<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-deleg-01" category="std" consensus="true" submissionType="IETF" updates="1034, 1035, 6672, 6840" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.29.0 -->
  <front>
    <title abbrev="DELEG">Extensible Delegation for DNS</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-deleg-01"/>
    <author initials="T." surname="April" fullname="Tim April">
      <organization>Google, LLC</organization>
      <address>
        <email>ietf@tapril.net</email>
      </address>
    </author>
    <author initials="P." surname="Špaček" fullname="Petr Špaček">
      <organization>ISC</organization>
      <address>
        <email>pspacek@isc.org</email>
      </address>
    </author>
    <author initials="R." surname="Weber" fullname="Ralf Weber">
      <organization>Akamai Technologies</organization>
      <address>
        <email>rweber@akamai.com</email>
      </address>
    </author>
    <author initials="D." surname="Lawrence" fullname="David C Lawrence">
      <organization>Salesforce</organization>
      <address>
        <email>tale@dd.org</email>
      </address>
    </author>
    <date year="2025" month="July" day="07"/>
    <area>Internet</area>
    <workgroup>deleg</workgroup>
    <keyword>Internet-Draft</keyword>
    <keyword>DNS</keyword>
    <keyword>delegation</keyword>
    <abstract>
      <?line 125?>
<t>A delegation in the Domain Name System (DNS) is a mechanism that enables efficient and distributed management of the DNS namespace. It involves delegating authority over subdomains to specific DNS servers via NS records, allowing for a hierarchical structure and distributing the responsibility for maintaining DNS records.</t>
      <t>An NS record contains the hostname of the nameserver for the delegated namespace. Any facilities of that nameserver must be discovered through other mechanisms. This document proposes a new extensible DNS record type, DELEG, for delegation of the authority for a domain. Future documents then can use this mechanism to use additional information about the delegated namespace and the capabilities of authoritative nameservers for the delegated namespace.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://github.com/ietf-wg-deleg/draft-ietf-deleg-base/tree/gh-pages"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-deleg/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        deleg Working Group mailing list (<eref target="mailto:dd@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/dd/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/dd/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-wg-deleg/draft-ietf-deleg-base/"/>.</t>
    </note>
  </front>
  <middle>
    <?line 129?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>In the Domain Name System <xref target="STD13"/>, subdomains within the domain name hierarchy are indicated by delegations to servers which are authoritative for their portion of the namespace.  The DNS records that do this, called NS records, contain hostnames of nameservers, which resolve to addresses.  No other information is available to the resolver. It is limited to connect to the authoritative servers over UDP and TCP port 53. This limitation is a barrier for efficient introduction of new DNS technology.</t>
      <t>The proposed DELEG record type remedies this problem by providing extensible parameters to indicate capabilities and additional information, such as glue that a resolver may use for the delegated authority. It is authoritative and thus signed in the parent side of the delegation making it possible to validate all delegation parameters (names and glue records) with DNSSEC.</t>
      <t>This document only shows how DELEG can be used instead of or along side a NS record to create a delegation. Future documents can use the extensible mechanism for more advanced features like connecting to a name server with an encrypted transport.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in <br/>
BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in
all capitals, as shown here.</t>
        <t>Terminology regarding the Domain Name System comes from <xref target="BCP219"/>, with addition terms defined here:</t>
        <ul spacing="normal">
          <li>
            <t>legacy name servers: An authoritative server that does not support the DELEG record.</t>
          </li>
          <li>
            <t>legacy resolvers: A resolver that does not support the DELEG record.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="deleg-record-type">
      <name>DELEG Record Type</name>
      <t>The DELEG record uses a new resource record type, whose contents are identical to the SVCB record defined in <xref target="RFC9460"/>. For extensions SVCB and DELEG use Service Parameter Keys (SvcParamKeys) and new SvcParamKeys that might be needed also will use the existing IANA Registry.</t>
      <section anchor="differences-from-svcb">
        <name>Differences from SVCB</name>
        <ul spacing="normal">
          <li>
            <t>DELEG can only have two priorities 0 indicating INCLUDE and 1 indicating a DIRECT delegation. These terms MUST be used in the presentation format of the DELEG record.</t>
          </li>
          <li>
            <t>INCLUDE and DIRECT delegation can be mixed within an RRSet.</t>
          </li>
          <li>
            <t>The final INCLUDE target is an SVCB record, though there can be further indirection using CNAME or AliasMode SVCB records.</t>
          </li>
          <li>
            <t>There can be multiple INCLUDE DELEG records, but further indirections through SVCB records have to comply with <xref target="RFC9460"/> in that there can be only one AliasMode SVCB record per name.</t>
          </li>
          <li>
            <t>In order to not allow unbounded indirection of DELEG records the maximum number of indirections, CNAME or AliasMode SVCB is 4.</t>
          </li>
          <li>
            <t>The SVCB IPv4hint and IPv6hint parameters keep their key values of 4 and 6, but the presentation format with DELEG MUST be Glue4 and Glue6.</t>
          </li>
          <li>
            <t>Glue4 and Glue6 records when present MUST be used to connect to the delegated name server.</t>
          </li>
          <li>
            <t>The target of any DELEG record MUST NOT be '.'</t>
          </li>
          <li>
            <t>The target of a DELEG INCLUDE record MUST be outside of the delegated domain.</t>
          </li>
          <li>
            <t>The target of a DELEG DIRECT record MUST be a domain below the delegated domain.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="use-of-deleg-record">
      <name>Use of DELEG record</name>
      <t>A DELEG RRset MAY be present at a delegation point.  The DELEG RRset MAY contain multiple records. DELEG RRsets MUST NOT appear at a zone's apex.</t>
      <t>A DELEG RRset MAY be present with or without NS or DS RRsets at the delegation point.</t>
      <section anchor="resolvers">
        <name>Resolvers</name>
        <section anchor="signaling-deleg-support">
          <name>Signaling DELEG support</name>
          <t>A resolver that is DELEG aware MUST signal its support by sending the DE bit when iterating.</t>
          <t>This bit is referred to as the "DELEG" (DE) bit.  In the context of the EDNS0 OPT meta-RR, the DE bit is the TBD of the "extended RCODE and flags" portion of the EDNS0 OPT meta-RR, structured as follows (to be updated when assigned):</t>
          <artwork><![CDATA[
            +0 (MSB)                +1 (LSB)
     +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
  0: |   EXTENDED-RCODE      |       VERSION         |
     +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
  2: |DO|CO|DE|              Z                       |
     +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
]]></artwork>
          <t>Setting the DE bit to one in a query indicates the resolver understands new DELEG semantics and does not need NS RR to follow a referral. The DE bit cleared (set to zero) indicates the resolver is unprepared to handle DELEG and hence can only be served NS, DS and glue in a delegation response.</t>
          <t>Motivation: For a long time there will be both DELEG and NS needed for delegation. As both methods should be configured to get to a proper resolution it is not necessary to send both in a referral response. We therefore purpose an EDNS flag to be use similar to the DO Bit for DNSSEC to be used to signal that the sender understands DELEG and does not need NS or glue information in the referral.</t>
        </section>
        <section anchor="referral">
          <name>Referral</name>
          <t>The DELEG record creates a zone cut similar to the NS record.</t>
          <t>If a DELEG record exists on a given delegation point, all record types defined as authoritative in the child zone MUST be resolved using the name servers defined in the DELEG record. In such case resolver MUST NOT use NS records even if they happen to be present in cache, even if resolution using DELEG records have failed for some reason. Such fallback from DELEG to NS would invalidate security guarantees of DELEG protocol.</t>
          <t>If no DELEG record exists on a given delegation point resolver MUST use NS records as specified by RFC1034.</t>
        </section>
        <section anchor="parent-side-types-qtypedeleg">
          <name>Parent-side types, QTYPE=DELEG</name>
          <t>Record types defined as authoritative on the parent side of zone cut (currently DS and DELEG types) retain the same special handling as before, i.e. <xref target="RFC4035"/> section 2.6 applies.</t>
          <t>DELEG unaware recursive resolvers will not be able to determine correct NS set for QTYPE=DELEG queries. This is not a bug.</t>
        </section>
        <section anchor="algorithm">
          <name>Algorithm</name>
          <t>This section updates instructions for step "2. Find the best servers to ask." of RFC1034 section 5.3.3 and <xref target="RFC6672"/> section 3.4.1.</t>
          <t>There are two important details:</t>
          <ul spacing="normal">
            <li>
              <t>The algorithm description should explicitly describe RR types authoritative at the parent side of a zone cut. This is implied by <xref target="RFC4035"/> section 3.1.4.1 for DS RR type but the text in the algorithm description was not updated. DELEG specification simply extends this existing behavior to DELEG RR type as well, and makes this special case explicit.</t>
            </li>
            <li>
              <t>When DELEG RRset exists, NS RRset is ignored on that particular zone cut by DELEG aware resolvers.</t>
            </li>
            <li>
              <t>DELEG and NS RR types can be used differently at each delegation level and resolver MUST be able follow chain of delegations which combines them in arbitrary ways.</t>
            </li>
          </ul>
          <t>Example of a valid delegation tree:</t>
          <artwork><![CDATA[
; root zone with NS-only delegations
. SOA ...
test. NS ...

; test. zone with NS+DELEG delegations
test. SOA ...
sld.test. NS ...
sld.test. DELEG ...

; sld.test. zone with NS-only delegation
sld.test. SOA ...
nssub.sld.test. NS ...

; nssub.sld.test. zone with DELEG-only delegation
delegsub.sub.sld.test. DELEG ...
]]></artwork>
          <t>Terms SNAME and SLIST used in the rest of this section are defined in RFC 1034 section 5.3.2.:</t>
          <t>SNAME           the domain name we are searching for.</t>
          <t>SLIST           a structure which describes the name servers and the
                zone which the resolver is currently trying to query.</t>
          <t>Modified description of Step 2. Find the best servers to ask follows:</t>
          <t>Step 2 looks for a name server to ask for the required data.</t>
          <t>First determine deepest possible zone cut which can potentially hold the answer for given (query name, type, class) combination:</t>
          <ul spacing="normal">
            <li>
              <t>Start with SNAME equal to QNAME.</t>
            </li>
            <li>
              <t>If QTYPE is a type authoritative at the parent side of a zone cut (DS or DELEG), remove leftmost label from SNAME. E.g. if QNAME is Test.Example. and QTYPE is DELEG or DS, set SNAME to Example.</t>
            </li>
            <li>
              <t>TODO: what to do about ". DELEG" (or DS) query? That leaves zero labels left. That by definition does not exist ...</t>
            </li>
          </ul>
          <t>Further general strategy is to look for locally-available DELEG and NS RRsets, starting at current SNAME. If none are found, shorten SNAME by removing leftmost label and check again. This effectivelly finds the deepest known delegation point on the path between SNAME and the root:</t>
          <ul spacing="normal">
            <li>
              <t>For given SNAME first check existence of DELEG RRset. If it exists, resolver MUST use it's content to populate SLIST. If the DELEG RRset is known to exist but is unusable (e.g. it is found in DNSSEC BAD cache), resolver MUST NOT fallback to NS RRset, even if it is locally available. Resolver MUST treat this case as if no servers were available/reachable.</t>
            </li>
            <li>
              <t>If a given SNAME is proven to not have a DELEG RRset but has NS RRset, resolver MUST copy it into SLIST.</t>
            </li>
            <li>
              <t>If SLIST is populated, terminate walk up the DNS tree.</t>
            </li>
            <li>
              <t>If SLIST is not populated, remove leftmost label from SNAME and inspect RR types for this new SNAME.</t>
            </li>
          </ul>
          <t>Rest of the Step 2's description is not affected by this document.</t>
          <t>Please note the instructions to "Bound the amount of work" further down in the original text to apply. Suitable limits MUST be enforced to limit damage EVEN IF SOMEONE HAS INCORRECTLY CONFIGURED SOME DATA.</t>
        </section>
      </section>
      <section anchor="authoritative-servers">
        <name>Authoritative Servers</name>
        <t>DELEG-aware authoritative servers act differently when handling queries from DELEG-unaware clients (those with DE=0) and queries from DELEG-aware clients (those with DE=1).</t>
        <t>The server MUST copy the value of the DE bit from the query into the response.
(TODO: not really necessary protocol-wise, but might be nice for monitoring the deployment?)</t>
        <section anchor="deleg-unaware-clients">
          <name>DELEG-unaware Clients</name>
          <t>DELEG-unaware clients do not use DELEG records for delegation.
When a DELEG-aware authoritative server responds to a DELEG-unaware client, any DELEG RR in the response does not create zone cut, is not returned in referral responses, and is not considered authoritative on the parent side of a zone cut. Because of this, DELEG-aware authoritative servers MUST answer as if they are DELEG-unaware.
Please note this instruction does not affect DNSSEC signing, i.e. no special handling for NSEC type bitmap is necessary and DELEG RR type is accuratelly represented even for DELEG-unaware clients.</t>
          <t>Two surprising narrow cases of DELEG-aware authoritative responding in DELEG-unaware manner are described here.</t>
          <section anchor="deleg-unaware-clients-requesting-qtypedeleg">
            <name>DELEG-unaware Clients Requesting QTYPE=DELEG</name>
            <t>In DELEG-unaware clients, records with the DELEG RRtype are not authoritative on the parent side.
Thus, queries with DE=0 and QTYPE=DELEG MUST result in a legacy referral response.</t>
          </section>
          <section anchor="deleg-unaware-clients-with-deleg-rrs-present-but-no-ns-rrs">
            <name>DELEG-unaware Clients with DELEG RRs Present but No NS RRs</name>
            <t>DELEG-unaware clients might ask for a name which belongs to a zone delegated only with DELEG RRs (that is, without any NS RRs). Such zone is, by definition, not resolvable for DELEG-unaware clients. In this case the DELEG RR itself cannot create a zone cut, and the DELEG-aware authoritative server MUST return a legacy response.</t>
            <t>The legacy response might be confusing for subdomains of zones which actually exist because DELEG-aware clients would get a different answer, namely a delegation. Example of a legacy response is in <xref target="legacynxdomain"/>.</t>
            <t>The authoritative server is RECOMMENDED to supplement DELEG unaware response with Extended DNS Error "New Delegation Only".</t>
            <t>TODO: debate if WG wants to do explicit SERVFAIL for this case instead of 'just' EDE.</t>
          </section>
        </section>
        <section anchor="deleg-aware-clients">
          <name>DELEG-aware Clients</name>
          <t>When the client indicates that it is DELEG-aware by setting DE=1 in the query, DELEG-aware authoritative servers treat DELEG records as zone cuts, and the servers are authoritative on parent side of zone cut. This new zone cut has priority over legacy delegation with NS RRset.</t>
          <section anchor="deleg-aware-clients-requesting-qtypedeleg">
            <name>DELEG-aware Clients Requesting QTYPE=DELEG</name>
            <t>An explicit query for DELEG RR type at a delegation point behaves much like query for DS RR type: the server answers authortiatively from the parent zone. All previous specifications for special handling QTYPE=DS apply equally to QTYPE=DELEG. In summary, server either provides authoritative DELEG RRset or proves its non-existence.</t>
          </section>
          <section anchor="delegation-with-deleg">
            <name>Delegation with DELEG</name>
            <t>If the delegation has a DELEG RRset, the authoritative server MUST put the DELEG RRset into the Authority section of the referral. In this case, the server MUST NOT include the NS RRset into the Authority section. Presence of the covering RRSIG follows the normal DNSSEC specification for answers with authoritative zone data.</t>
            <t>Similarly, rules for DS RRset inclusion into referrals apply as specified by DNSSEC protocol.</t>
          </section>
          <section anchor="deleg-aware-clients-with-ns-rrs-present-but-no-deleg-rrs">
            <name>DELEG-aware Clients with NS RRs Present but No DELEG RRs</name>
            <t>If the delegation does not have a DELEG RRset, the authoritative server MUST put the NS RRset into the authority section of the referral. Absence of DELEG RRset must be proven as specified by DNSSEC protocol for authoritative data.</t>
            <t>Similarly, rules for DS RRset inclusion into referrals apply as specified by the DNSSEC protocol. Please note in practice the same process and records are used to prove non-existence of DELEG and DS RRsets.</t>
          </section>
        </section>
      </section>
      <section anchor="dnssec-signers">
        <name>DNSSEC Signers</name>
        <t>The DELEG record is authoritative on the parent side of a zone cut and needs to be signed as such. Existing rules from DNSSEC specification apply. In summary: For DNSSEC signing, treat DELEG RR type the same way as DS RR type.</t>
        <t>In order to protect validators from downgrade attacks this draft introduces a new DNSKEY flag ADT (Authoritative Delegation Types). In zones which contain a DELEG RRset this flag MUST be set to one in at least one DNSKEYs published in the zone.</t>
      </section>
      <section anchor="dnssec-validators">
        <name>DNSSEC Validators</name>
        <t>DELEG awareness introduces additional requirements on validators.</t>
        <section anchor="clarifications-on-nonexistence-proofs">
          <name>Clarifications on Nonexistence Proofs</name>
          <t>This document updates <xref target="RFC6840"/> section 4.1 to include "NS or DELEG" types in type bitmap as indication of a delegation point and generalizes applicability of Ancestor delegation proof to all types authoritative at parent (i.e. DS and DELEG). Updated text follows:</t>
          <t>An "ancestor delegation" NSEC RR (or NSEC3 RR) is one with:</t>
          <ul spacing="normal">
            <li>
              <t>the NS and/or DELEG bit set,</t>
            </li>
            <li>
              <t>the Start of Authority (SOA) bit clear, and</t>
            </li>
            <li>
              <t>a signer field that is shorter than the owner name of the NSEC RR,
or the original owner name for the NSEC3 RR.</t>
            </li>
          </ul>
          <t>Ancestor delegation NSEC or NSEC3 RRs MUST NOT be used to assume
nonexistence of any RRs below that zone cut, which include all RRs at
that (original) owner name other types authoritative at the parent-side of
zone cut (DS and DELEG), and all RRs below that owner name regardless of
type.</t>
        </section>
        <section anchor="insecure-delegation-proofs">
          <name>Insecure Delegation Proofs</name>
          <t>This document updates <xref target="RFC6840"/> section 4.4 to include secure DELEG support and explicitly states Opt-Out is not applicable to DELEG. Updated text follows:</t>
          <t>Section 5.2 of <xref target="RFC4035"/> specifies that a validator, when proving a
delegation is not secure, needs to check for the absence of the DS
and SOA bits in the NSEC (or NSEC3) type bitmap.  The validator also
MUST check for the presence of the NS or DELEG bit in the matching NSEC (or
NSEC3) RR (proving that there is, indeed, a delegation).
Alternately make sure that the delegation with NS record is covered by an NSEC3
RR with the Opt-Out flag set. Opt-Out is not applicable to DELEG RR type
because this it is authoritative at the parent side of a zone cut in the same
say as DS RR type.</t>
        </section>
        <section anchor="referral-downgrade-protection">
          <name>Referral downgrade protection</name>
          <t>When DNSKEY flag ADT is set to one, the DELEG aware validator MUST prove absence of a DELEG RRset in referral responses from this zone.</t>
          <t>Without this check, an attacker could strip DELEG RRset from a referral response and replace it with an unsigned (and potentially malicious) NS RRset. A referral response with an unsigned NS and signed DS RRsets does not require additional proofs of nonexistance according to pre-DELEG DNSSEC specification and it would have been accepted as a delegation without DELEG RRset.</t>
        </section>
        <section anchor="chaining">
          <name>Chaining</name>
          <t>A Validating Stub Resolver that is DELEG aware has to use a Security-Aware Resolver that is DELEG aware and if it is behind a forwarder this has to be security and DELEG aware as well.</t>
        </section>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to allocate the DELEG RR in the Resource Record (RR) TYPEs registry, with the meaning of "enhanced delegation information" and referencing this document.</t>
      <t>IANA is requested to assign a new bit in the DNSKEY RR Flags registry (<xref target="RFC4034"/>) for the ADT bit (N), with the description "Authoritative Delegation Types" and referencing this document. For compatibility reasons we request the bit 14 to be used. This value has been proven to work whereas bit 0 was proven to break in practical deployments (because of bugs).</t>
      <t>IANA is requested to assign a bit from the EDNS Header Flags registry (<xref target="RFC6891"/>), with the abbreviation DE, the description "DELEG enabled" and referencing this document.</t>
      <t>IANA is requested to assign a value from the Extended DNS Error Codes (<xref target="RFC8914"/>), with the Purpose "New Delegation Only" and referencing this document.</t>
      <t>For the RDATA parameters to a DELEG RR, the DNS Service Bindings (SVCB) registry (<xref target="RFC9460"/>) is used.  This document requests no new assignments to that registry, though it is expected that future DELEG work will.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <referencegroup anchor="STD13" target="https://www.rfc-editor.org/info/std13">
          <reference anchor="RFC1034" target="https://www.rfc-editor.org/info/rfc1034">
            <front>
              <title>Domain names - concepts and facilities</title>
              <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
              <date month="November" year="1987"/>
              <abstract>
                <t>This RFC is the revised basic definition of The Domain Name System. It obsoletes RFC-882. This memo describes the domain style names and their used for host address look up and electronic mail forwarding. It discusses the clients and servers in the domain name system and the protocol used between them.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="13"/>
            <seriesInfo name="RFC" value="1034"/>
            <seriesInfo name="DOI" value="10.17487/RFC1034"/>
          </reference>
          <reference anchor="RFC1035" target="https://www.rfc-editor.org/info/rfc1035">
            <front>
              <title>Domain names - implementation and specification</title>
              <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
              <date month="November" year="1987"/>
              <abstract>
                <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="13"/>
            <seriesInfo name="RFC" value="1035"/>
            <seriesInfo name="DOI" value="10.17487/RFC1035"/>
          </reference>
        </referencegroup>
        <reference anchor="RFC9460">
          <front>
            <title>Service Binding and Parameter Specification via the DNS (SVCB and HTTPS Resource Records)</title>
            <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
            <author fullname="M. Bishop" initials="M." surname="Bishop"/>
            <author fullname="E. Nygren" initials="E." surname="Nygren"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies the "SVCB" ("Service Binding") and "HTTPS" DNS resource record (RR) types to facilitate the lookup of information needed to make connections to network services, such as for HTTP origins. SVCB records allow a service to be provided from multiple alternative endpoints, each with associated parameters (such as transport protocol configuration), and are extensible to support future uses (such as keys for encrypting the TLS ClientHello). They also enable aliasing of apex domains, which is not possible with CNAME. The HTTPS RR is a variation of SVCB for use with HTTP (see RFC 9110, "HTTP Semantics"). By providing more information to the client before it attempts to establish a connection, these records offer potential benefits to both performance and privacy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9460"/>
          <seriesInfo name="DOI" value="10.17487/RFC9460"/>
        </reference>
        <reference anchor="RFC4035">
          <front>
            <title>Protocol Modifications for the DNS Security Extensions</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of new resource records and protocol modifications that add data origin authentication and data integrity to the DNS. This document describes the DNSSEC protocol modifications. This document defines the concept of a signed zone, along with the requirements for serving and resolving by using DNSSEC. These techniques allow a security-aware resolver to authenticate both DNS resource records and authoritative DNS error indications.</t>
              <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4035"/>
          <seriesInfo name="DOI" value="10.17487/RFC4035"/>
        </reference>
        <reference anchor="RFC6672">
          <front>
            <title>DNAME Redirection in the DNS</title>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <author fullname="W. Wijngaards" initials="W." surname="Wijngaards"/>
            <date month="June" year="2012"/>
            <abstract>
              <t>The DNAME record provides redirection for a subtree of the domain name tree in the DNS. That is, all names that end with a particular suffix are redirected to another part of the DNS. This document obsoletes the original specification in RFC 2672 as well as updates the document on representing IPv6 addresses in DNS (RFC 3363). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6672"/>
          <seriesInfo name="DOI" value="10.17487/RFC6672"/>
        </reference>
        <reference anchor="RFC6840">
          <front>
            <title>Clarifications and Implementation Notes for DNS Security (DNSSEC)</title>
            <author fullname="S. Weiler" initials="S." role="editor" surname="Weiler"/>
            <author fullname="D. Blacka" initials="D." role="editor" surname="Blacka"/>
            <date month="February" year="2013"/>
            <abstract>
              <t>This document is a collection of technical clarifications to the DNS Security (DNSSEC) document set. It is meant to serve as a resource to implementors as well as a collection of DNSSEC errata that existed at the time of writing.</t>
              <t>This document updates the core DNSSEC documents (RFC 4033, RFC 4034, and RFC 4035) as well as the NSEC3 specification (RFC 5155). It also defines NSEC3 and SHA-2 (RFC 4509 and RFC 5702) as core parts of the DNSSEC specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6840"/>
          <seriesInfo name="DOI" value="10.17487/RFC6840"/>
        </reference>
        <reference anchor="RFC4034">
          <front>
            <title>Resource Records for the DNS Security Extensions</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of resource records and protocol modifications that provide source authentication for the DNS. This document defines the public key (DNSKEY), delegation signer (DS), resource record digital signature (RRSIG), and authenticated denial of existence (NSEC) resource records. The purpose and format of each resource record is described in detail, and an example of each resource record is given.</t>
              <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4034"/>
          <seriesInfo name="DOI" value="10.17487/RFC4034"/>
        </reference>
        <reference anchor="RFC6891">
          <front>
            <title>Extension Mechanisms for DNS (EDNS(0))</title>
            <author fullname="J. Damas" initials="J." surname="Damas"/>
            <author fullname="M. Graff" initials="M." surname="Graff"/>
            <author fullname="P. Vixie" initials="P." surname="Vixie"/>
            <date month="April" year="2013"/>
            <abstract>
              <t>The Domain Name System's wire protocol includes a number of fixed fields whose range has been or soon will be exhausted and does not allow requestors to advertise their capabilities to responders. This document describes backward-compatible mechanisms for allowing the protocol to grow.</t>
              <t>This document updates the Extension Mechanisms for DNS (EDNS(0)) specification (and obsoletes RFC 2671) based on feedback from deployment experience in several implementations. It also obsoletes RFC 2673 ("Binary Labels in the Domain Name System") and adds considerations on the use of extended labels in the DNS.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="75"/>
          <seriesInfo name="RFC" value="6891"/>
          <seriesInfo name="DOI" value="10.17487/RFC6891"/>
        </reference>
        <reference anchor="RFC8914">
          <front>
            <title>Extended DNS Errors</title>
            <author fullname="W. Kumari" initials="W." surname="Kumari"/>
            <author fullname="E. Hunt" initials="E." surname="Hunt"/>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="W. Hardaker" initials="W." surname="Hardaker"/>
            <author fullname="D. Lawrence" initials="D." surname="Lawrence"/>
            <date month="October" year="2020"/>
            <abstract>
              <t>This document defines an extensible method to return additional information about the cause of DNS errors. Though created primarily to extend SERVFAIL to provide additional information about the cause of DNS and DNSSEC failures, the Extended DNS Errors option defined in this document allows all response types to contain extended error information. Extended DNS Error information does not change the processing of RCODEs.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8914"/>
          <seriesInfo name="DOI" value="10.17487/RFC8914"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <referencegroup anchor="BCP219" target="https://www.rfc-editor.org/info/bcp219">
          <reference anchor="RFC9499" target="https://www.rfc-editor.org/info/rfc9499">
            <front>
              <title>DNS Terminology</title>
              <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
              <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
              <date month="March" year="2024"/>
              <abstract>
                <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
                <t>This document updates RFC 2308 by clarifying the definitions of "forwarder" and "QNAME". It obsoletes RFC 8499 by adding multiple terms and clarifications. Comprehensive lists of changed and new definitions can be found in Appendices A and B.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="219"/>
            <seriesInfo name="RFC" value="9499"/>
            <seriesInfo name="DOI" value="10.17487/RFC9499"/>
          </reference>
        </referencegroup>
        <reference anchor="I-D.tapril-ns2">
          <front>
            <title>Parameterized Nameserver Delegation with NS2 and NS2T</title>
            <author fullname="Tim April" initials="T." surname="April">
              <organization>Akamai Technologies</organization>
            </author>
            <date day="13" month="July" year="2020"/>
            <abstract>
              <t>   Within the DNS, there is no mechanism for authoritative servers to
   advertise which transport methods they are capable of.  If secure
   transport methods are adopted by authoritative operators, transport
   signaling would be required to negotiate how authoritative servers
   would be contacted by resolvers.  This document provides two new
   Resource Record Types, NS2 and NS2T, to facilitate this negotiation
   by allowing zone owners to signal how the authoritative nameserver(s)
   for their zone(s) may accept queries.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-tapril-ns2-01"/>
        </reference>
      </references>
    </references>
    <?line 380?>

<section anchor="examples">
      <name>Examples</name>
      <t>The following example shows an excerpt from a signed root zone. It shows the delegation point for "example." and "test."</t>
      <t>The "example." delegation has DELEG and NS records. The "test." delegation has DELEG but no NS records.</t>
      <artwork><![CDATA[
example.   300 IN DELEG DIRECT a.example. Glue4=192.0.2.1 (
                        Glue6=2001:DB8::1 )
example.   300 IN DELEG INCLUDE ns2.example.net.
example.   300 IN DELEG INCLUDE ns3.example.org.
example.   300 IN RRSIG DELEG 13 4 300 20250214164848 (
                        20250207134348 21261 . HyDHYVT5KcqWc7J..= )
example.   300 IN NS    a.example.
example.   300 IN NS    b.example.net.
example.   300 IN NS    c.example.org.
example.   300 IN DS    65163 13 2 5F86F2F3AE2B02...
example.   300 IN RRSIG DS 13 4 300 20250214164848 (
                        20250207134348 21261 . O0k558jHhyrC21J..= )
example.   300 IN NSEC  a.example. NS DS RRSIG NSEC DELEG
example.   300 IN RRSIG NSEC 13 4 300 20250214164848 (
                        20250207134348 21261 . 1Kl8vab96gG21Aa..= )
a.example. 300 IN A     192.0.2.1
a.example. 300 IN AAAA  2001:DB8::1
]]></artwork>
      <t>The "test." delegation point has a DELEG record and no NS record.</t>
      <artwork><![CDATA[
test.      300 IN DELEG INCLUDE ns2.example.net
test.      300 IN RRSIG DELEG 13 4 300 20250214164848 (
                        20250207134348 21261 . 98Aac9f7A1Ac26Q..= )
test.      300 IN NSEC  a.test. RRSIG NSEC DELEG
test.      300 IN RRSIG NSEC 13 4 300  20250214164848 (
                        20250207134348 21261 . kj7YY5tr9h7UqlK..= )
]]></artwork>
      <section anchor="responses">
        <name>Responses</name>
        <t>The following sections show referral examples:</t>
      </section>
      <section anchor="do-bit-clear-de-bit-clear">
        <name>DO bit clear, DE bit clear</name>
        <section anchor="query-for-fooexample">
          <name>Query for foo.example</name>
          <t>;; Header: QR RCODE=0
;;</t>
          <t>;; Question
foo.example.  IN MX</t>
          <t>;; Answer
;; (empty)</t>
          <t>;; Authority
example.   300 IN NS    a.example.
example.   300 IN NS    b.example.net.
example.   300 IN NS    c.example.org.</t>
          <t>;; Additional
a.example. 300 IN A     192.0.2.1
a.example. 300 IN AAAA  2001:DB8::1</t>
        </section>
        <section anchor="query-for-footest">
          <name>Query for foo.test</name>
          <t>;; Header: QR AA RCODE=3
;;</t>
          <t>;; Question
foo.test.   IN MX</t>
          <t>;; Answer
;; (empty)</t>
          <t>;; Authority
.   300 IN SOA ...</t>
          <t>;; Additional
;; OPT with Extended DNS Error: New Delegation Only</t>
        </section>
      </section>
      <section anchor="do-bit-set-de-bit-clear">
        <name>DO bit set, DE bit clear</name>
        <section anchor="query-for-fooexample-1">
          <name>Query for foo.example</name>
          <artwork><![CDATA[
;; Header: QR DO RCODE=0
;;

;; Question
foo.example.   IN MX

;; Answer
;; (empty)

;; Authority

example.   300 IN NS    a.example.
example.   300 IN NS    b.example.net.
example.   300 IN NS    c.example.org.
example.   300 IN DS    65163 13 2 5F86F2F3AE2B02...
example.   300 IN RRSIG DS 13 4 300 20250214164848 (
                        20250207134348 21261 . O0k558jHhyrC21J..= )
;; Additional
a.example. 300 IN A     192.0.2.1
a.example. 300 IN AAAA  2001:DB8::1
]]></artwork>
        </section>
        <section anchor="legacynxdomain">
          <name>Query for foo.test</name>
          <artwork><![CDATA[
;; Header: QR DO AA RCODE=3
;;

;; Question
foo.test.      IN MX

;; Answer
;; (empty)

;; Authority
.          300 IN SOA ...
.          300 IN RRSIG SOA ...
.          300 IN NSEC  aaa NS SOA RRSIG NSEC DNSKEY ZONEMD
.          300 IN RRSIG NSEC 13 4 300
test.      300 IN NSEC  a.test. RRSIG NSEC DELEG
test.      300 IN RRSIG NSEC 13 4 300  20250214164848 (
                        20250207134348 21261 . aBFYask;djf7UqlK..= )

;; Additional
;; OPT with Extended DNS Error: New Delegation Only
]]></artwork>
        </section>
      </section>
      <section anchor="do-bit-clear-de-bit-set">
        <name>DO bit clear, DE bit set</name>
        <section anchor="query-for-fooexample-2">
          <name>Query for foo.example</name>
          <artwork><![CDATA[
;; Header: QR DE RCODE=0
;;

;; Question
foo.example.  IN MX

;; Answer
;; (empty)

;; Authority
example.   300 IN DELEG DIRECT a.example. Glue4=192.0.2.1 (
                        Glue6=2001:DB8::1 )
example.   300 IN DELEG INCLUDE ns2.example.net.
example.   300 IN DELEG INCLUDE ns3.example.org.

;; Additional
;; (empty)
]]></artwork>
        </section>
        <section anchor="query-for-footest-1">
          <name>Query for foo.test</name>
          <artwork><![CDATA[
;; Header: QR AA RCODE=0
;;

;; Question
foo.test.   IN MX

;; Answer
;; (empty)

;; Authority
test.      300 IN DELEG INCLUDE ns2.example.net

;; Additional
;; (empty)
]]></artwork>
        </section>
      </section>
      <section anchor="do-bit-set-de-bit-set">
        <name>DO bit set, DE bit set</name>
        <section anchor="query-for-fooexample-3">
          <name>Query for foo.example</name>
          <artwork><![CDATA[
;; Header: QR DO DE RCODE=0
;;

;; Question
foo.example.  IN MX

;; Answer
;; (empty)

;; Authority

example.   300 IN DELEG DIRECT a.example. Glue4=192.0.2.1 (
                        Glue6=2001:DB8::1 )
example.   300 IN DELEG INCLUDE ns2.example.net.
example.   300 IN DELEG INCLUDE ns3.example.org.
example.   300 IN RRSIG DELEG 13 4 300 20250214164848 (
                        20250207134348 21261 . HyDHYVT5KcqWc7J..= )
example.   300 IN DS    65163 13 2 5F86F2F3AE2B02...
example.   300 IN RRSIG DS 13 4 300 20250214164848 (
                        20250207134348 21261 . O0k558jHhyrC21J..= )

;; Additional
a.example. 300 IN A     192.0.2.1
a.example. 300 IN AAAA  2001:DB8::1
]]></artwork>
        </section>
        <section anchor="query-for-footest-2">
          <name>Query for foo.test</name>
          <artwork><![CDATA[
;; Header: QR DO DE AA RCODE=0
;;

;; Question
foo.test.      IN MX

;; Answer
;; (empty)

;; Authority
test.      300 IN DELEG INCLUDE ns2.example.net.
test.      300 IN RRSIG DELEG 13 4 300 20250214164848 (
                        20250207134348 21261 . 98Aac9f7A1Ac26Q..= )
test.      300 IN NSEC  a.test. RRSIG NSEC DELEG
test.      300 IN RRSIG NSEC 13 4 300  20250214164848 (
                        20250207134348 21261 . kj7YY5tr9h7UqlK..= )

;; Additional
;; (empty)
]]></artwork>
        </section>
      </section>
    </section>
    <section anchor="acknowledgments-unnumbered">
      <name>Acknowledgments {:unnumbered}</name>
      <t>This document is heavily based on past work done by Tim April in
<xref target="I-D.tapril-ns2"/> and thus extends the thanks to the people helping on this which are:
John Levine, Erik Nygren, Jon Reed, Ben Kaduk, Mashooq Muhaimen, Jason Moreau, Jerrod Wiesman, Billy Tiemann, Gordon Marx and Brian Wellington.</t>
    </section>
    <section anchor="todo">
      <name>TODO</name>
      <dl>
        <dt>RFC EDITOR:</dt>
        <dd>
          <t>PLEASE REMOVE THE THIS SECTION PRIOR TO PUBLICATION.</t>
        </dd>
      </dl>
      <ul spacing="normal">
        <li>
          <t>Write a security considerations section</t>
        </li>
        <li>
          <t>Change the parameters form temporary to permanent once IANA assigned. Temporary use:
          </t>
          <ul spacing="normal">
            <li>
              <t>DELEG QType code is 65432</t>
            </li>
            <li>
              <t>DELEG EDNS Flag Bit is 3</t>
            </li>
            <li>
              <t>DELEG DNSKEY Flag Bit is 0</t>
            </li>
          </ul>
        </li>
      </ul>
    </section>
    <section anchor="change-log">
      <name>Change Log</name>
      <dl>
        <dt>RFC EDITOR:</dt>
        <dd>
          <t>PLEASE REMOVE THE THIS SECTION PRIOR TO PUBLICATION.</t>
        </dd>
      </dl>
      <section anchor="since-draft-wesplaap-deleg-00">
        <name>since draft-wesplaap-deleg-00</name>
        <ul spacing="normal">
          <li>
            <t>Clarified SVCB priority behavior</t>
          </li>
          <li>
            <t>Added section on differences to draft-homburg-deleg-incremental-deleg</t>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-wesplaap-deleg-01">
        <name>since draft-wesplaap-deleg-01</name>
        <ul spacing="normal">
          <li>
            <t>Reorganised and streamlined the draft to the bare minimum for DELEG as an NS replacement</t>
          </li>
          <li>
            <t>Defined codepoints for temporary testing</t>
          </li>
          <li>
            <t>Added examples</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="C." surname="Elmerot" fullname="Christian Elmerot">
        <organization>Cloudflare</organization>
        <address>
          <email>christian@elmerot.se</email>
        </address>
      </contact>
      <contact initials="E." surname="Lewis" fullname="Edward Lewis">
        <organization>ICANN</organization>
        <address>
          <email>edward.lewis@icann.org</email>
        </address>
      </contact>
      <contact initials="R." surname="Arends" fullname="Roy Arends">
        <organization>ICANN</organization>
        <address>
          <email>roy.arends@icann.org</email>
        </address>
      </contact>
      <contact initials="S." surname="Huque" fullname="Shumon Huque">
        <organization>Salesforce</organization>
        <address>
          <email>shuque@gmail.com</email>
        </address>
      </contact>
      <contact initials="K." surname="Darilion" fullname="Klaus Darilion">
        <organization>nic.at</organization>
        <address>
          <email>klaus.darilion@nic.at</email>
        </address>
      </contact>
      <contact initials="L." surname="Peltan" fullname="Libor Peltan">
        <organization>CZ.nic</organization>
        <address>
          <email>libor.peltan@nic.cz</email>
        </address>
      </contact>
      <contact initials="V." surname="Čunát" fullname="Vladimír Čunát">
        <organization>CZ.nic</organization>
        <address>
          <email>vladimir.cunat@nic.cz</email>
        </address>
      </contact>
      <contact initials="S." surname="Kerr" fullname="Shane Kerr">
        <organization>NS1</organization>
        <address>
          <email>shane@time-travellers.org</email>
        </address>
      </contact>
      <contact initials="D." surname="Blacka" fullname="David Blacka">
        <organization>Verisign</organization>
        <address>
          <email>davidb@verisign.com</email>
        </address>
      </contact>
      <contact initials="G." surname="Michaelson" fullname="George Michaelson">
        <organization>APNIC</organization>
        <address>
          <email>ggm@algebras.org</email>
        </address>
      </contact>
      <contact initials="B." surname="Schwartz" fullname="Ben Schwartz">
        <organization>Meta</organization>
        <address>
          <email>bemasc@meta.com</email>
        </address>
      </contact>
      <contact initials="J." surname="Včelák" fullname="Jan Včelák">
        <organization>NS1</organization>
        <address>
          <email>jvcelak@ns1.com</email>
        </address>
      </contact>
      <contact initials="P. van" surname="Dijk" fullname="Peter van Dijk">
        <organization>PowerDNS</organization>
        <address>
          <email>peter.van.dijk@powerdns.com</email>
        </address>
      </contact>
      <contact initials="P." surname="Homburg" fullname="Philip Homburg">
        <organization>NLnet Labs</organization>
        <address>
          <email>philip@nlnetlabs.nl</email>
        </address>
      </contact>
      <contact initials="E." surname="Nygren" fullname="Erik Nygren">
        <organization>Akamai Technologies</organization>
        <address>
          <email>erik+ietf@nygren.org</email>
        </address>
      </contact>
      <contact initials="V." surname="Adhvaryu" fullname="Vandan Adhvaryu">
        <organization>Team Internet</organization>
        <address>
          <email>vandan@adhvaryu.uk</email>
        </address>
      </contact>
      <contact initials="M." surname="Bretelle" fullname="Manu Bretelle">
        <organization>Meta</organization>
        <address>
          <email>chantr4@gmail.com</email>
        </address>
      </contact>
      <contact initials="B." surname="Halley" fullname="Bob Halley">
        <organization>Cloudflare</organization>
        <address>
          <email>bhalley@cloudflare.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
