<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-mozleywilliams-dnsop-bandaid-00" category="std" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="BANDAID">Brokered Agent Network for DNS AI Discovery</title>

    <author initials="J." surname="Mozley" fullname="Jim Mozley">
      <organization>Infoblox, Inc.</organization>
      <address>
        <email>jmozley@infoblox.com</email>
      </address>
    </author>
    <author initials="N." surname="Williams" fullname="Nic Williams">
      <organization>Infoblox, Inc.</organization>
      <address>
        <email>nic@infoblox.com</email>
      </address>
    </author>
    <author initials="B." surname="Sarikaya" fullname="Behcet Sarikaya">
      <organization>Unaffiliated</organization>
      <address>
        <email>sarikaya@ieee.org</email>
      </address>
    </author>
    <author initials="R." surname="Schott" fullname="Roland Schott">
      <organization>Deutsche Telecom</organization>
      <address>
        <email>roland.schott@telekom.de</email>
      </address>
    </author>

    <date year="2025" month="October" day="16"/>

    <area>ops</area>
    <workgroup>dnsop</workgroup>
    <keyword>DNS</keyword> <keyword>AI</keyword> <keyword>Service Discovery</keyword> <keyword>agent-to-agent</keyword>

    <abstract>


<?line 46?>

<t>The emerging field of agent-to-agent protocol standards introduces new requirements in order to facilitate discovery, trust signaling, session negotiation and communication. This document specifies a method for utilizing the Domain Name System (DNS) to facilitate scalable and interoperable discovery between AI agents. The proposed mechanism, referred to as <em>Brokered Agent Network for DNS AI Discovery</em> (BANDAID), defines a structured DNS namespace and record usage model to support metadata exchange and capability advertisement.</t>

<t>BANDAID introduces a leaf zone convention (e.g., _agents.example.com) containing Service Binding (SVCB) records (e.g., chat._agents.example.com) that encode application-specific metadata. These records enable agents to retrieve operational parameters prior to initiating a session, supporting both targeted lookups and capability-based discovery. The approach leverages existing DNS infrastructure, including DNS Service Discovery (DNS-SD), DNSSEC, and DANE, to provide integrity, authenticity, and automation without requiring human intervention. Lastly, the draft for Domain Control Validation (DCV) proposes a best current practice to prove an agent is authorized to act on behalf of a domain.</t>

<t><em>This document proposes no change to the structure of DNS messages, and no new operation codes, response codes, resource record types, or any other new DNS protocol values.</em></t>



    </abstract>

    <note title="About This Document" removeInRFC="true">
      <t>
        The latest revision of this draft can be found at <eref target="https://example.com/LATEST"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-mozleywilliams-dnsop-bandaid/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        WG Working Group mailing list (<eref target="mailto:WG@example.com"/>),
        which is archived at <eref target="https://example.com/WG"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/USER/REPO"/>.</t>
    </note>


  </front>

  <middle>


<?line 54?>

<!-- # Disclaimer

The present document reflects the authors' individual opinions and does not necessarily represent the views of their respective employers. -->

<section anchor="conventions-and-definitions"><name>Conventions and Definitions</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
<section anchor="introduction"><name>Introduction</name>

<t>Agent-to-agent communication introduces novel requirements for service discovery, authorization signaling, and metadata exchange. While several proposals have explored new discovery protocols, the DNS remains the most widely deployed and interoperable mechanism for service discovery, with decades of operational maturity. Existing DNS record types (including SRV, NAPTR, SVCB, TXT, and A/AAAA) are routinely used to locate services and convey configuration metadata. It is therefore reasonable to assume that AI agents will interact with this network protocol during discovery, session initiation, and their application exchange.</t>

<t>If a user at $company asks their agent "clean up my Salesforce data based on this email," how does $company agent then know where to find Salesforce's agents? How would the Salesforce agent validate the $company agent and make the correct requested changes to Salesforce data? The former question is a DNS-solvable problem, the latter is not in the scope of this draft.</t>

<t>DNS can convey authorization and intent: DNS provides an organization a way to indicate that an agent is authorized to act on behalf of a domain (DCV draft), publish allowed endpoints or capabilities (SVCB), advertise service metadata in a way that’s cacheable, verifiable, and language-agnostic (tree domain etc), all while creating tamper-proof records and binding identities to certificates (DNSSEC + DANE). Additionally, DNS contributes to agent security by enabling connections to trusted nameservers, mitigating risks from typosquatted or malicious domains, and enforcing geographic or jurisdictional boundaries through country-code top-level domains (ccTLDs) and regionally scoped authoritative servers. These features collectively support secure, policy-compliant agent interactions at scale.</t>

<t>Unlike proposals that rely on centralized registries or ungoverned discovery networks, BANDAID builds upon existing infrastructure and governance models. It preserves operator sovereignty, supports decentralized publication, and benefits from support in the form of legal dispute processes and vulnerability disclosure programs.</t>

<t>This document aims to address key concerns in governance, commerce, security, and performance, allowing agent protocol designers to focus on data exchange standards while relying on the DNS for discovery. Agent-to-agent communication would take place after initial discovery, but some key data can be put into the DNS as a shortcut to make it more efficient.</t>

<t>The problem statement addressed by this draft is <xref target="I-D.draft-mozley-aidiscovery"/> and also relevant is <xref target="I-D.draft-rosenberg-ai-protocols"/> although this draft is related to the discovery of agents rather than protocols used directly in agent-to-agent communication.</t>

<section anchor="challenges-with-existing-proposed-mechanisms-and-benefits-of-dns"><name>Challenges with Existing Proposed Mechanisms and Benefits of DNS</name>

<t>Several alternative approaches to agent discovery have been proposed, including centralized registries, blockchain-based naming systems, and proprietary service directories. While these models may offer novel features, they introduce significant architectural, operational, and governance challenges. Centralized registries concentrate control and introduce single points of failure, limiting resilience and scalability.</t>

<t>Blockchain-based systems often lack integration with existing internet infrastructure, suffer from latency and cost constraints, and present jurisdictional ambiguity due to decentralized governance. Proprietary directories fragment the discovery ecosystem and inhibit interoperability across agent frameworks and administrative domains. Furthermore, securely delegating authority to AI solution providers on behalf of your organization requires interfacing between this central authority as opposed to business-to-business.</t>

<section anchor="development"><name>Development</name>

<t>The DNS benefits from decades of global development and operational deployment. It is supported by mature ecosystems for vulnerability disclosure, patch management, and protocol evolution, with active participation from security researchers, vendors, and operators worldwide. This distributed development model ensures that no single entity maintains disproportionate control over the protocol’s trajectory or security posture.</t>

<t>DNS infrastructure is also tightly integrated with existing cybersecurity practices. Connections to trusted nameservers, protections against typosquatted or malicious domains, and support for jurisdictional scoping via country-code top-level domains (ccTLDs) contribute to a robust security baseline. These features are particularly relevant in agent-to-agent contexts, where automated systems make trust decisions without human oversight... and importantly, may be maliciously modified without human awareness.</t>

<t>In contrast, the introduction of a novel discovery protocol would require the establishment of new governance structures, security models, and operational tooling. Early implementations would likely be centralized among a limited set of stakeholders, introducing bottlenecks in protocol evolution and risk mitigation. Building a comparable ecosystem would require sustained investment, cross-organizational coordination, and long-term trust-building—resources that DNS already possesses.</t>

</section>
<section anchor="opportunity-cost"><name>Opportunity Cost</name>

<t>Introducing a new protocol for agent-to-agent discovery imposes nontrivial infrastructure and operational requirements. In particular, organizations may be required to deploy and maintain additional components such as specialized cache servers or registry interfaces, which increases complexity and operational overhead. Some proposals suggest a generic top level domain (gTLD) like .aiagent, which is more cost to advertise as domains are purchased by early opportunists. These requirements may present barriers to adoption, especially for small or resource-constrained entities, and risk reinforcing disparities in access to AI technologies.</t>

<t>DNS, by contrast, is already deeply integrated into global infrastructure and supported by mature tooling, operational expertise, and deployment models. Its use for agent discovery enables rapid adoption without introducing new layers of technical debt. Leveraging DNS allows organizations to participate in agent-to-agent ecosystems using existing infrastructure, reducing onboarding friction and accelerating innovation. This approach supports incremental deployment and minimizes opportunity cost by avoiding the need for parallel protocol development and infrastructure investment.</t>

</section>
<section anchor="governance"><name>Governance</name>

<t>The DNS operates within a well-established and internationally recognized governance framework. Oversight is provided by entities such as the Internet Assigned Numbers Authority (IANA), top-level domain (TLD) operators, and national network information centers (NICs). These organizations maintain accountability mechanisms and support dispute resolution processes, including domain takedowns, mitigation of impersonation, and remediation of malicious behavior. The governance structures surrounding DNS have evolved over decades and are supported by legal, technical, and operational norms that facilitate cross-jurisdictional trust and stability.</t>

<t>DNS also enables policy enforcement at the infrastructure level. For example, country-code top-level domains (ccTLDs) and regionally scoped authoritative servers allow for jurisdictional boundaries to be respected, which may be relevant in agent deployments subject to regulatory constraints. Additionally, DNSSEC and DANE provide cryptographic assurances that bind domain identities to certificates, supporting automated trust decisions without requiring centralized registries or manual validation.</t>

<t>In contrast, alternative discovery proposals—such as blockchain-based registries or neutral third-party systems—lack formal integration with existing governance bodies and may be susceptible to fragmentation, influence, or jurisdictional ambiguity. These models do not currently offer the same level of operational recourse or reliability. Leveraging DNS for agent discovery allows organizations to build on trusted infrastructure while maintaining compatibility with existing governance frameworks, providing a stable foundation for innovation as more experimental models mature.</t>

<t>Establishing a new governance structure based on new agent discovery protocols would be time consuming, involve all stakeholders agreeing on the structure, establishing the structure in a specific jurisdiction (which may not be suitable for all parties), and involve creating the technical infrastructure to support it. The DNS already has all of these components in place.</t>

</section>
<section anchor="sovereignty"><name>Sovereignty</name>

<t>The DNS supports decentralized control while maintaining global interoperability. Organizations may operate their own authoritative DNS infrastructure, publish service records independently, and retain full control over how their services are discovered. This model enables entities to maintain autonomy over their service exposure and operational boundaries without reliance on centralized intermediaries which may not share their same interests.</t>

<t>Proposed alternatives—such as blockchain-based registries, single-purpose generic top-level domains (gTLDs), or third-party discovery networks—often introduce opaque governance models, unclear trust boundaries, and dependencies on external infrastructure. Although these systems may be described as “decentralized,” they frequently concentrate control within protocol maintainers, validator networks, or registry operators, which may not be accountable to the organizations they serve.</t>

<t>DNS provides a proven and extensible registry model that supports secure, independent publication of agent metadata. It aligns with principles of digital sovereignty and operational self-determination, allowing organizations to participate in agent ecosystems without relinquishing control over discovery infrastructure.</t>

</section>
<section anchor="commerce"><name>Commerce</name>

<t>A critical consideration in the design of agent discovery infrastructure is the potential for commercialization to compromise integrity. In the absence of established norms or constraints, new registry-based discovery mechanisms may evolve into visibility-driven platforms, where agent discoverability is influenced by paid placement rather than technical merit, trust, or reputation. This introduces incentives that prioritize commercial interests over operational reliability and security, undermining the predictability and neutrality of agent interactions and the free and open Internet as a whole.</t>

<t>DNS, by contrast, is built on open standards and governed by transparent, non-commercial processes. It provides mechanisms for validation and authentication, such as DNSSEC, and certificate bindings via DANE that are not subject to monetization. The resolution process is deterministic and not influenced by financial incentives, preserving the integrity of service discovery. Leveraging DNS ensures that agent discovery remains a technical function grounded in verifiable identity and operational metadata, rather than a commercial battleground. This supports fair access and trustworthy interactions across heterogeneous agent ecosystems.</t>

</section>
<section anchor="application"><name>Application</name>

<t>Regardless of how agent discovery is initiated, agent-to-agent communication ultimately intersects with existing network infrastructure. Agents may require access to internal services, external APIs, or shared data repositories, all of which are typically addressed through conventional networking and resolution mechanisms. Introducing a separate discovery protocol that fragments the location and representation of service metadata introduces architectural complexity and increases the risk of cascading failures across systems.</t>

<t>Operators would be required to manage multiple layers of resolution logic, synchronization mechanisms, and failure domains, which complicates deployment and undermines operational reliability. DNS, by contrast, is already embedded in the fabric of networked applications and provides a natural point of integration for discovery. It enables metadata publication to remain proximate to the services it describes, reducing latency, simplifying architecture, and aligning with existing operational models. This approach supports innovation in agent systems while avoiding brittle dependencies and minimizing architectural drift.</t>

<t>DNS is predictable for agents to use for the purposes of discovery, requiring no advanced configurations to consume the service, rather it is embedded in all pieces of the application stack eliminating the need to retrofit legacy devices to operate in an agent-to-agent environment.</t>

</section>
<section anchor="granularity"><name>Granularity</name>

<t>DNS supports fine-grained control over service discovery through its hierarchical zone structure and flexible record types. Organizations may define zones and records at varying levels of specificity, including per-host, per-service, per-environment (e.g., staging vs. production), or per geographic region. This granularity enables precise targeting and segmentation of agent capabilities, facilitating operational clarity and policy enforcement.</t>

<t>Service Binding (SVCB) records further enhance granularity by allowing metadata to be associated with individual service endpoints. This includes transport preferences, supported protocols, and application-specific parameters. Combined with DNS Service Discovery (DNS-SD), these features allow agents to discover services with high specificity, reducing ambiguity and improving interoperability. The DNS model supports modular deployment and incremental adoption, making it well-suited for diverse agent architectures and operational contexts.</t>

</section>
<section anchor="performance"><name>Performance</name>

<t>DNS is well-suited to meet the scale and responsiveness requirements of agent discovery, where billions of agents may generate trillions of queries. Its architecture supports high-throughput, low-latency resolution through mechanisms such as caching, retry logic, and autom,atic zone distribution to secondary servers. Recursive resolvers may be further optimized by locally hosting the root zone <xref target="RFC8806"/>, reducing lookup latency and improving fault tolerance.</t>

<t>Additional features such as pre-fetching and negative caching allow resolvers to anticipate agent behavior and reduce query overhead. Country code (ccTLD) and Generic Top Level Domain (gTLD) operators have global infrastructure to support localized resolution and improve performance for AI-specific applications. These capabilities enable scalable deployment without requiring protocol redesign or new infrastructure layers.</t>

<t>Furthermore, DNS-based discovery enables immediate connection establishment. Once an agent endpoint is resolved, transport protocols such as QUIC may be used to initiate communication directly, benefiting from features such as 0-RTT and multiplexed streams. This eliminates the need for a separate handshake or negotiation phase for discovery, reducing latency and improving throughput in high-volume environments. DNS thus provides a performant and extensible foundation for agent discovery at global scale.</t>

</section>
<section anchor="lifecycle-management"><name>Lifecycle / Management</name>

<t>DNS provides robust provisioning and lifecycle management capabilities that align with the dynamic nature of agent-based systems. Mechanisms such as Incremental Zone Transfer (IXFR) and Full Zone Transfer (AXFR) allow for rapid propagation of zone updates across authoritative servers. When backed by database-centric DNS implementations, zone data may be treated as replicable state, enabling near-real-time onboarding or decommissioning of agents.</t>

<t>Operational observability is supported through query logging, zone monitoring, and resolver telemetry, which can be used to track agent utilization patterns and identify stale or inactive records.</t>

<t>These lifecycle management capabilities are mature, widely supported, and compatible with existing operational tooling. They enable high-churn agent ecosystems to be managed efficiently without requiring the development of new provisioning, monitoring, or cleanup protocols.</t>

</section>
<section anchor="trust"><name>Trust</name>

<t>In agent discovery, trust encompasses more than identity verification — it includes confidence in the provenance, behavior, and reliability of the agents being discovered. The DNS provides a recognizable and auditable namespace rooted in organizational domains (e.g., microsoft.com, openai.com), enabling systems to make informed decisions about agent interactions based on domain ownership and established reputational context. This is particularly critical in AI environments, where agents may initiate autonomous actions or access sensitive data.</t>

<t>DNS enables organizations to publish agent endpoints under domains they control, establishing a clear chain of accountability. This trust model supports cryptographic validation through DNSSEC and DANE, allowing agents to verify domain ownership and certificate bindings without manual intervention. By contrast, discovery mechanisms lacking verifiable lineage introduce significant risk and complexity, particularly when agents are discovered through opaque or ungoverned registries.</t>

<t>The BANDAID model builds on the DNS’s trust infrastructure to support safe and scalable agent discovery. It allows agents to assess the authenticity and authority of remote endpoints prior to interaction, reducing the likelihood of misrouting, impersonation, or unauthorized access. This trust-validation-first approach is foundational to enabling secure automation in agent ecosystems.</t>

</section>
<section anchor="agent-properties"><name>Agent Properties</name>

<t>As agent-to-agent protocols evolve, it is likely more metadata will need to be signaled in the discovery phase to allow agents to make more informed decisions. An example of how DNS provides a platform to facilitate this is below.</t>

<t>Service Binding (SVCB) records, as defined in <xref target="RFC9460"/>, support extensible key-value parameters that may be registered through the IANA SVCB Parameter Registry. These parameters can provide agent systems with operational context prior to session initiation, enabling informed decisions about whether and how to engage with a remote agent. It is possible to publish metadata such as input (e.g. expected token counts) or cost (e.g. cost per token bundle) directly within DNS records.</t>

<t>This model supports a trust-validation-first approach to agent interaction, where expectations around resource usage and pricing are transparently advertised. It reduces the need for handshake-based negotiation or out-of-band signaling, and allows for deterministic, cacheable discovery workflows. For instance, by embedding cost-related metadata in DNS, discovery becomes not only scalable and performant, but also semantically rich, supporting economically-aware agent ecosystems without introducing new protocols or registries.</t>

</section>
<section anchor="control"><name>Control</name>

<t>Agent discovery mechanisms must operate within the constraints of enterprise security policies, regulatory compliance requirements, and operational boundaries. DNS enables the presentation of distinct DNS views based on the source of the query. This allows organizations to expose different sets of agent records to internal versus external resolvers. For example, internal agents may resolve _a2a._agents.internal.example.com to discover services not intended for public exposure, while external agents receive responses only for _a2a._agents.example.com containing externally authorized endpoints.</t>

<t>Enterprise-grade network controls such as firewalls, Response Policy Zones (RPZs), and access control lists (ACLs) provide additional enforcement mechanisms. These controls may restrict outbound DNS queries to designated resolvers, filter inbound queries to approved zones, and block unauthorized resolution attempts. This ensures that agent discovery adheres to organizational boundaries and complies with internal security policies. For example, an enterprise may configure its network security to allow internal agents to query only *.internal.example.com zones, while blocking access to external agent zones unless explicitly permitted. Similarly, DNS servers may enforce query logging and rate limiting to detect anomalous behavior or potential abuse.</t>

<t>Segmented discovery via DNS aligns with compliance requirements related to data residency, privacy, and access control. By scoping agent visibility to specific zones and enforcing resolution boundaries, organizations can ensure that discovery mechanisms respect jurisdictional constraints, internal governance models, and support auditability. Query logs, zone access telemetry, and resolver behavior can be monitored to verify that agent interactions conform to policy. This provides a foundation for regulatory reporting, incident response, and continuous compliance validation without the need for extensive additional operations that require more technical staffing or specialized solutions.</t>

</section>
</section>
<section anchor="mechanisms-for-successful-agent-communication"><name>Mechanisms for Successful Agent Communication</name>

<t>The explicit goal of the DNS <xref target="RFC1035"/> is to provide a mechanism for name resolution, enabling agent discovery without requiring new protocols, trust anchors, or infrastructure layers. Leveraging DNS for agent discovery ensures compatibility with existing operational models, supports incremental deployment, and avoids the risks associated with experimental or ungoverned discovery mechanisms.</t>

<section anchor="service-binding-records-aka-svcb"><name>Service Binding Records, aka SVCB</name>

<t>The SVCB resource record as defined in <xref target="RFC9460"/>, enables DNS to convey structured service metadata that facilitates optimized connection establishment. SVCB records support the advertisement of protocol identifiers (via ALPN), transport parameters (e.g., port numbers), endpoint hints (e.g., IP addresses), and extensible key-value attributes. These capabilities are particularly relevant for agent-to-agent communication, where protocol negotiation and metadata exchange must occur without human intervention.</t>

<t>In the context of BANDAID, SVCB records are used to publish agent-specific service endpoints under structured leaf zones (e.g., _chat._agents.example.com). These records allow querying agents to retrieve operational parameters prior to initiating a session, including supported protocols, privacy features (e.g., Encrypted Client Hello via ECH), and failover configurations. This eliminates the need for heuristic-based connection attempts and reduces round-trip latency.</t>

<t>SVCB records also support protocol agility and privacy-preserving features. For example, agents may advertise support for QUIC, HTTP/3, or custom agent-to-agent protocols via ALPN declarations. Operators may specify alternate endpoints or migrate services across domains without relying on CNAME indirection, improving performance and reducing DNS resolution complexity.</t>

<t>When paired with attribute leaf zones and custom SVCB parameters, this mechanism enables fine-grained discovery of agent capabilities. For instance, an agent querying _a2a._agents.example.com may receive an SVCB record indicating supported modalities (e.g., chat, image-to-text), expected input formats, and cost-related metadata (e.g., token pricing). This structured discovery model supports deterministic, cacheable, and semantically rich interactions between agents.</t>

</section>
<section anchor="dns-security-extensions-aka-dnssec"><name>DNS Security Extensions, aka DNSSEC</name>

<t>DNSSEC as defined in <xref target="RFC4033"/>, <xref target="RFC4034"/>, and <xref target="RFC4035"/>, enables resolvers and clients to verify that a response originates from an authoritative source (authenticity) and DNS data has not been modified in transit (data integrity). In the context of BANDAID, DNSSEC serves as a foundational trust mechanism for agent discovery. By signing agent-related resource records—such as SVCB, TXT, or custom metadata—organizations can ensure that querying agents receive authentic and tamper-proof information. This is particularly critical for agent-to-agent communication, where autonomous systems must make trust decisions without human oversight.</t>

<t>DNSSEC supports the establishment of cryptographic trust anchors via Delegation Signer (DS) records and facilitates secure delegation of authority across zone boundaries. This allows organizations to publish agent metadata under subdomains (e.g., _a2a._agents.example.com) while maintaining verifiable control over the zone hierarchy.</t>

<t>Furthermore, DNSSEC eliminates the need for hardcoded trust lists or centralized validation services. Agents can validate responses using the DNSSEC chain of trust, enabling decentralized and scalable trust verification. This model supports zero-trust architectures and aligns with modern security principles by minimizing implicit trust and enforcing explicit validation.</t>

<t>When combined with DANE (DNS-Based Authentication of Named Entities), DNSSEC enables binding of TLS certificates to DNS names, further enhancing the authenticity of agent endpoints. This integration supports secure session initiation and mitigates risks associated with certificate mis-issuance or man-in-the-middle attacks. The use of DANE may improve performance and enable automation in the dynamicism of agent lifecycle.</t>

</section>
<section anchor="dns-service-discovery-aka-dns-sd"><name>DNS Service Discovery, aka DNS-SD</name>

<t>DNS-SD as defined in <xref target="RFC6763"/>, extends the capabilities of the Domain Name System to support service-type-based discovery. Unlike traditional DNS resolution, which requires prior knowledge of a specific hostname, DNS-SD enables clients to discover services based on their functional type (e.g., _http._tcp, _printer._udp) within a given domain.</t>

<t>In the context of BANDAID, DNS-SD provides a mechanism for AI agents to discover other agents or services based on declared capabilities rather than explicit names. For example, an agent may issue a query for _data-cleaner._a2a._agents.example.com to locate services capable of performing data sanitization tasks. This type-based discovery model supports dynamic ecosystems where agent roles and capabilities may evolve over time.</t>

<t>DNS-SD operates over both multicast DNS (mDNS) and unicast DNS, allowing for flexible deployment in local networks and globally scoped domains. In enterprise or cloud environments, unicast DNS-SD enables structured and policy-compliant discovery across organizational boundaries. When combined with SVCB records, DNS-SD allows agents to retrieve detailed service metadata, including transport preferences, protocol support, and operational parameters.</t>

<t>This model supports federated agent architectures, where multiple agents may advertise similar capabilities under different domains. By leveraging DNS-SD, agents can perform capability-based queries and receive a list of candidate services, each accompanied by structured metadata for evaluation and selection.</t>

<t>DNS-SD also supports extensibility through TXT records and custom service naming conventions, enabling organizations to encode additional attributes relevant to agent interaction (e.g., supported data formats, authentication requirements, or cost models). These features make DNS-SD a suitable foundation for scalable, interoperable, and semantically rich agent discovery workflows.</t>

</section>
<section anchor="dns-based-authentication-of-named-entities-aka-dane"><name>DNS-Based Authentication of Named Entities, aka DANE</name>

<t>DANE as specified in <xref target="RFC6698"/> and <xref target="RFC7671"/>, enables domain owners to associate Transport Layer Security (TLS) certificates with DNS names using TLSA resource records. When protected by DNSSEC, these records provide cryptographically verifiable bindings between domain names and public keys, allowing clients to authenticate services without relying solely on external certificate authorities (CAs).</t>

<t>In the context of BANDAID, DANE enhances the trust model for agent-to-agent communication by enabling agents to validate the authenticity of remote endpoints based on domain-controlled assertions. This is particularly relevant in automated environments where agents must establish secure sessions without manual certificate validation or user interaction.</t>

<t>By publishing TLSA records under agent-specific service names (e.g., _a2a._tcp.agent.example.com), organizations can declare the expected certificate fingerprint or public key for a given agent endpoint. Querying agents can then validate the TLS connection against the DANE record, ensuring that the certificate presented during session initiation matches the domain’s published intent.</t>

<t>This mechanism mitigates risks associated with certificate mis-issuance, man-in-the-middle attacks, and reliance on third-party trust anchors. It also supports deterministic validation workflows, which are critical for agents operating in headless or GUI-less environments where interactive certificate warnings cannot be resolved.</t>

<t>When combined with DNSSEC, DANE provides a robust, decentralized, and verifiable trust infrastructure for agent discovery and communication. It aligns with zero-trust principles by enabling domain owners to assert and control trust relationships directly through DNS, without introducing additional registries or validation services.</t>

</section>
<section anchor="domain-control-validation-aka-dcv"><name>Domain Control Validation, aka DCV</name>

<t>DCV refers to the process by which an entity demonstrates authoritative control over a DNS domain. As described in draft-ietf-dnsop-domain-verification-techniques, DNS-based DCV typically involves the placement of a DNS record—most commonly a TXT record—containing a challenge token or assertion at a designated location within the domain. This record is then queried by an Application Service Provider (ASP) to confirm control.</t>

<t>In the context of BANDAID, DCV provides a mechanism for agents to assert delegated authority on behalf of a domain. For example, an organization may publish a TXT record under a structured leaf zone (e.g., _agent-roles._a2a._agents.example.com) containing metadata such as:</t>

<ul empty="true"><li>
  <t>ai-role=data-cleaner; crm=salesforce; access=readonly</t>
</li></ul>

<t>This record signals that a specific agent is authorized to perform scoped operations under the domain's authority. When protected by DNSSEC, such assertions become cryptographically verifiable, mitigating risks of spoofing or unauthorized delegation.</t>

<t>DCV within BANDAID supports both ephemeral and persistent validation models. Ephemeral validation may be used for short-lived agent credentials or session-based delegation, while persistent records enable long-term authorization signaling. TTL and expiration considerations, as discussed in the draft, are critical to ensuring that validation records do not persist beyond their intended scope.</t>

<t>Furthermore, BANDAID encourages the use of application-specific naming conventions and token formats to avoid service confusion and collision. Validation records should be scoped to the intended service and include unguessable tokens or structured metadata to prevent unauthorized reuse across federated agent ecosystems.</t>

</section>
<section anchor="service-resilience"><name>Service Resilience</name>

<t>The DNS architecture is inherently resilient due to its distributed, hierarchical design. Authoritative zones are replicated across multiple servers, and recursive resolvers implement caching, retry logic, and failover mechanisms to ensure continuity of resolution. Failover, anycast, and replication continue to add resiliency and redundancy provided through the DNS.</t>

<t>This fault-tolerant model supports agent discovery even in the presence of partial network outages, denial-of-service conditions, or upstream failures. Unlike centralized registries or proprietary APIs, DNS does not rely on a single point of availability, making it suitable for high-availability agent ecosystems operating across diverse network environments.</t>

</section>
<section anchor="observability-auditability"><name>Observability, Auditability</name>

<t>DNS provides built-in observability through query logging, resolver telemetry, and zone monitoring. These features enable operators to track agent discovery patterns, detect anomalous behavior, and perform forensic analysis of agent interactions. This auditability is critical in regulated environments where agent actions must be attributable and verifiable, and where discovery mechanisms must align with enterprise governance models.</t>

<t>Logs may be used to validate compliance with access policies, identify stale or misconfigured records, support incident response workflows, and/or be used in lifecycle management of unused or oversubscribed agents.</t>

</section>
<section anchor="interoperability"><name>Interoperability</name>

<t>BANDAID is designed to be agnostic to agent implementation frameworks. Whether agents are built using open-source libraries, proprietary orchestration platforms, or custom runtimes, DNS-based discovery provides a common substrate for metadata publication and retrieval. This interoperability ensures that agents operating under different protocols, vendors, or administrative domains can participate in shared discovery workflows without requiring protocol translation or framework-specific integration. DNS’s ubiquity across operating systems and network stacks further reinforces its suitability as a universal discovery layer.</t>

</section>
<section anchor="multitenancy-federation"><name>Multitenancy, Federation</name>

<t>DNS’s hierarchical namespace supports multi-tenant and federated discovery models. Organizations may delegate subdomains to tenants (e.g., customer1._agents.vendor.com) or publish agent metadata under federated zones (e.g., region1._a2a.example.org). This enables scoped discovery, policy enforcement, and operational isolation across tenants, departments, or geographic regions. Combined with DNSSEC and access controls, this model supports secure delegation and trust signaling in complex agent ecosystems, including SaaS platforms and cross-organizational collaborations.</t>

</section>
</section>
<section anchor="architecture"><name>Architecture</name>

<section anchor="example-communication"><name>Example Communication</name>

<t>Agent (org1) wants to find other agents provided by another entity (org2) and discover/verify capabilities</t>

<t><spanx style="verb">
                 DNS SVCB Query
┌────────┐   _a2a._agents.example.com   ┌────────┐            ┌────────┐
│AI Agent├─────────────────────────────►│Resolver├───────────►│Auth DNS│
│ (ORG1) │ ◄────────────────────────────┤ (ORG1) │◄─────┬─────┤ (ORG2) │
└────────┘                              └────────┘      │     └────────┘
                                                        │
      ┌─────────────────────────────────────────────────┴─────────────┐
      │_a2a._aiagent.org2.com. 3600 IN SVCB 1 ai-index-svc.org2.com. (│
      │    alpn="a2a"                                                 │
      │    port=443                                                   │
      │    ipv4hint=192.0.2.1                                         │
      │    ipv6hint=2001:db8::1                                       │
      │)                                                              │
      └───────────────────────────────────────────────────────────────┘
</spanx></t>

</section>
<section anchor="example-record"><name>Example Record</name>
<t><spanx style="verb">
_a2a._aiagent.org2.com. 3600 IN SVCB 1 ai-index-svc.org2.com. (
    alpn="a2a"
    port=443
    ipv4hint=192.0.2.1
    ipv6hint=2001:db8::1
)
</spanx></t>

<t>_a2a._aiagent.example.com.: The service name, following the SVCB naming convention (_service._agents.example.com).
3600: TTL (Time to Live) in seconds.
IN SVCB: The record type.
1: SVCB priority. 0 is for alias mode; 1+ is for service mode.
ai-index-svc.org2.com.: The target name of the service.
alpn="a2a": Specifies the ALPN protocol identifier. This is where your custom protocol is declared.
port=443: The port on which the service is available.
ipv4hint and ipv6hint: Optional hints for clients to connect directly.</t>

</section>
<section anchor="example-use-cases"><name>Example Use Cases</name>

<ul empty="true"><li>
  <t>A user instructs their internal agent to “clean up Salesforce contacts based on this email.” The agent must discover Salesforce’s authorized agents, validate its own delegation to act on behalf of the enterprise, and initiate a secure session. BANDAID enables this by publishing agent endpoints and roles under DNS zones controlled by each organization.</t>
</li></ul>

<ul empty="true"><li>
  <t>A research consortium deploys agents across multiple institutions. Each institution publishes its agents under its own domain (e.g., _a2a._agents.universityA.edu), allowing collaborators to discover services based on capability (e.g., _data-annotator._a2a.universityB.edu) while respecting institutional boundaries and trust models.</t>
</li></ul>

<ul empty="true"><li>
  <t>A SaaS provider hosts agents for multiple customers. Each customer’s agents are published under tenant-specific zones (e.g., customer1._agents.saas.com), enabling scoped discovery and policy enforcement. BANDAID supports this model through hierarchical zone delegation and metadata-rich SVCB records.</t>
</li></ul>

<ul empty="true"><li>
  <t>Lightweight agents deployed on mobile or edge devices require low-latency, cacheable discovery mechanisms. DNS’s distributed architecture and support for SVCB hints (e.g., IP addresses, preferred protocols) enable efficient resolution and connection bootstrapping in constrained environments.</t>
</li></ul>

<ul empty="true"><li>
  <t>In regulated industries, agents must operate within jurisdictional boundaries and maintain audit trails of interactions. DNS supports geographic scoping via ccTLDs and split-horizon configurations, while query logging and DNSSEC provide observability and integrity guarantees.</t>
</li></ul>

</section>
</section>
</section>
<section anchor="bandaid-overview"><name>BANDAID Overview</name>

<t>The BANDAID model is designed for incremental and non-disruptive deployment within existing DNS infrastructure. It introduces no new DNS message formats, opcodes, response codes, or resource record types. Instead, it defines a structured namespace convention and usage profile for existing record types... primarily SVCB, TXT, and TLSA all within designated leaf zones (e.g., _a2a._agents.example.com).</t>

<t>Organizations may adopt BANDAID by publishing agent metadata under delegated subdomains, leveraging DNSSEC for integrity and authenticity, and optionally implementing Domain Control Validation (DCV) to signal delegated authority. These zones may be exposed selectively via split-horizon DNS, enabling differentiated discovery views for internal and external agents. No changes are required to recursive or authoritative DNS server implementations beyond standard support for DNSSEC and SVCB.</t>

<t>This model supports opt-in adoption, allowing agent operators to publish discovery metadata without coordination with external registries or protocol maintainers. It is compatible with existing DNS tooling, including zone provisioning systems, monitoring platforms, and resolver configurations. BANDAID is therefore suitable for deployment across enterprise, cloud, and federated environments, and may coexist with other discovery mechanisms without conflict.</t>

<section anchor="zone-and-other-requirements"><name>Zone and Other Requirements</name>

<section anchor="delegation-and-chain-of-trust"><name>Delegation and Chain of Trust</name>

<t>An external authoritative zone used for the purposes of BANDAID <bcp14>MUST</bcp14> use DNSSEC <xref target="RFC4033"/>. The BANDAID external zone <bcp14>MUST</bcp14> establish a complete chain of trust to a publicly recognized trust anchor. For zones delegated from a public parent, DS records <bcp14>MUST</bcp14> be present and maintained at the parent zone. DS digests <bcp14>MUST</bcp14> use SHA‑256 (Digest Type 2) as specified in <xref target="RFC4509"/>; SHA‑1 (Digest Type 1) <bcp14>MUST NOT</bcp14> be used. Where feasible, automation of DS maintenance <bcp14>SHOULD</bcp14> be performed using CDS and CDNSKEY as specified in <xref target="RFC7344"/> and operationalized per <xref target="RFC8078"/>.</t>

</section>
<section anchor="algorithms-and-parameters"><name>Algorithms and Parameters</name>

<t>Authoritative signers for the BANDAID External Zone <bcp14>MUST</bcp14> use DNSSEC algorithms and key sizes consistent with current implementation and usage guidance in <xref target="RFC8624"/>. Implementations <bcp14>SHOULD</bcp14> prefer elliptic‑curve or EdDSA algorithms for efficiency and security, specifically ECDSA P‑256 (Algorithm 13; <xref target="RFC6605"/>) or Ed25519 (Algorithm 15; <xref target="RFC8080"/>). Zones <bcp14>MUST NOT</bcp14> rely on RSA/SHA‑1 signatures. If RSA is used for transitional reasons, key sizes <bcp14>SHOULD</bcp14> be ≥ 2048 bits and migration to ECDSA or EdDSA <bcp14>SHOULD</bcp14> be planned.</t>

<t>Separation of roles between a Key‑Signing Key (KSK) and a Zone‑Signing Key (ZSK) is <bcp14>RECOMMENDED</bcp14> for operational agility, consistent with practices in <xref target="RFC6781"/>. Private keys <bcp14>SHOULD</bcp14> be protected by appropriate controls (e.g., HSMs or equivalent) commensurate with organizational risk.</t>

</section>
<section anchor="authenticated-denial-of-existence"><name>Authenticated Denial of Existence</name>

<t>The BANDAID External Zone <bcp14>MUST</bcp14> provide authenticated denial of existence. NSEC3 <xref target="RFC5155"/> is <bcp14>RECOMMENDED</bcp14> to mitigate trivial zone enumeration for zones where record names or labels might reveal sensitive information. If NSEC3 is used, the number of iterations <bcp14>SHOULD</bcp14> be kept modest to balance CPU cost for signers and validators, per guidance in <xref target="RFC6781"/>. Use of NSEC with White Lies is <bcp14>OPTIONAL</bcp14> where operationally justified.</t>

</section>
<section anchor="signature-validity"><name>Signature Validity</name>

<t>Signature validity windows <bcp14>MUST</bcp14> be chosen to balance cache efficiency and replay risk. In general, a signature lifetime on the order of days to a small number of weeks is <bcp14>RECOMMENDED</bcp14>, with staggered resigning to avoid mass expiration events <xref target="RFC6781"/>. Resource Record TTLs <bcp14>MUST</bcp14> be set to values that support timely updates to BANDAID capability data while allowing effective caching; operational defaults <bcp14>SHOULD</bcp14> be validated against change frequency. Negative caching behavior <bcp14>MUST</bcp14> follow <xref target="RFC2308"/>.</t>

</section>
<section anchor="key-rollover"><name>Key Rollover</name>

<t>Zones <bcp14>MUST</bcp14> support planned key rollovers and emergency key replacement consistent with the procedures in <xref target="RFC6781"/>. Pre‑publication and double‑signature techniques <bcp14>SHOULD</bcp14> be used to minimize validation failures during ZSK and KSK rollovers. Parent DS changes <bcp14>SHOULD</bcp14> be orchestrated using CDS/CDNSKEY signaling <xref target="RFC7344"/><xref target="RFC8078"/>. Post‑compromise recovery procedures <bcp14>MUST</bcp14> be documented, including revocation, re‑signing, and DS replacement timelines.</t>

</section>
<section anchor="transport-and-message-size"><name>Transport and Message Size</name>

<t>Because DNSSEC increases response sizes, authoritative servers for the BANDAID External Zone <bcp14>MUST</bcp14> implement EDNS(0) per <xref target="RFC6891"/> and <bcp14>MUST</bcp14> support TCP fallback for queries per <xref target="RFC7766"/>. Authoritative operators <bcp14>SHOULD</bcp14> configure UDP response sizing to minimize IP fragmentation risk and <bcp14>SHOULD</bcp14> ensure that large responses (e.g., DNSKEY, NSEC3 chains) remain retrievable via TCP.</t>

</section>
<section anchor="transfer-and-integrity"><name>Transfer and Integrity</name>

<t>When secondary authoritative servers are used, zone transfers <bcp14>MUST</bcp14> be authenticated and protected with TSIG <xref target="RFC2845"/>. Use of DNS NOTIFY <xref target="RFC1996"/> and incremental transfer (IXFR; <xref target="RFC5936"/>) is <bcp14>RECOMMENDED</bcp14> to reduce propagation latency and bandwidth. To provide at‑rest integrity verification between primaries and secondaries, publishing a ZONEMD record is <bcp14>RECOMMENDED</bcp14> where supported <xref target="RFC8976"/>.</t>

</section>
<section anchor="monitoring"><name>Monitoring</name>

<t>Operators <bcp14>MUST</bcp14> monitor DNSSEC validity from multiple vantage points to detect stale signatures, DS/DNSKEY mismatches, and other validation failures. Alarms <bcp14>SHOULD</bcp14> be configured for impending signature expiration, key compromise indicators, and DS inconsistencies. Signing infrastructure <bcp14>SHOULD</bcp14> be tested under load and failure scenarios consistent with the scalability requirements of this specification.</t>

</section>
<section anchor="abuse-resistance"><name>Abuse Resistance</name>

<t>Authoritative servers for the BANDAID External Zone <bcp14>SHOULD</bcp14> implement DNS Cookies <xref target="RFC7873"/><xref target="RFC9018"/> to reduce off‑path spoofing and amplification risks. Operators <bcp14>SHOULD</bcp14> follow best practices to limit amplification and to shape responses under attack, consistent with maintaining DNSSEC validity.</t>

</section>
<section anchor="bandaid-records"><name>BANDAID Records</name>

<t>All BANDAID‑specific discovery records (e.g., SRV <xref target="RFC2782"/>, SVCB/HTTPS <xref target="RFC9460"/>, TXT/URI <xref target="RFC7553"/> used for capability descriptors, and any BANDAID‑defined RRTypes) <bcp14>MUST</bcp14> be signed and published in the BANDAID External Zone. Where BANDAID endpoints rely on TLS, publication of DANE TLSA records <bcp14>SHOULD</bcp14> be used to bind endpoint certificates to DNSSEC‑validated names <xref target="RFC6698"/><xref target="RFC7671"/>. Resolver behavior consuming BANDAID data <bcp14>MUST</bcp14> treat DNSSEC‑bogus responses as failures and <bcp14>MUST NOT</bcp14> act on unsigned or invalidly signed discovery data.</t>

</section>
<section anchor="performance-optimizations"><name>Performance Optimization(s)</name>

<t>The discovery namespace for BANDAID <bcp14>SHOULD</bcp14> be structured to minimize query depth, RRset size, and update blast radius. To that end, implementers <bcp14>SHOULD</bcp14> allocate per‑service, per‑agent leaf names and avoid aggregating high‑cardinality data under a single owner name. A deterministic mapping (e.g., a stable hash of an Agent Identifier) to leaf labels <bcp14>SHOULD</bcp14> be used to support sharding and parallel administration. Where cardinality requires, sub‑zones <bcp14>MAY</bcp14> be delegated (zone cuts) to distribute authority and update load.</t>

<t>Each agent service endpoint <bcp14>SHOULD</bcp14> be published using SVCB in ServiceMode (or HTTPS RR for HTTPS endpoints) to convey connection parameters and capability locators with a single lookup <xref target="RFC9460"/>. SVCB “address hints” (ipv4hint, ipv6hint) <bcp14>SHOULD</bcp14> be used to reduce A/AAAA follow‑up queries; resolvers <bcp14>MAY</bcp14> still validate final addresses via canonical resolution. Where human‑friendly names are required, SVCB AliasMode (priority 0) <bcp14>MAY</bcp14> be used to map from a stable alias to a hashed leaf, avoiding record duplication while preserving cache locality.</t>

<t>Authoritative servers <bcp14>MUST</bcp14> support EDNS(0) <xref target="RFC6891"/> and TCP fallback <xref target="RFC7766"/>. Operators <bcp14>SHOULD</bcp14> target response sizes that avoid IP fragmentation on common paths (e.g., ≤1232 bytes on IPv6), preferring compression and layered indirection over oversized RRsets. TTLs <bcp14>MUST</bcp14> be chosen to reflect the volatility of capability data; index/indirection records may use longer TTLs than frequently changing endpoint or capability descriptors. Negative caching <bcp14>MUST</bcp14> conform to <xref target="RFC2308"/>. When high update rates are expected, IXFR and NOTIFY <bcp14>SHOULD</bcp14> be used to reduce propagation latency.</t>

<t>Resolvers and authoritative operators <bcp14>SHOULD</bcp14> take advantage of SVCB’s ALPN, port, and (for HTTPS) ECH parameters to enable connection pre‑establishment and reduce round‑trips, subject to client policy and security posture <xref target="RFC9460"/>. Where privacy policies prohibit client geolocation, EDNS Client Subnet <bcp14>SHOULD NOT</bcp14> be relied upon for performance.</t>

<t>A representative naming pattern is shown below; the exact label order is deployment‑specific, but the leaf per service, per agent rule applies:</t>

<t>```
; Hashed, per-agent, per-service leaf
a4k2f9._mcp._bandaid.example.org.  600 IN SVCB 1 svc-a4k2f9.example.org.
    alpn="h2,h3" port=443 ipv6hint=2001:db8::5 ipv4hint=192.0.2.5</t>

<t>; Optional alias for a friendlier owner name
billing._mcp._bandaid.example.org. 300 IN SVCB 0 a4k2f9._mcp._bandaid.example.org.
```</t>

</section>
<section anchor="customizations"><name>Customization(s)</name>

<t>BANDAID deployments <bcp14>MAY</bcp14> define additional SVCB parameters (SvcParamKeys) to convey agent‑specific capability metadata, provided that interoperability safeguards in <xref target="RFC9460"/> are observed. During experimentation, unregistered keys <bcp14>MUST</bcp14> use the numeric keyNNNNN presentation form, and any client behavior that depends on them <bcp14>MUST</bcp14> be gated via the mandatory SvcParam to ensure downgrade safety.
This specification defines the following provisional SvcParamKeys for BANDAID (names are illustrative; production deployments <bcp14>MUST</bcp14> register through IANA per <xref target="RFC9460"/> or use keyNNNNN until standardized):</t>

<ul empty="true"><li>
  <t>cap — a capability descriptor locator or inline identifier (e.g., a URN or compact JSON‑Ref) that identifies the agent’s advertised capability schema/version.
cap-sha256 — a base64url‑encoded SHA‑256 digest of the canonical capability descriptor to support integrity checks and cache revalidation.
bap — a comma‑separated list of BANDAID Application Protocols and versions understood by the endpoint (e.g., bap="a2a/1,mcp/1,acp/2"). This is distinct from transport‑level alpn.
policy — a URI or URN identifying a policy bundle applicable to this agent (e.g., jurisdiction, data handling class) for client‑side selection.
realm — an opaque token for multi‑tenant scoping or authz realm selection during protocol bootstrapping.</t>
</li></ul>

<t>Clients that require any of these parameters <bcp14>MUST</bcp14> verify their presence via the mandatory key; otherwise, the SVCB record <bcp14>MUST</bcp14> be ignored. Example:</t>

<t><spanx style="verb">
Single-RRTYPE publication with custom params (experimental keys shown)
a4k2f9._mcp._bandaid.example.org. 600 IN SVCB 1 svc-a4k2f9.example.org.
    alpn="h2" port=443 ipv4hint=192.0.2.5
    mandatory=alpn,port,key65001,key65002,key65010
    key65001="cap=urn:cap:example:mcp:invoice.v1"
    key65002="cap-sha256=yvZ0n7q8bE2gYkz8m1j1s0yQG0mC2F6qj3b9pVb6Gk0"
    key65010="bap=a2a/1,mcp/1"
</spanx>
Where endpoints are HTTPS, the HTTPS RR variant <bcp14>SHOULD</bcp14> be used to co‑locate transport parameters such as ech with capability metadata; otherwise, generic SVCB <bcp14>MAY</bcp14> be used. Future standardization <bcp14>SHOULD</bcp14> define the exact syntax (e.g., ABNF) and registry policy for these keys, including error handling for malformed or conflicting parameters. Until registration is complete, deployments <bcp14>MUST</bcp14> treat unknown keyNNNNN parameters as opaque and <bcp14>MUST NOT</bcp14> infer semantics without out‑of‑band agreement.</t>

</section>
</section>
</section>
<section anchor="implementation-guidance"><name>Implementation Guidance</name>

<section anchor="ai-operators"><name>AI Operators</name>

<section anchor="separation-of-roles"><name>Separation of Roles</name>

<t>Operators <bcp14>MUST</bcp14> separate authoritative servers for BANDAID zones from recursive resolvers to prevent cache poisoning and reduce operational coupling. Authoritative servers <bcp14>MUST NOT</bcp14> perform recursion. Recursive resolvers <bcp14>SHOULD</bcp14> be deployed close to query sources (e.g., within organizational networks or edge PoPs) to minimize latency and reduce upstream load.</t>

</section>
<section anchor="local-root-zone-copy"><name>Local Root Zone Copy</name>

<t>Recursive resolvers serving BANDAID traffic <bcp14>SHOULD</bcp14> maintain a local copy of the root zone as specified in <xref target="RFC8806"/>. This eliminates dependency on external root servers for priming queries, reduces resolution latency, and improves resilience during partial Internet outages or denial‑of‑service events targeting root infrastructure.</t>

</section>
<section anchor="aggressive-caching-and-prefetch"><name>Aggressive Caching and Prefetch</name>

<t>Resolvers <bcp14>MUST</bcp14> implement RFC‑compliant caching and <bcp14>SHOULD</bcp14> enable the aggressive use of DNSSEC‑validated cache to synthesize negative answers from NSEC/NSEC3 and reduce upstream lookups, consistent with <xref target="RFC8198"/>. This behavior improves latency, lowers authoritative load, and can mitigate certain attack patterns by answering within validated non‑existence ranges.</t>

<t>Resolvers <bcp14>SHOULD</bcp14> implement serve‑stale as specified in <xref target="RFC8767"/>. When authoritative servers are unreachable or fail to refresh data, a resolver <bcp14>MAY</bcp14> return expired records from its cache to preserve availability, subject to policy caps on staleness. <xref target="RFC8767"/> updates the TTL semantics to allow use beyond expiration under these exceptional conditions and RECOMMENDS capping staleness on the order of days, with a typical cap of 7 days. When serving stale data, the TTL in the response <bcp14>MUST</bcp14> be set to a value greater than zero (with 30 seconds <bcp14>RECOMMENDED</bcp14>) so clients and intermediaries do not cache a zero‑TTL response indefinitely.</t>

<t>Resolvers implementing serve‑stale <bcp14>SHOULD</bcp14> follow the timer guidance in <xref target="RFC8767"/>: continue background refresh (“stale‑while‑revalidate”), bound total resolution work with a query‑resolution timer, avoid excessive re‑tries with a failure‑recheck timer (no more frequently than ~30 seconds is <bcp14>RECOMMENDED</bcp14>), and ensure client responsiveness with a client‑response timer (on the order of ~1.8 seconds is <bcp14>RECOMMENDED</bcp14>). These controls balance resiliency with freshness and protect upstream authorities during outages or attack conditions.</t>

<t>Operators <bcp14>MUST</bcp14> consider DNSSEC interactions when serving stale data. Stale answers can increase the likelihood that signatures are outside their validity windows; implementations <bcp14>MUST NOT</bcp14> misrepresent validation status (e.g., AD bit handling <bcp14>MUST</bcp14> follow DNSSEC semantics where the bit is only set if all relevant RRsets are cryptographically verified according to local policy).</t>

<t>Prefetch of popular BANDAID names <bcp14>SHOULD</bcp14> be used to keep caches warm, and negative caching <bcp14>MUST</bcp14> follow <xref target="RFC2308"/> to avoid unnecessary upstream traffic during flaps. Where serve‑stale is enabled, operators <bcp14>SHOULD</bcp14> monitor stale‑answer rates and staleness distribution to ensure that policy caps and refresh behavior meet availability and freshness objectives.</t>

</section>
<section anchor="edns0-transport-resilience"><name>EDNS(0) Transport Resilience</name>

<t>All servers <bcp14>MUST</bcp14> support EDNS(0) <xref target="RFC6891"/> and TCP fallback <xref target="RFC7766"/> to accommodate DNSSEC and SVCB responses that exceed traditional UDP size limits. Operators <bcp14>SHOULD</bcp14> configure UDP response sizing to avoid IP fragmentation (e.g., ≤1232 bytes for IPv6 paths) and <bcp14>SHOULD</bcp14> monitor truncation rates to detect misconfigurations or path MTU issues.\</t>

</section>
<section anchor="load-distribution"><name>Load Distribution</name>

<t>Authoritative servers for BANDAID zones <bcp14>SHOULD</bcp14> be deployed using IP anycast to provide global reachability, load balancing, and DDoS resilience. Recursive resolvers <bcp14>SHOULD</bcp14> be deployed in a geographically distributed manner to minimize latency for agent queries and to provide failover during regional outages.</t>

</section>
<section anchor="monitoring-and-telemetry"><name>Monitoring and Telemetry</name>

<t>Operators <bcp14>MUST</bcp14> implement continuous monitoring of query latency, cache hit ratios, DNSSEC validation success rates, and transport fallback events. Alarms <bcp14>SHOULD</bcp14> be configured for anomalies such as sudden TTL exhaustion, signature expiration, or upstream unreachability. Logging <bcp14>MUST</bcp14> respect privacy and regulatory constraints while providing sufficient detail for operational troubleshooting and compliance audits.</t>

</section>
<section anchor="encrypted-resolver-steering-informative"><name>Encrypted Resolver Steering (Informative)</name>

<t>AI clients and operators <bcp14>MAY</bcp14> implement Encrypted DNS Server Redirection (EDSR) to permit an encrypted resolver to redirect a client to another encrypted resolver for performance, locality, or policy reasons Any acceptance of redirection <bcp14>MUST</bcp14> follow the verified-discovery model of DDR <xref target="RFC9462"/>, including validation of the designated relationship and TLS authentication of the target resolver. If
redirection validation fails or exceeds a single hop, clients <bcp14>MUST</bcp14> continue to use the original resolver configuration. When available, network-designated resolvers provisioned via DNR <xref target="RFC9463"/> take precedence over unsolicited redirection unless local policy dictates otherwise. EDSR is currently an Internet-Draft and is referenced as an <bcp14>OPTIONAL</bcp14> extension.</t>

</section>
</section>
<section anchor="ai-consumers"><name>AI Consumers</name>

<section anchor="dns-based-service-discovery"><name>DNS-Based Service Discovery</name>

<t>DNS-Based Service Discovery
AI clients that consume BANDAID discovery data <bcp14>MUST</bcp14> implement DNS‑based service discovery consistent with <xref target="RFC6763"/> and <xref target="RFC9460"/>. Clients <bcp14>SHOULD</bcp14> query for SVCB or HTTPS records at well‑defined service labels (e.g., _mcp._bandaid.example.org.) and interpret alpn, port, and custom SvcParams as specified in this document. Where multiple priorities are returned, clients <bcp14>MUST</bcp14> honor the SVCB priority and weight semantics for selection and failover. Clients <bcp14>MUST</bcp14> validate DNSSEC signatures for all discovery responses and <bcp14>MUST NOT</bcp14> act on unsigned or bogus data.</t>

<t>Clients <bcp14>SHOULD</bcp14> implement caching consistent with TTLs and negative caching rules in <xref target="RFC2308"/>. Prefetching of high‑traffic names <bcp14>MAY</bcp14> be used to reduce latency, provided that it does not violate policy or privacy constraints. Clients <bcp14>MUST</bcp14> support EDNS(0) and TCP fallback to handle large responses.</t>

</section>
<section anchor="communication-failure-retry"><name>Communication Failure / Retry</name>

<t>When a discovered agent endpoint is unreachable, clients <bcp14>MUST</bcp14> implement retry logic that respects exponential backoff and avoids synchronized retry storms. Clients <bcp14>SHOULD</bcp14> attempt alternate SVCB targets in priority order before declaring failure. Where serve‑stale responses are received, clients <bcp14>MUST</bcp14> treat them as advisory and <bcp14>MUST NOT</bcp14> assume freshness beyond the TTL indicated in the response. Clients <bcp14>SHOULD</bcp14> log stale usage for observability and compliance.</t>

</section>
<section anchor="domain-control-validation"><name>Domain Control Validation</name>

<t>To prevent impersonation and unauthorized data access, BANDAID deployments <bcp14>MUST</bcp14> support Domain Control Validation (DCV) using DNS. This mechanism allows application owners to verify that a requesting service is authorized to act on behalf of a domain (e.g., “AI, sync all customer contacts from my approved CRM for acme.org”). DCV <bcp14>MUST</bcp14> follow a challenge‑response model where the domain owner publishes a cryptographically strong token in a DNS TXT record under a well‑defined label (e.g., _bandaid-challenge.acme.org.). The token <bcp14>MUST</bcp14> be bound to the requesting service identity and have a bounded validity period.
Clients performing DCV <bcp14>MUST</bcp14> validate the token against the expected value and expiration before granting delegated access. Tokens <bcp14>SHOULD</bcp14> be single‑use and <bcp14>MUST</bcp14> be removed from DNS after successful validation. All DCV interactions <bcp14>MUST</bcp14> occur over DNSSEC‑validated channels to prevent spoofing or downgrade attacks.</t>

</section>
</section>
<section anchor="ai-developers"><name>AI Developers</name>

<section anchor="publishing-schema"><name>Publishing Schema</name>

<t>Publishers <bcp14>SHOULD</bcp14> expose per‑service discovery records using SVCB (or HTTPS for HTTP origins) at stable, well‑scoped owner names (e.g., agent-id._mcp._bandaid.example.org.). SVCB ServiceMode conveys connection parameters and capability locators in a single round trip; AliasMode <bcp14>MAY</bcp14> be used to map a friendly name to a hashed leaf for sharding without duplicating RRSets. Initial connection parameter keys (alpn, port, address hints) and the mandatory key <bcp14>MUST</bcp14> be honored by clients. <xref target="RFC9460"/></t>

<t>Minimal example:</t>

<t><spanx style="verb">
; ServiceMode SVCB for an MCP-capable agent
a4k2f9._mcp._bandaid.example.org.  600 IN SVCB 1 svc-a4k2f9.example.net.
    alpn="h2,h3" port=443 ipv6hint=2001:db8::5 ipv4hint=192.0.2.5
    mandatory=alpn,port
</spanx></t>

<t>SVCB/HTTPS semantics and SvcParam processing <bcp14>MUST</bcp14> follow <xref target="RFC9460"/> to ensure interop and correct fallback.</t>

</section>
<section anchor="ttls-update-agility"><name>TTLs, Update Agility</name>

<t>Publishers <bcp14>SHOULD</bcp14> assign longer TTLs to relatively static indirection records (aliases, stable service labels) and shorter TTLs to volatile endpoint/capability records to balance cache efficiency with rollout safety. Consumers will apply negative caching per <xref target="RFC2308"/>, so publishers <bcp14>SHOULD</bcp14> avoid unnecessary NXDOMAIN flaps during deployments (e.g., prefer blue/green leaves over in‑place deletions).</t>

</section>
<section anchor="capability-retrieval"><name>Capability Retrieval</name>

<t>When capability metadata is referenced via URI from SVCB/HTTPS, retrieval <bcp14>MUST</bcp14> occur over authenticated, confidential channels. Publishers <bcp14>SHOULD</bcp14> offer TLS 1.3 and <bcp14>MAY</bcp14> bind endpoint identity via DANE TLSA where resolvers validate DNSSEC; otherwise, WebPKI validation applies. Operational guidance for DANE usage (certificate usage selections, rollover) <bcp14>SHOULD</bcp14> follow <xref target="RFC7671"/> <xref target="RFC8446"/> <xref target="RFC6698"/></t>

<t>Where using HTTPS RRs, publishers <bcp14>MAY</bcp14> advertise the ech SvcParam to enable Encrypted Client Hello for privacy; client/server behavior and key distribution <bcp14>MUST</bcp14> follow the semantics described in <xref target="RFC9460"/> for the ech parameter.</t>

</section>
<section anchor="example-dcv-flow"><name>Example DCV Flow</name>

<t>Example DCV Flow (Normative Sketch)</t>

<t><list style="symbols">
  <t>The relying service issues a DCV challenge with a nonce bound to its identity and an expiration time.</t>
  <t>The domain owner publishes the nonce at _bandaid-challenge.domain. as a TXT RR until validation completes.</t>
  <t>The verifier performs a DNSSEC‑validated TXT query and compares the presented nonce and binding; on success, access is granted and the TXT is removed.</t>
</list></t>

<t><spanx style="verb">
need a sketch for how this looks
</spanx></t>

</section>
<section anchor="example-zonefile"><name>Example Zonefile</name>

<t>```
$ORIGIN example.org.
$TTL 3600</t>

<t>; ----------------------------------------------------------------------
; SOA / NS
; ----------------------------------------------------------------------
@                       IN SOA   ns1.example.org. hostmaster.example.org. (
                                2025091901 ; serial (YYYYMMDDnn)
                                7200       ; refresh
                                1800       ; retry
                                1209600    ; expire
                                3600 )     ; minimum
                        IN NS    ns1.example.org.
                        IN NS    ns2.example.org.</t>

<t>ns1                     IN A     192.0.2.53
ns1                     IN AAAA  2001:db8::53
ns2                     IN A     192.0.2.54
ns2                     IN AAAA  2001:db8::54</t>

<t>; ----------------------------------------------------------------------
; BANDAID discovery (MCP example): per-service, per-agent leaf
; - Leaf is a stable mapping from AgentID -&gt; label (e.g. hashed).
; - Use SVCB ServiceMode (priority &gt; 0) to bind connection parameters.
; ----------------------------------------------------------------------</t>

<t>; AliasMode to keep a friendly name stable even if the leaf changes
billing._mcp._bandaid    300 IN SVCB 0 a4k2f9._mcp._bandaid.example.org.</t>

<t>; Leaf per agent/service (ServiceMode). Shorter TTL for agility.
a4k2f9._mcp._bandaid     600 IN SVCB 1 svc-a4k2f9.example.net. \
                            alpn="h2,h3" \
                            port=443 \
                            ipv4hint=192.0.2.5 \
                            ipv6hint=2001:db8::5 \
                            mandatory=alpn,port</t>

<t>; (Optional) Another service face for the same agent (A2A)
a4k2f9._a2a._bandaid     600 IN SVCB 1 svc-a4k2f9.example.net. \
                            alpn="h2" port=8443 \
                            mandatory=alpn,port</t>

<t>; (Optional) HTTPS RR at apex for web-style consumers of BANDAID metadata
@                        900 IN HTTPS 1 web-gw.example.net. \
                            alpn="h2,h3" port=443</t>

<t>; ----------------------------------------------------------------------
; Capability / policy signaling via SVCB custom keys (experimental)
; Use numeric keyNNNNN until you register IANA SvcParamKeys.
; Gate client requirements with "mandatory".
; ----------------------------------------------------------------------
; Example: reference a capability descriptor and advertise supported app protocols.
; NOTE: Values and key numbers are illustrative.</t>

<t>a4k2f9._mcp._bandaid     600 IN SVCB 1 svc-a4k2f9.example.net. \
                            alpn="h2,h3" port=443 \
                            mandatory=alpn,port,key65001,key65010 \
                            key65001="cap=urn:cap:example:mcp:invoice.v1" \
                            key65010="bap=a2a/1,mcp/1"</t>

<t>; ----------------------------------------------------------------------
; Domain Control Validation (DCV) for BANDAID authorization
; Publish a short-lived token to prove control over example.org.
; Remove after successful validation. Resolver <bcp14>MUST</bcp14> DNSSEC-validate.
; ----------------------------------------------------------------------
_bandaid-challenge       300 IN TXT   "bnd-req=svc:crm-sync@vendor.example;nonce=3Qz6l8pA;exp=2025-09-19T06:00:00Z"</t>

<t>; ----------------------------------------------------------------------
; Optional DANE TLSA for the service endpoint used above.
; Owner: _<spanx style="verb">&lt;port&gt;</spanx>._tcp.<spanx style="verb">&lt;endpoint-FQDN&gt;</spanx>
; Usage 3 (DANE-EE), Selector 1 (SPKI), Match 1 (SHA-256)
; Replace the hash with the actual SPKI hash of the leaf certificate.
; ----------------------------------------------------------------------
_443._tcp.svc-a4k2f9.example.net.  1800 IN TLSA 3 1 1 (
    0123456789ABCDEF0123456789ABCDEF0123456789ABCDEF0123456789AB )</t>

<t>; ----------------------------------------------------------------------
; (Optional) Address records for the service endpoint, if hosted in-zone
; If hosted out-of-zone (example.net), these will live there instead.
; ----------------------------------------------------------------------
svc-a4k2f9               900 IN A     192.0.2.5
svc-a4k2f9               900 IN AAAA  2001:db8::5
web-gw                   900 IN A     192.0.2.80
web-gw                   900 IN AAAA  2001:db8::80
```</t>

<section anchor="how-to-use-this-zonefile"><name>How to use this zonefile</name>

<t><list style="symbols">
  <t>Adjust TTLs for agility vs. cache efficiency. Use longer TTLs on indirection (aliases), shorter TTLs on volatile leaves and DCV. This aligns with DNS caching behavior and negative caching rules <xref target="RFC2308"/>.</t>
  <t>Follow SVCB/HTTPS semantics. Clients must honor SvcPriority, AliasMode (priority 0), and ServiceMode parameters, including mandatory, alpn, port, and address hints per <xref target="RFC9460"/>.</t>
  <t>DCV token flow. Issue a time‑bounded token at _bandaid-challenge.domain and require DNSSEC‑validated retrieval (pattern analogous to ACME’s DNS‑01 in <xref target="RFC8555"/>). Remove on success.</t>
  <t>Bind transport to DNS with DANE (optional). If your relying parties validate DNSSEC, publish TLSA to bind the endpoint’s cert/key, using the operational guidance in <xref target="RFC7671"/> (TLSA record format in <xref target="RFC6698"/>).</t>
  <t>Sign the zone. This file is pre‑signing. Sign with DNSSEC (DNSKEY/DS/RRSIG, etc.) before deployment; validators must treat unsigned/bogus discovery data as a failure (per your earlier spec). See DNSSEC core specs <xref target="RFC4033"/>, <xref target="RFC4034"/>, <xref target="RFC4035"/> and operational guidance.</t>
</list></t>

</section>
<section anchor="why-these-records"><name>Why these records</name>

<t><list style="symbols">
  <t>SVCB/HTTPS concentrate connection metadata and allow aliasing at apex and service labels, reducing round trips and enabling policy‑gated params via mandatory.</t>
  <t>Per‑service, per‑agent leaves avoid oversized RRsets and allow parallel administration/sharding while keeping alias names stable. This follows performance guidance in SVCB and your BANDAID perf section.</t>
  <t>DCV via TXT mirrors a well‑understood, automated control‑proof pattern <xref target="RFC8555"/> that fits BANDAID authorization workflows.</t>
  <t>DANE TLSA optionally removes reliance on external PKI anchors for endpoint auth where DNSSEC is deployed <xref target="RFC6698"/>, with deployment rules in <xref target="RFC7671"/>.</t>
</list></t>

</section>
</section>
</section>
</section>
<section anchor="conclusion"><name>Conclusion</name>

<t>The discovery of AI agents at Internet scale introduces requirements for autonomy, security, resilience, and interoperability that cannot be met by ad‑hoc or centralized mechanisms. Organizations must advertise capabilities in a manner that is globally unique, cryptographically verifiable, and operationally scalable, while preserving compliance with regulatory and sovereignty constraints. The solution space must account for dynamic lifecycles, selective disclosure, and the ability to integrate with existing infrastructure without introducing new trust anchors or governance choke points.</t>

<t>This document defines BANDAID as a DNS‑based discovery framework that leverages the global DNS namespace, DNSSEC for integrity and authenticity, and SVCB/HTTPS records for structured capability advertisement. By building on widely deployed protocols and operational practices, BANDAID provides a predictable entry point for agent discovery, supports hierarchical delegation for organizational autonomy, and enables secure, low‑latency resolution at scale. Extensions such as custom SvcParams, DNS‑based domain control validation, and optional DANE bindings further strengthen trust and interoperability.</t>

<t>Future work includes standardizing capability schemas, formalizing SvcParam registries for BANDAID metadata, and defining privacy‑preserving query mechanisms (like authoritative DOT/H/Q). By aligning with existing Internet standards and operational best practices, BANDAID offers a path to interoperable, secure, and resilient AI agent discovery without reinventing the foundational layers of the Internet.</t>

<section anchor="future-work-unaddressed-portions"><name>Future Work &amp; Unaddressed Portions</name>

<t>Index versus agents publishing their updates, etc. Unresolved in the use case of it being better to have an index which is a list of all agents an org owns, or allow records within the zone to be the record of truth.</t>

<t>For example, a company may only have a few external agents available for use, and if the IETF standardizes 'types' of AI agents, then perhaps _chat._ai.domain.com or _img2txt._ai.domain.com etc are all different SVCB records.</t>

</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>To add: Lookalikes, takedowns, misbehaving agents, compliance, privacy</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>IANA are to consider registering an underscored attribute leaf as part of <xref target="RFC8552"/> for BANDAID.</t>

<t>IANA are to consider designating custom key-value pairs for SVCB parameters to facilitate agent-to-agent application discovery, potentially for cost optimization (token input counts, costs per token bundle, etc.)</t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>

<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>




    </references>

    <references title='Informative References' anchor="sec-informative-references">




<reference anchor="I-D.draft-mozley-aidiscovery">
   <front>
      <title>AI Agent Discovery (AID) Problem Statement</title>
      <author fullname="Jim Mozley" initials="J." surname="Mozley">
         <organization>Infoblox, Inc.</organization>
      </author>
      <author fullname="Nic Williams" initials="N." surname="Williams">
         <organization>Infoblox, Inc.</organization>
      </author>
      <author fullname="Behcet Sarikaya" initials="B." surname="Sarikaya">
         <organization>Unaffiliated</organization>
      </author>
      <author fullname="Roland Schott" initials="R." surname="Schott">
         <organization>Deutsche Telekom</organization>
      </author>
      <date day="15" month="October" year="2025"/>
      <abstract>
	 <t>   With the deployment of AI agents comes a need for mechanisms to
   support agent-to-agent discovery.  This document presents
   requirements and considerations for agent-to-agent discovery.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-mozley-aidiscovery-00"/>
   
</reference>


<reference anchor="I-D.draft-rosenberg-ai-protocols">
   <front>
      <title>Framework, Use Cases and Requirements for AI Agent Protocols</title>
      <author fullname="Jonathan Rosenberg" initials="J." surname="Rosenberg">
         <organization>Five9</organization>
      </author>
      <author fullname="Cullen Fluffy Jennings" initials="C. F." surname="Jennings">
         <organization>Cisco</organization>
      </author>
      <date day="5" month="May" year="2025"/>
      <abstract>
	 <t>   AI Agents are software applications that utilize Large Language
   Models (LLM)s to interact with humans (or other AI Agents) for
   purposes of performing tasks.  AI Agents can make use of resources -
   including APIs and documents - to perform those tasks, and are
   capable of reasoning about which resources to use.  To facilitate AI
   agent operation, AI agents need to communicate with users, and then
   interact with other resources over the Internet, including APIs and
   other AI agents.  This document describes a framework for AI Agent
   communications on the Internet, identifying the various protocols
   that come into play.  It introduces use cases that motivate features
   and functions that need to be present in those protocols.  It also
   provides a brief survey of existing work in standardizing AI agent
   protocols, including the Model Context Protocol (MCP), the Agent to
   Agent Protocol (A2A) and the Agntcy Framework, and describes how
   those works fit into this framework.  The primary objective of this
   document is to set the stage for possible standards activity at the
   IETF in this space.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-rosenberg-ai-protocols-00"/>
   
</reference>

<reference anchor="RFC8806">
  <front>
    <title>Running a Root Server Local to a Resolver</title>
    <author fullname="W. Kumari" initials="W." surname="Kumari"/>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <date month="June" year="2020"/>
    <abstract>
      <t>Some DNS recursive resolvers have longer-than-desired round-trip times to the closest DNS root server; those resolvers may have difficulty getting responses from the root servers, such as during a network attack. Some DNS recursive resolver operators want to prevent snooping by third parties of requests sent to DNS root servers. In both cases, resolvers can greatly decrease the round-trip time and prevent observation of requests by serving a copy of the full root zone on the same server, such as on a loopback address or in the resolver software. This document shows how to start and maintain such a copy of the root zone that does not cause problems for other users of the DNS, at the cost of adding some operational fragility for the operator.</t>
      <t>This document obsoletes RFC 7706.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8806"/>
  <seriesInfo name="DOI" value="10.17487/RFC8806"/>
</reference>

<reference anchor="RFC9460">
  <front>
    <title>Service Binding and Parameter Specification via the DNS (SVCB and HTTPS Resource Records)</title>
    <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
    <author fullname="M. Bishop" initials="M." surname="Bishop"/>
    <author fullname="E. Nygren" initials="E." surname="Nygren"/>
    <date month="November" year="2023"/>
    <abstract>
      <t>This document specifies the "SVCB" ("Service Binding") and "HTTPS" DNS resource record (RR) types to facilitate the lookup of information needed to make connections to network services, such as for HTTP origins. SVCB records allow a service to be provided from multiple alternative endpoints, each with associated parameters (such as transport protocol configuration), and are extensible to support future uses (such as keys for encrypting the TLS ClientHello). They also enable aliasing of apex domains, which is not possible with CNAME. The HTTPS RR is a variation of SVCB for use with HTTP (see RFC 9110, "HTTP Semantics"). By providing more information to the client before it attempts to establish a connection, these records offer potential benefits to both performance and privacy.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9460"/>
  <seriesInfo name="DOI" value="10.17487/RFC9460"/>
</reference>

<reference anchor="RFC1035">
  <front>
    <title>Domain names - implementation and specification</title>
    <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
    <date month="November" year="1987"/>
    <abstract>
      <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="13"/>
  <seriesInfo name="RFC" value="1035"/>
  <seriesInfo name="DOI" value="10.17487/RFC1035"/>
</reference>

<reference anchor="RFC4033">
  <front>
    <title>DNS Security Introduction and Requirements</title>
    <author fullname="R. Arends" initials="R." surname="Arends"/>
    <author fullname="R. Austein" initials="R." surname="Austein"/>
    <author fullname="M. Larson" initials="M." surname="Larson"/>
    <author fullname="D. Massey" initials="D." surname="Massey"/>
    <author fullname="S. Rose" initials="S." surname="Rose"/>
    <date month="March" year="2005"/>
    <abstract>
      <t>The Domain Name System Security Extensions (DNSSEC) add data origin authentication and data integrity to the Domain Name System. This document introduces these extensions and describes their capabilities and limitations. This document also discusses the services that the DNS security extensions do and do not provide. Last, this document describes the interrelationships between the documents that collectively describe DNSSEC. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4033"/>
  <seriesInfo name="DOI" value="10.17487/RFC4033"/>
</reference>

<reference anchor="RFC4034">
  <front>
    <title>Resource Records for the DNS Security Extensions</title>
    <author fullname="R. Arends" initials="R." surname="Arends"/>
    <author fullname="R. Austein" initials="R." surname="Austein"/>
    <author fullname="M. Larson" initials="M." surname="Larson"/>
    <author fullname="D. Massey" initials="D." surname="Massey"/>
    <author fullname="S. Rose" initials="S." surname="Rose"/>
    <date month="March" year="2005"/>
    <abstract>
      <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of resource records and protocol modifications that provide source authentication for the DNS. This document defines the public key (DNSKEY), delegation signer (DS), resource record digital signature (RRSIG), and authenticated denial of existence (NSEC) resource records. The purpose and format of each resource record is described in detail, and an example of each resource record is given.</t>
      <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4034"/>
  <seriesInfo name="DOI" value="10.17487/RFC4034"/>
</reference>

<reference anchor="RFC4035">
  <front>
    <title>Protocol Modifications for the DNS Security Extensions</title>
    <author fullname="R. Arends" initials="R." surname="Arends"/>
    <author fullname="R. Austein" initials="R." surname="Austein"/>
    <author fullname="M. Larson" initials="M." surname="Larson"/>
    <author fullname="D. Massey" initials="D." surname="Massey"/>
    <author fullname="S. Rose" initials="S." surname="Rose"/>
    <date month="March" year="2005"/>
    <abstract>
      <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of new resource records and protocol modifications that add data origin authentication and data integrity to the DNS. This document describes the DNSSEC protocol modifications. This document defines the concept of a signed zone, along with the requirements for serving and resolving by using DNSSEC. These techniques allow a security-aware resolver to authenticate both DNS resource records and authoritative DNS error indications.</t>
      <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4035"/>
  <seriesInfo name="DOI" value="10.17487/RFC4035"/>
</reference>

<reference anchor="RFC6763">
  <front>
    <title>DNS-Based Service Discovery</title>
    <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
    <author fullname="M. Krochmal" initials="M." surname="Krochmal"/>
    <date month="February" year="2013"/>
    <abstract>
      <t>This document specifies how DNS resource records are named and structured to facilitate service discovery. Given a type of service that a client is looking for, and a domain in which the client is looking for that service, this mechanism allows clients to discover a list of named instances of that desired service, using standard DNS queries. This mechanism is referred to as DNS-based Service Discovery, or DNS-SD.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6763"/>
  <seriesInfo name="DOI" value="10.17487/RFC6763"/>
</reference>

<reference anchor="RFC6698">
  <front>
    <title>The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA</title>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <author fullname="J. Schlyter" initials="J." surname="Schlyter"/>
    <date month="August" year="2012"/>
    <abstract>
      <t>Encrypted communication on the Internet often uses Transport Layer Security (TLS), which depends on third parties to certify the keys used. This document improves on that situation by enabling the administrators of domain names to specify the keys used in that domain's TLS servers. This requires matching improvements in TLS client software, but no change in TLS server software. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6698"/>
  <seriesInfo name="DOI" value="10.17487/RFC6698"/>
</reference>

<reference anchor="RFC7671">
  <front>
    <title>The DNS-Based Authentication of Named Entities (DANE) Protocol: Updates and Operational Guidance</title>
    <author fullname="V. Dukhovni" initials="V." surname="Dukhovni"/>
    <author fullname="W. Hardaker" initials="W." surname="Hardaker"/>
    <date month="October" year="2015"/>
    <abstract>
      <t>This document clarifies and updates the DNS-Based Authentication of Named Entities (DANE) TLSA specification (RFC 6698), based on subsequent implementation experience. It also contains guidance for implementers, operators, and protocol developers who want to use DANE records.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7671"/>
  <seriesInfo name="DOI" value="10.17487/RFC7671"/>
</reference>

<reference anchor="RFC4509">
  <front>
    <title>Use of SHA-256 in DNSSEC Delegation Signer (DS) Resource Records (RRs)</title>
    <author fullname="W. Hardaker" initials="W." surname="Hardaker"/>
    <date month="May" year="2006"/>
    <abstract>
      <t>This document specifies how to use the SHA-256 digest type in DNS Delegation Signer (DS) Resource Records (RRs). DS records, when stored in a parent zone, point to DNSKEYs in a child zone. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4509"/>
  <seriesInfo name="DOI" value="10.17487/RFC4509"/>
</reference>

<reference anchor="RFC7344">
  <front>
    <title>Automating DNSSEC Delegation Trust Maintenance</title>
    <author fullname="W. Kumari" initials="W." surname="Kumari"/>
    <author fullname="O. Gudmundsson" initials="O." surname="Gudmundsson"/>
    <author fullname="G. Barwood" initials="G." surname="Barwood"/>
    <date month="September" year="2014"/>
    <abstract>
      <t>This document describes a method to allow DNS Operators to more easily update DNSSEC Key Signing Keys using the DNS as a communication channel. The technique described is aimed at delegations in which it is currently hard to move information from the Child to Parent.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7344"/>
  <seriesInfo name="DOI" value="10.17487/RFC7344"/>
</reference>

<reference anchor="RFC8078">
  <front>
    <title>Managing DS Records from the Parent via CDS/CDNSKEY</title>
    <author fullname="O. Gudmundsson" initials="O." surname="Gudmundsson"/>
    <author fullname="P. Wouters" initials="P." surname="Wouters"/>
    <date month="March" year="2017"/>
    <abstract>
      <t>RFC 7344 specifies how DNS trust can be maintained across key rollovers in-band between parent and child. This document elevates RFC 7344 from Informational to Standards Track. It also adds a method for initial trust setup and removal of a secure entry point.</t>
      <t>Changing a domain's DNSSEC status can be a complicated matter involving multiple unrelated parties. Some of these parties, such as the DNS operator, might not even be known by all the organizations involved. The inability to disable DNSSEC via in-band signaling is seen as a problem or liability that prevents some DNSSEC adoption at a large scale. This document adds a method for in-band signaling of these DNSSEC status changes.</t>
      <t>This document describes reasonable policies to ease deployment of the initial acceptance of new secure entry points (DS records).</t>
      <t>It is preferable that operators collaborate on the transfer or move of a domain. The best method is to perform a Key Signing Key (KSK) plus Zone Signing Key (ZSK) rollover. If that is not possible, the method using an unsigned intermediate state described in this document can be used to move the domain between two parties. This leaves the domain temporarily unsigned and vulnerable to DNS spoofing, but that is preferred over the alternative of validation failures due to a mismatched DS and DNSKEY record.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8078"/>
  <seriesInfo name="DOI" value="10.17487/RFC8078"/>
</reference>

<reference anchor="RFC8624">
  <front>
    <title>Algorithm Implementation Requirements and Usage Guidance for DNSSEC</title>
    <author fullname="P. Wouters" initials="P." surname="Wouters"/>
    <author fullname="O. Sury" initials="O." surname="Sury"/>
    <date month="June" year="2019"/>
    <abstract>
      <t>The DNSSEC protocol makes use of various cryptographic algorithms in order to provide authentication of DNS data and proof of nonexistence. To ensure interoperability between DNS resolvers and DNS authoritative servers, it is necessary to specify a set of algorithm implementation requirements and usage guidelines to ensure that there is at least one algorithm that all implementations support. This document defines the current algorithm implementation requirements and usage guidance for DNSSEC. This document obsoletes RFC 6944.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8624"/>
  <seriesInfo name="DOI" value="10.17487/RFC8624"/>
</reference>

<reference anchor="RFC6605">
  <front>
    <title>Elliptic Curve Digital Signature Algorithm (DSA) for DNSSEC</title>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <author fullname="W.C.A. Wijngaards" initials="W.C.A." surname="Wijngaards"/>
    <date month="April" year="2012"/>
    <abstract>
      <t>This document describes how to specify Elliptic Curve Digital Signature Algorithm (DSA) keys and signatures in DNS Security (DNSSEC). It lists curves of different sizes and uses the SHA-2 family of hashes for signatures. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6605"/>
  <seriesInfo name="DOI" value="10.17487/RFC6605"/>
</reference>

<reference anchor="RFC8080">
  <front>
    <title>Edwards-Curve Digital Security Algorithm (EdDSA) for DNSSEC</title>
    <author fullname="O. Sury" initials="O." surname="Sury"/>
    <author fullname="R. Edmonds" initials="R." surname="Edmonds"/>
    <date month="February" year="2017"/>
    <abstract>
      <t>This document describes how to specify Edwards-curve Digital Security Algorithm (EdDSA) keys and signatures in DNS Security (DNSSEC). It uses EdDSA with the choice of two curves: Ed25519 and Ed448.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8080"/>
  <seriesInfo name="DOI" value="10.17487/RFC8080"/>
</reference>

<reference anchor="RFC6781">
  <front>
    <title>DNSSEC Operational Practices, Version 2</title>
    <author fullname="O. Kolkman" initials="O." surname="Kolkman"/>
    <author fullname="W. Mekking" initials="W." surname="Mekking"/>
    <author fullname="R. Gieben" initials="R." surname="Gieben"/>
    <date month="December" year="2012"/>
    <abstract>
      <t>This document describes a set of practices for operating the DNS with security extensions (DNSSEC). The target audience is zone administrators deploying DNSSEC.</t>
      <t>The document discusses operational aspects of using keys and signatures in the DNS. It discusses issues of key generation, key storage, signature generation, key rollover, and related policies.</t>
      <t>This document obsoletes RFC 4641, as it covers more operational ground and gives more up-to-date requirements with respect to key sizes and the DNSSEC operations.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6781"/>
  <seriesInfo name="DOI" value="10.17487/RFC6781"/>
</reference>

<reference anchor="RFC5155">
  <front>
    <title>DNS Security (DNSSEC) Hashed Authenticated Denial of Existence</title>
    <author fullname="B. Laurie" initials="B." surname="Laurie"/>
    <author fullname="G. Sisson" initials="G." surname="Sisson"/>
    <author fullname="R. Arends" initials="R." surname="Arends"/>
    <author fullname="D. Blacka" initials="D." surname="Blacka"/>
    <date month="March" year="2008"/>
    <abstract>
      <t>The Domain Name System Security (DNSSEC) Extensions introduced the NSEC resource record (RR) for authenticated denial of existence. This document introduces an alternative resource record, NSEC3, which similarly provides authenticated denial of existence. However, it also provides measures against zone enumeration and permits gradual expansion of delegation-centric zones. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5155"/>
  <seriesInfo name="DOI" value="10.17487/RFC5155"/>
</reference>

<reference anchor="RFC2308">
  <front>
    <title>Negative Caching of DNS Queries (DNS NCACHE)</title>
    <author fullname="M. Andrews" initials="M." surname="Andrews"/>
    <date month="March" year="1998"/>
    <abstract>
      <t>RFC1034 provided a description of how to cache negative responses. It however had a fundamental flaw in that it did not allow a name server to hand out those cached responses to other resolvers, thereby greatly reducing the effect of the caching. This document addresses issues raise in the light of experience and replaces RFC1034 Section 4.3.4. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2308"/>
  <seriesInfo name="DOI" value="10.17487/RFC2308"/>
</reference>

<reference anchor="RFC7766">
  <front>
    <title>DNS Transport over TCP - Implementation Requirements</title>
    <author fullname="J. Dickinson" initials="J." surname="Dickinson"/>
    <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
    <author fullname="R. Bellis" initials="R." surname="Bellis"/>
    <author fullname="A. Mankin" initials="A." surname="Mankin"/>
    <author fullname="D. Wessels" initials="D." surname="Wessels"/>
    <date month="March" year="2016"/>
    <abstract>
      <t>This document specifies the requirement for support of TCP as a transport protocol for DNS implementations and provides guidelines towards DNS-over-TCP performance on par with that of DNS-over-UDP. This document obsoletes RFC 5966 and therefore updates RFC 1035 and RFC 1123.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7766"/>
  <seriesInfo name="DOI" value="10.17487/RFC7766"/>
</reference>

<reference anchor="RFC2845">
  <front>
    <title>Secret Key Transaction Authentication for DNS (TSIG)</title>
    <author fullname="P. Vixie" initials="P." surname="Vixie"/>
    <author fullname="O. Gudmundsson" initials="O." surname="Gudmundsson"/>
    <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
    <author fullname="B. Wellington" initials="B." surname="Wellington"/>
    <date month="May" year="2000"/>
    <abstract>
      <t>This protocol allows for transaction level authentication using shared secrets and one way hashing. It can be used to authenticate dynamic updates as coming from an approved client, or to authenticate responses as coming from an approved recursive name server. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2845"/>
  <seriesInfo name="DOI" value="10.17487/RFC2845"/>
</reference>

<reference anchor="RFC1996">
  <front>
    <title>A Mechanism for Prompt Notification of Zone Changes (DNS NOTIFY)</title>
    <author fullname="P. Vixie" initials="P." surname="Vixie"/>
    <date month="August" year="1996"/>
    <abstract>
      <t>This memo describes the NOTIFY opcode for DNS, by which a master server advises a set of slave servers that the master's data has been changed and that a query should be initiated to discover the new data. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="1996"/>
  <seriesInfo name="DOI" value="10.17487/RFC1996"/>
</reference>

<reference anchor="RFC5936">
  <front>
    <title>DNS Zone Transfer Protocol (AXFR)</title>
    <author fullname="E. Lewis" initials="E." surname="Lewis"/>
    <author fullname="A. Hoenes" initials="A." role="editor" surname="Hoenes"/>
    <date month="June" year="2010"/>
    <abstract>
      <t>The standard means within the Domain Name System protocol for maintaining coherence among a zone's authoritative name servers consists of three mechanisms. Authoritative Transfer (AXFR) is one of the mechanisms and is defined in RFC 1034 and RFC 1035.</t>
      <t>The definition of AXFR has proven insufficient in detail, thereby forcing implementations intended to be compliant to make assumptions, impeding interoperability. Yet today we have a satisfactory set of implementations that do interoperate. This document is a new definition of AXFR -- new in the sense that it records an accurate definition of an interoperable AXFR mechanism. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5936"/>
  <seriesInfo name="DOI" value="10.17487/RFC5936"/>
</reference>

<reference anchor="RFC8976">
  <front>
    <title>Message Digest for DNS Zones</title>
    <author fullname="D. Wessels" initials="D." surname="Wessels"/>
    <author fullname="P. Barber" initials="P." surname="Barber"/>
    <author fullname="M. Weinberg" initials="M." surname="Weinberg"/>
    <author fullname="W. Kumari" initials="W." surname="Kumari"/>
    <author fullname="W. Hardaker" initials="W." surname="Hardaker"/>
    <date month="February" year="2021"/>
    <abstract>
      <t>This document describes a protocol and new DNS Resource Record that provides a cryptographic message digest over DNS zone data at rest. The ZONEMD Resource Record conveys the digest data in the zone itself. When used in combination with DNSSEC, ZONEMD allows recipients to verify the zone contents for data integrity and origin authenticity. This provides assurance that received zone data matches published data, regardless of how the zone data has been transmitted and received. When used without DNSSEC, ZONEMD functions as a checksum, guarding only against unintentional changes.</t>
      <t>ZONEMD does not replace DNSSEC: DNSSEC protects individual RRsets (DNS data with fine granularity), whereas ZONEMD protects a zone's data as a whole, whether consumed by authoritative name servers, recursive name servers, or any other applications.</t>
      <t>As specified herein, ZONEMD is impractical for large, dynamic zones due to the time and resources required for digest calculation. However, the ZONEMD record is extensible so that new digest schemes may be added in the future to support large, dynamic zones.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8976"/>
  <seriesInfo name="DOI" value="10.17487/RFC8976"/>
</reference>

<reference anchor="RFC7873">
  <front>
    <title>Domain Name System (DNS) Cookies</title>
    <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
    <author fullname="M. Andrews" initials="M." surname="Andrews"/>
    <date month="May" year="2016"/>
    <abstract>
      <t>DNS Cookies are a lightweight DNS transaction security mechanism that provides limited protection to DNS servers and clients against a variety of increasingly common denial-of-service and amplification/ forgery or cache poisoning attacks by off-path attackers. DNS Cookies are tolerant of NAT, NAT-PT (Network Address Translation - Protocol Translation), and anycast and can be incrementally deployed. (Since DNS Cookies are only returned to the IP address from which they were originally received, they cannot be used to generally track Internet users.)</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7873"/>
  <seriesInfo name="DOI" value="10.17487/RFC7873"/>
</reference>

<reference anchor="RFC9018">
  <front>
    <title>Interoperable Domain Name System (DNS) Server Cookies</title>
    <author fullname="O. Sury" initials="O." surname="Sury"/>
    <author fullname="W. Toorop" initials="W." surname="Toorop"/>
    <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
    <author fullname="M. Andrews" initials="M." surname="Andrews"/>
    <date month="April" year="2021"/>
    <abstract>
      <t>DNS Cookies, as specified in RFC 7873, are a lightweight DNS transaction security mechanism that provide limited protection to DNS servers and clients against a variety of denial-of-service amplification, forgery, or cache-poisoning attacks by off-path attackers.</t>
      <t>This document updates RFC 7873 with precise directions for creating Server Cookies so that an anycast server set including diverse implementations will interoperate with standard clients, with suggestions for constructing Client Cookies in a privacy-preserving fashion, and with suggestions on how to update a Server Secret. An IANA registry listing the methods and associated pseudorandom function suitable for creating DNS Server Cookies has been created with the method described in this document as the first and, as of the time of publication, only entry.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9018"/>
  <seriesInfo name="DOI" value="10.17487/RFC9018"/>
</reference>

<reference anchor="RFC2782">
  <front>
    <title>A DNS RR for specifying the location of services (DNS SRV)</title>
    <author fullname="A. Gulbrandsen" initials="A." surname="Gulbrandsen"/>
    <author fullname="P. Vixie" initials="P." surname="Vixie"/>
    <author fullname="L. Esibov" initials="L." surname="Esibov"/>
    <date month="February" year="2000"/>
    <abstract>
      <t>This document describes a DNS RR which specifies the location of the server(s) for a specific protocol and domain. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2782"/>
  <seriesInfo name="DOI" value="10.17487/RFC2782"/>
</reference>

<reference anchor="RFC7553">
  <front>
    <title>The Uniform Resource Identifier (URI) DNS Resource Record</title>
    <author fullname="P. Faltstrom" initials="P." surname="Faltstrom"/>
    <author fullname="O. Kolkman" initials="O." surname="Kolkman"/>
    <date month="June" year="2015"/>
    <abstract>
      <t>This document describes the already registered DNS resource record (RR) type, called the Uniform Resource Identifier (URI) RR, that is used for publishing mappings from hostnames to URIs.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7553"/>
  <seriesInfo name="DOI" value="10.17487/RFC7553"/>
</reference>

<reference anchor="RFC6891">
  <front>
    <title>Extension Mechanisms for DNS (EDNS(0))</title>
    <author fullname="J. Damas" initials="J." surname="Damas"/>
    <author fullname="M. Graff" initials="M." surname="Graff"/>
    <author fullname="P. Vixie" initials="P." surname="Vixie"/>
    <date month="April" year="2013"/>
    <abstract>
      <t>The Domain Name System's wire protocol includes a number of fixed fields whose range has been or soon will be exhausted and does not allow requestors to advertise their capabilities to responders. This document describes backward-compatible mechanisms for allowing the protocol to grow.</t>
      <t>This document updates the Extension Mechanisms for DNS (EDNS(0)) specification (and obsoletes RFC 2671) based on feedback from deployment experience in several implementations. It also obsoletes RFC 2673 ("Binary Labels in the Domain Name System") and adds considerations on the use of extended labels in the DNS.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="75"/>
  <seriesInfo name="RFC" value="6891"/>
  <seriesInfo name="DOI" value="10.17487/RFC6891"/>
</reference>

<reference anchor="RFC8198">
  <front>
    <title>Aggressive Use of DNSSEC-Validated Cache</title>
    <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
    <author fullname="A. Kato" initials="A." surname="Kato"/>
    <author fullname="W. Kumari" initials="W." surname="Kumari"/>
    <date month="July" year="2017"/>
    <abstract>
      <t>The DNS relies upon caching to scale; however, the cache lookup generally requires an exact match. This document specifies the use of NSEC/NSEC3 resource records to allow DNSSEC-validating resolvers to generate negative answers within a range and positive answers from wildcards. This increases performance, decreases latency, decreases resource utilization on both authoritative and recursive servers, and increases privacy. Also, it may help increase resilience to certain DoS attacks in some circumstances.</t>
      <t>This document updates RFC 4035 by allowing validating resolvers to generate negative answers based upon NSEC/NSEC3 records and positive answers in the presence of wildcards.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8198"/>
  <seriesInfo name="DOI" value="10.17487/RFC8198"/>
</reference>

<reference anchor="RFC8767">
  <front>
    <title>Serving Stale Data to Improve DNS Resiliency</title>
    <author fullname="D. Lawrence" initials="D." surname="Lawrence"/>
    <author fullname="W. Kumari" initials="W." surname="Kumari"/>
    <author fullname="P. Sood" initials="P." surname="Sood"/>
    <date month="March" year="2020"/>
    <abstract>
      <t>This document defines a method (serve-stale) for recursive resolvers to use stale DNS data to avoid outages when authoritative nameservers cannot be reached to refresh expired data. One of the motivations for serve-stale is to make the DNS more resilient to DoS attacks and thereby make them less attractive as an attack vector. This document updates the definitions of TTL from RFCs 1034 and 1035 so that data can be kept in the cache beyond the TTL expiry; it also updates RFC 2181 by interpreting values with the high-order bit set as being positive, rather than 0, and suggests a cap of 7 days.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8767"/>
  <seriesInfo name="DOI" value="10.17487/RFC8767"/>
</reference>

<reference anchor="RFC9462">
  <front>
    <title>Discovery of Designated Resolvers</title>
    <author fullname="T. Pauly" initials="T." surname="Pauly"/>
    <author fullname="E. Kinnear" initials="E." surname="Kinnear"/>
    <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
    <author fullname="P. McManus" initials="P." surname="McManus"/>
    <author fullname="T. Jensen" initials="T." surname="Jensen"/>
    <date month="November" year="2023"/>
    <abstract>
      <t>This document defines Discovery of Designated Resolvers (DDR), a set of mechanisms for DNS clients to use DNS records to discover a resolver's encrypted DNS configuration. An Encrypted DNS Resolver discovered in this manner is referred to as a "Designated Resolver". These mechanisms can be used to move from unencrypted DNS to encrypted DNS when only the IP address of a resolver is known. These mechanisms are designed to be limited to cases where Unencrypted DNS Resolvers and their Designated Resolvers are operated by the same entity or cooperating entities. It can also be used to discover support for encrypted DNS protocols when the name of an Encrypted DNS Resolver is known.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9462"/>
  <seriesInfo name="DOI" value="10.17487/RFC9462"/>
</reference>

<reference anchor="RFC9463">
  <front>
    <title>DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers (DNR)</title>
    <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
    <author fullname="T. Reddy.K" initials="T." role="editor" surname="Reddy.K"/>
    <author fullname="D. Wing" initials="D." surname="Wing"/>
    <author fullname="N. Cook" initials="N." surname="Cook"/>
    <author fullname="T. Jensen" initials="T." surname="Jensen"/>
    <date month="November" year="2023"/>
    <abstract>
      <t>This document specifies new DHCP and IPv6 Router Advertisement options to discover encrypted DNS resolvers (e.g., DNS over HTTPS, DNS over TLS, and DNS over QUIC). Particularly, it allows a host to learn an Authentication Domain Name together with a list of IP addresses and a set of service parameters to reach such encrypted DNS resolvers.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9463"/>
  <seriesInfo name="DOI" value="10.17487/RFC9463"/>
</reference>

<reference anchor="RFC8446">
  <front>
    <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
    <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
    <date month="August" year="2018"/>
    <abstract>
      <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
      <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8446"/>
  <seriesInfo name="DOI" value="10.17487/RFC8446"/>
</reference>

<reference anchor="RFC8555">
  <front>
    <title>Automatic Certificate Management Environment (ACME)</title>
    <author fullname="R. Barnes" initials="R." surname="Barnes"/>
    <author fullname="J. Hoffman-Andrews" initials="J." surname="Hoffman-Andrews"/>
    <author fullname="D. McCarney" initials="D." surname="McCarney"/>
    <author fullname="J. Kasten" initials="J." surname="Kasten"/>
    <date month="March" year="2019"/>
    <abstract>
      <t>Public Key Infrastructure using X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names. Thus, certification authorities (CAs) in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate. As of this writing, this verification is done through a collection of ad hoc mechanisms. This document describes a protocol that a CA and an applicant can use to automate the process of verification and certificate issuance. The protocol also provides facilities for other certificate management functions, such as certificate revocation.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8555"/>
  <seriesInfo name="DOI" value="10.17487/RFC8555"/>
</reference>

<reference anchor="RFC8552">
  <front>
    <title>Scoped Interpretation of DNS Resource Records through "Underscored" Naming of Attribute Leaves</title>
    <author fullname="D. Crocker" initials="D." surname="Crocker"/>
    <date month="March" year="2019"/>
    <abstract>
      <t>Formally, any DNS Resource Record (RR) may occur under any domain name. However, some services use an operational convention for defining specific interpretations of an RRset by locating the records in a DNS branch under the parent domain to which the RRset actually applies. The top of this subordinate branch is defined by a naming convention that uses a reserved node name, which begins with the underscore character (e.g., "_name"). The underscored naming construct defines a semantic scope for DNS record types that are associated with the parent domain above the underscored branch. This specification explores the nature of this DNS usage and defines the "Underscored and Globally Scoped DNS Node Names" registry with IANA. The purpose of this registry is to avoid collisions resulting from the use of the same underscored name for different services.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="222"/>
  <seriesInfo name="RFC" value="8552"/>
  <seriesInfo name="DOI" value="10.17487/RFC8552"/>
</reference>




    </references>

</references>


<?line 717?>

<section numbered="false" anchor="acknowledgments"><name>Acknowledgments</name>

<t>The authors thank Ross Gibson for his contributions, questions and comments.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

