{"id":75470,"date":"2018-03-06T05:04:54","date_gmt":"2018-03-06T05:04:54","guid":{"rendered":"https:\/\/www.internetsociety.org\/blog\/2018\/03\/icann-seeking-public-comment-ksk-rollover-process\/"},"modified":"2025-11-27T17:38:25","modified_gmt":"2025-11-27T17:38:25","slug":"icann-seeking-public-comment-ksk-rollover-process","status":"publish","type":"post","link":"https:\/\/www.internetsociety.org\/fr\/blog\/2018\/03\/icann-seeking-public-comment-ksk-rollover-process\/","title":{"rendered":"L&rsquo;ICANN sollicite le commentaire public sur le processus de renouvellement de la racine KSK pour DNSSEC"},"content":{"rendered":"<p>Le 11 octobre 2018, <strong>l&rsquo;ICANN devrait-il utiliser la cl\u00e9 de signature de cl\u00e9 (KSK) de la zone racine qui est au c\u0153ur du DNSSEC?<\/strong> L&rsquo;ICANN pr\u00e9voit de red\u00e9marrer le processus de roulement pour la KSK Racine et demande donc un examen public de son nouveau plan. Il comprend plus de publicit\u00e9 sur la n\u00e9cessit\u00e9 d&rsquo;\u00eatre pr\u00e9par\u00e9 pour ce roulement, ainsi que de l&rsquo;analyse des donn\u00e9es indiquant le niveau de pr\u00e9paration.<\/p>\n<p><span class=\"button\"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2018\/03\/icann-seeking-public-comment-ksk-rollover-process\/\">Savoir plus (en anglais)<\/a><\/span><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Le 11 octobre 2018, l&rsquo;ICANN devrait-il utiliser la cl\u00e9 de signature de cl\u00e9 (KSK) de la zone racine qui est au c\u0153ur du DNSSEC? L&rsquo;ICANN pr\u00e9voit de red\u00e9marrer le processus de roulement pour la KSK Racine et demande donc un examen public de son nouveau plan. Il comprend plus de publicit\u00e9 sur la n\u00e9cessit\u00e9 d&rsquo;\u00eatre pr\u00e9par\u00e9 pour ce roulement, ainsi que de l&rsquo;analyse des donn\u00e9es indiquant le niveau de pr\u00e9paration.<\/p>\n","protected":false},"author":1411,"featured_media":56711,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[6187,2581,2583,169,4909,4775,146],"tags":[6318,6317,6240,6060],"region_news_regions":[6029],"content_category":[6101],"ppma_author":[4605],"class_list":["post-75470","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-comment-fonctionne-internet","category-domain-name-system-dns-fr","category-extensions-de-securite-du-dns","category-les-normes-internet-ouvertes","category-renforcer-internet","category-securite-fr","category-deploy360-fr","tag-domain-name-system-dns-2","tag-domain-name-system-systeme-de-nom-de-domaine","tag-extensions-de-securite-dns-dnssec","tag-icann-fr","region_news_regions-mondial","content_category-blog-type"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/09\/Deploy360-Billboard_DNSSEC.jpg",976,338,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/09\/Deploy360-Billboard_DNSSEC-150x150.jpg",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/09\/Deploy360-Billboard_DNSSEC-300x104.jpg",300,104,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/09\/Deploy360-Billboard_DNSSEC-768x266.jpg",768,266,true],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/09\/Deploy360-Billboard_DNSSEC.jpg",976,338,false],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/09\/Deploy360-Billboard_DNSSEC.jpg",976,338,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/09\/Deploy360-Billboard_DNSSEC.jpg",976,338,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/09\/Deploy360-Billboard_DNSSEC-250x87.jpg",250,87,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/09\/Deploy360-Billboard_DNSSEC-600x338.jpg",600,338,true],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/09\/Deploy360-Billboard_DNSSEC.jpg",300,104,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/09\/Deploy360-Billboard_DNSSEC.jpg",400,139,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/09\/Deploy360-Billboard_DNSSEC.jpg",600,208,false]},"uagb_author_info":{"display_name":"Kevin Meynell","author_link":"https:\/\/www.internetsociety.org\/fr\/author\/meynell2\/"},"uagb_comment_info":0,"uagb_excerpt":"Le 11 octobre 2018, l'ICANN devrait-il utiliser la cl\u00e9 de signature de cl\u00e9 (KSK) de la zone racine qui est au c\u0153ur du DNSSEC? L'ICANN pr\u00e9voit de red\u00e9marrer le processus de roulement pour la KSK Racine et demande donc un examen public de son nouveau plan. Il comprend plus de publicit\u00e9 sur la n\u00e9cessit\u00e9 d'\u00eatre\u2026","authors":[{"term_id":4605,"user_id":1411,"is_guest":0,"slug":"meynell2","display_name":"Kevin Meynell","avatar_url":{"url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","url2x":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g2x"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/75470","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/users\/1411"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/comments?post=75470"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/75470\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media\/56711"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media?parent=75470"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/categories?post=75470"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/tags?post=75470"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/region_news_regions?post=75470"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/content_category?post=75470"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/ppma_author?post=75470"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}