{"id":60603,"date":"2017-09-28T19:06:47","date_gmt":"2017-09-28T19:06:47","guid":{"rendered":"https:\/\/www.internetsociety.org\/blog\/2017\/09\/icann-postpones-dnssec-root-ksk-rollover-october-11-will-not-big-day\/"},"modified":"2025-11-27T17:39:26","modified_gmt":"2025-11-27T17:39:26","slug":"icann-postpones-dnssec-root-ksk-rollover-october-11-will-not-big-day","status":"publish","type":"post","link":"https:\/\/www.internetsociety.org\/es\/blog\/2017\/09\/icann-postpones-dnssec-root-ksk-rollover-october-11-will-not-big-day\/","title":{"rendered":"ICANN Posterga el cambio de la clave KSK de la Zona Ra\u00edz DNSSEC- el 11 de Octubre no ser\u00e1 un gran d\u00eda"},"content":{"rendered":"<p>ICANN a postergado el cambio de la clave KSK de la Zona Ra\u00edz DNSSEC. Seg\u00fan ICANN: \u00abEl cambio de la clave implica la generaci\u00f3n de un par nuevo de claves criptogr\u00e1ficas y la distribuci\u00f3n de un nuevo componente p\u00fablico a los resolutores que validan las Extensiones de Seguridad del Sistema de Nombres de Dominio (<abbr class=\"\" title=\"DNS Security Extensions\">DNSSEC<\/abbr>).\u00bb<\/p>\n<p><strong>El cambio de la clave no tendr\u00e1 lugar como estaba previsto el 11 de Octubre, 2017.<\/strong><\/p>\n<\/p>\n<p>Para obtener informaci\u00f3n m\u00e1s ampl\u00eda por favor consulte <a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2017\/09\/icann-postpones-dnssec-root-ksk-rollover-october-11-will-not-big-day\/\">nuestro articulo<\/a> o el <a href=\"https:\/\/www.icann.org\/news\/announcement-2017-09-27-es\">comunicado de prensa<\/a> ICANN\u00a0sobre este tema.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>ICANN a postergado el cambio de la clave KSK de la Zona Ra\u00edz DNSSEC. Seg\u00fan ICANN: \u00abEl cambio de la clave implica la generaci\u00f3n de un par nuevo de claves criptogr\u00e1ficas y la distribuci\u00f3n de un nuevo componente p\u00fablico a los resolutores que validan las Extensiones de Seguridad del Sistema de Nombres de Dominio (DNSSEC).\u00bb [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":60496,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[6188,2582,168,2584,4910,4777,147],"tags":[6239,6059,6238],"region_news_regions":[6030],"content_category":[6102],"ppma_author":[4048],"class_list":["post-60603","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-como-funciona-internet","category-domain-name-system-dns-es","category-normas-abiertos-de-internet","category-extensiones-de-seguridad-del-dns-es","category-fortalecimiento-de-internet","category-seguridad-es","category-deploy360-es","tag-extensiones-de-seguridad-del-sistema-de-nombres-de-dominio-dnssec","tag-icann-es","tag-sistema-de-nombres-de-dominio-dns","region_news_regions-global","content_category-blog-type"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/09\/skeleton-key-4055202668_7997e879a6_o.jpg",1280,741,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/09\/skeleton-key-4055202668_7997e879a6_o.jpg",150,87,false],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/09\/skeleton-key-4055202668_7997e879a6_o.jpg",450,261,false],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/09\/skeleton-key-4055202668_7997e879a6_o.jpg",768,445,false],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/09\/skeleton-key-4055202668_7997e879a6_o.jpg",1024,593,false],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/09\/skeleton-key-4055202668_7997e879a6_o.jpg",1280,741,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/09\/skeleton-key-4055202668_7997e879a6_o.jpg",1280,741,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/09\/skeleton-key-4055202668_7997e879a6_o.jpg",250,145,false],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/09\/skeleton-key-4055202668_7997e879a6_o.jpg",600,347,false],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/09\/skeleton-key-4055202668_7997e879a6_o.jpg",300,174,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/09\/skeleton-key-4055202668_7997e879a6_o.jpg",400,232,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/09\/skeleton-key-4055202668_7997e879a6_o.jpg",600,347,false]},"uagb_author_info":{"display_name":"Dan York","author_link":"https:\/\/www.internetsociety.org\/es\/author\/york\/"},"uagb_comment_info":0,"uagb_excerpt":"ICANN a postergado el cambio de la clave KSK de la Zona Ra\u00edz DNSSEC. Seg\u00fan ICANN: \u00abEl cambio de la clave implica la generaci\u00f3n de un par nuevo de claves criptogr\u00e1ficas y la distribuci\u00f3n de un nuevo componente p\u00fablico a los resolutores que validan las Extensiones de Seguridad del Sistema de Nombres de Dominio (DNSSEC).\u00bb&hellip;","authors":[{"term_id":4048,"user_id":14,"is_guest":0,"slug":"york","display_name":"Dan York","avatar_url":{"url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","url2x":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g2x"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/posts\/60603","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/comments?post=60603"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/posts\/60603\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/media\/60496"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/media?parent=60603"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/categories?post=60603"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/tags?post=60603"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/region_news_regions?post=60603"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/content_category?post=60603"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/ppma_author?post=60603"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}