<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-hardaker-dnsop-root-zone-publication-points-00" category="std" consensus="true" submissionType="IETF" updates="RFC8806" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="IANA root zone publication point list format">An IANA root zone publication source list format</title>
    <seriesInfo name="Internet-Draft" value="draft-hardaker-dnsop-root-zone-publication-points-00"/>
    <author fullname="Wes Hardaker">
      <organization>Google, Inc.</organization>
      <address>
        <email>ietf@hardakers.net</email>
      </address>
    </author>
    <date year="2026" month="January" day="19"/>
    <area>Operations and Management</area>
    <workgroup>Domain Name System Operations</workgroup>
    <keyword>DNS</keyword>
    <keyword>DNSSEC</keyword>
    <keyword>zone cut</keyword>
    <keyword>delegation</keyword>
    <keyword>referral</keyword>
    <abstract>
      <?line 55?>

<t>This document describes a machine readable format to be used by IANA to publish
a list of sources where the contents of the IANA DNS Root Zone may be fetched
from.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-hardaker-dnsop-iana-root-zone-publication-points/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Domain Name System Operations Working Group mailing list (<eref target="mailto:dnsop@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/dnsop/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/dnsop/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/https://github.com/hardaker/draft-hardaker-dnsop-iana-root-zone-publication-points"/>.</t>
    </note>
  </front>
  <middle>
    <?line 61?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>DNS recursive resolvers implementing functionality such as LocalRoot
<xref target="draft-wkumari-dnsop-localroot-bcp"/> need to obtain the contents of
the IANA DNS root zone on a regular basis. This document describes a machine
readable format that can be used by IANA to publish a list of sources that can be
used for obtaining the contents of the IANA DNS Root Zone.</t>
    </section>
    <section anchor="iana-root-zone-list">
      <name>IANA maintained list of root zone publication points</name>
      <t>The list of IANA root zone data publication points, available at TBD-URL, may
be used to discover where the IANA root zone data can be fetched from.</t>
      <t>It is expected that this will be used as described in
<xref target="draft-wkumari-dnsop-localroot-bcp"/>, and may be used by the resolver software
directly, or by the operating system a resolver is deployed on, or by a network
operator when configuring a resolver.</t>
      <t>The contents of the IANA DNS root publication points file MUST be verifiable as
to its integrity as having come from IANA and MUST be verifiable as being
complete.</t>
      <section anchor="root-zone-publication-points">
        <name>Root zone publication points</name>
        <t>NOTE: this is but an example format that is expected to spur
discussions within IETF working groups like DNSOP.  Whether this is a
list in a simple line-delimited format like below or signed JSON or
signed PGP or ... is subject to debate.</t>
        <t>The IANA root zone data publication points file is structured into two distinct
segments, divided by a line consisting of four dashes followed by a newline
("----\n"). The first segment contains a list of URLs, one per line. The second
segment provides a signature or cryptographic checksum.</t>
        <t>While this specific format was originally designed for IANA's maintained list
of root zone publication points, it may also be used by other publication point
aggregation lists.</t>
        <t>The list may include URLs using any protocol capable of transferring DNS zone
data, including HTTPS <xref target="RFC9110"/>, AXFR
<xref target="draft-hardaker-dnsop-dns-xfr-scheme"/>, XoT
<xref target="draft-hardaker-dnsop-dns-xfr-scheme"/>, etc.</t>
        <t>Each URL MUST occur on its own line.  Lines beginning with the "#" character are
considered comments and MUST be ignored.  Leading and trailing whitespace on
each line SHOULD be ignored.</t>
        <t>Any URLs that reference an unknown transfer protocol in the LocalRoot
implementations SHOULD be discarded.  If after filtering the list
there are no acceptable list
elements left, the resolver MUST revert to using regular DNS queries
to the IANA root zone instead of operating as a LocalRoot.</t>
        <t>The first line of the cryptographic checksum section will contain a
checksum or signature type string specifying what the remaining lines
in the checksum or signature section will contain.
(Ed note: this section is underspecified.  We expect to
refine this as we get feedback from the working group.)</t>
        <t>A minimal example publication point file, containing a single
AXFR publication point with a target of b.root-servers.net:</t>
        <artwork><![CDATA[
axfr:b.root-servers.net/.
----
SHA256
67d687eb21e59321dbb8115c51d1b4ddbd6634362859d130ed77b47a4410656c
]]></artwork>
        <t>Future note: this should eventually be a signature from an identity,
regardless of format, that can be traced back to IANA being the
authoritative publisher and not just a simple checksum.</t>
      </section>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>Implementations SHOULD optimize retrieval to minimize impacts on the
server.  Because the list is not expected to change frequently,
implementations SHOULD refrain from querying IANA's source more than
once a week.</t>
      <t>TBD</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>It is critical that LocalRoot implementations (or other any code
bases) making use of the publication point list format described in
this document verify the contents using the encoded checksum to ensure
it has not been tampered with.</t>
      <t>TBD</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>TBD: describe the request for IANA to support a list of root server
publication points at TBD-URL.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <referencegroup anchor="BCP237" target="https://www.rfc-editor.org/info/bcp237">
          <reference anchor="RFC9364" target="https://www.rfc-editor.org/info/rfc9364">
            <front>
              <title>DNS Security Extensions (DNSSEC)</title>
              <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
              <date month="February" year="2023"/>
              <abstract>
                <t>This document describes the DNS Security Extensions (commonly called "DNSSEC") that are specified in RFCs 4033, 4034, and 4035, as well as a handful of others. One purpose is to introduce all of the RFCs in one place so that the reader can understand the many aspects of DNSSEC. This document does not update any of those RFCs. A second purpose is to state that using DNSSEC for origin authentication of DNS data is the best current practice. A third purpose is to provide a single reference for other documents that want to refer to DNSSEC.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="237"/>
            <seriesInfo name="RFC" value="9364"/>
            <seriesInfo name="DOI" value="10.17487/RFC9364"/>
          </reference>
        </referencegroup>
        <reference anchor="RFC4033">
          <front>
            <title>DNS Security Introduction and Requirements</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>The Domain Name System Security Extensions (DNSSEC) add data origin authentication and data integrity to the Domain Name System. This document introduces these extensions and describes their capabilities and limitations. This document also discusses the services that the DNS security extensions do and do not provide. Last, this document describes the interrelationships between the documents that collectively describe DNSSEC. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4033"/>
          <seriesInfo name="DOI" value="10.17487/RFC4033"/>
        </reference>
        <reference anchor="RFC8976">
          <front>
            <title>Message Digest for DNS Zones</title>
            <author fullname="D. Wessels" initials="D." surname="Wessels"/>
            <author fullname="P. Barber" initials="P." surname="Barber"/>
            <author fullname="M. Weinberg" initials="M." surname="Weinberg"/>
            <author fullname="W. Kumari" initials="W." surname="Kumari"/>
            <author fullname="W. Hardaker" initials="W." surname="Hardaker"/>
            <date month="February" year="2021"/>
            <abstract>
              <t>This document describes a protocol and new DNS Resource Record that provides a cryptographic message digest over DNS zone data at rest. The ZONEMD Resource Record conveys the digest data in the zone itself. When used in combination with DNSSEC, ZONEMD allows recipients to verify the zone contents for data integrity and origin authenticity. This provides assurance that received zone data matches published data, regardless of how the zone data has been transmitted and received. When used without DNSSEC, ZONEMD functions as a checksum, guarding only against unintentional changes.</t>
              <t>ZONEMD does not replace DNSSEC: DNSSEC protects individual RRsets (DNS data with fine granularity), whereas ZONEMD protects a zone's data as a whole, whether consumed by authoritative name servers, recursive name servers, or any other applications.</t>
              <t>As specified herein, ZONEMD is impractical for large, dynamic zones due to the time and resources required for digest calculation. However, the ZONEMD record is extensible so that new digest schemes may be added in the future to support large, dynamic zones.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8976"/>
          <seriesInfo name="DOI" value="10.17487/RFC8976"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC5936">
          <front>
            <title>DNS Zone Transfer Protocol (AXFR)</title>
            <author fullname="E. Lewis" initials="E." surname="Lewis"/>
            <author fullname="A. Hoenes" initials="A." role="editor" surname="Hoenes"/>
            <date month="June" year="2010"/>
            <abstract>
              <t>The standard means within the Domain Name System protocol for maintaining coherence among a zone's authoritative name servers consists of three mechanisms. Authoritative Transfer (AXFR) is one of the mechanisms and is defined in RFC 1034 and RFC 1035.</t>
              <t>The definition of AXFR has proven insufficient in detail, thereby forcing implementations intended to be compliant to make assumptions, impeding interoperability. Yet today we have a satisfactory set of implementations that do interoperate. This document is a new definition of AXFR -- new in the sense that it records an accurate definition of an interoperable AXFR mechanism. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5936"/>
          <seriesInfo name="DOI" value="10.17487/RFC5936"/>
        </reference>
        <reference anchor="RFC7766">
          <front>
            <title>DNS Transport over TCP - Implementation Requirements</title>
            <author fullname="J. Dickinson" initials="J." surname="Dickinson"/>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="R. Bellis" initials="R." surname="Bellis"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="D. Wessels" initials="D." surname="Wessels"/>
            <date month="March" year="2016"/>
            <abstract>
              <t>This document specifies the requirement for support of TCP as a transport protocol for DNS implementations and provides guidelines towards DNS-over-TCP performance on par with that of DNS-over-UDP. This document obsoletes RFC 5966 and therefore updates RFC 1035 and RFC 1123.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7766"/>
          <seriesInfo name="DOI" value="10.17487/RFC7766"/>
        </reference>
        <reference anchor="RFC9110">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="draft-hardaker-dnsop-dns-xfr-scheme" target="https://datatracker.ietf.org/doc/draft-hardaker-dnsop-dns-xfr-scheme/">
          <front>
            <title>The DNS XFR URI Schemes</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="draft-hardaker-dnsop-root-zone-publication-list-guidelines" target="https://datatracker.ietf.org/doc/draft-hardaker-dnsop-root-zone-publication-list-guidelines">
          <front>
            <title>Guidelines for IANA DNS Root Zone Publication List Providers</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="draft-wkumari-dnsop-localroot-bcp" target="https://datatracker.ietf.org/doc/draft-wkumari-dnsop-localroot-bcp/">
          <front>
            <title>Populating resolvers with the root zone</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="NOROOTS" target="https://www.icir.org/mallman/pubs/All19b/All19b.pdf">
          <front>
            <title>On Eliminating Root Nameservers from the DNS</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 160?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TBD</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
