<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.2 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-bellis-dnsext-multi-qtypes-08" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.2 -->
  <front>
    <title>DNS Multiple QTYPEs</title>
    <seriesInfo name="Internet-Draft" value="draft-bellis-dnsext-multi-qtypes-08"/>
    <author initials="R." surname="Bellis" fullname="Ray Bellis">
      <organization abbrev="ISC">Internet Systems Consortium, Inc.</organization>
      <address>
        <postal>
          <street>PO Box 360</street>
          <city>Newmarket</city>
          <code>NH 03857</code>
          <country>USA</country>
        </postal>
        <phone>+1 650 423 1300</phone>
        <email>ray@isc.org</email>
      </address>
    </author>
    <date year="2023" month="November" day="14"/>
    <area>Internet</area>
    <workgroup>DNSEXT Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 31?>

<t>This document specifies a method for a DNS client to request additional
DNS record types to be delivered alongside the primary record type
specified in the question section of a DNS query.</t>
    </abstract>
  </front>
  <middle>
    <?line 37?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>RFC EDITOR: PLEASE REMOVE THE FOLLOWING PARAGRAPH BEFORE PUBLISHING:
The source for this draft is maintained in GitHub at:
https://github.com/raybellis/draft-bellis-dnsext-multi-qtypes
Please submit suggested changes as issues or pull requests there.</t>
      <t>A commonly requested DNS <xref target="RFC1035"/> feature is the ability to receive
multiple related resource records (RRs) in a single DNS response.</t>
      <t>For example, it may be desirable to receive both the A and AAAA
records for a domain name together, rather than having to issue
multiple queries.</t>
      <t>The DNS wire protocol in theory supports having multiple questions in
a single packet, but in practise this does not work:</t>
      <ul spacing="normal">
        <li>
          <t>Each question consists of the tuple (QNAME, QTYPE, QCLASS).  Since
each question has its own QNAME field it would be possible for one
name to exist and another to not exist, resulting in an
inconsistent response code.</t>
        </li>
        <li>
          <t><xref target="RFC1035"/> says that QDCOUNT is "usually 1" but the only documented
exceptions relate to the IQuery OpCode which was obsoleted in <xref target="RFC3425"/>.
Other text in <xref target="RFC1035"/> strongly implies a singular question.</t>
        </li>
        <li>
          <t>The idea that only a single question is allowed is sufficiently
entrenched that many DNS servers will simply return an error (or
fail to response at all) if they receive a query with a question
count (QDCOUNT) of more than one.</t>
        </li>
      </ul>
      <t>To mitigate these issues, this document constrains the problem to those
cases where only the QTYPE varies by specifying a new option for the
Extension Mechanisms for DNS (EDNS <xref target="RFC6891"/>) that contains an
additional list of QTYPE values that the client wishes to receive in
addition to the single QTYPE appearing in the question section.</t>
      <t>TODO: why not "ANY" ?</t>
    </section>
    <section anchor="terminology-used-in-this-document">
      <name>Terminology used in this document</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in BCP 14
<xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all
capitals, as shown here.</t>
    </section>
    <section anchor="description">
      <name>Description</name>
      <section anchor="multiple-qtype-edns-option-format">
        <name>Multiple QTYPE EDNS Option Format</name>
        <t>The overall format of an EDNS option is shown for reference below,
per <xref target="RFC6891"/>, followed by the option specific data:</t>
        <artwork><![CDATA[
   +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
0: |                          OPTION-CODE                          |
   +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
2: |                         OPTION-LENGTH                         |
   +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
4: |                                                               |
   /                          OPTION-DATA                          /
   /                                                               /
   +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
]]></artwork>
        <t>OPTION-CODE: TBD by IANA</t>
        <t>OPTION-LENGTH: Size (in octets) of OPTION-DATA.</t>
        <t>OPTION-DATA: Option specific, as below:</t>
        <artwork><![CDATA[
                +0 (MSB)                            +1 (LSB)
   +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
0: |QTD|   reserved    |  QTCOUNT  |           QT1 (MSB)           |
   +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
2: |           QT1 (LSB)           |              ...              |
   +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
   |              ...             ///          QTn (MSB)           |
   +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
   |           QTn (LSB)           |
   +---+---+---+---+---+---+---+---+
]]></artwork>
        <t>QTD: this bit indicates the direction of the packet.  It MUST be clear
(0) in a request and set (1) in a response.</t>
        <t>QTCOUNT: a 3 bit field with range 0 .. 7 specifying the number of QT
fields to follow.  NB: Whilst the QTCOUNT could in theory be calculated
based on the OPTION-LENGTH field, having it explicitly specified ensures
a sensible constraint on its range of values.</t>
        <t>QTn: a 2 byte field (MSB first) specifying a DNS RR type.  The RR type
MUST be for a real resource record, and MUST NOT refer to a pseudo RR
type such as "OPT", "IXFR", "TSIG", "*", etc.</t>
      </section>
      <section anchor="response-generation">
        <name>Response Generation</name>
        <section anchor="server-side-processing">
          <name>Server Side Processing</name>
          <t>A conforming server that receives a Multiple QTYPE Option in a query
MUST return a Multiple QTYPE Option in its response.</t>
          <t>The QTD bit in that response MUST be set (1) as protection against
servers which simply echo unknown EDNS options verbatim.  If the QTD bit
in a response is zero the client MUST treat the response as if this
option is unsupported.</t>
          <t>The server SHOULD attempt to return any resource records known to it
that match the additional (QNAME, QTn, QCLASS) tuples.  These records
MUST be returned in the Answer Section of the response, but the answer
for the primary QTYPE from the Question Section MUST be included first.</t>
          <t>For any particular QTn in the query, if the server provides additional
answers, or has knowledge that the RR type type does not exist for that
QNAME (a "negative answer"), it must include that QTn value in the
Multiple QTYPE Option of its response.</t>
          <t>A negative answer is therefore indicated by the combination of the
presence of a QTn value in the Multiple QTYPE Option and the absence of
a matching record in the Answer Section.  This is necessary (in the
absence of DNSSEC) to differentiate between absence of the record from
the zone and absence of the record from the response.</t>
          <t>A server that is authoritative for the specified QNAME on receipt of a
Multiple QTYPE Option MUST attempt to return all specified RR types
except where that would result in truncation in which case it may omit
some (or all) of the records for the additional RR types.  Those RR
types MUST then also be omitted from the Multiple QTYPE Option in the
response.</t>
          <t>A caching recursive server receiving a Multiple QTYPE Option SHOULD
attempt to fill its positive and negative caches with all of the
specified RR types before returning its response to the client.</t>
          <t>TODO: is there a case for mandatory answers, i.e. the client saying I
<em>really</em> want all these?</t>
        </section>
        <section anchor="client-side-processing">
          <name>Client Side Processing</name>
          <t>Recursive resolvers MAY use this method to obtain multiple records from
an authoritative server.  For the purposes of Section 5.4.1 of
<xref target="RFC2181"/> any authoritative answers received MUST be ranked the same
as the answer for the primary question.</t>
        </section>
        <section anchor="dnssec">
          <name>DNSSEC</name>
          <t>If the DNS client sets the "DNSSEC OK" (DO) bit in the query then the
server MUST also return the related DNSSEC records that would have been
returned in a standalone query for the same QTYPE.</t>
          <t>A negative answer from a signed zone MUST contain the appropriate
authenticated denial of existence records, per <xref target="RFC4034"/> and
<xref target="RFC5155"/>.</t>
          <t>In a signed zone there is a theoretical risk of valid signatures for one
RR type and invalid signatures for another.  This is the only case known
to the author where the response code for any particular QNAME may be
inconsistent across different RR types.</t>
          <t>Should a validating resolver produce NOERROR for some RR types and
SERVFAIL for others it MUST omit the RR types that failed to validate
from its response and from the QTn fields on the Multiple QTYPE option.
The client MAY then initiate standalone queries for those RR types.</t>
        </section>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The method documented here does not change any of the security
properties of the DNS protocol itself.</t>
      <t>It should however be noted that this method does increase the potential
amplification factor when the DNS protocol is used as a vector for a
denial of service attack.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to assign a new value in the DNS EDNS0 Option Codes
registry.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>The author wishes to thank the following for their feedback and reviews
during the initial development of this document: Michael Graff, Olafur
Gudmundsson, Matthijs Mekking, Paul Vixie.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC1035" target="https://www.rfc-editor.org/info/rfc1035" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.1035.xml">
          <front>
            <title>Domain names - implementation and specification</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1035"/>
          <seriesInfo name="DOI" value="10.17487/RFC1035"/>
        </reference>
        <reference anchor="RFC6891" target="https://www.rfc-editor.org/info/rfc6891" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6891.xml">
          <front>
            <title>Extension Mechanisms for DNS (EDNS(0))</title>
            <author fullname="J. Damas" initials="J." surname="Damas"/>
            <author fullname="M. Graff" initials="M." surname="Graff"/>
            <author fullname="P. Vixie" initials="P." surname="Vixie"/>
            <date month="April" year="2013"/>
            <abstract>
              <t>The Domain Name System's wire protocol includes a number of fixed fields whose range has been or soon will be exhausted and does not allow requestors to advertise their capabilities to responders. This document describes backward-compatible mechanisms for allowing the protocol to grow.</t>
              <t>This document updates the Extension Mechanisms for DNS (EDNS(0)) specification (and obsoletes RFC 2671) based on feedback from deployment experience in several implementations. It also obsoletes RFC 2673 ("Binary Labels in the Domain Name System") and adds considerations on the use of extended labels in the DNS.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="75"/>
          <seriesInfo name="RFC" value="6891"/>
          <seriesInfo name="DOI" value="10.17487/RFC6891"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC2181" target="https://www.rfc-editor.org/info/rfc2181" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2181.xml">
          <front>
            <title>Clarifications to the DNS Specification</title>
            <author fullname="R. Elz" initials="R." surname="Elz"/>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <date month="July" year="1997"/>
            <abstract>
              <t>This document considers some areas that have been identified as problems with the specification of the Domain Name System, and proposes remedies for the defects identified. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2181"/>
          <seriesInfo name="DOI" value="10.17487/RFC2181"/>
        </reference>
        <reference anchor="RFC4034" target="https://www.rfc-editor.org/info/rfc4034" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4034.xml">
          <front>
            <title>Resource Records for the DNS Security Extensions</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of resource records and protocol modifications that provide source authentication for the DNS. This document defines the public key (DNSKEY), delegation signer (DS), resource record digital signature (RRSIG), and authenticated denial of existence (NSEC) resource records. The purpose and format of each resource record is described in detail, and an example of each resource record is given.</t>
              <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4034"/>
          <seriesInfo name="DOI" value="10.17487/RFC4034"/>
        </reference>
        <reference anchor="RFC5155" target="https://www.rfc-editor.org/info/rfc5155" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5155.xml">
          <front>
            <title>DNS Security (DNSSEC) Hashed Authenticated Denial of Existence</title>
            <author fullname="B. Laurie" initials="B." surname="Laurie"/>
            <author fullname="G. Sisson" initials="G." surname="Sisson"/>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="D. Blacka" initials="D." surname="Blacka"/>
            <date month="March" year="2008"/>
            <abstract>
              <t>The Domain Name System Security (DNSSEC) Extensions introduced the NSEC resource record (RR) for authenticated denial of existence. This document introduces an alternative resource record, NSEC3, which similarly provides authenticated denial of existence. However, it also provides measures against zone enumeration and permits gradual expansion of delegation-centric zones. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5155"/>
          <seriesInfo name="DOI" value="10.17487/RFC5155"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC3425" target="https://www.rfc-editor.org/info/rfc3425" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3425.xml">
          <front>
            <title>Obsoleting IQUERY</title>
            <author fullname="D. Lawrence" initials="D." surname="Lawrence"/>
            <date month="November" year="2002"/>
            <abstract>
              <t>The IQUERY method of performing inverse DNS lookups, specified in RFC 1035, has not been generally implemented and has usually been operationally disabled where it has been implemented. Both reflect a general view in the community that the concept was unwise and that the widely-used alternate approach of using pointer (PTR) queries and reverse-mapping records is preferable. Consequently, this document deprecates the IQUERY operation, declaring it entirely obsolete. This document updates RFC 1035. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3425"/>
          <seriesInfo name="DOI" value="10.17487/RFC3425"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
