<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc comments="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-dnsop-dns-error-reporting-04" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="DNS-ER">DNS Error Reporting</title>

    <author initials="R." surname="Arends" fullname="Roy Arends">
      <organization>ICANN</organization>
      <address>
        <email>roy.arends@icann.org</email>
      </address>
    </author>
    <author initials="M." surname="Larson" fullname="Matt Larson">
      <organization>ICANN</organization>
      <address>
        <email>matt.larson@icann.org</email>
      </address>
    </author>

    <date year="2023" month="February" day="02"/>

    
    <workgroup>dnsop</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>DNS error reporting is a lightweight reporting mechanism that provides the operator of an authoritative server with reports on DNS resource records that fail to resolve or validate. A domain owner or DNS hosting organization can use these reports to improve domain hosting. The reports are based on extended DNS errors as described in RFC 8914.</t>

<t>When a domain name fails to resolve or validate due to a misconfiguration or an attack, the operator of the authoritative server may be unaware of this. To mitigate this lack of feedback, this document describes a method for a validating recursive resolver to automatically signal an error to a monitoring agent specified by the authoritative server.</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>
<t>When an authoritative server serves a stale DNSSEC signed zone, the cryptographic signatures over the resource record sets (RRsets) may have lapsed. A validating recursive resolver will fail to validate these resource records.</t>

<t>Similarly, when there is a mismatch between the DS records at a parent zone and the key signing key at the child zone, a validating recursive resolver will fail to authenticate records in the child zone.</t>

<t>These are two of several failure scenarios that may go unnoticed for some time by the operator of a zone.</t>

<t>Today, there is no direct relationship between operators of validating recursive resolvers and authoritative servers. Outages are often noticed indirectly by end users, and reported via social media (if reported at all).</t>

<t>When records fail to validate, there is no facility to report this failure in an automated way. If there is any indication that an error or warning has happened, it may be buried in log files of the validating resolver or not logged at all.</t>

<t>This document describes a method that can be used by validating recursive resolvers to report DNSSEC validation errors in an automated way.</t>

<t>It allows an authoritative server to announce a monitoring agent where validating recursive resolvers can report issues if those resolvers are configured to do so.</t>

<t>The burden to report a failure falls on the validating recursive resolver. It is important that the effort needed to report failure is low, with minimal impact to its main functions. To accomplish this goal, the DNS itself is utilized to report the error.</t>

</section>
<section anchor="requirements-notation"><name>Requirements Notation</name>
<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>

</section>
<section anchor="terminology"><name>Terminology</name>
<dl>
  <dt>Reporting resolver:</dt>
  <dd>
    <t>In the context of this document, "reporting resolver" is used as a shorthand for a validating recursive resolver that supports DNS error reporting.</t>
  </dd>
  <dt>Report query:</dt>
  <dd>
    <t>The DNS query used to report an error is called a report query. A report query is for a DNS TXT resource record type. The content of the error report are encoded in the QNAME of the report query.</t>
  </dd>
  <dt>Monitoring agent:</dt>
  <dd>
    <t>An authoritative server that receives report queries. This facility is indicated by a domain name, referred to as the agent domain.</t>
  </dd>
  <dt>Agent domain:</dt>
  <dd>
    <t>A domain name which the reporting resolver includes in the QNAME of the report query.</t>
  </dd>
</dl>

</section>
<section anchor="overview"><name>Overview</name>

<t>An authoritative server indicates support for DNS error reporting by including an EDNS0 report channel option with OPTION-CODE [TBD] and the agent domain in the response. The agent domain is a fully qualified, uncompressed domain name in DNS wireformat. The authoritative server MUST NOT include this option in the response if the configured agent domain is empty, or is the null label (which would indicate the DNS root).</t>

<t>If the authoritative server has indicated support for DNS error reporting and there is an issue that can be reported via extended DNS errors, the reporting resolver encodes the error report in the QNAME of the report query. The reporting resolver builds this QNAME by concatenating the _er label, the QTYPE, the QNAME that resulted in failure, the extended error code (as described in <xref target="RFC8914"/>), the label "_er" again, and the agent domain. See the example in <xref target="example"/>. Note that a regular RCODE is not included because the RCODE is not relevant to the extended error code.</t>

<t>The resulting report query is sent as a standard DNS query for a TXT DNS resource record type by the reporting resolver.</t>

<t>The report query will ultimately arrive at the monitoring agent. A response is returned by the monitoring agent, which in turn can be cached by the reporting resolver. This caching is essential. It dampens the number of report queries sent by a reporting resolver for the same problem, that is, once per TTL. However, certain optimizations such as <xref target="RFC8020"/> and <xref target="RFC8198"/> may reduce the number of error report queries as well.</t>

<t>This document gives no guidance on the content of the TXT resource record RDATA for this record.</t>

<section anchor="managing-caching-optimizations"><name>Managing Caching Optimizations</name>

<t>The reporting resolver may utilize various caching optimizations that inhibit subsequent error reporting to the same monitoring agent.</t>

<t>If the monitoring agent were to respond with NXDOMAIN (name error), <xref target="RFC8020"/> says that any name at or below that domain should be considered unreachable, and negative caching would prohibit subsequent queries for anything at or below that domain for a period of time, depending on the negative TTL <xref target="RFC2308"/>.</t>

<t>Since the monitoring agent may not know the contents of all the zones for which it acts as a monitoring agent, the monitoring agent MUST NOT respond with NXDOMAIN for domains it is monitoring because that could inhibit subsequent queries. One method to avoid NXDOMAIN is to use a wildcard domain name <xref target="RFC4592"/> in the zone for the agent domain.</t>

<t>When the agent domain is signed, a resolver may use aggressive negative caching (described in <xref target="RFC8198"/>). This optimization makes use of NSEC and NSEC3 (without opt-out) records and allows the resolver to do the wildcard synthesis. When this happens, the resolver does not send subsequent queries because it will be able to synthesize a response from previously cached material.</t>

<t>A solution is to avoid DNSSEC for the agent domain. Signing the agent domain will incur an additional burden on the reporting resolver, as it has to validate the response. However, this response has no utility to the reporting resolver other than dampening the query load for error reports.</t>

</section>
<section anchor="example"><name>Example</name>
<t>A query for "broken.test.", type A, is sent by a reporting resolver. The request includes an empty EDNS0 report channel option.</t>

<t>The domain "test." is hosted on a set of authoritative servers. One of these authoritarive servers serves a stale version of the "test." zone. This authoritative server has an agent domain configured: "a01.agent-domain.example.".</t>

<t>The authoritative server with the stale "test." zone receives the request for "broken.test". As support for DNS error reporting was indicated by a empty EDNS0 report channel option in the request, the server includes the EDNS0 report channel option with the domain name "a01.agent-domain.example.".</t>

<t>The reporting resolver is unable to validate the "broken.test" RRSet for type 1 (an A record), due to an RRSIG record with an expired signature.</t>

<t>The reporting resolver constructs the QNAME "_er.1.broken.test.7._er.a01.agent-domain.example." and resolves it. This QNAME indicates extended DNS error 7 occurred while trying to validate "broken.test." type 1 record.</t>

<t>When this query is received at the monitoring agent (the operators of the authoritative server for a01.agent-domain.example), the agent can determine that the "test." zone contained an expired signature record (extended error 7) for type A for the domain name "broken.test.". The monitoring agent can contact the operators of "test." to fix the issue.</t>

</section>
</section>
<section anchor="edns0-option-specification"><name>EDNS0 Option Specification</name>
<t>This method uses an EDNS0 <xref target="RFC6891"/> option to indicate the agent domain in DNS messages. The option is structured as follows:</t>

<figure><artwork><![CDATA[
                     1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 3 3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1                     
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|        OPTION-CODE = TBD      |       OPTION-LENGTH           |
+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
/                         AGENT DOMAIN                          /
+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
]]></artwork></figure>

<t>Field definition details:</t>

<dl>
  <dt>OPTION-CODE:</dt>
  <dd>
    <t>2 octets; indicates error reporting support is TBD. The name for the option code is Report-Channel.</t>
  </dd>
  <dt>OPTION-LENGTH:</dt>
  <dd>
    <t>2-octets; contains the length of the AGENT DOMAIN field in octets.</t>
  </dd>
  <dt>:AGENT DOMAIN:</dt>
  <dd>
    <t>A fully qualified domain name <xref target="RFC8499"/> in uncompressed DNS wire format.</t>
  </dd>
</dl>

</section>
<section anchor="dns-error-reporting-specification"><name>DNS error reporting specification</name>
<t>The various errors that a reporting resolver may encounter are listed in <xref target="RFC8914"/>. Note that not all listed errors may be supported by the reporting resolver. This document does not specify what is or is not an error.</t>

<t>The DNS class is not specified in the error report.</t>

<section anchor="reporting-resolver-specification"><name>Reporting Resolver Specification</name>
<t>The reporting resolver MUST NOT use DNS error reporting to report a failure in resolving the report query.</t>

<t>The EDNS0 report channel option MUST NOT be included in queries.</t>

<t>The reporting resolver MUST NOT use DNS error reporting if the authoritative server returned an empty agent domain field in the EDNS0 report channel option.</t>

<section anchor="constructing-the-report-query"><name>Constructing the Report Query</name>

<t>The QNAME for the report query is constructed by concatenating the following elements, appending each successive element in the list to the right-hand side of the QNAME:</t>

<t><list style="symbols">
  <t>A label containing the string "_er".</t>
  <t>The QTYPE that was used in the query that resulted in the extended DNS error, presented as a decimal value, in a single DNS label.</t>
  <t>The QNAME that was used in the query that resulted in the extended DNS error. The QNAME may consist of multiple labels and is concatenated as is, i.e. in DNS wire format.</t>
  <t>The extended DNS error, presented as a decimal value, in a single DNS label.</t>
  <t>A label containing the string "_er".</t>
  <t>The agent domain. The agent domain as received in the EDNS0 report channel option set by the authoritative server.</t>
</list></t>

<t>If the report query QNAME exceeds 255 octets, it MUST NOT be sent.</t>

<t>The "_er" labels allow the monitoring agent to differentiate between the agent domain and the faulty query name. When the specified agent domain is empty, or a null label (despite being not allowed in this specification), the report query will have "_er" as a top-level domain as a result and not the original query. The purpose of the first "_er" label is to indicate that a complete report query has been received, instead of a shorter report query due to query minimization.</t>

</section>
</section>
<section anchor="authoritative-server-specification"><name>Authoritative server specification</name>
<t>The authoritative server SHOULD NOT have multiple agent domains configured for a single zone. To support multiple monitoring agents, a single agent can delegate to other agent domains.</t>

</section>
<section anchor="monitoring-agent-specification"><name>Monitoring agent specification</name>
<t>It is RECOMMENDED that the authoritative server for the agent domain replies with a positive response (i.e. not NODATA or NXDOMAIN) containing a TXT record.</t>

</section>
<section anchor="choosing-an-agent-domain"><name>Choosing an agent domain</name>
<t>It is RECOMMENDED that the agent domain be kept relatively short to allow for a longer QNAME in the report query.</t>

</section>
</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>
<t>IANA is requested to assign the following DNS EDNS0 option code registry:</t>

<figure><artwork><![CDATA[
      Value Name         Status   Reference
      ----- ----         -------- ---------------
      TBD   Agent-Domain Standard [this document]
]]></artwork></figure>

<t>IANA is requested to assign the following Underscored and Globally Scoped DNS Node Name registry:</t>

<figure><artwork><![CDATA[
      RR Type  _NODE NAME  Reference
      -----    ----------  ---------   
      TXT      _er         [this document]
]]></artwork></figure>

</section>
<section anchor="security-considerations"><name>Security considerations</name>
<t>Use of DNS error reporting may expose local configuration mistakes in the reporting resolver, such as stale DNSSEC trust anchors to the reporting agent.</t>

<t>DNS error reporting SHOULD be done using DNS query name minimization <xref target="RFC9156"/> to improve privacy.</t>

<t>DNS error reporting is done without any authentication between the reporting resolver and the authoritative server of the agent domain. Authentication significantly increases the burden on the reporting resolver without any benefit to the monitoring agent, authoritative server or reporting resolver.</t>

<t>The method described in this document will cause additional queries by the reporting resolver to authoritative servers in order to resolve the report query.</t>

<t>This method can be abused by deploying broken zones with agent domains that are delegated to servers operated by the intended victim in combination with open resolvers <xref target="RFC8499"/>.</t>

</section>
<section anchor="acknowledgements"><name>Acknowledgements</name>
<t>This document is based on an idea by Roy Arends and David Conrad. The authors would like to thank Peter van Dijk, Stephane Bortzmeyer, Shane Kerr, Vladimir Cunat, Paul Hoffman, Philip Homburg, Mark Andrews, Libor Peltan, Matthijs Mekking, Willem Toorop, Tom Carpay, Dick Franks, Benno Overeinder and Petr Spacek for their contributions.</t>

</section>


  </middle>

  <back>



    <references title='Informative References'>





<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='March' year='1997'/>
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor='RFC8174' target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author fullname='B. Leiba' initials='B.' surname='Leiba'><organization/></author>
<date month='May' year='2017'/>
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>



<reference anchor='RFC8914' target='https://www.rfc-editor.org/info/rfc8914'>
<front>
<title>Extended DNS Errors</title>
<author fullname='W. Kumari' initials='W.' surname='Kumari'><organization/></author>
<author fullname='E. Hunt' initials='E.' surname='Hunt'><organization/></author>
<author fullname='R. Arends' initials='R.' surname='Arends'><organization/></author>
<author fullname='W. Hardaker' initials='W.' surname='Hardaker'><organization/></author>
<author fullname='D. Lawrence' initials='D.' surname='Lawrence'><organization/></author>
<date month='October' year='2020'/>
<abstract><t>This document defines an extensible method to return additional information about the cause of DNS errors. Though created primarily to extend SERVFAIL to provide additional information about the cause of DNS and DNSSEC failures, the Extended DNS Errors option defined in this document allows all response types to contain extended error information. Extended DNS Error information does not change the processing of RCODEs.</t></abstract>
</front>
<seriesInfo name='RFC' value='8914'/>
<seriesInfo name='DOI' value='10.17487/RFC8914'/>
</reference>



<reference anchor='RFC8020' target='https://www.rfc-editor.org/info/rfc8020'>
<front>
<title>NXDOMAIN: There Really Is Nothing Underneath</title>
<author fullname='S. Bortzmeyer' initials='S.' surname='Bortzmeyer'><organization/></author>
<author fullname='S. Huque' initials='S.' surname='Huque'><organization/></author>
<date month='November' year='2016'/>
<abstract><t>This document states clearly that when a DNS resolver receives a response with a response code of NXDOMAIN, it means that the domain name which is thus denied AND ALL THE NAMES UNDER IT do not exist.</t><t>This document clarifies RFC 1034 and modifies a portion of RFC 2308: it updates both of them.</t></abstract>
</front>
<seriesInfo name='RFC' value='8020'/>
<seriesInfo name='DOI' value='10.17487/RFC8020'/>
</reference>



<reference anchor='RFC8198' target='https://www.rfc-editor.org/info/rfc8198'>
<front>
<title>Aggressive Use of DNSSEC-Validated Cache</title>
<author fullname='K. Fujiwara' initials='K.' surname='Fujiwara'><organization/></author>
<author fullname='A. Kato' initials='A.' surname='Kato'><organization/></author>
<author fullname='W. Kumari' initials='W.' surname='Kumari'><organization/></author>
<date month='July' year='2017'/>
<abstract><t>The DNS relies upon caching to scale; however, the cache lookup generally requires an exact match.  This document specifies the use of NSEC/NSEC3 resource records to allow DNSSEC-validating resolvers to generate negative answers within a range and positive answers from wildcards.  This increases performance, decreases latency, decreases resource utilization on both authoritative and recursive servers, and increases privacy.  Also, it may help increase resilience to certain DoS attacks in some circumstances.</t><t>This document updates RFC 4035 by allowing validating resolvers to generate negative answers based upon NSEC/NSEC3 records and positive answers in the presence of wildcards.</t></abstract>
</front>
<seriesInfo name='RFC' value='8198'/>
<seriesInfo name='DOI' value='10.17487/RFC8198'/>
</reference>



<reference anchor='RFC2308' target='https://www.rfc-editor.org/info/rfc2308'>
<front>
<title>Negative Caching of DNS Queries (DNS NCACHE)</title>
<author fullname='M. Andrews' initials='M.' surname='Andrews'><organization/></author>
<date month='March' year='1998'/>
<abstract><t>RFC1034 provided a description of how to cache negative responses.  It however had a fundamental flaw in that it did not allow a name server to hand out those cached responses to other resolvers, thereby greatly reducing the effect of the caching.  This document addresses issues raise in the light of experience and replaces RFC1034 Section 4.3.4. [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='2308'/>
<seriesInfo name='DOI' value='10.17487/RFC2308'/>
</reference>



<reference anchor='RFC4592' target='https://www.rfc-editor.org/info/rfc4592'>
<front>
<title>The Role of Wildcards in the Domain Name System</title>
<author fullname='E. Lewis' initials='E.' surname='Lewis'><organization/></author>
<date month='July' year='2006'/>
<abstract><t>This is an update to the wildcard definition of RFC 1034.  The interaction with wildcards and CNAME is changed, an error condition is removed, and the words defining some concepts central to wildcards are changed.  The overall goal is not to change wildcards, but to refine the definition of RFC 1034.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4592'/>
<seriesInfo name='DOI' value='10.17487/RFC4592'/>
</reference>



<reference anchor='RFC6891' target='https://www.rfc-editor.org/info/rfc6891'>
<front>
<title>Extension Mechanisms for DNS (EDNS(0))</title>
<author fullname='J. Damas' initials='J.' surname='Damas'><organization/></author>
<author fullname='M. Graff' initials='M.' surname='Graff'><organization/></author>
<author fullname='P. Vixie' initials='P.' surname='Vixie'><organization/></author>
<date month='April' year='2013'/>
<abstract><t>The Domain Name System's wire protocol includes a number of fixed fields whose range has been or soon will be exhausted and does not allow requestors to advertise their capabilities to responders.  This document describes backward-compatible mechanisms for allowing the protocol to grow.</t><t>This document updates the Extension Mechanisms for DNS (EDNS(0)) specification (and obsoletes RFC 2671) based on feedback from deployment experience in several implementations.  It also obsoletes RFC 2673 (&quot;Binary Labels in the Domain Name System&quot;) and adds considerations on the use of extended labels in the DNS.</t></abstract>
</front>
<seriesInfo name='STD' value='75'/>
<seriesInfo name='RFC' value='6891'/>
<seriesInfo name='DOI' value='10.17487/RFC6891'/>
</reference>



<reference anchor='RFC8499' target='https://www.rfc-editor.org/info/rfc8499'>
<front>
<title>DNS Terminology</title>
<author fullname='P. Hoffman' initials='P.' surname='Hoffman'><organization/></author>
<author fullname='A. Sullivan' initials='A.' surname='Sullivan'><organization/></author>
<author fullname='K. Fujiwara' initials='K.' surname='Fujiwara'><organization/></author>
<date month='January' year='2019'/>
<abstract><t>The Domain Name System (DNS) is defined in literally dozens of different RFCs.  The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has sometimes changed in the decades since the DNS was first defined.  This document gives current definitions for many of the terms used in the DNS in a single document.</t><t>This document obsoletes RFC 7719 and updates RFC 2308.</t></abstract>
</front>
<seriesInfo name='BCP' value='219'/>
<seriesInfo name='RFC' value='8499'/>
<seriesInfo name='DOI' value='10.17487/RFC8499'/>
</reference>



<reference anchor='RFC9156' target='https://www.rfc-editor.org/info/rfc9156'>
<front>
<title>DNS Query Name Minimisation to Improve Privacy</title>
<author fullname='S. Bortzmeyer' initials='S.' surname='Bortzmeyer'><organization/></author>
<author fullname='R. Dolmans' initials='R.' surname='Dolmans'><organization/></author>
<author fullname='P. Hoffman' initials='P.' surname='Hoffman'><organization/></author>
<date month='November' year='2021'/>
<abstract><t>This document describes a technique called &quot;QNAME minimisation&quot; to improve DNS privacy, where the DNS resolver no longer always sends the full original QNAME and original QTYPE to the upstream name server. This document obsoletes RFC 7816.</t></abstract>
</front>
<seriesInfo name='RFC' value='9156'/>
<seriesInfo name='DOI' value='10.17487/RFC9156'/>
</reference>




    </references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

