<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.17 (Ruby 3.2.3) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

<!ENTITY RFC1034 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.1034.xml">
<!ENTITY RFC1035 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.1035.xml">
<!ENTITY RFC2181 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2181.xml">
<!ENTITY RFC2308 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2308.xml">
<!ENTITY RFC8109 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8109.xml">
<!ENTITY RFC8806 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8806.xml">
<!ENTITY RFC8914 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8914.xml">
<!ENTITY RFC8976 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8976.xml">
<!ENTITY RFC9520 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9520.xml">
<!ENTITY RFC9567 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9567.xml">
<!ENTITY RFC2119 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC8174 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
<!ENTITY I-D.fujiwara-dnsop-resolver-update SYSTEM "https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.fujiwara-dnsop-resolver-update.xml">
<!ENTITY I-D.vixie-dnsext-resimprove SYSTEM "https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.vixie-dnsext-resimprove.xml">
<!ENTITY I-D.wijngaards-dnsext-resolver-side-mitigation SYSTEM "https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.wijngaards-dnsext-resolver-side-mitigation.xml">
<!ENTITY I-D.ietf-deleg SYSTEM "https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-deleg.xml">
]>


<rfc ipr="trust200902" docName="draft-ietf-dnsop-ns-revalidation-11" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="DNS Delegation Revalidation">Delegation Revalidation by DNS Resolvers</title>

    <author initials="S." surname="Huque" fullname="Shumon Huque">
      <organization>Salesforce</organization>
      <address>
        <postal>
          <street>415 Mission Street, 3rd Floor</street>
          <city>San Francisco</city>
          <region>CA</region>
          <code>94105</code>
          <country>United States of America</country>
        </postal>
        <email>shuque@gmail.com</email>
      </address>
    </author>
    <author initials="P." surname="Vixie" fullname="Paul Vixie">
      <organization>SIE Europe, U.G.</organization>
      <address>
        <email>paul@redbarn.org</email>
      </address>
    </author>
    <author initials="W." surname="Toorop" fullname="Willem Toorop">
      <organization>NLnet Labs</organization>
      <address>
        <postal>
          <street>Science Park 400</street>
          <city>Amsterdam</city>
          <code>1098 XH</code>
          <country>Netherlands</country>
        </postal>
        <email>willem@nlnetlabs.nl</email>
      </address>
    </author>

    <date year="2025" month="October" day="19"/>

    <area>Operations and Management Area</area>
    <workgroup>Domain Name System Operations</workgroup>
    <keyword>Internet-Draft</keyword> <keyword>DNS</keyword> <keyword>Resolver</keyword> <keyword>Delegation</keyword> <keyword>Revalidation</keyword> <keyword>Authoritative</keyword> <keyword>Name Server Record</keyword> <keyword>NS</keyword> <keyword>Parent</keyword> <keyword>Child</keyword> <keyword>Resource Record Set</keyword>

    <abstract>


<?line 189?>

<t>This document describes an optional algorithm for the processing of Name Server (NS) resource record (RR) sets (RRsets) during iterative resolution, and describes the benefits and considerations of using this approach.
When following a referral response from an authoritative server to a child zone, DNS resolvers should explicitly query the authoritative NS RRset at the apex of the child zone and cache this in preference to the NS RRset on the parent side of the zone cut.
The (A and AAAA) address RRsets in the additional section from referral responses and authoritative NS answers for the names of the NS RRset, should similarly be re-queried and used to replace the entries with the lower trustworthiness ranking in cache.
Resolvers should also periodically revalidate the delegation by re-querying the parent zone at the expiration of the TTL of either the parent or child NS RRset, whichever comes first.</t>



    </abstract>

    <note title="About This Document" removeInRFC="true">
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-dnsop-ns-revalidation/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        DNSOP Working Group mailing list (<eref target="mailto:dnsop@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/dnsop/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/dnsop/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/shuque/ns-revalidation"/>.</t>
    </note>


  </front>

  <middle>


<?line 196?>

<section anchor="intro"><name>Introduction</name>

<t>This document recommends improved DNS <xref target="RFC1034"/> <xref target="RFC1035"/> resolver behavior with respect to the processing of NS record sets during iterative resolution.</t>

<t>In <xref target="upgrade-ns">Upgrading NS RRset Credibility</xref> we recommend that resolvers, when following a referral response from an authoritative server to a child zone, should explicitly query the authoritative NS RRset at the apex of the child zone and cache this in preference to the NS RRset on the parent side of the zone cut.</t>

<t><xref target="upgrade-ns">Upgrading NS RRset Credibility</xref> works most reliably with good quality child NS RRsets, where the name servers referenced in the RDATA of the NS RRset correspond to IP addresses of nameservers which correctly serve the child zone.
We consider both the root, as well as the zones delegated from the root, to have good quality child NS RRset. We also note that there may be numerous zones further down the DNS delegation hierarchy that may not be competently administered, and may have incorrect or stale authoritative NS and associated address records. As a result they may require a resolver to fallback to data from the delegating side of the zone cut for successful resolution. <xref target="scoped-upgrading"/> describes limiting the upgrading of NS RRset credibility to address this.</t>

<t>The address records in the additional section from the referral response (as glue) or authoritative NS response that match the names of the NS RRset should similarly be re-queried if they are cached non-authoritatively.
The authoritative answers from those queries should replace the cached non-authoritative A and AAAA RRsets.
This is described in (see <xref target="upgrade-addresses">Upgrading A and AAAA RRset Credibility</xref>).</t>

<t>In <xref target="strict">Strict and opportunistic revalidation</xref>, we make a distinction between strict and opportunistic revalidation.
Strict revalidation provides <xref target="impact">DNSSEC protection of infrastructure data</xref> with DNSSEC signed infrastructure data and validating resolvers, but for it to work correctly, good quality child NS RRsets are a pre-requisite.
Opportunistic revalidation allows for fallback to the non-authoritative data returned in the referral responses, but therefore does not provide the same degree of protection as strict revalidation does.</t>

<t>Finally, in <xref target="revalidation">Delegation Revalidation</xref>, we recommend that resolvers revalidate the delegation by re-querying the parent zone at the expiration of the TTL of the parent side NS RRset.</t>

<section anchor="terminology"><name>Terminology</name>
<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

<t>Throughout this document we will also use terminology with the meaning as defined below:</t>

<dl newline="true">
  <dt>Triggering query:</dt>
  <dd>
    <t>the DNS query that caused ("triggered") a referral response.</t>
  </dd>
  <dt>Infrastructure RRsets (data):</dt>
  <dd>
    <t>the NS and address (A and AAAA) RRsets used by resolvers to contact the authoritative name servers</t>
  </dd>
  <dt>Revalidation:</dt>
  <dd>
    <t>the process of obtaining the authoritative infrastructure data</t>
  </dd>
  <dt>Validation (validating) query:</dt>
  <dd>
    <t>the extra query that is performed to get the authoritative version of infrastructure RRsets</t>
  </dd>
  <dt>Delegation revalidation:</dt>
  <dd>
    <t>re-establishing the existence and validity of the parent-side NS RRset of a delegation</t>
  </dd>
  <dt>Revalidation point:</dt>
  <dd>
    <t>a delegation under revalidation</t>
  </dd>
  <dt>Re-delegation:</dt>
  <dd>
    <t>the process of changing a delegation information to another set of authoritative name servers, potentially under different administrative control</t>
  </dd>
</dl>

</section>
</section>
<section anchor="motivation"><name>Motivation</name>

<t>There is wide variability in the behavior of deployed DNS resolvers today with respect to how they process delegation records.
Some of them prefer the parent NS set, some prefer the child, and for others, what they preferentially cache depends on the dynamic state of queries and responses they have processed <xref target="SOMMESE"/>.</t>

<t>While this variability is expected to continue in deployed implementations, this document specifies an algorithm that can be adopted by resolvers to achieve several benefits.</t>

<t>It preferentially and predictably prefers the authoritative NS set at the apex of the child zone, which better comports with the the DNS protocol's data ranking rules. (Note that the proposed redesign of the DNS delegation mechanism in <xref target="I-D.ietf-deleg"/> is expected to fundamentally alter where authoritative delegation information will reside. This document deals with the DNS delegation mechanism as currently deployed.)</t>

<t>It offers seeveral security advantages.
The mechanisms described in this document help against GHOST domain attacks and a variety of cache poisoning attacks with resolvers that adhere to Sections <xref target="RFC2181" section="5.4.1" sectionFormat="bare">Ranking data</xref> and <xref target="RFC2181" section="6.1" sectionFormat="bare">Zone authority</xref> of <xref target="RFC2181"/>.
Strictly revalidating referral and authoritative NS RRset responses, enables the resolver to defend itself against query redirection attacks, see <xref target="security">Security and Privacy considerations</xref>.</t>

<t>The delegation NS RRset at the bottom of the parent zone and the apex NS RRset in the child zone are unsynchronized in the DNS protocol.
<xref section="4.2.2" sectionFormat="of" target="RFC1034"/> says "The administrators of both zones should insure that the NS and glue RRs which mark both sides of the cut are consistent and remain so.".
But for a variety of reasons they could not be <xref target="SOMMESE"/>.
Officially, a child zone's apex NS RRset is authoritative and thus has a higher cache credibility than the parent's delegation NS RRset, which is non-authoritative (Sections <xref target="RFC2181" section="5.4.1" sectionFormat="bare">Ranking data</xref> and <xref target="RFC2181" section="6.1" sectionFormat="bare">Zone authority</xref> of <xref target="RFC2181"/>).
Hence the NS RRset "below the zone cut" should immediately replace the parent's delegating NS RRset in cache when an iterative caching DNS resolver crosses a zone boundary.
However, this can only happen if (1) the resolver receives the authoritative NS RRset in the Authority section of a response from the child zone, which is not mandatory, or (2) if the resolver explicitly issues an NS RRset query to the child zone as part of its iterative resolution algorithm.
In the absence of this, it is possible for an iterative caching resolver to never learn the authoritative NS RRset for a zone, unless a downstream client of the resolver explicitly issues such an NS query, which is not something that normal end user applications do, and thus cannot be relied upon to occur with any regularity.</t>

<t>Increasingly, there is a trend towards minimizing unnecessary data in DNS responses.
Several popular DNS implementations default to such a configuration (see "minimal-responses" in BIND and NSD).
So, they may never include the authoritative NS RRset in the Authority section of their responses.</t>

<t>A common reason that zone owners want to ensure that resolvers place the authoritative NS RRset preferentially in their cache is that the TTLs may differ between the parent and child side of the zone cut.
Some DNS Top Level Domains (TLDs) only support long fixed TTLs in their delegation NS sets.
This inhibits a child zone owner's ability to make more rapid changes to their name server configuration using a shorter TTL, if resolvers have no systematic mechanism to observe and cache the child NS RRset.</t>

<t>Similarly, a child zone owner may also choose to have longer TTLs in their delegation NS sets and address records to decrease the attack window for cache poisoning attacks.
For example, at the time of writing, root-servers.net has a TTL of 6 weeks for the root server identifier address records, where the TTL in the priming response is 6 days.</t>

<t>A zone's delegation still needs to be periodically revalidated at the parent to make sure that the parent zone has not legitimately re-delegated the zone to a different set of name servers, or even removed the delegation.
Otherwise, resolvers that refresh the TTL of a child NS RRset on subsequent queries or due to pre-fetching, may cling to those name servers long after they have been re-delegated elsewhere.
This leads to the second recommendation in this document, "Delegation Revalidation" - Resolvers should record the TTL of the parent's delegating NS RRset, and use it to trigger a revalidation action.
Attacks exploiting lack of this revalidation have been described in <xref target="GHOST1"/>, <xref target="GHOST2"/>.</t>

</section>
<section anchor="upgrade-ns"><name>Upgrading NS RRset Credibility</name>

<t>When a referral response is received during iteration, a validation query <bcp14>SHOULD</bcp14> be sent in parallel with the resolution of the triggering query, to one of the delegated name servers for the newly discovered zone cut.
Note that DNSSEC validating resolvers today, when following a secure referral, already need to dispatch a query to one of the delegated name servers for the DNSKEY RRset, so this validation query could be sent in parallel with that DNSKEY query.</t>

<t>A validation query consists of a query for the child's apex NS RRset, sent to one of the newly discovered delegation's name servers.
Normal iterative logic applies to the processing of responses to validation queries, including storing the results in cache, trying the next server on SERVFAIL or timeout, and so on.
Positive responses to this validation query <bcp14>MAY</bcp14> be cached with an authoritative data ranking.
Successive queries directed to the same zone <bcp14>SHOULD</bcp14> be directed to the nameservers listed in the child's apex, due to the ranking of this answer.
If the validation query fails, the parent NS RRset <bcp14>SHOULD</bcp14> remain the one with the highest ranking and <bcp14>SHOULD</bcp14> be used for successive queries.</t>

<t>A response to the triggering query to the child may contain the NS RRset in the authority section as well.
This NS RRset however has a lower trustworthiness than the set from the direct query (<xref section="5.4.1" sectionFormat="of" target="RFC2181"/>), so regardless of the order in which the responses are received, the NS RRset from the answer section from the direct child's apex NS RRset query <bcp14>MAY</bcp14> be stored in the cache eventually.</t>

<t>When a resolver detects that the child's apex NS RRset contains different name servers than the non-authoritative version at the parent side of the zone cut, it <bcp14>MAY</bcp14> report the mismatch using DNS Error Reporting <xref target="RFC9567"/> on the Report-Channel for the child zone, as well as on the Report-Channel for the parent zone, with an extended DNS error code of TBD (See <xref target="IANA"/>).</t>

<t>A No Data response (see <xref section="2.2" sectionFormat="of" target="RFC2308"/>) for the validating NS query should be treated the same as a failed validating NS query.
The parent NS RRset <bcp14>SHOULD</bcp14> remain the one with the highest ranking and <bcp14>SHOULD</bcp14> be used for successive queries.
All resolution failures <bcp14>MUST</bcp14> be cached as directed in <xref target="RFC9520"/>, to prevent aggressive requeries.</t>

</section>
<section anchor="scoped-upgrading"><name>Limiting upgrading NS Credibility</name>
<t><xref target="upgrade-ns">Upgrading NS RRset Credibility</xref> works most reliable with good quality child NS RRsets, where the name servers referenced in the RDATA of the NS RRset do result in IP addresses which serve the child zone.
We consider both the root, as well as the zones delegated from the root, to have good quality child NS RRset, but recognize that, because of the less transparently administered further delegations (among others by parties that are perhaps less devoted to DNS administration), some of those further delegations may be sub-optimal for upgrading NS RRset credibility..
An implementation <bcp14>MAY</bcp14> limit revalidation to delegations that cross administrative boundaries such as anywhere in ".ip6.arpa" and ".in-addr.arpa" as well as any so-called "public suffix" such as the root zone, top level zones such as ".com" or ".net", and effective top level zones such as ".ad.jp" or ".co.uk".</t>

</section>
<section anchor="upgrade-addresses"><name>Upgrading A and AAAA RRset Credibility</name>

<section anchor="upgrading-glue"><name>Upgrading glue</name>

<t>Additional validation queries for the "glue" address RRs of referral responses (if not already authoritatively present in cache) <bcp14>SHOULD</bcp14> be sent with the validation query for the NS RRset as well.
Positive responses <bcp14>SHOULD</bcp14> be cached with authoritative data ranking.
The non-authoritative "glue" <bcp14>MAY</bcp14> be cached with non-authoritative data ranking for fallback purposes.
Successive queries directed to the same zone <bcp14>SHOULD</bcp14> be directed to the authoritative nameservers denoted in the referral response.</t>

<t>The names from the NS RRset in a validating NS response may differ from the names from the NS RRset in the referral response.
Outstanding validation queries for "glue" address RRs that do not match names in a newly discovered authoritative NS RRset may be discarded, or they may be left running to completion.
Their result <bcp14>MUST</bcp14> no longer be used in queries for the zone.
Outstanding validation queries for "glue" address RRs that do match names in the authoritative NS RRset <bcp14>MUST</bcp14> be left running to completion.
They do not need to be re-queried after reception of the authoritative NS RRset (see <xref target="upgrade-addresses"/>).</t>

<t>Validated "glue" may result in unreachable destinations if they are obtained from poorly managed zones with incorrect address records.
A resolver <bcp14>MAY</bcp14> choose to keep the non-authoritative value for the "glue" next to the preferred authoritative value for fallback purposes.
Such a resolver <bcp14>MAY</bcp14> choose to fallback to use the non-authoritative value as a last resort, but <bcp14>SHOULD</bcp14> do so only if all other authoritative "glue" led to unreachable destinations as well.</t>

</section>
<section anchor="upgrading-additional-address-from-authoritative-ns-responses"><name>Upgrading additional address from authoritative NS responses</name>

<t>Authoritative responses for a zone's NS RRset at the apex can contain nameserver addresses in the Additional section.
An NS RRset validation response is an example of such a response.
A priming response is another example of an authoritative zone's NS RRset response <xref target="RFC8109"/>.</t>

<t>When additional addresses in authoritative NS RRset responses are DNSSEC verifiable (because the complete RRset is included, including a verifiable signature for the RRset) and DNSSEC secure, they <bcp14>MAY</bcp14> be cached authoritatively immediately without additional validation queries.
DNSSEC validation is enough validation in those cases.
Otherwise, the addresses cannot be assumed to be complete or even authoritatively present in the same zone, and additional validation queries <bcp14>SHOULD</bcp14> be made for these addresses.</t>

<t>Note that there may be outstanding address validation queries for the names of the authoritative NS RRset (from referral address validation queries).
In those cases no new validation queries need to be made.</t>

</section>
</section>
<section anchor="strict"><name>Strict and opportunistic revalidation</name>

<section anchor="strictly-revalidating-referrals-and-authoritative-ns-rrset-responses"><name>Strictly revalidating referrals and authoritative NS RRset responses</name>

<t>Resolvers may choose to delay the response to a triggering query until it can be verified that the answer came from a name server listening on an authoritatively acquired address for an authoritatively acquired name.
This would offer the most trustworthy responses with the least risk for forgery or eavesdropping, however without fallback to lower ranked NS RRsets and addresses, there is no failure mitigation and a failed NS RRset validation query, due to a broken child NS RRset or to malfunctioning child zone's authoritative servers, will then lead to a hard failure to query the referred to child zone.</t>

<t>If the resolver chooses to delay the response, and there are no nameserver names in common between the child's apex NS RRset and the parent's delegation NS RRset, then any responses received from sending the triggering query to the parent's delegated nameservers <bcp14>SHOULD</bcp14> be discarded, and this query should be sent again to one of the child's apex nameservers.</t>

<t>It is <bcp14>RECOMMENDED</bcp14>, to scope <strong>strict</strong> upgrading of NS, A and AAAA RRset credibility, to the root zone and zones delegated from the root zone only (see <xref target="scoped-upgrading"/>).</t>

</section>
<section anchor="opportunistic"><name>Opportunistic revalidating referral and authoritative NS RRset responses</name>

<t>In practice, we expect many implementations may answer the triggering query in advance of the validation query for performance reasons.
An additional reason is that there are unfortunately a number of nameservers in the field that (incorrectly) fail to properly answer explicit queries for zone apex NS records, and thus the revalidation logic may need to be applied lazily and opportunistically to deal with them.
In cases where the delegated nameservers respond incorrectly to an NS query, the resolver <bcp14>SHOULD</bcp14> abandon this algorithm for the zone in question and fall back to using only the information from the parent's referral response.</t>

<t>One may consider to only limit <em>strict</em> upgrading of NS, A and AAAA RRset credibility to the root zone and zones delegated from the root zone, and perform <em>opportunistic</em> revalidations for further delegations (see <xref target="scoped-upgrading"/>).</t>

</section>
</section>
<section anchor="revalidation"><name>Delegation Revalidation</name>

<t>The essence of this mechanism is revalidation of all delegation metadata that directly or indirectly supports an owner name in cache.
This requires a cache to remember the delegated name server names for each zone cut as received from the parent (delegating) zone's name servers, and also the TTL of that NS RRset, and the TTL of the associated DS RRset (if seen).</t>

<t>A delegation under revalidation is called a "revalidation point" and is "still valid" if its parent zone's servers still respond to an in-zone question with a referral to the revalidation point, and if that referral overlaps with the previously cached referral by at least one name server name, and the DS RRset (if seen) overlaps the previously cached DS RRset (if also seen) by at least one delegated signer.</t>

<t>If the response is not a referral or refers to a different zone than before, then the shape of the delegation hierarchy has changed.
If the response is a referral to the revalidation point but to a wholly novel NS RRset or a wholly novel DS RRset, then the authority for that zone has changed.
For clarity, this includes transitions between empty and non-empty DS RRsets.</t>

<t>If the shape of the delegation hierarchy or the authority for a zone has been found to change, then currently cached data whose owner names are at or below that revalidation point <bcp14>MUST NOT</bcp14> be used.
Such non-use can be by directed garbage collection or lazy generational garbage collection or some other method befitting the architecture of the cache.
What matters is that the cache behave as though this data was removed.</t>

<t>Since revalidation can discover changes in the shape of the delegation hierarchy it is more efficient to revalidate from the top (root) downward (to the owner name) since an upper level revalidation may obviate lower level revalidations.
What matters is that the supporting chain of delegations from the root to the owner name be demonstrably valid; further specifics are implementation details.</t>

<t>Revalidation <bcp14>MUST</bcp14> be triggered when delegation meta-data has been cached for a period at most exceeding the delegating NS or DS (if seen) RRset TTL.
If the corresponding child zone's apex NS RRset TTL is smaller than the delegating NS RRset TTL, revalidation <bcp14>MUST</bcp14> happen at that interval instead.
However, resolvers <bcp14>SHOULD</bcp14> impose a sensible minimum TTL floor they are willing to endure to avoid potential computational DoS attacks inflicted by zones with very short TTLs.</t>

<t>In normal operations this meta-data can be quickly revalidated with no further work.
However, when re-delegation or take-down occurs, a revalidating cache <bcp14>SHOULD</bcp14> discover this within one delegation TTL period, allowing the rapid expulsion of old data from the cache.</t>

</section>
<section anchor="IANA"><name>IANA Considerations</name>

<t>IANA is requested to assign a value to the "Extended DNS Error Codes" registry <xref target="RFC8914"/>.</t>

<texttable>
      <ttcol align='left'>INFO-CODE</ttcol>
      <ttcol align='left'>Purpose</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>TBD</c>
      <c>referral NS RRset mismatch</c>
      <c>[this document]</c>
</texttable>

</section>
<section anchor="security"><name>Security and Privacy Considerations</name>

<section anchor="impact"><name>DNSSEC protection of infrastructure data</name>

<t>Referral response NS RRsets and glue, and the additional addresses from authoritative NS RRset responses (such as the root priming response), are not protected with DNSSEC signatures.
An attacker that is able to alter the unsigned A and AAAA RRsets in the additional section of referral and authoritative NS RRset responses, can fool a resolver into taking addresses under the control of the attacker to be authoritative for the zone.
Such an attacker can redirect all traffic to the zone (of the referral or authoritative NS RRset response) to a rogue name server.</t>

<t>A rogue name server can view all queries from the resolver to that zone and alter all unsigned parts of responses, such as the parent side NS RRsets and glue of further referral responses.
Resolvers following referrals from a rogue name server, that do not revalidate those referral responses, can subsequently be fooled into taking addresses under the control of the attacker to be authoritative for those delegations as well.
The higher up the DNS tree, the more impact such an attack has.
An attacker controlling a rogue name server for the root has potentially complete control over the entire domain name space and can alter all unsigned parts undetected.</t>

<t>Strictly revalidating referral and authoritative NS RRset responses (see <xref target="strict"/>), enables the resolver to defend itself against the above described attack with DNSSEC signed infrastructure RRsets.
Unlike cache poisoning defences that leverage increase entropy to protect the transaction, revalidation of NS RRsets and addresses also provides protection against on-path attacks.</t>

<t>Since December 6, 2023, the root zone contains a DNSSEC signed cryptographic message digest <xref target="RFC8976"/><xref target="ROOT-ZONEMD"/>, covering all root zone data.
This includes all non-authoritative data such as the A and AAAA RRsets for the IP addresses of the root server identifiers, as well as the NS RRsets and glue that make up the delegations.
A root zone local to the resolver <xref target="RFC8806"/> with a verified and validated ZONEMD RRset, would provide protection similarly strong to strictly revalidating the root and the top level domains.</t>

</section>
<section anchor="cache-poisoning-protection"><name>Cache poisoning protection</name>

<t>In <xref target="DNS-CACHE-INJECTIONS"/> an overview is given of 18 cache poisoning attacks of which 13 can be remedied with delegation revalidation.
The paper provides recommendations for handling records in DNS responses with respect to an earlier version of the idea presented in this document <xref target="I-D.wijngaards-dnsext-resolver-side-mitigation"/>.</t>

<t><xref target="upgrade-ns">Upgrading NS RRset Credibility</xref> allows resolvers to cache and utilize the authoritative child apex NS RRset in preference to the non-authoritative parent NS RRset.
However, it is important to implement the steps described in <xref target="revalidation">Delegation Revalidation</xref> at the expiration of the parent's delegating TTL.
Otherwise, the operator of a malicious child zone, originally delegated to, but subsequently delegated away from, can cause resolvers that refresh TTLs on subsequent NS set queries, or that pre-fetch NS queries, to never learn of the re-delegated zone <xref target="GHOST1"/>, <xref target="GHOST2"/>.</t>

</section>
<section anchor="other-considerations"><name>Other considerations</name>
<t>Some resolvers do not adhere to Sections <xref target="RFC2181" section="5.4.1" sectionFormat="bare"/> and <xref target="RFC2181" section="6.1" sectionFormat="bare"/> of <xref target="RFC2181"/>, and only use the non-authoritative parent side NS RRsets and glue returned in referral responses for contacting authoritative name servers <xref target="I-D.fujiwara-dnsop-resolver-update"/>.
As a consequence, they are not susceptible to many of the cache poisoning attacks enumerated in <xref target="DNS-CACHE-INJECTIONS"/> that are based upon the relative trustworthiness of DNS data.
Such resolvers are also not susceptible to the GHOST domain attacks <xref target="GHOST1"/>, <xref target="GHOST2"/>.
Such resolvers will however never benefit from DNSSEC protection of infrastructure RRsets and are susceptible to query redirection attacks.</t>

<t>Revalidating referral and authoritative NS RRset responses will induce more traffic from the resolver to the authoritative name servers.
The traffic increase may be substantial if the address RRsets for the names in the NS RRset's RDATA were provided non-authoritatively (as glue or as additional addresses) and need revalidation too <xref target="REDIRECTED-QUERY-TRAFFIC"/>.
Resolvers <bcp14>SHOULD</bcp14> take care to limit the amount of work they are willing to do to resolve a query to a sensible amount.</t>

</section>
</section>


  </middle>

  <back>


    <references title='Normative References' anchor="sec-normative-references">

&RFC1034;
&RFC1035;
&RFC2181;
&RFC2308;
&RFC8109;
&RFC8806;
&RFC8914;
&RFC8976;
&RFC9520;
&RFC9567;
&RFC2119;
&RFC8174;


    </references>

    <references title='Informative References' anchor="sec-informative-references">

&I-D.fujiwara-dnsop-resolver-update;
&I-D.vixie-dnsext-resimprove;
&I-D.wijngaards-dnsext-resolver-side-mitigation;
&I-D.ietf-deleg;
<reference anchor="GHOST1" target="https://www.ndss-symposium.org/ndss2012/">
  <front>
    <title>Ghost Domain Names: Revoked Yet Still Resolvable</title>
    <author initials="J." surname="Jiang" fullname="J Jiang">
      <organization></organization>
    </author>
    <author initials="J." surname="Liang" fullname="J Liang">
      <organization></organization>
    </author>
    <author initials="K." surname="Li" fullname="K Li">
      <organization></organization>
    </author>
    <author initials="J." surname="Li" fullname="J Li">
      <organization></organization>
    </author>
    <author initials="H." surname="Duan" fullname="H Duan">
      <organization></organization>
    </author>
    <author initials="J." surname="Wu" fullname="J Wu">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="GHOST2" target="https://www.ndss-symposium.org/ndss-paper/ghost-domain-reloaded-vulnerable-links-in-domain-name-delegation-and-revocation/">
  <front>
    <title>Ghost Domain Reloaded: Vulnerable Links in Domain Name Delegation and Revocation</title>
    <author initials="X." surname="Li" fullname="Xiang Li">
      <organization></organization>
    </author>
    <author initials="B." surname="Liu" fullname="Baojun Liu">
      <organization></organization>
    </author>
    <author initials="X." surname="Bai" fullname="Xuesong Bai">
      <organization></organization>
    </author>
    <author initials="M." surname="Zhang" fullname="Mingming Zhang">
      <organization></organization>
    </author>
    <author initials="Q." surname="Zhang" fullname="Qifan Zhang">
      <organization></organization>
    </author>
    <author initials="Z." surname="Li" fullname="Zhou Li">
      <organization></organization>
    </author>
    <author initials="H." surname="Duan" fullname="Haixin Duan">
      <organization></organization>
    </author>
    <author initials="Q." surname="Li" fullname="Qi Li">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="DNS-CACHE-INJECTIONS" target="https://ieeexplore.ieee.org/abstract/document/8057202">
  <front>
    <title>Internet-Wide Study of DNS Cache Injections</title>
    <author initials="A." surname="Klein" fullname="Amit Klein">
      <organization></organization>
    </author>
    <author initials="H." surname="Shulman" fullname="Haya Shulman">
      <organization></organization>
    </author>
    <author initials="M." surname="Waidner" fullname="Michael Waidner">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="ROOT-ZONEMD" target="https://lists.dns-oarc.net/pipermail/dns-operations/2023-December/022388.html">
  <front>
    <title>Root zone operational announcement: introducing ZONEMD for the root zone</title>
    <author initials="D." surname="Wessels" fullname="Duane Wessels">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="SOMMESE" target="https://par.nsf.gov/servlets/purl/10186683">
  <front>
    <title>When parents and children disagree: Diving into DNS delegation inconsistency</title>
    <author initials="R." surname="Sommese" fullname="Raffaele Sommese">
      <organization></organization>
    </author>
    <author initials="G. C. M." surname="Moura" fullname="Giovane C.M. Moura">
      <organization></organization>
    </author>
    <author initials="M." surname="Jonker" fullname="Mattijs Jonker">
      <organization></organization>
    </author>
    <author initials="R." surname="van Rijswijk-Deij" fullname="Roland van Rijswijk-Deij">
      <organization></organization>
    </author>
    <author initials="A." surname="Dainotti" fullname="Alberto Dainotti">
      <organization></organization>
    </author>
    <author initials="K. C." surname="Claffy" fullname="K.C. Claffy">
      <organization></organization>
    </author>
    <author initials="A." surname="Sperotto" fullname="Anna Sperotto">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="REDIRECTED-QUERY-TRAFFIC" target="https://www.icann.org/en/system/files/files/reduced-risk-redirected-query-traffic-signed-root-name-server-data-22may24-en.pdf#h.8mh7wvmas7vi">
  <front>
    <title>The reduced risk of redirected query traffic with signed root name server data</title>
    <author initials="W." surname="Toorop" fullname="Willem Toorop">
      <organization></organization>
    </author>
    <author initials="Y." surname="Thessalonikefs" fullname="Yorgos Thessalonikefs">
      <organization></organization>
    </author>
    <author initials="B." surname="Overeinder" fullname="Benno Overeinder">
      <organization></organization>
    </author>
    <author initials="M." surname="Müller" asciiSurname="Muller" fullname="Moritz Müller" asciiFullname="Moritz Muller">
      <organization></organization>
    </author>
    <author initials="M." surname="Davids" fullname="Marco Davids">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>


    </references>


<?line 466?>

<section anchor="Acknowledgements"><name>Acknowledgements</name>

<t>Wouter Wijngaards proposed explicitly obtaining authoritative child NS data in <xref target="I-D.wijngaards-dnsext-resolver-side-mitigation"/>.
This behavior has been implemented in the Unbound DNS resolver via the "harden-referral-path" option.
The combination of child NS fetch and revalidating the delegation was originally proposed in <xref target="I-D.vixie-dnsext-resimprove"/>, by Paul Vixie, Rodney Joffe, and Frederico Neves.</t>

<t>The authors would like to thank Ralph Dolmans who was an early collaborator on this work, as well as the many members of the IETF DNS Operations Working Group for helpful comments and discussion.</t>

</section>
<section anchor="implementation-status"><name>Implementation status</name>

<t><strong>Note to the RFC Editor</strong>: please remove this entire appendix before publication.</t>

<t><list style="symbols">
  <t>The Unbound resolver software has opportunistic revalidating of referral and authoritative NS RRset responses, as described in <xref target="upgrade-ns"/>, <xref target="upgrade-addresses"/> and <xref target="opportunistic"/> in this document, implemented since version 1.1 (released August 29, 2008).
It is enabled with a configuration option <spanx style="verb">harden-referral-path: yes</spanx> which is disabled by default.  <vspace blankLines='1'/>
"Redhat Enterprise Linux has been running Unbound with the <spanx style="verb">harden-referral-path:</spanx> option set to <spanx style="verb">yes</spanx> for years without problems", as mentioned by Paul Wouters during dnsop workgroup session at the IETF 119.</t>
  <t>The Knot Resolver software revalidates the priming response as part of priming the root zone since version 1.5.1 (released December 12, 2017)</t>
  <t><xref target="revalidation"/> has been implemented in the Unbound resolver since version 1.4.17 (released May 24, 2012).</t>
</list></t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

