<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-deleg-requirements-02" category="info" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.2 -->
  <front>
    <title abbrev="DELEG Requirements ">Problem Statement and Requirements for an Improved DNS Delegation Mechanism abbrev: DNS DELEG Requirements</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-deleg-requirements-02"/>
    <author initials="D." surname="Lawrence" fullname="David Lawrence">
      <organization>Salesforce</organization>
      <address>
        <email>tale@dd.org</email>
      </address>
    </author>
    <author initials="E." surname="Lewis" fullname="Ed Lewis">
      <organization/>
      <address>
        <email>eppdnsprotocols@gmail.com</email>
      </address>
    </author>
    <author initials="J." surname="Reid" fullname="Jim Reid">
      <organization/>
      <address>
        <email>jim@rfc1035.com</email>
      </address>
    </author>
    <author initials="T." surname="Wicinski" fullname="Tim Wicinski">
      <organization>Cox Communications</organization>
      <address>
        <email>tjw.ietf@gmail.com</email>
      </address>
    </author>
    <date year="2024" month="October" day="12"/>
    <area>Internet</area>
    <workgroup>DELEG Working Group</workgroup>
    <keyword>dns</keyword>
    <keyword>delegations</keyword>
    <abstract>
      <?line 36?>

<t>Authoritative control of parts of the Domain Name System namespace are indicated with a special record type, the NS record, that can only indicate the name of the server which a client resolver should contact for more information. Any other features of that server must then be discovered through other mechanisms.  This draft considers the limitations of the current system, benefits that could be gained by changing it, and what requirements constrain an updated design.</t>
    </abstract>
  </front>
  <middle>
    <?line 42?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>In the Domain Name System <xref target="STD13"/>, subtrees within the domain name hierarchy are indicated by delegations to servers which are authoritative for their portion of the namespace.  The DNS records that do this, called NS records, can only represent the name of a nameserver.  In practice, clients can expect nothing out of this delegated server other than that it will answer DNS requests on UDP port 53.</t>
      <t>As the DNS has evolved over the past four decades, this has proven to be a barrier for the efficient introduction of new DNS technology, particularly for interacting with servers other than via UDP or TCP on port 53.  Many features that have been conceived come with additional overhead as they are limited by this least common denominator of nameserver functionality.</t>
      <t>Various mechanisms have been proposed for communicating additional information about authoritative nameservers.  This document investigates problems that could be addressed with a new delegation mechanism and the factors that need to be considered in the design of a solution.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>This document assumes familiarity with DNS terms as defined in <xref target="BCP219"/>.    Additionally, the following new terms are introduced:</t>
      <dl>
        <dt>DELEG:</dt>
        <dd>
          <t>A new method of DNS delegation, matching the requirements in this document but not presuming any particular mechanism, including previous specific proposals that used this name</t>
        </dd>
        <dt>zone operator:</dt>
        <dd>
          <t>The person or organization responsible for the nameserver which serves the zone</t>
        </dd>
      </dl>
    </section>
    <section anchor="requirements-framework">
      <name>Requirements Framework</name>
      <t>The requirements constraining any proposed changes to DNS delegations fall broadly into two categories.</t>
      <t>"Hard requirements" are those that must be followed by a successful protocol <xref target="RFC5218"/>, because violating them would present too much of an obstacle for broad adoption.  These will primarily be related to the way the existing Domain Name System functions at all levels.</t>
      <t>"Soft requirements" are those that are desirable, but the absence of which does not intrinsically eliminate a design.  These will largely be descriptive of the problems that are trying to be addressed with a new method, or features that would ease adoption.</t>
      <t>The context used here will be for the Domain Name System as it exists under the IANA root and the Registry/Registrar/Registrant model <xref target="BCP219"/>, and some conditions will only be relevant there. While it is expected that any design which satisfies the requirements of put forth here would be broadly applicable for any uses of the DNS outside of this environment, such uses are not in scope.</t>
      <section anchor="hard-requirements">
        <name>Hard Requirements</name>
        <t>The following strictures are necessary in a new delegation design.</t>
        <ul spacing="normal">
          <li>
            <t>H1. DELEG must not disrupt the existing registration model of domains.</t>
          </li>
          <li>
            <t>H2. DELEG must be backwards compatible with the existing ecosystem. Legacy zone data must function identically with both DELEG-aware and DELEG-unaware software. Nameserver (NS) records will continue to define the delegation of authority between a parent zone and a child zone exactly as they have.</t>
          </li>
          <li>
            <t>H3. DELEG must not negatively impact most DNS software.  This is intentionally a bit vague with regard to "most", because it can't be absolutely guaranteed for all possible DNS software on the network.  However, the DNS community should strive to test any proposed mechanism against a wide range of legacy software and come to a consensus as to what constitutes adherence to this requirement.</t>
          </li>
          <li>
            <t>H4. DELEG must be able to secure delegations with DNSSEC.</t>
          </li>
          <li>
            <t>H5. DELEG must support updates to delegation information with the same relative ease as currently exists with NS records.   Changes should take the same amount of time (eg, controlled by a DNS TTL) and allow a smooth transition between different operational platforms.</t>
          </li>
          <li>
            <t>H6. DELEG must be incrementally deployable and not require any sort of flag day of universal change.</t>
          </li>
          <li>
            <t>H7. DELEG must allow multiple independent operators to simultaneously serve a zone.</t>
          </li>
        </ul>
      </section>
      <section anchor="soft-requirements">
        <name>Soft Requirements</name>
        <t>The following items are the aspirational goals for this work, describing the features that are desired beyond what current NS-based delegations provide.</t>
        <ul spacing="normal">
          <li>
            <t>S1. DELEG should facilitate the use of new DNS transport mechanisms, including those already defined by DNS-over-TLS (DoT <xref target="RFC7858"/>), DNS-over-HTTPS (DoH <xref target="RFC8484"/>), and DNS-over-QUIC (DoQ <xref target="RFC9520"/>).  It should easily allow the adoption of new transport mechanisms.</t>
          </li>
          <li>
            <t>S2. DELEG should make clear all of the necessary details for contacting a service -- its protocol, port, and any other data that would be required to initiate a DNS query.</t>
          </li>
          <li>
            <t>S3. DELEG should minimize transaction cost in its usage.  This includes, but is not limited to, packet count, packet volume, and the amount of time it takes to resolve a query.</t>
          </li>
          <li>
            <t>S4. DELEG should simplify management of a zone's DNS service.</t>
          </li>
          <li>
            <t>S5. DELEG should allow for backward compatibility to the conventional NS-based delegation mechanism.  That is, a zone operator who wants to maintain a single source of truth of delegation information using DELEG should be able to easily have Do53 delegations derived from it.</t>
          </li>
          <li>
            <t>S6. DELEG should be extensible and allow for the easy incremental addition of new delegation features after initial deployment.</t>
          </li>
          <li>
            <t>S7. DELEG should be able to convey a security model for delegations stronger than currently exists with DNSSEC.</t>
          </li>
        </ul>
      </section>
      <section anchor="non-requirements">
        <name>Non-Requirements</name>
        <t>Several potential areas of requirement have been raised that are being explicitly acknowledged here as not being in the scope of this higher level document.</t>
        <ul spacing="normal">
          <li>
            <t>Whether NS records must continue to be the primary means by which resolutions happen.</t>
          </li>
          <li>
            <t>Whether information for a new delegation mechanism is stored in at the zone name or elsewhere in the domain name hierarchy.</t>
          </li>
          <li>
            <t>If a new delegation protocol is based on a DNS resource record, that record must not appear in both the parent and child with the same name and type.  The protocol should clearly describe how to handle an occurrence of that record appearing in the child.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This memo includes no request to IANA.</t>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <t>Updating the means by which DNS delegation information is communicated has tremendous implications for the security of the Internet.  There will security considerations that accompany proposed solutions.  This section will be made more robust in future drafts.  Contributions welcome.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <referencegroup anchor="STD13" target="https://www.rfc-editor.org/info/std13">
        <reference anchor="RFC1034" target="https://www.rfc-editor.org/info/rfc1034">
          <front>
            <title>Domain names - concepts and facilities</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised basic definition of The Domain Name System. It obsoletes RFC-882. This memo describes the domain style names and their used for host address look up and electronic mail forwarding. It discusses the clients and servers in the domain name system and the protocol used between them.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1034"/>
          <seriesInfo name="DOI" value="10.17487/RFC1034"/>
        </reference>
        <reference anchor="RFC1035" target="https://www.rfc-editor.org/info/rfc1035">
          <front>
            <title>Domain names - implementation and specification</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1035"/>
          <seriesInfo name="DOI" value="10.17487/RFC1035"/>
        </reference>
      </referencegroup>
      <referencegroup anchor="BCP219" target="https://www.rfc-editor.org/info/bcp219">
        <reference anchor="RFC9499" target="https://www.rfc-editor.org/info/rfc9499">
          <front>
            <title>DNS Terminology</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
              <t>This document updates RFC 2308 by clarifying the definitions of "forwarder" and "QNAME". It obsoletes RFC 8499 by adding multiple terms and clarifications. Comprehensive lists of changed and new definitions can be found in Appendices A and B.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="219"/>
          <seriesInfo name="RFC" value="9499"/>
          <seriesInfo name="DOI" value="10.17487/RFC9499"/>
        </reference>
      </referencegroup>
      <reference anchor="RFC5218">
        <front>
          <title>What Makes for a Successful Protocol?</title>
          <author fullname="D. Thaler" initials="D." surname="Thaler"/>
          <author fullname="B. Aboba" initials="B." surname="Aboba"/>
          <date month="July" year="2008"/>
          <abstract>
            <t>The Internet community has specified a large number of protocols to date, and these protocols have achieved varying degrees of success. Based on case studies, this document attempts to ascertain factors that contribute to or hinder a protocol's success. It is hoped that these observations can serve as guidance for future protocol work. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5218"/>
        <seriesInfo name="DOI" value="10.17487/RFC5218"/>
      </reference>
      <reference anchor="RFC7858">
        <front>
          <title>Specification for DNS over Transport Layer Security (TLS)</title>
          <author fullname="Z. Hu" initials="Z." surname="Hu"/>
          <author fullname="L. Zhu" initials="L." surname="Zhu"/>
          <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
          <author fullname="A. Mankin" initials="A." surname="Mankin"/>
          <author fullname="D. Wessels" initials="D." surname="Wessels"/>
          <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
          <date month="May" year="2016"/>
          <abstract>
            <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
            <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7858"/>
        <seriesInfo name="DOI" value="10.17487/RFC7858"/>
      </reference>
      <reference anchor="RFC8484">
        <front>
          <title>DNS Queries over HTTPS (DoH)</title>
          <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
          <author fullname="P. McManus" initials="P." surname="McManus"/>
          <date month="October" year="2018"/>
          <abstract>
            <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8484"/>
        <seriesInfo name="DOI" value="10.17487/RFC8484"/>
      </reference>
      <reference anchor="RFC9520">
        <front>
          <title>Negative Caching of DNS Resolution Failures</title>
          <author fullname="D. Wessels" initials="D." surname="Wessels"/>
          <author fullname="W. Carroll" initials="W." surname="Carroll"/>
          <author fullname="M. Thomas" initials="M." surname="Thomas"/>
          <date month="December" year="2023"/>
          <abstract>
            <t>In the DNS, resolvers employ caching to reduce both latency for end users and load on authoritative name servers. The process of resolution may result in one of three types of responses: (1) a response containing the requested data, (2) a response indicating the requested data does not exist, or (3) a non-response due to a resolution failure in which the resolver does not receive any useful information regarding the data's existence. This document concerns itself only with the third type.</t>
            <t>RFC 2308 specifies requirements for DNS negative caching. There, caching of TYPE 2 responses is mandatory and caching of TYPE 3 responses is optional. This document updates RFC 2308 to require negative caching for DNS resolution failures.</t>
            <t>RFC 4035 allows DNSSEC validation failure caching. This document updates RFC 4035 to require caching for DNSSEC validation failures.</t>
            <t>RFC 4697 prohibits aggressive requerying for NS records at a failed zone's parent zone. This document updates RFC 4697 to expand this requirement to all query types and to all ancestor zones.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9520"/>
        <seriesInfo name="DOI" value="10.17487/RFC9520"/>
      </reference>
    </references>
    <?line 153?>

<section numbered="false" anchor="Acknowledgements">
      <name>Acknowledgements</name>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
