<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.21 (Ruby 2.6.10) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-homburg-deleg-incremental-deleg-03" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.25.0 -->
  <front>
    <title abbrev="incremental-deleg">Incrementally Deployable Extensible Delegation for DNS</title>
    <seriesInfo name="Internet-Draft" value="draft-homburg-deleg-incremental-deleg-03"/>
    <author fullname="Philip Homburg">
      <organization>NLnet Labs</organization>
      <address>
        <email>philip@nlnetlabs.nl</email>
      </address>
    </author>
    <author fullname="Tim Wicinski">
      <organization>Cox Communications</organization>
      <address>
        <email>tjw.ietf@gmail.com</email>
      </address>
    </author>
    <author fullname="Jesse van Zutphen">
      <organization>University of Amsterdam</organization>
      <address>
        <email>Jesse.vanZutphen@os3.nl</email>
      </address>
    </author>
    <author fullname="Willem Toorop">
      <organization>NLnet Labs</organization>
      <address>
        <email>willem@nlnetlabs.nl</email>
      </address>
    </author>
    <date year="2025" month="March" day="03"/>
    <area>int</area>
    <workgroup>DNS Delegation</workgroup>
    <keyword>Internet-Draft</keyword>
    <keyword>DNS</keyword>
    <keyword>Resolver</keyword>
    <keyword>Delegation</keyword>
    <keyword>Authoritative</keyword>
    <keyword>Deployable</keyword>
    <keyword>Extensible</keyword>
    <abstract>
      <t>This document proposes a mechanism for extensible delegations in the DNS.
The mechanism realizes delegations with resource record sets placed below a <tt>_deleg</tt> label in the apex of the delegating zone.
This authoritative delegation point can be aliased to other names using CNAME and DNAME.
This document proposes a new DNS resource record type, IDELEG, which is based on the SVCB and inherits extensibility from it.</t>
      <t>Support in recursive resolvers suffices for the mechanism to be fully functional.
The number of subsequent interactions between the recursive resolver and the authoritative name servers is comparable with those for DNS Query Name Minimisation.
Additionally, but not required, support in the authoritative name servers enables optimized behavior with reduced (simultaneous) queries.
None, mixed or full deployment of the mechanism on authoritative name servers are all fully functional, allowing for the mechanism to be incrementally deployed.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-homburg-deleg-incremental-deleg/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        deleg Working Group mailing list (<eref target="mailto:dd@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/dd/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/dd/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/NLnetLabs/incremental-deleg"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>This document describes a delegation mechanism for the Domain Name System (DNS) <xref target="STD13"/> that addresses several matters that, at the time of writing, are suboptimally supported or not supported at all.
These matters are elaborated upon in sections <xref format="counter" target="signaling"/>, <xref format="counter" target="outsourcing"/> and <xref format="counter" target="dnssec-protection"/>.
In addition, the mechanism described in this document aspires to be maximally deployable, which is elaborated upon in <xref target="deployability"/>.</t>
      <section anchor="signaling">
        <name>Signaling capabilities of the authoritative name servers</name>
        <t>A new IDELEG resource record (RR) type is introduced in this document, which is based on and inherits the wire and presentation format from SVCB <xref target="RFC9460"/>.
All Service Binding Mappings, as well as the capability signalling, that are specified in <xref target="RFC9461"/> are also applicable to IDELEG, with the exception of the limitations on AliasMode records in <xref section="6" sectionFormat="of" target="RFC9460"/>.
Capability signalling of <xref target="RFC7858">DNS over Transport Layer Protocol</xref> (DoT), <xref target="RFC8484">DNS Queries over HTTPS</xref> and <xref target="RFC9250">DNS over Dedicated QUIC Connections</xref>, on default or alternative ports, can all be used as specified in <xref target="RFC9461"/>.
The IDELEG RR type inherits its extensibility from the SVCB RR type, which is designed to be extensible to support future uses (such as keys for encrypting the TLS ClientHello <xref target="I-D.ietf-tls-esni"/>.)</t>
      </section>
      <section anchor="note-to-the-rfc-editor-please-remove-this-subsection-before-publication">
        <name><em>Note to the RFC Editor</em>: please remove this subsection before publication.</name>
        <t>The name IDELEG is chosen to avoid confusion with <xref target="I-D.wesplaap-deleg"/>.</t>
      </section>
      <section anchor="outsourcing">
        <name>Outsourcing operation of the delegation</name>
        <t>Delegation information is stored at an authoritative location in the zone with this mechanism.
Legacy methods to redirect this information to another location, possible under the control of another operator, such as (CNAME <xref section="3.6.2" sectionFormat="of" target="RFC1034"/>) and DNAME <xref target="RFC6672"/> remain functional.
One could even outsource all delegation operational practice to another party with an DNAME on the <tt>_deleg</tt> label on the apex of the delegating zone.</t>
        <t>Additional to the legacy methods, a delegation may be outsourced to a third parties by having RRs in AliasMode.
Unlike SVCB, IDELEG allows for more than a single IDELEG RR in AliasMode in a IDELEG RRset, enabling outsourcing a delegation to multiple different operators.</t>
      </section>
      <section anchor="dnssec-protection">
        <name>DNSSEC protection of the delegation</name>
        <t>With legacy delegations, the NS RRset at the parent side of a delegation as well as glue records for the names in the NS RRset are not authoritative and not DNSSEC signed.
An adversary that is able to spoof a referral response, can alter this information and redirect all traffic for the delegation to a rogue name server undetected.
The adversary can then perceive all queries for the redirected zone (Privacy concern) and alter all unsigned parts of responses (such as further referrals, which is a Security concern).</t>
        <t>DNSSEC protection of delegation information prevents that, and is the only countermeasure that also works against on-path attackers.
At the time of writing, the only way to DNSSEC validate and verify delegations at all levels in the DNS hierarchy is to revalidate delegations <xref target="I-D.ietf-dnsop-ns-revalidation"/>, which is done after the fact and has other security concerns (<xref section="7" sectionFormat="of" target="I-D.ietf-dnsop-ns-revalidation"/>).</t>
        <t>Direct delegation information (provided by IDELEG RRs in ServiceMode) includes the hostnames of the authoritative name servers for the delegation as well as IP addresses for those hostnames.
Since the information is stored authoritatively in the delegating zone, it will be DNSSEC signed if the zone is signed.
When the delegation is outsourced, then it's protected when the zones providing the aliasing resource records <em>and</em> the zones serving the targets of the aliases are all DNSSEC signed.</t>
      </section>
      <section anchor="deployability">
        <name>Maximize ease of deployment</name>
        <t>Delegation information is stored authoritatively within the delegation zone.
No semantic changes as to what zones are authoritative for what data are needed.
As a consequence, existing DNS software, such as authoritative name servers and DNSSEC signing software, can remain unmodified.
Unmodified authoritative name server software will serve the delegation information when queried for.
Unmodified signers will sign the delegation information in the delegating zone.
Only the recursive resolver needs modification to follow referrals as provided by the delegation information.</t>
        <t>Such a resolver would explicitly query for the delegations administered as specified in <xref target="delegation-administration"/>.
The number of round trips from the recursive resolver to the authoritative name server is comparable to what is needed for DNS Query Name Minimisation <xref target="RFC9156"/>.
Additional implementation in the authoritative name server optimizes resolution and reduces the number of simultaneous in parallel queries to that what would be needed for legacy delegations.
None, mixed or full deployment of the mechanism on authoritative name servers are all fully functional, allowing for the mechanism to be incrementally deployed on the authoritative name servers.</t>
        <t>Implementation in the recursive may be less demanding with respect to (among other things) DNSSEC validation because there is no need to make additional exceptions as to what is authoritative at the parent side of a delegation.</t>
      </section>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <t>This document follows terminology as defined in <xref target="BCP219"/>.</t>
        <t>Throughout this document we will also use terminology with the meaning as defined below:</t>
        <dl newline="true">
          <dt>Incremental deleg:</dt>
          <dd>
            <t>The delegation mechanism as specified in this document.</t>
          </dd>
          <dt>Incremental delegation:</dt>
          <dd>
            <t>A delegation as specified in this document</t>
          </dd>
          <dt>Legacy delegations:</dt>
          <dd>
            <t>The way delegations are done in the DNS traditionally as defined in <xref target="STD13"/>.</t>
          </dd>
          <dt>Delegating zone:</dt>
          <dd>
            <t>The zone in which the delegation is administered.
Sometimes also called the "parent zone" of a delegation.</t>
          </dd>
          <dt>Subzone:</dt>
          <dd>
            <t>The zone that is delegated to from the delegating zone.</t>
          </dd>
          <dt>Delegating name:</dt>
          <dd>
            <t>The name which realizes the delegation.
In legacy delegations, this name is the same as the name of the subzone to which the delegation refers.
Delegations described in this document are provided with a different name than the zone that is delegated to.</t>
          </dd>
          <dt>Delegation point:</dt>
          <dd>
            <t>The location in the delegating zone where the RRs are provided that make up the delegation.
In legacy delegations, this is the parent side of the zone cut and has the same name as the subzone.
With incremental deleg, this is the location given by the delegating name.</t>
          </dd>
          <dt>Triggering query:</dt>
          <dd>
            <t>The query on which resolution a recursive resolver is working.</t>
          </dd>
          <dt>Target zone:</dt>
          <dd>
            <t>The zone for which the authoritative servers, that a resolver contacts while iterating, are authoritative.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="the-deleg-resource-record-type">
      <name>The IDELEG resource record type</name>
      <t>The IDELEG RR type is a variant of SVCB <xref target="RFC9460"/> for use with resolvers to perform iterative resolution (<xref section="5.3.3" sectionFormat="of" target="RFC1034"/>).
The IDELEG type requires registration in the "Resource Record (RR) TYPEs" registry under the "Domain Name System (DNS) Parameters" registry group (see <xref target="deleg-rr-type">IDELEG RR type</xref>).
The protocol-specific mapping specification for iterative resolutions are the same as those for "DNS Servers" <xref target="RFC9461"/>.</t>
      <t><xref section="2.4.2" sectionFormat="of" target="RFC9460"/> states that SVCB RRsets <bcp14>SHOULD</bcp14> only have a single RR in AliasMode, and that if multiple AliasMode RRs are present, clients or recursive resolvers <bcp14>SHOULD</bcp14> pick one at random.
Different from SVCB (<xref section="2.4.2" sectionFormat="of" target="RFC9460"/>), IDELEG allows for multiple AliasMode RRs to be present in a single IDELEG RRset.
Note however that the target of a IDELEG RR in AliasMode is a SVCB RRset for the "dns" service type adhering fully to the Service Binding Mapping for DNS Servers as specified in <xref target="RFC9461"/>.</t>
      <t><xref section="2.4.1" sectionFormat="of" target="RFC9460"/> states that within an SVCB RRset, all RRs <bcp14>SHOULD</bcp14> have the same mode, and that if an RRset contains a record in AliasMode, the recipient <bcp14>MUST</bcp14> ignore any ServiceMode records in the set.
Different from SVCB, mixed ServiceMode and AliasMode RRs are allowed in a IDELEG RRset.
When an mixed ServiceMode and AliasMode IDELEG RRset is encountered by a resolver, the resolver first picks one of the AliasMode RRs or all ServiceMode RRs, giving all ServiceMode RRs equal weight as each single AliasMode RR.
When the result of that choice is an AliasMode RR, then that RR is followed and the resulting IDELEG RRset is reevaluated.
When the result of that choice is all ServiceMode RRs, then within that set the resolver adheres to ServicePriority value.</t>
      <t>At the delegation point (for example <tt>customer._deleg.example.</tt>), the host names of the authoritative name servers for the subzone, are given in the TargetName RDATA field of IDELEG records in ServiceMode.
Port Prefix Naming <xref section="3" sectionFormat="of" target="RFC9461"/> is not used at the delegation point, but <bcp14>MUST</bcp14> be used when resolving the aliased to name servers with IDELEG RRs in AliasMode.</t>
    </section>
    <section anchor="delegation-administration">
      <name>Delegation administration</name>
      <t>An extensible delegation is realized with a IDELEG Resource Record set (RRset) <xref target="RFC9460"/> below a specially for the purpose reserved label with the name <tt>_deleg</tt> at the apex of the delegating zone.
The <tt>_deleg</tt> label scopes the interpretation of the IDELEG records and requires registration in the "Underscored and Globally Scoped DNS Node Names" registry (see <xref target="node-name">_deleg Node Name</xref>).
The full scoping of delegations includes the labels that are <strong>below</strong> the <tt>_deleg</tt> label and those, together with the name of the delegating domain, make up the name of the subzone to which the delegation refers.
For example, if the delegating zone is <tt>example.</tt>, then a delegation to subzone <tt>customer.example.</tt> is realized by a IDELEG RRset at the name <tt>customer._deleg.example.</tt> in the parent zone.
A fully scoped delegating name (such as <tt>customer._deleg.example.</tt>) is referred to further in this document as the "delegation point".</t>
      <t>Note that if the delegation is outsourcing to a single operator represented in a single IDELEG RR, it is <bcp14>RECOMMENDED</bcp14> to refer to the name of the operator's IDELEG RRset with a CNAME on the delegation point instead of a IDELEG RR in AliasMode <xref section="10.2" sectionFormat="of" target="RFC9460"/>.</t>
      <section anchor="examples">
        <name>Examples</name>
        <section anchor="one-name-server-within-the-subzone">
          <name>One name server within the subzone</name>
          <figure anchor="zone-within">
            <name>One name server within the subzone</name>
            <sourcecode type="~"><![CDATA[
$ORIGIN example.
@                 IN  SOA    ns zonemaster ...
customer1._deleg  IN  IDELEG 1 ( ns.customer1
                                 ipv4hint=198.51.100.1,203.0.113.1
                                 ipv6hint=2001:db8:1::1,2001:db8:2::1
                               )
]]></sourcecode>
          </figure>
        </section>
        <section anchor="two-name-servers-within-the-subzone">
          <name>Two name servers within the subzone</name>
          <figure anchor="zones-within">
            <name>Two name servers within the subzone</name>
            <artwork><![CDATA[
$ORIGIN example.
@                 IN  SOA    ns zonemaster ...
customer2._deleg  IN  IDELEG 1 ns1.customer2 ( ipv4hint=198.51.100.1
                                               ipv6hint=2001:db8:1::1
                                             )
                  IN  IDELEG 1 ns2.customer2 ( ipv4hint=203.0.113.1
                                               ipv6hint=2001:db8:2::1
                                             )
]]></artwork>
          </figure>
        </section>
        <section anchor="outsourced-to-an-operator">
          <name>Outsourced to an operator</name>
          <figure anchor="outsourced-cname">
            <name>Outsourced with CNAME</name>
            <artwork><![CDATA[
$ORIGIN example.
@                 IN  SOA   ns zonemaster ...
customer3._deleg  IN  CNAME _dns.ns.operator1
]]></artwork>
          </figure>
          <t>Instead of using CNAME, the outsourcing could also been accomplished with a IDELEG RRset with a single IDELEG RR in AliasMode.
The configuration below is operationally equivalent to the CNAME configuration above.
It is <bcp14>RECOMMENDED</bcp14> to use a CNAME over a IDELEG RRset with a single IDELEG RR in AliasMode (<xref section="10.2" sectionFormat="of" target="RFC9460"/>).
Note that a IDELEG RRset refers with TargetName to an DNS service, which will be looked up using Port Prefix Naming <xref section="3" sectionFormat="of" target="RFC9461"/>, but that CNAME refers to the domain name of the target IDELEG RRset (or CNAME) which may have an <tt>_dns</tt> prefix.</t>
          <figure anchor="outsourced-svcb">
            <name>Outsourced with an AliasMode IDELEG RR</name>
            <artwork><![CDATA[
$ORIGIN example.
@                 IN  SOA    ns zonemaster ...
customer3._deleg  IN  IDELEG 0 ns.operator1
]]></artwork>
          </figure>
          <t>The operator IDELEG RRset could for example be:</t>
          <figure anchor="operator-zone">
            <name>Operator zone</name>
            <artwork><![CDATA[
$ORIGIN operator1.example.
@                 IN  SOA    ns zonemaster ...
_dns.ns           IN  IDELEG 1 ns ( alpn=h2,dot,h3,doq
                                    ipv4hint=192.0.2.1
                                    ipv6hint=2001:db8:3::1
                                    dohpath=/q{?dns}
                                  )
                  IN  IDELEG 2 ns ( ipv4hint=192.0.2.2
                                    ipv6hint=2001:db8:3::2
                                  )
ns                IN  AAAA   2001:db8:3::1
                  IN  AAAA   2001:db8:3::2
                  IN  A      192.0.2.1
                  IN  A      192.0.2.2
]]></artwork>
          </figure>
        </section>
        <section anchor="dnssec-signed-name-servers-within-the-subzone">
          <name>DNSSEC signed name servers within the subzone</name>
          <figure anchor="dnssec-zone">
            <name>DNSSEC signed incremental deleg zone</name>
            <artwork><![CDATA[
$ORIGIN
@                 IN  SOA    ns zonemaster ...
                  IN  RRSIG  SOA ...
                  IN  DNSKEY 257 3 15 ...
                  IN  RRSIG  DNSKEY ...
                  IN  NS     ns.example.
                  IN  NSEC   customer5._deleg SOA RRSIG NSEC DNSKEY
                  IN  RRSIG  NSEC ...

customer5._deleg  IN  IDELEG 1 ns.customer5 alpn=h2,h3 (
                                            ipv4hint=198.51.100.5
                                            ipv6hint=2001:db8:5::1
                                            dohpath=/dns-query{?dns}
                                            )
                  IN  RRSIG  IDELEG ...
                  IN  NSEC   customer7._deleg RRSIG NSEC IDELEG
                  IN  RRSIG  NSEC ...

customer7._deleg  IN  CNAME  customer5._deleg
                  IN  RRSIG  CNAME ...
                  IN  NSEC   customer5 CNAME RRSIG NSEC
                  IN  RRSIG  NSEC ...

customer5         IN  NS     ns.customer5
ns.customer5      IN  A      198.51.100.5
                  IN  AAAA   2001:db8:5::1
customer5         IN  DS     17405 15 2 ...
                  IN  RRSIG  DS ...
                  IN  NSEC   customer6 NS DS RRSIG NSEC
                  IN  RRSIG  NSEC ...

customer6         IN  NS     ns.customer6
ns.customer6      IN  A      203.0.113.1
                  IN  AAAA   2001:db8:6::1
customer6         IN  DS     ...
                  IN  RRSIG  DS ...
                  IN  NSEC   customer7 NS DS RRSIG NSEC
                  IN  RRSIG  NSEC ...

customer7         IN  NS     ns.customer5
                  IN  DS     ...
                  IN  RRSIG  DS ...
                  IN  NSEC   example. NS DS RRSIG NSEC
                  IN  RRSIG  NSEC ...
]]></artwork>
          </figure>
          <t><tt>customer5.example.</tt> is delegated to in an extensible way and <tt>customer6.example.</tt> is delegated only in a legacy way.
<tt>customer7.example.</tt>'s delegation is outsourced to customer5's delegation.</t>
          <t>The delegation signals that the authoritative name server supports DoH.
<tt>customer5.example.</tt>, <tt>customer6.example.</tt> and <tt>example.</tt> are all DNSSEC signed.
The DNSSEC authentication chain links from <tt>example.</tt> to <tt>customer5.example.</tt> in the for DNSSEC conventional way with the signed <tt>customer5.example. DS</tt> RRset in the <tt>example.</tt> zone.
Also, <tt>customer6.example.</tt> is linked to from <tt>example.</tt> with the signed <tt>customer6.example. DS</tt> RRset in the <tt>example.</tt> zone.</t>
          <t>Note that both <tt>customer5.example.</tt> and <tt>customer6.example.</tt> have legacy delegations in the zone as well.
It is important to have those legacy delegations to maintain support for legacy resolvers, that do not support incremental deleg.
DNSSEC signers <bcp14>SHOULD</bcp14> construct the NS RRset and glue for the legacy delegation from the IDELEG RRset.</t>
        </section>
      </section>
    </section>
    <section anchor="minimal-implementation">
      <name>Minimal implementation</name>
      <t>Support in recursive resolvers suffices for the mechanism to be fully functional.
<xref target="recursive-resolver-behavior"/> specifies the basic algorithm for resolving incremental delegations.
In <xref target="presence"/>, an optimization is presented that will reduce the number of (parallel) queries especially for when authoritative name server support is still lacking and there are still many zones that do not contain incremental delegations.</t>
      <section anchor="recursive-resolver-behavior">
        <name>Recursive Resolver behavior</name>
        <t>If the triggering query name is the same as the name of the target zone apex, then no further delegation will occur, and resolution will complete.
No special behavior or processing is needed.</t>
        <t>Otherwise, the triggering query is below the target zone apex and a delegation may exist in the target zone.
In this case two parallel queries <bcp14>MUST</bcp14> be sent.
One for the triggering query in the way that is conventional with legacy delegations (which could be just the triggering query or a minimised query <xref target="RFC9156"/>), and one <em>incremental deleg query</em> with query type IDELEG.</t>
        <t>The incremental deleg query name is constructed by concatenating the first label below the part that the triggering query name has in common with the target zone, a <tt>_deleg</tt> label and the name of the target zone.
For example if the triggering query is <tt>www.customer.example.</tt> and the target zone <tt>example.</tt>, then the incremental deleg query name is <tt>customer._deleg.example.</tt>
For another example, if the triggering query is <tt>www.faculty.university.example.</tt> and the target zone <tt>example.</tt> then the incremental deleg name is <tt>university._deleg.example.</tt></t>
        <t>Normal DNAME, CNAME and IDELEG in AliasMode processing should happen as before, though note that when following a IDELEG RR in AliasMode the target RR type is SVCB (see <xref target="the-deleg-resource-record-type"/>).
The eventual incremental deleg query response, after following all redirections caused by DNAME, CNAME and AliasMode IDELEG RRs, has three possible outcomes:</t>
        <ol spacing="normal" type="1"><li>
            <t>A IDELEG RRset in ServiceMode is returned in the response's answer section containing the delegation for the subzone.  </t>
            <t>
The IDELEG RRs in the RRset <bcp14>MUST</bcp14> be used to follow the referral.
The TargetName data field in the IDELEG RRs in the RRset <bcp14>MUST</bcp14> be used as the names for the name servers to contact for the subzone, and the ipv4hint and ipv6hint parameters <bcp14>MUST</bcp14> be used as the IP addresses for the TargetName in the same IDELEG RR.  </t>
            <t>
The NS RRset and glue, in the response of the legacy query that was sent in parallel to the incremental deleg query, <bcp14>MUST NOT</bcp14> be used, but the signed DS record (or NSEC(3) records indicating that there was no DS) <bcp14>MUST</bcp14> be used in linking the DNSSEC authentication chain as which would conventionally be done with DNSSEC as well.</t>
          </li>
          <li>
            <t>The incremental deleg query name does not exist (NXDOMAIN).  </t>
            <t>
There is no incremental delegation for the subzone, and the referral response for the legacy delegation <bcp14>MUST</bcp14> be processed  as would be done with legacy DNS and DNSSEC processing.</t>
          </li>
          <li>
            <t>The incremental deleg query name does exist, but resulted in a NOERROR no answer response (also known as a NODATA response).  </t>
            <t>
If the legacy query, did result in a referral for the same number of labels as the subdomain that the incremental deleg query was for, then there was no incremental delegation for the subzone, and the referral response for the legacy delegation <bcp14>MUST</bcp14> be processed as would be done with legacy DNS and DNSSEC processing.  </t>
            <t>
Otherwise, the subzone may be more than one label below the delegating zone.  </t>
            <t>
If the response to the legacy query resulted in a referral, then a new incremental deleg query <bcp14>MUST</bcp14> be spawned, matching the zone cut of the legacy referral response.
For example if the triggering query is <tt>www.university.ac.example.</tt> and the target zone <tt>example.</tt>, and the legacy response contained an NS RRset for <tt>university.ac.example.</tt>, then the incremental deleg query name is <tt>university.ac._deleg.example.</tt>
The response to the new incremental deleg query <bcp14>MUST</bcp14> be processed as described above, as if it was the initial incremental deleg query.  </t>
            <t>
If the legacy query was sent minimised and needs a followup query, then parallel to that followup query a new incremental deleg query will be sent, adding a single label to the previous incremental deleg query name.
For example if the triggering query is <tt>www.university.ac.example.</tt> and the target zone is <tt>example.</tt> and the minimised legacy query name is <tt>ac.example.</tt> (which also resulted in a NOERROR no answer response), then the incremental deleg query to be sent along in parallel with the followup legacy query will become <tt>university.ac.example.</tt>
Processing of the responses of those two new queries will be done as described above.</t>
          </li>
        </ol>
      </section>
      <section anchor="presence">
        <name><tt>_deleg</tt> label presence</name>
        <t>Absence of the <tt>_deleg</tt> label in a zone is a clear signal that the zone does not contain any incremental deleg delegations.
Recursive resolvers <bcp14>SHOULD NOT</bcp14> send any additional incremental deleg queries for zones for which it is known that it does not contain the <tt>_deleg</tt> label at the apex.
The state regarding the presence of the <tt>_deleg</tt> label within a resolver can be "unknown", "known not to be present", or "known to be present".</t>
        <t>The state regarding the presence of the <tt>_deleg</tt> label can be deduced from the response of the incremental deleg query, if the target zone is signed with DNSSEC.
If the target zone is unsigned, the procedure as described in the remainder of this section <bcp14>SHOULD</bcp14> be followed.</t>
        <t>When the presence of a <tt>_deleg</tt> label is "unknown", a <tt>_deleg</tt> presence test query <bcp14>SHOULD</bcp14> be sent in parallel to the next query for the unsigned target zone (though not when the target name server is known to support incremental deleg, which will be discussed in <xref target="authoritative-name-server-support"/>).
The query name for the test query is the <tt>_deleg</tt> label prepended to the apex of zone for which to test presence, with query type NS.</t>
        <t>The testing query can have three possible outcomes:</t>
        <ol spacing="normal" type="1"><li>
            <t>The <tt>_deleg</tt> label does not exist within the zone, and an NXDOMAIN response is returned.  </t>
            <t>
The non-existence of the <tt>_deleg</tt> label <bcp14>MUST</bcp14> be cached for the duration indicated by the "minimum" RDATA field of the SOA resource record in the authority section, adjusted to the boundaries for TTL values that the resolver has (<xref section="4" sectionFormat="of" target="RFC8767"/>).
For the period the non-existence of the <tt>_deleg</tt> label is cached, the label is "known not to be present" and the resolver <bcp14>SHOULD NOT</bcp14> send any (additional) incremental deleg queries.</t>
          </li>
          <li>
            <t>The <tt>_deleg</tt> label does exist within the zone but contains no data.
A NOERROR response is returned with no RRs in the answer section.  </t>
            <t>
The existence of the <tt>_deleg</tt> name <bcp14>MUST</bcp14> be cached for the duration indicated by the "minimum" RDATA field of the SOA resource record in the authority section, adjusted to the resolver's TTL boundaries.
For the period the existence of the empty non-terminal at the <tt>_deleg</tt> label is cached, the label is "known to be present" and the resolver <bcp14>MUST</bcp14> send additional incremental deleg queries as described in <xref target="recursive-resolver-behavior"/>.</t>
          </li>
          <li>
            <t>The <tt>_deleg</tt> label does exist within the zone, but is an delegation.
A NOERROR legacy referral response is returned with an NS RRset in the authority section.  </t>
            <t>
The resolver <bcp14>MUST</bcp14> record that the zone does not have valid incremental delegations deployed for the duration indicated by the NS RRset's TTL value, adjusted to the resolver's TTL boundaries.
For the period indicated by the NS RRset's TTL value, the zone is considered to <strong>not</strong> to have valid incremental delegations, and <bcp14>MUST NOT</bcp14> send any (additional) incremental deleg queries.</t>
          </li>
        </ol>
      </section>
    </section>
    <section anchor="optimized-implementation">
      <name>Optimized implementation</name>
      <t>Support for authoritative name servers enables optimized query behavior by resolvers with reduced (simultaneous) queries.
<xref target="authoritative-name-server-support"/> specifies how incremental deleg supporting authoritative name servers return referral responses for delegations.
In <xref target="behavior-with-auth-support"/> we specify how resolvers can benefit from those authoritative servers.</t>
      <section anchor="authoritative-name-server-support">
        <name>Authoritative name server support</name>
        <t>Incremental delegations supporting authoritative name servers include the incremental delegation information (or the NSEC(3) records showing the non-existence) in the authority section of referral responses to legacy DNS queries.
For example, querying the zone from <xref target="dnssec-zone"/> for <tt>www.customer5.example. A</tt>, will return the following referral response:</t>
        <figure anchor="deleg-response">
          <name>An incremental deleg referral response</name>
          <artwork><![CDATA[
;; ->>HEADER<<- opcode: QUERY, rcode: NOERROR, id: 54349
;; flags: qr ; QUERY: 1, ANSWER: 0, AUTHORITY: 5, ADDITIONAL: 2
;; QUESTION SECTION:
;; www.customer5.example.       IN      A

;; ANSWER SECTION:

;; AUTHORITY SECTION:
customer5.example.      3600    IN      NS      ns.customer5.example.
customer5.example.      3600    IN      DS      ...
customer5.example.      3600    IN      RRSIG   DS ...
customer5._deleg.example.       3600    IN      IDELEG 1 (
                ns.customer5.example. alpn=h2,h3
                ipv4hint=198.51.100.5 ipv6hint=2001:db8:5::1
                dohpath=/dns-query{?dns}
                )
customer5._deleg.example.       3600    IN      RRSIG   IDELEG ...

;; ADDITIONAL SECTION:
ns.customer5.example.   3600    IN      A       198.51.100.5
ns.customer5.example.   3600    IN      AAAA    2001:db8:5::1

;; Query time: 0 msec
;; EDNS: version 0; flags: do ; udp: 1232
;; SERVER: 192.0.2.53
;; WHEN: Mon Feb 24 20:36:25 2025
;; MSG SIZE  rcvd: 456
]]></artwork>
        </figure>
        <t>The referral response in <xref target="deleg-response"/> includes the signed IDELEG RRset in the authority section.</t>
        <t>As another example, querying the zone from <xref target="dnssec-zone"/> for <tt>www.customer6.example. A</tt>, will return the following referral response:</t>
        <figure anchor="no-incr-deleg-response">
          <name>Referral response without incremental deleg</name>
          <artwork><![CDATA[
;; ->>HEADER<<- opcode: QUERY, rcode: NOERROR, id: 36574
;; flags: qr ; QUERY: 1, ANSWER: 0, AUTHORITY: 9, ADDITIONAL: 2
;; QUESTION SECTION:
;; www.customer6.example.       IN      A

;; ANSWER SECTION:

;; AUTHORITY SECTION:
customer6.example.      3600    IN      NS      ns.customer6.example.
customer6.example.      3600    IN      DS      ...
customer6.example.      3600    IN      RRSIG   DS ...
customer5._deleg.example.       1234    IN      NSEC    (
                customer7._deleg.example.  RRSIG NSEC IDELEG )
customer5._deleg.example.       1234    IN      RRSIG   NSEC ...
example.        1234    IN      NSEC    (
                customer5._deleg.example.  NS SOA RRSIG NSEC DNSKEY )
example.        1234    IN      RRSIG   NSEC ...

;; ADDITIONAL SECTION:
ns.customer6.example.   3600    IN      A       203.0.113.1
ns.customer6.example.   3600    IN      AAAA    2001:db8:6::1

;; Query time: 0 msec
;; EDNS: version 0; flags: do ; udp: 1232
;; SERVER: 192.0.2.53
;; WHEN: Tue Feb 25 10:23:53 2025
;; MSG SIZE  rcvd: 744
]]></artwork>
        </figure>
        <t>Next to the legacy delegation, the incremental deleg supporting authoritative returns the NSEC(3) RRs needed to show that there was no incremental delegation in the referral response in <xref target="no-incr-deleg-response"/>.</t>
        <t>Querying the zone from <xref target="dnssec-zone"/> for <tt>www.customer7.example. A</tt>, will return the following referral response:</t>
        <figure anchor="alias-response">
          <name>Aliasing referral response</name>
          <artwork><![CDATA[
;; ->>HEADER<<- opcode: QUERY, rcode: NOERROR, id: 9456
;; flags: qr ; QUERY: 1, ANSWER: 0, AUTHORITY: 7, ADDITIONAL: 2
;; QUESTION SECTION:
;; www.customer7.example.       IN      A

;; ANSWER SECTION:

;; AUTHORITY SECTION:
customer7.example.      3600    IN      NS      ns.customer5.example.
customer7.example.      3600    IN      DS      ...
customer7.example.      3600    IN      RRSIG   DS ...
customer7._deleg.example.       3600    IN      CNAME   (
                customer5._deleg.example. )
customer7._deleg.example.       3600    IN      RRSIG   CNAME ...
customer5._deleg.example.       3600    IN      IDELEG   1 (
                ns.customer5.example. alpn=h2,h3
                ipv4hint=198.51.100.5 ipv6hint=2001:db8:5::1 )
customer5._deleg.example.       3600    IN      RRSIG   IDELEG ...

;; ADDITIONAL SECTION:
ns.customer5.example.   3600    IN      A       198.51.100.5
ns.customer5.example.   3600    IN      AAAA    2001:db8:5::1

;; Query time: 0 msec
;; EDNS: version 0; flags: do ; udp: 1232
;; SERVER: 192.0.2.53
;; WHEN: Tue Feb 25 10:55:07 2025
;; MSG SIZE  rcvd: 593
]]></artwork>
        </figure>
        <t>The incremental delegation of <tt>customer7.example.</tt> is aliased to the one that is also used by <tt>customer5.example.</tt>
Since both delegations are in the same zone, the authoritative name server for <tt>example.</tt> returns both the CNAME realising the alias, as well as the IDELEG RRset which is the target of the alias in <xref target="alias-response"/>.
In other cases an returned CNAME or IDELEG RR in AliasMode may need further chasing by the resolver.
<!-- TODO: Add an AliasMode referral without expansion within the zone -->
        </t>
        <t>With unsigned zones, only if an incremental deleg delegation exists, the IDELEG RRset (or CNAME) will be present in the authority section of referral responses.
<!-- TODO: Add a referral response for an unsigned zone -->
If the incremental deleg does not exist, then it is simply absent from the authority section and the referral response is indistinguishable from an non supportive authoritative.
<!-- TODO: Add a non incremental deleg referral response for an unsigned zone -->
        </t>
      </section>
      <section anchor="behavior-with-auth-support">
        <name>Resolver behavior with authoritative name server support</name>
        <t>Incremental deleg supporting authoritative name servers will include the incremental delegation information (or the NSEC(3) records showing the non-existence) in the authority section of referral responses.
For an unsigned zone, an incremental deleg supporting authoritative cannot return that an incremental delegation is absent (because of lack of an authenticated denial of existence), however with support from the served zone (the zone has the Resource Record provisioned <tt>*._deleg IN IDELEG 0 .</tt>), the authoritative name server can signal support also for unsigned zones (see <xref target="extra-optimized">Extra optimized implementation</xref>).</t>
        <t>If it is known that an authoritative name server supports incremental deleg, then no direct queries for the incremental delegation need to be sent in parallel to the legacy delegation query.
A resolver <bcp14>SHOULD</bcp14> register that an authoritative name server supports incremental deleg when the authority section, of the returned referral responses from that authoritative name server, contains incremental delegation information.</t>
        <t>When the authority section of a referral response contains a IDELEG RRset or a CNAME on the incremental delegation name, or valid NSEC(3) RRs showing the non-existence of such IDELEG or CNAME RRset, then the resolver <bcp14>SHOULD</bcp14> register that the contacted authoritative name server supports incremental deleg for the duration indicated by the TTL for that IDELEG, CNAME or NSEC(3) RRset, adjusted to the resolver's TTL boundaries, but only if it is longer than any already registered duration.
Subsequent queries <bcp14>SHOULD NOT</bcp14> include incremental deleg queries, as described in <xref target="recursive-resolver-behavior"/>, to be send in parallel for the duration support for incremental deleg is registered for the authoritative name server.</t>
        <t>For example, in <xref target="deleg-response"/>, the IDELEG RRset at the incremental delegation point has TTL 3600.
The resolver should register that the contacted authoritative name server supports incremental deleg for (at least) 3600 seconds (one hour).
All subsequent queries to that authoritative name server <bcp14>SHOULD NOT</bcp14> include incremental deleg queries to be send in parallel.</t>
        <t>If the authority section contains more than one RRset making up the incremental delegation, then the RRset with the longest TTL <bcp14>MUST</bcp14> be taken to determine the duration for which incremental deleg support is registered.</t>
        <t>For example, in <xref target="alias-response"/>, both a CNAME and a IDELEG RRset for the incremental delegation are included in the authority section.
The longest TTL must be taken for incremental support registration, though because the TTL of both RRsets is 3600, it does not matter in this case.</t>
        <t>With DNSSEC signed zones, support is apparent with all referral responses.
With unsigned zones, support is apparent only from referral responses for which an incremental delegation exists, unless the zone has the Resource Record <tt>*._deleg IN IDELEG 0 .</tt> provisioned (see <xref target="extra-optimized">Extra optimized implementation</xref>).</t>
        <t>If the resolver knows that the authoritative name server supports incremental deleg, <em>and</em> a DNSSEC signed zone is being served, then all referrals <bcp14>SHOULD</bcp14> contain either an incremental delegation, or NSEC(3) records showing that the delegation does not exist.
If a referral is returned that does not contain an incremental delegation nor an indication that it does not exist, then the resolver <bcp14>MAY</bcp14> register that authoritative server does not support incremental deleg and <bcp14>MUST</bcp14> send an additional incremental deleg query to find the incremental delegation (or denial of its existence).</t>
      </section>
    </section>
    <section anchor="extra-optimized">
      <name>Extra optimized implementation</name>
      <t>A IDELEG RRset on an incremental delegation point, with a IDELEG RR in AliasMode, aliasing to the root zone, <bcp14>MUST</bcp14> be interpreted to mean that the legacy delegation information <bcp14>MUST</bcp14> be used to follow the referral.
All service parameters for such AliasMode (aliasing to the root) IDELEG RRs on the incremental delegation point, <bcp14>MUST</bcp14> be ignored.</t>
      <t>For example, such a IDELEG RRset registered on the wildcard below the <tt>_deleg</tt> label on the apex of a zone, can signal that legacy DNS referrals <bcp14>MUST</bcp14> be used for both signed and <em>unsigned</em> zones:</t>
      <figure anchor="wildcard-deleg">
        <name>Wildcard incremental deleg to control duration of detected support</name>
        <artwork><![CDATA[
$ORIGIN example.
@                 IN  SOA   ns zonemaster ...
*._deleg   86400  IN  IDELEG 0 .
customer1._deleg  IN  IDELEG 1 ( ns.customer1
                                 ipv4hint=198.51.100.1,203.0.113.1
                                 ipv6hint=2001:db8:1::1,2001:db8:2::1
                               )
customer3._deleg  IN  CNAME _dns.ns.operator1
]]></artwork>
      </figure>
      <t>Resolvers <bcp14>SHOULD</bcp14> register that an authoritative name server supports incremental deleg, if such a IDELEG RRset is returned in the authority section of referral responses, for the duration of the TTL if the IDELEG RRset, adjusted to the resolver's TTL boundaries, but only if it is longer than any already registered duration.
Note that this will also be included in referral responses for unsigned zones, which would otherwise not have signalling of incremental deleg support by the authoritative name server.
Also, signed zones need fewer RRs to indicate that no incremental delegation exists.
The wildcard expansion already shows the closest encloser (i.e. <tt>_deleg.&lt;apex&gt;</tt>), so only one additional NSEC(3) is needed to show non-existence of the queried for name below the closest encloser.</t>
      <t>This method of signalling that the legacy delegation <bcp14>MUST</bcp14> be used, is <bcp14>RECOMMENDED</bcp14>.</t>
    </section>
    <section anchor="priming-queries">
      <name>Priming queries</name>
      <t>Some zones, such as the root zone, are targeted directly from hints files.
Information about which authoritative name servers and with capabilities, <bcp14>MAY</bcp14> be provided in a IDELEG RRset directly at the <tt>_deleg</tt> label under the apex of the zone.
Priming queries from a incremental deleg supporting resolver, <bcp14>MUST</bcp14> send an <tt>_deleg.&lt;apex&gt; IDELEG</tt> query in parallel to the legacy <tt>&lt;apex&gt; NS</tt> query and process the content as if it was found through an incremental referral response.</t>
    </section>
    <section anchor="how-does-incremental-deleg-meet-the-requirements">
      <name>How does incremental deleg meet the requirements</name>
      <t>This section will discuss how incremental deleg meets the requirements for a new delegation mechanism as described in <xref target="I-D.ietf-deleg-requirements-02"/></t>
      <ul spacing="normal">
        <li>
          <t>H1. DELEG must not disrupt the existing registration model of domains.  </t>
          <t>
The existing zone structure including the concept of delegations from
a parent zone to a child zone is left unchanged.</t>
        </li>
        <li>
          <t>H2. DELEG must be backwards compatible with the existing ecosystem.  </t>
          <t>
The new delegations do not interfere with legacy software.  </t>
          <t>
The behavior of incremental deleg-aware resolvers includes a fallback to NS
records if no incremental delegation is present (See <xref target="recursive-resolver-behavior"/>).</t>
        </li>
        <li>
          <t>H3. DELEG must not negatively impact most DNS software.  </t>
          <t>
Incremental deleg introduces a new RR type.
Software that parses zone file format needs to be changed to support the new
type.
Though unknown type notation <xref target="RFC3597"/> can be used in some cases if no support for the new RR type is present.
Existing authoritatives can serve incremental deleg zones (though less efficiently), existing signers can sign incremental deleg zones, existing diagnostic tools can query incremental deleg zones.
Non-recursive DNSSEC validators can operate independently from (possibly legacy) recursive resolvers.</t>
        </li>
        <li>
          <t>H4. DELEG must be able to secure delegations with DNSSEC.  </t>
          <t>
Incremental delegations are automatically secured with DNSSEC
(if the parent zone is signed). A replacement for DS records is described in <xref target="I-D.homburg-deleg-incremental-dnssec"/>.</t>
        </li>
        <li>
          <t>H5. DELEG must support updates to delegation information with the same relative ease as currently exists with NS records.  </t>
          <t>
Incremental delegations are affected by TTL like any other
DNS record.</t>
        </li>
        <li>
          <t>H6. DELEG must be incrementally deployable and not require any sort of flag day of universal change.  </t>
          <t>
Incremental deleg zones can be added without upgrading authoritatives.
Incremental deleg zones still work with old resolvers and validators.
Basically any combination of old and new should work, though with
reduced efficiency for some combinations.</t>
        </li>
        <li>
          <t>H7. DELEG must allow multiple independent operators to simultaneously serve a zone.  </t>
          <t>
Incremental deleg allows for multiple IDELEG records. This allows
multiple operators to serve the zone.</t>
        </li>
        <li>
          <t>S1. DELEG should facilitate the use of new DNS transport mechanisms  </t>
          <t>
New transports are already defined for the DNS mode of SVCB (<xref target="RFC9461"/>).
The same parameters are used for IDELEG.</t>
        </li>
        <li>
          <t>S2. DELEG should make clear all of the necessary details for contacting a service  </t>
          <t>
Most of the needed SVCB parameters are already defined in existing standards.
The exception is a replacement for the DS records, which is described in <xref target="I-D.homburg-deleg-incremental-dnssec"/>.</t>
        </li>
        <li>
          <t>S3. DELEG should minimize transaction cost in its usage.  </t>
          <t>
Assuming Qname-minimisation, there are no extra queries needed in most cases
if the authoritative name server has incremental deleg support. The exception
is when the parent zone is not signed and has no incremental deleg records.
In that case, one extra query is needed when the parent zone is first
contacted (and every TTL).  </t>
          <t>
Additional queries may be needed to resolve aliases.</t>
        </li>
        <li>
          <t>S4. DELEG should simplify management of a zone's DNS service.  </t>
          <t>
Zone management can be simplified using the alias mode of IDELEG.
This allows the zone operator to change the details of the delegation
without involving the parent zone.  </t>
          <t>
Draft <xref target="I-D.homburg-deleg-incremental-dnssec"/> defines the dnskeyref parameter which offers the same simplification for DNSSEC delegations.</t>
        </li>
        <li>
          <t>S5. DELEG should allow for backward compatibility to the conventional NS-based delegation mechanism.  </t>
          <t>
NS records and glue can be extracted from the IDELEG record assuming no aliasing is used.  </t>
          <t>
The ds parameter in <xref target="I-D.homburg-deleg-incremental-dnssec"/> has the same value as the rdata of a DS record.</t>
        </li>
        <li>
          <t>S6. DELEG should be extensible and allow for the easy incremental addition of new delegation features after initial deployment.  </t>
          <t>
SVCB-style records are extensible by design.</t>
        </li>
        <li>
          <t>S7. DELEG should be able to convey a security model for delegations stronger than currently exists with DNSSEC.  </t>
          <t>
Increment delegations are protected by DNSSEC, unlike
NS records at the parent zone.</t>
        </li>
      </ul>
    </section>
    <section anchor="comparison-with-other-delegation-mechanisms">
      <name>Comparison with other delegation mechanisms</name>
      <t>Table <xref target="xtraqueries"/> provides an overview of when extra queries, in parallel to the legacy query, are sent.</t>
      <table anchor="xtraqueries">
        <name>Additional queries in parallel to the legacy query</name>
        <thead>
          <tr>
            <th align="center"> </th>
            <th align="center">apex query</th>
            <th align="center">auth support</th>
            <th align="center">_deleg presence</th>
            <th align="left"> </th>
            <th align="center">&lt;sub&gt;._deleg.&lt;apex&gt; IDELEG</th>
            <th align="center">_deleg.&lt;apex&gt; A</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="center">1</td>
            <td align="center">Yes</td>
            <td align="center">*</td>
            <td align="center">*</td>
            <td align="left"> </td>
            <td align="center"> </td>
            <td align="center"> </td>
          </tr>
          <tr>
            <td align="center">2</td>
            <td align="center">No</td>
            <td align="center">*</td>
            <td align="center">No</td>
            <td align="left"> </td>
            <td align="center"> </td>
            <td align="center"> </td>
          </tr>
          <tr>
            <td align="center">3</td>
            <td align="center">No</td>
            <td align="center">Yes</td>
            <td align="center">*</td>
            <td align="left"> </td>
            <td align="center"> </td>
            <td align="center"> </td>
          </tr>
          <tr>
            <td align="center">4</td>
            <td align="center">No</td>
            <td align="center">Unknown</td>
            <td align="center">Yes</td>
            <td align="left"> </td>
            <td align="center">X</td>
            <td align="center"> </td>
          </tr>
          <tr>
            <td align="center">5</td>
            <td align="center">No</td>
            <td align="center">Unknown</td>
            <td align="center">Unknown</td>
            <td align="left"> </td>
            <td align="center">X</td>
            <td align="center">only for unsigned zones</td>
          </tr>
        </tbody>
      </table>
      <t>The three headers on the left side of the table mean the following:</t>
      <dl newline="true">
        <dt>apex query:</dt>
        <dd>
          <t>Whether the query is for the apex of the target zone.
"Yes" means an apex query, "No" means a query below the apex which may be delegated</t>
        </dd>
        <dt>auth support:</dt>
        <dd>
          <t>Whether or not the target authoritative server supports incremental deleg.
"Yes" means it supports it and "Unknown" means support is not detected.
"*" means it does not matter</t>
        </dd>
        <dt><tt>_deleg</tt> presence:</dt>
        <dd>
          <t>Whether or not the <tt>_deleg</tt> label is present in the target zone (and thus incremental delegations)</t>
        </dd>
      </dl>
      <t>On the right side of the table are the extra queries, to be sent in parallel with the legacy query.
The <tt>_deleg</tt> presence test query (most right column) only needs to be sent to unsigned target zones, because its non-existence will be show in the NSEC(3) records showing the non-existence of the incremental delegation (second from right column).</t>
      <t>If the query name is the same as the apex of the target zone, no extra queries need to be sent (Row 1).
If the <tt>_deleg</tt> label is known not to exist in the target zone (Row 2) or if the target name server is known to support incremental deleg (Row 3), no extra queries need to be sent.
Only if it is unknown that the target name server supports incremental deleg, and the <tt>_deleg</tt> label is known to exist in the target zone (Row 4) or it is not known whether or not the <tt>_deleg</tt> label exists (Row 5), and extra incremental deleg query is sent in parallel to the legacy query.
If the target zone is unsigned, presence of the <tt>_deleg</tt> label needs to be tested explicitly (Row 5).</t>
      <section anchor="comparison-with-legacy-delegations">
        <name>Comparison with legacy delegations</name>
        <section anchor="the-delegation-point">
          <name>The delegation point</name>
          <t>Legacy delegations are realized by an non-authoritative NS RRset at the name of the delegated zone, but in the delegating zone (the parent side of the zone cut).
However, there is another NS RRset by the same name, but now authoritative, in the delegated zone (the child side of the zone cut).
Some resolvers prefer to use the authoritative child side NS RRset (see <xref section="5.4.1" sectionFormat="of" target="RFC2181"/>) for contacting the authoritative name servers of the delegated zone, and will use it to reach the zone if they encounter the child side NS RRset authoritatively in responses.
Some resolvers query explicitly for the authoritative child side NS RRset <xref target="I-D.ietf-dnsop-ns-revalidation"/>.
However, these NS RRsets can differ in content leading to errors and inconsistencies (see <xref section="3" sectionFormat="of" target="I-D.ietf-dnsop-ns-revalidation"/>).</t>
          <t>Incremental deleg eliminates these issues by placing the referral information, not at the name of the delegated zone, but authoritatively in the delegating zone.</t>
          <t>Having the referral information at an authoritative location brings clarity.
There can be no misinterpretation about who is providing the referral (the delegating zone, or the delegated zone).
In an future world where all delegations would be incremental delegations, all names will only be authoritative data, derivable from the name, for resolvers and other applications alike.</t>
        </section>
        <section anchor="legacy-referrals">
          <name>Legacy referrals</name>
          <t>Resolvers that support only legacy referrals will be on the internet for the foreseeable future, therefore a legacy referral <bcp14>MUST</bcp14> always be provided alongside the incremental referral.</t>
          <t>Legacy referrals can be deduced from the incremental delegation.
An authoritative could (in some cases) synthesize the legacy referral from the incremental delegation, however this is not <bcp14>RECOMMENDED</bcp14>.
It introduces an element of dynamism which is at the time of writing not part of authoritative name server behavior specification.
Moreover, authoritative name servers could transfer the zone data to non incremental deleg supporting and aware name servers, which would not have this feature.
We leave provisioning of legacy referrals from incremental delegations (for now) out of scope for this document.</t>
        </section>
        <section anchor="number-of-queries">
          <name>Number of queries</name>
          <t>Legacy resolvers that do not do DNS Query Name Minimisation, will get a referral in a single query.
The resolution process with incremental delegations must find the exact zone cut explicitly, comparable with DNS Query Name Minimisation.
The query increase to find the zone cut (and referral) is comparable to that of a resolver performing DNS Query Name minimisation.</t>
        </section>
      </section>
      <section anchor="comparison-with-name-dns-query-name-minimisation">
        <name>Comparison with Name DNS Query Name Minimisation</name>
        <t>There are no extra queries needed in most cases if the authoritative name server has incremental deleg support. The exception is when the parent zone is not signed and has no incremental deleg records.
In that case, one extra query is needed when the parent zone is first contacted (and every TTL)</t>
      </section>
      <section anchor="comparison-with-i-dwesplaap-deleg">
        <name>Comparison with <xref target="I-D.wesplaap-deleg"/></name>
        <table>
          <name>Comparison of [I-D.wesplaap-deleg] with [this document]</name>
          <thead>
            <tr>
              <th align="left">[?I-D.wesplaap-deleg]</th>
              <th align="left">[this document]</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Requires implementation in both authoritative name server as well as in the resolver, DNSSEC signers and validators and all other DNS software</td>
              <td align="left">Only resolver implementation required. But optimized with updated authoritative software.</td>
            </tr>
            <tr>
              <td align="left">DELEG resolvers need to contact DELEG authoritatives directly</td>
              <td align="left">IDELEG resolvers can query for the incremental delegation data, therefore direct contact with IDELEG supporting authoritatives is not necessary. All legacy infrastructure (including forwarders etc.) is supported.</td>
            </tr>
            <tr>
              <td align="left">DNSKEY flag needed to signal IDELEG support with all authoritative name servers that serve the parent (delegating) domain. Special requirements for the child domain.</td>
              <td align="left">No DNSKEY flag needed. Separation of concerns.</td>
            </tr>
            <tr>
              <td align="left">Authoritative name servers need to be updated all at once</td>
              <td align="left">Authoritative name servers may be updated gradually for optimization</td>
            </tr>
            <tr>
              <td align="left">New semantics about what is authoritative (BOGUS with current DNSSEC validators)</td>
              <td align="left">Works with current DNS and DNSSEC semantics. Easier to implement.</td>
            </tr>
            <tr>
              <td align="left">No extra queries</td>
              <td align="left">One extra query, in parallel to the legacy query, <em>per authoritative</em> server when incremental deleg support is not yet detected, and one extra query <em>per unsigned zone</em> to determine presence of the <tt>_deleg</tt> label</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
    <section anchor="implementation-status">
      <name>Implementation Status</name>
      <t><strong>Note to the RFC Editor</strong>: please remove this entire section before publication.</t>
      <t>We are using RR type code 65280 for experiments.</t>
      <t>Jesse van Zutphen has built a proof of concept implementation supporting incremental delegations as specified in a previous version of this document <xref target="I-D.homburg-deleg-incremental-deleg-00"/> for the Unbound recursive resolver as part of his master thesis for the Security and Network Engineering master program of the University of Amsterdam <xref target="JZUTPHEN"/>.
Jesse's implementation has been adapted to query for the IDELEG RR types (with code point 65280).
This version is available in the <tt>ideleg</tt> branch of the <tt>NLnetLabs/unbound</tt> github repository <xref target="IDELEG4UNBOUND"/>.
Note that this implementation does not yet support <xref target="behavior-with-auth-support">optimized behaviour</xref>, and also does not yet follow AliasMode IDELEG RRs.</t>
      <t>The ldns DNS library and tools software has been extended with support for IDELEG, which is available in the <tt>features/ideleg</tt> branch of the <tt>NLnetLabs/ldns</tt> github repository <xref target="IDELEG4LDNS"/>.
This includes support for IDELEG in the DNS lookup utility <tt>drill</tt>, as well as in the DNSSEC zone signer <tt>ldns-signzone</tt> and all other tools and examples included with the ldns software.</t>
      <t>Wouter Petri has built a proof of concept support for IDELEG in the NSD authoritative name server software as part of a research project for the Security and Network Engineering master program of the University of Amsterdam <xref target="WPETRI"/>.
The source code of his implementation is available on github <xref target="IDELEG4NSD"/>.</t>
      <t>Wouter's implementation is serving the <tt>ideleg.net.</tt> domain, containing a variety of different incremental delegations, for evaluation purposes.
We are planning to provide information about the deployment, including what software to evaluate these delegations, at <eref target="http://ideleg.net/">http://ideleg.net/</eref>, hopefully before the <eref target="https://datatracker.ietf.org/meeting/122/proceedings">IETF 122 in Bangkok</eref>.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Incremental deleg moves the location of  referral information to a unique  location that currently exists. However, as this is a new approach, thought must be given to usage.   There must be some checks to ensure that the registering a _deleg subdomain happens at the time the domain is provisioned. The same care needs to be addressed when a domain is deprovisioned that the _deleg is removed.  This is similar to what happens to NS A records deployed in parent zones to act as Glue.</t>
      <t>While the recommendation is to deploy DNSSEC with incremental deleg, it is not mandatory.  However, using incremental deleg with unsigned zones can create possibilities of domain hijackings. This could  be hard to detect when not speaking directly to the authoritative name server.
This risk of domain hijacking is not expected to increase significantly compared to the situation without incremental deleg.</t>
      <t>There are bound to be other considerations.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="deleg-rr-type">
        <name>IDELEG RR type</name>
        <t>IANA is requested to update the "Resource Record (RR) TYPEs" registry under the "Domain Name System (DNS) Parameters" registry group as follows:</t>
        <table>
          <thead>
            <tr>
              <th align="left">TYPE</th>
              <th align="left">Value</th>
              <th align="left">Meaning</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">IDELEG</td>
              <td align="left">TBD</td>
              <td align="left">Delegation</td>
              <td align="left">[this document]</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="node-name">
        <name>_deleg Node Name</name>
        <t>Per <xref target="RFC8552"/>, IANA is requested to add the following entry to the DNS "Underscored and Globally Scoped DNS Node Names" registry:</t>
        <table>
          <name>Entry in the Underscored and Globally Scoped DNS Node Names registry</name>
          <thead>
            <tr>
              <th align="left">RR Type</th>
              <th align="left">_NODE NAME</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">IDELEG</td>
              <td align="left">_deleg</td>
              <td align="left">[this document]</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <referencegroup anchor="STD13" target="https://www.rfc-editor.org/info/std13">
          <reference anchor="RFC1034" target="https://www.rfc-editor.org/info/rfc1034">
            <front>
              <title>Domain names - concepts and facilities</title>
              <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
              <date month="November" year="1987"/>
              <abstract>
                <t>This RFC is the revised basic definition of The Domain Name System. It obsoletes RFC-882. This memo describes the domain style names and their used for host address look up and electronic mail forwarding. It discusses the clients and servers in the domain name system and the protocol used between them.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="13"/>
            <seriesInfo name="RFC" value="1034"/>
            <seriesInfo name="DOI" value="10.17487/RFC1034"/>
          </reference>
          <reference anchor="RFC1035" target="https://www.rfc-editor.org/info/rfc1035">
            <front>
              <title>Domain names - implementation and specification</title>
              <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
              <date month="November" year="1987"/>
              <abstract>
                <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="13"/>
            <seriesInfo name="RFC" value="1035"/>
            <seriesInfo name="DOI" value="10.17487/RFC1035"/>
          </reference>
        </referencegroup>
        <reference anchor="RFC9460">
          <front>
            <title>Service Binding and Parameter Specification via the DNS (SVCB and HTTPS Resource Records)</title>
            <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
            <author fullname="M. Bishop" initials="M." surname="Bishop"/>
            <author fullname="E. Nygren" initials="E." surname="Nygren"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies the "SVCB" ("Service Binding") and "HTTPS" DNS resource record (RR) types to facilitate the lookup of information needed to make connections to network services, such as for HTTP origins. SVCB records allow a service to be provided from multiple alternative endpoints, each with associated parameters (such as transport protocol configuration), and are extensible to support future uses (such as keys for encrypting the TLS ClientHello). They also enable aliasing of apex domains, which is not possible with CNAME. The HTTPS RR is a variation of SVCB for use with HTTP (see RFC 9110, "HTTP Semantics"). By providing more information to the client before it attempts to establish a connection, these records offer potential benefits to both performance and privacy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9460"/>
          <seriesInfo name="DOI" value="10.17487/RFC9460"/>
        </reference>
        <reference anchor="RFC9461">
          <front>
            <title>Service Binding Mapping for DNS Servers</title>
            <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>The SVCB DNS resource record type expresses a bound collection of endpoint metadata, for use when establishing a connection to a named service. DNS itself can be such a service, when the server is identified by a domain name. This document provides the SVCB mapping for named DNS servers, allowing them to indicate support for encrypted transport protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9461"/>
          <seriesInfo name="DOI" value="10.17487/RFC9461"/>
        </reference>
        <reference anchor="RFC7858">
          <front>
            <title>Specification for DNS over Transport Layer Security (TLS)</title>
            <author fullname="Z. Hu" initials="Z." surname="Hu"/>
            <author fullname="L. Zhu" initials="L." surname="Zhu"/>
            <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="D. Wessels" initials="D." surname="Wessels"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
              <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7858"/>
          <seriesInfo name="DOI" value="10.17487/RFC7858"/>
        </reference>
        <reference anchor="RFC8484">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="RFC9250">
          <front>
            <title>DNS over Dedicated QUIC Connections</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>This document describes the use of QUIC to provide transport confidentiality for DNS. The encryption provided by QUIC has similar properties to those provided by TLS, while QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides more efficient packet-loss recovery than UDP. DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC 7858, and latency characteristics similar to classic DNS over UDP. This specification describes the use of DoQ as a general-purpose transport for DNS and includes the use of DoQ for stub to recursive, recursive to authoritative, and zone transfer scenarios.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9250"/>
          <seriesInfo name="DOI" value="10.17487/RFC9250"/>
        </reference>
        <reference anchor="RFC6672">
          <front>
            <title>DNAME Redirection in the DNS</title>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <author fullname="W. Wijngaards" initials="W." surname="Wijngaards"/>
            <date month="June" year="2012"/>
            <abstract>
              <t>The DNAME record provides redirection for a subtree of the domain name tree in the DNS. That is, all names that end with a particular suffix are redirected to another part of the DNS. This document obsoletes the original specification in RFC 2672 as well as updates the document on representing IPv6 addresses in DNS (RFC 3363). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6672"/>
          <seriesInfo name="DOI" value="10.17487/RFC6672"/>
        </reference>
        <reference anchor="RFC9156">
          <front>
            <title>DNS Query Name Minimisation to Improve Privacy</title>
            <author fullname="S. Bortzmeyer" initials="S." surname="Bortzmeyer"/>
            <author fullname="R. Dolmans" initials="R." surname="Dolmans"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="November" year="2021"/>
            <abstract>
              <t>This document describes a technique called "QNAME minimisation" to improve DNS privacy, where the DNS resolver no longer always sends the full original QNAME and original QTYPE to the upstream name server. This document obsoletes RFC 7816.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9156"/>
          <seriesInfo name="DOI" value="10.17487/RFC9156"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8767">
          <front>
            <title>Serving Stale Data to Improve DNS Resiliency</title>
            <author fullname="D. Lawrence" initials="D." surname="Lawrence"/>
            <author fullname="W. Kumari" initials="W." surname="Kumari"/>
            <author fullname="P. Sood" initials="P." surname="Sood"/>
            <date month="March" year="2020"/>
            <abstract>
              <t>This document defines a method (serve-stale) for recursive resolvers to use stale DNS data to avoid outages when authoritative nameservers cannot be reached to refresh expired data. One of the motivations for serve-stale is to make the DNS more resilient to DoS attacks and thereby make them less attractive as an attack vector. This document updates the definitions of TTL from RFCs 1034 and 1035 so that data can be kept in the cache beyond the TTL expiry; it also updates RFC 2181 by interpreting values with the high-order bit set as being positive, rather than 0, and suggests a cap of 7 days.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8767"/>
          <seriesInfo name="DOI" value="10.17487/RFC8767"/>
        </reference>
        <reference anchor="RFC3597">
          <front>
            <title>Handling of Unknown DNS Resource Record (RR) Types</title>
            <author fullname="A. Gustafsson" initials="A." surname="Gustafsson"/>
            <date month="September" year="2003"/>
            <abstract>
              <t>Extending the Domain Name System (DNS) with new Resource Record (RR) types currently requires changes to name server software. This document specifies the changes necessary to allow future DNS implementations to handle new RR types transparently. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3597"/>
          <seriesInfo name="DOI" value="10.17487/RFC3597"/>
        </reference>
        <reference anchor="RFC2181">
          <front>
            <title>Clarifications to the DNS Specification</title>
            <author fullname="R. Elz" initials="R." surname="Elz"/>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <date month="July" year="1997"/>
            <abstract>
              <t>This document considers some areas that have been identified as problems with the specification of the Domain Name System, and proposes remedies for the defects identified. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2181"/>
          <seriesInfo name="DOI" value="10.17487/RFC2181"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="IDELEG4UNBOUND" target="https://github.com/NLnetLabs/unbound/tree/ideleg">
          <front>
            <title>A proof of concept implementation of incremental deleg</title>
            <author initials="J." surname="van Zutphen" fullname="Jesse van Zutphen">
              <organization/>
            </author>
            <author initials="P." surname="Homburg" fullname="Philip Homburg">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="JZUTPHEN" target="https://nlnetlabs.nl/downloads/publications/extensible-deleg-in-resolvers_2024-07-08.pdf">
          <front>
            <title>Extensible delegations in DNS Recursive resolvers</title>
            <author initials="J." surname="van Zutphen" fullname="Jesse van Zutphen">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IDELEG4NSD" target="https://github.com/WP-Official/nsd">
          <front>
            <title>A proof of concept support for IDELEG in the NSD authoritative name server software</title>
            <author initials="W." surname="Petri" fullname="Wouter Petri">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="WPETRI" target="https://nlnetlabs.nl/downloads/publications/extensible-delegations-in-authoritative-nameservers_2025-02-09.pdf">
          <front>
            <title>Extensible delegations in authoritative nameservers</title>
            <author initials="W." surname="Petri" fullname="Wouter Petri">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IDELEG4LDNS" target="https://github.com/NLnetLabs/ldns/tree/features/ideleg">
          <front>
            <title>A proof of concept support for IDELEG in the ldns DNS library and tools</title>
            <author initials="W." surname="Toorop" fullname="Willem Toorop">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="I-D.ietf-tls-esni">
          <front>
            <title>TLS Encrypted Client Hello</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Independent</organization>
            </author>
            <author fullname="Kazuho Oku" initials="K." surname="Oku">
              <organization>Fastly</organization>
            </author>
            <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
              <organization>Cryptography Consulting LLC</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="19" month="February" year="2025"/>
            <abstract>
              <t>   This document describes a mechanism in Transport Layer Security (TLS)
   for encrypting a ClientHello message under a server public key.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/tlswg/draft-ietf-tls-esni
   (https://github.com/tlswg/draft-ietf-tls-esni).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-esni-23"/>
        </reference>
        <reference anchor="I-D.wesplaap-deleg">
          <front>
            <title>Extensible Delegation for DNS</title>
            <author fullname="Tim April" initials="T." surname="April">
              <organization>Google, LLC</organization>
            </author>
            <author fullname="Petr Špaček" initials="P." surname="Špaček">
              <organization>ISC</organization>
            </author>
            <author fullname="Ralf Weber" initials="R." surname="Weber">
              <organization>Akamai Technologies</organization>
            </author>
            <author fullname="David C Lawrence" initials="" surname="Lawrence">
              <organization>Salesforce</organization>
            </author>
            <date day="18" month="February" year="2025"/>
            <abstract>
              <t>   A delegation in the Domain Name System (DNS) is a mechanism that
   enables efficient and distributed management of the DNS namespace.
   It involves delegating authority over subdomains to specific DNS
   servers via NS records, allowing for a hierarchical structure and
   distributing the responsibility for maintaining DNS records.

   An NS record contains the hostname of the nameserver for the
   delegated namespace.  Any facilities of that nameserver must be
   discovered through other mechanisms.  This document proposes a new
   extensible DNS record type, DELEG, for delegation the authority for a
   domain.  Future documents then can use this mechanism to use
   additional information about the delegated namespace and the
   capabilities of authoritative nameservers for the delegated
   namespace.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-wesplaap-deleg-02"/>
        </reference>
        <reference anchor="I-D.ietf-dnsop-ns-revalidation">
          <front>
            <title>Delegation Revalidation by DNS Resolvers</title>
            <author fullname="Shumon Huque" initials="S." surname="Huque">
              <organization>Salesforce</organization>
            </author>
            <author fullname="Paul A. Vixie" initials="P. A." surname="Vixie">
              <organization>SIE Europe, U.G.</organization>
            </author>
            <author fullname="Willem Toorop" initials="W." surname="Toorop">
              <organization>NLnet Labs</organization>
            </author>
            <date day="27" month="February" year="2025"/>
            <abstract>
              <t>   This document recommends improved DNS resolver behavior with respect
   to the processing of Name Server (NS) resource record (RR) sets
   (RRsets) during iterative resolution.  When following a referral
   response from an authoritative server to a child zone, DNS resolvers
   should explicitly query the authoritative NS RRset at the apex of the
   child zone and cache this in preference to the NS RRset on the parent
   side of the zone cut.  The (A and AAAA) address RRsets in the
   additional section from referral responses and authoritative NS
   answers for the names of the NS RRset, should similarly be re-queried
   and used to replace the entries with the lower trustworthiness
   ranking in cache.  Resolvers should also periodically revalidate the
   delegation by re-querying the parent zone at the expiration of the
   TTL of either the parent or child NS RRset, whichever comes first.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dnsop-ns-revalidation-09"/>
        </reference>
        <referencegroup anchor="BCP219" target="https://www.rfc-editor.org/info/bcp219">
          <reference anchor="RFC9499" target="https://www.rfc-editor.org/info/rfc9499">
            <front>
              <title>DNS Terminology</title>
              <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
              <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
              <date month="March" year="2024"/>
              <abstract>
                <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
                <t>This document updates RFC 2308 by clarifying the definitions of "forwarder" and "QNAME". It obsoletes RFC 8499 by adding multiple terms and clarifications. Comprehensive lists of changed and new definitions can be found in Appendices A and B.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="219"/>
            <seriesInfo name="RFC" value="9499"/>
            <seriesInfo name="DOI" value="10.17487/RFC9499"/>
          </reference>
        </referencegroup>
        <reference anchor="I-D.ietf-deleg-requirements-02">
          <front>
            <title>Problem Statement and Requirements for an Improved DNS Delegation Mechanism abbrev: DNS DELEG Requirements</title>
            <author fullname="David C Lawrence" initials="" surname="Lawrence">
              <organization>Salesforce</organization>
            </author>
            <author fullname="Edward Lewis" initials="E." surname="Lewis">
         </author>
            <author fullname="Jim Reid" initials="J." surname="Reid">
         </author>
            <author fullname="Tim Wicinski" initials="T." surname="Wicinski">
              <organization>Cox Communications</organization>
            </author>
            <date day="12" month="October" year="2024"/>
            <abstract>
              <t>   Authoritative control of parts of the Domain Name System namespace
   are indicated with a special record type, the NS record, that can
   only indicate the name of the server which a client resolver should
   contact for more information.  Any other features of that server must
   then be discovered through other mechanisms.  This draft considers
   the limitations of the current system, benefits that could be gained
   by changing it, and what requirements constrain an updated design.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-deleg-requirements-02"/>
        </reference>
        <reference anchor="I-D.homburg-deleg-incremental-dnssec">
          <front>
            <title>Incrementally Deployable DNSSEC Delegation</title>
            <author fullname="Philip Homburg" initials="P." surname="Homburg">
              <organization>NLnet Labs</organization>
            </author>
            <author fullname="Willem Toorop" initials="W." surname="Toorop">
              <organization>NLnet Labs</organization>
            </author>
            <date day="16" month="January" year="2025"/>
            <abstract>
              <t>   This document proposes a DNSSEC delegation mechanism that complements
   [I-D.homburg-deleg-incremental-deleg].  In addition this mechanism
   simplifies multi-signer setups by removing the need to coordinate for
   signers during key rollovers.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-homburg-deleg-incremental-dnssec-00"/>
        </reference>
        <reference anchor="I-D.homburg-deleg-incremental-deleg-00">
          <front>
            <title>Incrementally Deployable Extensible Delegation for DNS</title>
            <author fullname="Philip Homburg" initials="P." surname="Homburg">
              <organization>NLnet Labs</organization>
            </author>
            <author fullname="Jesse van Zutphen" initials="J." surname="van Zutphen">
              <organization>University of Amsterdam</organization>
            </author>
            <author fullname="Willem Toorop" initials="W." surname="Toorop">
              <organization>NLnet Labs</organization>
            </author>
            <date day="8" month="July" year="2024"/>
            <abstract>
              <t>   This document proposes a mechanism for extensible delegations in the
   DNS.  The mechanism realizes delegations with SVCB resource record
   sets placed below a _deleg label in the apex of the delegating zone.
   This authoritative delegation point can be aliased to other names
   using CNAME and DNAME.  The mechanism inherits extensibility from
   SVCB.

   Support in recursive resolvers suffices for the mechanism to be fully
   functional.  The number of subsequent interactions between the
   recursive resolver and the authoritative name servers is comparable
   with those for DNS Query Name Minimisation.  Additionally, but not
   required, support in the authoritative name servers enables optimized
   behavior with reduced (simultaneous) queries.  None, mixed or full
   deployment of the mechanism on authoritative name servers are all
   fully functional, allowing for the mechanism to be incrementally
   deployed.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-homburg-deleg-incremental-deleg-00"/>
        </reference>
        <reference anchor="RFC8552">
          <front>
            <title>Scoped Interpretation of DNS Resource Records through "Underscored" Naming of Attribute Leaves</title>
            <author fullname="D. Crocker" initials="D." surname="Crocker"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>Formally, any DNS Resource Record (RR) may occur under any domain name. However, some services use an operational convention for defining specific interpretations of an RRset by locating the records in a DNS branch under the parent domain to which the RRset actually applies. The top of this subordinate branch is defined by a naming convention that uses a reserved node name, which begins with the underscore character (e.g., "_name"). The underscored naming construct defines a semantic scope for DNS record types that are associated with the parent domain above the underscored branch. This specification explores the nature of this DNS usage and defines the "Underscored and Globally Scoped DNS Node Names" registry with IANA. The purpose of this registry is to avoid collisions resulting from the use of the same underscored name for different services.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="222"/>
          <seriesInfo name="RFC" value="8552"/>
          <seriesInfo name="DOI" value="10.17487/RFC8552"/>
        </reference>
        <reference anchor="I-D.tapril-ns2">
          <front>
            <title>Parameterized Nameserver Delegation with NS2 and NS2T</title>
            <author fullname="Tim April" initials="T." surname="April">
              <organization>Akamai Technologies</organization>
            </author>
            <date day="13" month="July" year="2020"/>
            <abstract>
              <t>   Within the DNS, there is no mechanism for authoritative servers to
   advertise which transport methods they are capable of.  If secure
   transport methods are adopted by authoritative operators, transport
   signaling would be required to negotiate how authoritative servers
   would be contacted by resolvers.  This document provides two new
   Resource Record Types, NS2 and NS2T, to facilitate this negotiation
   by allowing zone owners to signal how the authoritative nameserver(s)
   for their zone(s) may accept queries.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-tapril-ns2-01"/>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The idea to utilize SVCB based RRs to signal capabilities was first proposed by Tim April in <xref target="I-D.tapril-ns2"/>.</t>
      <t>The idea to utilize SVCB for extensible delegations (and also the idea described in this document) emerged from the DNS Hackathon at the IETF 118.
The following participants contributed to this brainstorm session: Vandan Adhvaryu, Roy Arends, David Blacka, Manu Bretelle, Vladimír Čunát, Klaus Darilion, Peter van Dijk, Christian Elmerot, Bob Halley, Philip Homburg, Shumon Huque, Shane Kerr, David C Lawrence, Edward Lewis, George Michaelson, Erik Nygren, Libor Peltan, Ben Schwartz, Petr Špaček, Jan Včelák and Ralf Weber</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
