Internet Assigned Numbers Authority
Domain Name System Security (DNSSEC) Algorithm Numbers
Created
2003-11-03
Last Updated
2025-06-10
Available Formats
[IMG]
XML [IMG]
HTML [IMG]
Plain text
Registries Included Below
??DNS Security Algorithm Numbers
??DNS KEY Record Diffie-Hellman Prime Lengths
??DNS KEY Record Diffie-Hellman Well-Known Prime/Generator Pairs
DNS Security Algorithm Numbers
Registration Procedure(s)
Standards Action or Specification Required
Expert(s)
Unassigned
Reference
[RFC4034][RFC3755][RFC6014][RFC6944][RFC-ietf-dnsop-rfc8624-bis-13]
Note
Adding a new entry to the "DNS System Algorithm Numbers" registry with
a recommended value of "MAY" in the "Use for DNSSEC Signing", "Use for
DNSSEC Validation", "Implement for DNSSEC Signing", or "Implement for
DNSSEC Validation" columns will subject to the "Specification Required"
policy as defined in [RFC8126] in order to promote continued evolution
of DNSSEC algorithms and DNSSEC agility. New entries added through
the "Specification Required" process will have the value of "MAY"
for all columns.
Adding a new entry to, or changing existing values in, the "DNS System
Algorithm Numbers" registry for the "Use for DNSSEC Signing", "Use for
DNSSEC Validation", "Implement for DNSSEC Signing", or "Implement for
DNSSEC Validation" columns to any other value than "MAY" requires a
Standards Action.
If an item is not marked as "RECOMMENDED", it does not necessarily mean
that it is flawed; rather, it indicates that the item either has not been
through the IETF consensus process, has limited applicability, or is
intended only for specific use cases.
Note
The KEY, SIG, DNSKEY, RRSIG, DS, and CERT RRs use an 8-bit number used
to identify the security algorithm being used.
All algorithm numbers in this registry may be used in CERT RRs. Zone
signing (DNSSEC) and transaction security mechanisms (SIG(0) and TSIG)
make use of particular subsets of these algorithms. Only algorithms
usable for zone signing may appear in DNSKEY, RRSIG, and DS RRs.
Only those usable for SIG(0) and TSIG may appear in SIG and KEY RRs.
* There has been no determination of standardization of the use of this
algorithm with Transaction Security.
Available Formats
[IMG]
CSV
Use for Use for Implement Implement
Number Description Mnemonic Zone Trans. DNSSEC DNSSEC for for Reference
Signing Sec. Signing Validation DNSSEC DNSSEC
Signing Validation
0 Delete DS DELETE N N [RFC4034][proposed standard][RFC4398][proposed
standard][RFC8078][proposed standard]
RSA/MD5 [RFC3110][proposed standard][RFC4034][proposed
1 (DEPRECATED, see RSAMD5 N Y MUST NOT MUST NOT MUST NOT MUST NOT standard]
5)
2 Diffie-Hellman DH N Y [RFC2539][proposed standard]
[RFC3755][proposed standard][RFC2536][proposed
standard][Federal Information Processing
Standards Publication (FIPS PUB) 186, Digital
3 DSA/SHA1 DSA Y Y MUST NOT MUST NOT MUST NOT MUST NOT Signature Standard, 18 May 1994.][Federal
Information Processing Standards Publication
(FIPS PUB) 180-1, Secure Hash Standard, 17
April 1995. (Supersedes FIPS PUB 180 dated 11
May 1993.)]
4 Reserved [RFC6725][proposed standard]
5 RSA/SHA-1 RSASHA1 Y Y MUST NOT RECOMMENDED NOT MUST [RFC3110][proposed standard][RFC4034][proposed
RECOMMENDED standard][RFC-ietf-dnsop-must-not-sha1-09]
6 DSA-NSEC3-SHA1 DSA-NSEC3-SHA1 Y Y MUST NOT MUST NOT MUST NOT MUST NOT [RFC5155][proposed standard]
7 RSASHA1-NSEC3-SHA1 RSASHA1-NSEC3-SHA1 Y Y MUST NOT RECOMMENDED NOT MUST [RFC5155][proposed
RECOMMENDED standard][RFC-ietf-dnsop-must-not-sha1-09]
8 RSA/SHA-256 RSASHA256 Y * RECOMMENDED RECOMMENDED MUST MUST [RFC5702][proposed standard]
9 Reserved [RFC6725][proposed standard]
10 RSA/SHA-512 RSASHA512 Y * NOT RECOMMENDED NOT MUST [RFC5702][proposed standard]
RECOMMENDED RECOMMENDED
11 Reserved [RFC6725][proposed standard]
[RFC5933][proposed standard][Change the status
12 GOST R 34.10-2001 ECC-GOST Y * MUST NOT MUST NOT MUST NOT MUST NOT of GOST Signature Algorithms in DNSSEC in the
(DEPRECATED) IETF stream to
Historic][RFC-ietf-dnsop-must-not-ecc-gost-07]
13 ECDSA Curve P-256 ECDSAP256SHA256 Y * RECOMMENDED RECOMMENDED MUST MUST [RFC6605][proposed standard]
with SHA-256
14 ECDSA Curve P-384 ECDSAP384SHA384 Y * MAY RECOMMENDED MAY RECOMMENDED [RFC6605][proposed standard]
with SHA-384
15 Ed25519 ED25519 Y * RECOMMENDED RECOMMENDED RECOMMENDED RECOMMENDED [RFC8080][proposed standard]
16 Ed448 ED448 Y * MAY RECOMMENDED MAY RECOMMENDED [RFC8080][proposed standard]
SM2 signing
17 algorithm with SM3 SM2SM3 Y * MAY MAY MAY MAY [RFC9563][informational]
hashing algorithm
18-22 Unassigned
23 GOST R 34.10-2012 ECC-GOST12 Y * MAY MAY MAY MAY [RFC9558][informational]
24-122 Unassigned
123-251 Reserved [RFC4034][proposed standard][RFC6014][proposed
standard]
252 Reserved for INDIRECT N N [RFC4034][proposed standard]
Indirect Keys
253 private algorithm PRIVATEDNS Y Y MAY MAY MAY MAY [RFC4034][proposed standard]
254 private algorithm PRIVATEOID Y Y MAY MAY MAY MAY [RFC4034][proposed standard]
OID
255 Reserved [RFC4034][proposed standard]
DNS KEY Record Diffie-Hellman Prime Lengths
Registration Procedure(s)
IETF Review
Reference
[RFC2539]
Available Formats
[IMG]
CSV
Value Description Reference
0 Unassigned
1 index into well-known table [RFC2539]
2 index into well-known table [RFC2539]
3-15 Unassigned
DNS KEY Record Diffie-Hellman Well-Known Prime/Generator Pairs
Reference
[RFC2539]
Available Formats
[IMG]
CSV
Range Registration Procedures
0x0000-0x07ff Standards Action
0x0800-0xbfff RFC Required
Value Description Reference
0x0000 Unassigned
0x0001 Well-Known Group 1: A 768 bit prime [RFC2539]
0x0002 Well-Known Group 2: A 1024 bit prime [RFC2539]
0x0003-0xbfff Unassigned
0xc000-0xffff Private Use [RFC2539]
Licensing Terms
Presently we were in a very dark road, and at a point where it dropped suddenly between steep sides we halted in black shadow. A gleam of pale sand, a whisper of deep flowing waters, and a farther glimmer of more sands beyond them challenged our advance. We had come to a "grapevine ferry." The scow was on the other side, the water too shoal for the horses to swim, and the bottom, most likely, quicksand. Out of the blackness of the opposite shore came a soft, high-pitched, quavering, long-drawn, smothered moan of woe, the call of that snivelling little sinner the screech-owl. Ferry murmured to me to answer it and I sent the same faint horror-stricken tremolo back. Again it came to us, from not farther than one might toss his cap, and I followed Ferry down to the water's edge. The grapevine guy swayed at our side, we heard the scow slide from the sands, and in a few moments, moved by two videttes, it touched our shore. Soon we were across, the two videttes riding with us, and beyond a sharp rise, in an old opening made by the swoop of a hurricane, we entered the silent unlighted bivouac of Ferry's scouts. Ferry got down and sat on the earth talking with Quinn, while the sergeants quietly roused the sleepers to horse. Plotinus is driven by this perplexity to reconsider the whole theory of Matter.477 He takes Aristotle¡¯s doctrine as the groundwork of his investigation. According to this, all existence is divided into Matter and Form. What we know of things¡ªin other words, the sum of their differential characteristics¡ªis their Form. Take away this, and the unknowable residuum is their Matter. Again, Matter is the vague indeterminate something out of which particular Forms are developed. The two are related as Possibility to Actuality, as the more generic to the more specific substance through every grade of classification and composition. Thus there are two Matters, the one sensible and the other intelligible. The former constitutes the common substratum of bodies, the other the common element of ideas.478 The general distinction between Matter and Form was originally suggested to Aristotle by Plato¡¯s remarks on the same subject; but he differs325 from his master in two important particulars. Plato, in his Timaeus, seems to identify Matter with space.479 So far, it is a much more positive conception than the ?λη of the Metaphysics. On the other hand, he constantly opposes it to reality as something non-existent; and he at least implies that it is opposed to absolute good as a principle of absolute evil.480 Thus while the Aristotelian world is formed by the development of Power into Actuality, the Platonic world is composed by the union of Being and not-Being, of the Same and the Different, of the One and the Many, of the Limit and the Unlimited, of Good and Evil, in varying proportions with each other. The Lawton woman had heard of an officer's family at Grant, which was in need of a cook, and had gone there. [See larger version] On the 8th of July an extraordinary Privy Council was summoned. All the members, of whatever party, were desired to attend, and many were the speculations as to the object of their meeting. The general notion was that it involved the continuing or the ending of the war. It turned out to be for the announcement of the king's intended marriage. The lady selected was Charlotte, the second sister of the Duke of Mecklenburg-Strelitz. Apart from the narrowness of her education, the young princess had a considerable amount of amiability, good sense, and domestic taste. These she shared with her intended husband, and whilst they made the royal couple always retiring, at the same time they caused them to give, during their lives, a moral air to their court. On the 8th of September Charlotte arrived at St. James's, and that afternoon the marriage took place, the ceremony being performed by the Archbishop of Canterbury. On the 22nd the coronation took place with the greatest splendour. Mother and girls were inconsolable, for each had something that they were sure "Si would like," and would "do him good," but they knew Josiah Klegg, Sr., well enough to understand what was the condition when he had once made up his mind. CHAPTER V. THE YOUNG RECRUITS Si proceeded to deftly construct a litter out of the two guns, with some sticks that he cut with a knife, and bound with pawpaw strips. His voice had sunk very low, almost to sweetness. A soft flurry of pink went over her face, and her eyelids drooped. Then suddenly she braced herself, pulled herself taut, grew combative again, though her voice shook. HoME²Ô¾®Ïè̫ʲôÐÇ×ù
ENTER NUMBET 0016jkixdj.com.cn
www.lfstem.com.cn
emqmqo.com.cn
jksksd.com.cn
www.into386.com.cn
www.o1bb.com.cn
nmseal.com.cn
viateq.com.cn
ubermoney.com.cn
www.xafsl.com.cn