<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.27 (Ruby 3.4.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-hoffman-deleg-getting-names-05" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="Getting Nameservers">Getting Nameservers in the New Delegation Protocol</title>

    <author initials="P." surname="Hoffman" fullname="Paul Hoffman">
      <organization>ICANN</organization>
      <address>
        <email>paul.hoffman@icann.org</email>
      </address>
    </author>

    <date year="2025" month="March" day="31"/>

    
    
    

    <abstract>


<?line 29?>

<t>The DELEG Working Group is soon going to be choosing a base protocol that describes how resolvers will be able to get a new DNS resource record to create a new process for DNS delegation.
After a resolver gets this new type of record, it needs to know how to process the record in order to get a set of nameservers for a zone.
This document lists many of the considerations for that process, including many open questions for the DELEG Working Group.
More considerations and open questions might be added in later versions of this draft.</t>

<t>Note that this draft is <em>not</em> intended to become an RFC.
It is being published so that the DELEG Working Group has a place to point its efforts about how resolvers get nameservers for a zone while it continues to work on choosing a base protocol.
The work that results from this might be included in the base protocol specification, or in a new draft authored by some of the many people who have done earlier work in this area.</t>



    </abstract>



  </front>

  <middle>


<?line 40?>

<section anchor="introduction"><name>Introduction</name>

<t>The <eref target="https://datatracker.ietf.org/group/deleg/about/">DELEG Working Group</eref> is choosing a base protocol for "a new DNS signaling mechanism that allows parents to return additional DNS delegation information about their children".
This document specifies how that information will appear in the new resource records from the base protocol, and what resolvers that receive those records will do with them.</t>

<t>According to the working group charter, after it has chosen the base protocol, it will specify "new DNS authoritative signaling mechanisms for alternative DNS transports".
<xref target="addr-and-transport"/> of this document gives some ideas for what those extensions might include, and how they related to the mechanisms in this document.</t>

<section anchor="assumptions-about-the-eventual-base-protocol"><name>Assumptions about the Eventual Base Protocol</name>

<t>The WG is making a choice between <xref target="I-D.wesplaap-deleg"/> (called "W" here) and <xref target="I-D.homburg-deleg-incremental-deleg"/> (called "H" here).
W and H are quite different in their requirements for operation of the new delegation mechanism.
After the WG comes to consensus on W or H as the base protocol, it will work on fixes and clarifications for many topics that came up during the consensus process, such as for root zone priming and interactions with DNSSEC.</t>

<t>W and H agree on using the same display and wire format as SVCB <xref target="RFC9460"/> for records returned to the resolver in delegation responses.
In SVCB, the first field in the RR is called the "SvcPriority", and different values cause the resolver to go into "AliasMode" or "ServiceMode".
The result of using this field in resolution is a set of "alternative endpoints".
The second field is called "TargetName".
The third field is optional, and is called "SvcParams"; it has a lot of sub-fields, some of which are useful for the DNS delegation use cases.</t>

<t>In order to not confuse this with specifics that W (DELEG) and H (IDELEG) gave beyond the base protocol, the new record type returned in delegation responses is called "DD" here.
(Of course, the name can be whatever the WG chooses in the eventual base protocol.)
DD has different semantics from SVCB because SCVB assumed a base protocol of HTTPS.
W gives different names to values for the first field in the RR, and for sub-fields in the optional third field.
Other names from W and H and SVCB are renamed here for clarity; the eventual names might be completely different.</t>

<t>The base protocol will allow for later extensions in the third field.
Those extensions might reuse entries in the <eref target="https://www.iana.org/assignments/dns-svcb/dns-svcb.xhtml">IANA SVCB registry</eref>, they might add new extensions to that registry, or there might be a new registry for the DD record.</t>

</section>
<section anchor="bcp-14-language"><name>BCP 14 Language</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
</section>
<section anchor="getting-nameserver-names-for-a-zone"><name>Getting Nameserver Names for a Zone</name>

<t>The goal of the DELEG Working Group effort is to give resolvers a better way create a set of nameservers for a zone when making DNS queries to authoritative servers.
For both W and H, when a resolver makes one or two queries that get a delegation response, the resolver may get back one or more DD records and NS records that it can further process to create the set of nameservers for the zone.
This eventual set of nameservers can be called the "DD_nameservers"; this is quite different from the set of DD records it received.</t>

<t>In DD, the first field can be thought of as indicating the <em>action</em> to find names for the DD_nameservers other than the NS records that might be at the apex, using the second field as a domain name <em>where</em> to look.
The first field can be called "DD_action" and the second "DD_where".
The third field, which holds metadata about the DD_where, can be called "DD_metadata"</t>

<section anchor="how-a-resolver-processes-the-dd-record"><name>How a Resolver Processes the DD Record</name>

<t>Both W and H agree that a DD_action of value 0 means an action like "find the DD_nameservers elsewhere based on the value in the DD_where", and a value of 1 means something like "the name in DD_where is an entry in DD_nameservers".
Thus, when a resolver receives one or more DD records with a DD_action of 0, it needs to do more processing.
When it receives one or more DD records with a DD_action of 1, it takes the DD_where from those records and puts them into the DD_nameservers (possibly with additional information from the DD_metadata, such as from <xref target="addr-and-transport"/>).</t>

<t>What action does a resolver take when it gets a DD_action of 0?
When talking about the DELEG Working Group work beyond the base protocol, W and H have similar but different actions for finding eventual additions to the DD_nameservers.
W and H follow chains of CNAME, DNAME, and SVCB records, with some limits to prevent loops or excessive processing.
%% The previous sentence might be wrong; it's the best I could determine from the drafts. %%
Does chasing DD_action of 0 need to change the query to SVCB, or would "just send the same request, but send it to the DD_where" suffice?
That is, why change to SVCB when the resolver already knows how to get DD records just by resolution requests?</t>

<t>Should the resolver follow CNAME and DNAME, or are straight chains sufficient?</t>

<t>Is the addition to the DD_nameservers different if following a DD_action of 0 leads to signed vs. unsigned responses?
Asked another way, if the DD_nameservers contains some results that were signed and some that were unsigned, does the DD_nameservers become an ordered list or are the unsigned results discarded?</t>

<t>What is the TTL of the records in DD_nameservers?
A likely answer (but not the only posslbe one) is the TTL on the DD record that had a DD_action of 1.
If so, this could mean that different delegation records in the DD_nameservers for the same zone might have differnt TTLs.</t>

<t>The resolver [[ <bcp14>MAY</bcp14> / <bcp14>SHOULD</bcp14> / <bcp14>SHOULD NOT</bcp14> / <bcp14>MUST</bcp14> / <bcp14>MUST NOT</bcp14> ]] use the NS records that were returned with the query to expand the DD_nameservers.
(If <bcp14>SHOULD</bcp14> or <bcp14>SHOULD NOT</bcp14> is chosen by the WG, the exceptions need to be listed.)</t>

<t>If there are DD records but the resolver ends up with nothing in the DD_nameservers, does it fall back to using the NS records in the original query?</t>

<t>Can the DD RRset contain records with different values for DD_action? SVCB says no, but W and H say yes (but differently).</t>

</section>
</section>
<section anchor="addr-and-transport"><name>Addresses and Transports</name>

<t>According to the working group charter, after it has chosen the base protocol, it will specify "new DNS authoritative signaling mechanisms for alternative DNS transports".
This section has some brief ideas about what those might entail and what questions might need to be answered.</t>

<section anchor="addresses"><name>Addresses</name>

<t>The DD_metadata field in the DD record will have a subfield to indicate the IPv4 and IPv6 address(es) associated with the DD_where.
The subfield can be called "DD_ips".</t>

<t>Can a DD with a DD_action of 0 have a DD_ips in the record? In SVCB they cannot, but the SVCB spec allows other specs to allow them.</t>

<t>Is the value for the DD_ips a single address or potentially a list? If the former, how are multiple DDs with the same DD_action and DD_where combined?</t>

<t>What happens if some of the discovered name/address pairs have different addresses?
Does that disagreement in the DD_nameservers cause the removal of something from the DD_nameservers?</t>

</section>
<section anchor="transports"><name>Transports</name>

<t>The DD_metadata field in the DD record will have a subfield to indicate the transport(s) associated with the DD_where.
The subfield can be called "DD_transports".</t>

<t>Can a DD with a DD_action of 0 have a DD_transports in the record? In SVCB they cannot, but the SVCB spec allows other specs to allow them.</t>

<t>Some specific DNS transports will be allowed or required with DD_transports.
Which secure transport(s), if any, will be mandory to implement?</t>

<t>Does supporting both TLS and QUIC make operational or security sense?</t>

<t>Does supporting DOH make operational or security sense if other secure transport is allowed?</t>

<t>If either or both TLS and DoH are allowed, which versions of TLS are allowed?</t>

<t>Does Do53 need to be specified every time it is available?</t>

</section>
<section anchor="authentication-of-secure-transports"><name>Authentication of Secure Transports</name>

<t>How will clients deal with authenticating TLS?
Should they just use the web PKI pile of CAs, or will something else be specified?</t>

<t>Should certificates with IP addresses be supported?</t>

<t>Should clients ignore PKIX Extended Key Usage settings?</t>

<t>Should clients fall back to unauthenticated encrypted transport, all the way to Do53, or fail to resolve?</t>

</section>
</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>%% There may be IANA considerations when the working group finishes this work. %%</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>%% There will certainly be security considerations when the working group finishes this work. %%</t>

</section>


  </middle>

  <back>



    <references title='Normative References' anchor="sec-normative-references">




<reference anchor="I-D.wesplaap-deleg">
   <front>
      <title>Extensible Delegation for DNS</title>
      <author fullname="Tim April" initials="T." surname="April">
         <organization>Google, LLC</organization>
      </author>
      <author fullname="Petr Špaček" initials="P." surname="Špaček">
         <organization>ISC</organization>
      </author>
      <author fullname="Ralf Weber" initials="R." surname="Weber">
         <organization>Akamai Technologies</organization>
      </author>
      <author fullname="David C Lawrence" initials="" surname="Lawrence">
         <organization>Salesforce</organization>
      </author>
      <date day="18" month="February" year="2025"/>
      <abstract>
	 <t>   A delegation in the Domain Name System (DNS) is a mechanism that
   enables efficient and distributed management of the DNS namespace.
   It involves delegating authority over subdomains to specific DNS
   servers via NS records, allowing for a hierarchical structure and
   distributing the responsibility for maintaining DNS records.

   An NS record contains the hostname of the nameserver for the
   delegated namespace.  Any facilities of that nameserver must be
   discovered through other mechanisms.  This document proposes a new
   extensible DNS record type, DELEG, for delegation the authority for a
   domain.  Future documents then can use this mechanism to use
   additional information about the delegated namespace and the
   capabilities of authoritative nameservers for the delegated
   namespace.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-wesplaap-deleg-02"/>
   
</reference>

<reference anchor="I-D.homburg-deleg-incremental-deleg">
   <front>
      <title>Incrementally Deployable Extensible Delegation for DNS</title>
      <author fullname="Philip Homburg" initials="P." surname="Homburg">
         <organization>NLnet Labs</organization>
      </author>
      <author fullname="Tim Wicinski" initials="T." surname="Wicinski">
         <organization>Cox Communications</organization>
      </author>
      <author fullname="Jesse van Zutphen" initials="J." surname="van Zutphen">
         <organization>University of Amsterdam</organization>
      </author>
      <author fullname="Willem Toorop" initials="W." surname="Toorop">
         <organization>NLnet Labs</organization>
      </author>
      <date day="3" month="March" year="2025"/>
      <abstract>
	 <t>   This document proposes a mechanism for extensible delegations in the
   DNS.  The mechanism realizes delegations with resource record sets
   placed below a _deleg label in the apex of the delegating zone.  This
   authoritative delegation point can be aliased to other names using
   CNAME and DNAME.  This document proposes a new DNS resource record
   type, IDELEG, which is based on the SVCB and inherits extensibility
   from it.

   Support in recursive resolvers suffices for the mechanism to be fully
   functional.  The number of subsequent interactions between the
   recursive resolver and the authoritative name servers is comparable
   with those for DNS Query Name Minimisation.  Additionally, but not
   required, support in the authoritative name servers enables optimized
   behavior with reduced (simultaneous) queries.  None, mixed or full
   deployment of the mechanism on authoritative name servers are all
   fully functional, allowing for the mechanism to be incrementally
   deployed.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-homburg-deleg-incremental-deleg-03"/>
   
</reference>
<reference anchor="RFC9460">
  <front>
    <title>Service Binding and Parameter Specification via the DNS (SVCB and HTTPS Resource Records)</title>
    <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
    <author fullname="M. Bishop" initials="M." surname="Bishop"/>
    <author fullname="E. Nygren" initials="E." surname="Nygren"/>
    <date month="November" year="2023"/>
    <abstract>
      <t>This document specifies the "SVCB" ("Service Binding") and "HTTPS" DNS resource record (RR) types to facilitate the lookup of information needed to make connections to network services, such as for HTTP origins. SVCB records allow a service to be provided from multiple alternative endpoints, each with associated parameters (such as transport protocol configuration), and are extensible to support future uses (such as keys for encrypting the TLS ClientHello). They also enable aliasing of apex domains, which is not possible with CNAME. The HTTPS RR is a variation of SVCB for use with HTTP (see RFC 9110, "HTTP Semantics"). By providing more information to the client before it attempts to establish a connection, these records offer potential benefits to both performance and privacy.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9460"/>
  <seriesInfo name="DOI" value="10.17487/RFC9460"/>
</reference>
<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>



    </references>





  </back>

<!-- ##markdown-source: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-->

</rfc>

