<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.1 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-dnsop-qdcount-is-one-01" category="std" consensus="true" submissionType="IETF" updates="RFC1035" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.1 -->
  <front>
    <title>In the DNS, QDCOUNT is (usually) One</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-dnsop-qdcount-is-one-01"/>
    <author initials="R." surname="Bellis" fullname="Ray Bellis">
      <organization abbrev="ISC">Internet Systems Consortium, Inc.</organization>
      <address>
        <postal>
          <street>PO Box 360</street>
          <city>Newmarket</city>
          <code>NH 03857</code>
          <country>US</country>
        </postal>
        <phone>+1 650 423 1300</phone>
        <email>ray@isc.org</email>
      </address>
    </author>
    <author initials="J." surname="Abley" fullname="Joe Abley">
      <organization>Cloudflare</organization>
      <address>
        <postal>
          <city>Amsterdam</city>
          <country>NL</country>
        </postal>
        <phone>+31 6 45 56 36 34</phone>
        <email>jabley@cloudflare.com</email>
      </address>
    </author>
    <date year="2023" month="October" day="23"/>
    <area>Internet</area>
    <workgroup>DNSOP Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 40?>

<t>This document clarifies the allowable values of the QDCOUNT parameter
in DNS messages with OPCODE = 0 (QUERY) and specifies the required
behaviour when values that are not allowed are encountered.</t>
    </abstract>
  </front>
  <middle>
    <?line 46?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The DNS protocol <xref target="RFC1034"/><xref target="RFC1035"/> includes a parameter
QDCOUNT in the DNS message header, whose value is specified to mean
the number of questions in the Question Section of a message.</t>
      <t>In a general sense it seems perfectly plausible for the QDCOUNT
parameter, an unsigned 16-bit value, to take a considerable range
of values. However, in the specific case of messages that encode
DNS queries and responses (messages with OPCODE = 0) there are other
limitations inherent in the protocol that constrain values of QDCOUNT
to be either 0 or 1. In particular, several parameters specified
for DNS response messages such as AA and RCODE have no defined
meaning when the message contains multiple queries, since there is
no way to signal which question those parameters relate to.</t>
      <t>In this document we briefly survey the existing written DNS
specification; we provide a description of the semantic and practical
requirements for DNS queries that naturally constrain the allowable
values of QDCOUNT; and we update the DNS base specification to
clarify the allowable values of the QDCODE parameter in the specific
case of DNS messages with OPCODE = 0 (QUERY).</t>
    </section>
    <section anchor="terminology-used-in-this-document">
      <name>Terminology used in this document</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY",
and "OPTIONAL" in this document are to be interpreted as described
in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear
in all capitals, as shown here.</t>
    </section>
    <section anchor="qdcount-is-usually-one">
      <name>QDCOUNT is (usually) One</name>
      <t>A brief summary of the guidance provided in the existing DNS
specification for the use of QDCOUNT can be found in <xref target="Survey"/>.
While the specification is clear in many cases, in the specific
case of OPCODE = 0 (QUERY) there is some ambiguity which this
document aims to eliminate.</t>
    </section>
    <section anchor="updates-to-rfc-1035">
      <name>Updates to RFC 1035</name>
      <t>A DNS message with OPCODE = 0 (QUERY) MUST NOT include a QDCOUNT
parameter whose value is greater than 1. It follows that the Question
Section of a DNS message with OPCODE = 0 MUST NOT contain more than
one question.</t>
      <t>A DNS message with OPCODE = 0 (QUERY) and QDCOUNT &gt; 1 MUST be treated
as an incorrectly-formatted message.  The value of the RCODE parameter
in the response message MUST be set to 1 (FORMERR).</t>
      <t>Firewalls that process DNS messages in order to eliminate unwanted
traffic SHOULD treat messages with OPCODE = 0 and QDCOUNT &gt; 1 as
malformed traffic and return a FORMERR response as described above.
Such firewalls MUST NOT treat messages with OPCODE = 0 and QDCOUNT = 0
as malformed.  See Section 4 of <xref target="RFC8906"/> for further guidance.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document clarifies the DNS specification and aims to improve
interoperability between different DNS implementations. In general,
the elimination of ambiguity seems well-aligned with security
hygiene.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>The clarifications in this document were prompted by questions posed
by Ted Lemon, which reminded the authors of earlier, similar questions
and motivated them to pick up their pens. Ondrej Sury, Warren Kumari,
Peter Thomassen, Mark Andrews, Lars-Johan Liman and Jim Reid provided
useful feedback to early drafts.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC1034" target="https://www.rfc-editor.org/info/rfc1034" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.1034.xml">
          <front>
            <title>Domain names - concepts and facilities</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised basic definition of The Domain Name System. It obsoletes RFC-882. This memo describes the domain style names and their used for host address look up and electronic mail forwarding. It discusses the clients and servers in the domain name system and the protocol used between them.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1034"/>
          <seriesInfo name="DOI" value="10.17487/RFC1034"/>
        </reference>
        <reference anchor="RFC1035" target="https://www.rfc-editor.org/info/rfc1035" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.1035.xml">
          <front>
            <title>Domain names - implementation and specification</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1035"/>
          <seriesInfo name="DOI" value="10.17487/RFC1035"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC3425" target="https://www.rfc-editor.org/info/rfc3425" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3425.xml">
          <front>
            <title>Obsoleting IQUERY</title>
            <author fullname="D. Lawrence" initials="D." surname="Lawrence"/>
            <date month="November" year="2002"/>
            <abstract>
              <t>The IQUERY method of performing inverse DNS lookups, specified in RFC 1035, has not been generally implemented and has usually been operationally disabled where it has been implemented. Both reflect a general view in the community that the concept was unwise and that the widely-used alternate approach of using pointer (PTR) queries and reverse-mapping records is preferable. Consequently, this document deprecates the IQUERY operation, declaring it entirely obsolete. This document updates RFC 1035. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3425"/>
          <seriesInfo name="DOI" value="10.17487/RFC3425"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8906" target="https://www.rfc-editor.org/info/rfc8906" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8906.xml">
          <front>
            <title>A Common Operational Problem in DNS Servers: Failure to Communicate</title>
            <author fullname="M. Andrews" initials="M." surname="Andrews"/>
            <author fullname="R. Bellis" initials="R." surname="Bellis"/>
            <date month="September" year="2020"/>
            <abstract>
              <t>The DNS is a query/response protocol. Failing to respond to queries, or responding incorrectly, causes both immediate operational problems and long-term problems with protocol development.</t>
              <t>This document identifies a number of common kinds of queries to which some servers either fail to respond or respond incorrectly. This document also suggests procedures for zone operators to apply to identify and remediate the problem.</t>
              <t>The document does not look at the DNS data itself, just the structure of the responses.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="231"/>
          <seriesInfo name="RFC" value="8906"/>
          <seriesInfo name="DOI" value="10.17487/RFC8906"/>
        </reference>
        <reference anchor="RFC7873" target="https://www.rfc-editor.org/info/rfc7873" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7873.xml">
          <front>
            <title>Domain Name System (DNS) Cookies</title>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
            <author fullname="M. Andrews" initials="M." surname="Andrews"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>DNS Cookies are a lightweight DNS transaction security mechanism that provides limited protection to DNS servers and clients against a variety of increasingly common denial-of-service and amplification/ forgery or cache poisoning attacks by off-path attackers. DNS Cookies are tolerant of NAT, NAT-PT (Network Address Translation - Protocol Translation), and anycast and can be incrementally deployed. (Since DNS Cookies are only returned to the IP address from which they were originally received, they cannot be used to generally track Internet users.)</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7873"/>
          <seriesInfo name="DOI" value="10.17487/RFC7873"/>
        </reference>
        <reference anchor="RFC1996" target="https://www.rfc-editor.org/info/rfc1996" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.1996.xml">
          <front>
            <title>A Mechanism for Prompt Notification of Zone Changes (DNS NOTIFY)</title>
            <author fullname="P. Vixie" initials="P." surname="Vixie"/>
            <date month="August" year="1996"/>
            <abstract>
              <t>This memo describes the NOTIFY opcode for DNS, by which a master server advises a set of slave servers that the master's data has been changed and that a query should be initiated to discover the new data. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1996"/>
          <seriesInfo name="DOI" value="10.17487/RFC1996"/>
        </reference>
        <reference anchor="RFC2136" target="https://www.rfc-editor.org/info/rfc2136" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2136.xml">
          <front>
            <title>Dynamic Updates in the Domain Name System (DNS UPDATE)</title>
            <author fullname="P. Vixie" initials="P." role="editor" surname="Vixie"/>
            <author fullname="S. Thomson" initials="S." surname="Thomson"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <author fullname="J. Bound" initials="J." surname="Bound"/>
            <date month="April" year="1997"/>
            <abstract>
              <t>Using this specification of the UPDATE opcode, it is possible to add or delete RRs or RRsets from a specified zone. Prerequisites are specified separately from update operations, and can specify a dependency upon either the previous existence or nonexistence of an RRset, or the existence of a single RR. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2136"/>
          <seriesInfo name="DOI" value="10.17487/RFC2136"/>
        </reference>
        <reference anchor="RFC8490" target="https://www.rfc-editor.org/info/rfc8490" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8490.xml">
          <front>
            <title>DNS Stateful Operations</title>
            <author fullname="R. Bellis" initials="R." surname="Bellis"/>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <author fullname="J. Dickinson" initials="J." surname="Dickinson"/>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="T. Lemon" initials="T." surname="Lemon"/>
            <author fullname="T. Pusateri" initials="T." surname="Pusateri"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>This document defines a new DNS OPCODE for DNS Stateful Operations (DSO). DSO messages communicate operations within persistent stateful sessions using Type Length Value (TLV) syntax. Three TLVs are defined that manage session timeouts, termination, and encryption padding, and a framework is defined for extensions to enable new stateful operations. This document updates RFC 1035 by adding a new DNS header OPCODE that has both different message semantics and a new result code. This document updates RFC 7766 by redefining a session, providing new guidance on connection reuse, and providing a new mechanism for handling session idle timeouts.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8490"/>
          <seriesInfo name="DOI" value="10.17487/RFC8490"/>
        </reference>
      </references>
    </references>
    <?line 123?>

<section anchor="Survey">
      <name>Guidance for the use of QDCOUNT in the DNS Specification</name>
      <t>The DNS Specification provides some guidance about the values of
QDCOUNT that are appropriate in various situations. A brief summary
of this guidance is collated below.</t>
      <section anchor="opcode-0-query-and-1-iquery">
        <name>OPCODE = 0 (QUERY) and 1 (IQUERY)</name>
        <t><xref target="RFC1035"/> significantly predates the use of normative requirements
keywords, and parts of it are consequently somewhat open to
interpretation.</t>
        <t>Section 4.1.2 ("Question section format") has this to say about
QDCOUNT:</t>
        <ul empty="true">
          <li>
            <t>The section contains QDCOUNT (usually 1) entries</t>
          </li>
        </ul>
        <t>The only documented exceptions within <xref target="RFC1035"/> relate to the
IQuery Opcode, where the request has "an empty question section"
(QDCOUNT = 0), and "zero, one, or multiple domain names for the
specified resource as QNAMEs in the question section". The IQuery
OpCode was made obsolete in <xref target="RFC3425"/>.</t>
        <t>In the absence of clearly expressed normative requirements, we rely
on other text in <xref target="RFC1035"/> that makes use of the definite article
or other text that implies a singular question and, by implication,
QDCOUNT = 1.</t>
        <t>For example, Section 4.1:</t>
        <ul empty="true">
          <li>
            <t>the question for the name server</t>
          </li>
        </ul>
        <t>and:</t>
        <ul empty="true">
          <li>
            <t>The question section contains fields that describe a question to a
name server</t>
          </li>
        </ul>
        <t>and in Section 4.1.1. ("Header section format"):</t>
        <ul empty="true">
          <li>
            <t>AA Authoritative Answer - this bit is valid in responses,
   and specifies that the responding name server is an
   authority for the domain name in question section.</t>
          </li>
        </ul>
        <t>DNS Cookies <xref target="RFC7873"/> in Section 5.4 allow a client to receive
a valid Server Cookie without sending a specific question by sending
a Query packet (OpCode 0) with QDCOUNT = 0, with the resulting
response also containing no question.</t>
      </section>
      <section anchor="opcode-4-notify">
        <name>OPCODE = 4 (NOTIFY)</name>
        <t>DNS Notify <xref target="RFC1996"/> also lacks a clearly defined range of values
for QDCOUNT.  Section 3.7 says:</t>
        <ul empty="true">
          <li>
            <t>A NOTIFY request has QDCOUNT &gt; 0</t>
          </li>
        </ul>
        <t>but all other text in the RFC talks about the &lt;QNAME, QCLASS, QTYPE&gt;
tuple in the singular.</t>
      </section>
      <section anchor="opcode-5-update">
        <name>OPCODE = 5 (UPDATE)</name>
        <t>DNS Update <xref target="RFC2136"/> renames the QDCOUNT field to ZOCOUNT, but
the value is constrained to be one by Section 2.3 ("Zone Section"):</t>
        <ul empty="true">
          <li>
            <t>All records to be updated must be in the same zone, and therefore the
Zone Section is allowed to contain exactly one record.</t>
          </li>
        </ul>
      </section>
      <section anchor="opcode-6-dns-stateful-operations-dso">
        <name>OPCODE = 6 (DNS Stateful Operations, DSO)</name>
        <t>DNS Stateful Operations <xref target="RFC8490"/> (DSO - OpCode 6) attempts to
preserve compatibility with the standard DNS 12 octet header, and
does so by requiring that all four of the section count values be
set to zero.</t>
      </section>
      <section anchor="conclusion">
        <name>Conclusion</name>
        <t>There is no text in <xref target="RFC1035"/> that describes how other parameters
in the DNS message such as AA, RCODE should be interpreted in the
case where a message includes more than one question. An originator
of a query with QDCOUNT &gt; 1 can have no expectations of how it will
be processed, and the receiver of a response with QDCOUNT &gt; 1 has
no guidance for how it should be interpreted.</t>
        <t>The allowable values of QDCOUNT seem to be clearly specified for
OPCODE = 4 (NOTIFY), OPCODE = 5 (UPDATE) and OPCODE = 6 (DNS Stateful
Operations, DSO). OPCODE = 1 (IQUERY) is obsolete and OPCODE = 2
(STATUS) is not specified. OPCODE = 3 is reserved.</t>
        <t>However, the allowable values of QDCOUNT for OPCODE = 0 (QUERY) are
specified in <xref target="RFC1035"/> without the clarity of normative language,
and this looseness of language results in some ambiguity.</t>
      </section>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
