<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.7) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-fujiwara-dnsop-dns-upper-limit-values-03" category="bcp" consensus="true" submissionType="IETF" tocDepth="4" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="dns-upper-limit-values">Upper limit values for DNS</title>

    <author initials="K." surname="Fujiwara" fullname="Kazunori Fujiwara">
      <organization abbrev="JPRS">Japan Registry Services Co., Ltd.</organization>
      <address>
        <postal>
          <country>Japan</country>
        </postal>
        <email>fujiwara@wide.ad.jp</email>
      </address>
    </author>

    <date year="2025" month="July" day="04"/>

    <area>operations</area>
    
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 99?>

<t>DNS was designed to have as few hard upper limits
as possible to allow for future extensibility.
However, the lack of a clear upper limit leads to vulnerabilities,
and several attack methods have been reported.
This document proposes reasonable upper-limit values for DNS protocols
as a Best Current Practice.</t>



    </abstract>



  </front>

  <middle>


<?line 108?>

<section anchor="introduction"><name>Introduction</name>

<t>There are parameters in the DNS protocol that do not have clear upper limits.
For example, the number of alias levels using CNAME Resource records
and the number of resource records in an RRSet.</t>

<t>If a protocol is implemented without considering the upper limit,
it may become vulnerable to DoS attacks,
and several attack methods have been proposed.</t>

<t>This document introduces some upper limits to the DNS protocol
as a best current practice,
to allow secure use of the DNS while preserving the flexibility
that the DNS protocol was designed to provide.</t>

</section>
<section anchor="terminology"><name>Terminology</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

<t>The specialized terms used in this document are defined in
DNS Terminology <xref target="RFC9499"/>.</t>

<t>Gluelessness is the term used to describe delegation without glue.</t>

</section>
<section anchor="background"><name>Background</name>

<t>DNS was designed to have as few upper limits
as possible to allow for future extensibility
described in 
the paper "Development of the Domain Name System" <xref target="Mockapetris1988"/>.</t>

<t>If a protocol is implemented without considering the upper limit,
it may become vulnerable to DoS attacks.</t>

<t><xref target="RFC5358"/> describes DNS Reflector Attacks and how to prevent
the use of default configured recursive nameservers.
Simply preparing a large RRSet can increase the amplification factor
of DNS Reflector Attacks.
Countermeasures for recursive resolvers were described in <xref target="RFC5358"/>,
however, countermeasures for authoritative servers have not been standardized
as an RFC and are implemented in various software as DNS Response Rate Limiting.</t>

<t>In recent years, DNS vulnerabilities research have been actively progressed
and many vulnerabilities have been made public.
Each time a vulnerability is discovered,
upper limits on the execution time, number of attempts, and size
are added to DNS software implementations.</t>

<t>CNAME aliases are widely used; however,
when there are multiple levels of CNAME aliases,
full-service resolvers have to redo the name resolution,
which increases the load.
And more,
each stub resolver that receives a response containing multiple CNAME aliases
must find the final A, AAAA Resource record
that corresponds to the CNAME in each application.
Unbound and BIND 9 introduced 'max-query-restarts' parameter,
and the default is 11.
(Hard limit on the number of times
Unbound is allowed to restart a query upon encountering a CNAME record.)</t>

<t>Currently, many web services that use domain names require that
a TXT record containing a token of their choosing be placed
at the zone apex to verify the registrant domain name.
A large enterprise set 74 TXT records at its zone apex.</t>

<t>CVE-2024-1737, "BIND's database will be slow if a very large number of RRs
exist at the same name" was reported, and BIND 9.18.28 implemented the limit.
BIND 9 introduced 'max-records-per-type' parameter
that limits the number of resource records in an RRSet, and the default is 100.</t>

<t>KeyTrap <xref target="KeyTrap"></xref> is a vulnerability caused by the fact that
there is no upper limit on the number of
DNSKEY, DS, or RRSIG resource records.
Unbound introduced the maximum number of RRSIG validations for an
RRset (MAX_VALIDATE_RRSIGS) as 8, and the maximum allowed digest
match failures per DS, for DNSKEYs with the same properties
(MAX_DS_MATCH_FAILURES) as 4.</t>

</section>
<section anchor="problem-statement"><name>Problem Statement</name>

<t>DNS was designed to have as few upper limits
as possible to allow for future extensibility.
However, in reality, DoS attacks using large responses
and the use of excessively long CNAME chains has been reported,
and resource-wasting attacks using many DNSKEY/DS/RRSIG combinations
have been reported.</t>

<t>To mitigate these attacks,
it is possible to set realistic upper limits on some parameters,
and to cause a name resolution error if those limits are exceeded.</t>

<t>In order to avoid breaking existing mechanisms,
widely used values should not be treated as errors.</t>

<t>Secondary authoritative servers simply provide copies from the primary servers,
so they should not cause errors due to the upper limit.</t>

<t>Primary authoritative servers are expected to report errors when they
read zone files, or receive dynamic updates
that contains RRsets that exceed the upper limit.</t>

<t>Full-service resolvers may prevent malfunction by treating a name
resolution error as responses from authoritative servers that exceed
the upper limit.</t>

<t>Since restrictions due to datagram size are possible,
it seems reasonable to propose an upper limit on data size, etc.,
as a best current practice.</t>

<t>Best Current Practice documents should allow for values
that are currently in widespread use.
However, apparent anomalies may be excluded.</t>

<t>It is desirable to determine the upper limit values
by conducting extensive measurements on the Internet
and excluding obvious errors or malicious errors,
and to set the value that has the least impact.</t>

</section>
<section anchor="possible-upper-limits"><name>Possible upper limits</name>

<section anchor="items"><name>Possible upper limit items</name>

<t><list style="symbols">
  <t>Packet size</t>
  <t>Number of Resource Records in a RRSet</t>
  <t>Number of NS Resource Records in a delegation</t>
  <t>Number of DS Resource Records in a delegation</t>
  <t>Number of glue RRs in a delegation</t>
  <t>Number of DNSKEY Resource Records in a DNSKEY RRSet</t>
  <t>Number of RRSIG RRs for each name and type</t>
  <t>Number of levels of gluelessness delegations</t>
  <t>Number of alias levels using CNAME Resource records</t>
</list></t>

</section>
<section anchor="packet-size"><name>Packet size</name>

<t>There were comments that there are size limitations
even if there are no precise upper limits are set.</t>

<t>The DNS packet format has an upper limit of 65535 octets,
so an RRset cannot exceed that size.
Also, the upper limit size of a single resource record is 65535 octets
minus DNS header size because RDLENGTH is 16 bits.</t>

<t>Section 4.2.1 UDP usage of <xref target="RFC1035"/> limits the UDP message size to 512.</t>

<t>The size of a DNS response that can be sent using unfragmented UDP is
about 1400 octets. <xref target="RFC9715"/></t>

<t>The size 65535 is large,
and attackers use this upper limit to carry out resource-wasting attacks.</t>

</section>
<section anchor="number-of-resource-records-in-a-rrset"><name>Number of Resource Records in a RRSet</name>

<t>Since there are 13 root name servers and 13 name servers for com and net TLDs,
the maximum number of NS RR in an NS RRSet should be larger than or equal to 13.</t>

<t>Since there are 13 name servers for root, com, net
and they have both IPv4 and IPv6 addresses,
26 glue records in a delegation should be allowed.</t>

<t>Although we could not find a clear explanation,
the upper limit value of the number of name server names
that can be registered for gTLDs and ccTLDs is 13.
Therefore, the practical upper limit for the number of name servers is 13.</t>

<t>In recent years, there have been cases where
many TXT resource records have been set at the zone apex.
Many services seem to request their designated authentication tokens
written as TXT records at the zone apex to verify domain name registrants.
However, there seem to be cases where authentication tokens are only added,
as there seems to be no procedure for deleting them once they have been set.
It is necessary to standardize and deploy
<xref target="I-D.ietf-dnsop-domain-verification-techniques"/>,
and to write TXT records not at the zone apex,
but application-specific undercore prefix labels.</t>

<t>The number of zone apex TXT records will have to remain as is
until <xref target="I-D.ietf-dnsop-domain-verification-techniques"/> will be standardized,
and the upper limit of the number of resource records in an RRSet
may be 100, as the BIND 9 limits by default.</t>

</section>
<section anchor="number-of-alias-levels-using-cnamedname"><name>Number of alias levels using CNAME/DNAME</name>

<t>Many resolver implementations can resolve over 10 CNAME aliases.
Unbound and BIND 9 introduced 'max-query-restarts' parameter,
and the default is 11.</t>

<t>Each application interprets complex CNAME chains.
To avoid complexity in applications,
it is recommended to use as few CNAME chains as possible.</t>

<t>A maximum of 9 CNAME chains were observed for the top 1 million
popular domain names and domain names observed by a university's resolvers.
Therefore, a realistic upper limit for CNAME chains is thought to be 9 or 11.</t>

</section>
<section anchor="number-of-rrsigsdnskeysdss-in-a-rrset"><name>Number of RRSIGs/DNSKEYs/DSs in a RRSet</name>

<t>KeyTrap <xref target="KeyTrap"></xref> is a vulnerability caused by the fact that
there is no upper limit on the number of DNSKEY, DS, or RRSIG resource records.
If there were upper limits on these, the damage could be mitigated.</t>

<t>Unbound introduced the maximum number of RRSIG validations for an
RRset (MAX_VALIDATE_RRSIGS) as 8.</t>

<t>There are no good values to base the number of
DS resource records or DNSKEY resource records,
but having 8 DS records and 8 DNSKEY resource records 
 will be sufficient to handle key rollovers and multi-signers.</t>

</section>
<section anchor="number-of-delegation-levels-of-gluelessness-delegations"><name>Number of delegation levels of gluelessness delegations</name>

<t><xref target="RFC9471"/> states that all in-domain glue records are attached to
the delegation response.
Therefore, using in-domain name server names for DNS delegation
minimizes name resolution costs.</t>

<t>Unrelated (or, rarely sibling) name server names are used/required for
DNS hosting services.</t>

<t>However, using unrelated name server names increases the name resolution costs
and may increase the likelihood of name resolution errors.</t>

<t>For some domain names, there are multiple layers of dependence
on unrelated name server names when resolving the name.
If information on unrelated name server names is not in the cache,
the recursive resolver must perform A/AAAA name resolution
for the unrelated name server names.
Frequent use of unrelated name server names can cause unstable name resolution.</t>

<t>Furthermore, there are cases where cyclic dependencies in delegation occur,
settings that depend on sibling glue,
and cases where the sibling glue disappears or
some name servers stop responding, making it impossible to resolve names.</t>

<t><xref target="Tsuname2021"/> pointed out attacks and countermeasures that
use increased load due to cyclic dependencies.
Many cyclic delegations are likely due to misconfigurations.</t>

<t><xref target="djbdns"/> allows three levels of gluelessness.</t>

<t>To avoid complex name resolutions and misconfigurations,
it is better to avoid using unrelated name server names as much as possible.</t>

<t>Unrelated name server names <bcp14>SHOULD</bcp14> be hosted by a domain name 
with at least one in-domain name server name.
In other words, DNS providers <bcp14>SHOULD</bcp14> have at least one in-domain nameserver
for their domain names.</t>

</section>
</section>
<section anchor="RecommendationResolver"><name>Recommendation of DNS upper limit values</name>

<texttable>
      <ttcol align='left'>Name</ttcol>
      <ttcol align='left'>upper limit</ttcol>
      <c>number of RRs in an RRSet</c>
      <c>100</c>
      <c>number of NS RRs in a delegation</c>
      <c>13</c>
      <c>number of glue RRs in a delegation</c>
      <c>26</c>
      <c>number of DS RRs in a delegation</c>
      <c>8</c>
      <c>number of DNSKEY RRs in an RRSet</c>
      <c>8</c>
      <c>number of RRSIG RRs for each name and type</c>
      <c>8</c>
      <c>number of CNAME/DNAME chains</c>
      <c>9</c>
      <c>number of levels of gluelessness delegations</c>
      <c>3</c>
</texttable>

<t>DNS software is expected to make these items configurable parameters
that operators can control.</t>

<t>Recursive resolvers <bcp14>SHOULD</bcp14> respond with a name resolution error
(Server Failure) with Extended DNS Errors <xref target="RFC8914"/>
if it receives a response from an authoritative server
that exceeds the upper limit value.</t>

<t>Primary authoritative servers <bcp14>SHOULD</bcp14> be in an error state if they find
RRSets that exceed the hard limits when they load zone files, receive
zone data by zone transfers, or receive DNS Updates.</t>

</section>
<section anchor="iana"><name>IANA Considerations</name>
<t>This document requests no IANA actions.</t>

</section>
<section anchor="securitycons"><name>Security Considerations</name>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>

<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>

<reference anchor="RFC9499">
  <front>
    <title>DNS Terminology</title>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
    <date month="March" year="2024"/>
    <abstract>
      <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
      <t>This document updates RFC 2308 by clarifying the definitions of "forwarder" and "QNAME". It obsoletes RFC 8499 by adding multiple terms and clarifications. Comprehensive lists of changed and new definitions can be found in Appendices A and B.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="219"/>
  <seriesInfo name="RFC" value="9499"/>
  <seriesInfo name="DOI" value="10.17487/RFC9499"/>
</reference>

<reference anchor="RFC5358">
  <front>
    <title>Preventing Use of Recursive Nameservers in Reflector Attacks</title>
    <author fullname="J. Damas" initials="J." surname="Damas"/>
    <author fullname="F. Neves" initials="F." surname="Neves"/>
    <date month="October" year="2008"/>
    <abstract>
      <t>This document describes ways to prevent the use of default configured recursive nameservers as reflectors in Denial of Service (DoS) attacks. It provides recommended configuration as measures to mitigate the attack. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="140"/>
  <seriesInfo name="RFC" value="5358"/>
  <seriesInfo name="DOI" value="10.17487/RFC5358"/>
</reference>

<reference anchor="RFC1035">
  <front>
    <title>Domain names - implementation and specification</title>
    <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
    <date month="November" year="1987"/>
    <abstract>
      <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="13"/>
  <seriesInfo name="RFC" value="1035"/>
  <seriesInfo name="DOI" value="10.17487/RFC1035"/>
</reference>

<reference anchor="RFC9471">
  <front>
    <title>DNS Glue Requirements in Referral Responses</title>
    <author fullname="M. Andrews" initials="M." surname="Andrews"/>
    <author fullname="S. Huque" initials="S." surname="Huque"/>
    <author fullname="P. Wouters" initials="P." surname="Wouters"/>
    <author fullname="D. Wessels" initials="D." surname="Wessels"/>
    <date month="September" year="2023"/>
    <abstract>
      <t>The DNS uses glue records to allow iterative clients to find the addresses of name servers that are contained within a delegated zone. Authoritative servers are expected to return all available glue records for in-domain name servers in a referral response. If message size constraints prevent the inclusion of all glue records for in-domain name servers, the server must set the TC (Truncated) flag to inform the client that the response is incomplete and that the client should use another transport to retrieve the full response. This document updates RFC 1034 to clarify correct server behavior.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9471"/>
  <seriesInfo name="DOI" value="10.17487/RFC9471"/>
</reference>

<reference anchor="RFC8914">
  <front>
    <title>Extended DNS Errors</title>
    <author fullname="W. Kumari" initials="W." surname="Kumari"/>
    <author fullname="E. Hunt" initials="E." surname="Hunt"/>
    <author fullname="R. Arends" initials="R." surname="Arends"/>
    <author fullname="W. Hardaker" initials="W." surname="Hardaker"/>
    <author fullname="D. Lawrence" initials="D." surname="Lawrence"/>
    <date month="October" year="2020"/>
    <abstract>
      <t>This document defines an extensible method to return additional information about the cause of DNS errors. Though created primarily to extend SERVFAIL to provide additional information about the cause of DNS and DNSSEC failures, the Extended DNS Errors option defined in this document allows all response types to contain extended error information. Extended DNS Error information does not change the processing of RCODEs.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8914"/>
  <seriesInfo name="DOI" value="10.17487/RFC8914"/>
</reference>




    </references>

    <references title='Informative References' anchor="sec-informative-references">

<reference anchor="Tsuname2021" >
  <front>
    <title>TsuNAME: exploiting misconfiguration and vulnerability to DDoS DNS</title>
    <author initials="G. M." surname="Moura" fullname="Giovane C. M. Moura">
      <organization>SIDN Labs</organization>
    </author>
    <author initials="" surname="Sebastian Castro" fullname="Sebastian Castro">
      <organization>InternetNZ</organization>
    </author>
    <author initials="" surname="John S Heidemann" fullname="John S. Heidemann">
      <organization>USC/ISI</organization>
    </author>
    <author initials="" surname="Wes Hardaker" fullname="Wes Hardaker">
      <organization>USC/ISI</organization>
    </author>
    <date year="2021"/>
  </front>
  <seriesInfo name="IMC '21: Proceedings of the 21st ACM Internet Measurement Conference" value=""/>
</reference>
<reference anchor="KeyTrap" >
  <front>
    <title>The KeyTrap Denial-of-Service Algorithmic Complexity Attacks on DNS</title>
    <author initials="" surname="Elias Heftrig" fullname="Elias Heftrig">
      <organization>ATHENE</organization>
    </author>
    <author initials="" surname="Haya Schulmann" fullname="Haya Schulmann">
      <organization>ATHENE</organization>
    </author>
    <author initials="" surname="Niklas Vogel" fullname="Niklas Vogel">
      <organization>TU Darmstadt</organization>
    </author>
    <author initials="" surname="Michael Waidner" fullname="Michael Waidner">
      <organization>Fraunhofer SIT</organization>
    </author>
    <date year="2024"/>
  </front>
</reference>
<reference anchor="Mockapetris1988" >
  <front>
    <title>Development of the domain name system</title>
    <author initials="" surname="Paul V Mockapetris" fullname="Paul V. Mockapetris">
      <organization>USC/ISI</organization>
    </author>
    <author initials="" surname="Kevin J Dunlap" fullname="Kevin J. Dunlap">
      <organization>Digital Equipment Corp.</organization>
    </author>
    <date year="1988" month="August"/>
  </front>
  <seriesInfo name="the Proceedings of SIGCOMM 1988" value=""/>
</reference>
<reference anchor="djbdns" target="https://cr.yp.to/djbdns/notes.html">
  <front>
    <title>djbdns: Notes on the Domain Name System</title>
    <author initials="D. J." surname="Bernstein" fullname="Daniel Julius Bernstein">
      <organization>University of ILLINOIS CHICAGO</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>


<reference anchor="RFC9715">
  <front>
    <title>IP Fragmentation Avoidance in DNS over UDP</title>
    <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
    <author fullname="P. Vixie" initials="P." surname="Vixie"/>
    <date month="January" year="2025"/>
    <abstract>
      <t>The widely deployed Extension Mechanisms for DNS (EDNS(0)) feature in the DNS enables a DNS receiver to indicate its received UDP message size capacity, which supports the sending of large UDP responses by a DNS server. Large DNS/UDP messages are more likely to be fragmented, and IP fragmentation has exposed weaknesses in application protocols. It is possible to avoid IP fragmentation in DNS by limiting the response size where possible and signaling the need to upgrade from UDP to TCP transport where necessary. This document describes techniques to avoid IP fragmentation in DNS.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9715"/>
  <seriesInfo name="DOI" value="10.17487/RFC9715"/>
</reference>


<reference anchor="I-D.ietf-dnsop-domain-verification-techniques">
   <front>
      <title>Domain Control Validation using DNS</title>
      <author fullname="Shivan Kaul Sahib" initials="S. K." surname="Sahib">
         <organization>Brave Software</organization>
      </author>
      <author fullname="Shumon Huque" initials="S." surname="Huque">
         <organization>Salesforce</organization>
      </author>
      <author fullname="Paul Wouters" initials="P." surname="Wouters">
         <organization>Aiven</organization>
      </author>
      <author fullname="Erik Nygren" initials="E." surname="Nygren">
         <organization>Akamai Technologies</organization>
      </author>
      <author fullname="Tim Wicinski" initials="T." surname="Wicinski">
         <organization>Cox Communications</organization>
      </author>
      <date day="3" month="March" year="2025"/>
      <abstract>
	 <t>   Many application services on the Internet need to verify ownership or
   control of a domain in the Domain Name System (DNS).  The general
   term for this process is &quot;Domain Control Validation&quot;, and can be done
   using a variety of methods such as email, HTTP/HTTPS, or the DNS
   itself.  This document focuses only on DNS-based methods, which
   typically involve the Application Service Provider requesting a DNS
   record with a specific format and content to be visible in the domain
   to be verified.  There is wide variation in the details of these
   methods today.  This document provides some best practices to avoid
   known problems.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-dnsop-domain-verification-techniques-07"/>
   
</reference>




    </references>

</references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

