<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.24 (Ruby 3.4.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-hoffman-deleg-getting-names-02" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="Getting Nameservers">Getting Nameservers in the New Delegation Protocol</title>

    <author initials="P." surname="Hoffman" fullname="Paul Hoffman">
      <organization>ICANN</organization>
      <address>
        <email>paul.hoffman@icann.org</email>
      </address>
    </author>

    <date year="2025" month="March" day="17"/>

    
    
    

    <abstract>


<?line 29?>

<t>The DELEG Working Group is soon going to be choosing a base protocol that describes how resolvers will be able to get a new DNS resource record to create a new process for DNS delegation.
After a resolver gets this new type of record, it needs to know how to process the record in order to get a set of nameservers for a zone.
This document lists many of the considerations for that process, including many open questions for the DELEG Working Group.
More considerations and open questions might be added in later versions of this draft.</t>

<t>Note that this draft is <em>not</em> intended to become an RFC.
It is being published so that the DELEG Working Group has a place to point its efforts about how resolvers get nameservers for a zone while it continues to work on choosing a base protocol.
The work that results from this might be included in the base protocol specification, or in a new draft authored by some of the many people who have done earlier work in this area.</t>



    </abstract>



  </front>

  <middle>


<?line 40?>

<section anchor="introduction"><name>Introduction</name>

<t>The <eref target="https://datatracker.ietf.org/group/deleg/about/">DELEG Working Group</eref> is choosing a base protocol for "a new DNS signaling mechanism that allows parents to return additional DNS delegation information about their children".
This document specifies how that information will appear in the new resource records from the base protocol, and what resolvers that receive those records will do with them.</t>

<t>According to the working group charter, after it has chosen the base protocol, it will specify "new DNS authoritative signaling mechanisms for alternative DNS transports".
<xref target="addr-and-transport"/> of this document gives some ideas for what those extensions might include, and how they related to the mechanisms in this document.</t>

<section anchor="assumptions-about-the-eventual-base-protocol"><name>Assumptions about the Eventual Base Protocol</name>

<t>The WG is making a choice between <xref target="I-D.wesplaap-deleg"/> (called "W" here) and <xref target="I-D.homburg-deleg-incremental-deleg"/> (called "H" here).
W and H are quite different in their requirements for operation of the new delegation mechanism.
W and H agree on using the same display and wire format as SVCB <xref target="RFC9460"/> for records returned to the resolver in delegation responses.</t>

<t>In SVCB, the first field in the RR is called the "SvcPriority", and different values cause the resolver to go into "AliasMode" or "ServiceMode".
The result of using this field in resolution is a set of "alternative endpoints".
The second field is called "TargetName".
The third field is optional, and is called "SvcParams"; it has a lot of sub-fields, some of which are useful for the DNS delegation use cases.</t>

<t>In order to not confuse this with specifics that W (DELEG) and H (IDELEG) gave beyond the base protocol, the new record type returned in delegation responses is called "DD" here.
(Of course, the name can be whatever the WG chooses in the eventual base protocol.)
DD has different semantics from SVCB because SCVB assumed a base protocol of HTTPS.
W gives different names to values for the first field in the RR, and for sub-fields in the optional third field.
Other names from W and H and SVCB are renamed here for clarity; the eventual names might be completely different.</t>

<t>The base protocol will allow for later extensions in the third field.
Those extensions might reuse entries in the <eref target="https://www.iana.org/assignments/dns-svcb/dns-svcb.xhtml">IANA SVCB registry</eref>, they might add new extensions to that registry, or there might be a new registry for the DD record.</t>

</section>
<section anchor="bcp-14-language"><name>BCP 14 Language</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
</section>
<section anchor="getting-nameserver-names-for-a-zone"><name>Getting Nameserver Names for a Zone</name>

<t>The goal of the DELEG Working Group effort is to give resolvers a better way create a set of nameservers for a zone when making DNS queries to authoritative servers.
For both W and H, when a resolver makes a query that gets a delegation response, the resolver may get back one or more DD records and NS records that it can further process to create the set of nameservers for the zone.
This eventual set of nameservers can be called the "DDN"; this is quite different from the set of DD records it received).</t>

<t>In DD, the first field can be thought of as indicating the <em>action</em> to find names for the DDN other than the NS records that might be at the apex, using the second field as a domain name <em>where</em> to look.
The first field can be called "DDA" and the second "DDW".
THe third fied, which holds metadata about the DDW, can be called "DDM"</t>

<t>Both W and H agree that a DDA of value 0 means an action like "find the DDN elsewhere based on the value in the DDW", and a value of 1 means something like "the name in DDW is an entry in DDN".
Thus, when a resolver receives one or more DD records with a DDA of 0, it needs to do more processing.
When it receives one or more DD records with a DDA of 1, it takes the DDW from those records and puts them into the DDN (possibly with additional information from the DDM, such as from <xref target="addr-and-transport"/>).</t>

<section anchor="how-a-resolver-processes-the-dd-record"><name>How a Resolver Processes the DD Record</name>

<t>What action does a resolver take when it gets a DDA of 0?
When talking about the DELEG Working Group work beyond the base protocol, W and H have similar but different actions for finding eventual additions to the DDN.
W and H follow chains of CNAME, DNAME, and SVCB records, with some limits to prevent loops or excessive processing.
%% The previous sentence might be wrong; it's the best I could determine from the drafts. %%</t>

<t>Is the addition to the DDN different if following a DDA of 0 leads to signed vs. unsigned responses?
Asked another way, if the DDN contains some results that were signed and some that were unsigned, does the DDN become an ordered list or are the unsigned results discarded?</t>

<t>What is the TTL of the delegation?
A likely answer (but not the only posslbe one) is the TTL on the DD record that had a DDA of 1.
If so, this could mean that different delegation records in the DDN for the same zone might have differnt TTLs.</t>

<t>The resolver [[ <bcp14>MAY</bcp14> / <bcp14>SHOULD</bcp14> / <bcp14>SHOULD NOT</bcp14> / <bcp14>MUST</bcp14> / <bcp14>MUST NOT</bcp14> ]] use the NS records that were returned with the query to expand the DDN.
(If <bcp14>SHOULD</bcp14> or <bcp14>SHOULD NOT</bcp14> is chosen by the WG, the exceptions need to be listed.)</t>

<t>If there are DD records but the resolver ends up with nothing in the DDN, does it fall back to using the NS records in the original query?</t>

<t>Can the DD RRset contain records with different values for DDA? SVCB says no, but W and H say yes (but differently).</t>

</section>
</section>
<section anchor="addr-and-transport"><name>Addresses and Transports</name>

<t>According to the working group charter, after it has chosen the base protocol, it will specify "new DNS authoritative signaling mechanisms for alternative DNS transports".
This section has some brief ideas about what those might entail and what questions might need to be answered.</t>

<section anchor="addresses"><name>Addresses</name>

<t>The third field in the DD record will have a subfield to indicate the IPv4 and IPv6 address(es) associated with the DDW.
The subfield can be called "DDI".</t>

<t>Can a DD with a DDA of 0 have a DDI in the record? In SVCB they cannot, but the SVCB spec allows other specs to allow them.</t>

<t>Is the value for the DDI a single address or potentially a list? If the former, how are multiple DDs with the same DDA and DDW combined?</t>

<t>What happens if some of the discovered name/address pairs have different addresses?
Does that disagreement in the DDN cause the removal of something from the DDN?</t>

</section>
<section anchor="transports"><name>Transports</name>

<t>The third field in the DD record will have a subfield to indicate the transport(s) associated with the DDW.
The subfield can be called "DDT".</t>

<t>Can a DD with a DDA of 0 have a DDT in the record? In SVCB they cannot, but the SVCB spec allows other specs to allow them.</t>

<t>Some specific DNS transports will be allowed or required with DDT.
Which secure transport(s), if any, will be mandory to implement?</t>

<t>Does supporting both TLS and QUIC make operational or security sense?</t>

<t>Does supporting DOH make operational or security sense if other secure transport is allowed?</t>

<t>If either or both TLS and DoH are allowed, which versions of TLS are allowed?</t>

<t>Does Do53 need to be specified every time it is available?</t>

</section>
<section anchor="authentication-of-secure-transports"><name>Authentication of Secure Transports</name>

<t>How will clients deal with authenticating TLS?
Should they just use the web PKI pile of CAs, or will something else be specified?</t>

<t>Should certificates with IP addresses be supported?</t>

<t>Should clients ignore PKIX Extended Key Usage settings?</t>

<t>Should clients fall back to unauthenticated encrypted transport, all the way to Do53, or fail to resolve?</t>

</section>
</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>%% There may be IANA considerations when the working group finishes this work. %%</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>%% There will certainly be security considerations when the working group finishes this work. %%</t>

</section>


  </middle>

  <back>



    <references title='Normative References' anchor="sec-normative-references">




<reference anchor="I-D.wesplaap-deleg">
   <front>
      <title>Extensible Delegation for DNS</title>
      <author fullname="Tim April" initials="T." surname="April">
         <organization>Google, LLC</organization>
      </author>
      <author fullname="Petr Špaček" initials="P." surname="Špaček">
         <organization>ISC</organization>
      </author>
      <author fullname="Ralf Weber" initials="R." surname="Weber">
         <organization>Akamai Technologies</organization>
      </author>
      <author fullname="David C Lawrence" initials="" surname="Lawrence">
         <organization>Salesforce</organization>
      </author>
      <date day="18" month="February" year="2025"/>
      <abstract>
	 <t>   A delegation in the Domain Name System (DNS) is a mechanism that
   enables efficient and distributed management of the DNS namespace.
   It involves delegating authority over subdomains to specific DNS
   servers via NS records, allowing for a hierarchical structure and
   distributing the responsibility for maintaining DNS records.

   An NS record contains the hostname of the nameserver for the
   delegated namespace.  Any facilities of that nameserver must be
   discovered through other mechanisms.  This document proposes a new
   extensible DNS record type, DELEG, for delegation the authority for a
   domain.  Future documents then can use this mechanism to use
   additional information about the delegated namespace and the
   capabilities of authoritative nameservers for the delegated
   namespace.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-wesplaap-deleg-02"/>
   
</reference>

<reference anchor="I-D.homburg-deleg-incremental-deleg">
   <front>
      <title>Incrementally Deployable Extensible Delegation for DNS</title>
      <author fullname="Philip Homburg" initials="P." surname="Homburg">
         <organization>NLnet Labs</organization>
      </author>
      <author fullname="Tim Wicinski" initials="T." surname="Wicinski">
         <organization>Cox Communications</organization>
      </author>
      <author fullname="Jesse van Zutphen" initials="J." surname="van Zutphen">
         <organization>University of Amsterdam</organization>
      </author>
      <author fullname="Willem Toorop" initials="W." surname="Toorop">
         <organization>NLnet Labs</organization>
      </author>
      <date day="3" month="March" year="2025"/>
      <abstract>
	 <t>   This document proposes a mechanism for extensible delegations in the
   DNS.  The mechanism realizes delegations with resource record sets
   placed below a _deleg label in the apex of the delegating zone.  This
   authoritative delegation point can be aliased to other names using
   CNAME and DNAME.  This document proposes a new DNS resource record
   type, IDELEG, which is based on the SVCB and inherits extensibility
   from it.

   Support in recursive resolvers suffices for the mechanism to be fully
   functional.  The number of subsequent interactions between the
   recursive resolver and the authoritative name servers is comparable
   with those for DNS Query Name Minimisation.  Additionally, but not
   required, support in the authoritative name servers enables optimized
   behavior with reduced (simultaneous) queries.  None, mixed or full
   deployment of the mechanism on authoritative name servers are all
   fully functional, allowing for the mechanism to be incrementally
   deployed.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-homburg-deleg-incremental-deleg-03"/>
   
</reference>
<reference anchor="RFC9460">
  <front>
    <title>Service Binding and Parameter Specification via the DNS (SVCB and HTTPS Resource Records)</title>
    <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
    <author fullname="M. Bishop" initials="M." surname="Bishop"/>
    <author fullname="E. Nygren" initials="E." surname="Nygren"/>
    <date month="November" year="2023"/>
    <abstract>
      <t>This document specifies the "SVCB" ("Service Binding") and "HTTPS" DNS resource record (RR) types to facilitate the lookup of information needed to make connections to network services, such as for HTTP origins. SVCB records allow a service to be provided from multiple alternative endpoints, each with associated parameters (such as transport protocol configuration), and are extensible to support future uses (such as keys for encrypting the TLS ClientHello). They also enable aliasing of apex domains, which is not possible with CNAME. The HTTPS RR is a variation of SVCB for use with HTTP (see RFC 9110, "HTTP Semantics"). By providing more information to the client before it attempts to establish a connection, these records offer potential benefits to both performance and privacy.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9460"/>
  <seriesInfo name="DOI" value="10.17487/RFC9460"/>
</reference>
<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>



    </references>





  </back>

<!-- ##markdown-source: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-->

</rfc>

