<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-jabley-dnsop-zone-cut-to-nowhere-00" category="std" consensus="true" submissionType="IETF" updates="RFC1035" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.1 -->
  <front>
    <title>Signalling a Zone Cut to Nowhere in the DNS</title>
    <seriesInfo name="Internet-Draft" value="draft-jabley-dnsop-zone-cut-to-nowhere-00"/>
    <author fullname="Joe Abley">
      <organization>Cloudflare</organization>
      <address>
        <email>jabley@cloudflare.com</email>
      </address>
    </author>
    <author fullname="Wes Hardaker">
      <organization>USC/ISI</organization>
      <address>
        <email>ietf@hardakers.net</email>
      </address>
    </author>
    <author fullname="Warren Kumari">
      <organization>Google, Inc.</organization>
      <address>
        <email>warren@kumari.net</email>
      </address>
    </author>
    <date year="2025" month="June" day="17"/>
    <area>Operations and Management</area>
    <workgroup>Domain Name System Operations</workgroup>
    <keyword>DNS</keyword>
    <keyword>DNSSEC</keyword>
    <keyword>zone cut</keyword>
    <keyword>delegation</keyword>
    <keyword>referral</keyword>
    <abstract>
      <?line 64?>

<t>This document defines a standard means to signal that a zone cut
exists in the DNS without specifying a set of nameservers to which
a child zone is delegated. This is useful in situations where it
is important to make it clear to clients that a zone cut exists,
but when the child zone is only provisioned in a private namespace.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://ableyjoe.github.io/draft-jabley-dnsop-zone-cut-to-nowhere/draft-jabley-dnsop-zone-cut-to-nowhere.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-jabley-dnsop-zone-cut-to-nowhere/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Domain Name System Operations Working Group mailing list (<eref target="mailto:dnsop@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/dnsop/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/dnsop/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ableyjoe/draft-jabley-dnsop-zone-cut-to-nowhere"/>.</t>
    </note>
  </front>
  <middle>
    <?line 73?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The DNS protocol, as originally specified in <xref target="RFC1034"/> and
<xref target="RFC1035"/>, describes a single, global, hierarchical namespace
that is separated into zones. The boundary between a parent zone
and a child zone is indicated using a zone cut. Zone cuts are
specified using specific resource records which are published within
the parent and child zones; the parent-side resource records are
revealed during DNS resolution by way of referral responses from
nameservers.</t>
      <t>Private DNS namespaces also exist. A user of a private network might
be able to resolve names using local DNS infrastructure that are
not visible to other users of other networks. This is often an
intentional and deliberate configuration by network operators, for
example to provide name resolution for internal, private services
that are not available to users of other networks.</t>
      <t>When a device or application uses the DNS protocol to resolve both
internal names and external names published in the global DNS
namespace, ambiguity can result. For example, DNS responses from
Internet-reachable nameservers might indicate that a particular
name published in an internal namespace does not exist, while an
internal nameserver might be configured to respond differently.
Since mobile devices can attach to different networks and can cache
DNS responses obtained from different namespaces, this ambiguity
can cause headaches. A DNSSEC-aware resolver on a mobile device
might cache a signed, negative response from an external nameserver
for a particular name and might treat a subsequent, positive response
from an internal nameserver for the same name as bogus, preventing
the response from being used by an application.</t>
      <t>This document provides a means of signalling the existence of a
zone cut in a namespace in circumstances where the child zone only
exists in a different namespace from the parent. We refer to this
type of zone cut as a "zone cut to nowhere" and introduce the
corresponding terms "delegation to nowhere" and "referral to nowhere"
in <xref target="definitions"/>.</t>
    </section>
    <section anchor="definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document uses DNS terminology as described in <xref target="RFC9499"/>.
Familiarity with terms defined in that document is assumed.</t>
      <t>This document also uses the following new terms:</t>
      <ol spacing="normal" type="1"><li>
          <t>"Zone cut to nowhere" -- a zone cut where the parent zone
and the child zone are provisioned in different namespaces. A zone
cut to nowhere is a signal provided by the administrator of a parent
zone that a child zone exists, but is not able to be used in the
DNS namespace of the parent.</t>
        </li>
        <li>
          <t>"Delegation to nowhere" -- a delegation from a parent to
a child across a zone cut to nowhere.</t>
        </li>
        <li>
          <t>"Referral to nowhere", "Referral response to nowhere" -- a DNS
response received from a nameserver that reveals the existence
of a delegation to nowhere.</t>
        </li>
      </ol>
    </section>
    <section anchor="publishing-a-delegation-to-nowhere">
      <name>Publishing a Delegation to Nowhere</name>
      <t>A zone cut to nowhere is implemented in a parent zone using a single
NS resource record with an empty target (an empty NSDNAME, in the
parlance of <xref target="RFC1035"/>). A zone cut to nowhere between the parent
zone <tt>EXAMPLE.ORG</tt> and the child zone <tt>DUCKLING.EXAMPLE.ORG</tt> with
a TTL of 3600 seconds would be described in zone file syntax as
follows:</t>
      <artwork><![CDATA[
        ; zone data published in an external nameserver

        $ORIGIN EXAMPLE.ORG.

        ; the zone DUCKLING.EXAMPLE.ORG exists, but in another
        ; namespace

        DUCKLING  3600  IN  NS  .
]]></artwork>
      <t>A zone cut to nowhere may also be provisioned as a secure delegation.
This allows a DNSSEC-aware consumer of a referral response to obtain
and cache a DNSSEC trust anchor for the child zone, for use when
it is able to receive a signed response from a nameserver that
includes the child zone in its namespace.</t>
      <artwork><![CDATA[
        $ORIGIN EXAMPLE.ORG.

        ; the signed zone PUPPY.EXAMPLE.ORG exists,
        ; but in another namespace

        PUPPY  3600  IN  DS  [...]
                         NS  .
]]></artwork>
      <t>An NS RRSet in a parent zone which includes multiple NS resource
records is not a delegation to nowhere, even if one of the NS
resource records within the RRSet has an empty target.</t>
      <artwork><![CDATA[
        KITTEN  3600  IN  NS  A.CAT-SERVERS.EXAMPLE.
                          NS  B.CAT-SERVERS.EXAMPLE.
                          NS  .                        ; unusual
                          NS  C.CAT-SERVERS.EXAMPLE.
]]></artwork>
      <t>This NS RRSet does not encode a delegation to nowhere, since other
NS resource records exist in addition to the record with the empty
target (marked with a comment as "unusual"). This configuration may
have some other meaning in a different context, however, and is
specifically not addressed by this specification.</t>
    </section>
    <section anchor="interpreting-a-referral-to-nowhere">
      <name>Interpreting a Referral to Nowhere</name>
      <t>No special processing is necessary in order to interpret a referral
response to nowhere.  Individual RRSets present in a referral
response to nowhere can safely be interpreted and processed in an
identical fashion to any other referral response where the authoritative
servers for the child zone cannot themselves be resolved, and hence
cannot be reached.</t>
    </section>
    <section anchor="applicability">
      <name>Applicability</name>
      <t>When a child zone is known to exist in another namespace, and when
that other namespace is intended for use with the DNS, a delegation
to nowhere <bcp14>MAY</bcp14> be provisioned in the parent zone to signal that the
child zone exists in some other namespace. In such circumstances
the parent zone <bcp14>MAY</bcp14> be the root zone, or any other zone.</t>
      <t>A secure delegation to nowhere <bcp14>MAY</bcp14> be provisioned if the keys used
for signing in the child zone are known to the administrator of the
parent zone. In the case where differently-signed (or unsigned)
child zones are known to exist in different namespaces, a secure
delegation <bcp14>SHOULD NOT</bcp14> be used.</t>
      <t>The use of a delegation to nowhere in this document is described
for the IN class only. Use of this mechanism in other classes is
not addressed by this specification.</t>
      <t>Name resolution protocols other than the DNS are also used by some
systems, for names that are syntactically equivalent to domain names
in the DNS. In some cases, names resolved by those non-DNS protocols
are anchored in a specific domain that is consequently reserved for
their use in the DNS, to avoid name collisions.  Examples of such
reservations in the DNS are the <tt>LOCAL</tt> top-level domain reserved
for use by Multicast DNS <xref target="RFC6762"/> and the <tt>ALT</tt> top-level domain
reserved use in general for non-DNS resolution protocols <xref target="RFC9476"/>.
Domains that are not intended for use with the DNS as their resolution
protocol <bcp14>SHOULD NOT</bcp14> be provisioned in the DNS as delegations to
nowhere, since there is no DNS namespace ambiguity that such a
configuration could help with.</t>
    </section>
    <section anchor="examples">
      <name>Examples</name>
      <section anchor="internal-namespace-as-a-subdomain-of-a-public-domain">
        <name>Internal Namespace as a Subdomain of a Public Domain</name>
        <t>A company uses names within the <tt>EXAMPLE.COM</tt> domain both for
internal services it provides to its employees and for public
services that are made available to the general public over the
Internet.</t>
        <t>The company also provides certain services that are only available
to users of devices attached to its internal network. Those services
are named within the subdomain <tt>CORP.EXAMPLE.COM</tt>. The company does
not wish those internal services to be visible to external users.</t>
        <t>We say that the <tt>EXAMPLE.COM</tt> zone exists in the global DNS namespace
and that the <tt>CORP.EXAMPLE.COM</tt> zone exists only in a private DNS
namespace.</t>
        <t>The company publishes a <tt>CORP.EXAMPLE.COM</tt> zone on DNS nameservers
attached to its internal network. The company configures the DNS
resolvers used by devices attached to its internal network to be
aware that the <tt>CORP.EXAMPLE.COM</tt> zone is served by those internal
nameservers, such that queries sent from devices inside the company's
network can resolve names in the <tt>CORP.EXAMPLE.COM</tt> domain.</t>
        <artwork><![CDATA[
        $ORIGIN CORP.EXAMPLE.COM.
        ; internal zone only served in our internal network

        @      3600  IN  SOA   [...]

        ; the internal zone CORP.EXAMPLE.COM is served by the internal
        ; nameservers NS1.CORP.EXAMPLE.COM and NS2.CORP.EXAMPLE.COM

                     NS    NS1
                     NS    NS2

        NS1          A     198.51.100.37
                     AAAA  2001:db8:2:1::2c

        NS2          A     203.0.113.56
        NS2          AAAA  2001:db8:2:3::2d

        ; the internal intranet web server is INTRANET.CORP.EXAMPLE.COM

        INTRANET     A     198.51.100.74
                     AAAA  2001:db8:2:1::f8

        ; the management address of an internal network device known
        ; as BACKBONE-SW.CORP.EXAMPLE.COM

        BACKBONE-SW  A     198.51.100.65
]]></artwork>
        <t>The company publishes an <tt>EXAMPLE.COM</tt> zone on nameservers that are
general reachable over the Internet -- that is, the nameservers are
reachable and the <tt>COM</tt> zone returns referrals for the <tt>EXAMPLE.COM</tt>
zone to those nameservers. The EXAMPLE.COM zone includes names that
the company wants clients to be able to resolve regardless of what
network they are connected to.</t>
        <artwork><![CDATA[
        $ORIGIN EXAMPLE.COM.

        ; the public zone EXAMPLE.COM is published to the Internet

        @      3600  IN  SOA   [...]

        ; the public zone EXAMPLE.COM is served by the nameservers
        ; NS1.EXAMPLE.COM and NS2.EXAMPLE.COM which are reachable
        ; over the Internet

                     NS    NS1
                     NS    NS2

        ; Internet mail for EXAMPLE.COM is handled by the server
        ; MAIL.EXAMPLE.COM

                     MX    10 MAIL.EXAMPLE.COM.

        ; The public nameservers NS1.EXAMPLE.COM and NS2.EXAMPLE.COM

        NS1          A     192.0.2.25
        NS1          AAAA  2001:db8:e0::2a

        NS2          A     192.0.2.27
        NS2          AAAA  2001:db8:e0::2b

        ; MAIL.EXAMPLE.COM and WWW.EXAMPLE.COM are intended to be used
        ; from anywhere, not just by internal clients, so they are
        ; named in the global namespace

        MAIL         A     192.0.2.41
        MAIL         A     2001:db8:e0::f1

        WWW          A     192.0.2.58
        WWW          AAAA  2001:db8:e0::5e

        ; CORP.EXAMPLE.COM is our internal namespace. Delegate the
        ; corresponding zone to nowhere

        CORP         NS    .
]]></artwork>
      </section>
      <section anchor="general-purpose-top-level-domain-for-internal-namespaces">
        <name>General Purpose Top-Level Domain for Internal Namespaces</name>
        <t>Suppose it has been decided that the top-level domain <tt>INTERNAL</tt> be
reserved for use in private namespaces. The root zone of the global
DNS is signed using DNSSEC <xref target="RFC4033"/>; that is, DNSSEC-specific
RRSets are published in the root zone that allow DNSSEC-aware
resolvers to be sure with cryptographic certainty whether particular
top-level domains exist in the public namespace.</t>
        <t>A delegation to nowhere for the <tt>INTERNAL</tt> top-level domain in the
root zone of the global DNS namespace would provide an unambiguous
signal to resolvers that <tt>INTERNAL</tt> does exist in other namespaces.
An insecure delegation to nowhere is appropriate in this example
since there is no single trust anchor that could be used to provide
a secure delegation to zones in multiple namespaces that have
different, non-cooperating administrators.</t>
        <artwork><![CDATA[
        $ORIGIN .

        ; the INTERNAL top-level domain is delegated to nowhere, to
        ; facilitate its use in private namespaces

        INTERNAL  172800  IN  NS  .
]]></artwork>
      </section>
    </section>
    <section anchor="updates-to-rfc-1035">
      <name>Updates to RFC 1035</name>
      <t>This document updates <xref section="3.3.11" sectionFormat="of" target="RFC1035"/> as follows:</t>
      <ul empty="true">
        <li>
          <t><tt>NSDNAME</tt> <bcp14>MAY</bcp14> be specified as a single, zero-length label. An
NS RRSet that consists of a single NS resource record with empty
<tt>NSDNAME</tt> is used to indicate that a zone cut exists without
providing any authoritative nameservers for the child zone. The
purpose of such an RRSet is to confirm that the child zone
exists, but in a different namespace from the parent (e.g. in a
private namespace).</t>
        </li>
      </ul>
    </section>
    <section anchor="other_uses">
      <name>Other Uses of the Empty Name in the DNS</name>
      <t>In <xref target="RFC7505"/> an MX resource record with an empty target (called
<tt>EXCHANGE</tt> in <xref target="RFC1035"/>) is specified to mean that the corresponding
domain name does not accept e-mail. In effect, the empty field is
used to indicate that there is no host available to use for e-mail
delivery.</t>
      <t>In <xref target="RFC2782"/> an SRV 'Target of "." means that the service is
decidedly not available at this domain.'</t>
      <t><xref section="2.5" sectionFormat="comma" target="RFC9460"/> notes that 'For AliasMode SVCB RRs, a
TargetName of "." indicates that the service is not available or
does not exist.'</t>
      <t>These uses of the empty name are conceptually consistent with the
meaning defined in this document: that using an empty name is to
be interpreted as the corresponding function not being available.</t>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>The empty name is not known to have been widely used as an NS target,
although it has been used as an MX target, as described in
<xref target="other_uses"/>. It is a reasonable concern that if delegations to
nowhere became prevalent, or if names related to such zone cuts
were associated with significant traffic, some operational problem
might result. For example, DNS software that made incompatible
assumptions about DNS responses might fail, or harmful traffic to
root servers might result.</t>
      <t>Some experiments carried out by the authors to assess the likelihood
of such problems are described in <xref target="experiments"/>. The results of
those experiments do not suggest that the widespread use of delegations
to nowhere would lead to operational problems.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document provides a means for both internal and global namespaces
to be provisioned using DNSSEC, allowing a DNSSEC-aware, mobile
resolver to maintain a consistent chain of trust regardless of
whether a private, child namespace exists from it's particular
vantage point. The ability to support this configuration cleanly has
better security properties than configurations that are ambiguous.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
      <t>The example of the designated top-level domain <tt>INTERNAL</tt> being
provisioned as a delegation of <tt>INTERNAL</tt> to nowhere from the root
zone was intentionally chosen in order to make it clear that such
a configuration is allowed, is consistent with this specification
and facilitates the use of private namespaces named under such a
top-level domain with less ambiguity than might otherwise occur.
This document does not provide any operational direction to the
IANA, however.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC1034">
          <front>
            <title>Domain names - concepts and facilities</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised basic definition of The Domain Name System. It obsoletes RFC-882. This memo describes the domain style names and their used for host address look up and electronic mail forwarding. It discusses the clients and servers in the domain name system and the protocol used between them.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1034"/>
          <seriesInfo name="DOI" value="10.17487/RFC1034"/>
        </reference>
        <reference anchor="RFC1035">
          <front>
            <title>Domain names - implementation and specification</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1035"/>
          <seriesInfo name="DOI" value="10.17487/RFC1035"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC9499">
          <front>
            <title>DNS Terminology</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
              <t>This document updates RFC 2308 by clarifying the definitions of "forwarder" and "QNAME". It obsoletes RFC 8499 by adding multiple terms and clarifications. Comprehensive lists of changed and new definitions can be found in Appendices A and B.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="219"/>
          <seriesInfo name="RFC" value="9499"/>
          <seriesInfo name="DOI" value="10.17487/RFC9499"/>
        </reference>
        <reference anchor="RFC4033">
          <front>
            <title>DNS Security Introduction and Requirements</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>The Domain Name System Security Extensions (DNSSEC) add data origin authentication and data integrity to the Domain Name System. This document introduces these extensions and describes their capabilities and limitations. This document also discusses the services that the DNS security extensions do and do not provide. Last, this document describes the interrelationships between the documents that collectively describe DNSSEC. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4033"/>
          <seriesInfo name="DOI" value="10.17487/RFC4033"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="Powers2006">
          <front>
            <title>Three Days to Never</title>
            <author initials="T." surname="Powers" fullname="Tim Powers">
              <organization/>
            </author>
            <date year="2006" month="August" day="08"/>
          </front>
          <refcontent>William Morrow &amp; Company, ISBN 978-0380976539</refcontent>
        </reference>
        <reference anchor="Byrne1985">
          <front>
            <title>Road to Nowhere</title>
            <author initials="D." surname="Byrne" fullname="David Byrne">
              <organization>Talking Heads</organization>
            </author>
            <date year="1985" month="June" day="03"/>
          </front>
          <refcontent>from the album "Little Creatures", Sire Records</refcontent>
        </reference>
        <reference anchor="RFC6762">
          <front>
            <title>Multicast DNS</title>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <author fullname="M. Krochmal" initials="M." surname="Krochmal"/>
            <date month="February" year="2013"/>
            <abstract>
              <t>As networked devices become smaller, more portable, and more ubiquitous, the ability to operate with less configured infrastructure is increasingly important. In particular, the ability to look up DNS resource record data types (including, but not limited to, host names) in the absence of a conventional managed DNS server is useful.</t>
              <t>Multicast DNS (mDNS) provides the ability to perform DNS-like operations on the local link in the absence of any conventional Unicast DNS server. In addition, Multicast DNS designates a portion of the DNS namespace to be free for local use, without the need to pay any annual fee, and without the need to set up delegations or otherwise configure a conventional DNS server to answer for those names.</t>
              <t>The primary benefits of Multicast DNS names are that (i) they require little or no administration or configuration to set them up, (ii) they work when no infrastructure is present, and (iii) they work during infrastructure failures.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6762"/>
          <seriesInfo name="DOI" value="10.17487/RFC6762"/>
        </reference>
        <reference anchor="RFC9476">
          <front>
            <title>The .alt Special-Use Top-Level Domain</title>
            <author fullname="W. Kumari" initials="W." surname="Kumari"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="September" year="2023"/>
            <abstract>
              <t>This document reserves a Top-Level Domain (TLD) label "alt" to be used in non-DNS contexts. It also provides advice and guidance to developers creating alternative namespaces.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9476"/>
          <seriesInfo name="DOI" value="10.17487/RFC9476"/>
        </reference>
        <reference anchor="RFC7505">
          <front>
            <title>A "Null MX" No Service Resource Record for Domains That Accept No Mail</title>
            <author fullname="J. Levine" initials="J." surname="Levine"/>
            <author fullname="M. Delany" initials="M." surname="Delany"/>
            <date month="June" year="2015"/>
            <abstract>
              <t>Internet mail determines the address of a receiving server through the DNS, first by looking for an MX record and then by looking for an A/AAAA record as a fallback. Unfortunately, this means that the A/AAAA record is taken to be mail server address even when that address does not accept mail. The No Service MX RR, informally called "null MX", formalizes the existing mechanism by which a domain announces that it accepts no mail, without having to provide a mail server; this permits significant operational efficiencies.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7505"/>
          <seriesInfo name="DOI" value="10.17487/RFC7505"/>
        </reference>
        <reference anchor="RFC2782">
          <front>
            <title>A DNS RR for specifying the location of services (DNS SRV)</title>
            <author fullname="A. Gulbrandsen" initials="A." surname="Gulbrandsen"/>
            <author fullname="P. Vixie" initials="P." surname="Vixie"/>
            <author fullname="L. Esibov" initials="L." surname="Esibov"/>
            <date month="February" year="2000"/>
            <abstract>
              <t>This document describes a DNS RR which specifies the location of the server(s) for a specific protocol and domain. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2782"/>
          <seriesInfo name="DOI" value="10.17487/RFC2782"/>
        </reference>
        <reference anchor="RFC9460">
          <front>
            <title>Service Binding and Parameter Specification via the DNS (SVCB and HTTPS Resource Records)</title>
            <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
            <author fullname="M. Bishop" initials="M." surname="Bishop"/>
            <author fullname="E. Nygren" initials="E." surname="Nygren"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies the "SVCB" ("Service Binding") and "HTTPS" DNS resource record (RR) types to facilitate the lookup of information needed to make connections to network services, such as for HTTP origins. SVCB records allow a service to be provided from multiple alternative endpoints, each with associated parameters (such as transport protocol configuration), and are extensible to support future uses (such as keys for encrypting the TLS ClientHello). They also enable aliasing of apex domains, which is not possible with CNAME. The HTTPS RR is a variation of SVCB for use with HTTP (see RFC 9110, "HTTP Semantics"). By providing more information to the client before it attempts to establish a connection, these records offer potential benefits to both performance and privacy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9460"/>
          <seriesInfo name="DOI" value="10.17487/RFC9460"/>
        </reference>
      </references>
    </references>
    <?line 444?>

<section anchor="experiments">
      <name>Experiments</name>
      <t>Wes has committed acts of science. He will describe them here.</t>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors stand ready to acknowledge all contributions from their
friends and colleagues.</t>
      <t>The phrase "delegation to nowhere" was inspired by the misremebered
title of a novel by Tim Powers entitled "Two Days to Nowhere", in
which characters deal with ambiguous realities by way of supernatural
sensitivity, time travel and alcohol.  This seemed like a good
metaphor for the problem of provisioning overlapping namespaces in
the DNS.</t>
      <t>Unfortunately, it appears that Tim Powers wrote no such book,
although he did publish the similarly-named novel "Three Days to
Never" <xref target="Powers2006"/> which is perhaps what I was thinking of. And
it's certainly true that much of his writing features ambiguity,
the supernatural and excessive drinking. Memory is a tricky thing.</t>
      <t>The song "Road to Nowhere" <xref target="Byrne1985"/> from the 1985 Talking Heads
album "Little Creatures" would perhaps have been a better inspiration
for the terminology.  It's a shame that's not what happened.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
