<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 2.6.10) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-deleg-requirements-04" category="info" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.2 -->
  <front>
    <title abbrev="DELEG Requirements ">Problem Statement and Requirements for an Improved DNS Delegation Mechanism abbrev: DNS DELEG Requirements</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-deleg-requirements-04"/>
    <author initials="D." surname="Lawrence" fullname="David Lawrence">
      <organization>Salesforce</organization>
      <address>
        <email>tale@dd.org</email>
      </address>
    </author>
    <author initials="E." surname="Lewis" fullname="Ed Lewis">
      <organization/>
      <address>
        <email>eppdnsprotocols@gmail.com</email>
      </address>
    </author>
    <author initials="J." surname="Reid" fullname="Jim Reid">
      <organization/>
      <address>
        <email>jim@rfc1035.com</email>
      </address>
    </author>
    <author initials="T." surname="Wicinski" fullname="Tim Wicinski">
      <organization>Cox Communications</organization>
      <address>
        <email>tjw.ietf@gmail.com</email>
      </address>
    </author>
    <date year="2025" month="October" day="07"/>
    <area>Internet</area>
    <workgroup>DELEG Working Group</workgroup>
    <keyword>dns</keyword>
    <keyword>delegations</keyword>
    <abstract>
      <?line 36?>

<t>Authoritative control of parts of the Domain Name System namespace are indicated with a special record type, the NS record, that can only indicate the name of the server which a client resolver should contact for more information. Any other features of that server must then be discovered through other mechanisms.  This draft considers the limitations of the current system, benefits that could be gained by changing it, and what requirements constrain an updated design.</t>
    </abstract>
  </front>
  <middle>
    <?line 42?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>In the Domain Name System <xref target="STD13"/>, subtrees within the domain name hierarchy are indicated by delegations to servers which are authoritative for their portion of the namespace.  The DNS records that do this, called NS records, can only represent the name of a nameserver.  In practice, clients can expect nothing out of this delegated server other than that it will answer DNS requests on UDP port 53.</t>
      <t>As the DNS has evolved over the past four decades, this has proven to be a barrier for the efficient introduction of new DNS technology, particularly for interacting with servers other than via UDP or TCP on port 53.  Many features that have been conceived come with additional overhead as they are limited by this least common denominator of nameserver functionality.</t>
      <t>Various mechanisms have been proposed for communicating additional information about authoritative nameservers.  This document investigates problems that could be addressed with a new delegation mechanism and the factors that need to be considered in the design of a solution.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>This document assumes familiarity with DNS terms as defined in <xref target="BCP219"/>.    Additionally, the following new terms are introduced:</t>
      <dl>
        <dt>DELEG:</dt>
        <dd>
          <t>A new method of DNS delegation, matching the requirements in this document but not presuming any particular mechanism, including previous specific proposals that used this name</t>
        </dd>
        <dt>zone operator:</dt>
        <dd>
          <t>The person or organization responsible for the nameserver which serves the zone</t>
        </dd>
      </dl>
    </section>
    <section anchor="requirements-framework">
      <name>Requirements Framework</name>
      <t>The requirements constraining any proposed changes to DNS delegations fall broadly into two categories.</t>
      <t>"Hard requirements" are those that must be followed by a successful protocol <xref target="RFC5218"/>, because violating them would present too much of an obstacle for broad adoption.  These will primarily be related to the way the existing Domain Name System functions at all levels.</t>
      <t>"Soft requirements" are those that are desirable, but the absence of which does not intrinsically eliminate a design.  These will largely be descriptive of the problems that are trying to be addressed with a new method, or features that would ease adoption.</t>
      <t>The context used here will be for the Domain Name System as it exists under the IANA root and the Registry/Registrar/Registrant model <xref target="BCP219"/>, and some conditions will only be relevant there. While it is expected that any design which satisfies the requirements of put forth here would be broadly applicable for any uses of the DNS outside of this environment, such uses are not in scope.</t>
      <section anchor="hard-requirements">
        <name>Hard Requirements</name>
        <t>The following strictures are necessary in a new delegation design.</t>
        <ul spacing="normal">
          <li>
            <t>H1. DELEG must not disrupt the existing registration model of domains.</t>
          </li>
          <li>
            <t>H2. DELEG must be backwards compatible with the existing ecosystem. Legacy zone data must function identically with both DELEG-aware and DELEG-unaware software. Nameserver (NS) records will continue to define the delegation of authority between a parent zone and a child zone exactly as they have.</t>
          </li>
          <li>
            <t>H3. DELEG must not negatively impact most DNS software.  This is intentionally a bit vague with regard to "most", because it can't be absolutely guaranteed for all possible DNS software on the network.  However, the DNS community should strive to test any proposed mechanism against a wide range of legacy software and come to a consensus as to what constitutes adherence to this requirement.</t>
          </li>
          <li>
            <t>H4. DELEG must be able to secure delegations with DNSSEC.</t>
          </li>
          <li>
            <t>H5. DELEG must support updates to delegation information with the same relative ease as currently exists with NS records.   Changes should take the same amount of time (eg, controlled by a DNS TTL) and allow a smooth transition between different operational platforms.</t>
          </li>
          <li>
            <t>H6. DELEG must be incrementally deployable and not require any sort of flag day of universal change.</t>
          </li>
          <li>
            <t>H7. DELEG must allow multiple independent operators to simultaneously serve a zone.</t>
          </li>
        </ul>
      </section>
      <section anchor="soft-requirements">
        <name>Soft Requirements</name>
        <t>The following items are the aspirational goals for this work, describing the features that are desired beyond what current NS-based delegations provide.</t>
        <ul spacing="normal">
          <li>
            <t>S1. DELEG should facilitate the use of new DNS transport mechanisms, including those already defined by DNS-over-TLS (DoT <xref target="RFC7858"/>), DNS-over-HTTPS (DoH <xref target="RFC8484"/>), and DNS-over-QUIC (DoQ <xref target="RFC9520"/>).  It should easily allow the adoption of new transport mechanisms.</t>
          </li>
          <li>
            <t>S2. DELEG should make clear all of the necessary details for contacting a service -- its protocol, port, and any other data that would be required to initiate a DNS query.</t>
          </li>
          <li>
            <t>S3. DELEG should minimize transaction cost in its usage.  This includes, but is not limited to, packet count, packet volume, and the amount of time it takes to resolve a query.</t>
          </li>
          <li>
            <t>S4. DELEG should simplify management of a zone's DNS service.</t>
          </li>
          <li>
            <t>S5. DELEG should allow for backward compatibility to the conventional NS-based delegation mechanism.  That is, a zone operator who wants to maintain a single source of truth of delegation information using DELEG should be able to easily have Do53 delegations derived from it.</t>
          </li>
          <li>
            <t>S6. DELEG should be extensible and allow for the easy incremental addition of new delegation features after initial deployment.</t>
          </li>
          <li>
            <t>S7. DELEG should be able to convey a security model for delegations stronger than currently exists with DNSSEC.</t>
          </li>
        </ul>
      </section>
      <section anchor="non-requirements">
        <name>Non-Requirements</name>
        <t>Several potential areas of requirement have been raised that are being explicitly acknowledged here as not being in the scope of this higher level document.</t>
        <ul spacing="normal">
          <li>
            <t>Whether NS records must continue to be the primary means by which resolutions happen.</t>
          </li>
          <li>
            <t>Whether information for a new delegation mechanism is stored in at the zone name or elsewhere in the domain name hierarchy.</t>
          </li>
          <li>
            <t>If a new delegation protocol is based on a DNS resource record, that record must not appear in both the parent and child with the same name and type.  The protocol should clearly describe how to handle an occurrence of that record appearing in the child.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This memo includes no request to IANA.</t>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <t>Updating the means by which DNS delegation information is communicated has tremendous implications for the security of the Internet.  There will security considerations that accompany proposed solutions.  This section will be made more robust in future drafts.  Contributions welcome.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <referencegroup anchor="STD13" target="https://www.rfc-editor.org/info/std13">
        <reference anchor="RFC1034" target="https://www.rfc-editor.org/info/rfc1034">
          <front>
            <title>Domain names - concepts and facilities</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised basic definition of The Domain Name System. It obsoletes RFC-882. This memo describes the domain style names and their used for host address look up and electronic mail forwarding. It discusses the clients and servers in the domain name system and the protocol used between them.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1034"/>
          <seriesInfo name="DOI" value="10.17487/RFC1034"/>
        </reference>
        <reference anchor="RFC1035" target="https://www.rfc-editor.org/info/rfc1035">
          <front>
            <title>Domain names - implementation and specification</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1035"/>
          <seriesInfo name="DOI" value="10.17487/RFC1035"/>
        </reference>
      </referencegroup>
      <referencegroup anchor="BCP219" target="https://www.rfc-editor.org/info/bcp219">
        <reference anchor="RFC9499" target="https://www.rfc-editor.org/info/rfc9499">
          <front>
            <title>DNS Terminology</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
              <t>This document updates RFC 2308 by clarifying the definitions of "forwarder" and "QNAME". It obsoletes RFC 8499 by adding multiple terms and clarifications. Comprehensive lists of changed and new definitions can be found in Appendices A and B.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="219"/>
          <seriesInfo name="RFC" value="9499"/>
          <seriesInfo name="DOI" value="10.17487/RFC9499"/>
        </reference>
      </referencegroup>
      <reference anchor="RFC5218">
        <front>
          <title>What Makes for a Successful Protocol?</title>
          <author fullname="D. Thaler" initials="D." surname="Thaler"/>
          <author fullname="B. Aboba" initials="B." surname="Aboba"/>
          <date month="July" year="2008"/>
          <abstract>
            <t>The Internet community has specified a large number of protocols to date, and these protocols have achieved varying degrees of success. Based on case studies, this document attempts to ascertain factors that contribute to or hinder a protocol's success. It is hoped that these observations can serve as guidance for future protocol work. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5218"/>
        <seriesInfo name="DOI" value="10.17487/RFC5218"/>
      </reference>
      <reference anchor="RFC7858">
        <front>
          <title>Specification for DNS over Transport Layer Security (TLS)</title>
          <author fullname="Z. Hu" initials="Z." surname="Hu"/>
          <author fullname="L. Zhu" initials="L." surname="Zhu"/>
          <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
          <author fullname="A. Mankin" initials="A." surname="Mankin"/>
          <author fullname="D. Wessels" initials="D." surname="Wessels"/>
          <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
          <date month="May" year="2016"/>
          <abstract>
            <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
            <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7858"/>
        <seriesInfo name="DOI" value="10.17487/RFC7858"/>
      </reference>
      <reference anchor="RFC8484">
        <front>
          <title>DNS Queries over HTTPS (DoH)</title>
          <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
          <author fullname="P. McManus" initials="P." surname="McManus"/>
          <date month="October" year="2018"/>
          <abstract>
            <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8484"/>
        <seriesInfo name="DOI" value="10.17487/RFC8484"/>
      </reference>
      <reference anchor="RFC9520">
        <front>
          <title>Negative Caching of DNS Resolution Failures</title>
          <author fullname="D. Wessels" initials="D." surname="Wessels"/>
          <author fullname="W. Carroll" initials="W." surname="Carroll"/>
          <author fullname="M. Thomas" initials="M." surname="Thomas"/>
          <date month="December" year="2023"/>
          <abstract>
            <t>In the DNS, resolvers employ caching to reduce both latency for end users and load on authoritative name servers. The process of resolution may result in one of three types of responses: (1) a response containing the requested data, (2) a response indicating the requested data does not exist, or (3) a non-response due to a resolution failure in which the resolver does not receive any useful information regarding the data's existence. This document concerns itself only with the third type.</t>
            <t>RFC 2308 specifies requirements for DNS negative caching. There, caching of TYPE 2 responses is mandatory and caching of TYPE 3 responses is optional. This document updates RFC 2308 to require negative caching for DNS resolution failures.</t>
            <t>RFC 4035 allows DNSSEC validation failure caching. This document updates RFC 4035 to require caching for DNSSEC validation failures.</t>
            <t>RFC 4697 prohibits aggressive requerying for NS records at a failed zone's parent zone. This document updates RFC 4697 to expand this requirement to all query types and to all ancestor zones.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9520"/>
        <seriesInfo name="DOI" value="10.17487/RFC9520"/>
      </reference>
    </references>
    <?line 153?>

<section numbered="false" anchor="Acknowledgements">
      <name>Acknowledgements</name>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
