<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.27 (Ruby 3.4.3) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-hoffman-deleg-getting-names-07" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="Getting Nameservers">Getting Nameservers in the New Delegation Protocol</title>

    <author initials="P." surname="Hoffman" fullname="Paul Hoffman">
      <organization>ICANN</organization>
      <address>
        <email>paul.hoffman@icann.org</email>
      </address>
    </author>

    <date year="2025" month="April" day="29"/>

    
    
    

    <abstract>


<?line 28?>

<t>The DELEG Working Group is soon going to be choosing a base protocol that describes how resolvers will be able to get a new DNS resource record to create a new process for DNS delegation.
After a resolver gets this new type of record, it needs to know how to process the record in order to get a set of nameservers for a zone.
This document lists many of the considerations for that process, including many open questions for the DELEG Working Group.
More considerations and open questions might be added in later versions of this draft.</t>

<t>Note that this draft is <em>not</em> intended to become an RFC.
It is being published so that the DELEG Working Group has a place to point its efforts about how resolvers get nameservers for a zone while it continues to work on choosing a base protocol.
The work that results from this might be included in the base protocol specification, or in a new draft authored by some of the many people who have done earlier work in this area.</t>



    </abstract>



  </front>

  <middle>


<?line 39?>

<section anchor="introduction"><name>Introduction</name>

<t>The <eref target="https://datatracker.ietf.org/group/deleg/about/">DELEG Working Group</eref> is choosing a base protocol for "a new DNS signaling mechanism that allows parents to return additional DNS delegation information about their children".
This document specifies how that information will appear in the new resource records from the base protocol, and what resolvers that receive those records will do with them.</t>

<t>According to the working group charter, after it has chosen the base protocol, it will specify "new DNS authoritative signaling mechanisms for alternative DNS transports".
<xref target="addr-and-transport"/> of this document gives some ideas for what those extensions might include, and how they related to the mechanisms in this document.</t>

<section anchor="assumptions-about-the-eventual-base-protocol"><name>Assumptions about the Eventual Base Protocol</name>

<t>The WG has tentatively made a choice of <xref target="I-D.wesplaap-deleg"/> (called "W" here); it is now in the call for adoption of that draft.
After the WG adopts W as the base protocol, it will work on fixes and clarifications for many topics that came up during the consensus process, such as for root zone priming and interactions with DNSSEC.</t>

<t>W uses the same display and wire format as SVCB <xref target="RFC9460"/> for records returned to the resolver in delegation responses.
In SVCB, the first field in the RR is called the "SvcPriority", and different values cause the resolver to go into "AliasMode" or "ServiceMode".
The result of using this field in resolution is a set of "alternative endpoints".
The second field is called "TargetName".
The third field is optional, and is called "SvcParams"; it has a lot of sub-fields, some of which are useful for the DNS delegation use cases.</t>

<t>In order to not confuse this with specifics that W gives beyond the base protocol, the new record type returned in delegation responses is called "DD" here.
(Of course, the name can be whatever the WG chooses in the eventual base protocol.)
DD has different semantics from SVCB because SCVB assumed a base protocol of HTTPS.
W gives different names to values for the first field in the RR, and for sub-fields in the optional third field.
Other names from W and SVCB are renamed here for clarity; the eventual names might be completely different.</t>

<t>The base protocol will allow for later extensions in the third field.
Those extensions might reuse entries in the <eref target="https://www.iana.org/assignments/dns-svcb/dns-svcb.xhtml">IANA SVCB registry</eref>, they might add new extensions to that registry, or there might be a new registry for the DD record.</t>

</section>
<section anchor="bcp-14-language"><name>BCP 14 Language</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
</section>
<section anchor="getting-nameserver-names-for-a-zone"><name>Getting Nameserver Names for a Zone</name>

<t>The goal of the DELEG Working Group effort is to give resolvers a better way create a set of nameservers for a zone when making DNS queries to authoritative servers.
In W, when a resolver makes a query that get a delegation response, the resolver may get back one or more DD records and NS records that it can further process to create the set of nameservers for the zone.
This eventual set of nameservers can be called the "DD_nameservers"; this is quite different from the set of DD records it received.</t>

<t>In DD, the first field can be thought of as indicating the <em>action</em> to find names for the DD_nameservers other than the NS records that might be at the apex, using the second field as a domain name <em>where</em> to look.
The first field can be called "DD_action" and the second "DD_where".
The third field, which holds metadata about the DD_where, can be called "DD_metadata"</t>

<section anchor="how-a-resolver-processes-the-dd-record"><name>How a Resolver Processes the DD Record</name>

<t>W specifies that a DD_action of value 0 means an action like "find the DD_nameservers elsewhere based on the value in the DD_where", and a value of 1 means something like "the name in DD_where is an entry in DD_nameservers".
Thus, when a resolver receives one or more DD records with a DD_action of 0, it needs to do more processing.
When it receives one or more DD records with a DD_action of 1, it takes the DD_where from those records and puts them into the DD_nameservers (possibly with additional information from the DD_metadata, such as from <xref target="addr-and-transport"/>).</t>

<t>What action does a resolver take when it gets a DD_action of 0?
W describes actions for finding eventual additions to the DD_nameservers.
W follows chains of CNAME, DNAME, and SVCB records, with some limits to prevent loops or excessive processing.
%% The previous sentence might be wrong; it's the best I could determine from the draft. %%
Does chasing DD_action of 0 need to change the query to SVCB, or would "just send the same request, but send it to the DD_where" suffice?
That is, why change to SVCB when the resolver already knows how to get DD records just by resolution requests?</t>

<t>Should the resolver follow CNAME and DNAME, or are straight chains sufficient?</t>

<t>Is the addition to the DD_nameservers different if following a DD_action of 0 leads to signed vs. unsigned responses?
Asked another way, if the DD_nameservers contains some results that were signed and some that were unsigned, does the DD_nameservers become an ordered list or are the unsigned results discarded?</t>

<t>What is the TTL of the records in DD_nameservers?
A likely answer (but not the only posslbe one) is the TTL on the DD record that had a DD_action of 1.
If so, this could mean that different delegation records in the DD_nameservers for the same zone might have differnt TTLs.</t>

<t>The resolver [[ <bcp14>MAY</bcp14> / <bcp14>SHOULD</bcp14> / <bcp14>SHOULD NOT</bcp14> / <bcp14>MUST</bcp14> / <bcp14>MUST NOT</bcp14> ]] use the NS records that were returned with the query to expand the DD_nameservers.
(If <bcp14>SHOULD</bcp14> or <bcp14>SHOULD NOT</bcp14> is chosen by the WG, the exceptions need to be listed.)</t>

<t>If there are DD records but the resolver ends up with nothing in the DD_nameservers, does it fall back to using the NS records in the original query?</t>

<t>Can the DD RRset contain records with different values for DD_action? SVCB says no, but W says yes.</t>

</section>
</section>
<section anchor="addr-and-transport"><name>Addresses and Transports</name>

<t>According to the working group charter, after it has chosen the base protocol, it will specify "new DNS authoritative signaling mechanisms for alternative DNS transports".
This section has some brief ideas about what those might entail and what questions might need to be answered.</t>

<section anchor="addresses"><name>Addresses</name>

<t>The DD_metadata field in the DD record will have a subfield to indicate the IPv4 and IPv6 address(es) associated with the DD_where.
The subfield can be called "DD_ips".</t>

<t>Can a DD with a DD_action of 0 have a DD_ips in the record? In SVCB they cannot, but the SVCB spec allows other specs to allow them.</t>

<t>Is the value for the DD_ips a single address or potentially a list? If the former, how are multiple DDs with the same DD_action and DD_where combined?</t>

<t>What happens if some of the discovered name/address pairs have different addresses?
Does that disagreement in the DD_nameservers cause the removal of something from the DD_nameservers?</t>

</section>
<section anchor="transports"><name>Transports</name>

<t>The DD_metadata field in the DD record will have a subfield to indicate the transport(s) associated with the DD_where.
The subfield can be called "DD_transports".</t>

<t>Can a DD with a DD_action of 0 have a DD_transports in the record? In SVCB they cannot, but the SVCB spec allows other specs to allow them.</t>

<t>Some specific DNS transports will be allowed or required with DD_transports.
Which secure transport(s), if any, will be mandory to implement?</t>

<t>Does supporting both TLS and QUIC make operational or security sense?</t>

<t>Does supporting DOH make operational or security sense if other secure transport is allowed?</t>

<t>If either or both TLS and DoH are allowed, which versions of TLS are allowed?</t>

<t>Does Do53 need to be specified every time it is available?</t>

</section>
<section anchor="authentication-of-secure-transports"><name>Authentication of Secure Transports</name>

<t>How will clients deal with authenticating TLS?
Should they just use the web PKI pile of CAs, or will something else be specified?</t>

<t>Should certificates with IP addresses be supported?</t>

<t>Should clients ignore PKIX Extended Key Usage settings?</t>

<t>Should clients fall back to unauthenticated encrypted transport, all the way to Do53, or fail to resolve?</t>

</section>
</section>
<section anchor="priming-the-root-zone"><name>Priming the Root Zone</name>

<t>The current proposal for DD cannot be used to prime the root zone because the root zone is not its own parent.
Different proposals have been made informally how to make a special case of the DD protocol to allow a DD record to be legally served by root server operators to allow the advantages of DD (can be signed; can include IP addresses and transports) to cover the root zone.</t>

<t>Should such proposals be considered?</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>%% There may be IANA considerations when the working group finishes this work. %%</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>%% There will certainly be security considerations when the working group finishes this work. %%</t>

</section>


  </middle>

  <back>



    <references title='Normative References' anchor="sec-normative-references">




<reference anchor="I-D.wesplaap-deleg">
   <front>
      <title>Extensible Delegation for DNS</title>
      <author fullname="Tim April" initials="T." surname="April">
         <organization>Google, LLC</organization>
      </author>
      <author fullname="Petr Špaček" initials="P." surname="Špaček">
         <organization>ISC</organization>
      </author>
      <author fullname="Ralf Weber" initials="R." surname="Weber">
         <organization>Akamai Technologies</organization>
      </author>
      <author fullname="David C Lawrence" initials="" surname="Lawrence">
         <organization>Salesforce</organization>
      </author>
      <date day="18" month="February" year="2025"/>
      <abstract>
	 <t>   A delegation in the Domain Name System (DNS) is a mechanism that
   enables efficient and distributed management of the DNS namespace.
   It involves delegating authority over subdomains to specific DNS
   servers via NS records, allowing for a hierarchical structure and
   distributing the responsibility for maintaining DNS records.

   An NS record contains the hostname of the nameserver for the
   delegated namespace.  Any facilities of that nameserver must be
   discovered through other mechanisms.  This document proposes a new
   extensible DNS record type, DELEG, for delegation the authority for a
   domain.  Future documents then can use this mechanism to use
   additional information about the delegated namespace and the
   capabilities of authoritative nameservers for the delegated
   namespace.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-wesplaap-deleg-02"/>
   
</reference>
<reference anchor="RFC9460">
  <front>
    <title>Service Binding and Parameter Specification via the DNS (SVCB and HTTPS Resource Records)</title>
    <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
    <author fullname="M. Bishop" initials="M." surname="Bishop"/>
    <author fullname="E. Nygren" initials="E." surname="Nygren"/>
    <date month="November" year="2023"/>
    <abstract>
      <t>This document specifies the "SVCB" ("Service Binding") and "HTTPS" DNS resource record (RR) types to facilitate the lookup of information needed to make connections to network services, such as for HTTP origins. SVCB records allow a service to be provided from multiple alternative endpoints, each with associated parameters (such as transport protocol configuration), and are extensible to support future uses (such as keys for encrypting the TLS ClientHello). They also enable aliasing of apex domains, which is not possible with CNAME. The HTTPS RR is a variation of SVCB for use with HTTP (see RFC 9110, "HTTP Semantics"). By providing more information to the client before it attempts to establish a connection, these records offer potential benefits to both performance and privacy.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9460"/>
  <seriesInfo name="DOI" value="10.17487/RFC9460"/>
</reference>
<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>



    </references>





  </back>

<!-- ##markdown-source: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-->

</rfc>

