<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-homburg-deleg-incremental-dnssec-00" category="std" consensus="true" submissionType="IETF" updates="4034, 4035" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.25.0 -->
  <front>
    <title abbrev="incremental-dnssec">Incrementally Deployable DNSSEC Delegation</title>
    <seriesInfo name="Internet-Draft" value="draft-homburg-deleg-incremental-dnssec-00"/>
    <author fullname="Philip Homburg">
      <organization>NLnet Labs</organization>
      <address>
        <email>philip@nlnetlabs.nl</email>
      </address>
    </author>
    <author fullname="Willem Toorop">
      <organization>NLnet Labs</organization>
      <address>
        <email>willem@nlnetlabs.nl</email>
      </address>
    </author>
    <date year="2025" month="January" day="16"/>
    <area>int</area>
    <workgroup>DNS Delegation</workgroup>
    <keyword>Internet-Draft</keyword>
    <keyword>DNS</keyword>
    <keyword>Resolver</keyword>
    <keyword>Delegation</keyword>
    <keyword>Authoritative</keyword>
    <keyword>Deployable</keyword>
    <keyword>Extensible</keyword>
    <abstract>
      <?line 64?>

<t>This document proposes a DNSSEC delegation mechanism that complements <xref target="I-D.homburg-deleg-incremental-deleg"/>.
In addition this mechanism simplifies multi-signer setups by removing the need to coordinate for signers during key rollovers.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-homburg-deleg-incremental-dnssec/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        deleg Working Group mailing list (<eref target="mailto:dd@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/dd/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/dd/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/NLnetLabs/incremental-dnssec"/>.</t>
    </note>
  </front>
  <middle>
    <?line 69?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document describes a DNSSEC delegation mechanism that complements <xref target="I-D.homburg-deleg-incremental-deleg"/>.
In particular, this mechanism makes it possible to store the contents of DS records as 'ds' parameters in SVCB-style records.
This way, a single mechanism can specify both name servers and DNSSEC delegations.</t>
      <t>In addition to a replacement for DS records, this document also introduces a 'dnskeyref' parameter that provides more flexibility and reduces the need to coordinate both for key rollovers and for multi-signer setups.</t>
      <t>There are two main problems with the current DS record.
The first is a DS record refers to a key in a DNSKEY RRset.
Updating this keys (during a key rollover) requires updating the corresponding DS record.
At the moment there is no widespread mechanism to update DS records automatically.
However, even if such an update mechanism would become widespread, the signer also has to track to propagation of the new DS record to the secondaries of the parent zone.
This is needed to make sure that all old DS records are expired in caches before moving to the next stage of a key roll.</t>
      <t>The second problem is that DS records enforce the use of a single DNSKEY RRset (at the apex of the zone).
This means that in a multi-signer setup, signers have to coordinate when
rolling their signing keys.</t>
      <t>There is one minor problem that can be solved as well.
Currently every signed zone has to have a DNSKEY RRset at the apex.
If a collection of zones share the same keys then this can be burden to maintain.</t>
      <t>The solution to these problems is to introduce a dnskeyref parameter that contains the names of DNSKEY RRsets that are allowed to sign a zone.
This extra level of indirection avoids the need to involve the parent during key rolls.
Multiple DNSKEY RRsets make it possible to perform key rolls in a multi-signer setup without coordination.
Finally, this allows a single DNSKEY RRset to be used for multiple domains.</t>
      <t>The charter for the Deleg working group has the following:</t>
      <blockquote>
        <t>The DNS protocol has limited ability for authoritative servers to signal their capabilities to recursive resolvers. In part, this stems from the lack of a mechanism for parents (often registries) to specify additional information about child delegations (often registrants) beyond NS, DS, and glue records. Further complicating matters is the similar lack of a mechanism for a registrant to signal that the operation of a delegation point is being outsourced to a different operator, leaving a challenge when operators need to update parental information that is only in the control of the child. Data is often out of synchronization between parents and children, which causes significant operational problems.</t>
      </blockquote>
      <t>The main focus to date has been on making it possible to update the name servers of a delegation without involving the registrant.
However, DNSSEC has a similar problem.</t>
      <t>The introduction of the dnskeyref parameter make it possible to manage DNSSEC without involving the registrant.</t>
      <t>One extra feature that becomes possible with the use of SVCB-style records is to let the zone manage downgrade attacks.
By introducing ds or dnskeyref parameters at different priority level, the zone can signal which algorithm is preferred.</t>
      <t>This document updates Section 2.1.1 of <xref target="RFC4034"/> in the following way: the sentence "If bit 7 has value 0, then the DNSKEY record holds some other type of DNS public key and <bcp14>MUST NOT</bcp14> be used to verify RRSIGs that cover RRsets." is replaced by "If bit 7 has value 0, then the DNSKEY record holds some other type of DNS public key and can be used to verify RRSIGs that cover RRsets if required."</t>
      <t>This document updates Section 5.3.1 of <xref target="RFC4035"/> and replaces the sentence "The RRSIG RR's Signer's Name field <bcp14>MUST</bcp14> be the name of the zone that contains the RRset." with "The RRSIG RR's Signer's Name field <bcp14>MUST</bcp14> be the name of any DNSKEY RRset that is allowed to sign the zone."</t>
      <section removeInRFC="true" anchor="incremental-deleg">
        <name>Incremental Deleg</name>
        <t>This document builds on <xref target="I-D.homburg-deleg-incremental-deleg"/> so examples
will show _deleg labels.
This document does however assume a new SVCB-style type called DELEG to be able to make clear that some semantics are different from SVCB records.</t>
        <t>The mechanisms described in this document can work with <xref target="I-D.wesplaap-deleg"/> as well.
However, this will create a deployment issue.
If a validator that implements this document and <xref target="I-D.wesplaap-deleg"/> forwards requests to a recursive resolver that does not implement <xref target="I-D.wesplaap-deleg"/> then validation will fail if the delegation uses DELEG records.</t>
        <t>In contrast the same setup but then with <xref target="I-D.homburg-deleg-incremental-deleg"/> will work.</t>
      </section>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

<t>This document follows terminology as defined in <xref target="RFC9499"/>.</t>
        <t>Throughout this document we will also use terminology with the meaning as defined below:</t>
        <dl newline="true">
          <dt>Incremental deleg:</dt>
          <dd>
            <t>The delegation mechanism as specified in <xref target="I-D.homburg-deleg-incremental-deleg"/>.</t>
          </dd>
          <dt>Incremental delegation:</dt>
          <dd>
            <t>A delegation as specified in <xref target="I-D.homburg-deleg-incremental-deleg"/>.</t>
          </dd>
          <dt>AliasMode:</dt>
          <dd>
            <t>An SVCB mode as specified in <xref target="RFC9460"/>.</t>
          </dd>
          <dt>ServiceMode:</dt>
          <dd>
            <t>An SVCB mode as specified in <xref target="RFC9460"/>.</t>
          </dd>
          <dt>SvcParamKey:</dt>
          <dd>
            <t>An SVCB field as specified in <xref target="RFC9460"/>.</t>
          </dd>
          <dt>SvcParamValue:</dt>
          <dd>
            <t>An SVCB field as specified in <xref target="RFC9460"/>.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="new-parameters">
      <name>New parameters</name>
      <t>Two new SVCB-style parameters are introduced: ds and dnskeyref.</t>
      <t>To limit validation resources and avoid accidentally delegating security, these two parameters are not valid after following an SVCB-style record in AliasMode.</t>
      <t>For DELEG records, these parameters are allowed to be added to DELEG records in
AliasMode.
To increase flexibility, a DELEG record in ServiceMode can be created with just ds or dnskeyref parameters but without name server delegation.
In that case the TargetName has to be set to ".".
Unlike SVCB records, for DELEG we allow mixing of AliasMode and ServiceMode records.</t>
      <section anchor="the-ds-parameter">
        <name>The ds parameter</name>
        <t>The ds parameter puts the equivalent of multiple DS records in one parameter.</t>
        <t>To simplify parsing, the presentation format is a space separated list of strings where each string is in the form &lt;key-tag&gt;:&lt;algorithm&gt;:&lt;igest-type&gt;:&lt;digest&gt;.
The parts key-tag, algorithm, digest-type and digest have their meaning and
encoding as described for the presentation format of the DS record (See <xref target="RFC4034"/>, Section 5.3).</t>
        <t>A parameters start with a 2-octet field that contains the SvcParamKey following
by a 2-octet field containing the length of the SvcParamValue.</t>
        <t>For the ds parameter, the SvcParamValue field consists of a sequence of
DS record RDATA octet sequences prefixed by a 1-octet length field.
The length field contains the length of the DS record RDATA.</t>
        <t>The encoding of the RDATA octet sequence is the same as for an equivalent
DS record (with the exact same owner name as the SVCB-style record that
contains the ds parameter).</t>
      </section>
      <section anchor="the-dnskeyref-parameter">
        <name>The dnskeyref parameter</name>
        <t>The dnskeyref parameter names one or more DNSKEY RRsets.
The presentation format of the value is a space separated list of DNS names.</t>
        <t>The wire format starts with a 2-octet field that contains that SvcParamKey followed by a 2-octet filed than contains the length of SvcParamValue.</t>
        <t>For dnskeyref, the SvcParamValue consists of just a concontenated list of uncompressed DNS names in wire format.
DNS names are self terminating so there is no need for extra length fields.</t>
      </section>
    </section>
    <section anchor="validator-behavior">
      <name>Validator behavior</name>
      <t>When following a delegation, a validator <bcp14>MUST</bcp14> first look for an Incremental delegation.
If presence or absence is not DNSSEC Secure (i.e., the status is Insecure, Bogus or Indeterminate) then the child is not secure and the algorithm stops here.</t>
      <t>If absence of an Incremental delegation is proven to be Secure then then validator <bcp14>MAY</bcp14> continue validating using DS records.</t>
      <t>If a secure Incremental delegation is found then the validator <bcp14>MUST</bcp14> ignore any DS records and solely rely on what is found in the Incremental deleg records.</t>
      <t>If the Incremental deleg records contain no ds or dnskeyref parameters or these do not lead to any key with an algorithm that the validator supports then the delegation is considered insecure.</t>
      <t>A validator <bcp14>MUST NOT</bcp14> use any ds or dnskeyref parameters found after following an SVCB-style record in AliasMode.
Restricting ds and dnskeyref to the top level is essential in preventing a DNS operator (who is supposed to only serve a zone, not sign it) from adding additional ds or dnskeyref parameters.</t>
      <t>To support protection against downgrade attacks, a validator <bcp14>SHOULD</bcp14> consider only SVCB-style records with the highest priority that either have a ds parameter that has a least one algrithm supported by the validator or in the case of dnskeyref, a DNSKEY RRset that contains at least one key with an algorithm that is supported.</t>
      <t>After selecting priority level, the validator uses any ds parameters to validate the DNSKEY RRset the apex of the child zone.
The DNSKEY RRsets that dnskeyref paramters refer need to be DNSSEC Secure to be used.
Any DNSKEY RRsets that are not DNSSEC Secure according to the validator <bcp14>MUST</bcp14> be ignored.</t>
      <t>[Note, to be removed for publication. Should the validator check if the Zone Key flag is zero if the DNSKEY RRset is not at the apex. For now assume that it is just like the SEP flag and can be ignored.]</t>
      <t>To limit validator resources, when validating a name that refers to a DNSKEY RRset, the validator should only use ds parameters (and DS records) and ignore any dnskeyref parameters.
Validator <bcp14>SHOULD</bcp14> allow for a DNAME and CNAME chain of reasonable length when
resolving a name to a DNSKEY RRset.</t>
      <t>Now that there are multiple DNSKEY RRsets that may be used to sign an RRset, the validator uses the Signer's Name in a signature to select a DNSKEY RRset to validate the signature. If the name does not match any of the DNSKEY RRset selected in the previous step then the signature <bcp14>MUST</bcp14> be ignored.</t>
    </section>
    <section anchor="signer-behavior">
      <name>Signer behavior</name>
      <t>Signer <bcp14>MUST</bcp14> put ds and dnskeyref parameters only in DELEG records at an Incremental delegation and not in SVCB-style records that follow a DELEG record in AliasMode.</t>
      <t>The ds parameter affects signers in one small way: the priority system of SVCB-style records can be used to provide protection again downgrades.
The signer can put a ds parameter with a more secure algorithm in a DELEG record with a higher priority and expect fallback to the less secure algorithm only if the validator does not understand the more secure algorithm.</t>
      <t>The dnskeyref parameter requires that the validator puts the name of the DNSKEY RRset in the Signer's Name field of the signature.
This is a small but significant change to how signers operate.
The DNSKEY RRset <bcp14>MUST</bcp14> be DNSSEC Secure and the validation chain <bcp14>MUST</bcp14> only involve ds parameters or DS records.
In addition DNSKEY records that are not at the apex of a zone <bcp14>MUST</bcp14> have the Zone Key flag set to 0 (bit 7 of the flags field, see <xref target="RFC4034"/>, Section 2.1.1)
The dnskeyref parameter also supports downgrade protection but has a number of additinal features that can be used by signers.</t>
      <t>The first is that because dnskeyref directly refers to a DNSKEY RRset there is no longer any need for Key Signing Keys (KSK).
Those DNSKEY RRsets only contain Zone Signing Keys (ZSK).
This means that KSK rollovers are no longer necessary.
It is also no longer necessary to coordinate with the parent zone for key rollovers.</t>
      <t>The second is that dnskeyref can refer to a DNSKEY RRset that is used to sign multiple zones.
Zones do no need to have their own copies of key material.
Instead a single DNSKEY RRset can be used for as many zones as needed.</t>
      <t>Third, in a multi-signer setup, each signer can maintain its own DNSKEY RRset independent of other signers.
This means that each signer can perform key rollovers without any need to coordinate with other signers.</t>
    </section>
    <section anchor="examples">
      <name>Examples</name>
      <section anchor="one-ds-parameter-that-is-part-of-a-delegation">
        <name>One ds parameter that is part of a delegation</name>
        <figure>
          <name>One ds parameter that is part of a delegation</name>
          <artwork><![CDATA[
$ORIGIN example.
@                  IN  SOA   ns zonemaster ...
customer1._deleg   IN  DELEG 1 ( ns.customer1
                ipv4hint=198.51.100.1,203.0.113.1
                ipv6hint=2001:db8:1::1,2001:db8:2::1
                ds=60485:5:1:2BB183AF5F22588179A53B0A98631FAD1A292118
                               )
]]></artwork>
        </figure>
      </section>
      <section anchor="one-separate-deleg-record-with-a-ds-parameter">
        <name>One separate DELEG record with a ds parameter</name>
        <figure>
          <name>One separate DELEG record with a ds parameter</name>
          <artwork><![CDATA[
$ORIGIN example.
@                  IN  SOA   ns zonemaster ...
customer2._deleg   IN  DELEG 0 ns.operator1
                   IN  DELEG 1 ( .
                    ds="60485:5:1:2BB183AF5F22588179A53B0A98631FAD1A292118
 370:13:2:BE74359954660069D5C63D200C39F5603827D7DD02B56F120EE9F3A86764247C"
                               )
]]></artwork>
        </figure>
      </section>
      <section anchor="one-separate-deleg-record-with-a-dnskeyref-parameter">
        <name>One separate DELEG record with a dnskeyref parameter</name>
        <figure>
          <name>One separate DELEG record with a dnskeyref parameter</name>
          <artwork><![CDATA[
$ORIGIN example.
@                  IN  SOA   ns zonemaster ...
customer3._deleg   IN  DELEG 0 ns.operator1
                   IN  DELEG 1 ( .
                    dnskeyref=customer3.keys.operator1
                               )
]]></artwork>
        </figure>
      </section>
      <section anchor="two-operators-with-dnskeyref-parameters">
        <name>Two operators with dnskeyref parameters</name>
        <figure>
          <name>Two operators with dnskeyref parameters</name>
          <artwork><![CDATA[
$ORIGIN example.
@                  IN  SOA   ns zonemaster ...
customer4._deleg   IN  DELEG 1 ( ns.operator1
                    dnskeyref=customer4.keys.operator1
                                  )
                   IN  DELEG 1 ( ns.operator2
                    dnskeyref=customer-keys.operator3
                                  )
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The ds parameter is a slight improvement over the DS record because it allows
SVCB priorities to be used for downgrade protection.
Otherwise, the semantics are the same.
This relies on the restriction that ds (and dnskeyref) parameters can only appear the top level and not after following an SVCB-style record in AliasMode.</t>
      <t>The dnskeyref parameter breaks the traditional chain semantics of DNSSEC.
With the ds parameter (or the DS record) the validity of a signature depends only on a chain of cryptographic primitives.
With dnskeyref, a DNS lookup is inserted.
This DNS lookup is protected by a traditional DNSSEC chain, but the presence of the name means that it is no longer a cryptographic chain.</t>
      <t>This trade-off between struct security and flexibility is left to the zone operator.</t>
      <t>A new risk that needs to be considered is old and forgotten dnskeyref parameters.
Old DS records or ds parameters are mostly safe.
An attacker can only assume then if the attacker can obtain the private key that can sign for the public key that the DS record or ds parameter refers to.
This is not impossible but very unlikely.
And the use of hardware security modules (HSM) can make this almost impossible.</t>
      <t>In contrast if a dnskeyref refers to a name in a forgotten domain and the registration of the domain is expired then an attacker may register the name and set up a DNSKEY RRset at the name listed in the dnskeyref parameter.
The risk of this can be reduced by two operational practices.
The first is to put the dnskeyref parameter in the same (AliasMode) DELEG record that provides the name server delegation.
This will make it likely that dnskeyref parameter will be removed once the
name servers no long serve the zone.</t>
      <t>The second practice is that domains that allow registrations (mostly top level domains (TLD) but also others) could install a policy that a dnskeyref parameter <bcp14>MUST</bcp14> refer to a DNSSEC Secure DNSKEY RRsets.
Additionally each DNSKEY RRset that is referred to by a dnskeyref parameter has to be used to sign the zone as served by at least one of the name servers that serves the zone.
This makes it possible to detect forgotten or misconfigured dnskeyref paramters early on.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>Per <xref target="RFC9460"/>, IANA is requested to add the following entry to the DNS "Service Parameter Keys (SvcParamKeys)" registry:</t>
      <table>
        <name>Entry in the Service Parameter Keys (SvcParamKeys) registry</name>
        <thead>
          <tr>
            <th align="left">Number</th>
            <th align="left">Name</th>
            <th align="left">Meaning</th>
            <th align="left">Reference</th>
            <th align="left">Change Controller</th>
            <th align="left"> </th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">TBD</td>
            <td align="left">ds</td>
            <td align="left">DNSSEC delegations</td>
            <td align="left">[this document]</td>
            <td align="left">IETF</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">TBD</td>
            <td align="left">dnskeyref</td>
            <td align="left">Names of DNSKEY RRsets</td>
            <td align="left">[this document]</td>
            <td align="left">IETF</td>
            <td align="left"> </td>
          </tr>
        </tbody>
      </table>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.homburg-deleg-incremental-deleg">
          <front>
            <title>Incrementally Deployable Extensible Delegation for DNS</title>
            <author fullname="Philip Homburg" initials="P." surname="Homburg">
              <organization>NLnet Labs</organization>
            </author>
            <author fullname="Tim Wicinski" initials="T." surname="Wicinski">
              <organization>Cox Communications</organization>
            </author>
            <author fullname="Jesse van Zutphen" initials="J." surname="van Zutphen">
              <organization>University of Amsterdam</organization>
            </author>
            <author fullname="Willem Toorop" initials="W." surname="Toorop">
              <organization>NLnet Labs</organization>
            </author>
            <date day="8" month="January" year="2025"/>
            <abstract>
              <t>   This document proposes a mechanism for extensible delegations in the
   DNS.  The mechanism realizes delegations with resource record sets
   placed below a _deleg label in the apex of the delegating zone.  This
   authoritative delegation point can be aliased to other names using
   CNAME and DNAME.  This document proposes a new DNS resource record
   type, DELEG, which is based on the SVCB and inherits extensibility
   from it.

   Support in recursive resolvers suffices for the mechanism to be fully
   functional.  The number of subsequent interactions between the
   recursive resolver and the authoritative name servers is comparable
   with those for DNS Query Name Minimisation.  Additionally, but not
   required, support in the authoritative name servers enables optimized
   behavior with reduced (simultaneous) queries.  None, mixed or full
   deployment of the mechanism on authoritative name servers are all
   fully functional, allowing for the mechanism to be incrementally
   deployed.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-homburg-deleg-incremental-deleg-01"/>
        </reference>
        <reference anchor="RFC4034">
          <front>
            <title>Resource Records for the DNS Security Extensions</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of resource records and protocol modifications that provide source authentication for the DNS. This document defines the public key (DNSKEY), delegation signer (DS), resource record digital signature (RRSIG), and authenticated denial of existence (NSEC) resource records. The purpose and format of each resource record is described in detail, and an example of each resource record is given.</t>
              <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4034"/>
          <seriesInfo name="DOI" value="10.17487/RFC4034"/>
        </reference>
        <reference anchor="RFC4035">
          <front>
            <title>Protocol Modifications for the DNS Security Extensions</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of new resource records and protocol modifications that add data origin authentication and data integrity to the DNS. This document describes the DNSSEC protocol modifications. This document defines the concept of a signed zone, along with the requirements for serving and resolving by using DNSSEC. These techniques allow a security-aware resolver to authenticate both DNS resource records and authoritative DNS error indications.</t>
              <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4035"/>
          <seriesInfo name="DOI" value="10.17487/RFC4035"/>
        </reference>
        <reference anchor="I-D.wesplaap-deleg">
          <front>
            <title>Extensible Delegation for DNS</title>
            <author fullname="Tim April" initials="T." surname="April">
              <organization>Google, LLC</organization>
            </author>
            <author fullname="Petr Špaček" initials="P." surname="Špaček">
              <organization>ISC</organization>
            </author>
            <author fullname="Ralf Weber" initials="R." surname="Weber">
              <organization>Akamai Technologies</organization>
            </author>
            <author fullname="David C Lawrence" initials="" surname="Lawrence">
              <organization>Salesforce</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>   A delegation in the Domain Name System (DNS) is a mechanism that
   enables efficient and distributed management of the DNS namespace.
   It involves delegating authority over subdomains to specific DNS
   servers via NS records, allowing for a hierarchical structure and
   distributing the responsibility for maintaining DNS records.

   An NS record contains the hostname of the nameserver for the
   delegated namespace.  Any facilities of that nameserver must be
   discovered through other mechanisms.  This document proposes a new
   extensible DNS record type, DELEG, which contains additional
   information about the delegated namespace and the capabilities of
   authoritative nameservers for the delegated namespace.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-wesplaap-deleg-01"/>
        </reference>
        <reference anchor="RFC9499">
          <front>
            <title>DNS Terminology</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
              <t>This document updates RFC 2308 by clarifying the definitions of "forwarder" and "QNAME". It obsoletes RFC 8499 by adding multiple terms and clarifications. Comprehensive lists of changed and new definitions can be found in Appendices A and B.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="219"/>
          <seriesInfo name="RFC" value="9499"/>
          <seriesInfo name="DOI" value="10.17487/RFC9499"/>
        </reference>
        <reference anchor="RFC9460">
          <front>
            <title>Service Binding and Parameter Specification via the DNS (SVCB and HTTPS Resource Records)</title>
            <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
            <author fullname="M. Bishop" initials="M." surname="Bishop"/>
            <author fullname="E. Nygren" initials="E." surname="Nygren"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies the "SVCB" ("Service Binding") and "HTTPS" DNS resource record (RR) types to facilitate the lookup of information needed to make connections to network services, such as for HTTP origins. SVCB records allow a service to be provided from multiple alternative endpoints, each with associated parameters (such as transport protocol configuration), and are extensible to support future uses (such as keys for encrypting the TLS ClientHello). They also enable aliasing of apex domains, which is not possible with CNAME. The HTTPS RR is a variation of SVCB for use with HTTP (see RFC 9110, "HTTP Semantics"). By providing more information to the client before it attempts to establish a connection, these records offer potential benefits to both performance and privacy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9460"/>
          <seriesInfo name="DOI" value="10.17487/RFC9460"/>
        </reference>
      </references>
    </references>
    <?line 366?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Jens Finkhäuser,
Havard Eidnes,
Edward Lewis,
Petr Špaček,
Johan Stenstam</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
