<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.2 (Ruby 2.6.10) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-wesplaap-deleg-transport-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.2 -->
  <front>
    <title abbrev="DELEG">Extensible Delegation for DNS using different transport protocols</title>
    <seriesInfo name="Internet-Draft" value="draft-wesplaap-deleg-transport-00"/>
    <author initials="T." surname="April" fullname="Tim April">
      <organization/>
      <address>
        <email>ietf@tapril.net</email>
      </address>
    </author>
    <author initials="P." surname="Špaček" fullname="Petr Špaček">
      <organization>ISC</organization>
      <address>
        <email>pspacek@isc.org</email>
      </address>
    </author>
    <author initials="R." surname="Weber" fullname="Ralf Weber">
      <organization>Akamai Technologies</organization>
      <address>
        <email>rweber@akamai.com</email>
      </address>
    </author>
    <author initials="D." surname="Lawrence" fullname="David C Lawrence">
      <organization>Salesforce</organization>
      <address>
        <email>tale@dd.org</email>
      </address>
    </author>
    <date/>
    <area>Internet</area>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 104?>

<t>This document extends DELEG record, and SVCB records pointed to by DELEG record, as defined in <xref target="I-D.draft-wesplaap-deleg"/>, with ability to specify transport protocols and authentication parameters supported by name servers.</t>
    </abstract>
  </front>
  <middle>
    <?line 108?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The new delegation mechanism based on DELEG record type allows to specify attributes a resolver can use when talking to a delegated authority. This document introduces parameters specific to different transport mechanism than the default udp/53 protocol.</t>
      <t>Legacy DNS resolvers unaware of DELEG mechanism would continue to use the NS and DS records, while resolvers that understand DELEG and its associated parameters can efficiently switch to new transports.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in <br/>
BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in
all capitals, as shown here.</t>
        <t>Terminology regarding the Domain Name System comes from <xref target="BCP219"/>, with addition terms defined here:</t>
        <ul spacing="normal">
          <li>
            <t>legacy transport name servers: An authoritative name server that only supports unencrypted DNS via UDP/TCP port 53</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="new-dns-transports">
      <name>New DNS transports</name>
      <t>There has been a lot of work defining new ways to transport DNS over new encrypted protocols. While most of this work was focusd on the client/stub resolver to recursive resolver connection the protocols will remain the same for an recursive to authoritative connections when iterating for a name. These are:</t>
      <ul spacing="normal">
        <li>
          <t>DNS over TLS as defined in <xref target="RFC7858"/></t>
        </li>
        <li>
          <t>DNS over HTTPS as defined in <xref target="RFC8484"/></t>
        </li>
        <li>
          <t>DNS over Dedicated QUIC Connections <contact fullname="RFC9250"/></t>
        </li>
      </ul>
      <t>While the DNS over HTTPs recommends HTTP/2 <xref target="RFC9113"/> as the minimum version there are no differences when using to over HTTP/3 <xref target="RFC9114"/>.</t>
      <section anchor="selecting-transport-protocols">
        <name>Selecting transport protocols</name>
        <t>The selection of the transport protocol to use to connect to an authoritative server for a delegation is done by the ALPN parameter as defined in <xref target="RFC9460"/>.</t>
        <t>If there is no ALPN parameter the connection MUST be established using unencrypted DNS over UDP/TCP on port 53.</t>
        <t>If there is an ALPN parameter up to 4 protocols in the list MUST be tried to connect to the authoritative server.</t>
        <t>The following ALPN are allowed to be used and may need the additional parameters as defined in this table:
| ALPN  | parameters |
|-------|------------|
| dot   |            |
| doq   |            |
| h2    | dohpath    |
| h3    | dohpath    |</t>
      </section>
      <section anchor="authenticating-transport-protocols">
        <name>Authenticating transport protocols</name>
        <t>As all defined transport protocols here rely on TLS the authentication for the authentication of them is identical. When no TLSA parameter is present authentication is MUST be done using the normal PKI infrastructure of the recursive resolver. The name used for the authentication is the target name of the DELEG or SVCB record. When a TLSA paramert is present the authentication MUST be done using the digests in that record</t>
        <section anchor="tlsa-parameter">
          <name>"TLSA" parameter</name>
          <t>The "TLSA" SvcParamKey is a transport parameter representing a TLSA RRset <xref target="RFC6698"/> to be used when connecting to TargetName using a TLS-based transport.</t>
          <t>The SvcParamValue is a non-empty value-list.  The presentation and wire format of each value is the same as the presentation and wire format described for the TLSA record as defined in <xref target="RFC6698"/>, sections 2.1 and 2.2 respectively.  To avoid wasting resources in the parent zone parents MAY reject RRSets containing "tlsa" SvcParams that use matching type 0 (exact match).</t>
        </section>
        <section anchor="authentication-failures">
          <name>Authentication Failures</name>
          <t>When a resolver attempts to access nameserver delegated by a DELEG or SVCB record, if a connection error occurs, such as a certificate mismatch or unreachable server, the resolver SHOULD attempt to connect to the other nameservers delegated to until either exhausting the list or the resolver's policy indicates that they should treat the resolution as failed.</t>
        </section>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>All of the information handled or transmitted by this protocol is public information published in the DNS.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO: Fill this section out</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="new-svcparamkey-values">
        <name>New SvcParamKey Values</name>
        <t>This document defines new SvcParamKey values in the "Service Binding (SVCB) Parameter Registry".</t>
        <table>
          <thead>
            <tr>
              <th align="left">SvcParamKey</th>
              <th align="left">NAME</th>
              <th align="left">Meaning</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TBD1</td>
              <td align="left">tlsa</td>
              <td align="left">TLSA RRset</td>
              <td align="left">(This Document)</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="I-D.draft-wesplaap-deleg">
        <front>
          <title>Extensible Delegation for DNS</title>
          <author fullname="Tim April" initials="T." surname="April">
            <organization>Google, LLC</organization>
          </author>
          <author fullname="Petr Špaček" initials="P." surname="Špaček">
            <organization>ISC</organization>
          </author>
          <author fullname="Ralf Weber" initials="R." surname="Weber">
            <organization>Akamai Technologies</organization>
          </author>
          <author fullname="David C Lawrence" initials="" surname="Lawrence">
            <organization>Salesforce</organization>
          </author>
          <date day="18" month="February" year="2025"/>
          <abstract>
            <t>   A delegation in the Domain Name System (DNS) is a mechanism that
   enables efficient and distributed management of the DNS namespace.
   It involves delegating authority over subdomains to specific DNS
   servers via NS records, allowing for a hierarchical structure and
   distributing the responsibility for maintaining DNS records.

   An NS record contains the hostname of the nameserver for the
   delegated namespace.  Any facilities of that nameserver must be
   discovered through other mechanisms.  This document proposes a new
   extensible DNS record type, DELEG, for delegation the authority for a
   domain.  Future documents then can use this mechanism to use
   additional information about the delegated namespace and the
   capabilities of authoritative nameservers for the delegated
   namespace.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-wesplaap-deleg-02"/>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
      <referencegroup anchor="BCP219" target="https://www.rfc-editor.org/info/bcp219">
        <reference anchor="RFC9499" target="https://www.rfc-editor.org/info/rfc9499">
          <front>
            <title>DNS Terminology</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
              <t>This document updates RFC 2308 by clarifying the definitions of "forwarder" and "QNAME". It obsoletes RFC 8499 by adding multiple terms and clarifications. Comprehensive lists of changed and new definitions can be found in Appendices A and B.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="219"/>
          <seriesInfo name="RFC" value="9499"/>
          <seriesInfo name="DOI" value="10.17487/RFC9499"/>
        </reference>
      </referencegroup>
      <reference anchor="RFC7858">
        <front>
          <title>Specification for DNS over Transport Layer Security (TLS)</title>
          <author fullname="Z. Hu" initials="Z." surname="Hu"/>
          <author fullname="L. Zhu" initials="L." surname="Zhu"/>
          <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
          <author fullname="A. Mankin" initials="A." surname="Mankin"/>
          <author fullname="D. Wessels" initials="D." surname="Wessels"/>
          <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
          <date month="May" year="2016"/>
          <abstract>
            <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
            <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7858"/>
        <seriesInfo name="DOI" value="10.17487/RFC7858"/>
      </reference>
      <reference anchor="RFC8484" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8484.xml">
        <front>
          <title>DNS Queries over HTTPS (DoH)</title>
          <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
          <author fullname="P. McManus" initials="P." surname="McManus"/>
          <date month="October" year="2018"/>
          <abstract>
            <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8484"/>
        <seriesInfo name="DOI" value="10.17487/RFC8484"/>
      </reference>
      <reference anchor="RFC9250" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9250.xml">
        <front>
          <title>DNS over Dedicated QUIC Connections</title>
          <author fullname="C. Huitema" initials="C." surname="Huitema"/>
          <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
          <author fullname="A. Mankin" initials="A." surname="Mankin"/>
          <date month="May" year="2022"/>
          <abstract>
            <t>This document describes the use of QUIC to provide transport confidentiality for DNS. The encryption provided by QUIC has similar properties to those provided by TLS, while QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides more efficient packet-loss recovery than UDP. DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC 7858, and latency characteristics similar to classic DNS over UDP. This specification describes the use of DoQ as a general-purpose transport for DNS and includes the use of DoQ for stub to recursive, recursive to authoritative, and zone transfer scenarios.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9250"/>
        <seriesInfo name="DOI" value="10.17487/RFC9250"/>
      </reference>
      <reference anchor="RFC9113" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9113.xml">
        <front>
          <title>HTTP/2</title>
          <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
          <author fullname="C. Benfield" initials="C." role="editor" surname="Benfield"/>
          <date month="June" year="2022"/>
          <abstract>
            <t>This specification describes an optimized expression of the semantics of the Hypertext Transfer Protocol (HTTP), referred to as HTTP version 2 (HTTP/2). HTTP/2 enables a more efficient use of network resources and a reduced latency by introducing field compression and allowing multiple concurrent exchanges on the same connection.</t>
            <t>This document obsoletes RFCs 7540 and 8740.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9113"/>
        <seriesInfo name="DOI" value="10.17487/RFC9113"/>
      </reference>
      <reference anchor="RFC9114" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9114.xml">
        <front>
          <title>HTTP/3</title>
          <author fullname="M. Bishop" initials="M." role="editor" surname="Bishop"/>
          <date month="June" year="2022"/>
          <abstract>
            <t>The QUIC transport protocol has several features that are desirable in a transport for HTTP, such as stream multiplexing, per-stream flow control, and low-latency connection establishment. This document describes a mapping of HTTP semantics over QUIC. This document also identifies HTTP/2 features that are subsumed by QUIC and describes how HTTP/2 extensions can be ported to HTTP/3.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9114"/>
        <seriesInfo name="DOI" value="10.17487/RFC9114"/>
      </reference>
      <reference anchor="RFC9460">
        <front>
          <title>Service Binding and Parameter Specification via the DNS (SVCB and HTTPS Resource Records)</title>
          <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
          <author fullname="M. Bishop" initials="M." surname="Bishop"/>
          <author fullname="E. Nygren" initials="E." surname="Nygren"/>
          <date month="November" year="2023"/>
          <abstract>
            <t>This document specifies the "SVCB" ("Service Binding") and "HTTPS" DNS resource record (RR) types to facilitate the lookup of information needed to make connections to network services, such as for HTTP origins. SVCB records allow a service to be provided from multiple alternative endpoints, each with associated parameters (such as transport protocol configuration), and are extensible to support future uses (such as keys for encrypting the TLS ClientHello). They also enable aliasing of apex domains, which is not possible with CNAME. The HTTPS RR is a variation of SVCB for use with HTTP (see RFC 9110, "HTTP Semantics"). By providing more information to the client before it attempts to establish a connection, these records offer potential benefits to both performance and privacy.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9460"/>
        <seriesInfo name="DOI" value="10.17487/RFC9460"/>
      </reference>
      <reference anchor="RFC6698">
        <front>
          <title>The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA</title>
          <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
          <author fullname="J. Schlyter" initials="J." surname="Schlyter"/>
          <date month="August" year="2012"/>
          <abstract>
            <t>Encrypted communication on the Internet often uses Transport Layer Security (TLS), which depends on third parties to certify the keys used. This document improves on that situation by enabling the administrators of domain names to specify the keys used in that domain's TLS servers. This requires matching improvements in TLS client software, but no change in TLS server software. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6698"/>
        <seriesInfo name="DOI" value="10.17487/RFC6698"/>
      </reference>
    </references>
    <?line 187?>

<section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This draft is heavily based on past work (draft-tapril-ns2) done by Tim April and thus extends the thanks to the people helping on this which are:
John Levine, Erik Nygren, Jon Reed, Ben Kaduk, Mashooq Muhaimen, Jason Moreau, Jerrod Wiesman, Billy Tiemann, Gordon Marx and Brian Wellington.</t>
    </section>
    <section anchor="todo">
      <name>TODO</name>
      <dl>
        <dt>RFC EDITOR:</dt>
        <dd>
          <t>PLEASE REMOVE THE THIS SECTION PRIOR TO PUBLICATION.</t>
        </dd>
      </dl>
      <ul spacing="normal">
        <li>
          <t>Write a security considerations section</t>
        </li>
      </ul>
    </section>
    <section anchor="change-log">
      <name>Change Log</name>
      <dl>
        <dt>RFC EDITOR:</dt>
        <dd>
          <t>PLEASE REMOVE THE THIS SECTION PRIOR TO PUBLICATION.</t>
        </dd>
      </dl>
      <t>~~~
01234567890123456789012345678901234567890123456789012345678901234567891</t>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="C." surname="Elmerot" fullname="Christian Elmerot">
        <organization>Cloudflare</organization>
        <address>
          <email>christian@elmerot.se</email>
        </address>
      </contact>
      <contact initials="E." surname="Lewis" fullname="Edward Lewis">
        <organization>ICANN</organization>
        <address>
          <email>edward.lewis@icann.org</email>
        </address>
      </contact>
      <contact initials="S." surname="Huque" fullname="Shumon Huque">
        <organization>Salesforce</organization>
        <address>
          <email>shuque@gmail.com</email>
        </address>
      </contact>
      <contact initials="K." surname="Darilion" fullname="Klaus Darilion">
        <organization>nic.at</organization>
        <address>
          <email>klaus.darilion@nic.at</email>
        </address>
      </contact>
      <contact initials="L." surname="Peltan" fullname="Libor Peltan">
        <organization>CZ.nic</organization>
        <address>
          <email>libor.peltan@nic.cz</email>
        </address>
      </contact>
      <contact initials="V." surname="Čunát" fullname="Vladimír Čunát">
        <organization>CZ.nic</organization>
        <address>
          <email>vladimir.cunat@nic.cz</email>
        </address>
      </contact>
      <contact initials="S." surname="Kerr" fullname="Shane Kerr">
        <organization>NS1</organization>
        <address>
          <email>shane@time-travellers.org</email>
        </address>
      </contact>
      <contact initials="D." surname="Blacka" fullname="David Blacka">
        <organization>Verisign</organization>
        <address>
          <email>davidb@verisign.com</email>
        </address>
      </contact>
      <contact initials="G." surname="Michaelson" fullname="George Michaelson">
        <organization>APNIC</organization>
        <address>
          <email>ggm@algebras.org</email>
        </address>
      </contact>
      <contact initials="B." surname="Schwartz" fullname="Ben Schwartz">
        <organization>Meta</organization>
        <address>
          <email>bemasc@meta.com</email>
        </address>
      </contact>
      <contact initials="J." surname="Včelák" fullname="Jan Včelák">
        <organization>NS1</organization>
        <address>
          <email>jvcelak@ns1.com</email>
        </address>
      </contact>
      <contact initials="P. van" surname="Dijk" fullname="Peter van Dijk">
        <organization>PowerDNS</organization>
        <address>
          <email>peter.van.dijk@powerdns.com</email>
        </address>
      </contact>
      <contact initials="P." surname="Homburg" fullname="Philip Homburg">
        <organization>NLnet Labs</organization>
        <address>
          <email>philip@nlnetlabs.nl</email>
        </address>
      </contact>
      <contact initials="E." surname="Nygren" fullname="Erik Nygren">
        <organization>Akamai Technologies</organization>
        <address>
          <email>erik+ietf@nygren.org</email>
        </address>
      </contact>
      <contact initials="V." surname="Adhvaryu" fullname="Vandan Adhvaryu">
        <organization>Team Internet</organization>
        <address>
          <email>vandan@adhvaryu.uk</email>
        </address>
      </contact>
      <contact initials="M." surname="Bretelle" fullname="Manu Bretelle">
        <organization>Meta</organization>
        <address>
          <email>chantr4@gmail.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
