<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.17 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-homburg-deleg-incremental-deleg-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.22.0 -->
  <front>
    <title abbrev="incremental-deleg">Incrementally Deployable Extensible Delegation for DNS</title>
    <seriesInfo name="Internet-Draft" value="draft-homburg-deleg-incremental-deleg-01"/>
    <author fullname="Philip Homburg">
      <organization>NLnet Labs</organization>
      <address>
        <email>philip@nlnetlabs.nl</email>
      </address>
    </author>
    <author fullname="Tim Wicinski">
      <organization>Cox Communications</organization>
      <address>
        <email>tjw.ietf@gmail.com</email>
      </address>
    </author>
    <author fullname="Jesse van Zutphen">
      <organization>University of Amsterdam</organization>
      <address>
        <email>Jesse.vanZutphen@os3.nl</email>
      </address>
    </author>
    <author fullname="Willem Toorop">
      <organization>NLnet Labs</organization>
      <address>
        <email>willem@nlnetlabs.nl</email>
      </address>
    </author>
    <date year="2025" month="January" day="08"/>
    <area>int</area>
    <workgroup>DNS Delegation</workgroup>
    <keyword>Internet-Draft</keyword>
    <keyword>DNS</keyword>
    <keyword>Resolver</keyword>
    <keyword>Delegation</keyword>
    <keyword>Authoritative</keyword>
    <keyword>Deployable</keyword>
    <keyword>Extensible</keyword>
    <abstract>
      <?line 86?>

<t>This document proposes a mechanism for extensible delegations in the DNS.
The mechanism realizes delegations with resource record sets placed below a <tt>_deleg</tt> label in the apex of the delegating zone.
This authoritative delegation point can be aliased to other names using CNAME and DNAME.
This document proposes a new DNS resource record type, DELEG, which is based on the SVCB and inherits extensibility from it.</t>
      <t>Support in recursive resolvers suffices for the mechanism to be fully functional.
The number of subsequent interactions between the recursive resolver and the authoritative name servers is comparable with those for DNS Query Name Minimisation.
Additionally, but not required, support in the authoritative name servers enables optimized behavior with reduced (simultaneous) queries.
None, mixed or full deployment of the mechanism on authoritative name servers are all fully functional, allowing for the mechanism to be incrementally deployed.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-homburg-deleg-incremental-deleg/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        deleg Working Group mailing list (<eref target="mailto:dd@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/dd/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/dd/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/NLnetLabs/incremental-deleg"/>.</t>
    </note>
  </front>
  <middle>
    <?line 98?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document describes a delegation mechanism for the Domain Name System (DNS) <xref target="STD13"/> that addresses several matters that, at the time of writing, are suboptimally supported or not supported at all.
These matters are elaborated upon in sections <xref format="counter" target="signaling"/>, <xref format="counter" target="outsourcing"/> and <xref format="counter" target="dnssec-protection"/>.
In addition, the mechanism described in this document aspires to be maximally deployable, which is elaborated upon in <xref target="deployability"/>.</t>
      <section anchor="signaling">
        <name>Signaling capabilities of the authoritative name servers</name>
        <t>A new DELEG resource record (RR) type is introduced in this document, which is based on and inherits the wire and presentation format from SVCB <xref target="RFC9460"/>.
All Service Binding Mappings, as well as the capability signalling, that are specified in <xref target="RFC9461"/> are also applicable to DELEG, with the exception of the limitations on AliasMode records in <xref section="6" sectionFormat="of" target="RFC9460"/>.
Capability signalling of <xref target="RFC7858">DNS over Transport Layer Protocol</xref> (DoT), <xref target="RFC8484">DNS Queries over HTTPS</xref> and <xref target="RFC9250">DNS over Dedicated QUIC Connections</xref>, on default or alternative ports, can all be used as specified in <xref target="RFC9461"/>.
The DELEG RR type inherits its extensibility from the SVCB RR type, which is designed to be extensible to support future uses (such as keys for encrypting the TLS ClientHello <xref target="I-D.ietf-tls-esni"/>.)</t>
      </section>
      <section anchor="outsourcing">
        <name>Outsourcing operation of the delegation</name>
        <t>Delegation information is stored at an authoritative location in the zone with this mechanism.
Legacy methods to redirect this information to another location, possible under the control of another operator, such as (CNAME <xref section="3.6.2" sectionFormat="of" target="RFC1034"/>) and DNAME <xref target="RFC6672"/> remain functional.
One could even outsource all delegation operational practice to another party with an DNAME on the <tt>_deleg</tt> label on the apex of the delegating zone.</t>
        <t>Additional to the legacy methods, a delegation may be outsourced to a third parties by having RRs in AliasMode.
Unlike SVCB, DELEG allows for more than a single DELEG RR in AliasMode in a DELEG RRset, enabling outsourcing a delegation to multiple different operators.</t>
      </section>
      <section anchor="dnssec-protection">
        <name>DNSSEC protection of the delegation</name>
        <t>With legacy delegations, the NS RRset at the parent side of a delegation as well as glue records for the names in the NS RRset are not authoritative and not DNSSEC signed.
An adversary that is able to spoof a referral response, can alter this information and redirect all traffic for the delegation to a rogue name server undetected.
The adversary can then perceive all queries for the redirected zone (Privacy concern) and alter all unsigned parts of responses (such as further referrals, which is a Security concern).</t>
        <t>DNSSEC protection of delegation information prevents that, and is the only countermeasure that also works against on-path attackers.
At the time of writing, the only way to DNSSEC validate and verify delegations at all levels in the DNS hierarchy is to revalidate delegations <xref target="I-D.ietf-dnsop-ns-revalidation"/>, which is done after the fact and has other security concerns (<xref section="7" sectionFormat="of" target="I-D.ietf-dnsop-ns-revalidation"/>).</t>
        <t>Direct delegation information (provided by DELEG RRs in ServiceMode) includes the hostnames of the authoritative name servers for the delegation as well as IP addresses for those hostnames.
Since the information is stored authoritatively in the delegating zone, it will be DNSSEC signed if the zone is signed.
When the delegation is outsourced, then it's protected when the zones providing the aliasing resource records <em>and</em> the zones serving the targets of the aliases are all DNSSEC signed.</t>
      </section>
      <section anchor="deployability">
        <name>Maximize ease of deployment</name>
        <t>Delegation information is stored authoritatively within the delegation zone.
No semantic changes as to what zones are authoritative for what data are needed.
As a consequence, existing DNS software, such as authoritative name servers and DNSSEC signing software, can remain unmodified.
Unmodified authoritative name server software will serve the delegation information when queried for.
Unmodified signers will sign the delegation information in the delegating zone.
Only the recursive resolver needs modification to follow referrals as provided by the delegation information.</t>
        <t>Such a resolver would explicitly query for the delegations administered as specified in <xref target="delegation-administration"/>.
The number of round trips from the recursive resolver to the authoritative name server is comparable to what is needed for DNS Query Name Minimisation <xref target="RFC9156"/>.
Additional implementation in the authoritative name server optimizes resolution and reduces the number of simultaneous in parallel queries to that what would be needed for legacy delegations.
None, mixed or full deployment of the mechanism on authoritative name servers are all fully functional, allowing for the mechanism to be incrementally deployed on the authoritative name servers.</t>
        <t>Implementation in the recursive may be less demanding with respect to (among other things) DNSSEC validation because there is no need to make additional exceptions as to what is authoritative at the parent side of a delegation.</t>
      </section>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

<t>This document follows terminology as defined in <xref target="RFC9499"/>.</t>
        <t>Throughout this document we will also use terminology with the meaning as defined below:</t>
        <dl newline="true">
          <dt>Incremental deleg:</dt>
          <dd>
            <t>The delegation mechanism as specified in this document.</t>
          </dd>
          <dt>Incremental delegation:</dt>
          <dd>
            <t>A delegation as specified in this document</t>
          </dd>
          <dt>Legacy delegations:</dt>
          <dd>
            <t>The way delegations are done in the DNS traditionally as defined in <xref target="STD13"/>.</t>
          </dd>
          <dt>Delegating zone:</dt>
          <dd>
            <t>The zone in which the delegation is administered.
Sometimes also called the "parent zone" of a delegation.</t>
          </dd>
          <dt>Subzone:</dt>
          <dd>
            <t>The zone that is delegated to from the delegating zone.</t>
          </dd>
          <dt>Delegating name:</dt>
          <dd>
            <t>The name which realizes the delegation.
In legacy delegations, this name is the same as the name of the subzone to which the delegation refers.
Delegations described in this document are provided with a different name than the zone that is delegated to.</t>
          </dd>
          <dt>Delegation point:</dt>
          <dd>
            <t>The location in the delegating zone where the RRs are provided that make up the delegation.
In legacy delegations, this is the parent side of the zone cut and has the same name as the subzone.
With incremental deleg, this is the location given by the delegating name.</t>
          </dd>
          <dt>Triggering query:</dt>
          <dd>
            <t>The query on which resolution a recursive resolver is working.</t>
          </dd>
          <dt>Target zone:</dt>
          <dd>
            <t>The zone for which the authoritative servers, that a resolver contacts while iterating, are authoritative.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="the-deleg-resource-record-type">
      <name>The DELEG resource record type</name>
      <t>The DELEG RR type is a variant of SVCB <xref target="RFC9460"/> for use with resolvers to perform iterative resolution (<xref section="5.3.3" sectionFormat="of" target="RFC1034"/>).
The DELEG type requires registration in the "Resource Record (RR) TYPEs" registry under the "Domain Name System (DNS) Parameters" registry group (see <xref target="deleg-rr-type">DELEG RR type</xref>).
The protocol-specific mapping specification for iterative resolutions are the same as those for "DNS Servers" <xref target="RFC9461"/>.</t>
      <t><xref section="2.4.2" sectionFormat="of" target="RFC9460"/> states that SVCB RRsets <bcp14>SHOULD</bcp14> only have a single RR in AliasMode, and that if multiple AliasMode RRs are present, clients or recursive resolvers <bcp14>SHOULD</bcp14> pick one at random.
Different from SVCB (<xref section="2.4.2" sectionFormat="of" target="RFC9460"/>), DELEG allows for multiple AliasMode RRs to be present in a single DELEG RRset.
Note however that the target of a DELEG RR in AliasMode is an SVCB RRset for the "dns" service type adhering fully to the Service Binding Mapping for DNS Servers as specified in <xref target="RFC9461"/>.</t>
      <t><xref section="2.4.1" sectionFormat="of" target="RFC9460"/> states that within an SVCB RRset, all RRs <bcp14>SHOULD</bcp14> have the same mode, and that if an RRset contains a record in AliasMode, the recipient <bcp14>MUST</bcp14> ignore any ServiceMode records in the set.
Different from SVCB, mixed ServiceMode and AliasMode RRs are allowed in a DELEG RRset.</t>
      <!-- TODO: Describe how priorities work; First pick one AliasMode or all ServiceModeo RRs from within the DELEG RRset; Then within resulting SVCB or DELEG in ServiceMode RRset adhere to ServicePriority) -->

<t>At the delegation point (for example <tt>customer._deleg.example.</tt>), the host names of the authoritative name servers for the subzone, are given in the TargetName RDATA field of DELEG records in ServiceMode.
Port Prefix Naming <xref section="3" sectionFormat="of" target="RFC9461"/> is not used at the delegation point, but <bcp14>MUST</bcp14> be used when resolving the aliased to name servers with DELEG RRs in AliasMode.</t>
    </section>
    <section anchor="delegation-administration">
      <name>Delegation administration</name>
      <t>An extensible delegation is realized with a DELEG Resource Record set (RRset) <xref target="RFC9460"/> below a specially for the purpose reserved label with the name <tt>_deleg</tt> at the apex of the delegating zone.
The <tt>_deleg</tt> label scopes the interpretation of the DELEG records and requires registration in the "Underscored and Globally Scoped DNS Node Names" registry (see <xref target="node-name">_deleg Node Name</xref>).
The full scoping of delegations includes the labels that are <strong>below</strong> the <tt>_deleg</tt> label and those, together with the name of the delegating domain, make up the name of the subzone to which the delegation refers.
For example, if the delegating zone is <tt>example.</tt>, then a delegation to subzone <tt>customer.example.</tt> is realized by a DELEG RRset at the name <tt>customer._deleg.example.</tt> in the parent zone.
A fully scoped delegating name (such as <tt>customer._deleg.example.</tt>) is referred to further in this document as the "delegation point".</t>
      <t>Note that if the delegation is outsourcing to a single operator represented in a single DELEG RR, it is <bcp14>RECOMMENDED</bcp14> to refer to the name of the operator's DELEG RRset with a CNAME on the delegation point instead of a DELEG RR in AliasMode <xref section="10.2" sectionFormat="of" target="RFC9460"/>.</t>
      <section anchor="examples">
        <name>Examples</name>
        <section anchor="one-name-server-within-the-subzone">
          <name>One name server within the subzone</name>
          <figure anchor="zone-within">
            <name>One name server within the subzone</name>
            <sourcecode type="~"><![CDATA[
$ORIGIN example.
@                  IN  SOA   ns zonemaster ...
customer1._deleg   IN  DELEG 1 ( ns.customer1
                                 ipv4hint=198.51.100.1,203.0.113.1
                                 ipv6hint=2001:db8:1::1,2001:db8:2::1
                               )
]]></sourcecode>
          </figure>
        </section>
        <section anchor="two-name-servers-within-the-subzone">
          <name>Two name servers within the subzone</name>
          <figure anchor="zones-within">
            <name>Two name servers within the subzone</name>
            <artwork><![CDATA[
$ORIGIN example.
@                  IN  SOA   ns zonemaster ...
customer2._deleg   IN  DELEG 1 ns1.customer2 ( ipv4hint=198.51.100.1
                                               ipv6hint=2001:db8:1::1
                                             )
                   IN  DELEG 1 ns2.customer2 ( ipv4hint=203.0.113.1
                                               ipv6hint=2001:db8:2::1
                                             )
]]></artwork>
          </figure>
        </section>
        <section anchor="outsourced-to-an-operator">
          <name>Outsourced to an operator</name>
          <figure anchor="outsourced-cname">
            <name>Outsourced with CNAME</name>
            <artwork><![CDATA[
$ORIGIN example.
@                  IN  SOA   ns zonemaster ...
customer3._deleg   IN  CNAME _dns.ns.operator1
]]></artwork>
          </figure>
          <t>Instead of using CNAME, the outsourcing could also been accomplished with a DELEG RRset with a single DELEG RR in AliasMode.
The configuration below is operationally equivalent to the CNAME configuration above.
It is <bcp14>RECOMMENDED</bcp14> to use a CNAME over a DELEG RRset with a single DELEG RR in AliasMode (<xref section="10.2" sectionFormat="of" target="RFC9460"/>).
Note that a DELEG RRset refers with TargetName to an DNS service, which will be looked up using Port Prefix Naming <xref section="3" sectionFormat="of" target="RFC9461"/>, but that CNAME refers to the domain name of the target DELEG RRset (or CNAME) which may have an <tt>_dns</tt> prefix.</t>
          <figure anchor="outsourced-svcb">
            <name>Outsourced with an AliasMode DELEG RR</name>
            <artwork><![CDATA[
$ORIGIN example.
@                  IN  SOA   ns zonemaster ...
customer3._deleg   IN  DELEG 0 ns.operator1
]]></artwork>
          </figure>
          <t>The operator DELEG RRset could for example be:</t>
          <figure anchor="operator-zone">
            <name>Operator zone</name>
            <artwork><![CDATA[
$ORIGIN operator1.example.
@                  IN  SOA   ns zonemaster ...
_dns.ns            IN  DELEG 1 ns ( alpn=h2,dot,h3,doq
                                    ipv4hint=192.0.2.1
                                    ipv6hint=2001:db8:3::1
                                    dohpath=/q{?dns}
                                  )
                   IN  DELEG 2 ns ( ipv4hint=192.0.2.2
                                    ipv6hint=2001:db8:3::2
                                  )
ns                 IN  AAAA  2001:db8:3::1
                   IN  AAAA  2001:db8:3::2
                   IN  A     192.0.2.1
                   IN  A     192.0.2.2
]]></artwork>
          </figure>
        </section>
        <section anchor="dnssec-signed-name-servers-within-the-subzone">
          <name>DNSSEC signed name servers within the subzone</name>
          <figure anchor="dnssec-zone">
            <name>DNSSEC signed incremental deleg zone</name>
            <artwork><![CDATA[
$ORIGIN
@                 IN  SOA    ns zonemaster ...
                  IN  RRSIG  SOA ...
                  IN  DNSKEY 257 3 15 ...
                  IN  RRSIG  DNSKEY ...
                  IN  NS     ns.example.
                  IN  NSEC   customer5._deleg SOA RRSIG NSEC DNSKEY
                  IN  RRSIG  NSEC ...

customer5._deleg  IN  DELEG 1 ns.customer5 alpn=h2,h3 (
                                            ipv4hint=198.51.100.5
                                            ipv6hint=2001:db8:5::1
                                            dohpath=/dns-query{?dns}
                                            )
                  IN  RRSIG  DELEG ...
                  IN  NSEC   customer7._deleg RRSIG NSEC DELEG
                  IN  RRSIG  NSEC ...

customer7._deleg  IN  CNAME  customer5._deleg
                  IN  RRSIG  CNAME ...
                  IN  NSEC   customer5 CNAME RRSIG NSEC
                  IN  RRSIG  NSEC ...

customer5         IN  NS     ns.customer5
ns.customer5      IN  A      198.51.100.5
                  IN  AAAA   2001:db8:5::1
customer5         IN  DS     17405 15 2 ...
                  IN  RRSIG  DS ...
                  IN  NSEC   customer6 NS DS RRSIG NSEC
                  IN  RRSIG  NSEC ...

customer6         IN  NS     ns.customer6
ns.customer6      IN  A      203.0.113.1
                  IN  AAAA   2001:db8:6::1
customer6         IN  DS     ...
                  IN  RRSIG  DS ...
                  IN  NSEC   customer7 NS DS RRSIG NSEC
                  IN  RRSIG  NSEC ...

customer7         IN  NS     ns.customer5
                  IN  DS     ...
                  IN  RRSIG  DS ...
                  IN  NSEC   example. NS DS RRSIG NSEC
                  IN  RRSIG  NSEC ...
]]></artwork>
          </figure>
          <t><tt>customer5.example.</tt> is delegated to in an extensible way and <tt>customer6.example.</tt> is delegated only in a legacy way.
<tt>customer7.example.</tt>'s delegation is outsourced to customer5's delegation.</t>
          <t>The delegation signals that the authoritative name server supports DoH.
<tt>customer5.example.</tt>, <tt>customer6.example.</tt> and <tt>example.</tt> are all DNSSEC signed.
The DNSSEC authentication chain links from <tt>example.</tt> to <tt>customer5.example.</tt> in the for DNSSEC conventional way with the signed <tt>customer5.example. DS</tt> RRset in the <tt>example.</tt> zone.
Also, <tt>customer6.example.</tt> is linked to from <tt>example.</tt> with the signed <tt>customer6.example. DS</tt> RRset in the <tt>example.</tt> zone.</t>
          <t>Note that both <tt>customer5.example.</tt> and <tt>customer6.example.</tt> have legacy delegations in the zone as well.
It is important to have those legacy delegations to maintain support for legacy resolvers, that do not support incremental deleg.
DNSSEC signers <bcp14>SHOULD</bcp14> construct the NS RRset and glue for the legacy delegation from the DELEG RRset.</t>
        </section>
      </section>
    </section>
    <section anchor="minimal-implementation">
      <name>Minimal implementation</name>
      <t>Support in recursive resolvers suffices for the mechanism to be fully functional.
<xref target="recursive-resolver-behavior"/> specifies the basic algorithm for resolving incremental delegations.
In <xref target="presence"/>, an optimization is presented that will reduce the number of (parallel) queries especially for when authoritative name server support is still lacking and there are still many zones that do not contain incremental delegations.</t>
      <section anchor="recursive-resolver-behavior">
        <name>Recursive Resolver behavior</name>
        <t>If the triggering query name is the same as the name of the target zone apex, then no further delegation will occur, and resolution will complete.
No special behavior or processing is needed.</t>
        <t>Otherwise, the triggering query is below the target zone apex and a delegation may exist in the target zone.
In this case two parallel queries <bcp14>MUST</bcp14> be sent.
One for the triggering query in the way that is conventional with legacy delegations (which could be just the triggering query or a minimised query <xref target="RFC9156"/>), and one <em>incremental deleg query</em> with query type DELEG.</t>
        <t>The incremental deleg query name is constructed by concatenating the first label below the part that the triggering query name has in common with the target zone, a <tt>_deleg</tt> label and the name of the target zone.
For example if the triggering query is <tt>www.customer.example.</tt> and the target zone <tt>example.</tt>, then the incremental deleg query name is <tt>customer._deleg.example.</tt>
For another example, if the triggering query is <tt>www.faculty.university.example.</tt> and the target zone <tt>example.</tt> then the incremental deleg name is <tt>university._deleg.example.</tt></t>
        <t>Normal DNAME, CNAME and DELEG in AliasMode processing should happen as before, though note that when following a DELEG RR in AliasMode the target RR type is SVCB (see <xref target="the-deleg-resource-record-type"/>).
The eventual incremental deleg query response, after following all redirections caused by DNAME, CNAME and AliasMode DELEG RRs, has three possible outcomes:</t>
        <ol spacing="normal" type="1"><li>
            <t>A DELEG RRset in ServiceMode is returned in the response's answer section containing the delegation for the subzone.  </t>
            <t>
The DELEG RRs in the RRset <bcp14>MUST</bcp14> be used to follow the referral.
The TargetName data field in the DELEG RRs in the RRset <bcp14>MUST</bcp14> be used as the names for the name servers to contact for the subzone, and the ipv4hint and ipv6hint parameters <bcp14>MUST</bcp14> be used as the IP addresses for the TargetName in the same DELEG RR.  </t>
            <t>
The NS RRset and glue, in the response of the legacy query that was sent in parallel to the incremental deleg query, <bcp14>MUST NOT</bcp14> be used, but the signed DS record (or NSEC(3) records indicating that there was no DS) <bcp14>MUST</bcp14> be used in linking the DNSSEC authentication chain as which would conventionally be done with DNSSEC as well.</t>
          </li>
          <li>
            <t>The incremental deleg query name does not exist (NXDOMAIN).  </t>
            <t>
There is no incremental delegation for the subzone, and the referral response for the legacy delegation <bcp14>MUST</bcp14> be processed  as would be done with legacy DNS and DNSSEC processing.</t>
          </li>
          <li>
            <t>The incremental deleg query name does exist, but resulted in a NOERROR no answer response (also known as a NODATA response).  </t>
            <t>
If the legacy query, did result in a referral for the same number of labels as the subdomain that the incremental deleg query was for, then there was no incremental delegation for the subzone, and the referral response for the legacy delegation <bcp14>MUST</bcp14> be processed as would be done with legacy DNS and DNSSEC processing.  </t>
            <t>
Otherwise, the subzone may be more than one label below the delegating zone.  </t>
            <t>
If the response to the legacy query resulted in a referral, then a new incremental deleg query <bcp14>MUST</bcp14> be spawned, matching the zone cut of the legacy referral response.
For example if the triggering query is <tt>www.university.ac.example.</tt> and the target zone <tt>example.</tt>, and the legacy response contained an NS RRset for <tt>university.ac.example.</tt>, then the incremental deleg query name is <tt>university.ac._deleg.example.</tt>
The response to the new incremental deleg query <bcp14>MUST</bcp14> be processed as described above, as if it was the initial incremental deleg query.  </t>
            <t>
If the legacy query was sent minimised and needs a followup query, then parallel to that followup query a new incremental deleg query will be sent, adding a single label to the previous incremental deleg query name.
For example if the triggering query is <tt>www.university.ac.example.</tt> and the target zone is <tt>example.</tt> and the minimised legacy query name is <tt>ac.example.</tt> (which also resulted in a NOERROR no answer response), then the incremental deleg query to be sent along in parallel with the followup legacy query will become <tt>university.ac.example.</tt>
Processing of the responses of those two new queries will be done as described above.</t>
          </li>
        </ol>
      </section>
      <section anchor="presence">
        <name><tt>_deleg</tt> label presence</name>
        <t>Absence of the <tt>_deleg</tt> label in a zone is a clear signal that the zone does not contain any incremental deleg delegations.
Recursive resolvers <bcp14>SHOULD NOT</bcp14> send any additional incremental deleg queries for zones for which it is known that it does not contain the <tt>_deleg</tt> label at the apex.
The state regarding the presence of the <tt>_deleg</tt> label within a resolver can be "unknown", "known not to be present", or "known to be present".</t>
        <t>The state regarding the presence of the <tt>_deleg</tt> label can be deduced from the response of the incremental deleg query, if the target zone is signed with DNSSEC.
If the target zone is unsigned, the procedure as described in the remainder of this section <bcp14>SHOULD</bcp14> be followed.</t>
        <t>When the presence of a <tt>_deleg</tt> label is "unknown", a <tt>_deleg</tt> presence test query <bcp14>SHOULD</bcp14> be sent in parallel to the next query for the unsigned target zone (though not when the target name server is known to support incremental deleg, which will be discussed in <xref target="authoritative-name-server-support"/>).
The query name for the test query is the <tt>_deleg</tt> label prepended to the apex of zone for which to test presence, with query type A.</t>
        <t>The testing query can have three possible outcomes:</t>
        <ol spacing="normal" type="1"><li>
            <t>The <tt>_deleg</tt> label does not exist within the zone, and an NXDOMAIN response is returned.  </t>
            <t>
The non-existence of the <tt>_deleg</tt> label <bcp14>MUST</bcp14> be cached for the duration indicated by the "minimum" RDATA field of the SOA resource record in the authority section, adjusted to the boundaries for TTL values that the resolver has (<xref section="4" sectionFormat="of" target="RFC8767"/>).
For the period the non-existence of the <tt>_deleg</tt> label is cached, the label is "known not to be present" and the resolver <bcp14>SHOULD NOT</bcp14> send any (additional) incremental deleg queries.</t>
          </li>
          <li>
            <t>The <tt>_deleg</tt> label does exist within the zone but contains no data.
A NOERROR response is returned with no RRs in the answer section.  </t>
            <t>
The existence of the <tt>_deleg</tt> name <bcp14>MUST</bcp14> be cached for the duration indicated by the "minimum" RDATA field of the SOA resource record in the authority section, adjusted to the resolver's TTL boundaries.
For the period the existence of the empty non-terminal at the <tt>_deleg</tt> label is cached, the label is "known to be present" and the resolver <bcp14>MUST</bcp14> send additional incremental deleg queries as described in TODO.</t>
          </li>
          <li>
            <t>The <tt>_deleg</tt> label does exist within the zone and contains data.
A NOERROR response is return with an A RRset in the answer section.  </t>
            <t>
The resolver <bcp14>MUST</bcp14> record that the <tt>_deleg</tt> label is known to be present for a duration indicated by A RRset's TTL value, adjusted to the resolver's TTL boundaries, for example by caching the RRset.
For the period any RRset at the <tt>_deleg</tt> label is cached, the label is "known to be present" and the resolver <bcp14>MUST</bcp14> send additional incremental deleg queries as described in TODO.</t>
          </li>
        </ol>
      </section>
    </section>
    <section anchor="optimized-implementation">
      <name>Optimized implementation</name>
      <t>Support for authoritative name servers enables optimized query behavior by resolvers with reduced (simultaneous) queries.
<xref target="authoritative-name-server-support"/> specifies how incremental deleg supporting authoritative name servers return referral responses for delegations.
In <xref target="behavior-with-auth-support"/> we specify how resolvers can benefit from those authoritative servers.</t>
      <section anchor="authoritative-name-server-support">
        <name>Authoritative name server support</name>
        <t>Incremental delegations supporting authoritative name servers include the incremental delegation information (or the NSEC(3) records showing the non-existence) in the authority section of referral responses to legacy DNS queries.
For example, querying the zone from <xref target="dnssec-zone"/> for <tt>www.customer5.example. A</tt>, will return the following referral response:</t>
        <figure anchor="deleg-response">
          <name>An incremental deleg referral response</name>
          <artwork><![CDATA[
;; ->>HEADER<<- opcode: QUERY, rcode: NOERROR, id: 54349
;; flags: qr ; QUERY: 1, ANSWER: 0, AUTHORITY: 5, ADDITIONAL: 2
;; QUESTION SECTION:
;; www.customer5.example.       IN      A

;; ANSWER SECTION:

;; AUTHORITY SECTION:
customer5.example.      3600    IN      NS      ns.customer5.example.
customer5.example.      3600    IN      DS      ...
customer5.example.      3600    IN      RRSIG   DS ...
customer5._deleg.example.       3600    IN      DELEG 1 (
                ns.customer5.example. alpn=h2,h3
                ipv4hint=198.51.100.5 ipv6hint=2001:db8:5::1
                dohpath=/dns-query{?dns}
                )
customer5._deleg.example.       3600    IN      RRSIG   DELEG ...

;; ADDITIONAL SECTION:
ns.customer5.example.   3600    IN      A       198.51.100.5
ns.customer5.example.   3600    IN      AAAA    2001:db8:5::1

;; Query time: 0 msec
;; EDNS: version 0; flags: do ; udp: 1232
;; SERVER: 192.0.2.53
;; WHEN: Mon Jul  1 20:36:25 2024
;; MSG SIZE  rcvd: 456
]]></artwork>
        </figure>
        <t>The referral response in <xref target="deleg-response"/> includes the signed DELEG RRset in the authority section.</t>
        <t>As another example, querying the zone from <xref target="dnssec-zone"/> for <tt>www.customer6.example. A</tt>, will return the following referral response:</t>
        <figure anchor="no-incr-deleg-response">
          <name>Referral response without incremental deleg</name>
          <artwork><![CDATA[
;; ->>HEADER<<- opcode: QUERY, rcode: NOERROR, id: 36574
;; flags: qr ; QUERY: 1, ANSWER: 0, AUTHORITY: 9, ADDITIONAL: 2
;; QUESTION SECTION:
;; www.customer6.example.       IN      A

;; ANSWER SECTION:

;; AUTHORITY SECTION:
customer6.example.      3600    IN      NS      ns.customer6.example.
customer6.example.      3600    IN      DS      ...
customer6.example.      3600    IN      RRSIG   DS ...
customer5._deleg.example.       1234    IN      NSEC    (
                customer7._deleg.example.  RRSIG NSEC DELEG )
customer5._deleg.example.       1234    IN      RRSIG   NSEC ...
example.        1234    IN      NSEC    (
                customer5._deleg.example.  NS SOA RRSIG NSEC DNSKEY )
example.        1234    IN      RRSIG   NSEC ...

;; ADDITIONAL SECTION:
ns.customer6.example.   3600    IN      A       203.0.113.1
ns.customer6.example.   3600    IN      AAAA    2001:db8:6::1

;; Query time: 0 msec
;; EDNS: version 0; flags: do ; udp: 1232
;; SERVER: 192.0.2.53
;; WHEN: Tue Jul  2 10:23:53 2024
;; MSG SIZE  rcvd: 744
]]></artwork>
        </figure>
        <t>Next to the legacy delegation, the incremental deleg supporting authoritative returns the NSEC(3) RRs needed to show that there was no incremental delegation in the referral response in <xref target="no-incr-deleg-response"/>.</t>
        <t>Querying the zone from <xref target="dnssec-zone"/> for <tt>www.customer7.example. A</tt>, will return the following referral response:</t>
        <figure anchor="alias-response">
          <name>Aliasing referral response</name>
          <artwork><![CDATA[
;; ->>HEADER<<- opcode: QUERY, rcode: NOERROR, id: 9456
;; flags: qr ; QUERY: 1, ANSWER: 0, AUTHORITY: 7, ADDITIONAL: 2
;; QUESTION SECTION:
;; www.customer7.example.       IN      A

;; ANSWER SECTION:

;; AUTHORITY SECTION:
customer7.example.      3600    IN      NS      ns.customer5.example.
customer7.example.      3600    IN      DS      ...
customer7.example.      3600    IN      RRSIG   DS ...
customer7._deleg.example.       3600    IN      CNAME   (
                customer5._deleg.example. )
customer7._deleg.example.       3600    IN      RRSIG   CNAME ...
customer5._deleg.example.       3600    IN      DELEG   1 (
                ns.customer5.example. alpn=h2,h3
                ipv4hint=198.51.100.5 ipv6hint=2001:db8:5::1 )
customer5._deleg.example.       3600    IN      RRSIG   DELEG ...

;; ADDITIONAL SECTION:
ns.customer5.example.   3600    IN      A       198.51.100.5
ns.customer5.example.   3600    IN      AAAA    2001:db8:5::1

;; Query time: 0 msec
;; EDNS: version 0; flags: do ; udp: 1232
;; SERVER: 192.0.2.53
;; WHEN: Tue Jul  2 10:55:07 2024
;; MSG SIZE  rcvd: 593
]]></artwork>
        </figure>
        <t>The incremental delegation of <tt>customer7.example.</tt> is aliased to the one that is also used by <tt>customer5.example.</tt>
Since both delegations are in the same zone, the authoritative name server for <tt>example.</tt> returns both the CNAME realising the alias, as well as the DELEG RRset which is the target of the alias in <xref target="alias-response"/>.
In other cases an returned CNAME or DELEG RR in AliasMode may need further chasing by the resolver.
<!-- TODO: Add an AliasMode referral without expansion within the zone -->
        </t>
        <t>With unsigned zones, only if an incremental deleg delegation exists, the DELEG RRset (or CNAME) will be present in the authority section of referral responses.
<!-- TODO: Add a referral response for an unsigned zone -->
If the incremental deleg does not exist, then it is simply absent from the authority section and the referral response is indistinguishable from an non supportive authoritative.
<!-- TODO: Add a non incremental deleg referral response for an unsigned zone -->
        </t>
      </section>
      <section anchor="behavior-with-auth-support">
        <name>Resolver behavior with authoritative name server support</name>
        <t>Incremental deleg supporting authoritative name servers will include the incremental delegation information (or the NSEC(3) records showing the non-existence) in the authority section of referral responses.
If it is known that an authoritative name server supports incremental deleg, then no direct queries for the incremental delegation need to be send in parallel to the legacy delegation query.
A resolver <bcp14>SHOULD</bcp14> register that an authoritative name server supports incremental deleg when the authority section, of the returned referral responses from that authoritative name server, contains incremental delegegation information.</t>
        <t>When the authority section of a referral response contains a DELEG RRset or a CNAME on the incremental delegation name, or valid NSEC(3) RRs showing the non-existence of such DELEG or CNAME RRset, then the resolver <bcp14>SHOULD</bcp14> register that the contacted authoritative name server supports incremental deleg for the duration indicated by the TTL for that DELEG, CNAME or NSEC(3) RRset, adjusted to the resolver's TTL boundaries, but only if it is longer than any already registered duration.
Subsequent queries <bcp14>SHOULD NOT</bcp14> include incremental deleg queries, as described in <xref target="recursive-resolver-behavior"/>, to be send in parallel for the duration support for incremental deleg is registered for the authoritative name server.</t>
        <t>For example, in <xref target="deleg-response"/>, the DELEG RRset at the incremental delegation point has TTL 3600.
The resolver should register that the contacted authoritative name server supports incremental deleg for (at least) 3600 seconds (one hour).
All subsequent queries to that authoritative name server <bcp14>SHOULD NOT</bcp14> include incremental deleg queries to be send in parallel.</t>
        <t>If the authority section contains more than one RRset making up the incremental delegation, then the RRset with the longest TTL <bcp14>MUST</bcp14> be taken to determine the duration for which incremental deleg support is registered.</t>
        <t>For example, in <xref target="alias-response"/>, both a CNAME and a DELEG RRset for the incremental delegation are included in the authority section.
The longest TTL must be taken for incremental support registration, though because the TTL of both RRsets is 3600, it does not matter in this case.</t>
        <t>With DNSSEC signed zones, support is apparent with all referral responses, with unsigned zones only from referral responses for which a incremental delegation exists.</t>
        <t>If the resolver knows that the authoritative name server supports incremental deleg, <em>and</em> a DNSSEC signed zone is being served, then all referrals <bcp14>MUST</bcp14> contain either an incremental delegation, or NSEC(3) records showing that the delegation does not exist.
If a referral is returned that does not contain an incremental delegation nor an indication that it does not exist, then the resolver <bcp14>MUST</bcp14> send an additional incremental deleg query to find the incremental delegation (or denial of its existence).</t>
      </section>
    </section>
    <section anchor="extra-optimized-implementation">
      <name>Extra optimized implementation</name>
      <t>A DELEG RRset on an incremental delegation point, with a DELEG RR in AliasMode, aliasing to the root zone, <bcp14>MUST</bcp14> be interpreted to mean that the legacy delegation information <bcp14>MUST</bcp14> be used to follow the referral.
All service parameters for such AliasMode (aliasing to the root) DELEG RRs on the incremental delegation point, <bcp14>MUST</bcp14> be ignored.</t>
      <t>For example, such a DELEG RRset registered on the wildcard below the <tt>_deleg</tt> label on the apex of a zone, can signal that legacy DNS referrals <bcp14>MUST</bcp14> be used for both signed and <em>unsigned</em> zones:</t>
      <figure anchor="wildcard-deleg">
        <name>Wildcard incremental deleg to control duration of detected support</name>
        <artwork><![CDATA[
$ORIGIN example.
@                  IN  SOA   ns zonemaster ...
*._deleg    86400  IN  DELEG 0 .
customer1._deleg   IN  DELEG 1 ( ns.customer1
                                 ipv4hint=198.51.100.1,203.0.113.1
                                 ipv6hint=2001:db8:1::1,2001:db8:2::1
                               )
customer3._deleg   IN  CNAME _dns.ns.operator1
]]></artwork>
      </figure>
      <t>Resolvers <bcp14>SHOULD</bcp14> register that an authoritative name server supports incremental deleg, if such a DELEG RRset is returned in the authority section of referral responses, for the duration of the TTL if the DELEG RRset, adjusted to the resolver's TTL boundaries, but only if it is longer than any already registered duration.
Note that this will also be included in referral responses for unsigned zones, which would otherwise not have signalling of incremental deleg support by the authoritative name server.
Also, signed zones need fewer RRs to indicate that no incremental delegation exists.
The wildcard expansion already shows the closest encloser (i.e. <tt>_deleg.&lt;apex&gt;</tt>), so only one additional NSEC(3) is needed to show non-existence of the queried for name below the closest encloser.</t>
      <t>This method of signalling that the legacy delegation <bcp14>MUST</bcp14> be used, is <bcp14>RECOMMENDED</bcp14>.</t>
    </section>
    <section anchor="priming-queries">
      <name>Priming queries</name>
      <t>Some zones, such as the root zone, are targeted directly from hints files.
Information about which authoritative name servers and with capabilities, <bcp14>MAY</bcp14> be provided in a DELEG RRset directly at the <tt>_deleg</tt> label under the apex of the zone.
Priming queries from a incremental deleg supporting resolver, <bcp14>MUST</bcp14> send an <tt>_deleg.&lt;apex&gt; DELEG</tt> query in parallel to the legacy <tt>&lt;apex&gt; NS</tt> query and process the content as if it was found through an incremental referral response.</t>
    </section>
    <section anchor="comparison-with-other-delegation-mechanisms">
      <name>Comparison with other delegation mechanisms</name>
      <t>Table <xref target="xtraqueries"/> provides an overview of when extra queries, in parallel to the legacy query, are sent.</t>
      <table anchor="xtraqueries">
        <name>Additional queries in parallel to the legacy query</name>
        <thead>
          <tr>
            <th align="center"> </th>
            <th align="center">apex</th>
            <th align="center">support</th>
            <th align="center">_deleg</th>
            <th align="left"> </th>
            <th align="center">&lt;sub&gt;._deleg.&lt;apex&gt; DELEG</th>
            <th align="center">_deleg.&lt;apex&gt; A</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="center">1</td>
            <td align="center">Yes</td>
            <td align="center">*</td>
            <td align="center">*</td>
            <td align="left"> </td>
            <td align="center"> </td>
            <td align="center"> </td>
          </tr>
          <tr>
            <td align="center">2</td>
            <td align="center">No</td>
            <td align="center">*</td>
            <td align="center">No</td>
            <td align="left"> </td>
            <td align="center"> </td>
            <td align="center"> </td>
          </tr>
          <tr>
            <td align="center">3</td>
            <td align="center">No</td>
            <td align="center">Yes</td>
            <td align="center">*</td>
            <td align="left"> </td>
            <td align="center"> </td>
            <td align="center"> </td>
          </tr>
          <tr>
            <td align="center">4</td>
            <td align="center">No</td>
            <td align="center">Unknown</td>
            <td align="center">Yes</td>
            <td align="left"> </td>
            <td align="center">X</td>
            <td align="center"> </td>
          </tr>
          <tr>
            <td align="center">5</td>
            <td align="center">No</td>
            <td align="center">Unknown</td>
            <td align="center">Unknown</td>
            <td align="left"> </td>
            <td align="center">X</td>
            <td align="center">only for unsigned zones</td>
          </tr>
        </tbody>
      </table>
      <t>The three headers on the left side of the table mean the following:</t>
      <dl newline="true">
        <dt>apex:</dt>
        <dd>
          <t>Whether the query is for the apex of the target zone.
"Yes" means an apex query, "No" means a query below the apex which may be delegated</t>
        </dd>
        <dt>support:</dt>
        <dd>
          <t>Whether or not the target authoritative server supports incremental deleg.
"Yes" means it supports it and "Unknown" means support is not detected.
"*" means it does not matter</t>
        </dd>
        <dt><tt>_deleg</tt>:</dt>
        <dd>
          <t>Whether or not the <tt>_deleg</tt> label is present in the target zone (and thus incremental delegations)</t>
        </dd>
      </dl>
      <t>On the right side of the table are the extra queries, to be sent in parallel with the legacy query.
The <tt>_deleg</tt> presence test query (most right column) only needs to be sent to unsigned target zones, because its non-existence will be show in the NSEC(3) records showing the non-existence of the incremental delegation (second from right column).</t>
      <t>If the query name is the same as the apex of the target zone, no extra queries need to be sent (Row 1).
If the <tt>_deleg</tt> label is known not to exist in the target zone (Row 2) or if the target name server is known to support incremental deleg (Row 3), no extra queries need to be sent.
Only if it is unknown that the target name server supports incremental deleg, and the <tt>_deleg</tt> label is known to exist in the target zone (Row 4) or it its not known whether or not the <tt>_deleg</tt> label exists (Row 5), and extra incremental deleg query is sent in parallel to the legacy query.
If the target zone is unsigned, presence of the <tt>_deleg</tt> label needs to be tested explicitly (Row 5).</t>
      <section anchor="comparison-with-legacy-delegations">
        <name>Comparison with legacy delegations</name>
      </section>
      <section anchor="comparison-with-name-dns-query-name-minimisation">
        <name>Comparison with Name DNS Query Name Minimisation</name>
      </section>
      <section anchor="comparison-with-i-ddnsop-deleg">
        <name>Comparison with <xref target="I-D.dnsop-deleg"/></name>
        <table>
          <name>Comparison of [I-D.dnsop-deleg] with [this document]</name>
          <thead>
            <tr>
              <th align="left">[I-D.dnsop-deleg]</th>
              <th align="left">[this document]</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Requires implementation in both authoritative name server as well as in the resolver</td>
              <td align="left">Only resolver implementation required. But optimized with updated authoritative software.</td>
            </tr>
            <tr>
              <td align="left">DNSKEY flag needed to signal DELEG support with all authoritative name servers that serve the parent (delegating) domain. Special requirements for the child domain.</td>
              <td align="left">No DNSKEY flag needed. Separation of concerns.</td>
            </tr>
            <tr>
              <td align="left">Authoritative name servers need to be updated all at once</td>
              <td align="left">Authoritative name servers may be updated gradually for optimization</td>
            </tr>
            <tr>
              <td align="left">New semantics about what is authoritative (BOGUS with current DNSSEC validators)</td>
              <td align="left">Works with current DNS and DNSSEC semantics. Easier to implement.</td>
            </tr>
            <tr>
              <td align="left">No extra queries</td>
              <td align="left">An extra query, in parallel to the legacy query, <em>per authoritative</em> server when incremental deleg support is not yet detected, and <em>per unsigned zone</em> to determine presence of the <tt>_deleg</tt> label</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
    <section anchor="implementation-status">
      <name>Implementation Status</name>
      <t><strong>Note to the RFC Editor</strong>: please remove this entire section before publication.</t>
      <t>Jesse van Zutphen has built a proof of concept implementation supporting delegations as specified in this document for the Unbound recursive resolver as part of his master thesis for the Security and Network Engineering master program of the University of Amsterdam. <xref target="JZUTPHEN"/>
The source code of his implementation is available on github <xref target="DELEG4UNBOUND"/></t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="deleg-rr-type">
        <name>DELEG RR type</name>
        <t>IANA is requested to update the "Resource Record (RR) TYPEs" registry under the "Domain Name System (DNS) Parameters" registry group as follows:</t>
        <table>
          <thead>
            <tr>
              <th align="left">TYPE</th>
              <th align="left">Value</th>
              <th align="left">Meaning</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">DELEG</td>
              <td align="left">TBD</td>
              <td align="left">Delegation</td>
              <td align="left">[this document]</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="node-name">
        <name>_deleg Node Name</name>
        <t>Per <xref target="RFC8552"/>, IANA is requested to add the following entry to the DNS "Underscored and Globally Scoped DNS Node Names" registry:</t>
        <table>
          <name>Entry in the Underscored and Globally Scoped DNS Node Names registry</name>
          <thead>
            <tr>
              <th align="left">RR Type</th>
              <th align="left">_NODE NAME</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">DELEG</td>
              <td align="left">_deleg</td>
              <td align="left">[this document]</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <referencegroup anchor="STD13" target="https://www.rfc-editor.org/info/std13">
          <reference anchor="RFC1034" target="https://www.rfc-editor.org/info/rfc1034">
            <front>
              <title>Domain names - concepts and facilities</title>
              <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
              <date month="November" year="1987"/>
              <abstract>
                <t>This RFC is the revised basic definition of The Domain Name System. It obsoletes RFC-882. This memo describes the domain style names and their used for host address look up and electronic mail forwarding. It discusses the clients and servers in the domain name system and the protocol used between them.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="13"/>
            <seriesInfo name="RFC" value="1034"/>
            <seriesInfo name="DOI" value="10.17487/RFC1034"/>
          </reference>
          <reference anchor="RFC1035" target="https://www.rfc-editor.org/info/rfc1035">
            <front>
              <title>Domain names - implementation and specification</title>
              <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
              <date month="November" year="1987"/>
              <abstract>
                <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="13"/>
            <seriesInfo name="RFC" value="1035"/>
            <seriesInfo name="DOI" value="10.17487/RFC1035"/>
          </reference>
        </referencegroup>
        <reference anchor="RFC9460">
          <front>
            <title>Service Binding and Parameter Specification via the DNS (SVCB and HTTPS Resource Records)</title>
            <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
            <author fullname="M. Bishop" initials="M." surname="Bishop"/>
            <author fullname="E. Nygren" initials="E." surname="Nygren"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies the "SVCB" ("Service Binding") and "HTTPS" DNS resource record (RR) types to facilitate the lookup of information needed to make connections to network services, such as for HTTP origins. SVCB records allow a service to be provided from multiple alternative endpoints, each with associated parameters (such as transport protocol configuration), and are extensible to support future uses (such as keys for encrypting the TLS ClientHello). They also enable aliasing of apex domains, which is not possible with CNAME. The HTTPS RR is a variation of SVCB for use with HTTP (see RFC 9110, "HTTP Semantics"). By providing more information to the client before it attempts to establish a connection, these records offer potential benefits to both performance and privacy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9460"/>
          <seriesInfo name="DOI" value="10.17487/RFC9460"/>
        </reference>
        <reference anchor="RFC9461">
          <front>
            <title>Service Binding Mapping for DNS Servers</title>
            <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>The SVCB DNS resource record type expresses a bound collection of endpoint metadata, for use when establishing a connection to a named service. DNS itself can be such a service, when the server is identified by a domain name. This document provides the SVCB mapping for named DNS servers, allowing them to indicate support for encrypted transport protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9461"/>
          <seriesInfo name="DOI" value="10.17487/RFC9461"/>
        </reference>
        <reference anchor="RFC7858">
          <front>
            <title>Specification for DNS over Transport Layer Security (TLS)</title>
            <author fullname="Z. Hu" initials="Z." surname="Hu"/>
            <author fullname="L. Zhu" initials="L." surname="Zhu"/>
            <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="D. Wessels" initials="D." surname="Wessels"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
              <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7858"/>
          <seriesInfo name="DOI" value="10.17487/RFC7858"/>
        </reference>
        <reference anchor="RFC8484">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="RFC9250">
          <front>
            <title>DNS over Dedicated QUIC Connections</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>This document describes the use of QUIC to provide transport confidentiality for DNS. The encryption provided by QUIC has similar properties to those provided by TLS, while QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides more efficient packet-loss recovery than UDP. DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC 7858, and latency characteristics similar to classic DNS over UDP. This specification describes the use of DoQ as a general-purpose transport for DNS and includes the use of DoQ for stub to recursive, recursive to authoritative, and zone transfer scenarios.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9250"/>
          <seriesInfo name="DOI" value="10.17487/RFC9250"/>
        </reference>
        <reference anchor="RFC6672">
          <front>
            <title>DNAME Redirection in the DNS</title>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <author fullname="W. Wijngaards" initials="W." surname="Wijngaards"/>
            <date month="June" year="2012"/>
            <abstract>
              <t>The DNAME record provides redirection for a subtree of the domain name tree in the DNS. That is, all names that end with a particular suffix are redirected to another part of the DNS. This document obsoletes the original specification in RFC 2672 as well as updates the document on representing IPv6 addresses in DNS (RFC 3363). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6672"/>
          <seriesInfo name="DOI" value="10.17487/RFC6672"/>
        </reference>
        <reference anchor="RFC9156">
          <front>
            <title>DNS Query Name Minimisation to Improve Privacy</title>
            <author fullname="S. Bortzmeyer" initials="S." surname="Bortzmeyer"/>
            <author fullname="R. Dolmans" initials="R." surname="Dolmans"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="November" year="2021"/>
            <abstract>
              <t>This document describes a technique called "QNAME minimisation" to improve DNS privacy, where the DNS resolver no longer always sends the full original QNAME and original QTYPE to the upstream name server. This document obsoletes RFC 7816.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9156"/>
          <seriesInfo name="DOI" value="10.17487/RFC9156"/>
        </reference>
        <reference anchor="RFC2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8767">
          <front>
            <title>Serving Stale Data to Improve DNS Resiliency</title>
            <author fullname="D. Lawrence" initials="D." surname="Lawrence"/>
            <author fullname="W. Kumari" initials="W." surname="Kumari"/>
            <author fullname="P. Sood" initials="P." surname="Sood"/>
            <date month="March" year="2020"/>
            <abstract>
              <t>This document defines a method (serve-stale) for recursive resolvers to use stale DNS data to avoid outages when authoritative nameservers cannot be reached to refresh expired data. One of the motivations for serve-stale is to make the DNS more resilient to DoS attacks and thereby make them less attractive as an attack vector. This document updates the definitions of TTL from RFCs 1034 and 1035 so that data can be kept in the cache beyond the TTL expiry; it also updates RFC 2181 by interpreting values with the high-order bit set as being positive, rather than 0, and suggests a cap of 7 days.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8767"/>
          <seriesInfo name="DOI" value="10.17487/RFC8767"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="DELEG4UNBOUND" target="https://github.com/jessevz/unbound/">
          <front>
            <title>A proof of concept implementation of incremental deleg</title>
            <author initials="J." surname="van Zutphen" fullname="Jesse van Zutphen">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="JZUTPHEN" target="https://nlnetlabs.nl/downloads/publications/extensible-deleg-in-resolvers_2024-07-08.pdf">
          <front>
            <title>Extensible delegations in DNS Recursive resolvers</title>
            <author initials="J." surname="van Zutphen" fullname="Jesse van Zutphen">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="I-D.ietf-tls-esni">
          <front>
            <title>TLS Encrypted Client Hello</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Independent</organization>
            </author>
            <author fullname="Kazuho Oku" initials="K." surname="Oku">
              <organization>Fastly</organization>
            </author>
            <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
              <organization>Cryptography Consulting LLC</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="15" month="September" year="2024"/>
            <abstract>
              <t>   This document describes a mechanism in Transport Layer Security (TLS)
   for encrypting a ClientHello message under a server public key.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/tlswg/draft-ietf-tls-esni
   (https://github.com/tlswg/draft-ietf-tls-esni).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-esni-22"/>
        </reference>
        <reference anchor="I-D.ietf-dnsop-ns-revalidation">
          <front>
            <title>Delegation Revalidation by DNS Resolvers</title>
            <author fullname="Shumon Huque" initials="S." surname="Huque">
              <organization>Salesforce</organization>
            </author>
            <author fullname="Paul A. Vixie" initials="P. A." surname="Vixie">
              <organization>SIE Europe, U.G.</organization>
            </author>
            <author fullname="Willem Toorop" initials="W." surname="Toorop">
              <organization>NLnet Labs</organization>
            </author>
            <date day="8" month="January" year="2025"/>
            <abstract>
              <t>   This document recommends improved DNS resolver behavior with respect
   to the processing of Name Server (NS) resource record (RR) sets
   (RRsets) during iterative resolution.  When following a referral
   response from an authoritative server to a child zone, DNS resolvers
   should explicitly query the authoritative NS RRset at the apex of the
   child zone and cache this in preference to the NS RRset on the parent
   side of the zone cut.  The (A and AAAA) address RRsets in the
   additional section from referral responses and authoritative NS
   answers for the names of the NS RRset, should similarly be re-queried
   and used to replace the entries with the lower trustworthiness
   ranking in cache.  Resolvers should also periodically revalidate the
   child delegation by re-querying the parent zone at the expiration of
   the TTL of the parent side NS RRset.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dnsop-ns-revalidation-08"/>
        </reference>
        <reference anchor="RFC9499">
          <front>
            <title>DNS Terminology</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
              <t>This document updates RFC 2308 by clarifying the definitions of "forwarder" and "QNAME". It obsoletes RFC 8499 by adding multiple terms and clarifications. Comprehensive lists of changed and new definitions can be found in Appendices A and B.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="219"/>
          <seriesInfo name="RFC" value="9499"/>
          <seriesInfo name="DOI" value="10.17487/RFC9499"/>
        </reference>
        <reference anchor="I-D.dnsop-deleg">
          <front>
            <title>Extensible Delegation for DNS</title>
            <author fullname="Tim April" initials="T." surname="April">
         </author>
            <author fullname="Petr Špaček" initials="P." surname="Špaček">
              <organization>Akamai Technologies</organization>
            </author>
            <author fullname="Ralf Weber" initials="R." surname="Weber">
              <organization>Akamai Technologies</organization>
            </author>
            <author fullname="David C Lawrence" initials="" surname="Lawrence">
              <organization>Salesforce</organization>
            </author>
            <date day="23" month="January" year="2024"/>
            <abstract>
              <t>   A delegation in the Domain Name System (DNS) is a mechanism that
   enables efficient and distributed management of the DNS namespace.
   It involves delegating authority over subdomains to specific DNS
   servers via NS records, allowing for a hierarchical structure and
   distributing the responsibility for maintaining DNS records.

   An NS record contains the hostname of the nameserver for the
   delegated namespace.  Any facilities of that nameserver must be
   discovered through other mechanisms.  This document proposes a new
   extensible DNS record type, DELEG, which contains additional
   information about the delegated namespace and the capabilities of
   authoritative nameservers for the delegated namespace.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-dnsop-deleg-00"/>
        </reference>
        <reference anchor="RFC8552">
          <front>
            <title>Scoped Interpretation of DNS Resource Records through "Underscored" Naming of Attribute Leaves</title>
            <author fullname="D. Crocker" initials="D." surname="Crocker"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>Formally, any DNS Resource Record (RR) may occur under any domain name. However, some services use an operational convention for defining specific interpretations of an RRset by locating the records in a DNS branch under the parent domain to which the RRset actually applies. The top of this subordinate branch is defined by a naming convention that uses a reserved node name, which begins with the underscore character (e.g., "_name"). The underscored naming construct defines a semantic scope for DNS record types that are associated with the parent domain above the underscored branch. This specification explores the nature of this DNS usage and defines the "Underscored and Globally Scoped DNS Node Names" registry with IANA. The purpose of this registry is to avoid collisions resulting from the use of the same underscored name for different services.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="222"/>
          <seriesInfo name="RFC" value="8552"/>
          <seriesInfo name="DOI" value="10.17487/RFC8552"/>
        </reference>
        <reference anchor="I-D.tapril-ns2">
          <front>
            <title>Parameterized Nameserver Delegation with NS2 and NS2T</title>
            <author fullname="Tim April" initials="T." surname="April">
              <organization>Akamai Technologies</organization>
            </author>
            <date day="13" month="July" year="2020"/>
            <abstract>
              <t>   Within the DNS, there is no mechanism for authoritative servers to
   advertise which transport methods they are capable of.  If secure
   transport methods are adopted by authoritative operators, transport
   signaling would be required to negotiate how authoritative servers
   would be contacted by resolvers.  This document provides two new
   Resource Record Types, NS2 and NS2T, to facilitate this negotiation
   by allowing zone owners to signal how the authoritative nameserver(s)
   for their zone(s) may accept queries.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-tapril-ns2-01"/>
        </reference>
      </references>
    </references>
    <?line 717?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The idea to utilize SVCB based RRs to signal capabilities was first proposed by Tim April in <xref target="I-D.tapril-ns2"/>.</t>
      <t>The idea to utilize SVCB for extensible delegations (and also the idea described in this document) emerged from the DNS Hackathon at the IETF 118.
The following participants contributed to this brainstorm session: Vandan Adhvaryu, Roy Arends, David Blacka, Manu Bretelle, Vladimír Čunát, Klaus Darilion, Peter van Dijk, Christian Elmerot, Bob Halley, Shumon Huque, Shane Kerr, David C Lawrence, Edward Lewis, George Michaelson, Erik Nygren, Libor Peltan, Ben Schwartz, Petr Špaček, Jan Včelák and Ralf Weber</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
