<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.17 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-homburg-deleg-incremental-deleg-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.22.0 -->
  <front>
    <title abbrev="incremental-deleg">Incrementally Deployable Extensible Delegation for DNS</title>
    <seriesInfo name="Internet-Draft" value="draft-homburg-deleg-incremental-deleg-00"/>
    <author fullname="Philip Homburg">
      <organization>NLnet Labs</organization>
      <address>
        <email>philip@nlnetlabs.nl</email>
      </address>
    </author>
    <author fullname="Jesse van Zutphen">
      <organization>University of Amsterdam</organization>
      <address>
        <email>Jesse.vanZutphen@os3.nl</email>
      </address>
    </author>
    <author fullname="Willem Toorop">
      <organization>NLnet Labs</organization>
      <address>
        <email>willem@nlnetlabs.nl</email>
      </address>
    </author>
    <date year="2024" month="July" day="08"/>
    <area>int</area>
    <workgroup>DNS Delegation</workgroup>
    <keyword>Internet-Draft</keyword>
    <keyword>DNS</keyword>
    <keyword>Resolver</keyword>
    <keyword>Delegation</keyword>
    <keyword>Authoritative</keyword>
    <keyword>Deployable</keyword>
    <keyword>Extensible</keyword>
    <abstract>
      <?line 81?>

<t>This document proposes a mechanism for extensible delegations in the DNS.
The mechanism realizes delegations with SVCB resource record sets placed below a <tt>_deleg</tt> label in the apex of the delegating zone.
This authoritative delegation point can be aliased to other names using CNAME and DNAME.
The mechanism inherits extensibility from SVCB.</t>
      <t>Support in recursive resolvers suffices for the mechanism to be fully functional.
The number of subsequent interactions between the recursive resolver and the authoritative name servers is comparable with those for DNS Query Name Minimisation.
Additionally, but not required, support in the authoritative name servers enables optimized behavior with reduced (simultaneous) queries.
None, mixed or full deployment of the mechanism on authoritative name servers are all fully functional, allowing for the mechanism to be incrementally deployed.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-homburg-deleg-incremental-deleg/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        deleg Working Group mailing list (<eref target="mailto:dd@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/dd/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/dd/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/NLnetLabs/incremental-deleg"/>.</t>
    </note>
  </front>
  <middle>
    <?line 93?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document describes a delegation mechanism for the Domain Name System (DNS) <xref target="STD13"/> that addresses several matters that, at the time of writing, are suboptimally supported or not at all.
These matters are elaborated upon in sections <xref format="counter" target="signaling"/>, <xref format="counter" target="outsourcing"/> and <xref format="counter" target="dnssec-protection"/>.
In addition, the mechanism described in this document aspires to be maximally deployable, which is elaborated upon in <xref target="deployability"/>.</t>
      <section anchor="signaling">
        <name>Signaling capabilities of the authoritative name servers</name>
        <t>The SVCB Resource Record (RR) type <xref target="RFC9460"/> in "dns" service mode <xref target="RFC9461"/> is used in which capability signalling of <xref target="RFC7858">DNS over Transport Layer Protocol</xref> (DoT), <xref target="RFC8484">DNS Queries over HTTPS</xref> and <xref target="RFC9250">DNS over Dedicated QUIC Connections</xref>, on default or alternative ports, are already specified.
The SVCB RR type is designed to be extensible to support future uses (such as keys for encrypting the TLS ClientHello <xref target="I-D.ietf-tls-esni"/>.)</t>
      </section>
      <section anchor="outsourcing">
        <name>Outsourcing operation of the delegation</name>
        <t>Delegation information is stored at an authoritative location in the zone with this mechanism.
Legacy methods to redirect this information to another location, possible under the control of another operator, such as (CNAME <xref section="3.6.2" sectionFormat="of" target="RFC1034"/>) and DNAME <xref target="RFC6672"/> remain functional.
One could even outsource all delegation operational practice to another party with an DNAME on the <tt>_deleg</tt> label on the apex of the delegating zone.</t>
        <t>Additional to the legacy methods, a delegation may be outsourced to a third party by having an SVCB RRset with a single SVCB RR in AliasMode.</t>
      </section>
      <section anchor="dnssec-protection">
        <name>DNSSEC protection of the delegation</name>
        <t>With legacy delegations, the NS RRset at the parent side of a delegation as well as glue records for the names in the NS RRset are not authoritative and not DNSSEC signed.
An adversary that is able to spoof a referral response, can alter this information and redirect all traffic for the delegation to a rogue name server undetected.
The adversary can then perceive all queries for the redirected zone (Privacy concern) and alter all unsigned parts of responses (such as further referrals, which is a Security concern).</t>
        <t>DNSSEC protection of delegation information prevents that, and is the only countermeasure that also works against on-path attackers.
At the time of writing, the only way to DNSSEC validate and verify delegations at all levels in the DNS hierarchy is to revalidate delegations <xref target="I-D.ietf-dnsop-ns-revalidation"/>, which is done after the fact and has other security concerns (<xref section="7" sectionFormat="of" target="I-D.ietf-dnsop-ns-revalidation"/>).</t>
        <t>Direct delegation information (provided by SVCB RRs in ServiceMode) includes the hostnames of the authoritative name servers for the delegation as well as IP addresses for those hostnames.
Since the information is stored authoritatively in the delegating zone, it will be DNSSEC signed if the zone is signed.
When the delegation is outsourced, then it's protected when the zones providing the aliasing resource records <em>and</em> the zones serving the targets of the aliases are all DNSSEC signed.</t>
      </section>
      <section anchor="deployability">
        <name>Maximize ease of deployment</name>
        <t>Delegation information is stored authoritatively within the delegation zone.
No semantic changes as to what zones are authoritative for what data are needed.
As a consequence, existing DNS software, such as authoritative name servers and DNSSEC signing software, can remain unmodified.
Unmodified authoritative name server software will serve the delegation information when queried for.
Unmodified signers will sign the delegation information in the delegating zone.
Only the recursive resolver needs modification to follow referrals as provided by the delegation information.</t>
        <t>Such a resolver would explicitly query for the delegations administered as specified in <xref target="delegation-administration"/>.
The number of round trips from the recursive resolver to the authoritative name server is comparable to what is needed for DNS Query Name Minimisation <xref target="RFC9156"/>.
Additional implementation in the authoritative name server optimizes resolution and reduces the number of simultaneous in parallel queries to that what would be needed for legacy delegations.
None, mixed or full deployment of the mechanism on authoritative name servers are all fully functional, allowing for the mechanism to be incrementally deployed on the authoritative name servers.</t>
        <t>Implementation in the recursive may be less demanding with respect to (among other things) DNSSEC validation because there is no need to make additional exceptions as to what is authoritative at the parent side of a delegation.</t>
      </section>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

<t>This document follows terminology as defined in <xref target="RFC9499"/>.</t>
        <t>Throughout this document we will also use terminology with the meaning as defined below:</t>
        <dl newline="true">
          <dt>Incremental deleg:</dt>
          <dd>
            <t>The delegation mechanism as specified in this document.</t>
          </dd>
          <dt>Incremental delegation:</dt>
          <dd>
            <t>A delegation as specified in this document</t>
          </dd>
          <dt>Legacy delegations:</dt>
          <dd>
            <t>The way delegations are done in the DNS traditionally as defined in <xref target="STD13"/>.</t>
          </dd>
          <dt>Delegating zone:</dt>
          <dd>
            <t>The zone in which the delegation is administered.
Sometimes also called the "parent zone" of a delegation.</t>
          </dd>
          <dt>Subzone:</dt>
          <dd>
            <t>The zone that is delegated to from the delegating zone.</t>
          </dd>
          <dt>Delegating name:</dt>
          <dd>
            <t>The name which realizes the delegation.
In legacy delegations, this name is the same as the name of the subzone to which the delegation refers.
Delegations described in this document are provided with a different name than the zone that is delegated to.</t>
          </dd>
          <dt>Delegation point:</dt>
          <dd>
            <t>The location in the delegating zone where the RRs are provided that make up the delegation.
In legacy delegations, this is the parent side of the zone cut and has the same name as the subzone.
With incremental deleg, this is the location given by the delegating name.</t>
          </dd>
          <dt>Triggering query:</dt>
          <dd>
            <t>The query on which resolution a recursive resolver is working.</t>
          </dd>
          <dt>Target zone:</dt>
          <dd>
            <t>The zone for which the authoritative servers, that a resolver contacts while iterating, are authoritative.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="delegation-administration">
      <name>Delegation administration</name>
      <t>An extensible delegation is realized with an SVCB Resource Record set (RRset) <xref target="RFC9460"/> below a specially for the purpose reserved label with the name <tt>_deleg</tt> at the apex of the delegating zone.
The <tt>_deleg</tt> label scopes the interpretation of the SVCB records and requires registration in the "Underscored and Globally Scoped DNS Node Names" registry (see <xref target="iana-considerations">IANA Considerations</xref>).
The full scoping of delegations includes the labels that are <strong>below</strong> the <tt>_label</tt> and those, together with the name of the delegating domain, make up the name of the subzone to which the delegation refers.
For example, if the delegating zone is <tt>example.</tt>, then a delegation to subzone <tt>customer.example.</tt> is realized by an SVCB RRset at the name <tt>customer._deleg.example.</tt> in the parent zone.
A fully scoped delegating name (such as <tt>customer._deleg.example.</tt>) is referred to further in this document as the "delegation point".</t>
      <t>The use of the SVCB RR type requires a mapping document for each service type.
This document uses the SVCB for the "dns" service type and the contents of the SVCB SvcParams <bcp14>MUST</bcp14> be interpreted as specified in Service Binding Mapping for DNS Servers <xref target="RFC9461"/>.
At the delegation point (for example <tt>customer._deleg.example.</tt>), the host names of the authoritative name servers for the subzone, are given in the TargetName RDATA field of SVCB records in ServiceMode.
Port Prefix Naming <xref section="3" sectionFormat="of" target="RFC9461"/> is not used at the delegation point, but <bcp14>MUST</bcp14> be used when resolving the aliased to name servers with "dns" service type SVCB RRs in AliasMode.</t>
      <t>Note that if the delegation is outsourcing to a single operator represented in a single SVCB RRset, it is <bcp14>RECOMMENDED</bcp14> to refer to the name of the operator's SVCB RRset with a CNAME on the delegation point instead of an SVCB RR in AliasMode <xref section="10.2" sectionFormat="of" target="RFC9460"/>.</t>
      <section anchor="examples">
        <name>Examples</name>
        <section anchor="one-name-server-within-the-subzone">
          <name>One name server within the subzone</name>
          <figure anchor="zone-within">
            <name>One name server within the subzone</name>
            <sourcecode type="~"><![CDATA[
$ORIGIN example.
@                  IN  SOA   ns zonemaster ...
customer1._deleg   IN  SVCB  1 ( ns.customer1
                                 ipv4hint=198.51.100.1,203.0.113.1
                                 ipv6hint=2001:db8:1::1,2001:db8:2::1
                               )
]]></sourcecode>
          </figure>
        </section>
        <section anchor="two-name-servers-within-the-subzone">
          <name>Two name servers within the subzone</name>
          <figure anchor="zones-within">
            <name>Two name servers within the subzone</name>
            <artwork><![CDATA[
$ORIGIN example.
@                  IN  SOA   ns zonemaster ...
customer2._deleg   IN  SVCB  1 ns1.customer2 ( ipv4hint=198.51.100.1
                                               ipv6hint=2001:db8:1::1
                                             )
                   IN  SVCB  1 ns2.customer2 ( ipv4hint=203.0.113.1
                                               ipv6hint=2001:db8:2::1
                                             )
]]></artwork>
          </figure>
        </section>
        <section anchor="outsourced-to-an-operator">
          <name>Outsourced to an operator</name>
          <figure anchor="outsourced-cname">
            <name>Outsourced with CNAME</name>
            <artwork><![CDATA[
$ORIGIN example.
@                  IN  SOA   ns zonemaster ...
customer3._deleg   IN  CNAME _dns.ns.operator1
]]></artwork>
          </figure>
          <t>Instead of using CNAME, the outsourcing could also been accomplished with an SVCB RRset with a single SVCB RR in AliasMode.
The configuration below is operationally equivalent to the CNAME configuration above.
It is <bcp14>RECOMMENDED</bcp14> to use a CNAME over an SVCB RRset with a single SVCB RR in AliasMode (<xref section="10.2" sectionFormat="of" target="RFC9460"/>).
Note that an SVCB RRset refers with TargetName to an DNS service, which will be looked up using Port Prefix Naming <xref section="3" sectionFormat="of" target="RFC9461"/>, but that CNAME refers to the domain name of the target SVCB RRset (or CNAME) which may have an <tt>_dns</tt> prefix.</t>
          <figure anchor="outsourced-svcb">
            <name>Outsourced with an AliasMode SVCB RR</name>
            <artwork><![CDATA[
$ORIGIN example.
@                  IN  SOA   ns zonemaster ...
customer3._deleg   IN  SVCB 0 ns.operator1
]]></artwork>
          </figure>
          <t>The operator SVCB RRset could for example be:</t>
          <figure anchor="operator-zone">
            <name>Operator zone</name>
            <artwork><![CDATA[
$ORIGIN operator1.example.
@                  IN  SOA   ns zonemaster ...
_dns.ns            IN  SVCB  1 ns ( alpn=h2,dot,h3,doq
                                    ipv4hint=192.0.2.1
                                    ipv6hint=2001:db8:3::1
                                    dohpath=/q{?dns}
                                  )
                   IN  SVCB  2 ns ( ipv4hint=192.0.2.2
                                    ipv6hint=2001:db8:3::2
                                  )
ns                 IN  AAAA  2001:db8:3::1
                   IN  AAAA  2001:db8:3::2
                   IN  A     192.0.2.1
                   IN  A     192.0.2.2
]]></artwork>
          </figure>
          <t><xref section="2.4.2" sectionFormat="of" target="RFC9460"/> states that SVCB RRsets <bcp14>SHOULD</bcp14> only have a single RR in AliasMode, and that if multiple AliasMode RRs are present, clients or recursive resolvers <bcp14>SHOULD</bcp14> pick one at random.
<xref section="2.4.1" sectionFormat="of" target="RFC9460"/> states that within an SVCB RRset, all RRs <bcp14>SHOULD</bcp14> have the same mode, and that if an RRset contains a record in AliasMode, the recipient <bcp14>MUST</bcp14> ignore any ServiceMode records in the set.</t>
        </section>
        <section anchor="dnssec-signed-name-servers-within-the-subzone">
          <name>DNSSEC signed name servers within the subzone</name>
          <figure anchor="dnssec-zone">
            <name>DNSSEC signed incremental deleg zone</name>
            <artwork><![CDATA[
$ORIGIN
@                 IN  SOA    ns zonemaster ...
                  IN  RRSIG  SOA ...
                  IN  DNSKEY 257 3 15 ...
                  IN  RRSIG  DNSKEY ...
                  IN  NS     ns.example.
                  IN  NSEC   customer5._deleg SOA RRSIG NSEC DNSKEY
                  IN  RRSIG  NSEC ...

customer5._deleg  IN  SVCB   1 ns.customer5 alpn=h2,h3 (
                                            ipv4hint=198.51.100.5
                                            ipv6hint=2001:db8:5::1
                                            dohpath=/dns-query{?dns}
                                            )
                  IN  RRSIG  SVCB ...
                  IN  NSEC   customer7._deleg RRSIG NSEC SVCB
                  IN  RRSIG  NSEC ...

customer7._deleg  IN  CNAME  customer5._deleg
                  IN  RRSIG  CNAME ...
                  IN  NSEC   customer5 CNAME RRSIG NSEC
                  IN  RRSIG  NSEC ...

customer5         IN  NS     ns.customer5
ns.customer5      IN  A      198.51.100.5
                  IN  AAAA   2001:db8:5::1
customer5         IN  DS     17405 15 2 ...
                  IN  RRSIG  DS ...
                  IN  NSEC   customer6 NS DS RRSIG NSEC
                  IN  RRSIG  NSEC ...

customer6         IN  NS     ns.customer6
ns.customer6      IN  A      203.0.113.1
                  IN  AAAA   2001:db8:6::1
customer6         IN  DS     ...
                  IN  RRSIG  DS ...
                  IN  NSEC   customer7 NS DS RRSIG NSEC
                  IN  RRSIG  NSEC ...

customer7         IN  NS     ns.customer5
                  IN  DS     ...
                  IN  RRSIG  DS ...
                  IN  NSEC   example. NS DS RRSIG NSEC
                  IN  RRSIG  NSEC ...
]]></artwork>
          </figure>
          <t><tt>customer5.example.</tt> is delegated to in an extensible way and <tt>customer6.example.</tt> is delegated only in a legacy way.
<tt>customer7.example.</tt>'s delegation is outsourced to customer5's delegation.</t>
          <t>The delegation signals that the authoritative name server supports DoH.
<tt>customer5.example.</tt>, <tt>customer6.example.</tt> and <tt>example.</tt> are all DNSSEC signed.
The DNSSEC authentication chain links from <tt>example.</tt> to <tt>customer5.example.</tt> in the for DNSSEC conventional way with the signed <tt>customer5.example. DS</tt> RRset in the <tt>example.</tt> zone.
Also, <tt>customer6.example.</tt> is linked to from <tt>example.</tt> with the signed <tt>customer6.example. DS</tt> RRset in the <tt>example.</tt> zone.</t>
          <t>Note that both <tt>customer5.example.</tt> and <tt>customer6.example.</tt> have legacy delegations in the zone as well.
It is important to have those legacy delegations to maintain support for legacy resolvers, that do not support incremental deleg.
DNSSEC signers <bcp14>SHOULD</bcp14> construct the NS RRset and glue for the legacy delegation from the SVCB RRset.</t>
        </section>
      </section>
    </section>
    <section anchor="minimal-implementation">
      <name>Minimal implementation</name>
      <t>Support in recursive resolvers suffices for the mechanism to be fully functional.
<xref target="recursive-resolver-behavior"/> specifies the basic algorithm for resolving incremental delegations.
In <xref target="presence"/>, an optimization is presented that will reduce the number of (parallel) queries especially for when authoritative name server support is still lacking and there are still many zones that do not contain incremental delegations.</t>
      <section anchor="recursive-resolver-behavior">
        <name>Recursive Resolver behavior</name>
        <t>If the triggering query name is the same as the name of the target zone apex, then no further delegation will occur, and resolution will complete.
No special behavior or processing is needed.</t>
        <t>Otherwise, the triggering query is below the target zone apex and a delegation may exist in the target zone.
In this case two parallel queries <bcp14>MUST</bcp14> be sent.
One for the triggering query in the way that is conventional with legacy delegations (which could be just the triggering query or a minimised query <xref target="RFC9156"/>), and one <em>incremental deleg query</em> with query type SVCB.</t>
        <t>The incremental deleg query name is constructed by concatenating the first label below the part that the triggering query name has in common with the target zone, a <tt>_deleg</tt> label and the name of the target zone.
For example if the triggering query is <tt>www.customer.example.</tt> and the target zone <tt>example.</tt>, then the incremental deleg query name is <tt>customer._deleg.example.</tt>
For another example, if the triggering query is <tt>www.faculty.university.example.</tt> and the target zone <tt>example.</tt> then the incremental deleg name is <tt>university._deleg.example.</tt></t>
        <t>Normal DNAME, CNAME and SVCB in AliasMode processing should happen as before, though note that when following an SVCB RR in AliasMode, the target name <bcp14>MUST</bcp14> have the <tt>_dns</tt> label prepended to the TargetName in the SVCB RR.
The eventual incremental deleg query response, after following all redirections caused by DNAME, CNAME and AliasMode SVCB RRs, has three possible outcomes:</t>
        <ol spacing="normal" type="1"><li>
            <t>An SVCB RRset in ServiceMode is returned in the response's answer section containing the delegation for the subzone.  </t>
            <t>
The SVCB RRs in the RRset <bcp14>MUST</bcp14> be used to follow the referral.
The TargetName data field in the SVCB RRs in the RRset <bcp14>MUST</bcp14> be used as the names for the name servers to contact for the subzone, and the ipv4hint and ipv6hint parameters <bcp14>MUST</bcp14> be used as the IP addresses for the TargetName in the same SVCB RR.  </t>
            <t>
The NS RRset and glue, in the response of the legacy query that was sent in parallel to the incremental deleg query, <bcp14>MUST NOT</bcp14> be used, but the signed DS record (or NSEC(3) records indicating that there was no DS) <bcp14>MUST</bcp14> be used in linking the DNSSEC authentication chain as which would conventionally be done with DNSSEC as well.</t>
          </li>
          <li>
            <t>The incremental deleg query name does not exist (NXDOMAIN).  </t>
            <t>
There is no incremental delegation for the subzone, and the referral response for the legacy delegation <bcp14>MUST</bcp14> be processed  as would be done with legacy DNS and DNSSEC processing.</t>
          </li>
          <li>
            <t>The incremental deleg query name does exist, but resulted in a NOERROR no answer response (also known as a NODATA response).  </t>
            <t>
If the legacy query, did result in a referral for the same number of labels as the subdomain that the incremental deleg query was for, then there was no incremental delegation for the subzone, and the referral response for the legacy delegation <bcp14>MUST</bcp14> be processed as would be done with legacy DNS and DNSSEC processing.  </t>
            <t>
Otherwise, the subzone may be more than one label below the delegating zone.  </t>
            <t>
If the response to the legacy query resulted in a referral, then a new incremental deleg query <bcp14>MUST</bcp14> be spawned, matching the zone cut of the legacy referral response.
For example if the triggering query is <tt>www.university.ac.example.</tt> and the target zone <tt>example.</tt>, and the legacy response contained an NS RRset for <tt>university.ac.example.</tt>, then the incremental deleg query name is <tt>university.ac._deleg.example.</tt>
The response to the new incremental deleg query <bcp14>MUST</bcp14> be processed as described above, as if it was the initial incremental deleg query.  </t>
            <t>
If the legacy query was sent minimised and needs a followup query, then parallel to that followup query a new incremental deleg query will be sent, adding a single label to the previous incremental deleg query name.
For example if the triggering query is <tt>www.university.ac.example.</tt> and the target zone is <tt>example.</tt> and the minimised legacy query name is <tt>ac.example.</tt> (which also resulted in a NOERROR no answer response), then the incremental deleg query to be sent along in parallel with the followup legacy query will become <tt>university.ac.example.</tt>
Processing of the responses of those two new queries will be done as described above.</t>
          </li>
        </ol>
      </section>
      <section anchor="presence">
        <name><tt>_deleg</tt> label presence</name>
        <t>Absence of the <tt>_deleg</tt> label in a zone is a clear signal that the zone does not contain any incremental deleg delegations.
Recursive resolvers <bcp14>SHOULD NOT</bcp14> send any additional incremental deleg queries for zones for which it is known that it does not contain the <tt>_deleg</tt> label at the apex.
The state regarding the presence of the <tt>_deleg</tt> label within a resolver can be "unknown", "known not to be present", or "known to be present".</t>
        <t>The state regarding the presence of the <tt>_deleg</tt> label can be deduced from the response of the incremental deleg query, if the target zone is signed with DNSSEC.
If the target zone is unsigned, the procedure as described in the remainder of this section <bcp14>SHOULD</bcp14> be followed.</t>
        <t>When the presence of a <tt>_deleg</tt> label is "unknown", a <tt>_deleg</tt> presence test query <bcp14>SHOULD</bcp14> be sent in parallel to the next query for the unsigned target zone (though not when the target name server is known to support incremental deleg, which will be discussed in <xref target="authoritative-name-server-support"/>).
The query name for the test query is the <tt>_deleg</tt> label prepended to the apex of zone for which to test presence, with query type A.</t>
        <t>The testing query can have three possible outcomes:</t>
        <ol spacing="normal" type="1"><li>
            <t>The <tt>_deleg</tt> label does not exist within the zone, and an NXDOMAIN response is returned.  </t>
            <t>
The non-existence of the <tt>_deleg</tt> label <bcp14>MUST</bcp14> be cached for the duration indicated by the "minimum" RDATA field of the SOA resource record in the authority section, adjusted to the boundaries for TTL values that the resolver has (<xref section="4" sectionFormat="of" target="RFC8767"/>).
For the period the non-existence of the <tt>_deleg</tt> label is cached, the label is "known not to be present" and the resolver <bcp14>SHOULD NOT</bcp14> send any (additional) incremental deleg queries.</t>
          </li>
          <li>
            <t>The <tt>_deleg</tt> label does exist within the zone but contains no data.
A NOERROR response is returned with no RRs in the answer section.  </t>
            <t>
The existence of the <tt>_deleg</tt> name <bcp14>MUST</bcp14> be cached for the duration indicated by the "minimum" RDATA field of the SOA resource record in the authority section, adjusted to the resolver's TTL boundaries.
For the period the existence of the empty non-terminal at the <tt>_deleg</tt> label is cached, the label is "known to be present" and the resolver <bcp14>MUST</bcp14> send additional incremental deleg queries as described in TODO.</t>
          </li>
          <li>
            <t>The <tt>_deleg</tt> label does exist within the zone and contains data.
A NOERROR response is return with an A RRset in the answer section.  </t>
            <t>
The resolver <bcp14>MUST</bcp14> record that the <tt>_deleg</tt> label is known to be present for a duration indicated by A RRset's TTL value, adjusted to the resolver's TTL boundaries, for example by caching the RRset.
For the period any RRset at the <tt>_deleg</tt> label is cached, the label is "known to be present" and the resolver <bcp14>MUST</bcp14> send additional incremental deleg queries as described in TODO.</t>
          </li>
        </ol>
      </section>
    </section>
    <section anchor="optimized-implementation">
      <name>Optimized implementation</name>
      <t>Support for authoritative name servers enables optimized query behavior by resolvers with reduced (simultaneous) queries.
<xref target="authoritative-name-server-support"/> specifies how incremental deleg supporting authoritative name servers return referral responses for delegations.
In <xref target="behavior-with-auth-support"/> we specify how resolvers can benefit from those authoritative servers.</t>
      <section anchor="authoritative-name-server-support">
        <name>Authoritative name server support</name>
        <t>Incremental delegations supporting authoritative name servers include the incremental delegation information (or the NSEC(3) records showing the non-existence) in the authority section of referral responses to legacy DNS queries.
For example, querying the zone from <xref target="dnssec-zone"/> for <tt>www.customer5.example. A</tt>, will return the following referral response:</t>
        <figure anchor="deleg-response">
          <name>An incremental deleg referral response</name>
          <artwork><![CDATA[
;; ->>HEADER<<- opcode: QUERY, rcode: NOERROR, id: 54349
;; flags: qr ; QUERY: 1, ANSWER: 0, AUTHORITY: 5, ADDITIONAL: 2
;; QUESTION SECTION:
;; www.customer5.example.       IN      A

;; ANSWER SECTION:

;; AUTHORITY SECTION:
customer5.example.      3600    IN      NS      ns.customer5.example.
customer5.example.      3600    IN      DS      ...
customer5.example.      3600    IN      RRSIG   DS ...
customer5._deleg.example.       3600    IN      SVCB    1 (
                ns.customer5.example. alpn=h2,h3
                ipv4hint=198.51.100.5 ipv6hint=2001:db8:5::1
                dohpath=/dns-query{?dns}
                )
customer5._deleg.example.       3600    IN      RRSIG   SVCB ...

;; ADDITIONAL SECTION:
ns.customer5.example.   3600    IN      A       198.51.100.5
ns.customer5.example.   3600    IN      AAAA    2001:db8:5::1

;; Query time: 0 msec
;; EDNS: version 0; flags: do ; udp: 1232
;; SERVER: 192.0.2.53
;; WHEN: Mon Jul  1 20:36:25 2024
;; MSG SIZE  rcvd: 456
]]></artwork>
        </figure>
        <t>The referral response in <xref target="deleg-response"/> includes the signed SVCB RRset in the authority section.</t>
        <t>As another example, querying the zone from <xref target="dnssec-zone"/> for <tt>www.customer6.example. A</tt>, will return the following referral response:</t>
        <figure anchor="no-incr-deleg-response">
          <name>Referral response without incremental deleg</name>
          <artwork><![CDATA[
;; ->>HEADER<<- opcode: QUERY, rcode: NOERROR, id: 36574
;; flags: qr ; QUERY: 1, ANSWER: 0, AUTHORITY: 9, ADDITIONAL: 2
;; QUESTION SECTION:
;; www.customer6.example.       IN      A

;; ANSWER SECTION:

;; AUTHORITY SECTION:
customer6.example.      3600    IN      NS      ns.customer6.example.
customer6.example.      3600    IN      DS      ...
customer6.example.      3600    IN      RRSIG   DS ...
customer5._deleg.example.       1234    IN      NSEC    (
                customer7._deleg.example.  RRSIG NSEC SVCB )
customer5._deleg.example.       1234    IN      RRSIG   NSEC ...
example.        1234    IN      NSEC    (
                customer5._deleg.example.  NS SOA RRSIG NSEC DNSKEY )
example.        1234    IN      RRSIG   NSEC ...

;; ADDITIONAL SECTION:
ns.customer6.example.   3600    IN      A       203.0.113.1
ns.customer6.example.   3600    IN      AAAA    2001:db8:6::1

;; Query time: 0 msec
;; EDNS: version 0; flags: do ; udp: 1232
;; SERVER: 192.0.2.53
;; WHEN: Tue Jul  2 10:23:53 2024
;; MSG SIZE  rcvd: 744
]]></artwork>
        </figure>
        <t>Next to the legacy delegation, the incremental deleg supporting authoritative returns the NSEC(3) RRs needed to show that there was no incremental delegation in the referral response in <xref target="no-incr-deleg-response"/>.</t>
        <t>Querying the zone from <xref target="dnssec-zone"/> for <tt>www.customer7.example. A</tt>, will return the following referral response:</t>
        <figure anchor="alias-response">
          <name>Aliasing referral response</name>
          <artwork><![CDATA[
;; ->>HEADER<<- opcode: QUERY, rcode: NOERROR, id: 9456
;; flags: qr ; QUERY: 1, ANSWER: 0, AUTHORITY: 7, ADDITIONAL: 2
;; QUESTION SECTION:
;; www.customer7.example.       IN      A

;; ANSWER SECTION:

;; AUTHORITY SECTION:
customer7.example.      3600    IN      NS      ns.customer5.example.
customer7.example.      3600    IN      DS      ...
customer7.example.      3600    IN      RRSIG   DS ...
customer7._deleg.example.       3600    IN      CNAME   (
                customer5._deleg.example. )
customer7._deleg.example.       3600    IN      RRSIG   CNAME ...
customer5._deleg.example.       3600    IN      SVCB    1 (
                ns.customer5.example. alpn=h2,h3
                ipv4hint=198.51.100.5 ipv6hint=2001:db8:5::1 )
customer5._deleg.example.       3600    IN      RRSIG   SVCB ...

;; ADDITIONAL SECTION:
ns.customer5.example.   3600    IN      A       198.51.100.5
ns.customer5.example.   3600    IN      AAAA    2001:db8:5::1

;; Query time: 0 msec
;; EDNS: version 0; flags: do ; udp: 1232
;; SERVER: 192.0.2.53
;; WHEN: Tue Jul  2 10:55:07 2024
;; MSG SIZE  rcvd: 593
]]></artwork>
        </figure>
        <t>The incremental delegation of <tt>customer7.example.</tt> is aliased to the one that is also used by <tt>customer5.example.</tt>
Since both delegations are in the same zone, the authoritative name server for <tt>example.</tt> returns both the CNAME realising the alias, as well as the SVCB RRset which is the target of the alias in <xref target="alias-response"/>.
In other cases an returned CNAME or SVCB RR in AliasMode may need further chasing by the resolver.
<!-- TODO: Add an AliasMode referral without expansion within the zone -->
        </t>
        <t>With unsigned zones, only if an incremental deleg delegation exists, the SVCB RRset (or CNAME) will be present in the authority section of referral responses.
<!-- TODO: Add a referral response for an unsigned zone -->
If the incremental deleg does not exist, then it is simply absent from the authority section and the referral response is indistinguishable from an non supportive authoritative.
<!-- TODO: Add a non incremental deleg referral response for an unsigned zone -->
        </t>
      </section>
      <section anchor="behavior-with-auth-support">
        <name>Resolver behavior with authoritative name server support</name>
        <t>Incremental deleg supporting authoritative name servers will include the incremental delegation information (or the NSEC(3) records showing the non-existence) in the authority section of referral responses.
If it is known that an authoritative name server supports incremental deleg, then no direct queries for the incremental delegation need to be send in parallel to the legacy delegation query.
A resolver <bcp14>SHOULD</bcp14> register that an authoritative name server supports incremental deleg when the authority section, of the returned referral responses from that authoritative name server, contains incremental delegegation information.</t>
        <t>When the authority section of a referral response contains an SVCB RRset or a CNAME on the incremental delegation name, or valid NSEC(3) RRs showing the non-existence of such SVCB or CNAME RRset, then the resolver <bcp14>SHOULD</bcp14> register that the contacted authoritative name server supports incremental deleg for the duration indicated by the TTL for that SVCB, CNAME or NSEC(3) RRset, adjusted to the resolver's TTL boundaries, but only if it is longer than any already registered duration.
Subsequent queries <bcp14>SHOULD NOT</bcp14> include incremental deleg queries, as described in <xref target="recursive-resolver-behavior"/>, to be send in parallel for the duration support for incremental deleg is registered for the authoritative name server.</t>
        <t>For example, in <xref target="deleg-response"/>, the SVCB RRset at the incremental delegation point has TTL 3600.
The resolver should register that the contacted authoritative name server supports incremental deleg for (at least) 3600 seconds (one hour).
All subsequent queries to that authoritative name server <bcp14>SHOULD NOT</bcp14> include incremental deleg queries to be send in parallel.</t>
        <t>If the authority section contains more than one RRset making up the incremental delegation, then the RRset with the longest TTL <bcp14>MUST</bcp14> be taken to determine the duration for which incremental deleg support is registered.</t>
        <t>For example, in <xref target="alias-response"/>, both a CNAME and an SVCB RRset for the incremental delegation are included in the authority section.
The longest TTL must be taken for incremental support registration, though because the TTL of both RRsets is 3600, it does not matter in this case.</t>
        <t>With DNSSEC signed zones, support is apparent with all referral responses, with unsigned zones only from referral responses for which a incremental delegation exists.</t>
        <t>If the resolver knows that the authoritative name server supports incremental deleg, <em>and</em> a DNSSEC signed zone is being served, then all referrals <bcp14>MUST</bcp14> contain either an incremental delegation, or NSEC(3) records showing that the delegation does not exist.
If a referral is returned that does not contain an incremental delegation nor an indication that it does not exist, then the resolver <bcp14>MUST</bcp14> send an additional incremental deleg query to find the incremental delegation (or denial of its existence).</t>
      </section>
    </section>
    <section anchor="extra-optimized-implementation">
      <name>Extra optimized implementation</name>
      <t>An SVCB RRset on an incremental delegation point, with a SVCB RR in AliasMode, aliasing to the root zone, <bcp14>MUST</bcp14> be interpreted to mean that the legacy delegation information <bcp14>MUST</bcp14> be used to follow the referral.
All service parameters for such AliasMode (aliasing to the root) SVCB RRs on the incremental delegation point, <bcp14>MUST</bcp14> be ignored.</t>
      <t>For example, such an SVCB RRset registered on the wildcard below the <tt>_deleg</tt> label on the apex of a zone, can signal that legacy DNS referrals <bcp14>MUST</bcp14> be used for both signed and <em>unsigned</em> zones:</t>
      <figure anchor="wildcard-deleg">
        <name>Wildcard incremental deleg to control duration of detected support</name>
        <artwork><![CDATA[
$ORIGIN example.
@                  IN  SOA   ns zonemaster ...
*._deleg    86400  IN  SVCB  0 .
customer1._deleg   IN  SVCB  1 ( ns.customer1
                                 ipv4hint=198.51.100.1,203.0.113.1
                                 ipv6hint=2001:db8:1::1,2001:db8:2::1
                               )
customer3._deleg   IN  CNAME _dns.ns.operator1
]]></artwork>
      </figure>
      <t>Resolvers <bcp14>SHOULD</bcp14> register that an authoritative name server supports incremental deleg, if such an SVCB RRset is returned in the authority section of referral responses, for the duration of the TTL if the SVCB RRset, adjusted to the resolver's TTL boundaries, but only if it is longer than any already registered duration.
Note that this will also be included in referral responses for unsigned zones, which would otherwise not have signalling of incremental deleg support by the authoritative name server.
Also, signed zones need fewer RRs to indicate that no incremental delegation exists.
The wildcard expansion already shows the closest encloser (i.e. <tt>_deleg.&lt;apex&gt;</tt>), so only one additional NSEC(3) is needed to show non-existence of the queried for name below the closest encloser.</t>
      <t>This method of signalling that the legacy delegation <bcp14>MUST</bcp14> be used, is <bcp14>RECOMMENDED</bcp14>.</t>
    </section>
    <section anchor="limitations">
      <name>Limitations</name>
      <section anchor="outsourcing-to-more-than-one-operator">
        <name>Outsourcing to more than one operator</name>
        <t><xref section="2.4.1" sectionFormat="of" target="RFC9460"/> states that within an SVCB RRset, all RRs <bcp14>SHOULD</bcp14> have the same mode, and that if an RRset contains a record in AliasMode, the recipient <bcp14>MUST</bcp14> ignore any ServiceMode records in the set.
<xref section="2.4.2" sectionFormat="of" target="RFC9460"/> states that SVCB RRsets <bcp14>SHOULD</bcp14> only have a single RR in AliasMode, and that if multiple AliasMode RRs are present, clients or recursive resolvers <bcp14>SHOULD</bcp14> pick one at random.</t>
        <t>Currently this means that query load can be spread out over multiple operators (even though that is <bcp14>NOT RECOMMENDED</bcp14>), but operationally it would make more sense to allow a resolver to select from all the name servers from all the operators.
Assumingly SVCB currently supports only a single AliasMode RR in an SVCB RRset because it would otherwise be impossible to interpret the SvcPriority from the SVCB RRsets that is aliased to.
A possible solution could be to resolve all AliasMode RRs at the delegation point (though limited to a certain amount, say 8) and then let the resolver pick from all the SVCB RRs, ignoring SvcPriority.</t>
      </section>
      <section anchor="priming-queries">
        <name>Priming queries</name>
        <t>Some zones, such as the root zone, are targeted directly from hints files.
Information about which authoritative name servers and with capabilities, <bcp14>MAY</bcp14> be provided in an SVCB RRset directly at the <tt>_deleg</tt> label under the apex of the zone.
Priming queries from a incremental deleg supporting resolver, <bcp14>MUST</bcp14> send an <tt>_deleg.&lt;apex&gt; SVCB</tt> query in parallel to the legacy <tt>&lt;apex&gt; NS</tt> query and process the content as if it was found through an incremental referral response.</t>
      </section>
    </section>
    <section anchor="comparison-with-other-delegation-mechanisms">
      <name>Comparison with other delegation mechanisms</name>
      <t>Table <xref target="xtraqueries"/> provides an overview of when extra queries, in parallel to the legacy query, are sent.</t>
      <table anchor="xtraqueries">
        <name>Additional queries in parallel to the legacy query</name>
        <thead>
          <tr>
            <th align="center"> </th>
            <th align="center">apex</th>
            <th align="center">support</th>
            <th align="center">_deleg</th>
            <th align="left"> </th>
            <th align="center">&lt;sub&gt;._deleg.&lt;apex&gt; SVCB</th>
            <th align="center">_deleg.&lt;apex&gt; A</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="center">1</td>
            <td align="center">Yes</td>
            <td align="center">*</td>
            <td align="center">*</td>
            <td align="left"> </td>
            <td align="center"> </td>
            <td align="center"> </td>
          </tr>
          <tr>
            <td align="center">2</td>
            <td align="center">No</td>
            <td align="center">*</td>
            <td align="center">No</td>
            <td align="left"> </td>
            <td align="center"> </td>
            <td align="center"> </td>
          </tr>
          <tr>
            <td align="center">3</td>
            <td align="center">No</td>
            <td align="center">Yes</td>
            <td align="center">*</td>
            <td align="left"> </td>
            <td align="center"> </td>
            <td align="center"> </td>
          </tr>
          <tr>
            <td align="center">4</td>
            <td align="center">No</td>
            <td align="center">Unknown</td>
            <td align="center">Yes</td>
            <td align="left"> </td>
            <td align="center">X</td>
            <td align="center"> </td>
          </tr>
          <tr>
            <td align="center">5</td>
            <td align="center">No</td>
            <td align="center">Unknown</td>
            <td align="center">Unknown</td>
            <td align="left"> </td>
            <td align="center">X</td>
            <td align="center">only for unsigned zones</td>
          </tr>
        </tbody>
      </table>
      <t>The three headers on the left side of the table mean the following:</t>
      <dl newline="true">
        <dt>apex:</dt>
        <dd>
          <t>Whether the query is for the apex of the target zone.
"Yes" means an apex query, "No" means a query below the apex which may be delegated</t>
        </dd>
        <dt>support:</dt>
        <dd>
          <t>Whether or not the target authoritative server supports incremental deleg.
"Yes" means it supports it and "Unknown" means support is not detected.
"*" means it does not matter</t>
        </dd>
        <dt><tt>_deleg</tt>:</dt>
        <dd>
          <t>Whether or not the <tt>_deleg</tt> label is present in the target zone (and thus incremental delegations)</t>
        </dd>
      </dl>
      <t>On the right side of the table are the extra queries, to be sent in parallel with the legacy query.
The <tt>_deleg</tt> presence test query (most right column) only needs to be sent to unsigned target zones, because its non-existence will be show in the NSEC(3) records showing the non-existence of the incremental delegation (second from right column).</t>
      <t>If the query name is the same as the apex of the target zone, no extra queries need to be sent (Row 1).
If the <tt>_deleg</tt> label is known not to exist in the target zone (Row 2) or if the target name server is known to support incremental deleg (Row 3), no extra queries need to be sent.
Only if it is unknown that the target name server supports incremental deleg, and the <tt>_deleg</tt> label is known to exist in the target zone (Row 4) or it its not known whether or not the <tt>_deleg</tt> label exists (Row 5), and extra incremental deleg query is sent in parallel to the legacy query.
If the target zone is unsigned, presence of the <tt>_deleg</tt> label needs to be tested explicitly (Row 5).</t>
      <section anchor="comparison-with-legacy-delegations">
        <name>Comparison with legacy delegations</name>
      </section>
      <section anchor="comparison-with-name-dns-query-name-minimisation">
        <name>Comparison with Name DNS Query Name Minimisation</name>
      </section>
      <section anchor="comparison-with-i-ddnsop-deleg">
        <name>Comparison with <xref target="I-D.dnsop-deleg"/></name>
        <table>
          <name>Comparison of [I-D.dnsop-deleg] with [this document]</name>
          <thead>
            <tr>
              <th align="left">[I-D.dnsop-deleg]</th>
              <th align="left">[this document]</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Requires implementation in both authoritative name server as well as in the resolver</td>
              <td align="left">Only resolver implementation required. But optimized with updated authoritative software.</td>
            </tr>
            <tr>
              <td align="left">DNSKEY flag needed to signal DELEG support with all authoritative name servers that serve the parent (delegating) domain. Special requirements for the child domain.</td>
              <td align="left">No DNSKEY flag needed. Separation of concerns.</td>
            </tr>
            <tr>
              <td align="left">Authoritative name servers need to be updated all at once</td>
              <td align="left">Authoritative name servers may be updated gradually for optimization</td>
            </tr>
            <tr>
              <td align="left">New semantics about what is authoritative (BOGUS with current DNSSEC validators)</td>
              <td align="left">Works with current DNS and DNSSEC semantics. Easier to implement.</td>
            </tr>
            <tr>
              <td align="left">No extra queries</td>
              <td align="left">An extra query, in parallel to the legacy query, <em>per authoritative</em> server when incremental deleg support is not yet detected, and <em>per unsigned zone</em> to determine presence of the <tt>_deleg</tt> label</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
    <section anchor="implementation-status">
      <name>Implementation Status</name>
      <t><strong>Note to the RFC Editor</strong>: please remove this entire section before publication.</t>
      <t>Jesse van Zutphen has built a proof of concept implementation supporting delegations as specified in this document for the Unbound recursive resolver as part of his master thesis for the Security and Network Engineering master program of the University of Amsterdam. <xref target="JZUTPHEN"/>
The source code of his implementation is available on github <xref target="DELEG4UNBOUND"/></t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>Per <xref target="RFC8552"/>, IANA is requested to add the following entry to the DNS "Underscored and Globally Scoped DNS Node Names" registry:</t>
      <table>
        <name>Entry in the Underscored and Globally Scoped DNS Node Names registry</name>
        <thead>
          <tr>
            <th align="left">RR Type</th>
            <th align="left">_NODE NAME</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">SVCB</td>
            <td align="left">_deleg</td>
            <td align="left">[this document]</td>
          </tr>
        </tbody>
      </table>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <referencegroup anchor="STD13" target="https://www.rfc-editor.org/info/std13">
          <reference anchor="RFC1034" target="https://www.rfc-editor.org/info/rfc1034">
            <front>
              <title>Domain names - concepts and facilities</title>
              <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
              <date month="November" year="1987"/>
              <abstract>
                <t>This RFC is the revised basic definition of The Domain Name System. It obsoletes RFC-882. This memo describes the domain style names and their used for host address look up and electronic mail forwarding. It discusses the clients and servers in the domain name system and the protocol used between them.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="13"/>
            <seriesInfo name="RFC" value="1034"/>
            <seriesInfo name="DOI" value="10.17487/RFC1034"/>
          </reference>
          <reference anchor="RFC1035" target="https://www.rfc-editor.org/info/rfc1035">
            <front>
              <title>Domain names - implementation and specification</title>
              <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
              <date month="November" year="1987"/>
              <abstract>
                <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="13"/>
            <seriesInfo name="RFC" value="1035"/>
            <seriesInfo name="DOI" value="10.17487/RFC1035"/>
          </reference>
        </referencegroup>
        <reference anchor="RFC9460">
          <front>
            <title>Service Binding and Parameter Specification via the DNS (SVCB and HTTPS Resource Records)</title>
            <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
            <author fullname="M. Bishop" initials="M." surname="Bishop"/>
            <author fullname="E. Nygren" initials="E." surname="Nygren"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies the "SVCB" ("Service Binding") and "HTTPS" DNS resource record (RR) types to facilitate the lookup of information needed to make connections to network services, such as for HTTP origins. SVCB records allow a service to be provided from multiple alternative endpoints, each with associated parameters (such as transport protocol configuration), and are extensible to support future uses (such as keys for encrypting the TLS ClientHello). They also enable aliasing of apex domains, which is not possible with CNAME. The HTTPS RR is a variation of SVCB for use with HTTP (see RFC 9110, "HTTP Semantics"). By providing more information to the client before it attempts to establish a connection, these records offer potential benefits to both performance and privacy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9460"/>
          <seriesInfo name="DOI" value="10.17487/RFC9460"/>
        </reference>
        <reference anchor="RFC9461">
          <front>
            <title>Service Binding Mapping for DNS Servers</title>
            <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>The SVCB DNS resource record type expresses a bound collection of endpoint metadata, for use when establishing a connection to a named service. DNS itself can be such a service, when the server is identified by a domain name. This document provides the SVCB mapping for named DNS servers, allowing them to indicate support for encrypted transport protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9461"/>
          <seriesInfo name="DOI" value="10.17487/RFC9461"/>
        </reference>
        <reference anchor="RFC7858">
          <front>
            <title>Specification for DNS over Transport Layer Security (TLS)</title>
            <author fullname="Z. Hu" initials="Z." surname="Hu"/>
            <author fullname="L. Zhu" initials="L." surname="Zhu"/>
            <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="D. Wessels" initials="D." surname="Wessels"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
              <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7858"/>
          <seriesInfo name="DOI" value="10.17487/RFC7858"/>
        </reference>
        <reference anchor="RFC8484">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="RFC9250">
          <front>
            <title>DNS over Dedicated QUIC Connections</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>This document describes the use of QUIC to provide transport confidentiality for DNS. The encryption provided by QUIC has similar properties to those provided by TLS, while QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides more efficient packet-loss recovery than UDP. DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC 7858, and latency characteristics similar to classic DNS over UDP. This specification describes the use of DoQ as a general-purpose transport for DNS and includes the use of DoQ for stub to recursive, recursive to authoritative, and zone transfer scenarios.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9250"/>
          <seriesInfo name="DOI" value="10.17487/RFC9250"/>
        </reference>
        <reference anchor="RFC6672">
          <front>
            <title>DNAME Redirection in the DNS</title>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <author fullname="W. Wijngaards" initials="W." surname="Wijngaards"/>
            <date month="June" year="2012"/>
            <abstract>
              <t>The DNAME record provides redirection for a subtree of the domain name tree in the DNS. That is, all names that end with a particular suffix are redirected to another part of the DNS. This document obsoletes the original specification in RFC 2672 as well as updates the document on representing IPv6 addresses in DNS (RFC 3363). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6672"/>
          <seriesInfo name="DOI" value="10.17487/RFC6672"/>
        </reference>
        <reference anchor="RFC9156">
          <front>
            <title>DNS Query Name Minimisation to Improve Privacy</title>
            <author fullname="S. Bortzmeyer" initials="S." surname="Bortzmeyer"/>
            <author fullname="R. Dolmans" initials="R." surname="Dolmans"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="November" year="2021"/>
            <abstract>
              <t>This document describes a technique called "QNAME minimisation" to improve DNS privacy, where the DNS resolver no longer always sends the full original QNAME and original QTYPE to the upstream name server. This document obsoletes RFC 7816.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9156"/>
          <seriesInfo name="DOI" value="10.17487/RFC9156"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8767">
          <front>
            <title>Serving Stale Data to Improve DNS Resiliency</title>
            <author fullname="D. Lawrence" initials="D." surname="Lawrence"/>
            <author fullname="W. Kumari" initials="W." surname="Kumari"/>
            <author fullname="P. Sood" initials="P." surname="Sood"/>
            <date month="March" year="2020"/>
            <abstract>
              <t>This document defines a method (serve-stale) for recursive resolvers to use stale DNS data to avoid outages when authoritative nameservers cannot be reached to refresh expired data. One of the motivations for serve-stale is to make the DNS more resilient to DoS attacks and thereby make them less attractive as an attack vector. This document updates the definitions of TTL from RFCs 1034 and 1035 so that data can be kept in the cache beyond the TTL expiry; it also updates RFC 2181 by interpreting values with the high-order bit set as being positive, rather than 0, and suggests a cap of 7 days.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8767"/>
          <seriesInfo name="DOI" value="10.17487/RFC8767"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="DELEG4UNBOUND" target="https://github.com/jessevz/unbound/">
          <front>
            <title>A proof of concept implementation of incremental deleg</title>
            <author initials="J." surname="van Zutphen" fullname="Jesse van Zutphen">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="JZUTPHEN" target="https://nlnetlabs.nl/downloads/publications/extensible-deleg-in-resolvers_2024-07-08.pdf">
          <front>
            <title>Extensible delegations in DNS Recursive resolvers</title>
            <author initials="J." surname="van Zutphen" fullname="Jesse van Zutphen">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="I-D.ietf-tls-esni">
          <front>
            <title>TLS Encrypted Client Hello</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Windy Hill Systems, LLC</organization>
            </author>
            <author fullname="Kazuho Oku" initials="K." surname="Oku">
              <organization>Fastly</organization>
            </author>
            <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
              <organization>Cryptography Consulting LLC</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="4" month="March" year="2024"/>
            <abstract>
              <t>   This document describes a mechanism in Transport Layer Security (TLS)
   for encrypting a ClientHello message under a server public key.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/tlswg/draft-ietf-tls-esni
   (https://github.com/tlswg/draft-ietf-tls-esni).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-esni-18"/>
        </reference>
        <reference anchor="I-D.ietf-dnsop-ns-revalidation">
          <front>
            <title>Delegation Revalidation by DNS Resolvers</title>
            <author fullname="Shumon Huque" initials="S." surname="Huque">
              <organization>Salesforce</organization>
            </author>
            <author fullname="Paul A. Vixie" initials="P. A." surname="Vixie">
              <organization>SIE Europe, U.G.</organization>
            </author>
            <author fullname="Willem Toorop" initials="W." surname="Toorop">
              <organization>NLnet Labs</organization>
            </author>
            <date day="8" month="July" year="2024"/>
            <abstract>
              <t>   This document recommends improved DNS [RFC1034] [RFC1035] resolver
   behavior with respect to the processing of Name Server (NS) resource
   record (RR) sets (RRsets) during iterative resolution.  When
   following a referral response from an authoritative server to a child
   zone, DNS resolvers should explicitly query the authoritative NS
   RRset at the apex of the child zone and cache this in preference to
   the NS RRset on the parent side of the zone cut.  The (A and AAAA)
   address RRsets in the additional section from referral responses and
   authoritative NS answers for the names of the NS RRset, should
   similarly be re-queried and used to replace the entries with the
   lower trustworthiness ranking in cache.  Resolvers should also
   periodically revalidate the child delegation by re-querying the
   parent zone at the expiration of the TTL of the parent side NS RRset.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dnsop-ns-revalidation-07"/>
        </reference>
        <reference anchor="RFC9499">
          <front>
            <title>DNS Terminology</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
              <t>This document updates RFC 2308 by clarifying the definitions of "forwarder" and "QNAME". It obsoletes RFC 8499 by adding multiple terms and clarifications. Comprehensive lists of changed and new definitions can be found in Appendices A and B.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="219"/>
          <seriesInfo name="RFC" value="9499"/>
          <seriesInfo name="DOI" value="10.17487/RFC9499"/>
        </reference>
        <reference anchor="I-D.dnsop-deleg">
          <front>
            <title>Extensible Delegation for DNS</title>
            <author fullname="Tim April" initials="T." surname="April">
         </author>
            <author fullname="Petr Špaček" initials="P." surname="Špaček">
              <organization>Akamai Technologies</organization>
            </author>
            <author fullname="Ralf Weber" initials="R." surname="Weber">
              <organization>Akamai Technologies</organization>
            </author>
            <author fullname="David C Lawrence" initials="" surname="Lawrence">
              <organization>Salesforce</organization>
            </author>
            <date day="23" month="January" year="2024"/>
            <abstract>
              <t>   A delegation in the Domain Name System (DNS) is a mechanism that
   enables efficient and distributed management of the DNS namespace.
   It involves delegating authority over subdomains to specific DNS
   servers via NS records, allowing for a hierarchical structure and
   distributing the responsibility for maintaining DNS records.

   An NS record contains the hostname of the nameserver for the
   delegated namespace.  Any facilities of that nameserver must be
   discovered through other mechanisms.  This document proposes a new
   extensible DNS record type, DELEG, which contains additional
   information about the delegated namespace and the capabilities of
   authoritative nameservers for the delegated namespace.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-dnsop-deleg-00"/>
        </reference>
        <reference anchor="RFC8552">
          <front>
            <title>Scoped Interpretation of DNS Resource Records through "Underscored" Naming of Attribute Leaves</title>
            <author fullname="D. Crocker" initials="D." surname="Crocker"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>Formally, any DNS Resource Record (RR) may occur under any domain name. However, some services use an operational convention for defining specific interpretations of an RRset by locating the records in a DNS branch under the parent domain to which the RRset actually applies. The top of this subordinate branch is defined by a naming convention that uses a reserved node name, which begins with the underscore character (e.g., "_name"). The underscored naming construct defines a semantic scope for DNS record types that are associated with the parent domain above the underscored branch. This specification explores the nature of this DNS usage and defines the "Underscored and Globally Scoped DNS Node Names" registry with IANA. The purpose of this registry is to avoid collisions resulting from the use of the same underscored name for different services.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="222"/>
          <seriesInfo name="RFC" value="8552"/>
          <seriesInfo name="DOI" value="10.17487/RFC8552"/>
        </reference>
        <reference anchor="I-D.tapril-ns2">
          <front>
            <title>Parameterized Nameserver Delegation with NS2 and NS2T</title>
            <author fullname="Tim April" initials="T." surname="April">
              <organization>Akamai Technologies</organization>
            </author>
            <date day="13" month="July" year="2020"/>
            <abstract>
              <t>   Within the DNS, there is no mechanism for authoritative servers to
   advertise which transport methods they are capable of.  If secure
   transport methods are adopted by authoritative operators, transport
   signaling would be required to negotiate how authoritative servers
   would be contacted by resolvers.  This document provides two new
   Resource Record Types, NS2 and NS2T, to facilitate this negotiation
   by allowing zone owners to signal how the authoritative nameserver(s)
   for their zone(s) may accept queries.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-tapril-ns2-01"/>
        </reference>
      </references>
    </references>
    <?line 698?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The idea to utilize SVCB based RRs to signal capabilities was first proposed by Tim April in <xref target="I-D.tapril-ns2"/>.</t>
      <t>The idea to utilize SVCB for extensible delegations (and also the idea described in this document) emerged from the DNS Hackathon at the IETF 118.
The following participants contributed to this brainstorm session: Vandan Adhvaryu, Roy Arends, David Blacka, Manu Bretelle, Vladimír Čunát, Klaus Darilion, Peter van Dijk, Christian Elmerot, Bob Halley, Shumon Huque, Shane Kerr, David C Lawrence, Edward Lewis, George Michaelson, Erik Nygren, Libor Peltan, Ben Schwartz, Petr Špaček, Jan Včelák and Ralf Weber</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
