<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
    <!ENTITY nbsp    "&#160;">
    <!ENTITY zwsp   "&#8203;">
    <!ENTITY nbhy   "&#8209;">
    <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.1 (Ruby 3.1.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" consensus="true" docName="draft-ietf-dnsop-3901bis-07" category="bcp" submissionType="IETF" tocInclude="true" obsoletes="3901" sortRefs="true" symRefs="true" version="3">
    <!-- xml2rfc v2v3 conversion 3.18.2 -->
    <front>
        <title abbrev="3901bis">DNS IPv6 Transport Operational Guidelines</title>
        <seriesInfo name="Internet-Draft" status="standard" value="draft-ietf-dnsop-3901bis-07"/>
        <author fullname="Momoka Yamamoto" initials="" surname="Momoka">
            <organization>WIDE Project</organization>
            <address>
                <email>momoka.my6@gmail.com</email>
            </address>
        </author>
        <author fullname="Tobias Fiebig" initials="T." surname="Fiebig">
                <organization abbrev="MPI-INF">Max-Planck-Institut fuer Informatik</organization>
                <address>
                        <postal>
                            <street>Campus E14</street>
                            <city>Saarbruecken</city>
                            <code>66123</code>
                            <country>Germany</country>
                        </postal>
                        <phone>+49 681 9325 3527</phone>
                        <email>tfiebig@mpi-inf.mpg.de</email>
                </address>
        </author>
        <area>Ops</area>
        <workgroup>dnsop</workgroup>
        <keyword>DNS</keyword>
        <keyword>IPv6</keyword>
        <abstract>
            <t indent="0" pn="section-abstract-1">
                This memo provides guidelines and documents Best Current Practice for operating authoritative DNS servers as well as recursive and stub DNS resolvers, given that queries and responses are carried in a mixed environment of IPv4 and IPv6 networks.
                This document recommends that authoritative DNS servers as well as recursive DNS resolvers support both IPv4 and IPv6.
                It furthermore provides guidance for how recursive DNS resolvers should select upstream DNS servers, if synthesized and non-synthesized IPv6 addresses are available.
            </t>
            <t indent="0" pn="section-abstract-2">
                This document obsoletes RFC 3901. (if approved)
            </t>
        </abstract>
        <note removeInRFC="true">
            <name>Discussion Venues</name>
            <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-wg-dnsop/draft-ietf-dnsop-3901bis"/>.</t>
        </note>
    </front>
    <middle>

        <section anchor="introduction">
            <name>Introduction</name>
            <t>
                Despite IPv6 being first discussed in the mid-1990s <xref target="RFC2460"/>, consistent deployment throughout the whole Internet has not yet been accomplished <xref target="RFC9386"/>.
                Hence, today, the Internet consists of IPv4-only, dual-stack (networks supporting both IP versions), and IPv6-only networks.
            </t>
            <t>
                This creates a complex landscape where authoritative DNS servers might be accessible only via specific network protocols <xref target="V6DNSRDY-23"/>.
                At the same time, DNS resolvers may only be able to access the Internet via either IPv4 or IPv6.
                This poses a challenge for such resolvers because they may encounter names for which queries must be directed to authoritative DNS servers with which they do not share an IP version during the name resolution process.
            </t>
            <t>
                <xref target="RFC3901"/> was initially written at a time when IPv6 deployment was not widespread, focusing primarily on maintaining name space continuity within the IPv4 landscape.
                Two decades later, IPv6 is not only widely deployed but also becoming the de facto standard in many areas.
                This document seeks to expand the scope of RFC3901 by recommending IPv6 connectivity for authoritative DNS servers, as well as recursive and stub DNS resolvers.
            </t>
            <t>
                This document provides guidance on:
            </t>
            <ul spacing="normal">
                <li>
                    <t>IP version related name space fragmentation and best-practices for avoiding it.</t>
                </li>
                <li>
                    <t>Guidelines for configuring authoritative DNS servers for zones.</t>
                </li>
                <li>
                    <t>Guidelines for operating recursive DNS resolvers.</t>
                </li>
                <li>
                    <t>Guidelines for stub DNS resolvers.</t>
                </li>
            </ul>
            <t>
                While transitional technologies and dual-stack setups may mitigate some of the issues of DNS resolution in a mixed protocol-version Internet, making DNS data accessible over both IPv4 and IPv6 is the most robust and flexible approach, as it allows resolvers to reach the information they need without requiring intermediary translation or forwarding services which may introduce additional failure cases.
            </t>
            <section anchor="requirements-language">
                <name>Requirements Language</name>
                <t>
                    The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
                    "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
                    "OPTIONAL" in this document are to be interpreted as described in BCP
                    14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all
                    capitals, as shown here.
                </t>
            </section>
        </section>
        <section anchor="terminology">
            <name>Terminology</name>
            <t>
                This document uses DNS terminology as described in <xref target="RFC9499"/>.
                Furthermore, the following terms are used with a defined meaning:
            </t>
            <dl newline="true" spacing="normal">
                <dt>
                    IPv4 name server:
                </dt>
                <dd>
                    A name server providing DNS services reachable via IPv4.
                    It does not imply anything about what DNS data is served, but means that the name server receives and answers queries over IPv4.
                </dd>
                <dt>
                    IPv6 name server:
                </dt>
                <dd>
                    A name server providing DNS services reachable via IPv6.
                    It does not imply anything about what DNS data is served, but means that the name server receives and answers queries over IPv6.
                </dd>
                <dt>
                    Dual-stack name server:
                </dt>
                <dd>
                    A name server that is both an "IPv4 name server" and also an "IPv6 name server".
                </dd>
            </dl>
        </section>
        <section anchor="name-space-fragmentation">
            <name>Name Space Fragmentation</name>
            <t>
                A resolver that tries to look up a name starts out at the root, and follows referrals until it is referred to a name server that is authoritative for the name.
                If somewhere down the chain of referrals it is referred to a name server that is, based on the referral, only accessible over a transport which the resolver cannot use, the resolver is unable to continue DNS resolution.
            </t>
            <t>
                If this occurs, the DNS has, effectively, fragmented based on the recursive DNS resolver's and authoritative DNS server's mismatching IP version support.
            </t>
            <t>
                In a mixed IP Internet, name space fragmentation can occur for different reasons.
                One reason is that DNS zones are consistently configured to support only either IPv4 or IPv6.
                Another reason is due to misconfigurations that make a zone unresolvable by either IPv4 or IPv6-only resolvers.
                The latter cases are often hard to identify, as the impact of misconfigurations for only one IP version (IPv4 or IPv6) may be hidden in a dual-stack setting.
                In the worst case, a specific name may only be resolvable via dual-stack enabled resolvers.
            </t>
            <section anchor="misconfigurations-causing-ip-version-related-name-space-fragmentation">
                <name>Misconfigurations Causing IP Version Related Name Space Fragmentation</name>
                <t>
                    Even when an administrator assumes that they have enabled support for a specific IP version on their authoritative DNS server, various misconfigurations may break the DNS delegation chain of a zone for that protocol and prevent any of its records from resolving for clients only supporting that IP version.
                    These misconfigurations can be kept hidden if most clients can successfully fall back to the other IP version.
                </t>
                <t>
                    The following name related misconfigurations can cause broken delegation for one IP version:
                </t>
                <dl newline="true" spacing="normal">
                    <dt>
                        No A/AAAA records for NS names:
                    </dt>
                    <dd>
                        If all of the NS records for a zone in their parent zone have either only A records or only AAAA records, then resolution via the other IP version is not possible.
                    </dd>
                    <dt>
                        Missing GLUE:
                    </dt>
                    <dd>
                        If the name from an NS record for a zone is in-domain, i.e., the name is within the zone or below, a parent zone must contain both IPv4 and IPv6 GLUE records, i.e., a parent must serve the corresponding A and AAAA records as ADDITIONAL data when returning the NS record(s) as the referral response <xref target="RFC9471"/>.
                    </dd>
                    <dt>
                        No A/AAAA record for in-domain NS:
                    </dt>
                    <dd>
                        If the parent provides GLUE records for both IP versions but the child zone itself lacks corresponding A or AAAA records for its in-domain name server names, resolution via the missing IP version will fail during delegation revalidation <xref target="I-D.ietf-dnsop-ns-revalidation"/>.
                    </dd>
                    <dt>
                        Zone of sibling domain NSes not resolving:
                    </dt>
                    <dd>
                        If the name from an NS record for a zone is sibling domain, the corresponding zone must be resolvable via the IP version in question as well.
                        It is insufficient if the name pointed to by the NS record has an associated A or AAAA record correspondingly.
                    </dd>
                    <dt>
                        Parent zone not resolvable via one IP version:
                    </dt>
                    <dd>
                        For a zone to be resolvable via an IP version the parent zones up to the root zone must be resolvable via that IP version as well.
                        Any zone not resolvable via the concerned IP version breaks the delegation chain for all its children.
                    </dd>
                </dl>

                <t>
                    The above misconfigurations are not mutually exclusive.
                </t>
                <t>
                    Furthermore, any of the misconfigurations above may not only materialize via a missing Resource Record (RR) but also via an RR providing the IP address of a name server that is not configured to answer queries via that IP version <xref target="V6DNSRDY-23"/>.
                </t>
            </section>
            <section anchor="misconfigurations-causing-network-related-name-space-fragmentation">
                <name>Network Conditions Causing IP Version Related Name Space Fragmentation</name>
                <t>
                    In addition to explicit misconfigurations in the served DNS zones, network conditions may also influence a resolver's ability to resolve names in a zone.
                    The most common issue here are packets requiring fragmentation given a reduced path MTU (PMTU) and MTU blackholes, i.e., packets being dropped on-path due to exceeding the MTU of the link to the next-hop without the sender being notified.
                    This can manifest in the following way:
                </t>
                <dl newline="true" spacing="normal">
                    <dt>
                        DNS-over-UDP packets requiring fragmentation
                    </dt>
                    <dd>
                        <t>
                            When using EDNS(0) to communicate support for DNS messages larger than 512 octets <xref target="RFC6891"/> via traditional DNS-over-UDP transport according to RFC1035 <xref target="RFC1035"/>, an IP packet carrying a DNS response may exceed the PMTU for the path to a resolver.
                            If an authoritative DNS server does not follow <xref target="RFC9715"/>, i.e., honors EDNS(0) sizes larger than 1232 octets, it will try to fragment the packet according to the discovered PMTU.
                            Such packets mostly occur for DNSKEY responses with DNSSEC <xref target="RFC4034"/>.
                        </t>
                        <t>
                            In general, DNS servers <bcp14>SHOULD</bcp14> follow RFC9715 <xref target="RFC9715"/>, which provides additional guidance on preventing fragmentation by ensuring that the maximum DNS/UDP payload size does not exceed 1400 octets.
                            This can be accomplished by setting a corresponding EDNS(0) size, with most implementations using a lower EDNS(0) size of 1232 octets following <xref target="DNSFlagDay2020"/>, to ensure that generated packets always fit into lower bound of the IPv6 MTU of 1280, as defined in <xref target="RFC8200"/>.
                            Hence, DNS servers <bcp14>MAY</bcp14> opt to set an EDNS(0) size of 1232 octets following <xref target="DNSFlagDay2020"/>.
                        </t>
                        <t>
                            Additionally, DNS servers <bcp14>MAY</bcp14> opt to explicitly not rely on path MTU discovery <xref target="RFC4821"/> or PLPMTUD <xref target="RFC8899"/>, by instead using IPV6_USE_MIN_MTU=1 from RFC3542 <xref target="RFC3542"/> to avoid the need to perform path MTU discovery.
                        </t>
                    </dd>
                    <dt>
                        DNS-over-TCP packets requiring fragmentation
                    </dt>
                    <dd>
                        <t>
                            If DNS resolution over UDP fails, or if a packet exceeds the communicated EDNS(0) size, a resolver should fall back to DNS resolution over TCP.
                            However, similar to the case of DNS-over-UDP, DNS-over-TCP may encounter MTU blackholes, especially on IPv6, if PMTUD does not work, if the MSS honored by the authoritative DNS server leads to IP packets exceeding the PMTU.
                            In that case, similar to the case of DNS-over-UDP, DNS resolution will time out when the recursive DNS resolver did not receive a response in time.
                        </t>
                        <t>
                            <xref target="RFC9715"/> does not provide explicit guidance on mitigating this issue.
                            However, transfering the guidance from <xref target="RFC9715"/>, setting an MSS of 1388 octets would reduce the impact of this issue.
                            It is therefore <bcp14>RECOMMENDED</bcp14> that DNS servers set an MSS of no more than 1388 octets for TCP connections.
                            Similarly, aligned with the recommendations of the <xref target="DNSFlagDay2020"/>, DNS servers <bcp14>MAY</bcp14> ensure that a total packet size of 1280 octets is not exceeded by setting an MSS of 1220 octets.
                            Additionally, DNS servers <bcp14>MAY</bcp14> opt to set IPV6_USE_MIN_MTU=1 from RFC3542 <xref target="RFC3542"/>.
                        </t>
                    </dd>
                    <dt>
                        Broken IPv6 Connectivity at the Resolver
                    </dt>
                    <dd>
                        <t>
                            Similar to authoritative servers, (stub) recursive resolvers may face broken IPv6 connectivity, e.g., if a client has been assigned a global unicast IPv6 address, but IPv6 traffic is not routed on the resolver's network.
                            Furthermore, broken IPv6 connectivity may be encountered when IPv4-IPv6 transition technologies, e.g., NAT64 <xref target="RFC6146"/> on IPv6-mostly networks <xref target="RFC9313"/>, or NAT64 connectivity discovered through PREF64 <xref target="RFC8781"/> or DNS64 <xref target="RFC7050"/> on IPv6-only networks are in use.
                            There, the synthesized IPv6 addresses used in 464XLAT <xref target="RFC6877"/> encounter additional PMTU fluctuation due to the difference in header size between IPv4 and IPv6.
                        </t>
                    </dd>
                </dl>
            </section>
            <section anchor="reasons-for-intentional-ip-version-related-name-space-fragmentation">
                <name>Reasons for Intentional IP Version Related Name Space Fragmentation</name>
                <t>
                    Intentional IP related name space fragmentation occurs if an operator consciously decides not to deploy IPv4 or IPv6 for a part of the resolution chain.
                    Most commonly, this is realized by intentionally not listing A/AAAA records for NS names.
                    At the time of writing, the share of zones not resolvable via IPv4 is negligible, while a little less than 40% of zones are not resolvable via IPv6 <xref target="V6DNSRDY-23"/>.
                    However, as IPv4 exhaustion progresses, IPv6 adoption will have to increase.
                </t>
            </section>
        </section>
        <section anchor="policy-based-avoidance-of-name-space-fragmentation">
            <name>Policy Based Avoidance of Name Space Fragmentation</name>
            <t>
                With the final exhaustion of IPv4 pools in RIRs, e.g., <xref target="RIPEV4"/>, and the progressing deployment of IPv6, IPv4 and IPv6 have become comparably relevant.
                Yet, while we now observe the first zones becoming exclusively IPv6 resolvable, we also still see a major portion of zones solely relying on IPv4 <xref target="V6DNSRDY-23"/>.
                Hence, at the moment, dual stack connectivity is instrumental to be able to resolve zones and avoid name space fragmentation.
            </t>
            <t>
                Having zones served only by name servers reachable via one IP version would fragment the DNS.
                Hence, we need to find a way to avoid this fragmentation.
            </t>
            <t>
                The recommended approach to maintain name space continuity is to use administrative policies, as described in this section.
            </t>
            <section anchor="guidelines-for-authoritative-dns-configuration">
                <name>Guidelines for Authoritative DNS Server Configuration</name>
                <t>
                    It is usually recommended that DNS zones contain at least two name servers, which are geographically diverse and operate under different routing policies <xref target="IANANS"/>.
                    To reduce the chance of DNS name space fragmentation, it is <bcp14>RECOMMENDED</bcp14> that at least two name servers for a zone are dual stack name servers.
                    Specifically, this means that the following minimal requirements <bcp14>SHOULD</bcp14> be implemented for a zone:
                </t>
                <dl newline="true" spacing="normal">
                    <dt>
                            IPv4 adoption:
                    </dt>
                    <dd>
                            Every DNS zone <bcp14>SHOULD</bcp14> be served by at least one IPv4-reachable authoritative DNS server to maintain name space continuity.
                            The delegation configuration (Resolution of the parent, resolution of sibling domain names, GLUE) <bcp14>MUST NOT</bcp14> rely on IPv6 connectivity being available.
                            As we acknowledge IPv4 scarcity, operators <bcp14>MAY</bcp14> opt not to provide DNS services via IPv4, if they can ensure that all clients expected to resolve this zone do support DNS resolution via IPv6.
                    </dd>
                    <dt>
                            IPv6 adoption:
                    </dt>
                    <dd>
                            Every DNS zone <bcp14>SHOULD</bcp14> be served by at least one IPv6-reachable authoritative DNS server to maintain name space continuity.
                            To avoid reachability issues, authoritative DNS servers <bcp14>SHOULD</bcp14> use native IPv6 addresses instead of IPv6 addresses synthesized using IPv6 transition technologies for receiving queries.
                            The delegation configuration (Resolution of the parent, resolution of sibling domain names, GLUE) <bcp14>MUST NOT</bcp14> rely on IPv4 connectivity being available.
                    </dd>
                    <dt>
                            Consistency:
                    </dt>
                    <dd>
                            Both IPv4 and IPv6 transports should serve identical DNS data to ensure a consistent resolution experience across different network types.
                    </dd>
                    <dt>
                            Avoiding IP Fragmentation:
                    </dt>
                    <dd>
                            IP fragmentation has been reported to be fragile <xref target="RFC8900"/>.
                            Furthermore, IPv6 transition technologies can introduce unexpected MTU breaks, e.g., when NAT64 is used <xref target="RFC7269"/>.
                            Therefore, IP fragmentation <bcp14>SHOULD</bcp14> be avoided by following guidance on maximum DNS payload sizes <xref target="RFC9715"/> and providing TCP fall-back options <xref target="RFC7766"/>.
                            Furthermore, similar to the guidance in <xref target="RFC9715"/>, it is <bcp14>RECOMMENDED</bcp14> that authoritative DNS servers sets an MSS of 1220 in TCP sessions carrying DNS responses.
                    </dd>
                </dl>
                <t>
                    To prevent name space fragmentation, zone validation processes <bcp14>SHOULD</bcp14> ensure that:
                </t>
                <ul spacing="normal">
                    <li>
                        <t>There is at least one IPv4 address record and one IPv6 address record available for the name servers of any child delegation within the zone.</t>
                    </li>
                    <li>
                        <t>The zone's authoritative servers follow <xref target="RFC9715"/> for avoiding fragmentation on DNS-over-UDP.</t>
                    </li>
                    <li>
                        <t>The zone's authoritative servers support DNS-over-TCP <xref target="RFC9210"/>.</t>
                    </li>
                    <li>
                        <t>The zone's authoritative servers can be reached via IPv4 and IPv6 when performing DNS resolution via IPv4-only and IPv6-only networks respectively.</t>
                    </li>
                </ul>
            </section>
            <section anchor="guidelines-for-dns-resolvers">
                <name>Guidelines for Recursive DNS Resolvers</name>
                <t>
                    Every recursive DNS resolver <bcp14>SHOULD</bcp14> be dual stack.
                </t>
                <t>
                    While the zones that IPv6-only recursive DNS resolvers can resolve are growing, they do not yet cover all zones.
                    Hence, a recursive DNS resolver <bcp14>MAY</bcp14> be IPv6-only, if it uses a transition mechanism that allows it to also query IPv4-only authoritative DNS servers, or uses a configuration where it forwards queries failing IPv6-only DNS resolution to a recursive DNS resolver that is able to perform DNS resolution over IPv4.
                    For example, if a recursive DNS resolver is aware of a PREF64 to use for NAT64 <xref target="RFC6146"/>, either through static configuration or by discovering it <xref target="RFC8781"/>, it <bcp14>MAY</bcp14> synthesize IPv6 addresses for remote authoritative DNS servers.
                </t>
                <t>
                    Similarly, a recursive DNS resolver <bcp14>MAY</bcp14> be IPv4-only, if it uses a configuration where such resolvers forward queries failing IPv4-only DNS resolution to a recursive DNS resolver that is able to perform DNS resolution over IPv6.
                </t>
                <t>
                    Finally, when responding to recursive queries sent by stub DNS resolvers, a DNS resolver <bcp14>SHOULD</bcp14> follow the above guidance for communication between authoritative DNS servers and recursive DNS resolvers analogously.
                </t>
            </section>
            <section anchor="guidelines-for-dns-stub">
                <name>Guidelines for DNS Stub Resolvers</name>
                <t>
                    Contrary to authoritative DNS servers and recursive DNS resolvers, stub DNS resolvers are more likely to find themselves in either an IPv6-mostly or IPv4-only environment, as they are usually run on end-hosts / clients.
                    Furthermore, a stub DNS resolver has to rely on recursive DNS servers discovered for the local network, e.g., using DHCPv4 <xref target="RFC3456"/>, DHCPv6 <xref target="RFC8415"/>, and/or SLAAC <xref target="RFC4862"/>.
                    In that case, the stub resolver may obtain multiple different IPv4 and IPv6 DNS resolver addresses to use.
                </t>
                <t>
                    To prioritize different IPv4 and IPv6 DNS resolver addresses, a stub resolver <bcp14>SHOULD</bcp14> follow <xref target="RFC6724"/>.
                    However, a stub DNS resolver <bcp14>SHOULD NOT</bcp14> utilize synthesized addresses if it is able to identify them as such, e.g., by having discovered the PREF64 in use for the network <xref target="RFC8781"/>.
                </t>
                <t>
                    When providing multiple possible DNS servers to stub resolvers, operators <bcp14>SHOULD</bcp14> consider that various implementations can only configure a small set of possible DNS resolvers, e.g., only up to three for libc, and additional resolvers provided may be ignored by clients.
                </t>
            </section>
        </section>
        <section anchor="security-considerations">
            <name>Security Considerations</name>
            <t>
                The guidelines described in this memo introduce no new security considerations into the DNS protocol.
            </t>
            <t>
                Recommendations for recursive and stub resolvers rely on a correctly discovered PREF64.
                Security issues may materialize if an incorrect PREF64 is used.
                Hence, guidance from <xref target="RFC9872"/> on securely discovering PREF64 <bcp14>SHOULD</bcp14> be followed.
            </t>
        </section>
        <section anchor="iana-considerations">
            <name>IANA Considerations</name>
            <t>
                This document requests IANA to update its technical requirements for authoritative DNS servers to require both IPv4 and IPv6 addresses for each authoritative server <xref target="IANANS"/>.
            </t>
        </section>
        <section numbered="false" anchor="acknowledgments">
            <name>Acknowledgments</name>
            <t>
                Valuable input for this draft was provided by: Bob Harold, Andreas Schulze, Tommy Jensen, Nick Buraglio, Jen Linkova, Tim Chown, Brian E Carpenter, Tom Petch, Philipp S. Tiesel, Mark Andrews, Stefan Ubbink, Joey Abley, Gorry Fairhurst, Paul Vixie, Lorenzo Colitti, David Farmer
            </t>
            <t>
                Thank you for reading this draft.
            </t>
        </section>
    </middle>
    <back>
        <references>
            <name>References</name>
            <references anchor="sec-normative-references">
                <name>Normative References</name>
                <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.1035.xml"/>
                <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.2119.xml"/>
                <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.2460.xml"/>
                <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.3456.xml"/>
                <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.3542.xml"/>
                <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.3901.xml"/>
                <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.4034.xml"/>
                <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.4821.xml"/>
                <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.4862.xml"/>
                <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.6146.xml"/>
                <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.6724.xml"/>
                <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.6891.xml"/>
                <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.7766.xml"/>
                <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.8174.xml"/>
                <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.8200.xml"/>
                <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.8415.xml"/>
                <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.8899.xml"/>
                <xi:include href="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-dnsop-ns-revalidation.xml"/>
                <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.9210.xml"/>
                <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.9471.xml"/>

            </references>
            <references anchor="sec-informative-references">
                <name>Informative References</name>
                <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.1918.xml"/>
                <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.6877.xml"/>
                <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.7050.xml"/>
                <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.7269.xml"/>
                <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.8781.xml"/>
                <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.8900.xml"/>
                <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.9313.xml"/>
                <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.9386.xml"/>
                <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.9499.xml"/>
                <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.9715.xml"/>
                <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.9872.xml"/>
                <reference anchor="V6DNSRDY-23" target="https://link.springer.com/chapter/10.1007/978-3-031-28486-1_22">
                    <front>
                        <title>How Ready is DNS for an IPv6-Only World?</title>
                        <author initials="F" surname="Streibelt" fullname="Florian">
                            <organization/>
                        </author>
                        <author initials="P" surname="Sattler" fullname="Patrick">
                            <organization/>
                        </author>
                        <author initials="F" surname="Lichtblau" fullname="Franziska">
                            <organization/>
                        </author>
                        <author initials="C" surname="Hernandez-Gañán" fullname="Carlos">
                            <organization/>
                        </author>
                        <author initials="O" surname="Gasser" fullname="Oliver">
                            <organization/>
                        </author>
                        <author initials="T" surname="Fiebig" fullname="Tobias">
                            <organization/>
                        </author>
                        <date month="March" year="2023"/>
                    </front>
                </reference>
                <reference anchor="DNSFlagDay2020" target="https://dnsflagday.net/2020/" quoteTitle="true" derivedAnchor="DNSFlagDay2020">
                    <front>
                        <title>DNS flag day 2020</title>
                            <author>
                                <organization showOnFrontPage="true"/>
                            </author>
                        <date/>
                    </front>
                </reference>
                <reference anchor="RIPEV4" target="https://www.ripe.net/publications/news/about-ripe-ncc-and-ripe/the-ripe-ncc-has-run-out-of-ipv4-addresses">
                    <front>
                        <title>The RIPE NCC has run out of IPv4 Addresses</title>
                        <author>
                            <organization>RIPE NCC</organization>
                        </author>
                        <date month="November" year="2019"/>
                    </front>
                </reference>
                <reference anchor="IANANS" target="https://www.iana.org/help/nameserver-requirements">
                    <front>
                        <title>Technical requirements for authoritative name servers</title>
                        <author>
                            <organization>IANA</organization>
                        </author>
                    </front>
                </reference>
            </references>
        </references>
    </back>
</rfc>
