<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-dnsop-ds-automation-01" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="DS Automation">Operational Recommendations for DS Automation</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-dnsop-ds-automation-01"/>
    <author initials="S." surname="Sheng" fullname="Steve Sheng">
      <organization/>
      <address>
        <email>steve.sheng@gmail.com</email>
      </address>
    </author>
    <author initials="P." surname="Thomassen" fullname="Peter Thomassen">
      <organization>deSEC</organization>
      <address>
        <email>peter@desec.io</email>
      </address>
    </author>
    <date/>
    <area>Internet</area>
    <workgroup>DNSOP Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 60?>

<t>Enabling support for automatic acceptance of DS parameters from the Child DNS operator (via RFCs 7344, 8078, 9615) requires the parent operator, often a registry or registrar, to make a number of technical decisions. This document describes recommendations for new deployments of such DS automation.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Domain Name System Operations Working Group mailing list (dnsop@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/dnsop/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/peterthomassen/draft-shetho-dnsop-ds-automation"/>.</t>
    </note>
  </front>
  <middle>
    <?line 64?>

<section anchor="introduction">
      <name>Introduction</name>
      <t><xref target="RFC7344"/>, <xref target="RFC8078"/>, <xref target="RFC9615"/> automate DNSSEC delegation trust maintenance by having the child publish CDS and/or CDNSKEY records which indicate the delegation's desired DNSSEC parameters ("DS automation").</t>
      <t>Parental Agents using these protocols have to make a number of technical decisions relating to issues of validity checks, timing, error reporting, locks, etc. Additionally, when using the RRR model (as is common amongst top-level domains), both the registrar and the registry can effect parent-side changes to the delare reviewers not egation. In such a situation, additional questions arise.</t>
      <t>Not all existing DS automation deployments have made the same choices with respect to these questions, leading to somewhat inconsistent behavior. From the perspective of a domain holder with domain names under various TLDs, this may be unexpected and confusing.</t>
      <t>New deployments of DS automation therefore SHOULD follow the recommendations set out in this document, to achieve a more uniform treatment across suffixes and to minimize user surprise. The recommendations are intended to provide baseline safety and uniformity of behavior across parents. Registries with additional requirements on DS update checks MAY implement any additional checks in line with local policy.</t>
      <t>In the following sections, operational questions are first raised and answered with the corresponding recommendations. Each section is concluded with an analysis of its recommendations, and related considerations.</t>
      <t>Readers are expected to be familiar with DNSSEC <xref target="RFC9364"/><xref target="RFC9615"/><xref target="RFC9859"/>. For terminology, see <xref target="terminology"/>.</t>
      <section anchor="requirements-notation">
        <name>Requirements Notation</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
        </t>
      </section>
    </section>
    <section anchor="validity">
      <name>Validity Checks and Safety Measures</name>
      <t>This section provides recommendations to address the following questions:</t>
      <ul spacing="normal">
        <li>
          <t>What kind of validity checks should be performed on DS parameters?</t>
        </li>
        <li>
          <t>Should these checks be performed upon acceptance, or also continually when in place?</t>
        </li>
        <li>
          <t>How do TTLs and caching impact DS provisioning? How important is timing in a child key change?</t>
        </li>
      </ul>
      <section anchor="recommendations">
        <name>Recommendations</name>
        <ol spacing="normal" type="1"><li>
            <t>Entities performing automated DS maintenance SHOULD verify  </t>
            <ol spacing="normal" type="a"><li>
                <t>the consistency of DS update requests across all authoritative nameservers in the delegation <xref target="I-D.ietf-dnsop-cds-consistency"/>, and</t>
              </li>
              <li>
                <t>that the resulting DS record set would not break DNSSEC validation if deployed,</t>
              </li>
            </ol>
            <t>
and cancel the update if the verifications do not succeed.</t>
          </li>
          <li>
            <t>Parent operators (such as registries) SHOULD reduce a DS record set's TTL to a value between 5–15 minutes when the set of records is changed, and restore the normal TTL value at a later occasion (but not before the previous DS RRset's TTL has expired).</t>
          </li>
        </ol>
      </section>
      <section anchor="analysis_validity">
        <name>Analysis</name>
        <section anchor="continuity-of-resolution">
          <name>Continuity of Resolution</name>
          <t>To maintain the basic resolution function, it is important to avoid the deployment of flawed DS record sets in the parent zone. It is therefore desirable for the Parent to verify that the DS record set resulting from an automated (or even manual) update does not break DNSSEC validation if deployed, and otherwise cancel the update.</t>
          <t>This is best done by</t>
          <ol spacing="normal" type="1"><li>
              <t>verifying that consistent CDS/CDNSKEY responses are served by all of the delegation's nameservers <xref target="I-D.ietf-dnsop-cds-consistency"/>;</t>
            </li>
            <li>
              <t>verifying that the resulting DS RRset does not break the delegation if applied (<xref section="4.1" sectionFormat="comma" target="RFC7344"/>), i.e., that it provides at least one valid path for validators to use (<xref section="5.11" sectionFormat="comma" target="RFC6840"/>). This is the case if there is at least one DS record referencing a key that actually signs the child's DNSKEY RRset, where the digest type and signing algorithm are listed as mandatory ("MUST") in the "Implement for DNSSEC Validation" columns of the relevant IANA registries <xref target="DS-IANA"/> and <xref target="DNSKEY-IANA"/>.</t>
            </li>
          </ol>
          <t>TODO Should checks be done continually? (Why is that the parent's task?) Or on demand, e.g., on a no-op NOTIFY?
Even when no update was requested, it may be worthwhile to occasionally check whether the current DS contents would be accepted today (see <xref target="validity"/>), and communicate any failures without changing the published DS record set.</t>
          <t>TODO Maybe RECOMMEND periodical rechecks and allow requesting recheck in case of operational difficulties (large parent). Allow the parent to communicate interval? See draft-berra-dnsop-announce-scanner.</t>
        </section>
        <section anchor="ttls-and-caching">
          <name>TTLs and Caching</name>
          <t>To further reduce the impact of any misconfigured DS record set — be it from automated or from manual provisioning — the option to quickly roll back the delegation's DNSSEC parameters is of great importance. This is achieved by setting a comparatively low TTL on the DS record set in the parent domain, at the cost of reduced resiliency against nameserver unreachability due to the earlier expiration of cached records. The availability risk can be mitigated by limiting such TTLs to a brief time period after a change to the DS configuration, during which rollbacks are most likely to occur.</t>
          <t>Registries therefore should significantly lower the DS RRset's TTL for some time following an update. Pragmatic values for the reduced TTL value range between 5–15 minutes.  Such low TTLs might be expected to cause increased load on the corresponding authoritative nameservers; however, recent research has demonstrated them to have negligible impact on the overall load of a registry's authoritative nameserver infrastructure <xref target="LowTTL"/>.</t>
          <t>The reduction should be in effect at least until the previous DS record set has expired from caches, that is, the period during which the low-TTL is applied should exceed the normal TTL value. The routine re-signing of the DS RRset (usually after a few days) provides a convenient opportunity for resetting the TTL. When using EPP, the server MAY advertise its TTL policy via the domain <tt>&lt;info&gt;</tt> command described in <xref section="2.1.1.2" sectionFormat="comma" target="RFC9803"/>.</t>
          <t>While this approach enables quick rollbacks, timing of the desired DS update process itself is largely governed by the previous DS RRset's TTL, and therefore does not generally benefit from an overall speed-up. Note also that nothing is gained from first lowering the TTL of the old DS RRset: such an additional step would, in fact, require another wait period while resolver caches adjust. For the sake of completeless, there likewise is no point to increasing any DS TTL values beyond their normal value.</t>
        </section>
      </section>
    </section>
    <section anchor="reporting">
      <name>Reporting and Transparency</name>
      <t>This section provides recommendations to address the following question:</t>
      <ul spacing="normal">
        <li>
          <t>Should a failed (or even successful) DS update trigger a notification to anyone?</t>
        </li>
      </ul>
      <section anchor="recommendations-1">
        <name>Recommendations</name>
        <ol spacing="normal" type="1"><li>
            <t>For certain DS updates (see <xref target="analysis_reporting">analysis</xref>) and for DS deactivation, relevant points of contact known to the zone operator SHOULD be notified.</t>
          </li>
          <li>
            <t>For error conditions, the child DNS operator and the domain's technical contact (if applicable) SHOULD be first notified. The registrant SHOULD NOT be notified unless the problem persists for a prolonged amount of time (e.g., three days).</t>
          </li>
          <li>
            <t>Child DNS operators SHOULD be notified using a report query <xref target="RFC9567"/> to the agent domain as described in (<xref section="4" sectionFormat="comma" target="RFC9859"/>). Notifications to humans (domain holder) will be performed in accordance with the communication preferences established with the parent-side entity (registry or registrar). The same condition SHOULD NOT be reported unnecessarily frequently to the same recipient.</t>
          </li>
          <li>
            <t>In the RRR model, registries performing DS automation SHOULD inform the registrar of any DS record changes via the EPP Change Poll Extension <xref target="RFC8590"/> or a similar channel.</t>
          </li>
          <li>
            <t>The currently active DS configuration SHOULD be made accessible to the registrant (or their designated party) through the customer portal available for domain management. The DS update history MAY be made available in the same way.</t>
          </li>
        </ol>
      </section>
      <section anchor="analysis_reporting">
        <name>Analysis</name>
        <t>When accepting or rejecting a DS update, it cannot be assumed that relevant parties are aware of what's happening. For example, a registrar may not know when an automatic DS update is performed by the registry. Similarly, a Child DNS operator may not be aware when their CDS/CDNSKEY RRsets are out of sync across nameservers, thus being ignored. Early reporting of such conditions helps involved parties to act appropriately and in a timely manner.</t>
        <t>A delegation can break even without an update request to the DS record set. This may occur during key rollovers (<xref section="4.1" sectionFormat="comma" target="RFC6781"/>) when the Child DNS operator proceeds to the next step early, without verifying that the delegation's DS RRset is in the expected state. For example, when an algorithm rollover is performed and the old signing algorithm is removed from the Child zone before the new DS record is added, validation errors may result.
TODO Reduce fearmongering: find numbers, better example, or loosen up wording.</t>
        <t>Entities performing automated DS maintenance should report on conditions they encounter. The following success situations may be of particular interest:</t>
        <ol spacing="normal" type="1"><li anchor="reporting-1">
            <t>A DS RRset has been provisioned  </t>
            <ol spacing="normal" type="a"><li anchor="reporting-1a">
                <t>manually;</t>
              </li>
              <li anchor="reporting-1b">
                <t>due to commencing DS automation (either via DNSSEC bootstrapping, or for the first time after a manual change; see <xref target="multiple"/>);</t>
              </li>
              <li anchor="reporting-1c">
                <t>automatically, as an update to an existing DS RRset that had itself been automatically provisioned.</t>
              </li>
            </ol>
          </li>
          <li anchor="reporting-2">
            <t>The DS RRset has been removed  </t>
            <ol spacing="normal" type="a"><li>
                <t>manually;</t>
              </li>
              <li>
                <t>automatically, using a delete signal (<xref section="4" sectionFormat="comma" target="RFC8078"/>).</t>
              </li>
            </ol>
          </li>
        </ol>
        <t>In addition, there are error conditions worthy of being reported:</t>
        <ol spacing="normal" type="1" start="3"><li anchor="reporting-3">
            <t>A pending DS update cannot be applied due to an error condition. There are various scenarios where an automated DS update might have been requested, but can't be fulfilled. These include:  </t>
            <ol spacing="normal" type="a"><li>
                <t>The new DS record set would break validation/resolution or is not acceptable to the Parent for some other reason (see <xref target="validity"/>).</t>
              </li>
              <li>
                <t>A lock prevents DS automation (see <xref target="locks"/>).</t>
              </li>
            </ol>
          </li>
          <li anchor="reporting-4">
            <t>No DS update is due, but it was determined that the Child zone is no longer compatible with the existing DS record set (e.g., DS RRset only references non-existing keys).</t>
          </li>
        </ol>
        <t>For these reportworthy cases, the entity performing DS automation would be justified to attempt communicating the situation. Potential recipients are:</t>
        <ul spacing="normal">
          <li>
            <t>Child DNS operator, preferably by making a report query <xref target="RFC9567"/> to the agent domain listed in the EDNS0 Report-Channel option of the DS update notification that triggered the DS update (<xref section="4" sectionFormat="comma" target="RFC9859"/>), or else via email to the address contained in the child zone's SOA RNAME field (see Sections <xref target="RFC1035" section="3.3.13" sectionFormat="bare"/> and <xref target="RFC1035" section="8" sectionFormat="bare"/> of <xref target="RFC1035"/>);</t>
          </li>
          <li>
            <t>Registrar (if DS automation is performed by the registry);</t>
          </li>
          <li>
            <t>Registrant (domain holder; in non-technical language, such as "DNSSEC security for your domain has been enabled and will be maintained automatically") or technical contact, in accordance with the communication preferences established with the parent-side entity.</t>
          </li>
        </ul>
        <t>For manual updates (<xref target="reporting-1a" format="none">case 1a</xref>), commencing DS automation (<xref target="reporting-1b" format="none">case 1b</xref>), and deactivating DNSSEC (<xref target="reporting-2" format="none">case 2</xref>), it seems worthwhile to notify both the domain's technical contact (if applicable) and the registrant. This will typically lead to one notification during normal operation of a domain. (<xref target="reporting-1c" format="none">Case 1c</xref>, the regular operation of automation, is not an interesting condition to report to a human.)</t>
        <t>For error conditions (cases <xref target="reporting-3" format="none">3</xref> and <xref target="reporting-4" format="none">4</xref>), the registrant need not always be involved. It seems advisable to first notify the domain's technical contact and the DNS operator serving the affected Child zone, and only if the problem persists for a prolonged amount of time (e.g., three days), notify the registrant.</t>
        <t>When the RRR model is used and the registry performs DS automation, the registrar should always stay informed of any DS record changes, e.g., via the EPP Change Poll Extension <xref target="RFC8590"/>.</t>
        <t>The same condition SHOULD NOT be reported unnecessarily frequently to the same recipient (e.g., no more than twice in a row). For example, when CDS and CDNSKEY records are inconsistent and prevent DS initialization, the registrant may be notified twice. Additional notifications may be sent with some back-off mechanism (in increasing intervals).</t>
        <t>The current DS configuration SHOULD be made accessible to the registrant (or their designated party) through the customer portal available for domain management. Ideally, the history of DS updates would also be available. However, due to the associated state requirements and the lack of direct operational impact, implementation of this is OPTIONAL.</t>
      </section>
    </section>
    <section anchor="locks">
      <name>Registration Locks</name>
      <t>This section provides recommendations to address the following question:</t>
      <ul spacing="normal">
        <li>
          <t>How does DS automation interact with other registration state parameters, such as registration locks?</t>
        </li>
      </ul>
      <section anchor="recommendations-2">
        <name>Recommendations</name>
        <ol spacing="normal" type="1"><li>
            <t>To secure ongoing operations, automated DS maintenance SHOULD NOT be suspended based on a registrar update lock alone (such as EPP status clientUpdateProhibited).</t>
          </li>
          <li>
            <t>When performed by the registry, automated DS maintenance SHOULD NOT be suspended based on a registry update lock alone (such as EPP status serverUpdateProhibited).</t>
          </li>
        </ol>
      </section>
      <section anchor="analysis_locks">
        <name>Analysis</name>
        <t>Registries and registrars can set various types of locks for domain registrations, usually upon the registrant's request. An overview of standardized locks using EPP, for example, is given in <xref section="2.3" sectionFormat="of" target="RFC5731"/>. Some registries may offer additional (or other) types of locks whose meaning and set/unset mechanisms are defined according to a proprietary policy.</t>
        <t>While some locks clearly should have no impact on DS automation (such as transfer or deletion locks), other types of locks, in particular "update locks", deserve a closer analysis.</t>
        <section anchor="registrar-vs-registry-lock">
          <name>Registrar vs. Registry Lock</name>
          <t>A registrar-side update lock (such as clientUpdateProhibited in EPP) protects against various types of accidental or malicious change (like unintended changes through the registrar's customer portal). Its security model does not prevent the registrar's (nor the registry's) actions. This is because a registrar-side lock can be removed by the registrar without an out-of-band interaction.</t>
          <t>Under such a security model, no tangible security benefit is gained by preventing automated DS maintenance based on a registrar lock alone, while preventing it would make maintenance needlessly difficult. It therefore seems reasonable not to suspend automation when such a lock is present.</t>
          <t>When a registry-side update lock is in place, the registrar cannot apply any changes (for security or delinquency or other reasons). However, it does not protect against changes made by the registry itself. This is exemplified by the serverUpdateProhibited EPP status, which demands only that the registrar's "[r]equests to update the object [...] MUST be rejected" (<xref section="2.3" sectionFormat="comma" target="RFC5731"/>). This type of lock therefore precludes DS automation by the registrar, while registry-side automation may continue.</t>
        </section>
        <section anchor="detailed-rationale">
          <name>Detailed Rationale</name>
          <t>Pre-DNSSEC, it was possible for a registration to be set up once, then locked and left alone (no maintenance required). With DNSSEC comes a change to this operational model: the configuration may have to be maintained in order to remain secure and operational. For example, the Child DNS operator may switch to another signing algorithm if the previous one is no longer deemed appropriate, or roll its SEP key for other reasons. Such changes entail updating the delegation's DS records.</t>
          <t>If authenticated, these operations do not qualify as accidental or malicious change, but as legitimate and normal activity for securing ongoing operation. The CDS/CDNSKEY method provides an automatic, authenticated means to convey DS update requests. The resulting DS update is subject to the parent's acceptance checks; in particular, it is not applied when it would break the delegation (see <xref target="validity"/>).</t>
          <t>Given that registrar locks protect against unintended changes (such as through the customer portal) while not preventing actions done by the registrar (or the registry) themself, such a lock is not suitable for defending against actions performed illegitimately by the registrar or registry (e.g., due to compromise). Any attack on the registration data that is feasible in the presence of a registrar lock is also feasible regardless of whether DS maintenance is done automatically; in other words, DS automation is orthogonal to the attack vector that a registrar lock protects against.</t>
          <t>Considering that automated DS updates are required to be authenticated and validated for correctness, it thus appears that honoring such requests, while in the registrant's interest, comes with no additional associated risk. Suspending automated DS maintenance therefore does not seem justified.</t>
          <t>Following this line of thought, some registries (e.g., .ch/.cz/.li) today perform automated DS maintenance even when an "update lock" is in place. Registries offering proprietary locks should carefully consider for each lock whether its scope warrants suspension.</t>
          <t>In case of a domain not yet secured with DNSSEC, automatic DS initialization is not required to maintain ongoing operation; however, authenticated DNSSEC bootstrapping <xref target="RFC9615"/> might be requested. Besides being in the interest of security, the fact that a Child is requesting DS initialization through an authenticated method expresses the registrant's intent to have the delegation secured.</t>
          <t>Further, some domains are equipped with an update lock by default. Not honoring DNSSEC bootstrapping requests then imposes an additional burden on the registrant, who has to unlock and relock the domain in order to facilitate DS provisioning after registration. This is a needless cost especially for large domain portfolios. It is also unexpected, as the registrant already has arranged for the necessary CDS/CDNSKEY records to be published. It therefore appears that DS initialization and rollovers should be treated the same way with respect to locks.</t>
        </section>
      </section>
    </section>
    <section anchor="multiple">
      <name>Multiple Submitting Parties</name>
      <t>This section provides recommendations to address the following questions:</t>
      <ul spacing="normal">
        <li>
          <t>How are conflicts resolved when DS parameters are accepted through multiple channels (e.g. via a conventional channel and via automation)?</t>
        </li>
        <li>
          <t>In case both the registry and the registrar are automating DS updates, how to resolve potential collisions?</t>
        </li>
      </ul>
      <section anchor="recommendations-3">
        <name>Recommendations</name>
        <ol spacing="normal" type="1"><li>
            <t>Registries and registrars SHOULD provide a another (e.g., manual) channel for DS maintenance in order to enable recovery when the Child has lost access to its signing key(s). This out-of-band channel is also needed when a DNS operator does not support DS automation or refuses to cooperate.</t>
          </li>
          <li>
            <t>DS update requests SHOULD be executed immediately after verification of their authenticity, regardless of whether they are received in-band or via an out-of-band channel.</t>
          </li>
          <li>
            <t>When processing a CDS/CDNSKEY "delete" signal to remove the entire DS record set (<xref section="4" sectionFormat="comma" target="RFC8078"/>), DS automation SHOULD NOT be suspended. For all other removal requests (such as when received via EPP or a web form), DS automation SHOULD be suspended, in order to prevent accidental re-initialization when the registrant intended to disable DNSSEC.</t>
          </li>
          <li>
            <t>Whenever a non-empty DS record set is provisioned, through whichever channel, DS automation SHOULD NOT (or no longer) be suspended (including after an earlier removal).</t>
          </li>
          <li>
            <t>In the RRR model, registries SHOULD NOT perform automated DS maintenance if it is known that the registrar performs this function, or does not support DNSSEC at all.</t>
          </li>
        </ol>
      </section>
      <section anchor="analysis_multiple">
        <name>Analysis</name>
        <t>In the RRR model, there are multiple channels through which DS parameters can be accepted:</t>
        <ul spacing="normal">
          <li>
            <t>The registry can retrieve information about an intended DS update automatically from the Child DNS Operator and apply the update directly;</t>
          </li>
          <li>
            <t>The registrar can retrieve the same and relay it to the registry;</t>
          </li>
          <li>
            <t>Registrars or (less commonly) registries can obtain the information from the registrant through another channel (such as a non-automated "manual update" via webform submission), and relay it to the registry.</t>
          </li>
        </ul>
        <t>There are several considerations in this context, as follows.</t>
        <section anchor="necessity-of-non-automatic-updates">
          <name>Necessity of Non-automatic Updates</name>
          <t>Under special circumstances, it may be necessary to perform a non-automatic DS update. One important example is when the key used by for authentication of DS updates is destroyed: in this case, an automatic key rollover is impossible as the Child DNS operator can no longer authenticate the associated information. Another example is when several providers are involved, but one no longer cooperates (e.g., when removing a provider from a multi-provider setup). Disabling manual DS management interfaces is therefore strongly discouraged.</t>
          <t>Similarly, when the registrar is known to not support DNSSEC (or to lack a DS provisioning interface), it seems adequate for registries to not perform automated DS maintenance, in order to prevent situations in which a misconfigured delegation cannot be repaired by the registrant.</t>
        </section>
        <section anchor="impact-of-non-automatic-updates-when-to-suspend-automation">
          <name>Impact of Non-automatic Updates: When to Suspend Automation</name>
          <t>When an out-of-band (e.g., manual) DS update is performed while CDS/CDNSKEY records referencing the previous DS RRset's keys are present, the delegation's DS records may be reset to their previous state at the next run of the automation process. This section discusses in which situations it is appropriate to suspend DS automation after such a non-automatic update.</t>
          <t>One option is to suspend DS automation after a manual DS update, but only until a resumption signal is observed. In the past, it was proposed that seeing an updated SOA serial in the child zone may serve as a resumption signal. However, as any arbitrary modification of zone contents — including the regular updating of DNSSEC signature validity timestamps  — typically causes a change in SOA serial, resumption of DS automation after a serial change comes with a high risk of surprise. Additional issues arise if nameservers have different serial offsets (e.g., in a multi-provider setup). It is therefore advised to not follow this practice.</t>
          <t>Note also that "automatic rollback" due to old CDS/CDNSKEY RRsets can only occur if they are signed with a key authorized by one of new DS records. Validity checks described in <xref target="validity"/> further ensure that updates do not break validation.</t>
          <t>Removal of a DS record set is triggered either through a CDS/CDNSKEY "delete" signal observed by the party performing the automation (<xref section="4" sectionFormat="comma" target="RFC8078"/>), or by receiving a removal request out-of-band (e.g., via EPP or a web form). In the first case, it is useful to keep automation active for the delegation in question, to facilitate later DS bootstrapping. In the second case, it is likely that the registrant intends to disable DNSSEC for the domain, and DS automation is best suspended (until a new DS record is provisioned somehow).</t>
          <t>One may ask how a registry can know whether a removal request received via EPP was the result of the registrar observing a CDS/CDNSKEY "delete" signal. It turns out that the registry does not need to know that; in fact, the advice works out nicely regardless of who does the automation:</t>
          <ol spacing="normal" type="a"><li>
              <t>Only registry: If the registry performs automation, then the registry will consider any request received from the registrar as out-of-band (in the context of this automation). When such requests demand removal of the entire DS record set, the registry therefore should suspend automation.</t>
            </li>
            <li>
              <t>Only registrar: The registrar can always distinguish between removal requests obtained from a CDS/CDNSKEY "delete" signal and other registrant requests, and suspend automation as appropriate.</t>
            </li>
            <li>
              <t>In the (undesirable) case that both parties automate, there are two cases:  </t>
              <ul spacing="normal">
                <li>
                  <t>If the registrant submits a manual removal request to the registrar, it is out-of-band from the registrar perspective (e.g., web form), and also for the registry (e.g., EPP). As a consequence, both will suspend automation (which is the correct result).</t>
                </li>
                <li>
                  <t>If a CDS/CDNSKEY "delete" signal causes the registrar to request DS removal from the registry, then the registry will suspend automation (because the removal request is received out-of-band, such as via EPP). This is independent of whether the registry's automation has already seen the signal. The registrar, however, will be aware of the in-band nature of the request and not suspend automation (which is also the correct result).</t>
                </li>
              </ul>
              <t>
As a side effect, this works towards avoiding redundant automation at the registry.</t>
            </li>
          </ol>
          <t>All in all:</t>
          <ul spacing="normal">
            <li>
              <t>It appears advisable to generally not suspend in-band DS automation when an out-of-band DS update has occurred.</t>
            </li>
            <li>
              <t>An exception from this rule is when the entire DS record set was removed through an out-of-band request, in which case the registrant likely wants to disable DNSSEC for the domain. DS automation should then be suspended so that automatic re-initialization (bootstrapping) does not occur.</t>
            </li>
            <li>
              <t>In all other cases, any properly authenticated DS updates received, including through an automated method, are to be considered as the current intent of the domain holder.</t>
            </li>
          </ul>
        </section>
        <section anchor="concurrent-automatic-updates">
          <name>Concurrent Automatic Updates</name>
          <t>When the RRR model is used, there is a potential for collision if both the registry and the registrar are automating DS provisioning by scanning the child for CDS/CDNSKEY records. No disruptive consequences are expected if both parties perform DS automation. An exception is when during a key rollover, registry and registrar see different versions of the Child's DS update requests, such as when CDS/CDNSKEY records are retrieved from different vantage points. Although unlikely due to Recommendation 1a of <xref target="validity"/>, this may lead to flapping of DS updates; however, it is not expected to be harmful as either DS RRset will allow for the validation function to continue to work, as ensured by Recommendation 1b of <xref target="validity"/>. The effect subsides as the Child's state eventually becomes consistent (roughly, within the child's replication delay); any flapping until then will be a minor nuisance only.</t>
          <t>The issue disappears entirely when scanning is replaced by notifications that trigger DS maintenance through one party's designated endpoint <xref target="RFC9859"/>, and can otherwise be mitigated if the registry and registrar agree that only one of them will perform scanning.</t>
          <t>As a standard aspect of key rollovers (RFC 6781), the Child DNS operator is expected to monitor propagation of Child zone updates to all authoritative nameserver instances, and only proceed to the next step once replication has succeeded everywhere and the DS record set was subsequently updated (and in no case before the DS RRset's TTL has passed). Any breakage resulting from improper timing on the Child side is outside of the Parent's sphere of influence, and thus out of scope of DS automation considerations.</t>
        </section>
      </section>
    </section>
    <section anchor="cds-vs-cdnskey">
      <name>CDS vs. CDNSKEY</name>
      <t>This section provides recommendations to address the following question:</t>
      <ul spacing="normal">
        <li>
          <t>Are parameters for DS automation best conveyed as CDNSKEY or CDS records, or both?</t>
        </li>
      </ul>
      <section anchor="recommendations-4">
        <name>Recommendations</name>
        <ol spacing="normal" type="1"><li>
            <t>DNS operators SHOULD publish both CDNSKEY records as well as CDS records, and follow best practice for the choice of hash digest type <xref target="DS-IANA"/>.</t>
          </li>
          <li>
            <t>Registries (or registrars) scanning for CDS/CDNSKEY records SHOULD verify that any published CDS and CDNSKEY records are consistent with each other, and otherwise cancel the update <xref target="I-D.ietf-dnsop-cds-consistency"/>.</t>
          </li>
        </ol>
      </section>
      <section anchor="analysis_dichotomy">
        <name>Analysis</name>
        <t>DS records can be generated from information provided either in DS format (CDS) or in DNSKEY format (CDNSKEY). While the format of CDS records is identical to that of DS records (so the record data be taken verbatim), generation of a DS record from CDNSKEY information involves computing a hash.</t>
        <t>Whether a Parent processes CDS or CDNSKEY records depends on their preference:</t>
        <ul spacing="normal">
          <li>
            <t>Conveying (and storing) CDNSKEY information allows the Parent to control the choice of hash algorithms. The Parent may then unilaterally regenerate DS records with a different choice of hash algorithm(s) whenever deemed appropriate.</t>
          </li>
          <li>
            <t>Conveying CDS information allows the Child DNS operator to control the hash digest type used in DS records, enabling the Child DNS operator to deploy (for example) experimental hash digests and removing the need for registry-side changes when new digest types become available.</t>
          </li>
        </ul>
        <t>The need to make a choice in the face of this dichotomy is not specific to DS automation: even when DNSSEC parameters are relayed to the Parent through conventional channels, the Parent has to make some choice about which format(s) to accept.</t>
        <t>As there exists no protocol for Child DNS Operators to discover a Parent's input format preference, it seems best for interoperability to publish both CDNSKEY as well as CDS records, in line with <xref section="5" sectionFormat="comma" target="RFC7344"/>. The choice of hash digest type should follow current best practice <xref target="DS-IANA"/>.</t>
        <t>Publishing the same information in two different formats is not ideal. Still, it is much less complex and costly than burdening the Child DNS operator with discovering each Parent's policy; also, it is very easily automated. Operators should ensure that published RRsets are consistent with each other.</t>
        <t>If both RRsets are published, Parents are expected to verify consistency between them <xref target="I-D.ietf-dnsop-cds-consistency"/>, as determined by matching CDS and CDNSKEY records using hash digest algorithms whose support is mandatory <xref target="DS-IANA"/>. (Consistency of CDS records with optional or unsupported hash digest types is not required.)</t>
        <t>By rejecting the DS update if RRsets are found to be inconsistent, Child DNS operators are held responsible when publishing contradictory information. Note that this does not imply a restriction to the hash digest types found in the CDS RRset: If no inconsistencies are found, the parent can publish DS records with whatever digest type(s) it prefers.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document considers security aspects throughout, and has not separate considerations.</t>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank the SSAC members who wrote the <xref target="SAC126"/> report on which this document is based.</t>
      <t>In order of first contribution or review: Barbara Jantzen, Matt Pounsett, Matthijs Mekking, Ondřej Caletka, Oli Schacher, Kim Davies, Jim Reid, Q Misell, Scott Hollenbeck, Tamás Csillag, Philip Homburg, Shumon Huque, Libor Peltan, Josh Simpson, Johan Stenstam, Stefan Ubbink, Viktor Dukhovni, Hugo Salgado</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="DNSKEY-IANA" target="https://www.iana.org/assignments/dns-sec-alg-numbers/dns-sec-alg-numbers.xml#dns-sec-alg-numbers-1">
          <front>
            <title>DNS Security Algorithm Numbers</title>
            <author initials="" surname="IANA" fullname="IANA">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="DS-IANA" target="http://www.iana.org/assignments/ds-rr-types">
          <front>
            <title>Delegation Signer (DS) Resource Record (RR) Type Digest Algorithms</title>
            <author initials="" surname="IANA" fullname="IANA">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC7344">
          <front>
            <title>Automating DNSSEC Delegation Trust Maintenance</title>
            <author fullname="W. Kumari" initials="W." surname="Kumari"/>
            <author fullname="O. Gudmundsson" initials="O." surname="Gudmundsson"/>
            <author fullname="G. Barwood" initials="G." surname="Barwood"/>
            <date month="September" year="2014"/>
            <abstract>
              <t>This document describes a method to allow DNS Operators to more easily update DNSSEC Key Signing Keys using the DNS as a communication channel. The technique described is aimed at delegations in which it is currently hard to move information from the Child to Parent.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7344"/>
          <seriesInfo name="DOI" value="10.17487/RFC7344"/>
        </reference>
        <reference anchor="RFC8078">
          <front>
            <title>Managing DS Records from the Parent via CDS/CDNSKEY</title>
            <author fullname="O. Gudmundsson" initials="O." surname="Gudmundsson"/>
            <author fullname="P. Wouters" initials="P." surname="Wouters"/>
            <date month="March" year="2017"/>
            <abstract>
              <t>RFC 7344 specifies how DNS trust can be maintained across key rollovers in-band between parent and child. This document elevates RFC 7344 from Informational to Standards Track. It also adds a method for initial trust setup and removal of a secure entry point.</t>
              <t>Changing a domain's DNSSEC status can be a complicated matter involving multiple unrelated parties. Some of these parties, such as the DNS operator, might not even be known by all the organizations involved. The inability to disable DNSSEC via in-band signaling is seen as a problem or liability that prevents some DNSSEC adoption at a large scale. This document adds a method for in-band signaling of these DNSSEC status changes.</t>
              <t>This document describes reasonable policies to ease deployment of the initial acceptance of new secure entry points (DS records).</t>
              <t>It is preferable that operators collaborate on the transfer or move of a domain. The best method is to perform a Key Signing Key (KSK) plus Zone Signing Key (ZSK) rollover. If that is not possible, the method using an unsigned intermediate state described in this document can be used to move the domain between two parties. This leaves the domain temporarily unsigned and vulnerable to DNS spoofing, but that is preferred over the alternative of validation failures due to a mismatched DS and DNSKEY record.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8078"/>
          <seriesInfo name="DOI" value="10.17487/RFC8078"/>
        </reference>
        <reference anchor="RFC9615">
          <front>
            <title>Automatic DNSSEC Bootstrapping Using Authenticated Signals from the Zone's Operator</title>
            <author fullname="P. Thomassen" initials="P." surname="Thomassen"/>
            <author fullname="N. Wisiol" initials="N." surname="Wisiol"/>
            <date month="July" year="2024"/>
            <abstract>
              <t>This document introduces an in-band method for DNS operators to publish arbitrary information about the zones for which they are authoritative, in an authenticated fashion and on a per-zone basis. The mechanism allows managed DNS operators to securely announce DNSSEC key parameters for zones under their management, including for zones that are not currently securely delegated.</t>
              <t>Whenever DS records are absent for a zone's delegation, this signal enables the parent's registry or registrar to cryptographically validate the CDS/CDNSKEY records found at the child's apex. The parent can then provision DS records for the delegation without resorting to out-of-band validation or weaker types of cross-checks such as "Accept after Delay".</t>
              <t>This document establishes the DS enrollment method described in Section 4 of this document as the preferred method over those from Section 3 of RFC 8078. It also updates RFC 7344.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9615"/>
          <seriesInfo name="DOI" value="10.17487/RFC9615"/>
        </reference>
        <reference anchor="RFC9364">
          <front>
            <title>DNS Security Extensions (DNSSEC)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>This document describes the DNS Security Extensions (commonly called "DNSSEC") that are specified in RFCs 4033, 4034, and 4035, as well as a handful of others. One purpose is to introduce all of the RFCs in one place so that the reader can understand the many aspects of DNSSEC. This document does not update any of those RFCs. A second purpose is to state that using DNSSEC for origin authentication of DNS data is the best current practice. A third purpose is to provide a single reference for other documents that want to refer to DNSSEC.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="237"/>
          <seriesInfo name="RFC" value="9364"/>
          <seriesInfo name="DOI" value="10.17487/RFC9364"/>
        </reference>
        <reference anchor="RFC9859">
          <front>
            <title>Generalized DNS Notifications</title>
            <author fullname="J. Stenstam" initials="J." surname="Stenstam"/>
            <author fullname="P. Thomassen" initials="P." surname="Thomassen"/>
            <author fullname="J. Levine" initials="J." surname="Levine"/>
            <date month="September" year="2025"/>
            <abstract>
              <t>This document generalizes and extends the use of DNS NOTIFY (RFC 1996) beyond conventional zone transfer hints to allow other types of actions that were previously lacking a trigger mechanism to be triggered via the DNS. Notifications merely nudge the receiver to initiate a predefined action promptly (instead of on a schedule); they do not alter the action itself (including any security checks it might employ).</t>
              <t>To enable this functionality, a method for discovering the receiver endpoint for such notification messages is introduced, via the new DSYNC record type. Notification types are recorded in a new registry, with initial support for parental NS and DS record updates including DNSSEC bootstrapping.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9859"/>
          <seriesInfo name="DOI" value="10.17487/RFC9859"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="I-D.ietf-dnsop-cds-consistency">
          <front>
            <title>Clarifications on CDS/CDNSKEY and CSYNC Consistency</title>
            <author fullname="Peter Thomassen" initials="P." surname="Thomassen">
              <organization>SSE - Secure Systems Engineering GmbH</organization>
            </author>
            <date day="15" month="October" year="2025"/>
            <abstract>
              <t>   Maintenance of DNS delegations requires occasional changes of the DS
   and NS record sets on the parent side of the delegation.  For the
   case of DS records, "Automating DNSSEC Delegation Trust Maintenance"
   (RFC 7344) provides automation by allowing the child to publish CDS
   and/or CDNSKEY records holding the prospective DS parameters which
   the parent can ingest.  Similarly, "Child-to-Parent Synchronization
   in DNS" (RFC 7477) specifies CSYNC records to indicate a desired
   update of the delegation's NS (and glue) records.  Parent-side
   entities (e.g., Registries and Registrars) can query these records
   from the child and, after validation, use them to update the parent-
   side Resource Record Sets (RRsets) of the delegation.

   This document specifies that when performing such queries, parent-
   side entities has to ensure that updates triggered via CDS/CDNSKEY
   and CSYNC records are consistent across the child's authoritative
   nameservers, before taking any action based on these records.

   This document updates RFC 7344 and RFC 7477.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dnsop-cds-consistency-09"/>
        </reference>
        <reference anchor="RFC9567">
          <front>
            <title>DNS Error Reporting</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <date month="April" year="2024"/>
            <abstract>
              <t>DNS error reporting is a lightweight reporting mechanism that provides the operator of an authoritative server with reports on DNS resource records that fail to resolve or validate. A domain owner or DNS hosting organization can use these reports to improve domain hosting. The reports are based on extended DNS errors as described in RFC 8914.</t>
              <t>When a domain name fails to resolve or validate due to a misconfiguration or an attack, the operator of the authoritative server may be unaware of this. To mitigate this lack of feedback, this document describes a method for a validating resolver to automatically signal an error to a monitoring agent specified by the authoritative server. The error is encoded in the QNAME; thus, the very act of sending the query is to report the error.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9567"/>
          <seriesInfo name="DOI" value="10.17487/RFC9567"/>
        </reference>
        <reference anchor="RFC8590">
          <front>
            <title>Change Poll Extension for the Extensible Provisioning Protocol (EPP)</title>
            <author fullname="J. Gould" initials="J." surname="Gould"/>
            <author fullname="K. Feher" initials="K." surname="Feher"/>
            <date month="May" year="2019"/>
            <abstract>
              <t>This document describes an Extensible Provisioning Protocol (EPP) extension for notifying clients of operations on client-sponsored objects that were not initiated by the client through EPP. These operations may include contractual or policy requirements including, but not limited to, regular batch processes, customer support actions, Uniform Domain-Name Dispute-Resolution Policy (UDRP) or Uniform Rapid Suspension (URS) actions, court-directed actions, and bulk updates based on customer requests. Since the client is not directly involved or knowledgable of these operations, the extension is used along with an EPP object mapping to provide the resulting state of the postoperation object, and optionally a preoperation object, with the operation metadata of what, when, who, and why.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8590"/>
          <seriesInfo name="DOI" value="10.17487/RFC8590"/>
        </reference>
        <reference anchor="RFC1035">
          <front>
            <title>Domain names - implementation and specification</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1035"/>
          <seriesInfo name="DOI" value="10.17487/RFC1035"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="LowTTL" target="https://indico.dns-oarc.net/event/47/contributions/1010/attachments/958/1811/DS%20and%20DNSKEY%20TTL%20experiment.pdf">
          <front>
            <title>DS and DNSKEY low TTL experiments</title>
            <author initials="P." surname="Špaček" fullname="Petr Špaček">
              <organization>ISC</organization>
            </author>
            <date year="2023" month="September" day="06"/>
          </front>
          <seriesInfo name="at" value="DNS OARC 41"/>
        </reference>
        <reference anchor="SAC126" target="https://itp.cdn.icann.org/en/files/security-and-stability-advisory-committee-ssac-reports/sac-126-16-08-2024-en.pdf">
          <front>
            <title>SAC126: DNSSEC Delegation Signer (DS) Record Automation</title>
            <author initials="I. S. and S. A. C." surname="(SSAC)" fullname="ICANN Security and Stability Advisory Committee (SSAC)">
              <organization/>
            </author>
            <date year="2024" month="August" day="12"/>
          </front>
        </reference>
        <reference anchor="RFC6840">
          <front>
            <title>Clarifications and Implementation Notes for DNS Security (DNSSEC)</title>
            <author fullname="S. Weiler" initials="S." role="editor" surname="Weiler"/>
            <author fullname="D. Blacka" initials="D." role="editor" surname="Blacka"/>
            <date month="February" year="2013"/>
            <abstract>
              <t>This document is a collection of technical clarifications to the DNS Security (DNSSEC) document set. It is meant to serve as a resource to implementors as well as a collection of DNSSEC errata that existed at the time of writing.</t>
              <t>This document updates the core DNSSEC documents (RFC 4033, RFC 4034, and RFC 4035) as well as the NSEC3 specification (RFC 5155). It also defines NSEC3 and SHA-2 (RFC 4509 and RFC 5702) as core parts of the DNSSEC specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6840"/>
          <seriesInfo name="DOI" value="10.17487/RFC6840"/>
        </reference>
        <reference anchor="RFC9803">
          <front>
            <title>Extensible Provisioning Protocol (EPP) Mapping for DNS Time-to-Live (TTL) Values</title>
            <author fullname="G. Brown" initials="G." surname="Brown"/>
            <date month="June" year="2025"/>
            <abstract>
              <t>This document describes an extension to the Extensible Provisioning
Protocol (EPP) that allows EPP clients to manage the Time-to-Live
(TTL) value for domain name delegation records.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9803"/>
          <seriesInfo name="DOI" value="10.17487/RFC9803"/>
        </reference>
        <reference anchor="RFC6781">
          <front>
            <title>DNSSEC Operational Practices, Version 2</title>
            <author fullname="O. Kolkman" initials="O." surname="Kolkman"/>
            <author fullname="W. Mekking" initials="W." surname="Mekking"/>
            <author fullname="R. Gieben" initials="R." surname="Gieben"/>
            <date month="December" year="2012"/>
            <abstract>
              <t>This document describes a set of practices for operating the DNS with security extensions (DNSSEC). The target audience is zone administrators deploying DNSSEC.</t>
              <t>The document discusses operational aspects of using keys and signatures in the DNS. It discusses issues of key generation, key storage, signature generation, key rollover, and related policies.</t>
              <t>This document obsoletes RFC 4641, as it covers more operational ground and gives more up-to-date requirements with respect to key sizes and the DNSSEC operations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6781"/>
          <seriesInfo name="DOI" value="10.17487/RFC6781"/>
        </reference>
        <reference anchor="RFC5731">
          <front>
            <title>Extensible Provisioning Protocol (EPP) Domain Name Mapping</title>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
            <date month="August" year="2009"/>
            <abstract>
              <t>This document describes an Extensible Provisioning Protocol (EPP) mapping for the provisioning and management of Internet domain names stored in a shared central repository. Specified in XML, the mapping defines EPP command syntax and semantics as applied to domain names. This document obsoletes RFC 4931. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="69"/>
          <seriesInfo name="RFC" value="5731"/>
          <seriesInfo name="DOI" value="10.17487/RFC5731"/>
        </reference>
        <reference anchor="RFC5730">
          <front>
            <title>Extensible Provisioning Protocol (EPP)</title>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
            <date month="August" year="2009"/>
            <abstract>
              <t>This document describes an application-layer client-server protocol for the provisioning and management of objects stored in a shared central repository. Specified in XML, the protocol defines generic object management operations and an extensible framework that maps protocol operations to objects. This document includes a protocol specification, an object mapping template, and an XML media type registration. This document obsoletes RFC 4930. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="69"/>
          <seriesInfo name="RFC" value="5730"/>
          <seriesInfo name="DOI" value="10.17487/RFC5730"/>
        </reference>
      </references>
    </references>
    <?line 386?>

<section anchor="terminology">
      <name>Terminology</name>
      <t>Unless defined in this section, the terminology in this document is as defined in <xref target="RFC7344"/>.</t>
      <dl>
        <dt>Child zone:</dt>
        <dd>
          <t>DNS zone whose delegation is in the Parent zone.</t>
        </dd>
        <dt>Child (DNS operator):</dt>
        <dd>
          <t>DNS operator responsible for a Child zone.</t>
        </dd>
        <dt>DNS operator:</dt>
        <dd>
          <t>The entity holding the zone's primary copy before it is signed. Typically a DNS hosting provider in the domain holder's name, it controls the authoritative contents and delegations in the zone, and is thus operationally responsible for maintaining the "purposeful" records in the zone file (such as IP address, MX, or CDS/CDNSKEY records).
The parties involved in other functions for the zone, like signing and serving, are not relevant for this definition.</t>
        </dd>
        <dt>Parent zone:</dt>
        <dd>
          <t>DNS zone that holds a delegation for a Child zone.</t>
        </dd>
        <dt>Parent (DNS operator):</dt>
        <dd>
          <t>The DNS operator responsible for a Parent zone, and thus involved with the maintenance of the delegation's DNSSEC parameters (in particular, the acceptance of these parameters and the publication of corresponding DS records).</t>
        </dd>
        <dt>Registrant:</dt>
        <dd>
          <t>The entity responsible for records associated with a particular domain name in a domain name registry (typically under a TLD such as .com or an SLD such as co.uk). When the RRR model is used, the registrant maintains these records through a registrar who acts as an intermediary for both the registry and the registrant.</t>
        </dd>
        <dt>Registrar:</dt>
        <dd>
          <t>An entity through which registrants register domain names; the registrar performs this service by interacting directly with the registry in charge of the domain's suffix. A registrar may also provide other services such as DNS service or web hosting for the registrant. In some cases, the registry directly offers registration services to the public, that is, the registry may also perform the registrar function.</t>
        </dd>
        <dt>Registry:</dt>
        <dd>
          <t>The entity that controls the registry database and authoritative DNS service of domain names registered under a particular suffix, for example a top-level domain (TLD). A registry receives requests through an interface (usually EPP <xref target="RFC5730"/>) from registrars to read, add, delete, or modify domain name registrations, and then makes the requested changes in the registry database and associated DNS zone.</t>
        </dd>
        <dt>RRR Model:</dt>
        <dd>
          <t>The registrant-registrar-registry interaction framework, where registrants interact with a registrar to register and manage domain names, and registrars interact with the domain's registry for the provision and management of domain names on the registrant's behalf. This model is common amongst top-level domains.</t>
        </dd>
      </dl>
    </section>
    <section anchor="recommendations-overview">
      <name>Recommendations Overview</name>
      <t>TODO Paste all recommendations here</t>
    </section>
    <section anchor="approaches-not-pursued">
      <name>Approaches not pursued</name>
      <section anchor="validity-checks-and-safety-measures">
        <name>Validity Checks and Safety Measures</name>
        <section anchor="ttls-and-caching-1">
          <name>TTLs and Caching</name>
          <t>It is not necessary to equally reduce the old DS RRset's TTL before applying a change. If this were done, the rollover itself would have to be delayed without any apparent benefit. With the goal of enabling timely withdrawal of a botched DS RRset, it is not equally important for the previous (functional) DS RRset to be abandoned very quickly. In fact, not reducing the old DS TTL has the advantage of providing some resiliency against a botched DS update, as clients would continue to use the previous DS RRset according to its normal TTL, and the broken RRset could be withdrawn without some of them ever seeing it. Wrong DS RRsets will then only gradually impact clients, minimizing impact overall.</t>
        </section>
      </section>
      <section anchor="cds-vs-cdnskey-1">
        <name>CDS vs. CDNSKEY</name>
        <t>Recommendation not pursued: Parents, independently of their preference for CDS or CDNSKEY, SHOULD require publication of both RRsets, and SHOULD NOT proceed with updating the DS RRset if one is found missing. (this would update RFC 7344 Section 6)</t>
        <section anchor="analysis">
          <name>Analysis</name>
          <t>Some registries have chosen to prefer DNSKEY-style input which seemingly comes with greater influence on the delegation's security properties (in particular, the DS hash digest type). It is noted that regardless of the choice of input format, the Parent cannot prevent the Child from following insecure cryptographic practices (such as insecure key storage, or using a key with insufficient entropy). Besides, as the DS format contains a field indicating the hash digest type, objectionable ones (such as those outlawed by <xref target="DS-IANA"/>) can still be rejected even when ingesting CDS records, by inspecting that field.</t>
          <t>The fact that more than one input type needs to be considered burdens both Child DNS operators and Parents with the need to consider how to handle this dichotomy. Until this is addressed in an industry-wide manner and one of these mechanisms is deprecated in favor of the other, Parents implementing automated DS maintenance should act as to maximize interoperability: Parents, independently of their input format preference, are therefore advised to require publication of both CDS and CDNSKEY records.</t>
          <t>Parents can retain whatever benefit their policy choice carries for them, while facilitating a later revision of that choice. This approach also simplifies possible future deprecation of one of the two formats, as no coordination or implementation changes would be needed on the child side.</t>
        </section>
      </section>
    </section>
    <section anchor="change-history-to-be-removed-before-publication">
      <name>Change History (to be removed before publication)</name>
      <ul spacing="normal">
        <li>
          <t>draft-ietf-dnsop-ds-automation-01</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Remove Recommendation 6.1.2 which had told parents to require publication of both CDS and CDNSKEY</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Clarify Recommendation 5.1.3 (on suspension of automation after DS RRset removal) and provide extra analysis</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Providing access to DS update history is now optional</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Humans (domains holders) should be notified according to preferences established with registry/registrar (not necessarily via email)</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Remove redundant Recommendation 5.1.5 (same as 3.1.4)</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Editorial changes</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>draft-ietf-dnsop-ds-automation-00</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Rename after adoption</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>draft-shetho-dnsop-ds-automation-02</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Allow DS automation during registry update lock</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Editorial changes</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>draft-shetho-dnsop-ds-automation-01</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Incorporated various review feedback (editorial + adding TODOs)</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>draft-shetho-dnsop-ds-automation-00</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Initial public draft.</t>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
