<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.1 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-dnsop-qdcount-is-one-00" category="std" consensus="true" submissionType="IETF" updates="RFC1035" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.1 -->
  <front>
    <title>In the DNS, QDCOUNT is (usually) One</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-dnsop-qdcount-is-one-00"/>
    <author initials="R." surname="Bellis" fullname="Ray Bellis">
      <organization abbrev="ISC">Internet Systems Consortium, Inc.</organization>
      <address>
        <postal>
          <street>PO Box 360</street>
          <city>Newmarket</city>
          <code>NH 03857</code>
          <country>US</country>
        </postal>
        <phone>+1 650 423 1300</phone>
        <email>ray@isc.org</email>
      </address>
    </author>
    <author initials="J." surname="Abley" fullname="Joe Abley">
      <organization>Cloudflare</organization>
      <address>
        <postal>
          <city>Amsterdam</city>
          <country>NL</country>
        </postal>
        <phone>+31 6 45 56 36 34</phone>
        <email>jabley@cloudflare.com</email>
      </address>
    </author>
    <date year="2023" month="October" day="13"/>
    <area>Internet</area>
    <workgroup>DNSOP Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 40?>

<t>This document clarifies the allowable values of the QDCOUNT parameter
in DNS messages with OPCODE = 0 (QUERY) and specifies the required
behaviour when values that are not allowed are encountered.</t>
    </abstract>
  </front>
  <middle>
    <?line 46?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The DNS protocol <xref target="RFC1034"/><xref target="RFC1035"/> includes a parameter
QDCOUNT in the DNS message header, whose value is specified to mean
the number of questions in the Question Section of a message.</t>
      <t>In a general sense it seems perfectly plausible for the QDCOUNT
parameter, an unsigned 16-bit value, to take a considerable range
of values. However, in the specific case of messages that encode
DNS queries and responses (messages with OPCODE = 0) there are other
limitations inherent in the protocol that constrain values of QDCOUNT
to be either 0 or 1. In particular, several parameters specified
for DNS response messages such as AA and RCODE have no defined
meaning when the message contains multiple queries, since there is
no way to signal which question those parameters relate to.</t>
      <t>In this document we briefly survey the existing written DNS
specification; we provide a description of the semantic and practical
requirements for DNS queries that naturally constrain the allowable
values of QDCOUNT; and we update the DNS base specification to
clarify the allowable values of the QDCODE parameter in the specific
case of DNS messages with OPCODE = 0 (QUERY).</t>
    </section>
    <section anchor="terminology-used-in-this-document">
      <name>Terminology used in this document</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY",
and "OPTIONAL" in this document are to be interpreted as described
in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear
in all capitals, as shown here.</t>
    </section>
    <section anchor="qdcount-is-usually-one">
      <name>QDCOUNT is (usually) One</name>
      <t>A brief summary of the guidance provided in the existing DNS
specification for the use of QDCOUNT can be found in <xref target="Survey"/>.
While the specification is clear in many cases, in the specific
case of OPCODE = 0 (QUERY) there is some ambiguity which this
document aims to eliminate.</t>
    </section>
    <section anchor="updates-to-rfc-1035">
      <name>Updates to RFC 1035</name>
      <t>A DNS message with OPCODE = 0 (QUERY) MUST NOT include a QDCOUNT
parameter whose value is greater than 1. It follows that the Question
Section of a DNS message with OPCODE = 0 MUST NOT contain more than
one question.</t>
      <t>A DNS message with OPCODE = 0 (QUERY) and QDCOUNT &gt; 1 MUST be treated
as an incorrectly-formatted message.  The value of the RCODE parameter
in the response message MUST be set to 1 (FORMERR).</t>
      <t>Firewalls that process DNS messages in order to eliminate unwanted
traffic SHOULD treat messages with OPCODE = 0 and QDCOUNT &gt; 1 as
malformed traffic.  See Section 4 of <xref target="RFC8906"/> for further
guidance.  Such firewalls MUST NOT treat messages with OPCODE = 0
and QDCOUNT = 0 as malformed.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document clarifies the DNS specification and aims to improve
interoperability between different DNS implementations. In general,
the elimination of ambiguity seems well-aligned with security
hygiene.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>The clarifications in this document were prompted by questions posed
by Ted Lemon, which reminded the authors of earlier, similar questions
and motivated them to pick up their pens. Ondrej Sury, Warren Kumari,
Peter Thomassen, Mark Andrews, Lars-Johan Liman and Jim Reid provided
useful feedback to early drafts.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC1034" target="https://www.rfc-editor.org/info/rfc1034" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.1034.xml">
          <front>
            <title>Domain names - concepts and facilities</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised basic definition of The Domain Name System. It obsoletes RFC-882. This memo describes the domain style names and their used for host address look up and electronic mail forwarding. It discusses the clients and servers in the domain name system and the protocol used between them.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1034"/>
          <seriesInfo name="DOI" value="10.17487/RFC1034"/>
        </reference>
        <reference anchor="RFC1035" target="https://www.rfc-editor.org/info/rfc1035" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.1035.xml">
          <front>
            <title>Domain names - implementation and specification</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1035"/>
          <seriesInfo name="DOI" value="10.17487/RFC1035"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC3425" target="https://www.rfc-editor.org/info/rfc3425" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3425.xml">
          <front>
            <title>Obsoleting IQUERY</title>
            <author fullname="D. Lawrence" initials="D." surname="Lawrence"/>
            <date month="November" year="2002"/>
            <abstract>
              <t>The IQUERY method of performing inverse DNS lookups, specified in RFC 1035, has not been generally implemented and has usually been operationally disabled where it has been implemented. Both reflect a general view in the community that the concept was unwise and that the widely-used alternate approach of using pointer (PTR) queries and reverse-mapping records is preferable. Consequently, this document deprecates the IQUERY operation, declaring it entirely obsolete. This document updates RFC 1035. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3425"/>
          <seriesInfo name="DOI" value="10.17487/RFC3425"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8906" target="https://www.rfc-editor.org/info/rfc8906" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8906.xml">
          <front>
            <title>A Common Operational Problem in DNS Servers: Failure to Communicate</title>
            <author fullname="M. Andrews" initials="M." surname="Andrews"/>
            <author fullname="R. Bellis" initials="R." surname="Bellis"/>
            <date month="September" year="2020"/>
            <abstract>
              <t>The DNS is a query/response protocol. Failing to respond to queries, or responding incorrectly, causes both immediate operational problems and long-term problems with protocol development.</t>
              <t>This document identifies a number of common kinds of queries to which some servers either fail to respond or respond incorrectly. This document also suggests procedures for zone operators to apply to identify and remediate the problem.</t>
              <t>The document does not look at the DNS data itself, just the structure of the responses.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="231"/>
          <seriesInfo name="RFC" value="8906"/>
          <seriesInfo name="DOI" value="10.17487/RFC8906"/>
        </reference>
        <reference anchor="RFC7873" target="https://www.rfc-editor.org/info/rfc7873" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7873.xml">
          <front>
            <title>Domain Name System (DNS) Cookies</title>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
            <author fullname="M. Andrews" initials="M." surname="Andrews"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>DNS Cookies are a lightweight DNS transaction security mechanism that provides limited protection to DNS servers and clients against a variety of increasingly common denial-of-service and amplification/ forgery or cache poisoning attacks by off-path attackers. DNS Cookies are tolerant of NAT, NAT-PT (Network Address Translation - Protocol Translation), and anycast and can be incrementally deployed. (Since DNS Cookies are only returned to the IP address from which they were originally received, they cannot be used to generally track Internet users.)</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7873"/>
          <seriesInfo name="DOI" value="10.17487/RFC7873"/>
        </reference>
        <reference anchor="RFC1996" target="https://www.rfc-editor.org/info/rfc1996" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.1996.xml">
          <front>
            <title>A Mechanism for Prompt Notification of Zone Changes (DNS NOTIFY)</title>
            <author fullname="P. Vixie" initials="P." surname="Vixie"/>
            <date month="August" year="1996"/>
            <abstract>
              <t>This memo describes the NOTIFY opcode for DNS, by which a master server advises a set of slave servers that the master's data has been changed and that a query should be initiated to discover the new data. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1996"/>
          <seriesInfo name="DOI" value="10.17487/RFC1996"/>
        </reference>
        <reference anchor="RFC2136" target="https://www.rfc-editor.org/info/rfc2136" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2136.xml">
          <front>
            <title>Dynamic Updates in the Domain Name System (DNS UPDATE)</title>
            <author fullname="P. Vixie" initials="P." role="editor" surname="Vixie"/>
            <author fullname="S. Thomson" initials="S." surname="Thomson"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <author fullname="J. Bound" initials="J." surname="Bound"/>
            <date month="April" year="1997"/>
            <abstract>
              <t>Using this specification of the UPDATE opcode, it is possible to add or delete RRs or RRsets from a specified zone. Prerequisites are specified separately from update operations, and can specify a dependency upon either the previous existence or nonexistence of an RRset, or the existence of a single RR. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2136"/>
          <seriesInfo name="DOI" value="10.17487/RFC2136"/>
        </reference>
        <reference anchor="RFC8490" target="https://www.rfc-editor.org/info/rfc8490" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8490.xml">
          <front>
            <title>DNS Stateful Operations</title>
            <author fullname="R. Bellis" initials="R." surname="Bellis"/>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <author fullname="J. Dickinson" initials="J." surname="Dickinson"/>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="T. Lemon" initials="T." surname="Lemon"/>
            <author fullname="T. Pusateri" initials="T." surname="Pusateri"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>This document defines a new DNS OPCODE for DNS Stateful Operations (DSO). DSO messages communicate operations within persistent stateful sessions using Type Length Value (TLV) syntax. Three TLVs are defined that manage session timeouts, termination, and encryption padding, and a framework is defined for extensions to enable new stateful operations. This document updates RFC 1035 by adding a new DNS header OPCODE that has both different message semantics and a new result code. This document updates RFC 7766 by redefining a session, providing new guidance on connection reuse, and providing a new mechanism for handling session idle timeouts.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8490"/>
          <seriesInfo name="DOI" value="10.17487/RFC8490"/>
        </reference>
      </references>
    </references>
    <?line 123?>

<section anchor="Survey">
      <name>Guidance for the use of QDCOUNT in the DNS Specification</name>
      <t>The DNS Specification provides some guidance about the values of
QDCOUNT that are appropriate in various situations. A brief summary
of this guidance is collated below.</t>
      <section anchor="opcode-0-query-and-1-iquery">
        <name>OPCODE = 0 (QUERY) and 1 (IQUERY)</name>
        <t><xref target="RFC1035"/> significantly predates the use of normative requirements
keywords, and parts of it are consequently somewhat open to
interpretation.</t>
        <t>Section 4.1.2 ("Question section format") has this to say about
QDCOUNT:</t>
        <ul empty="true">
          <li>
            <t>The section contains QDCOUNT (usually 1) entries</t>
          </li>
        </ul>
        <t>The only documented exceptions within <xref target="RFC1035"/> relate to the
IQuery Opcode, where the request has "an empty question section"
(QDCOUNT = 0), and "zero, one, or multiple domain names for the
specified resource as QNAMEs in the question section". The IQuery
OpCode was made obsolete in <xref target="RFC3425"/>.</t>
        <t>In the absence of clearly expressed normative requirements, we rely
on other text in <xref target="RFC1035"/> that makes use of the definite article
or other text that implies a singular question and, by implication,
QDCOUNT = 1.</t>
        <t>For example, Section 4.1:</t>
        <ul empty="true">
          <li>
            <t>the question for the name server</t>
          </li>
        </ul>
        <t>and:</t>
        <ul empty="true">
          <li>
            <t>The question section contains fields that describe a question to a
name server</t>
          </li>
        </ul>
        <t>and in Section 4.1.1. ("Header section format"):</t>
        <ul empty="true">
          <li>
            <t>AA Authoritative Answer - this bit is valid in responses,
   and specifies that the responding name server is an
   authority for the domain name in question section.</t>
          </li>
        </ul>
        <t>DNS Cookies <xref target="RFC7873"/> in Section 5.4 allow a client to receive
a valid Server Cookie without sending a specific question by sending
a Query packet (OpCode 0) with QDCOUNT = 0, with the resulting
response also containing no question.</t>
      </section>
      <section anchor="opcode-4-notify">
        <name>OPCODE = 4 (NOTIFY)</name>
        <t>DNS Notify <xref target="RFC1996"/> also lacks a clearly defined range of values
for QDCOUNT.  Section 3.7 says:</t>
        <ul empty="true">
          <li>
            <t>A NOTIFY request has QDCOUNT &gt; 0</t>
          </li>
        </ul>
        <t>but all other text in the RFC talks about the &lt;QNAME, QCLASS, QTYPE&gt;
tuple in the singular.</t>
      </section>
      <section anchor="opcode-5-update">
        <name>OPCODE = 5 (UPDATE)</name>
        <t>DNS Update <xref target="RFC2136"/> renames the QDCOUNT field to ZOCOUNT, but
the value is constrained to be one by Section 2.3 ("Zone Section"):</t>
        <ul empty="true">
          <li>
            <t>All records to be updated must be in the same zone, and therefore the
Zone Section is allowed to contain exactly one record.</t>
          </li>
        </ul>
      </section>
      <section anchor="opcode-6-dns-stateful-operations-dso">
        <name>OPCODE = 6 (DNS Stateful Operations, DSO)</name>
        <t>DNS Stateful Operations <xref target="RFC8490"/> (DSO - OpCode 6) attempts to
preserve compatibility with the standard DNS 12 octet header, and
does so by requiring that all four of the section count values be
set to zero.</t>
      </section>
      <section anchor="conclusion">
        <name>Conclusion</name>
        <t>There is no text in <xref target="RFC1035"/> that describes how other parameters
in the DNS message such as AA, RCODE should be interpreted in the
case where a message includes more than one question. An originator
of a query with QDCOUNT &gt; 1 can have no expectations of how it will
be processed, and the receiver of a response with QDCOUNT &gt; 1 has
no guidance for how it should be interpreted.</t>
        <t>The allowable values of QDCOUNT seem to be clearly specified for
OPCODE = 4 (NOTIFY), OPCODE = 5 (UPDATE) and OPCODE = 6 (DNS Stateful
Operations, DSO). OPCODE = 1 (IQUERY) is obsolete and OPCODE = 2
(STATUS) is not specified. OPCODE = 3 is reserved.</t>
        <t>However, the allowable values of QDCOUNT for OPCODE = 0 (QUERY) are
specified in <xref target="RFC1035"/> without the clarity of normative language,
and this looseness of language results in some ambiguity.</t>
      </section>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
