<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.23 (Ruby 3.3.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-dnsop-generalized-notify-06" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.26.0 -->
  <front>
    <title abbrev="Generalized Notifications">Generalized DNS Notifications</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-dnsop-generalized-notify-06"/>
    <author initials="J." surname="Stenstam" fullname="Johan Stenstam">
      <organization>The Swedish Internet Foundation</organization>
      <address>
        <email>johan.stenstam@internetstiftelsen.se</email>
      </address>
    </author>
    <author initials="P." surname="Thomassen" fullname="Peter Thomassen">
      <organization>deSEC, Secure Systems Engineering</organization>
      <address>
        <email>peter@desec.io</email>
      </address>
    </author>
    <author initials="J." surname="Levine" fullname="John Levine">
      <organization>Standcore LLC</organization>
      <address>
        <email>standards@standcore.com</email>
      </address>
    </author>
    <date/>
    <area>Internet</area>
    <workgroup>DNSOP Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 37?>

<t>This document extends the use of DNS NOTIFY (RFC 1996) beyond conventional
zone transfer hints, bringing the benefits of ad-hoc notifications to DNS
delegation maintenance in general.  Use cases include DNSSEC bootstrapping
and key rollovers hints, and quicker changes to a delegation's NS record set.</t>
      <t>To enable this functionality, a method for discovering the receiver endpoint
for such notification message is introduced, via the new DSYNC record type.</t>
      <t>TO BE REMOVED: This document is being collaborated on in Github at:
<eref target="https://github.com/peterthomassen/draft-ietf-dnsop-generalized-notify">https://github.com/peterthomassen/draft-ietf-dnsop-generalized-notify</eref>.
The most recent working version of the document, open issues, etc. should all be
available there.  The authors (gratefully) accept pull requests.</t>
    </abstract>
  </front>
  <middle>
    <?line 52?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Traditional DNS notifications <xref target="RFC1996"/>, which are here referred to as
"NOTIFY(SOA)", are sent from a primary server to a secondary server to
minimize the latter's convergence time to a new version of the
zone. This mechanism successfully addresses a significant inefficiency
in the original protocol.</t>
      <t>Today similar inefficiencies occur in new use cases, in particular delegation
maintenance (DS and NS record updates). Just as in the NOTIFY(SOA) case, a new
set of notification types will have a major positive benefit by
allowing the DNS infrastructure to completely sidestep these
inefficiencies. For additional context, see <xref target="context"/>.</t>
      <t>No DNS protocol changes are introduced by this document. The mechanism
instead makes use of a wider range of DNS messages allowed by the protocol.
Future extension for further use cases (such as multi-signer key exchange)
is possible.</t>
      <t>Readers are expected to be familiar with DNSSEC <xref target="RFC9364"/>, including
<xref target="RFC6781"/>, <xref target="RFC7344"/>, <xref target="RFC7477"/>, <xref target="RFC7583"/>, <xref target="RFC8078"/>,
<xref target="RFC8901"/>, and <xref target="RFC9615"/>.
DNS-specific terminology can be found in <xref target="RFC9499"/>.</t>
      <section anchor="design-requirements">
        <name>Design Requirements</name>
        <t>When the parent operator is interested in notifications for delegation
maintenance (such as DS or NS update hints), a service will need to be
made available for accepting these notifications. Depending on the
context, this service may be run by the parent operator themselves,
or by a designated entity who is in charge of handling the domain's
delegation data (such as a domain registrar).</t>
        <t>It seems desirable to minimize the number of steps that the notification
sender needs to figure out where to send the NOTIFY. This suggests that
the lookup process be ignorant of the details of the parent-side
relationships (e.g., whether there is a registrar or not). This is
addressed by parameterizing the lookup with the name of the child. The
parent operator may then (optionally) announce the notification endpoint
in a delegation-specific way, by publishing it at a child-specific name.
(A catch-all endpoint may be indicated by wildcarding.)</t>
        <t>The solution proposed here is thus for the parent operator to publish
the address where someone listens for notifications, in a child-specific
way (see <xref target="signaling"/>). Potential senders can easily determine the name
of the parent and then look up that information (see <xref target="discovery"/>).</t>
      </section>
      <section anchor="requirements-notation">
        <name>Requirements Notation</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
        </t>
      </section>
    </section>
    <section anchor="dsyncrdtype">
      <name>DSYNC RR Type</name>
      <t>This section defines the DSYNC RR type which is subsequently used for
discovering notification endpoints.</t>
      <section anchor="wire-format">
        <name>Wire Format</name>
        <t>The DSYNC RDATA wire format is encoded as follows:</t>
        <artwork><![CDATA[
                     1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 3 3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| RRtype                        | Scheme        | Port
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
                | Target ...  /
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-/
]]></artwork>
        <dl>
          <dt>RRtype</dt>
          <dd>
            <t>The type of generalized NOTIFY that this DSYNC RR defines the
desired target address for (see "Resource Record (RR) TYPEs" IANA
registry). For now, only CDS and CSYNC are supported values, with
the former indicating an updated CDS or CDNSKEY record set.</t>
          </dd>
          <dt>Scheme</dt>
          <dd>
            <t>The mode used for contacting the desired notification address. This is an
8-bit unsigned integer. Records with value 0 (null scheme) are ignored by consumers.
Value 1 is described in this document, and values 128-255 are reserved for
private use.  All other values are currently unspecified.</t>
          </dd>
          <dt>Port</dt>
          <dd>
            <t>The port on the target host of the notification service. This
is a 16-bit unsigned integer in network byte order.</t>
          </dd>
          <dt>Target</dt>
          <dd>
            <t>The fully-qualified, uncompressed domain name of the target host
providing the service of listening for generalized notifications of the
specified type. This name MUST resolve to one or more address records.</t>
          </dd>
        </dl>
      </section>
      <section anchor="presentation-format">
        <name>Presentation Format</name>
        <t>The presentation format of the RDATA portion is as follows:</t>
        <ul spacing="normal">
          <li>
            <t>The RRtype field is represented as a mnemonic from the "Resource
Record (RR) TYPEs" registry.</t>
          </li>
          <li>
            <t>The Scheme field is represented as an unsigned decimal integer.</t>
          </li>
          <li>
            <t>The Port field is represented as an unsigned decimal integer.</t>
          </li>
          <li>
            <t>The Target field is represented as a &lt;domain-name&gt; (<xref section="5.1" sectionFormat="comma" target="RFC1035"/>).</t>
          </li>
        </ul>
      </section>
      <section anchor="semantics">
        <name>Semantics</name>
        <t>For now, the only scheme defined is scheme=1. It indicates that when a
new CDS/CDNSKEY (or CSYNC) RRset is published, a NOTIFY(CDS) (or
NOTIFY(CSYNC)) message should be sent to the address and port listed
in the corresponding DSYNC record, using conventional <xref target="RFC1035"/> DNS
transport.</t>
        <t>Example (for the owner names of these records, see <xref target="signaling"/>):</t>
        <artwork><![CDATA[
IN DSYNC CDS   1 5359 cds-scanner.example.net.
IN DSYNC CSYNC 1 5360 csync-scanner.example.net.
]]></artwork>
        <t>Should a need for other mechanisms arise, other schemes may be defined
to deal with such requirements using alternative logic.</t>
        <t>Schemes are independent of RRtype. They merely specify a method of
contacting the target (whereas the RRtype is part of the notification
payload).</t>
      </section>
    </section>
    <section anchor="signaling">
      <name>Publication of Notification Targets</name>
      <t>To use generalized notifications, it is necessary for the sender to know
where to direct each NOTIFY message. This section describes the
procedure for discovering that notification target.</t>
      <t>Note that generalized NOTIFY messages are but one mechanism for
improving the efficiency of automated delegation maintenance. Other
alternatives, such as contacting the parent operator via an API or
DNS Update (<xref target="RFC2136"/>), may (or may not) be more suitable in
individual cases. Like generalized notifications, they similarly require
a means for discovering where to send the API or DNS Update requests.</t>
      <t>The scope for the publication mechanism is therefore wider than only to
support generalized notifications, and a unified approach that works
independently of the notification method is specified in this section.</t>
      <t>Parent operators participating in the discovery scheme for the purpose of
delegation maintenance notifications MUST publish endpoint information
using the record type defined in <xref target="dsyncrdtype"/> under the <tt>_dsync</tt>
subdomain of the parent zone, as described in the following subsection.</t>
      <t>There MUST NOT be more than one DSYNC record for each combination of
RRtype and Scheme.
It is RECOMMENDED to secure the corresponding zone with DNSSEC.</t>
      <t>For practical purposes, the parent operator MAY delegate the <tt>_dsync</tt>
domain as a separate zone, and/or synthesize records under it. If
child-specificity is not needed, the parent can publish a static
wildcard DSYNC record.</t>
      <section anchor="wildcard-method">
        <name>Wildcard Method</name>
        <t>If the parent operator itself performs CDS/CDNSKEY or CSYNC processing
for some or all delegations, or wants to forward notifications to some
other party, a default notification target may be specified as follows:</t>
        <artwork><![CDATA[
*._dsync.example.  IN DSYNC  CDS   scheme port target
*._dsync.example.  IN DSYNC  CSYNC scheme port target
]]></artwork>
        <t>To accommodate indirect delegation management models, the
designated notification target may relay notifications to a third party
(such as the registrar, in ICANN's model). The details of such
arrangements are out of scope for this document.</t>
        <t>If for some reason the parent operator cannot publish wildcard records,
the wildcard label may be dropped from the DSYNC owner name (i.e., it
may be published at the <tt>_dsync</tt> label instead). This practice requires
an additional step during discovery (see <xref target="discovery"/>), and is
therefore NOT RECOMMENDED.</t>
      </section>
      <section anchor="child-specific-method">
        <name>Child-specific Method</name>
        <t>It is also possible to publish child-specific records, where in place of
the wildcard label, the child's FQDN with the parent zone's labels
stripped is used.</t>
        <t>As an example, consider a registrar offering domains like
<tt>child.example</tt>, delegated from <tt>example</tt> zone. If the registrar
provides the notification endpoint, e.g., <tt>rr-endpoint.example:5300</tt>,
the parent may publish this information as follows:</t>
        <artwork><![CDATA[
child._dsync.example.  IN DSYNC  CDS  1 5300 rr-endpoint.example.
]]></artwork>
      </section>
    </section>
    <section anchor="delegation-maintenance-cdscdnskey-and-csync-notifications">
      <name>Delegation Maintenance: CDS/CDNSKEY and CSYNC Notifications</name>
      <t>Delegation maintenance notifications address the inefficiencies related
to scanning child zones for CDS/CDNSKEY records
<xref target="RFC7344"/><xref target="RFC8078"/><xref target="RFC9615"/>. (For an overview of the issues,
see <xref target="context"/>.)</t>
      <t>NOTIFY messages for delegation maintenance MUST be formatted as described in
<xref target="RFC1996"/>, with the <tt>qtype</tt> field replaced as appropriate.</t>
      <t>To address the CDS/CDNSKEY dichotomy, the NOTIFY(CDS) message (with
<tt>qtype=CDS</tt>) is defined to indicate any child-side changes pertaining
to an upcoming update of DS records.
As the child DNS operator generally is unaware of whether the parent
side consumes CDS records or prefers CDNSKEY, or when that policy
changes, it seems advisable to publish both types of records,
preferably using automation features of common authoritative nameserver
software for ensuring consistency.</t>
      <t>Upon receipt of NOTIFY(CDS), the parent-side recipient (typically, registry or
registrar) SHOULD initiate the same DNS lookups and verifications for
DNSSEC bootstrapping <xref target="RFC9615"/> or DS maintenance
<xref target="RFC7344"/><xref target="RFC8078"/> that would otherwise be triggered based on a
timer.</t>
      <t>The CSYNC <xref target="RFC7477"/> inefficiency may be similarly treated, with the
child sending a NOTIFY(CSYNC) message (with <tt>qtype=CSYNC</tt>) to an address
where the parent operator (or a designated party) is listening for CSYNC
notifications.</t>
      <t>In both cases the notification will speed up processing times by
providing the recipient with a hint that a particular child zone has
published new CDS, CDNSKEY and/or CSYNC records.</t>
      <section anchor="discovery">
        <name>Endpoint Discovery</name>
        <t>To locate the target for outgoing delegation maintenance notifications,
the notification sender MUST perform the following steps:</t>
        <ol spacing="normal" type="1"><li>
            <t>Construct the lookup name, by injecting the <tt>_dsync</tt> label after the
first label of the delegation owner name.</t>
          </li>
          <li>
            <t>Perform a lookup of type DSYNC for the lookup name, and validate the
response if DNSSEC is enabled. If a positive DSYNC answer results,
return it.</t>
          </li>
          <li>
            <t>If the query resulted in a negative response:  </t>
            <ul spacing="normal">
              <li>
                <t>If the response's SOA record indicates that the parent is more than
one label away from the <tt>_dsync</tt> label, construct a new lookup name
by inserting the <tt>_dsync</tt> label into the delegation owner name just
before the parent zone labels inferred from the negative response,
and go to step 2.      </t>
                <t>
For example, <tt>city.ise.mie.jp</tt> is delegated from <tt>jp</tt> (and not
from <tt>ise.mie.jp</tt> or <tt>mie.jp</tt>!). The initial DSYNC query relating
to it is thus directed at <tt>city._dsync.ise.mie.jp</tt>. This is
expected to result in a negative response from <tt>jp</tt>, and another
query for <tt>city.ise.mie._dsync.jp</tt> is then required.</t>
              </li>
              <li>
                <t>Otherwise, if the lookup name has any labels in front of the
<tt>_dsync</tt> label, remove them to construct a new lookup name (such
as <tt>_dsync.jp</tt>), and go to step 2.
(This is to enable zone structures without wildcards.)</t>
              </li>
              <li>
                <t>Otherwise, return null (no notification target available).</t>
              </li>
            </ul>
          </li>
        </ol>
      </section>
      <section anchor="sending-notifications">
        <name>Sending Notifications</name>
        <t>When creating or changing a CDS/CDNSKEY/CSYNC RRset in the child zone,
the DNS operator SHOULD send a suitable notification to one of the
endpoints discovered as described in the previous section.</t>
        <t>A NOTIFY message can only carry information about changes concerning one
child zone. When there are changes to several child zones, the sender
MUST send a separate notification for each one.</t>
        <t>When a primary name server publishes a new RRset in the child, there
typically is a time delay until all publicly visible copies of the zone
are updated. If the primary sends a notification at the exact time of
publication, there is a potential for CDS/CDNSKEY/CSYNC processing to be
attempted before the corresponding records are served. As a result, a
desired update may not be detected (or appear inconsistent), preventing
it from being applied.</t>
        <t>It is therefore RECOMMENDED that the child delays sending notifications
to the recipient until a consistent public view of the pertinent
records is ensured.</t>
        <section anchor="timeouts-and-error-handling">
          <name>Timeouts and Error Handling</name>
          <t>NOTIFY messages are expected to elicit a response from the recipient
(<xref target="RFC1996"/> Section 4.7). If no response is received, senders SHOULD
employ the same logic as for SOA notifications (<xref target="RFC1996"/> Sections
3.5 and 3.6).</t>
          <t>The recipient's attempt to act upon the delegation update request may
fail for a variety of reasons (e.g., due to violation of the continuity
requirement set forth in <xref target="RFC7344"/> Section 4.1). Such failures may
occur asynchronously, even after the NOTIFY response has been sent.</t>
          <t>In order to learn about such failures, senders MAY include an
<xref target="RFC9567"/> EDNS0 Report-Channel option in the NOTIFY message to
request the receiving side to report any errors by making a report query
with an appropriate extended DNS error code as described in
<xref target="RFC8914"/>.</t>
          <t>When including this EDNS0 option, its agent domain MUST be subordinate
or equal to one of the NS hostnames, as listed in the child's delegation
in the parent zone.
This is to prevent malicious senders from causing the NOTIFY recipient
to send unsolicited report queries to unrelated third parties.</t>
        </section>
        <section anchor="roles">
          <name>Roles</name>
          <t>While the CDS/CDNSKEY/CSYNC processing following the receipt of a NOTIFY
will often be performed by the registry, the protocol anticipates that
in some contexts (especially for ICANN gTLDs), registrars may take on
the task. In such cases, the current registrar notification endpoint may
be published, enabling notifications to be directed to the
appropriate target. The mechanics of how this is arranged between
registry and registrar are out of scope for this document; the protocol
only offers the possibility to arrange things such that from the child
perspective, it is inconsequential how the parent-side parties are
organized: notifications are simply sent to the published address.</t>
          <t>Because of the security model where a notification by itself never
causes a change (it can only speed up the time until the next
check for the same thing), the sender's identity is not crucial.
This opens up the possibility of having an arbitrary party (e.g., a
side-car service) send the notifications, enabling this functionality
even before the emergence of native support in nameserver software.</t>
        </section>
      </section>
      <section anchor="processing-of-notify-messages">
        <name>Processing of NOTIFY Messages</name>
        <t>NOTIFY(CDS) messages carrying notification payloads (records) for
several child zones MUST be discarded, as sending them is an error.</t>
        <t>Upon receipt of a (potentially forwarded) valid NOTIFY(CDS) message for
a particular child zone at the published address for CDS notifications,
the receiving side (parent registry or registrar) has two options:</t>
        <ol spacing="normal" type="1"><li>
            <t>Acknowledge receipt by sending a NOTIFY response as described in
<xref target="RFC1996"/> Section 4.7 (identical to NOTIFY query, but with QR
bit set) and schedule an immediate check of the CDS and CDNSKEY
RRsets as published by that particular child zone.  </t>
            <t>
If the NOTIFY message contains an <xref target="RFC9567"/> EDNS0 Report-Channel
option with an agent domain subordinate or equal to one of the NS
hostnames listed in the delegation, the processing party SHOULD
report any errors occurring during CDS/CDNSKEY processing by sending
a report query with an appropriate extended DNS error code as
described in <xref target="RFC8914"/>. Reporting may be done asynchronously
(outside of the NOTIFY transaction).  </t>
            <t>
When using period scanning, notifications preempt the scanning
timer. If the NOTIFY-induced check finds that the CDS/CDNSKEY RRset
is indeed new or has changed, the corresponding child's timer may
be reset and the scanning frequency reduced (e.g., to once a week).
If a CDS/CDNSKEY change is later detected through scanning (without
having received a notification), NOTIFY-related state SHOULD be
cleared, reverting to the default scanning schedule for this child.  </t>
            <t>
When introducing CDS/CDNSKEY scanning support at the same time as
NOTIFY(CDS) support, backwards compatibility considerations
regarding the scanning interval do not apply; a low-frequency
scanning schedule MAY thus be used by default in such cases.</t>
          </li>
          <li>
            <t>Do not act upon the notification. To prevent retries, recipients
SHOULD acknowledge the notification by sending a NOTIFY response
even when otherwise ignoring the request, combined with a report
query if feasible (see above). One reason to do this may be a rate
limit (see <xref target="security"/>), in which case "Blocked" (15) may be a
suitable extended DNS error code.</t>
          </li>
        </ol>
        <t>Implementing the first option will significantly decrease the
convergence time (between publication of a new CDS/CDNSKEY record in the
child and publication of the resulting DS), thereby providing improved
service for the child.</t>
        <t>If, in addition to scheduling an immediate check for the child zone of
the notification, the scanning schedule is also modified to be less
frequent, the cost of providing the scanning service will be reduced.</t>
        <t>Upon receipt of a NOTIFY(CSYNC) to the published address for CSYNC
notifications, the same options and considerations apply as for the
NOTIFY(CDS).</t>
      </section>
    </section>
    <section anchor="security">
      <name>Security Considerations</name>
      <t>The original NOTIFY specification sidesteps most security issues by not
relying on the information in the NOTIFY message in any way, and instead
only using it to "enter the state it would if the zone's refresh timer
had expired" (<xref section="4.7" sectionFormat="of" target="RFC1996"/>).</t>
      <t>This security model is reused for generalized NOTIFY messages. It
therefore seems impossible to affect the behaviour of the recipient of
the NOTIFY other than by hastening the timing for when different checks
are initiated.</t>
      <t>The receipt of a notification message will, in general, cause the
receiving party to perform one or more outbound queries for the records
of interest (for example, NOTIFY(CDS) will cause CDS/CDNSKEY
queries). When done using standard DNS, the size of these queries is
comparable to that of the NOTIFY messages themselves, rendering any
amplification attempts futile. The number of queries triggered per
notification is also limited by the requirement that a NOTIFY message
can refer to one child only.</t>
      <t>However, when the outgoing query occurs via encrypted transport, some
amplification is possible, both with respect to bandwidth and
computational burden. In this case, the usual principle of bounding the
work, even under unreasonable events, applies.</t>
      <t>Receivers therefore MUST implement rate limiting for notification
processing. It is RECOMMENDED to configure rate limiting independently
for both the notification's source IP address and the name of the zone
that is conveyed in the NOTIFY message. Rate limiting also mitigates
processing load from garbage notifications.</t>
      <t>Alternative solutions (such as signing notifications and validating
their signatures) appear significantly more expensive without tangible
benefit.</t>
      <t>In order to facilitate schemes that are authenticated outside of DNSSEC
(such as via SIG(0)), zones containing DSYNC records are not required to
be signed. Spoofed DSYNC responses would prevent notifications from
reaching their legitimate target, and a different party may receive
unsolicited notifications; both effects, however, can also be achieved
in the presence of DNSSEC. The illegitimate target is also enabled to
learn notification contents in real-time, which may be a privacy concern
for the sender. If so, the sender may choose to ignore unsigned DSYNC
records.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t><strong>Note to the RFC Editor</strong>: In this section, please replace occurrences of "(this document)" with a proper reference.</t>
      <section anchor="dsync-rr-type">
        <name>DSYNC RR Type</name>
        <t>IANA is requested to update the "Resource Record (RR) TYPEs" registry
under the "Domain Name System (DNS) Parameters" registry group as
follows:</t>
        <dl>
          <dt>Type</dt>
          <dd>
            <t>DSYNC</t>
          </dd>
          <dt>Value</dt>
          <dd>
            <t>66</t>
          </dd>
          <dt>Meaning</dt>
          <dd>
            <t>Endpoint discovery for delegation synchronization</t>
          </dd>
          <dt>Reference</dt>
          <dd>
            <t>(this document)</t>
          </dd>
        </dl>
      </section>
      <section anchor="dsync-scheme-registration">
        <name>DSYNC Scheme Registration</name>
        <t>IANA is requested to create and maintain the following new registry in the
"Domain Name System (DNS) Parameters" registry group:</t>
        <dl>
          <dt>Name</dt>
          <dd>
            <t>DSYNC: Location of Synchronization Endpoints</t>
          </dd>
          <dt>Assignment Policy</dt>
          <dd>
            <t>Expert Review</t>
          </dd>
          <dt>Reference</dt>
          <dd>
            <t>(this document)</t>
          </dd>
        </dl>
        <t>The initial contents for the registry are as follows:</t>
        <table>
          <thead>
            <tr>
              <th align="left">RRtype</th>
              <th align="left">Scheme</th>
              <th align="left">Purpose</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left"> </td>
              <td align="left">0</td>
              <td align="left">Null scheme (no-op)</td>
              <td align="left">(this document)</td>
            </tr>
            <tr>
              <td align="left">CDS</td>
              <td align="left">1</td>
              <td align="left">Delegation management</td>
              <td align="left">(this document)</td>
            </tr>
            <tr>
              <td align="left">CSYNC</td>
              <td align="left">1</td>
              <td align="left">Delegation management</td>
              <td align="left">(this document)</td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left">2-127</td>
              <td align="left">Unassigned</td>
              <td align="left"> </td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left">128-255</td>
              <td align="left">Reserved (private use)</td>
              <td align="left">(this document)</td>
            </tr>
          </tbody>
        </table>
        <t>Requests to register additional entries MUST include the following fields:</t>
        <dl>
          <dt>RRtype</dt>
          <dd>
            <t>An RRtype that is defined for use</t>
          </dd>
          <dt>Scheme</dt>
          <dd>
            <t>The mode used for contacting the desired notification address</t>
          </dd>
          <dt>Purpose</dt>
          <dd>
            <t>Use case description</t>
          </dd>
          <dt>Reference</dt>
          <dd>
            <t>Location of specification or registration source</t>
          </dd>
        </dl>
        <t>Registration requests are to be recorded by IANA after Expert Review <xref target="RFC8126"/>.
The expert review should validate that the RRtype and Scheme do not conflict
with any existing allocations.</t>
      </section>
      <section anchor="dsync-underscore-name">
        <name>_dsync Underscore Name</name>
        <t>Per <xref target="RFC8552"/>, IANA is requested to add the following entries to the
"Underscored and Globally Scoped DNS Node Names" registry:</t>
        <artwork><![CDATA[
+---------+------------+-----------------+
| RR Type | _NODE NAME | Reference       |
+---------+------------+-----------------+
| DSYNC   | _dsync     | (this document) |
+---------+------------+-----------------+
]]></artwork>
      </section>
    </section>
    <section anchor="implementation-status">
      <name>Implementation Status</name>
      <t><strong>Note to the RFC Editor</strong>: please remove this entire section before publication.</t>
      <t>Johan Stenstam's experimental nameserver implements this draft
(https://github.com/johanix/tdns).</t>
      <section anchor="child-dns-operator-side">
        <name>Child DNS Operator-side</name>
        <ul spacing="normal">
          <li>
            <t>IronDNS implementation under way</t>
          </li>
          <li>
            <t>deSEC implementation under way (Q1/2025)</t>
          </li>
        </ul>
      </section>
      <section anchor="parent-side">
        <name>Parent-side</name>
        <ul spacing="normal">
          <li>
            <t>.SE/.NU will implement this once it is an RFC.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>In order of first contribution or review:
Joe Abley, Mark Andrews, Christian Elmerot, Ólafur Guðmundsson, Paul
Wouters, Brian Dickson, Warren Kumari, Patrick Mevzek, Tim Wicinski,
Q Misell, Stefan Ubbink, Matthijs Mekking, Kevin P. Fleming, Nicolai
Leymann, Giuseppe Fioccola, Peter Yee.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC1996">
          <front>
            <title>A Mechanism for Prompt Notification of Zone Changes (DNS NOTIFY)</title>
            <author fullname="P. Vixie" initials="P." surname="Vixie"/>
            <date month="August" year="1996"/>
            <abstract>
              <t>This memo describes the NOTIFY opcode for DNS, by which a master server advises a set of slave servers that the master's data has been changed and that a query should be initiated to discover the new data. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1996"/>
          <seriesInfo name="DOI" value="10.17487/RFC1996"/>
        </reference>
        <reference anchor="RFC9364">
          <front>
            <title>DNS Security Extensions (DNSSEC)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>This document describes the DNS Security Extensions (commonly called "DNSSEC") that are specified in RFCs 4033, 4034, and 4035, as well as a handful of others. One purpose is to introduce all of the RFCs in one place so that the reader can understand the many aspects of DNSSEC. This document does not update any of those RFCs. A second purpose is to state that using DNSSEC for origin authentication of DNS data is the best current practice. A third purpose is to provide a single reference for other documents that want to refer to DNSSEC.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="237"/>
          <seriesInfo name="RFC" value="9364"/>
          <seriesInfo name="DOI" value="10.17487/RFC9364"/>
        </reference>
        <reference anchor="RFC7344">
          <front>
            <title>Automating DNSSEC Delegation Trust Maintenance</title>
            <author fullname="W. Kumari" initials="W." surname="Kumari"/>
            <author fullname="O. Gudmundsson" initials="O." surname="Gudmundsson"/>
            <author fullname="G. Barwood" initials="G." surname="Barwood"/>
            <date month="September" year="2014"/>
            <abstract>
              <t>This document describes a method to allow DNS Operators to more easily update DNSSEC Key Signing Keys using the DNS as a communication channel. The technique described is aimed at delegations in which it is currently hard to move information from the Child to Parent.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7344"/>
          <seriesInfo name="DOI" value="10.17487/RFC7344"/>
        </reference>
        <reference anchor="RFC7477">
          <front>
            <title>Child-to-Parent Synchronization in DNS</title>
            <author fullname="W. Hardaker" initials="W." surname="Hardaker"/>
            <date month="March" year="2015"/>
            <abstract>
              <t>This document specifies how a child zone in the DNS can publish a record to indicate to a parental agent that the parental agent may copy and process certain records from the child zone. The existence of the record and any change in its value can be monitored by a parental agent and acted on depending on local policy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7477"/>
          <seriesInfo name="DOI" value="10.17487/RFC7477"/>
        </reference>
        <reference anchor="RFC8078">
          <front>
            <title>Managing DS Records from the Parent via CDS/CDNSKEY</title>
            <author fullname="O. Gudmundsson" initials="O." surname="Gudmundsson"/>
            <author fullname="P. Wouters" initials="P." surname="Wouters"/>
            <date month="March" year="2017"/>
            <abstract>
              <t>RFC 7344 specifies how DNS trust can be maintained across key rollovers in-band between parent and child. This document elevates RFC 7344 from Informational to Standards Track. It also adds a method for initial trust setup and removal of a secure entry point.</t>
              <t>Changing a domain's DNSSEC status can be a complicated matter involving multiple unrelated parties. Some of these parties, such as the DNS operator, might not even be known by all the organizations involved. The inability to disable DNSSEC via in-band signaling is seen as a problem or liability that prevents some DNSSEC adoption at a large scale. This document adds a method for in-band signaling of these DNSSEC status changes.</t>
              <t>This document describes reasonable policies to ease deployment of the initial acceptance of new secure entry points (DS records).</t>
              <t>It is preferable that operators collaborate on the transfer or move of a domain. The best method is to perform a Key Signing Key (KSK) plus Zone Signing Key (ZSK) rollover. If that is not possible, the method using an unsigned intermediate state described in this document can be used to move the domain between two parties. This leaves the domain temporarily unsigned and vulnerable to DNS spoofing, but that is preferred over the alternative of validation failures due to a mismatched DS and DNSKEY record.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8078"/>
          <seriesInfo name="DOI" value="10.17487/RFC8078"/>
        </reference>
        <reference anchor="RFC9615">
          <front>
            <title>Automatic DNSSEC Bootstrapping Using Authenticated Signals from the Zone's Operator</title>
            <author fullname="P. Thomassen" initials="P." surname="Thomassen"/>
            <author fullname="N. Wisiol" initials="N." surname="Wisiol"/>
            <date month="July" year="2024"/>
            <abstract>
              <t>This document introduces an in-band method for DNS operators to publish arbitrary information about the zones for which they are authoritative, in an authenticated fashion and on a per-zone basis. The mechanism allows managed DNS operators to securely announce DNSSEC key parameters for zones under their management, including for zones that are not currently securely delegated.</t>
              <t>Whenever DS records are absent for a zone's delegation, this signal enables the parent's registry or registrar to cryptographically validate the CDS/CDNSKEY records found at the child's apex. The parent can then provision DS records for the delegation without resorting to out-of-band validation or weaker types of cross-checks such as "Accept after Delay".</t>
              <t>This document establishes the DS enrollment method described in Section 4 of this document as the preferred method over those from Section 3 of RFC 8078. It also updates RFC 7344.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9615"/>
          <seriesInfo name="DOI" value="10.17487/RFC9615"/>
        </reference>
        <reference anchor="RFC9499">
          <front>
            <title>DNS Terminology</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
              <t>This document updates RFC 2308 by clarifying the definitions of "forwarder" and "QNAME". It obsoletes RFC 8499 by adding multiple terms and clarifications. Comprehensive lists of changed and new definitions can be found in Appendices A and B.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="219"/>
          <seriesInfo name="RFC" value="9499"/>
          <seriesInfo name="DOI" value="10.17487/RFC9499"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC1035">
          <front>
            <title>Domain names - implementation and specification</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1035"/>
          <seriesInfo name="DOI" value="10.17487/RFC1035"/>
        </reference>
        <reference anchor="RFC2136">
          <front>
            <title>Dynamic Updates in the Domain Name System (DNS UPDATE)</title>
            <author fullname="P. Vixie" initials="P." role="editor" surname="Vixie"/>
            <author fullname="S. Thomson" initials="S." surname="Thomson"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <author fullname="J. Bound" initials="J." surname="Bound"/>
            <date month="April" year="1997"/>
            <abstract>
              <t>Using this specification of the UPDATE opcode, it is possible to add or delete RRs or RRsets from a specified zone. Prerequisites are specified separately from update operations, and can specify a dependency upon either the previous existence or nonexistence of an RRset, or the existence of a single RR. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2136"/>
          <seriesInfo name="DOI" value="10.17487/RFC2136"/>
        </reference>
        <reference anchor="RFC9567">
          <front>
            <title>DNS Error Reporting</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <date month="April" year="2024"/>
            <abstract>
              <t>DNS error reporting is a lightweight reporting mechanism that provides the operator of an authoritative server with reports on DNS resource records that fail to resolve or validate. A domain owner or DNS hosting organization can use these reports to improve domain hosting. The reports are based on extended DNS errors as described in RFC 8914.</t>
              <t>When a domain name fails to resolve or validate due to a misconfiguration or an attack, the operator of the authoritative server may be unaware of this. To mitigate this lack of feedback, this document describes a method for a validating resolver to automatically signal an error to a monitoring agent specified by the authoritative server. The error is encoded in the QNAME; thus, the very act of sending the query is to report the error.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9567"/>
          <seriesInfo name="DOI" value="10.17487/RFC9567"/>
        </reference>
        <reference anchor="RFC8914">
          <front>
            <title>Extended DNS Errors</title>
            <author fullname="W. Kumari" initials="W." surname="Kumari"/>
            <author fullname="E. Hunt" initials="E." surname="Hunt"/>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="W. Hardaker" initials="W." surname="Hardaker"/>
            <author fullname="D. Lawrence" initials="D." surname="Lawrence"/>
            <date month="October" year="2020"/>
            <abstract>
              <t>This document defines an extensible method to return additional information about the cause of DNS errors. Though created primarily to extend SERVFAIL to provide additional information about the cause of DNS and DNSSEC failures, the Extended DNS Errors option defined in this document allows all response types to contain extended error information. Extended DNS Error information does not change the processing of RCODEs.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8914"/>
          <seriesInfo name="DOI" value="10.17487/RFC8914"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC8552">
          <front>
            <title>Scoped Interpretation of DNS Resource Records through "Underscored" Naming of Attribute Leaves</title>
            <author fullname="D. Crocker" initials="D." surname="Crocker"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>Formally, any DNS Resource Record (RR) may occur under any domain name. However, some services use an operational convention for defining specific interpretations of an RRset by locating the records in a DNS branch under the parent domain to which the RRset actually applies. The top of this subordinate branch is defined by a naming convention that uses a reserved node name, which begins with the underscore character (e.g., "_name"). The underscored naming construct defines a semantic scope for DNS record types that are associated with the parent domain above the underscored branch. This specification explores the nature of this DNS usage and defines the "Underscored and Globally Scoped DNS Node Names" registry with IANA. The purpose of this registry is to avoid collisions resulting from the use of the same underscored name for different services.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="222"/>
          <seriesInfo name="RFC" value="8552"/>
          <seriesInfo name="DOI" value="10.17487/RFC8552"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC6781">
          <front>
            <title>DNSSEC Operational Practices, Version 2</title>
            <author fullname="O. Kolkman" initials="O." surname="Kolkman"/>
            <author fullname="W. Mekking" initials="W." surname="Mekking"/>
            <author fullname="R. Gieben" initials="R." surname="Gieben"/>
            <date month="December" year="2012"/>
            <abstract>
              <t>This document describes a set of practices for operating the DNS with security extensions (DNSSEC). The target audience is zone administrators deploying DNSSEC.</t>
              <t>The document discusses operational aspects of using keys and signatures in the DNS. It discusses issues of key generation, key storage, signature generation, key rollover, and related policies.</t>
              <t>This document obsoletes RFC 4641, as it covers more operational ground and gives more up-to-date requirements with respect to key sizes and the DNSSEC operations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6781"/>
          <seriesInfo name="DOI" value="10.17487/RFC6781"/>
        </reference>
        <reference anchor="RFC7583">
          <front>
            <title>DNSSEC Key Rollover Timing Considerations</title>
            <author fullname="S. Morris" initials="S." surname="Morris"/>
            <author fullname="J. Ihren" initials="J." surname="Ihren"/>
            <author fullname="J. Dickinson" initials="J." surname="Dickinson"/>
            <author fullname="W. Mekking" initials="W." surname="Mekking"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>This document describes the issues surrounding the timing of events in the rolling of a key in a DNSSEC-secured zone. It presents timelines for the key rollover and explicitly identifies the relationships between the various parameters affecting the process.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7583"/>
          <seriesInfo name="DOI" value="10.17487/RFC7583"/>
        </reference>
        <reference anchor="RFC8901">
          <front>
            <title>Multi-Signer DNSSEC Models</title>
            <author fullname="S. Huque" initials="S." surname="Huque"/>
            <author fullname="P. Aras" initials="P." surname="Aras"/>
            <author fullname="J. Dickinson" initials="J." surname="Dickinson"/>
            <author fullname="J. Vcelak" initials="J." surname="Vcelak"/>
            <author fullname="D. Blacka" initials="D." surname="Blacka"/>
            <date month="September" year="2020"/>
            <abstract>
              <t>Many enterprises today employ the service of multiple DNS providers to distribute their authoritative DNS service. Deploying DNSSEC in such an environment may present some challenges, depending on the configuration and feature set in use. In particular, when each DNS provider independently signs zone data with their own keys, additional key-management mechanisms are necessary. This document presents deployment models that accommodate this scenario and describes these key-management requirements. These models do not require any changes to the behavior of validating resolvers, nor do they impose the new key-management requirements on authoritative servers not involved in multi-signer configurations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8901"/>
          <seriesInfo name="DOI" value="10.17487/RFC8901"/>
        </reference>
        <reference anchor="I-D.ietf-dnsop-dnssec-automation">
          <front>
            <title>DNSSEC automation</title>
            <author fullname="Ulrich Wisser" initials="U." surname="Wisser">
         </author>
            <author fullname="Shumon Huque" initials="S." surname="Huque">
              <organization>Salesforce</organization>
            </author>
            <author fullname="Johan Stenstam" initials="J." surname="Stenstam">
              <organization>The Swedish Internet Foundation</organization>
            </author>
            <date day="19" month="October" year="2024"/>
            <abstract>
              <t>   This document describes an algorithm and protocol to automate the
   setup, operations, and decomissioning of Multi-Signer DNSSEC
   [RFC8901] configurations.  It employs Model 2 of the multi-signer
   specification, where each operator has their own distinct KSK and ZSK
   sets (or CSK sets), Managing DS Records from the Parent via CDS/
   CDNSKEY [RFC8078], and Child-to-Parent Synchronization in DNS
   [RFC7477] to accomplish this.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dnsop-dnssec-automation-03"/>
        </reference>
      </references>
    </references>
    <?line 588?>

<section anchor="context">
      <name>Efficiency and Convergence Issues in DNS Scanning</name>
      <section anchor="original-notify-for-zone-transfer-nudging">
        <name>Original NOTIFY for Zone Transfer Nudging</name>
        <t><xref target="RFC1996"/> introduced the concept of a DNS Notify message which was used
to improve the convergence time for secondary servers when a DNS zone
had been updated in the primary. The basic idea was to augment the
traditional "pull" mechanism (a periodic SOA query) with a "push"
mechanism (a Notify) for a common case that was otherwise very
inefficient (due to either slow convergence or wasteful overly
frequent scanning of the primary for changes).</t>
        <t>While it is possible to indicate how frequently checks should occur
(via the SOA Refresh parameter), these checks did not allow catching
zone changes that fall between checkpoints. <xref target="RFC1996"/> addressed the
optimization of the time-and-cost trade-off between a secondary checking
frequently for new versions of a zone, and infrequent checking, by
replacing scheduled scanning with the more efficient NOTIFY mechanism.</t>
      </section>
      <section anchor="similar-issues-for-ds-maintenance-and-beyond">
        <name>Similar Issues for DS Maintenance and Beyond</name>
        <t>Today, we have similar issues with slow updates of DNS data in spite of
the data having been published. The two most obvious cases are CDS and
CSYNC scanners deployed in a growing number of TLD registries. Because of
the large number of child delegations, scanning for CDS and CSYNC records
is rather slow (as in infrequent).</t>
        <t>It is only a very small number of the delegations that will have updated
CDS or CDNSKEY record in between two scanning runs. However, frequent
scanning for CDS and CDNSKEY records is costly, and infrequent scanning
causes slower convergence (i.e., delay until the DS RRset is updated).</t>
        <t>Unlike in the original case, where the primary is able to suggest the
scanning interval via the SOA Refresh parameter, an equivalent mechanism
does not exist for DS-related scanning.</t>
        <t>All of the above also applies to automated NS and glue record
maintenance via CSYNC scanning <xref target="RFC7477"/>. Again, given that CSYNC
records change only rarely, frequent scanning of a large number of
delegations seems disproportionately costly, while infrequent scanning
causes slower convergence (delay until the delegation is updated).</t>
        <t>While use of the NOTIFY mechanism for coordinating the key exchange in
multi-signer setups <xref target="I-D.ietf-dnsop-dnssec-automation"/> is
conceivable, the detailed specification is left for future work.</t>
      </section>
    </section>
    <section anchor="change-history-to-be-removed-before-publication">
      <name>Change History (to be removed before publication)</name>
      <ul spacing="normal">
        <li>
          <t>draft-ietf-dnsop-generalized-notify-06</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Nits from Genart review</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Nits from Opsdir review</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Nits from Dnsdir review</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>draft-ietf-dnsop-generalized-notify-05</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Editorial changes</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>draft-ietf-dnsop-generalized-notify-04</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Add section on Implementation Status</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Use assigned DSYNC RRtype value</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Define DSYNC presentation format</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Make all needed IANA requests</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Editorial changes</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>draft-ietf-dnsop-generalized-notify-03</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Include DNSSEC bootstrapping use case</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Remove sections with approaches not pursued</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Editorial changes</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>draft-ietf-dnsop-generalized-notify-02</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Nits by Tim Wicinski</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Dnsdir feedback</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Specify timeout and error handling</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Editorial nits</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Reserve scheme value 0</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>draft-ietf-dnsop-generalized-notify-01</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Reserve scheme values 128-255</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Rename NOTIFY rrtype to DSYNC (to distinguish from NOTIFY message)</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Describe endpoint discovery</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Discussion on garbage notifications</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>More discussion on amplification risks</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Clean-up, editorial changes</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>draft-ietf-dnsop-generalized-notify-00</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Revision after adoption.</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>draft-thomassen-dnsop-generalized-dns-notify-02</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Add rationale for staying in band</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Add John as an author</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>draft-thomassen-dnsop-generalized-dns-notify-01</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Mention Ry-to-Rr forwarding to accommodate RRR model</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Add port number flexibility</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Add scheme parameter</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Drop SRV-based alternative in favour of new NOTIFY RR</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Editorial improvements</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>draft-thomassen-dnsop-generalized-dns-notify-00</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Initial public draft.</t>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
