<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.22 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-bellis-dnsext-multi-qtypes-07" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.16.0 -->
  <front>
    <title>DNS Multiple QTYPEs</title>
    <seriesInfo name="Internet-Draft" value="draft-bellis-dnsext-multi-qtypes-07"/>
    <author initials="R." surname="Bellis" fullname="Ray Bellis">
      <organization abbrev="ISC">Internet Systems Consortium, Inc.</organization>
      <address>
        <postal>
          <street>PO Box 360</street>
          <city>Redwood City</city>
          <code>NH 03857</code>
          <country>USA</country>
        </postal>
        <phone>+1 650 423 1200</phone>
        <email>ray@isc.org</email>
      </address>
    </author>
    <date year="2023" month="February" day="16"/>
    <area>Internet</area>
    <workgroup>DNSEXT Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document specifies a method for a DNS client to request additional
DNS record types to be delivered alongside the primary record type
specified in the question section of a DNS query.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>RFC EDITOR: PLEASE REMOVE THE FOLLOWING PARAGRAPH BEFORE PUBLISHING:
The source for this draft is maintained in GitHub at:
https://github.com/raybellis/draft-bellis-dnsext-multi-qtypes
Please submit suggested changes as issues or pull requests there.</t>
      <t>A commonly requested DNS <xref target="RFC1035"/> feature is the ability to receive
multiple related resource records (RRs) in a single DNS response.</t>
      <t>For example, it may be desirable to receive both the A and AAAA
records for a domain name together, rather than having to issue
multiple queries.</t>
      <t>The DNS wire protocol in theory supports having multiple questions in
a single packet, but in practise this does not work:</t>
      <ul spacing="normal">
        <li>Each question consists of the tuple (QNAME, QTYPE, QCLASS).  Since
each question has its own QNAME field it would be possible for one
name to exist and another to not exist, resulting in an
inconsistent response code.</li>
        <li>
          <xref target="RFC1035"/> says that QDCOUNT is "usually 1" but the only documented
exceptions relate to the IQuery OpCode which was obsoleted in <xref target="RFC3425"/>.
Other text in <xref target="RFC1035"/> strongly implies a singular question.</li>
        <li>The idea that only a single question is allowed is sufficiently
entrenched that many DNS servers will simply return an error (or
fail to response at all) if they receive a query with a question
count (QDCOUNT) of more than one.</li>
      </ul>
      <t>To mitigate these issues, this document constrains the problem to those
cases where only the QTYPE varies by specifying a new option for the
Extension Mechanisms for DNS (EDNS <xref target="RFC6891"/>) that contains an
additional list of QTYPE values that the client wishes to receive in
addition to the single QTYPE appearing in the question section.</t>
      <t>TODO: why not "ANY" ?</t>
    </section>
    <section anchor="terminology-used-in-this-document">
      <name>Terminology used in this document</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in BCP 14
<xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all
capitals, as shown here.</t>
    </section>
    <section anchor="description">
      <name>Description</name>
      <section anchor="multiple-qtype-edns-option-format">
        <name>Multiple QTYPE EDNS Option Format</name>
        <t>The overall format of an EDNS option is shown for reference below,
per <xref target="RFC6891"/>, followed by the option specific data:</t>
        <artwork><![CDATA[
   +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
0: |                          OPTION-CODE                          |
   +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
2: |                         OPTION-LENGTH                         |
   +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
4: |                                                               |
   /                          OPTION-DATA                          /
   /                                                               /
   +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
]]></artwork>
        <t>OPTION-CODE: TBD by IANA</t>
        <t>OPTION-LENGTH: Size (in octets) of OPTION-DATA.</t>
        <t>OPTION-DATA: Option specific, as below:</t>
        <artwork><![CDATA[
                +0 (MSB)                            +1 (LSB)
   +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
0: |QTD|   reserved    |  QTCOUNT  |           QT1 (MSB)           |
   +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
2: |           QT1 (LSB)           |              ...              |
   +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
   |              ...             ///          QTn (MSB)           |
   +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
   |           QTn (LSB)           |
   +---+---+---+---+---+---+---+---+
]]></artwork>
        <t>QTD: this bit indicates the direction of the packet.  It MUST be clear
(0) in a request and set (1) in a response.</t>
        <t>QTCOUNT: a 3 bit field with range 0 .. 7 specifying the number of QT
fields to follow.  NB: Whilst the QTCOUNT could in theory be calculated
based on the OPTION-LENGTH field, having it explicitly specified ensures
a sensible constraint on its range of values.</t>
        <t>QTn: a 2 byte field (MSB first) specifying a DNS RR type.  The RR type
MUST be for a real resource record, and MUST NOT refer to a pseudo RR
type such as "OPT", "IXFR", "TSIG", "*", etc.</t>
      </section>
      <section anchor="response-generation">
        <name>Response Generation</name>
        <section anchor="server-side-processing">
          <name>Server Side Processing</name>
          <t>A conforming server that receives a Multiple QTYPE Option in a query
MUST return a Multiple QTYPE Option in its response.</t>
          <t>The QTD bit in that response MUST be set (1) as protection against
servers which simply echo unknown EDNS options verbatim.  If the QTD bit
in a response is zero the client MUST treat the response as if this
option is unsupported.</t>
          <t>The server SHOULD attempt to return any resource records known to it
that match the additional (QNAME, QTn, QCLASS) tuples.  These records
MUST be returned in the Answer Section of the response, but the answer
for the primary QTYPE from the Question Section MUST be included first.</t>
          <t>For any particular QTn in the query, if the server provides additional
answers, or has knowledge that the RR type type does not exist for that
QNAME (a "negative answer"), it must include that QTn value in the
Multiple QTYPE Option of its response.</t>
          <t>A negative answer is therefore indicated by the combination of the
presence of a QTn value in the Multiple QTYPE Option and the absence of
a matching record in the Answer Section.  This is necessary (in the
absence of DNSSEC) to differentiate between absence of the record from
the zone and absence of the record from the response.</t>
          <t>A server that is authoritative for the specified QNAME on receipt of a
Multiple QTYPE Option MUST attempt to return all specified RR types
except where that would result in truncation in which case it may omit
some (or all) of the records for the additional RR types.  Those RR
types MUST then also be omitted from the Multiple QTYPE Option in the
response.</t>
          <t>A caching recursive server receiving a Multiple QTYPE Option SHOULD
attempt to fill its positive and negative caches with all of the
specified RR types before returning its response to the client.</t>
          <t>TODO: is there a case for mandatory answers, i.e. the client saying I
<em>really</em> want all these?</t>
        </section>
        <section anchor="client-side-processing">
          <name>Client Side Processing</name>
          <t>Recursive resolvers MAY use this method to obtain multiple records from
an authoritative server.  For the purposes of Section 5.4.1 of
<xref target="RFC2181"/> any authoritative answers received MUST be ranked the same
as the answer for the primary question.</t>
        </section>
        <section anchor="dnssec">
          <name>DNSSEC</name>
          <t>If the DNS client sets the "DNSSEC OK" (DO) bit in the query then the
server MUST also return the related DNSSEC records that would have been
returned in a standalone query for the same QTYPE.</t>
          <t>A negative answer from a signed zone MUST contain the appropriate
authenticated denial of existence records, per <xref target="RFC4034"/> and
<xref target="RFC5155"/>.</t>
          <t>In a signed zone there is a theoretical risk of valid signatures for one
RR type and invalid signatures for another.  This is the only case known
to the author where the response code for any particular QNAME may be
inconsistent across different RR types.</t>
          <t>Should a validating resolver produce NOERROR for some RR types and
SERVFAIL for others it MUST omit the RR types that failed to validate
from its response and from the QTn fields on the Multiple QTYPE option.
The client MAY then initiate standalone queries for those RR types.</t>
        </section>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The method documented here does not change any of the security
properties of the DNS protocol itself.</t>
      <t>It should however be noted that this method does increase the potential
amplification factor when the DNS protocol is used as a vector for a
denial of service attack.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to assign a new value in the DNS EDNS0 Option Codes
registry.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>The author wishes to thank the following for their feedback and reviews
during the initial development of this document: Michael Graff, Olafur
Gudmundsson, Matthijs Mekking, Paul Vixie.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC1035" target="https://www.rfc-editor.org/info/rfc1035" xml:base="https://www.rfc-editor.org/refs/bibxml/reference.RFC.1035.xml">
          <front>
            <title>Domain names - implementation and specification</title>
            <author initials="P." surname="Mockapetris" fullname="P. Mockapetris">
              <organization/>
            </author>
            <date year="1987" month="November"/>
            <abstract>
              <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System.  It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1035"/>
          <seriesInfo name="DOI" value="10.17487/RFC1035"/>
        </reference>
        <reference anchor="RFC6891" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6891.xml">
          <front>
            <title>Extension Mechanisms for DNS (EDNS(0))</title>
            <author fullname="J. Damas" initials="J." surname="Damas"/>
            <author fullname="M. Graff" initials="M." surname="Graff"/>
            <author fullname="P. Vixie" initials="P." surname="Vixie"/>
            <date month="April" year="2013"/>
            <abstract>
              <t>The Domain Name System's wire protocol includes a number of fixed fields whose range has been or soon will be exhausted and does not allow requestors to advertise their capabilities to responders. This document describes backward-compatible mechanisms for allowing the protocol to grow.</t>
              <t>This document updates the Extension Mechanisms for DNS (EDNS(0)) specification (and obsoletes RFC 2671) based on feedback from deployment experience in several implementations. It also obsoletes RFC 2673 ("Binary Labels in the Domain Name System") and adds considerations on the use of extended labels in the DNS.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="75"/>
          <seriesInfo name="RFC" value="6891"/>
          <seriesInfo name="DOI" value="10.17487/RFC6891"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized.  This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://www.rfc-editor.org/refs/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author initials="B." surname="Leiba" fullname="B. Leiba">
              <organization/>
            </author>
            <date year="2017" month="May"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC2181" target="https://www.rfc-editor.org/info/rfc2181" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2181.xml">
          <front>
            <title>Clarifications to the DNS Specification</title>
            <author fullname="R. Elz" initials="R." surname="Elz"/>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <date month="July" year="1997"/>
            <abstract>
              <t>This document considers some areas that have been identified as problems with the specification of the Domain Name System, and proposes remedies for the defects identified. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2181"/>
          <seriesInfo name="DOI" value="10.17487/RFC2181"/>
        </reference>
        <reference anchor="RFC4034" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4034.xml">
          <front>
            <title>Resource Records for the DNS Security Extensions</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of resource records and protocol modifications that provide source authentication for the DNS. This document defines the public key (DNSKEY), delegation signer (DS), resource record digital signature (RRSIG), and authenticated denial of existence (NSEC) resource records. The purpose and format of each resource record is described in detail, and an example of each resource record is given.</t>
              <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4034"/>
          <seriesInfo name="DOI" value="10.17487/RFC4034"/>
        </reference>
        <reference anchor="RFC5155" target="https://www.rfc-editor.org/info/rfc5155" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5155.xml">
          <front>
            <title>DNS Security (DNSSEC) Hashed Authenticated Denial of Existence</title>
            <author fullname="B. Laurie" initials="B." surname="Laurie"/>
            <author fullname="G. Sisson" initials="G." surname="Sisson"/>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="D. Blacka" initials="D." surname="Blacka"/>
            <date month="March" year="2008"/>
            <abstract>
              <t>The Domain Name System Security (DNSSEC) Extensions introduced the NSEC resource record (RR) for authenticated denial of existence.  This document introduces an alternative resource record, NSEC3, which similarly provides authenticated denial of existence.  However, it also provides measures against zone enumeration and permits gradual expansion of delegation-centric zones. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5155"/>
          <seriesInfo name="DOI" value="10.17487/RFC5155"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC3425" target="https://www.rfc-editor.org/info/rfc3425" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3425.xml">
          <front>
            <title>Obsoleting IQUERY</title>
            <author fullname="D. Lawrence" initials="D." surname="Lawrence"/>
            <date month="November" year="2002"/>
            <abstract>
              <t>The IQUERY method of performing inverse DNS lookups, specified in RFC 1035, has not been generally implemented and has usually been operationally disabled where it has been implemented.  Both reflect a general view in the community that the concept was unwise and that the widely-used alternate approach of using pointer (PTR) queries and reverse-mapping records is preferable.  Consequently, this document deprecates the IQUERY operation, declaring it entirely obsolete.  This document updates RFC 1035. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3425"/>
          <seriesInfo name="DOI" value="10.17487/RFC3425"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
