arends'><organization/></author>
<author fullname='R. Austein' initials='R.' surname='Austein'><organization/></author>
<author fullname='M. Larson' initials='M.' surname='Larson'><organization/></author>
<author fullname='D. Massey' initials='D.' surname='Massey'><organization/></author>
<author fullname='S. Rose' initials='S.' surname='Rose'><organization/></author>
<date month='March' year='2005'/>
<abstract><t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC).  The DNS Security Extensions are a collection of resource records and protocol modifications that provide source authentication for the DNS.  This document defines the public key (DNSKEY), delegation signer (DS), resource record digital signature (RRSIG), and authenticated denial of existence (NSEC) resource records.  The purpose and format of each resource record is described in detail, and an example of each resource record is given. </t><t> This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4034'/>
<seriesInfo name='DOI' value='10.17487/RFC4034'/>
</reference>




    </references>




  </back>

<!-- ##markdown-source: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-->

</rfc>

