<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.3.8 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc comments="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-dnsop-dns-error-reporting-02" category="std">

  <front>
    <title abbrev="DNS-ER">DNS Error Reporting</title>

    <author initials="R." surname="Arends" fullname="Roy Arends">
      <organization>ICANN</organization>
      <address>
        <email>roy.arends@icann.org</email>
      </address>
    </author>
    <author initials="M." surname="Larson" fullname="Matt Larson">
      <organization>ICANN</organization>
      <address>
        <email>matt.larson@icann.org</email>
      </address>
    </author>

    <date year="2022" month="July" day="08"/>

    
    <workgroup>dnsop</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>DNS Error Reporting is a lightweight error reporting mechanism that provides the operator of an authoritative server with reports on DNS resource records that fail to resolve or validate, that a Domain Owner or DNS Hosting organization can use to improve domain hosting. The reports are based on Extended DNS Errors <xref target="RFC8914"/>.</t>

<t>When a domain name fails to resolve or validate due to a misconfiguration or an attack, the operator of the authoritative server may be unaware of this. To mitigate this lack of feedback, this document describes a method for a validating recursive resolver to automatically signal an error to an agent specified by the authoritative server. DNS Error Reporting uses the DNS to report errors.</t>

<t>Another lack of feedback occurs when validation was successful, or when there is no error to report. This positive feedback may be helpful to show that a deployment was successful. This document introcudes an extended DNS error “NO ERROR”.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">
<t>When an authoritative server serves a stale DNSSEC signed zone, the cryptographic signatures over the resource record sets (RRsets) may have lapsed. A validating recursive resolver will fail to validate these resource records.</t>

<t>Similarly, when there is a mismatch between the DS records at a parent zone and the key signing key at the child zone, a validating recursive resolver will fail to authenticate records in the child zone.</t>

<t>These are two of several failure scenarios that may go unnoticed for some time by the operator of a zone.</t>

<t>There is no direct relationship between operators of validating recursive resolvers and authoritative servers. Outages are often noticed indirectly, by end users, and reported via social media, if reported at all.</t>

<t>When records fail to validate there is no facility to report this failure in an automated way. If there is any indication that an error or warning has happened, it is buried in log files of the validating resolver, if these errors are logged at all.</t>

<t>This document describes a facility that can be used by validating recursive resolvers to report errors in an automated way. In addition, successful validation, or a lack of errors can also be reported in an automated way.</t>

<t>It allows an authoritative server to signal a reporting agent where the validating recursive resolver can report issues if it is configured to do so. The signal also indicates that the reporting agent is interested in successful validation, or lack of errors.</t>

<t>The burden of reporting a failure falls on the validating recursive resolver. It is important that the effort needed to report failure is low, with minimal impact to its main functions. To accomplish this goal, the DNS itself is utilized to report the error.</t>

</section>
<section anchor="requirements-notation" title="Requirements Notation">
<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “MAY”, and “OPTIONAL” in this document are to be interpreted as described in <xref target="RFC2119"/>.</t>

</section>
<section anchor="terminology" title="Terminology">
<t>Reporting Resolver: In the context of this document, the term reporting resolver is used as a shorthand for a validating recursive resolver that supports DNS Error Reporting.</t>

<t>Reporting Query: The DNS query used to report an error is called a reporting query. A reporting query is for DNS resource record type NULL. The details of the error report are encoded in the QNAME of the reporting query.</t>

<t>Reporting Agent: A facility responsible for receiving error reports on behalf of authoritative servers. This facility is indicated by a domain name.</t>

<t>Reporting Agent Domain: a domain name which the reporting resolver includes in the QNAME of the reporting query.</t>

<t>Positive Feedback: A report that indicates that no error occurred.</t>

</section>
<section anchor="overview" title="Overview">
<t>An authoritative server indicates support for DNS Error Reporting by including an EDNS0 option with OPTION-CODE [TBD] [RFC Editor: change TBD to the proper code when assigned by IANA.], a flag to indicate a request for positive feedback and the REPORTING AGENT DOMAIN in DNS wireformat in the option’s payload. The authoritative server MUST NOT include this option in the response if the configured reporting agent domain is empty or the null label (the root).</t>

<t>The positive feedback flag indicates that the reporting agent wants to receive extended DNS error [TBD] that indicates that no error occurred. This extended DNS error is defined in this document.</t>

<t>When a reporting resolver sends a reporting query to report an error, it MUST NOT include the EDNS0 Error Reporting option in the reporting query. This avoids additional compounding error reporting when there is an issue with the reporting agent domain.</t>

<t>To report an error, the reporting resolver encodes the error report in the QNAME of the reporting query. The reporting resolver builds this QNAME by concatenating the _er label, the extended error code <xref target="RFC8914"/>, the QTYPE and the QNAME that resulted in failure, the label “_er” again, and the reporting agent domain. See the example in section 4.2.</t>

<t>The resulting concatenated domain name is sent as a standard DNS query for DNS resource record type NULL by the reporting resolver. This query MUST NOT have the EDNS0 option code [TBD] set to avoid compounding error notifications.</t>

<t>The query will ultimately arrive at the authoritative server for the reporting agent domain. A NODATA negative response is returned by the authoritative server of the reporting agent domain, which in turn can be cached by the reporting resolver.</t>

<t>This caching is essential. It ensures that the number of reports sent by a reporting resolver for the same problem is dampened, i.e. once per TTL, however, certain optimizations such as <xref target="RFC8020"/> and <xref target="RFC8198"/> may reduce the number of error reporting queries as well.</t>

<section anchor="managing-caching-optimizations" title="Managing Caching Optimizations">

<t>The reporting resolver may utilize various caching optimizations that inhibit subsequent error reporting to the same reporting agent domain.</t>

<t>If the authoritative server for the reporting agent domain were to respond with NXDOMAIN (name error), <xref target="RFC8020"/> rules state that any name at or below that domain should be considered unreachable, and negative caching would prohibit subsequent queries for anything at or below that domain for a period of time, depending on the negative TTL <xref target="RFC2308"/>.</t>

<t>Since the authoritative server for an agent domain may not know the contents of all the zones it acts as an agent for, it is essential that the authoritative server does not respond with NXDOMAIN, as that may inhibit subsequent queries. The use of a wildcard domain name <xref target="RFC4592"/> in the zone for the agent domain will ensure the RCODE is consistently NOERROR.</t>

<t>Considering the Resource Record type for this wildcard record, type NULL is prohibited in master zone files <xref target="RFC1035"/>. However, any type that is not special according to <xref target="RFC4592"/> section 4 will do, such as a TXT record with an email address for the reporting agent in the RDATA.</t>

<t>Wildcard expansion occurs, even if the QTYPE is not for the type owned by the wildcard domain name. The response is a “no error, but no data” response (<xref target="RFC4592"/>, section 2.2.1.) that contains a NOERROR RCODE and empty answer section. Note that reporting resolvers are not expected to query for this TXT record, since reporting queries use type NULL. This record is solely present to ensure a NODATA response is returned in response to reporting queries.</t>

<t>When the zone for the reporting agent domain is signed, a resolver may utilize aggressive negative caching, discussed in <xref target="RFC8198"/>. This optimization makes use of NSEC and NSEC3 (without opt-out) records and allows the resolver to do the wildcard synthesis. When this happens, the resolver may not send subsequent queries as it will be able to synthesize a response from previously cached material.</t>

<t>A solution is to avoid DNSSEC for the reporting agent domain. Signing the agent domain will incur an additional burden on the reporting resolver, as it has to validate the response. However, this response has no utility to the reporting resolver.</t>

</section>
<section anchor="example" title="Example">
<t>The domain broken.test is hosted on a set of authoritative servers. One of these serves a stale version. This authoritative server has a severity level of 1 and a reporting agent configured: a01.reporting-agent.example.</t>

<t>The reporting resolver is unable to validate the broken.test RRSet for type A, due to an RRSIG record with an expired signature.</t>

<t>The reporting resolver constructs the QNAME _er.7.1.broken.test._er.a01.reporting-agent.example and resolves it. This QNAME indicates extended DNS error 7 occurred while trying to validate broken.test type 1 (A) record.</t>

<t>After this query is received at one of the authoritative servers for the reporting agent domain (a01.reporting-agent.example), the reporting agent (the operators of the authoritative server for a01.reporting-agent.example) determines that the authoritative server for the broken.test zone suffers from an expired signature record (extended error 7) for type A for the domain name broken.test. The reporting agent can contact the operators of broken.test to fix the issue.</t>

</section>
</section>
<section anchor="edns0-option-specification" title="EDNS0 Option Specification">
<t>This method uses an EDNS0 <xref target="RFC6891"/> option to indicate support for sending DNS error reports and responding with the Reporting Agent Domain in DNS messages. The option is structured as follows:</t>

<figure><artwork><![CDATA[
                     1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 3 3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1                     
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|        OPTION-CODE = TBD      |       OPTION-LENGTH           |
+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
|F|                  REPORTING AGENT DOMAIN                     /
+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
]]></artwork></figure>

<t>Field definition details:</t>

<t><list style="symbols">
  <t>OPTION-CODE, 2-octets/16-bits (defined in <xref target="RFC6891"/>), for indicating error reporting support is TBD. [RFC Editor: change TBD to the proper code when assigned by IANA.]</t>
  <t>OPTION-LENGTH, 2-octets/16-bits ((defined in <xref target="RFC6891"/>) contains the length of the REPORTING AGENT DOMAIN field in octets.</t>
  <t>F, A flag to request positive feedback (i.e. to include the “No Error” extended DNS error defined in this document when reporting).</t>
  <t>REPORTING AGENT DOMAIN, a Domain name <xref target="RFC8499"/> in the DNS wire format prescribed by <xref target="RFC1035"/>.</t>
</list></t>

</section>
<section anchor="dns-error-reporting-specification" title="DNS Error Reporting Specification">
<t>The various errors that a reporting resolver may encounter are listed in <xref target="RFC8914"/>. Note that not all listed errors may be supported by the reporting resolver. This document does not specify what is an error and what is not.</t>

<t>The DNS class is not specified in the error report.</t>

<section anchor="reporting-resolver-specification" title="Reporting Resolver Specification">
<t>Reporting Resolvers may have a configuration that allows the following:</t>

<t>The reporting resolver MUST NOT use DNS error reporting to report a failure in resolving the reporting query.</t>

<t>The reporting resolver MUST NOT use DNS error reporting if the authoritative server has an empty Reporting Agent Domain field in the EDNS Error Reporting option.</t>

<t>The reporting resolver should limit the amount of positive feedback send.</t>

<section anchor="constructing-the-reporting-query" title="Constructing the Reporting Query">

<t>The QNAME for the reporting query is constructed by concatenating the following elements, appending each successive element in the list to the right-hand side of the QNAME:</t>

<t><list style="symbols">
  <t>A label containing the string “_er”.</t>
  <t>The Extended DNS error, presented as a decimal value, in a single DNS label.</t>
  <t>The QTYPE that was used in the query that resulted in the extended DNS error, presented as a decimal value, in a single DNS label.</t>
  <t>The QNAME that was used in the query that resulted in the extended DNS error. The QNAME may consist of multiple labels and is concatenated as is, i.e. in DNS wire format.</t>
  <t>A label containing the string “_er”.</t>
  <t>The reporting agent domain. The reporting agent domain consists of multiple labels and is concatenated exactly as received in the EDNS option sent by the authoritative server.</t>
</list></t>

<t>If the resulting reporting query QNAME would exceed 255 octets, it MUST NOT be sent.</t>

<t>The “_er” labels allow the reporting agent to quickly differentiate between the agent domain and the faulty query name. When the specified agent domain is empty, or a NULL label (despite being not allowed in this specification), the reporting query will have “_er” as a top-level domain as a result and not the original query. Lastly, the purpose of the first “_er” label is to indicate that a complete reporting query has been received, instead of a shorter reporting query due to  query minimization.</t>

</section>
</section>
<section anchor="authoritative-server-specification" title="Authoritative Server Specification">
<t>The Authoritative Server SHOULD NOT have multiple reporting agent domains configured for a single zone. To support multiple reporting agents, a single agent can act as a syndicate to subsequently inform additional agents.</t>

<t>An authoritative server for a zone with DNS error reporting enabled SHOULD NOT also be authoritative for that zone’s reporting agent domain’s zone.</t>

</section>
<section anchor="reporting-agent-specification" title="Reporting Agent Specification">
<t>It is RECOMMENDED that the reporting agent zone uses a wildcard DNS record of type TXT with an arbitrary string in the RDATA and a TTL of at least one hour.</t>

</section>
<section anchor="choosing-a-reporting-agent-domain" title="Choosing a Reporting Agent Domain">
<t>It is RECOMMENDED that the reporting agent domain be kept relatively short to allow for a longer QNAME in the reporting query.</t>

</section>
</section>
<section anchor="iana-considerations" title="IANA Considerations">
<t>IANA is requested to assign the following DNS EDNS0 option code registry:</t>

<figure><artwork><![CDATA[
      Value    Name              Status      Reference
      -----    ----------------  --------    ---------------
      TBD      DNS ERROR REPORT  Standard    [this document]
]]></artwork></figure>
<t>[RFC Editor: change TBD to the proper code when assigned by IANA.]</t>

<t>IANA is requested to assign the following Underscored and Globally Scoped DNS Node Name registry:</t>

<figure><artwork><![CDATA[
      RR Type  _NODE NAME  Reference
      -----    ----------  ---------   
      TXT      _er         [this document]
]]></artwork></figure>

<t>IANA is requested to assign the following value the “Extended DNS Error Codes” registry:</t>

<t>INFO-CODE:
[TBD]</t>

<t>Purpose:
No Error</t>

<t>Reference:
This document</t>

</section>
<section anchor="security-considerations" title="Security Considerations">
<t>Use of DNS Error Reporting may expose local configuration mistakes in the reporting resolver, such as stale DNSSEC trust anchors to the reporting agent.</t>

<t>DNS Error reporting SHOULD be done using DNS Query Name Minimization <xref target="RFC7816"/> to improve privacy.</t>

<t>DNS Error Reporting is done without any authentication between the reporting resolver and the authoritative server of the agent domain. Authentication significantly increases the burden on the reporting resolver without any benefit to the reporting agent, authoritative server or reporting resolver.</t>

<t>The method described in this document will cause additional queries by the reporting resolver to authoritative servers in order to resolve the reporting query.</t>

<t>This method can be abused by deploying broken zones with agent domains that are delegated to servers operated by the intended victim in combination with open resolvers <xref target="RFC8499"/>.</t>

</section>
<section anchor="acknowledgements" title="Acknowledgements">
<t>This document is based on an idea by Roy Arends and David Conrad. The authors would like to thank Peter van Dijk, Vladimir Cunat, Paul Hoffman, Libor Peltan, Matthijs Mekking, Willem Toorop, Tom Carpay, Dick Franks, Benno Overeinder and Petr Spacek for their contributions.</t>

</section>


  </middle>

  <back>


    <references title='Informative References'>





<reference  anchor="RFC8914" target='https://www.rfc-editor.org/info/rfc8914'>
<front>
<title>Extended DNS Errors</title>
<author initials='W.' surname='Kumari' fullname='W. Kumari'><organization /></author>
<author initials='E.' surname='Hunt' fullname='E. Hunt'><organization /></author>
<author initials='R.' surname='Arends' fullname='R. Arends'><organization /></author>
<author initials='W.' surname='Hardaker' fullname='W. Hardaker'><organization /></author>
<author initials='D.' surname='Lawrence' fullname='D. Lawrence'><organization /></author>
<date year='2020' month='October' />
<abstract><t>This document defines an extensible method to return additional information about the cause of DNS errors. Though created primarily to extend SERVFAIL to provide additional information about the cause of DNS and DNSSEC failures, the Extended DNS Errors option defined in this document allows all response types to contain extended error information. Extended DNS Error information does not change the processing of RCODEs.</t></abstract>
</front>
<seriesInfo name='RFC' value='8914'/>
<seriesInfo name='DOI' value='10.17487/RFC8914'/>
</reference>



<reference  anchor="RFC2119" target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author initials='S.' surname='Bradner' fullname='S. Bradner'><organization /></author>
<date year='1997' month='March' />
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference  anchor="RFC8020" target='https://www.rfc-editor.org/info/rfc8020'>
<front>
<title>NXDOMAIN: There Really Is Nothing Underneath</title>
<author initials='S.' surname='Bortzmeyer' fullname='S. Bortzmeyer'><organization /></author>
<author initials='S.' surname='Huque' fullname='S. Huque'><organization /></author>
<date year='2016' month='November' />
<abstract><t>This document states clearly that when a DNS resolver receives a response with a response code of NXDOMAIN, it means that the domain name which is thus denied AND ALL THE NAMES UNDER IT do not exist.</t><t>This document clarifies RFC 1034 and modifies a portion of RFC 2308: it updates both of them.</t></abstract>
</front>
<seriesInfo name='RFC' value='8020'/>
<seriesInfo name='DOI' value='10.17487/RFC8020'/>
</reference>



<reference  anchor="RFC8198" target='https://www.rfc-editor.org/info/rfc8198'>
<front>
<title>Aggressive Use of DNSSEC-Validated Cache</title>
<author initials='K.' surname='Fujiwara' fullname='K. Fujiwara'><organization /></author>
<author initials='A.' surname='Kato' fullname='A. Kato'><organization /></author>
<author initials='W.' surname='Kumari' fullname='W. Kumari'><organization /></author>
<date year='2017' month='July' />
<abstract><t>The DNS relies upon caching to scale; however, the cache lookup generally requires an exact match.  This document specifies the use of NSEC/NSEC3 resource records to allow DNSSEC-validating resolvers to generate negative answers within a range and positive answers from wildcards.  This increases performance, decreases latency, decreases resource utilization on both authoritative and recursive servers, and increases privacy.  Also, it may help increase resilience to certain DoS attacks in some circumstances.</t><t>This document updates RFC 4035 by allowing validating resolvers to generate negative answers based upon NSEC/NSEC3 records and positive answers in the presence of wildcards.</t></abstract>
</front>
<seriesInfo name='RFC' value='8198'/>
<seriesInfo name='DOI' value='10.17487/RFC8198'/>
</reference>



<reference  anchor="RFC2308" target='https://www.rfc-editor.org/info/rfc2308'>
<front>
<title>Negative Caching of DNS Queries (DNS NCACHE)</title>
<author initials='M.' surname='Andrews' fullname='M. Andrews'><organization /></author>
<date year='1998' month='March' />
<abstract><t>RFC1034 provided a description of how to cache negative responses.  It however had a fundamental flaw in that it did not allow a name server to hand out those cached responses to other resolvers, thereby greatly reducing the effect of the caching.  This document addresses issues raise in the light of experience and replaces RFC1034 Section 4.3.4. [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='2308'/>
<seriesInfo name='DOI' value='10.17487/RFC2308'/>
</reference>



<reference  anchor="RFC4592" target='https://www.rfc-editor.org/info/rfc4592'>
<front>
<title>The Role of Wildcards in the Domain Name System</title>
<author initials='E.' surname='Lewis' fullname='E. Lewis'><organization /></author>
<date year='2006' month='July' />
<abstract><t>This is an update to the wildcard definition of RFC 1034.  The interaction with wildcards and CNAME is changed, an error condition is removed, and the words defining some concepts central to wildcards are changed.  The overall goal is not to change wildcards, but to refine the definition of RFC 1034.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4592'/>
<seriesInfo name='DOI' value='10.17487/RFC4592'/>
</reference>



<reference  anchor="RFC1035" target='https://www.rfc-editor.org/info/rfc1035'>
<front>
<title>Domain names - implementation and specification</title>
<author initials='P.V.' surname='Mockapetris' fullname='P.V. Mockapetris'><organization /></author>
<date year='1987' month='November' />
<abstract><t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System.  It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t></abstract>
</front>
<seriesInfo name='STD' value='13'/>
<seriesInfo name='RFC' value='1035'/>
<seriesInfo name='DOI' value='10.17487/RFC1035'/>
</reference>



<reference  anchor="RFC6891" target='https://www.rfc-editor.org/info/rfc6891'>
<front>
<title>Extension Mechanisms for DNS (EDNS(0))</title>
<author initials='J.' surname='Damas' fullname='J. Damas'><organization /></author>
<author initials='M.' surname='Graff' fullname='M. Graff'><organization /></author>
<author initials='P.' surname='Vixie' fullname='P. Vixie'><organization /></author>
<date year='2013' month='April' />
<abstract><t>The Domain Name System's wire protocol includes a number of fixed fields whose range has been or soon will be exhausted and does not allow requestors to advertise their capabilities to responders.  This document describes backward-compatible mechanisms for allowing the protocol to grow.</t><t>This document updates the Extension Mechanisms for DNS (EDNS(0)) specification (and obsoletes RFC 2671) based on feedback from deployment experience in several implementations.  It also obsoletes RFC 2673 (&quot;Binary Labels in the Domain Name System&quot;) and adds considerations on the use of extended labels in the DNS.</t></abstract>
</front>
<seriesInfo name='STD' value='75'/>
<seriesInfo name='RFC' value='6891'/>
<seriesInfo name='DOI' value='10.17487/RFC6891'/>
</reference>



<reference  anchor="RFC8499" target='https://www.rfc-editor.org/info/rfc8499'>
<front>
<title>DNS Terminology</title>
<author initials='P.' surname='Hoffman' fullname='P. Hoffman'><organization /></author>
<author initials='A.' surname='Sullivan' fullname='A. Sullivan'><organization /></author>
<author initials='K.' surname='Fujiwara' fullname='K. Fujiwara'><organization /></author>
<date year='2019' month='January' />
<abstract><t>The Domain Name System (DNS) is defined in literally dozens of different RFCs.  The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has sometimes changed in the decades since the DNS was first defined.  This document gives current definitions for many of the terms used in the DNS in a single document.</t><t>This document obsoletes RFC 7719 and updates RFC 2308.</t></abstract>
</front>
<seriesInfo name='BCP' value='219'/>
<seriesInfo name='RFC' value='8499'/>
<seriesInfo name='DOI' value='10.17487/RFC8499'/>
</reference>



<reference  anchor="RFC7816" target='https://www.rfc-editor.org/info/rfc7816'>
<front>
<title>DNS Query Name Minimisation to Improve Privacy</title>
<author initials='S.' surname='Bortzmeyer' fullname='S. Bortzmeyer'><organization /></author>
<date year='2016' month='March' />
<abstract><t>This document describes a technique to improve DNS privacy, a technique called &quot;QNAME minimisation&quot;, where the DNS resolver no longer sends the full original QNAME to the upstream name server.</t></abstract>
</front>
<seriesInfo name='RFC' value='7816'/>
<seriesInfo name='DOI' value='10.17487/RFC7816'/>
</reference>




    </references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

