<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.3) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-hoffman-deleg-getting-names-08" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="Getting Nameservers">Getting Nameservers in the New Delegation Protocol</title>

    <author initials="P." surname="Hoffman" fullname="Paul Hoffman">
      <organization>ICANN</organization>
      <address>
        <email>paul.hoffman@icann.org</email>
      </address>
    </author>

    <date year="2025" month="May" day="06"/>

    
    
    

    <abstract>


<?line 28?>

<t>The DELEG Working Group has chosen a base protocol that describes how resolvers will be able to get a new DNS resource record to create a new process for DNS delegation.
After a resolver gets this new type of record, it needs to know how to process the record in order to get a set of nameservers for a zone.
This document lists many of the considerations for that process, including many open questions for the DELEG Working Group.
More considerations and open questions might be added in later versions of this draft.</t>

<t>Note that this draft is <em>not</em> intended to become an RFC.
It is being published so that the DELEG Working Group has a place to point its efforts about how resolvers get nameservers for a zone while it continues to work on choosing a base protocol.
The work that results from this might be included in the base protocol specification, or in a new draft authored by some of the many people who have done earlier work in this area.</t>



    </abstract>



  </front>

  <middle>


<?line 39?>

<section anchor="introduction"><name>Introduction</name>

<t>The <eref target="https://datatracker.ietf.org/group/deleg/about/">DELEG Working Group</eref> charter says that the WG is choosing a base protocol, a "specification defining the new delegation information distribution mechanism".
This document specifies how that information will appear in the new resource records from the base protocol, and what resolvers that receive those records will do with them.</t>

<t>According to the working group charter, after it has chosen the base protocol, it will specify a "specification for how to use the new delegation information to perform aliasing of delegation information" and "new DNS authoritative signaling mechanisms for alternative DNS transports".
<xref target="getting"/> and  <xref target="addr-and-transport"/> of this document gives some idea for what those extensions might include, and how they related to the mechanisms in this document.
The charter does not specify whether these two specifications need to be in different standards-track documents or can be in the same document.</t>

<section anchor="the-base-protocol"><name>The Base Protocol</name>

<t>The WG chose <xref target="I-D.draft-ietf-deleg"/> as the starting point for the base protocol.
It will work on fixes and clarifications for many topics that came up during the consensus process, such as for root zone priming and interactions with DNSSEC.
In this document, the base protocol is called "DELEG_base".</t>

<t>DELEG_base uses the same display and wire format as SVCB <xref target="RFC9460"/> for records returned to the resolver in delegation responses.
In SVCB, the first field in the RR is called the "SvcPriority", and different values cause the resolver to go into "AliasMode" or "ServiceMode".
The result of using this field in resolution is a set of "alternative endpoints".
The second field is called "TargetName".
The third field is optional, and is called "SvcParams"; it has a lot of sub-fields, some of which are useful for the DNS delegation use cases.</t>

<t>In order to not confuse this with specifics that DELEG_base gives beyond the base protocol, the new record type returned in delegation responses is called "DELEG_rr" here.
(Of course, the name can be whatever the WG chooses in the eventual base protocol.)
DELEG_rr has different semantics from SVCB because SCVB assumed a base protocol of HTTPS.
DELEG_base gives different names to values for the first field in the RR, and for sub-fields in the optional third field.
Other names from DELEG_base and SVCB are renamed here for clarity; the eventual names might be completely different.</t>

<t>The base protocol will allow for extensions in the third field.
Those extensions might reuse entries in the <eref target="https://www.iana.org/assignments/dns-svcb/dns-svcb.xhtml">IANA SVCB registry</eref>, they might add new extensions to that registry, or there might be a new registry for the DELEG_rr record.</t>

</section>
</section>
<section anchor="getting"><name>Getting Nameserver Names for a Zone</name>

<t>The goal of the DELEG Working Group effort is to give resolvers a better way create a set of nameservers for a zone when making DNS queries to authoritative servers.
In DELEG_base, when a resolver makes a query that gets a delegation response, the resolver may get back one or more DELEG_rr records and NS records that it can further process to create the set of nameservers for the zone.
This eventual set of nameservers can be called the "DELEG_nameservers"; this is quite different from the set of DELEG_rr records it received.</t>

<t>In the DELEG_rr, the first field can be thought of as indicating the <em>action</em> to find names for the DELEG_nameservers other than the NS records that might be at the apex, using the second field as a <em>target</em> domain name where to look.
The first field can be called "DELEG_action" and the second "DELEG_target".
The third field, which holds metadata about the DELEG_target, can be called "DELEG_metadata"</t>

<t>The rest of this section describes how a resolver processes the DELEG_rr record, based on proposals made in <xref target="I-D.wesplaap-deleg"/>, <xref target="I-D.homburg-deleg"/>, and various discussions in the DELEG Working Group.</t>

<t>The WG discussion so far has led to general agreement a DELEG_action of value 0 means an action like "find a nameserver to be included in DELEG_nameservers elsewhere based on the value in the DELEG_target", and a value of 1 means something like "the name in DELEG_target is a nameserver for DELEG_nameservers".
Thus, when a resolver receives one or more DELEG_rr records with a DELEG_action of 0, it needs to do more processing to complete the DELEG_nameservers set.
When it receives one or more DELEG_rr records with a DELEG_action of 1, it copies the DELEG_target from those records and puts them into the DELEG_nameservers (possibly with additional information from the DELEG_metadata, such as from <xref target="addr-and-transport"/>).</t>

<t>There has been much discussion in the WG about what action a resolver take when it gets a DELEG_action of 0.
Some proposals include following chains of SVCB records, with some limits to prevent loops or excessive processing;
others include following CNAME records, while others include querying DELEG_target for DELEG_rr records.</t>

<section anchor="additional-considerations-for-the-wg-on-filling-the-delegnameservers-set"><name>Additional Considerations for the WG on Filling the DELEG_nameservers Set</name>

<t>The resolver [[ MAY / SHOULD / SHOULD NOT / MUST / MUST NOT ]] use the NS records that were returned with the query to expand the DELEG_nameservers.
(If SHOULD or SHOULD NOT is chosen by the WG, the exceptions need to be listed.)</t>

<t>If there are DELEG_rr records but the resolver ends up with nothing in the DELEG_nameservers, does it fall back to using the NS records in the original query?</t>

<t>Is the addition to the DELEG_nameservers different if following a DELEG_action of 0 leads to signed vs. unsigned responses?
Asked another way, if the DELEG_nameservers contains some results that were signed and some that were unsigned, does the DELEG_nameservers become an ordered list or are the unsigned results discarded?</t>

<t>What is the TTL of the records in DELEG_nameservers?
A likely answer (but not the only possible one) is the TTL on the DELEG_rr record that had a DELEG_action of 1.
If so, this could mean that different delegation records in the DELEG_nameservers for the same zone might have different TTLs.</t>

</section>
</section>
<section anchor="addr-and-transport"><name>Addresses and Transports When Filling the DELEG_nameservers Set</name>

<t>Address and transport information in the DELEG_metadata can affect the addressed added to the DELEG_nameservers.
Thus, these might become part of whatever document describes filling the DELEG_nameservers set, or these might be in a separate document that is referenced from the main addressing document.</t>

<t>The DELEG_metadata field in the DELEG_rr record will have a subfield to indicate the IPv4 and IPv6 address(es) associated with the DELEG_target.
The subfield can be called "DELEG_ips".</t>

<t>The DELEG_metadata field in the DELEG_rr record will have a subfield to indicate the transport(s) associated with the DELEG_target.
The subfield can be called "DELEG_transports".</t>

<section anchor="addresses"><name>Addresses</name>

<t>Can a DELEG_rr with a DELEG_action of 0 have a DELEG_ips in the record? In SVCB they cannot, but the SVCB spec allows other specs to allow them.</t>

<t>Is the value for the DELEG_ips a single address or potentially a list? If the former, how are multiple DELEG_rr records with the same DELEG_action and DELEG_target combined?</t>

<t>What happens if some of the discovered name/address pairs have different addresses?
Does that disagreement in the DELEG_nameservers cause the removal of something from the DELEG_nameservers?</t>

</section>
<section anchor="transports"><name>Transports</name>

<t>Can a DELEG_rr with a DELEG_action of 0 have a DELEG_transports in the record? In SVCB they cannot, but the SVCB spec allows other specs to allow them.</t>

<t>Some specific DNS transports will be allowed or required with DELEG_transports.
Which secure transport(s), if any, will be mandory to implement?</t>

<t>Does supporting both TLS and QUIC make operational or security sense?</t>

<t>Does supporting DOH make operational or security sense if other secure transport is allowed?</t>

<t>If either or both TLS and DoH are allowed, which versions of TLS are allowed?</t>

<t>Does Do53 need to be specified every time it is available?</t>

</section>
<section anchor="authentication-of-secure-transports"><name>Authentication of Secure Transports</name>

<t>How will clients deal with authenticating TLS?
Should they just use the web PKI pile of CAs, or will something else be specified?</t>

<t>Should certificates with IP addresses be supported?</t>

<t>Should clients ignore PKIX Extended Key Usage settings?</t>

<t>If authentication fails during a lookup, should the resolver fall back to unauthenticated encrypted transport, or should it retry on Do53, or should the DELEG_rr that contained this secure transport be ignored?</t>

</section>
</section>
<section anchor="priming-the-root-zone"><name>Priming the Root Zone</name>

<t>The current proposal for DELEG_base cannot be used to prime the root zone because the root zone is not its own parent.
Different proposals have been made informally how to make a special case of the DELEG_base protocol to allow a DELEG_rr record to be legally served by root server operators to allow the advantages of DELEG_base (can be signed; can include IP addresses and transports) to cover the root zone.</t>

<t>Should such proposals be considered?</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>There may be IANA considerations when the working group finishes this work.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>There will certainly be security considerations when the working group finishes this work.</t>

</section>


  </middle>

  <back>




    <references title='Informative References' anchor="sec-informative-references">




<reference anchor="I-D.draft-ietf-deleg">
   <front>
      <title>Extensible Delegation for DNS</title>
      <author fullname="Tim April" initials="T." surname="April">
         <organization>Google, LLC</organization>
      </author>
      <author fullname="Petr Špaček" initials="P." surname="Špaček">
         <organization>ISC</organization>
      </author>
      <author fullname="Ralf Weber" initials="R." surname="Weber">
         <organization>Akamai Technologies</organization>
      </author>
      <author fullname="David C Lawrence" initials="" surname="Lawrence">
         <organization>Salesforce</organization>
      </author>
      <date day="6" month="May" year="2025"/>
      <abstract>
	 <t>   A delegation in the Domain Name System (DNS) is a mechanism that
   enables efficient and distributed management of the DNS namespace.
   It involves delegating authority over subdomains to specific DNS
   servers via NS records, allowing for a hierarchical structure and
   distributing the responsibility for maintaining DNS records.

   An NS record contains the hostname of the nameserver for the
   delegated namespace.  Any facilities of that nameserver must be
   discovered through other mechanisms.  This document proposes a new
   extensible DNS record type, DELEG, for delegation the authority for a
   domain.  Future documents then can use this mechanism to use
   additional information about the delegated namespace and the
   capabilities of authoritative nameservers for the delegated
   namespace.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-deleg-00"/>
   
</reference>

<reference anchor="I-D.wesplaap-deleg">
   <front>
      <title>Extensible Delegation for DNS</title>
      <author fullname="Tim April" initials="T." surname="April">
         <organization>Google, LLC</organization>
      </author>
      <author fullname="Petr Špaček" initials="P." surname="Špaček">
         <organization>ISC</organization>
      </author>
      <author fullname="Ralf Weber" initials="R." surname="Weber">
         <organization>Akamai Technologies</organization>
      </author>
      <author fullname="David C Lawrence" initials="" surname="Lawrence">
         <organization>Salesforce</organization>
      </author>
      <date day="18" month="February" year="2025"/>
      <abstract>
	 <t>   A delegation in the Domain Name System (DNS) is a mechanism that
   enables efficient and distributed management of the DNS namespace.
   It involves delegating authority over subdomains to specific DNS
   servers via NS records, allowing for a hierarchical structure and
   distributing the responsibility for maintaining DNS records.

   An NS record contains the hostname of the nameserver for the
   delegated namespace.  Any facilities of that nameserver must be
   discovered through other mechanisms.  This document proposes a new
   extensible DNS record type, DELEG, for delegation the authority for a
   domain.  Future documents then can use this mechanism to use
   additional information about the delegated namespace and the
   capabilities of authoritative nameservers for the delegated
   namespace.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-wesplaap-deleg-02"/>
   
</reference>

<reference anchor="I-D.homburg-deleg">
   <front>
      <title>Extensible Delegation for DNS</title>
      <author fullname="Philip Homburg" initials="P." surname="Homburg">
         <organization>NLnet Labs</organization>
      </author>
      <author fullname="Tim Wicinski" initials="T." surname="Wicinski">
         <organization>Cox Communications</organization>
      </author>
      <author fullname="Jesse van Zutphen" initials="J." surname="van Zutphen">
         <organization>University of Amsterdam</organization>
      </author>
      <author fullname="Willem Toorop" initials="W." surname="Toorop">
         <organization>NLnet Labs</organization>
      </author>
      <date day="3" month="April" year="2025"/>
      <abstract>
	 <t>   This document proposes a mechanism for extensible delegations in the
   DNS.  The mechanism realizes delegations with resource record sets
   placed below a _deleg label in the apex of the delegating zone.  This
   authoritative delegation point can be aliased to other names using
   CNAME and DNAME.  This document proposes a new DNS resource record
   type, IDELEG, which is based on the SVCB and inherits extensibility
   from it.

   IDELEG RRsets containing delegation information will be returned in
   the authority section in referral responses from supportive
   authoritative name servers.  Lack of support in the authoritative
   name servers, forwarders or other components, does not obstruct
   obtaining the delegation information for resolvers, as it is
   originally authoritative information that can be queried for
   directly.  None, mixed or full deployment of the mechanism on
   authoritative name servers are all fully functional, allowing for the
   mechanism to be incrementally deployed on the authoritative name
   servers.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-homburg-deleg-01"/>
   
</reference>
<reference anchor="RFC9460">
  <front>
    <title>Service Binding and Parameter Specification via the DNS (SVCB and HTTPS Resource Records)</title>
    <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
    <author fullname="M. Bishop" initials="M." surname="Bishop"/>
    <author fullname="E. Nygren" initials="E." surname="Nygren"/>
    <date month="November" year="2023"/>
    <abstract>
      <t>This document specifies the "SVCB" ("Service Binding") and "HTTPS" DNS resource record (RR) types to facilitate the lookup of information needed to make connections to network services, such as for HTTP origins. SVCB records allow a service to be provided from multiple alternative endpoints, each with associated parameters (such as transport protocol configuration), and are extensible to support future uses (such as keys for encrypting the TLS ClientHello). They also enable aliasing of apex domains, which is not possible with CNAME. The HTTPS RR is a variation of SVCB for use with HTTP (see RFC 9110, "HTTP Semantics"). By providing more information to the client before it attempts to establish a connection, these records offer potential benefits to both performance and privacy.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9460"/>
  <seriesInfo name="DOI" value="10.17487/RFC9460"/>
</reference>



    </references>




  </back>

<!-- ##markdown-source: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-->

</rfc>

