<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.24 (Ruby 3.3.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-dnsop-generalized-notify-07" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.0 -->
  <front>
    <title abbrev="Generalized Notifications">Generalized DNS Notifications</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-dnsop-generalized-notify-07"/>
    <author initials="J." surname="Stenstam" fullname="Johan Stenstam">
      <organization>The Swedish Internet Foundation</organization>
      <address>
        <email>johan.stenstam@internetstiftelsen.se</email>
      </address>
    </author>
    <author initials="P." surname="Thomassen" fullname="Peter Thomassen">
      <organization>deSEC, Secure Systems Engineering</organization>
      <address>
        <email>peter@desec.io</email>
      </address>
    </author>
    <author initials="J." surname="Levine" fullname="John Levine">
      <organization>Standcore LLC</organization>
      <address>
        <email>standards@standcore.com</email>
      </address>
    </author>
    <date/>
    <area>Internet</area>
    <workgroup>DNSOP Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 37?>

<t>This document generalizes and extends the use of DNS NOTIFY (RFC 1996) beyond
conventional zone transfer hints, to allow triggering other types of actions
via the DNS that were previously lacking a trigger mechanism.
Notifications merely nudge the receiver to initiate a predefined action promptly
(instead of on a schedule); they do not alter the action itself
(including any security checks it might employ).</t>
      <t>To enable this functionality, a method for discovering the receiver endpoint
for such notification messages is introduced, via the new DSYNC record type.
Notification types are recorded in a new registry, with initial support for
parental NS and DS record updates including DNSSEC bootstrapping.</t>
      <t>TO BE REMOVED: This document is being collaborated on in Github at:
<eref target="https://github.com/peterthomassen/draft-ietf-dnsop-generalized-notify">https://github.com/peterthomassen/draft-ietf-dnsop-generalized-notify</eref>.
The most recent working version of the document, open issues, etc. should all be
available there.  The authors (gratefully) accept pull requests.</t>
    </abstract>
  </front>
  <middle>
    <?line 56?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Traditional DNS notifications <xref target="RFC1996"/>, which are here referred to as
"NOTIFY(SOA)", are sent from a primary server to a secondary server to
minimize the latter's convergence time to a new version of the
zone. This mechanism successfully addresses a significant inefficiency
in the original protocol.</t>
      <t>Today similar inefficiencies occur in new use cases, in particular delegation
maintenance (DS and NS record updates). Just as in the NOTIFY(SOA) case, a new
set of notification types will have a major positive benefit by
allowing the DNS infrastructure to completely sidestep these
inefficiencies. For additional context, see <xref target="context"/>.</t>
      <t>No DNS protocol changes are introduced by this document. The mechanism
instead makes use of a wider range of DNS messages allowed by the protocol.
Future extension for further use cases (such as multi-signer key exchange)
is possible.</t>
      <t>Readers are expected to be familiar with DNSSEC <xref target="RFC9364"/>, including
<xref target="RFC6781"/>, <xref target="RFC7344"/>, <xref target="RFC7477"/>, <xref target="RFC7583"/>, <xref target="RFC8078"/>,
<xref target="RFC8901"/>, and <xref target="RFC9615"/>.
DNS-specific terminology can be found in <xref target="RFC9499"/>.</t>
      <section anchor="design-requirements">
        <name>Design Requirements</name>
        <t>When the parent operator is interested in notifications for delegation
maintenance (such as DS or NS update hints), a service will need to be
made available for accepting these notifications. Depending on the
context, this service may be run by the parent operator themselves,
or by a designated entity who is in charge of handling the domain's
delegation data (such as a domain registrar).</t>
        <t>It seems desirable to minimize the number of steps that the notification
sender needs to figure out where to send the NOTIFY. This suggests that
the lookup process be ignorant of the details of the parent-side
relationships (e.g., whether there is a registrar or not). This is
addressed by parameterizing the lookup with the name of the child. The
parent operator may then (optionally) announce the notification endpoint
in a delegation-specific way, by publishing it at a child-specific name.
(A catch-all endpoint may be indicated by wildcarding.)</t>
        <t>The solution proposed here is thus for the parent operator to publish
the address where someone listens for notifications, in a child-specific
way (see <xref target="signaling"/>). Potential senders can easily determine the name
of the parent and then look up that information (see <xref target="discovery"/>).</t>
      </section>
      <section anchor="requirements-notation">
        <name>Requirements Notation</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
        </t>
      </section>
    </section>
    <section anchor="dsyncrdtype">
      <name>DSYNC RR Type</name>
      <t>This section defines the DSYNC RR type which is subsequently used for
discovering notification endpoints.</t>
      <section anchor="wire-format">
        <name>Wire Format</name>
        <t>The DSYNC RDATA wire format is encoded as follows:</t>
        <artwork><![CDATA[
                     1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 3 3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| RRtype                        | Scheme        | Port
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
                | Target ...  /
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-/
]]></artwork>
        <dl>
          <dt>RRtype</dt>
          <dd>
            <t>The type of generalized NOTIFY that this DSYNC RR defines the
desired target address for (see "Resource Record (RR) TYPEs" IANA
registry). For now, only CDS and CSYNC are supported values, with
the former indicating an updated CDS or CDNSKEY record set.</t>
          </dd>
          <dt>Scheme</dt>
          <dd>
            <t>The mode used for contacting the desired notification address. This is an
8-bit unsigned integer. Records with value 0 (null scheme) are ignored by consumers.
Value 1 is described in this document, and values 128-255 are reserved for
private use.  All other values are currently unassigned.</t>
          </dd>
          <dt>Port</dt>
          <dd>
            <t>The port on the target host of the notification service. This
is a 16-bit unsigned integer in network byte order. Records with
value 0 are ignored by consumers.</t>
          </dd>
          <dt>Target</dt>
          <dd>
            <t>The fully-qualified, uncompressed domain name of the target host
providing the service of listening for generalized notifications of the
specified type. This name MUST resolve to one or more address records.</t>
          </dd>
        </dl>
      </section>
      <section anchor="presentation-format">
        <name>Presentation Format</name>
        <t>The presentation format of the RDATA portion is as follows:</t>
        <ul spacing="normal">
          <li>
            <t>The RRtype field is represented as a mnemonic from the "Resource
Record (RR) TYPEs" registry.</t>
          </li>
          <li>
            <t>The Scheme field is represented by its mnemonic if assigned (see
<xref target="schemeregistry"/>), otherwise as an unsigned decimal integer.</t>
          </li>
          <li>
            <t>The Port field is represented as an unsigned decimal integer.</t>
          </li>
          <li>
            <t>The Target field is represented as a &lt;domain-name&gt; (<xref section="5.1" sectionFormat="comma" target="RFC1035"/>).</t>
          </li>
        </ul>
      </section>
      <section anchor="semantics">
        <name>Semantics</name>
        <t>For now, the only scheme defined is 1 (mnemonic: NOTIFY). It indicates that
when a new CDS/CDNSKEY (or CSYNC) RRset is published, a NOTIFY(CDS) (or
NOTIFY(CSYNC)) message should be sent to the address and port listed
in the corresponding DSYNC record, using conventional <xref target="RFC1035"/> DNS
transport.</t>
        <t>Example (for the owner names of these records, see <xref target="signaling"/>):</t>
        <artwork><![CDATA[
IN DSYNC  CDS   NOTIFY 5359 cds-scanner.example.net.
IN DSYNC  CSYNC NOTIFY 5360 csync-scanner.example.net.
]]></artwork>
        <t>Should a need for other mechanisms arise, other schemes may be defined
to deal with such requirements using alternative logic.</t>
        <t>Schemes are independent of RRtype. They merely specify a method of
contacting the target (whereas the RRtype is part of the notification
payload).</t>
      </section>
    </section>
    <section anchor="signaling">
      <name>Publication of Notification Targets</name>
      <t>To use generalized notifications, it is necessary for the sender to know
where to direct each NOTIFY message. This section describes the
procedure for discovering that notification target.</t>
      <t>Note that generalized NOTIFY messages are but one mechanism for
improving the efficiency of automated delegation maintenance. Other
alternatives, such as contacting the parent operator via an API or
DNS Update (<xref target="RFC2136"/>), may (or may not) be more suitable in
individual cases. Like generalized notifications, they similarly require
a means for discovering where to send the API or DNS Update requests.</t>
      <t>The scope for the publication mechanism is therefore wider than only to
support generalized notifications, and a unified approach that works
independently of the notification method is specified in this section.</t>
      <t>Parent operators participating in the discovery scheme for the purpose of
delegation maintenance notifications MUST publish endpoint information
using the record type defined in <xref target="dsyncrdtype"/> under the <tt>_dsync</tt>
subdomain of the parent zone, as described in the following subsection.</t>
      <t>There MUST NOT be more than one DSYNC record for each combination of
RRtype and Scheme.
It is RECOMMENDED to secure the corresponding zone with DNSSEC.</t>
      <t>For practical purposes, the parent operator MAY delegate the <tt>_dsync</tt>
domain as a separate zone, and/or synthesize records under it. If
child-specificity is not needed, the parent can publish a static
wildcard DSYNC record.</t>
      <section anchor="wildcard-method">
        <name>Wildcard Method</name>
        <t>If the parent operator itself performs CDS/CDNSKEY or CSYNC processing
for some or all delegations, or wants to forward notifications to some
other party, a default notification target may be specified as follows:</t>
        <artwork><![CDATA[
*._dsync.example.  IN DSYNC  CDS   scheme port target
*._dsync.example.  IN DSYNC  CSYNC scheme port target
]]></artwork>
        <t>To accommodate indirect delegation management models, the
designated notification target may relay notifications to a third party
(such as the registrar, in ICANN's model). The details of such
arrangements are out of scope for this document.</t>
        <t>If for some reason the parent operator cannot publish wildcard records,
the wildcard label may be dropped from the DSYNC owner name (i.e., it
may be published at the <tt>_dsync</tt> label instead). This practice requires
an additional step during discovery (see <xref target="discovery"/>), and is
therefore NOT RECOMMENDED.</t>
      </section>
      <section anchor="child-specific-method">
        <name>Child-specific Method</name>
        <t>It is also possible to publish child-specific records where the parent zone's
labels are stripped from the child's FQDN and the result is used in place of
the wildcard label.</t>
        <t>As an example, consider a registrar offering domains like
<tt>child.example</tt>, delegated from <tt>example</tt> zone. If the registrar
provides the notification endpoint, e.g., <tt>rr-endpoint.example:5300</tt>,
the parent may publish this information as follows:</t>
        <artwork><![CDATA[
child._dsync.example.  IN DSYNC  CDS NOTIFY 5300 rr-endpoint.example.
]]></artwork>
      </section>
    </section>
    <section anchor="delegation-maintenance-cdscdnskey-and-csync-notifications">
      <name>Delegation Maintenance: CDS/CDNSKEY and CSYNC Notifications</name>
      <t>Delegation maintenance notifications address the inefficiencies related
to scanning child zones for CDS/CDNSKEY records
<xref target="RFC7344"/><xref target="RFC8078"/><xref target="RFC9615"/>. (For an overview of the issues,
see <xref target="context"/>.)</t>
      <t>NOTIFY messages for delegation maintenance MUST be formatted as described in
<xref target="RFC1996"/>, with the <tt>qtype</tt> field replaced as appropriate.</t>
      <t>To address the CDS/CDNSKEY dichotomy, the NOTIFY(CDS) message (with
<tt>qtype=CDS</tt>) is defined to indicate any child-side changes pertaining
to an upcoming update of DS records.
As the child DNS operator generally is unaware of whether the parent
side consumes CDS records or prefers CDNSKEY, or when that policy
changes, it seems advisable to publish both types of records,
preferably using automation features of common authoritative nameserver
software for ensuring consistency.</t>
      <t>Upon receipt of NOTIFY(CDS), the parent-side recipient (typically, registry or
registrar) SHOULD initiate the same DNS lookups and verifications for
DNSSEC bootstrapping <xref target="RFC9615"/> or DS maintenance
<xref target="RFC7344"/><xref target="RFC8078"/> that would otherwise be triggered based on a
timer.</t>
      <t>The CSYNC <xref target="RFC7477"/> inefficiency may be similarly treated, with the
child sending a NOTIFY(CSYNC) message (with <tt>qtype=CSYNC</tt>) to an address
where the parent operator (or a designated party) is listening for CSYNC
notifications.</t>
      <t>In both cases the notification will speed up processing times by
providing the recipient with a hint that a particular child zone has
published new CDS, CDNSKEY and/or CSYNC records.</t>
      <section anchor="discovery">
        <name>Endpoint Discovery</name>
        <t>To locate the target for outgoing delegation maintenance notifications,
the notification sender MUST perform the following steps:</t>
        <ol spacing="normal" type="1"><li>
            <t>Construct the lookup name, by inserting the <tt>_dsync</tt> label after the
first label of the delegation owner name.</t>
          </li>
          <li>
            <t>Perform a lookup of type DSYNC for the lookup name, and validate the
response if DNSSEC is enabled. If a positive DSYNC answer results,
return it.</t>
          </li>
          <li>
            <t>If the query resulted in a negative response:  </t>
            <ul spacing="normal">
              <li>
                <t>If the response's SOA record indicates that the parent is more than
one label away from the <tt>_dsync</tt> label, construct a new lookup name
by inserting the <tt>_dsync</tt> label into the delegation owner name just
before the parent zone labels inferred from the negative response,
and go to step 2.      </t>
                <t>
For example, <tt>city.ise.mie.jp</tt> is delegated from <tt>jp</tt> (and not
from <tt>ise.mie.jp</tt> or <tt>mie.jp</tt>!). The initial DSYNC query relating
to it is thus directed at <tt>city._dsync.ise.mie.jp</tt>. This is
expected to result in a negative response from <tt>jp</tt>, and another
query for <tt>city.ise.mie._dsync.jp</tt> is then required.</t>
              </li>
              <li>
                <t>Otherwise, if the lookup name has any labels in front of the
<tt>_dsync</tt> label, remove them to construct a new lookup name (such
as <tt>_dsync.jp</tt>), and go to step 2.
(This is to enable zone structures without wildcards.)</t>
              </li>
              <li>
                <t>Otherwise, return null (no notification target available).</t>
              </li>
            </ul>
          </li>
        </ol>
      </section>
      <section anchor="sending-notifications">
        <name>Sending Notifications</name>
        <t>When creating or changing a CDS/CDNSKEY/CSYNC RRset in the child zone,
the DNS operator SHOULD send a suitable notification to one of the
endpoints discovered as described in the previous section.</t>
        <t>A NOTIFY message can only carry information about changes concerning one
child zone. When there are changes to several child zones, the sender
MUST send a separate notification for each one.</t>
        <t>When a primary name server publishes a new RRset in the child, there
typically is a time delay until all publicly visible copies of the zone
are updated. If the primary sends a notification at the exact time of
publication, there is a potential for CDS/CDNSKEY/CSYNC processing to be
attempted before the corresponding records are served. As a result, a
desired update may not be detected (or appear inconsistent), preventing
it from being applied.</t>
        <t>It is therefore RECOMMENDED that the child delays sending notifications
to the recipient until a consistent public view of the pertinent
records is ensured.</t>
        <section anchor="timeouts-and-error-handling">
          <name>Timeouts and Error Handling</name>
          <t>NOTIFY messages are expected to elicit a response from the recipient
(<xref target="RFC1996"/> Section 4.7). If no response is received, senders SHOULD
employ the same logic as for SOA notifications (<xref target="RFC1996"/> Sections
3.5 and 3.6).</t>
          <t>The recipient's attempt to act upon the delegation update request may
fail for a variety of reasons (e.g., due to violation of the continuity
requirement set forth in <xref target="RFC7344"/> Section 4.1). Such failures may
occur asynchronously, even after the NOTIFY response has been sent.</t>
          <t>In order to learn about such failures, senders MAY include an
<xref target="RFC9567"/> EDNS0 Report-Channel option in the NOTIFY message to
request the receiving side to report any errors by making a report query
with an appropriate extended DNS error code as described in
<xref target="RFC8914"/>.</t>
          <t>When including this EDNS0 option, its agent domain MUST be subordinate
or equal to one of the NS hostnames, as listed in the child's delegation
in the parent zone.
This is to prevent malicious senders from causing the NOTIFY recipient
to send unsolicited report queries to unrelated third parties.</t>
        </section>
        <section anchor="roles">
          <name>Roles</name>
          <t>While the CDS/CDNSKEY/CSYNC processing following the receipt of a NOTIFY
will often be performed by the registry, the protocol anticipates that
in some contexts (especially for ICANN gTLDs), registrars may take on
the task. In such cases, the current registrar notification endpoint may
be published, enabling notifications to be directed to the
appropriate target. The mechanics of how this is arranged between
registry and registrar are out of scope for this document; the protocol
only offers the possibility to arrange things such that from the child
perspective, it is inconsequential how the parent-side parties are
organized: notifications are simply sent to the published address.</t>
          <t>Because of the security model where a notification by itself never
causes a change (it can only speed up the time until the next
check for the same thing), the sender's identity is not crucial.
This opens up the possibility of having an arbitrary party (e.g., a
side-car service) send the notifications, enabling this functionality
even before the emergence of native support in nameserver software.</t>
        </section>
      </section>
      <section anchor="processing-of-notify-messages">
        <name>Processing of NOTIFY Messages</name>
        <t>NOTIFY(CDS) messages carrying notification payloads (records) for
several child zones MUST be discarded, as sending them is an error.</t>
        <t>Upon receipt of a (potentially forwarded) valid NOTIFY(CDS) message for
a particular child zone at the published address for CDS notifications,
the receiving side (parent registry or registrar) has two options:</t>
        <ol spacing="normal" type="1"><li>
            <t>Acknowledge receipt by sending a NOTIFY response as described in
<xref target="RFC1996"/> Section 4.7 (identical to NOTIFY query, but with QR
bit set) and schedule an immediate check of the CDS and CDNSKEY
RRsets as published by that particular child zone.  </t>
            <t>
If the NOTIFY message contains an <xref target="RFC9567"/> EDNS0 Report-Channel
option with an agent domain subordinate or equal to one of the NS
hostnames listed in the delegation, the processing party SHOULD
report any errors occurring during CDS/CDNSKEY processing by sending
a report query with an appropriate extended DNS error code as
described in <xref target="RFC8914"/>. Reporting may be done asynchronously
(outside of the NOTIFY transaction).  </t>
            <t>
When using period scanning, notifications preempt the scanning
timer. If the NOTIFY-induced check finds that the CDS/CDNSKEY RRset
is indeed new or has changed, the corresponding child's timer may
be reset and the scanning frequency reduced (e.g., to once a week).
If a CDS/CDNSKEY change is later detected through scanning (without
having received a notification), NOTIFY-related state SHOULD be
cleared, reverting to the default scanning schedule for this child.  </t>
            <t>
When introducing CDS/CDNSKEY scanning support at the same time as
NOTIFY(CDS) support, backwards compatibility considerations
regarding the scanning interval do not apply; a low-frequency
scanning schedule MAY thus be used by default in such cases.</t>
          </li>
          <li>
            <t>Do not act upon the notification. To prevent retries, recipients
SHOULD acknowledge the notification by sending a NOTIFY response
even when otherwise ignoring the request, combined with a report
query if feasible (see above). One reason to do this may be a rate
limit (see <xref target="security"/>), in which case "Blocked" (15) may be a
suitable extended DNS error code.</t>
          </li>
        </ol>
        <t>Implementing the first option will significantly decrease the
convergence time (between publication of a new CDS/CDNSKEY record in the
child and publication of the resulting DS), thereby providing improved
service for the child.</t>
        <t>If, in addition to scheduling an immediate check for the child zone of
the notification, the scanning schedule is also modified to be less
frequent, the cost of providing the scanning service will be reduced.</t>
        <t>Upon receipt of a NOTIFY(CSYNC) to the published address for CSYNC
notifications, the same options and considerations apply as for the
NOTIFY(CDS).</t>
      </section>
    </section>
    <section anchor="security">
      <name>Security Considerations</name>
      <t>If an action is triggered by the receipt of a DNS NOTIFY, its execution relies
on the same security model which the receiving party would apply if the action
had been triggered by something else. This is because the notification affects
the action's timing alone. For example, DS bootstrapping is expected to be
performed the same way independently of the type of trigger; this includes all
security and authentication requirements (e.g., <xref target="RFC9615"/>) which the parent
registry/registrar has chosen to apply.</t>
      <t>The original NOTIFY specification sidesteps most security issues by not
relying on the information in the NOTIFY message in any way, and instead
only using it to "enter the state it would if the zone's refresh timer
had expired" (<xref section="4.7" sectionFormat="of" target="RFC1996"/>).</t>
      <t>This security model is reused for generalized NOTIFY messages. It
therefore seems impossible to affect the behaviour of the recipient of
the NOTIFY other than by hastening the timing for when different checks
are initiated.
As a consequence, while notifications themselves can be secured via access
control mechanisms, this is not a requirement.</t>
      <t>The receipt of a notification message will, in general, cause the
receiving party to perform one or more outbound queries for the records
of interest (for example, NOTIFY(CDS) will cause CDS/CDNSKEY
queries). When done using standard DNS, the size of these queries is
comparable to that of the NOTIFY messages themselves, rendering any
amplification attempts futile. The number of queries triggered per
notification is also limited by the requirement that a NOTIFY message
can refer to one child only.</t>
      <t>However, when the outgoing query occurs via encrypted transport, some
amplification is possible, both with respect to bandwidth and
computational burden. In this case, the usual principle of bounding the
work, even under unreasonable events, applies.</t>
      <t>Receivers therefore MUST implement rate limiting for notification
processing. It is RECOMMENDED to configure rate limiting independently
for both the notification's source IP address and the name of the zone
that is conveyed in the NOTIFY message. Rate limiting also mitigates
processing load from garbage notifications.</t>
      <t>Alternative solutions (such as signing notifications and validating
their signatures) appear significantly more expensive without tangible
benefit.</t>
      <t>In order to facilitate schemes that are authenticated outside of DNSSEC
(such as via SIG(0)), zones containing DSYNC records are not required to
be signed. Spoofed DSYNC responses would prevent notifications from
reaching their legitimate target, and a different party may receive
unsolicited notifications; both effects, however, can also be achieved
in the presence of DNSSEC. The illegitimate target is also enabled to
learn notification contents in real-time, which may be a privacy concern
for the sender. If so, the sender may choose to ignore unsigned DSYNC
records.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t><strong>Note to the RFC Editor</strong>: In this section, please replace occurrences of "(this document)" with a proper reference.</t>
      <section anchor="dsync-rr-type">
        <name>DSYNC RR Type</name>
        <t>IANA is requested to update the "Resource Record (RR) TYPEs" registry
under the "Domain Name System (DNS) Parameters" registry group as
follows:</t>
        <dl>
          <dt>Type</dt>
          <dd>
            <t>DSYNC</t>
          </dd>
          <dt>Value</dt>
          <dd>
            <t>66</t>
          </dd>
          <dt>Meaning</dt>
          <dd>
            <t>Endpoint discovery for delegation synchronization</t>
          </dd>
          <dt>Reference</dt>
          <dd>
            <t>(this document)</t>
          </dd>
        </dl>
      </section>
      <section anchor="schemeregistry">
        <name>DSYNC Scheme Registration</name>
        <t>IANA is requested to create and maintain the following new registry in the
"Domain Name System (DNS) Parameters" registry group:</t>
        <dl>
          <dt>Name</dt>
          <dd>
            <t>DSYNC: Location of Synchronization Endpoints</t>
          </dd>
          <dt>Assignment Policy</dt>
          <dd>
            <t>Expert Review</t>
          </dd>
          <dt>Reference</dt>
          <dd>
            <t>(this document)</t>
          </dd>
        </dl>
        <t>The initial contents for the registry are as follows:</t>
        <table>
          <thead>
            <tr>
              <th align="left">RRtype</th>
              <th align="left">Scheme</th>
              <th align="left">Mnemonic</th>
              <th align="left">Purpose</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left"> </td>
              <td align="left">0</td>
              <td align="left"> </td>
              <td align="left">Null scheme (no-op)</td>
              <td align="left">(this document)</td>
            </tr>
            <tr>
              <td align="left">CDS</td>
              <td align="left">1</td>
              <td align="left">NOTIFY</td>
              <td align="left">Delegation management</td>
              <td align="left">(this document)</td>
            </tr>
            <tr>
              <td align="left">CSYNC</td>
              <td align="left">1</td>
              <td align="left">NOTIFY</td>
              <td align="left">Delegation management</td>
              <td align="left">(this document)</td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left">2-127</td>
              <td align="left"> </td>
              <td align="left">Unassigned</td>
              <td align="left"> </td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left">128-255</td>
              <td align="left"> </td>
              <td align="left">Reserved (private use)</td>
              <td align="left">(this document)</td>
            </tr>
          </tbody>
        </table>
        <t>Requests to register additional entries MUST include the following fields:</t>
        <dl>
          <dt>RRtype</dt>
          <dd>
            <t>An RRtype that is defined for use</t>
          </dd>
          <dt>Scheme</dt>
          <dd>
            <t>The mode used for contacting the desired notification address</t>
          </dd>
          <dt>Mnemonic</dt>
          <dd>
            <t>The scheme's shorthand string used in presentation format</t>
          </dd>
          <dt>Purpose</dt>
          <dd>
            <t>Use case description</t>
          </dd>
          <dt>Reference</dt>
          <dd>
            <t>Location of specification or registration source</t>
          </dd>
        </dl>
        <t>Registration requests are to be recorded by IANA after Expert Review <xref target="RFC8126"/>.</t>
      </section>
      <section anchor="dsync-underscore-name">
        <name>_dsync Underscore Name</name>
        <t>Per <xref target="RFC8552"/>, IANA is requested to add the following entries to the
"Underscored and Globally Scoped DNS Node Names" registry:</t>
        <artwork><![CDATA[
+---------+------------+-----------------+
| RR Type | _NODE NAME | Reference       |
+---------+------------+-----------------+
| DSYNC   | _dsync     | (this document) |
+---------+------------+-----------------+
]]></artwork>
      </section>
    </section>
    <section anchor="implementation-status">
      <name>Implementation Status</name>
      <t><strong>Note to the RFC Editor</strong>: please remove this entire section before publication.</t>
      <t>Johan Stenstam's experimental nameserver implements this draft
(https://github.com/johanix/tdns).</t>
      <section anchor="child-dns-operator-side">
        <name>Child DNS Operator-side</name>
        <ul spacing="normal">
          <li>
            <t>IronDNS implementation under way</t>
          </li>
          <li>
            <t>deSEC implementation under way (Q1/2025)</t>
          </li>
        </ul>
      </section>
      <section anchor="parent-side">
        <name>Parent-side</name>
        <ul spacing="normal">
          <li>
            <t>SWITCH (.CH/.LI) implementation is under way.</t>
          </li>
          <li>
            <t>.SE/.NU will implement this once it is an RFC.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>In order of first contribution or review:
Joe Abley, Mark Andrews, Christian Elmerot, Ólafur Guðmundsson, Paul
Wouters, Brian Dickson, Warren Kumari, Patrick Mevzek, Tim Wicinski,
Q Misell, Stefan Ubbink, Matthijs Mekking, Kevin P. Fleming, Nicolai
Leymann, Giuseppe Fioccola, Peter Yee, Tony Li, Paul Wouters, Roman Danyliw.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC1996">
          <front>
            <title>A Mechanism for Prompt Notification of Zone Changes (DNS NOTIFY)</title>
            <author fullname="P. Vixie" initials="P." surname="Vixie"/>
            <date month="August" year="1996"/>
            <abstract>
              <t>This memo describes the NOTIFY opcode for DNS, by which a master server advises a set of slave servers that the master's data has been changed and that a query should be initiated to discover the new data. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1996"/>
          <seriesInfo name="DOI" value="10.17487/RFC1996"/>
        </reference>
        <reference anchor="RFC9364">
          <front>
            <title>DNS Security Extensions (DNSSEC)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>This document describes the DNS Security Extensions (commonly called "DNSSEC") that are specified in RFCs 4033, 4034, and 4035, as well as a handful of others. One purpose is to introduce all of the RFCs in one place so that the reader can understand the many aspects of DNSSEC. This document does not update any of those RFCs. A second purpose is to state that using DNSSEC for origin authentication of DNS data is the best current practice. A third purpose is to provide a single reference for other documents that want to refer to DNSSEC.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="237"/>
          <seriesInfo name="RFC" value="9364"/>
          <seriesInfo name="DOI" value="10.17487/RFC9364"/>
        </reference>
        <reference anchor="RFC7344">
          <front>
            <title>Automating DNSSEC Delegation Trust Maintenance</title>
            <author fullname="W. Kumari" initials="W." surname="Kumari"/>
            <author fullname="O. Gudmundsson" initials="O." surname="Gudmundsson"/>
            <author fullname="G. Barwood" initials="G." surname="Barwood"/>
            <date month="September" year="2014"/>
            <abstract>
              <t>This document describes a method to allow DNS Operators to more easily update DNSSEC Key Signing Keys using the DNS as a communication channel. The technique described is aimed at delegations in which it is currently hard to move information from the Child to Parent.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7344"/>
          <seriesInfo name="DOI" value="10.17487/RFC7344"/>
        </reference>
        <reference anchor="RFC7477">
          <front>
            <title>Child-to-Parent Synchronization in DNS</title>
            <author fullname="W. Hardaker" initials="W." surname="Hardaker"/>
            <date month="March" year="2015"/>
            <abstract>
              <t>This document specifies how a child zone in the DNS can publish a record to indicate to a parental agent that the parental agent may copy and process certain records from the child zone. The existence of the record and any change in its value can be monitored by a parental agent and acted on depending on local policy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7477"/>
          <seriesInfo name="DOI" value="10.17487/RFC7477"/>
        </reference>
        <reference anchor="RFC8078">
          <front>
            <title>Managing DS Records from the Parent via CDS/CDNSKEY</title>
            <author fullname="O. Gudmundsson" initials="O." surname="Gudmundsson"/>
            <author fullname="P. Wouters" initials="P." surname="Wouters"/>
            <date month="March" year="2017"/>
            <abstract>
              <t>RFC 7344 specifies how DNS trust can be maintained across key rollovers in-band between parent and child. This document elevates RFC 7344 from Informational to Standards Track. It also adds a method for initial trust setup and removal of a secure entry point.</t>
              <t>Changing a domain's DNSSEC status can be a complicated matter involving multiple unrelated parties. Some of these parties, such as the DNS operator, might not even be known by all the organizations involved. The inability to disable DNSSEC via in-band signaling is seen as a problem or liability that prevents some DNSSEC adoption at a large scale. This document adds a method for in-band signaling of these DNSSEC status changes.</t>
              <t>This document describes reasonable policies to ease deployment of the initial acceptance of new secure entry points (DS records).</t>
              <t>It is preferable that operators collaborate on the transfer or move of a domain. The best method is to perform a Key Signing Key (KSK) plus Zone Signing Key (ZSK) rollover. If that is not possible, the method using an unsigned intermediate state described in this document can be used to move the domain between two parties. This leaves the domain temporarily unsigned and vulnerable to DNS spoofing, but that is preferred over the alternative of validation failures due to a mismatched DS and DNSKEY record.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8078"/>
          <seriesInfo name="DOI" value="10.17487/RFC8078"/>
        </reference>
        <reference anchor="RFC9615">
          <front>
            <title>Automatic DNSSEC Bootstrapping Using Authenticated Signals from the Zone's Operator</title>
            <author fullname="P. Thomassen" initials="P." surname="Thomassen"/>
            <author fullname="N. Wisiol" initials="N." surname="Wisiol"/>
            <date month="July" year="2024"/>
            <abstract>
              <t>This document introduces an in-band method for DNS operators to publish arbitrary information about the zones for which they are authoritative, in an authenticated fashion and on a per-zone basis. The mechanism allows managed DNS operators to securely announce DNSSEC key parameters for zones under their management, including for zones that are not currently securely delegated.</t>
              <t>Whenever DS records are absent for a zone's delegation, this signal enables the parent's registry or registrar to cryptographically validate the CDS/CDNSKEY records found at the child's apex. The parent can then provision DS records for the delegation without resorting to out-of-band validation or weaker types of cross-checks such as "Accept after Delay".</t>
              <t>This document establishes the DS enrollment method described in Section 4 of this document as the preferred method over those from Section 3 of RFC 8078. It also updates RFC 7344.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9615"/>
          <seriesInfo name="DOI" value="10.17487/RFC9615"/>
        </reference>
        <reference anchor="RFC9499">
          <front>
            <title>DNS Terminology</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
              <t>This document updates RFC 2308 by clarifying the definitions of "forwarder" and "QNAME". It obsoletes RFC 8499 by adding multiple terms and clarifications. Comprehensive lists of changed and new definitions can be found in Appendices A and B.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="219"/>
          <seriesInfo name="RFC" value="9499"/>
          <seriesInfo name="DOI" value="10.17487/RFC9499"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC1035">
          <front>
            <title>Domain names - implementation and specification</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1035"/>
          <seriesInfo name="DOI" value="10.17487/RFC1035"/>
        </reference>
        <reference anchor="RFC2136">
          <front>
            <title>Dynamic Updates in the Domain Name System (DNS UPDATE)</title>
            <author fullname="P. Vixie" initials="P." role="editor" surname="Vixie"/>
            <author fullname="S. Thomson" initials="S." surname="Thomson"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <author fullname="J. Bound" initials="J." surname="Bound"/>
            <date month="April" year="1997"/>
            <abstract>
              <t>Using this specification of the UPDATE opcode, it is possible to add or delete RRs or RRsets from a specified zone. Prerequisites are specified separately from update operations, and can specify a dependency upon either the previous existence or nonexistence of an RRset, or the existence of a single RR. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2136"/>
          <seriesInfo name="DOI" value="10.17487/RFC2136"/>
        </reference>
        <reference anchor="RFC9567">
          <front>
            <title>DNS Error Reporting</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <date month="April" year="2024"/>
            <abstract>
              <t>DNS error reporting is a lightweight reporting mechanism that provides the operator of an authoritative server with reports on DNS resource records that fail to resolve or validate. A domain owner or DNS hosting organization can use these reports to improve domain hosting. The reports are based on extended DNS errors as described in RFC 8914.</t>
              <t>When a domain name fails to resolve or validate due to a misconfiguration or an attack, the operator of the authoritative server may be unaware of this. To mitigate this lack of feedback, this document describes a method for a validating resolver to automatically signal an error to a monitoring agent specified by the authoritative server. The error is encoded in the QNAME; thus, the very act of sending the query is to report the error.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9567"/>
          <seriesInfo name="DOI" value="10.17487/RFC9567"/>
        </reference>
        <reference anchor="RFC8914">
          <front>
            <title>Extended DNS Errors</title>
            <author fullname="W. Kumari" initials="W." surname="Kumari"/>
            <author fullname="E. Hunt" initials="E." surname="Hunt"/>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="W. Hardaker" initials="W." surname="Hardaker"/>
            <author fullname="D. Lawrence" initials="D." surname="Lawrence"/>
            <date month="October" year="2020"/>
            <abstract>
              <t>This document defines an extensible method to return additional information about the cause of DNS errors. Though created primarily to extend SERVFAIL to provide additional information about the cause of DNS and DNSSEC failures, the Extended DNS Errors option defined in this document allows all response types to contain extended error information. Extended DNS Error information does not change the processing of RCODEs.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8914"/>
          <seriesInfo name="DOI" value="10.17487/RFC8914"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC8552">
          <front>
            <title>Scoped Interpretation of DNS Resource Records through "Underscored" Naming of Attribute Leaves</title>
            <author fullname="D. Crocker" initials="D." surname="Crocker"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>Formally, any DNS Resource Record (RR) may occur under any domain name. However, some services use an operational convention for defining specific interpretations of an RRset by locating the records in a DNS branch under the parent domain to which the RRset actually applies. The top of this subordinate branch is defined by a naming convention that uses a reserved node name, which begins with the underscore character (e.g., "_name"). The underscored naming construct defines a semantic scope for DNS record types that are associated with the parent domain above the underscored branch. This specification explores the nature of this DNS usage and defines the "Underscored and Globally Scoped DNS Node Names" registry with IANA. The purpose of this registry is to avoid collisions resulting from the use of the same underscored name for different services.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="222"/>
          <seriesInfo name="RFC" value="8552"/>
          <seriesInfo name="DOI" value="10.17487/RFC8552"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC6781">
          <front>
            <title>DNSSEC Operational Practices, Version 2</title>
            <author fullname="O. Kolkman" initials="O." surname="Kolkman"/>
            <author fullname="W. Mekking" initials="W." surname="Mekking"/>
            <author fullname="R. Gieben" initials="R." surname="Gieben"/>
            <date month="December" year="2012"/>
            <abstract>
              <t>This document describes a set of practices for operating the DNS with security extensions (DNSSEC). The target audience is zone administrators deploying DNSSEC.</t>
              <t>The document discusses operational aspects of using keys and signatures in the DNS. It discusses issues of key generation, key storage, signature generation, key rollover, and related policies.</t>
              <t>This document obsoletes RFC 4641, as it covers more operational ground and gives more up-to-date requirements with respect to key sizes and the DNSSEC operations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6781"/>
          <seriesInfo name="DOI" value="10.17487/RFC6781"/>
        </reference>
        <reference anchor="RFC7583">
          <front>
            <title>DNSSEC Key Rollover Timing Considerations</title>
            <author fullname="S. Morris" initials="S." surname="Morris"/>
            <author fullname="J. Ihren" initials="J." surname="Ihren"/>
            <author fullname="J. Dickinson" initials="J." surname="Dickinson"/>
            <author fullname="W. Mekking" initials="W." surname="Mekking"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>This document describes the issues surrounding the timing of events in the rolling of a key in a DNSSEC-secured zone. It presents timelines for the key rollover and explicitly identifies the relationships between the various parameters affecting the process.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7583"/>
          <seriesInfo name="DOI" value="10.17487/RFC7583"/>
        </reference>
        <reference anchor="RFC8901">
          <front>
            <title>Multi-Signer DNSSEC Models</title>
            <author fullname="S. Huque" initials="S." surname="Huque"/>
            <author fullname="P. Aras" initials="P." surname="Aras"/>
            <author fullname="J. Dickinson" initials="J." surname="Dickinson"/>
            <author fullname="J. Vcelak" initials="J." surname="Vcelak"/>
            <author fullname="D. Blacka" initials="D." surname="Blacka"/>
            <date month="September" year="2020"/>
            <abstract>
              <t>Many enterprises today employ the service of multiple DNS providers to distribute their authoritative DNS service. Deploying DNSSEC in such an environment may present some challenges, depending on the configuration and feature set in use. In particular, when each DNS provider independently signs zone data with their own keys, additional key-management mechanisms are necessary. This document presents deployment models that accommodate this scenario and describes these key-management requirements. These models do not require any changes to the behavior of validating resolvers, nor do they impose the new key-management requirements on authoritative servers not involved in multi-signer configurations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8901"/>
          <seriesInfo name="DOI" value="10.17487/RFC8901"/>
        </reference>
        <reference anchor="I-D.ietf-dnsop-dnssec-automation">
          <front>
            <title>DNSSEC automation</title>
            <author fullname="Ulrich Wisser" initials="U." surname="Wisser">
         </author>
            <author fullname="Shumon Huque" initials="S." surname="Huque">
              <organization>Salesforce</organization>
            </author>
            <author fullname="Johan Stenstam" initials="J." surname="Stenstam">
              <organization>The Swedish Internet Foundation</organization>
            </author>
            <date day="19" month="October" year="2024"/>
            <abstract>
              <t>   This document describes an algorithm and protocol to automate the
   setup, operations, and decomissioning of Multi-Signer DNSSEC
   [RFC8901] configurations.  It employs Model 2 of the multi-signer
   specification, where each operator has their own distinct KSK and ZSK
   sets (or CSK sets), Managing DS Records from the Parent via CDS/
   CDNSKEY [RFC8078], and Child-to-Parent Synchronization in DNS
   [RFC7477] to accomplish this.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dnsop-dnssec-automation-03"/>
        </reference>
      </references>
    </references>
    <?line 607?>

<section anchor="context">
      <name>Efficiency and Convergence Issues in DNS Scanning</name>
      <section anchor="original-notify-for-zone-transfer-nudging">
        <name>Original NOTIFY for Zone Transfer Nudging</name>
        <t><xref target="RFC1996"/> introduced the concept of a DNS Notify message which was used
to improve the convergence time for secondary servers when a DNS zone
had been updated in the primary. The basic idea was to augment the
traditional "pull" mechanism (a periodic SOA query) with a "push"
mechanism (a Notify) for a common case that was otherwise very
inefficient (due to either slow convergence or wasteful overly
frequent scanning of the primary for changes).</t>
        <t>While it is possible to indicate how frequently checks should occur
(via the SOA Refresh parameter), these checks did not allow catching
zone changes that fall between checkpoints. <xref target="RFC1996"/> addressed the
optimization of the time-and-cost trade-off between a secondary checking
frequently for new versions of a zone, and infrequent checking, by
replacing scheduled scanning with the more efficient NOTIFY mechanism.</t>
      </section>
      <section anchor="similar-issues-for-ds-maintenance-and-beyond">
        <name>Similar Issues for DS Maintenance and Beyond</name>
        <t>Today, we have similar issues with slow updates of DNS data in spite of
the data having been published. The two most obvious cases are CDS and
CSYNC scanners deployed in a growing number of TLD registries. Because of
the large number of child delegations, scanning for CDS and CSYNC records
is rather slow (as in infrequent).</t>
        <t>It is only a very small number of the delegations that will have updated
CDS or CDNSKEY record in between two scanning runs. However, frequent
scanning for CDS and CDNSKEY records is costly, and infrequent scanning
causes slower convergence (i.e., delay until the DS RRset is updated).</t>
        <t>Unlike in the original case, where the primary is able to suggest the
scanning interval via the SOA Refresh parameter, an equivalent mechanism
does not exist for DS-related scanning.</t>
        <t>All of the above also applies to automated NS and glue record
maintenance via CSYNC scanning <xref target="RFC7477"/>. Again, given that CSYNC
records change only rarely, frequent scanning of a large number of
delegations seems disproportionately costly, while infrequent scanning
causes slower convergence (delay until the delegation is updated).</t>
        <t>While use of the NOTIFY mechanism for coordinating the key exchange in
multi-signer setups <xref target="I-D.ietf-dnsop-dnssec-automation"/> is
conceivable, the detailed specification is left for future work.</t>
      </section>
    </section>
    <section anchor="change-history-to-be-removed-before-publication">
      <name>Change History (to be removed before publication)</name>
      <ul spacing="normal">
        <li>
          <t>draft-ietf-dnsop-generalized-notify-07</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>IESG review changes (notable: scheme now has mnemonic; else editorial)</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Nits from Opsdir telechat review</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>draft-ietf-dnsop-generalized-notify-06</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Nits from Genart review</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Nits from Opsdir review</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Nits from Dnsdir review</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>draft-ietf-dnsop-generalized-notify-05</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Editorial changes</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>draft-ietf-dnsop-generalized-notify-04</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Add section on Implementation Status</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Use assigned DSYNC RRtype value</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Define DSYNC presentation format</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Make all needed IANA requests</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Editorial changes</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>draft-ietf-dnsop-generalized-notify-03</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Include DNSSEC bootstrapping use case</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Remove sections with approaches not pursued</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Editorial changes</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>draft-ietf-dnsop-generalized-notify-02</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Nits by Tim Wicinski</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Dnsdir feedback</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Specify timeout and error handling</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Editorial nits</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Reserve scheme value 0</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>draft-ietf-dnsop-generalized-notify-01</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Reserve scheme values 128-255</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Rename NOTIFY rrtype to DSYNC (to distinguish from NOTIFY message)</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Describe endpoint discovery</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Discussion on garbage notifications</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>More discussion on amplification risks</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Clean-up, editorial changes</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>draft-ietf-dnsop-generalized-notify-00</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Revision after adoption.</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>draft-thomassen-dnsop-generalized-dns-notify-02</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Add rationale for staying in band</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Add John as an author</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>draft-thomassen-dnsop-generalized-dns-notify-01</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Mention Ry-to-Rr forwarding to accommodate RRR model</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Add port number flexibility</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Add scheme parameter</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Drop SRV-based alternative in favour of new NOTIFY RR</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Editorial improvements</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>draft-thomassen-dnsop-generalized-dns-notify-00</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Initial public draft.</t>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA61d6XbjRnb+X09RkX+Y9JBsqVe3nHhGlmRbM91qWVKPj7Oc
aZAoSrBAgEaBkum2nyIvkEfIMyQvlu8uVShQlN3OTE9OLJFALbfu8t2tNB6P
TVu0pdu3X7nKNVlZ/ORye3R6YU/rtpgXs6wt6sqbbDpt3G3/qf4TeT2rsgUG
ypts3o4L187HeeXr5fiqe2dc0Tvr8e4Lk2ctHn5/dHB5/IvBIO6qbtb71re5
McWy2bdts/Lt493dl7uPTda4bN+eVK1rKteau7q5uWrq1XKflvrmzH6LD4rq
yn5FH5obt8YTeffC+IjWZIxvsyr/W1bWFaZeO2+Wxb79t7aejayvm7Zxc4+f
1gv64T+MyVbtdd3sGzs2Fv+Kyu/bP0/sResqjLTgD2XPf66vs6r/Rd1cZVXx
E1Nn315eO3tx5/LCX8dV2S/rVZXzA/yGW2RFuW+/p7EmXsf6U6FPexCudaV3
+M71lnQ2wfD1IvP4LlnTmcOLG99gUTggd3F8OLIXbrZqsKo1plp4e1xdFZVz
DciYrmZJo/wpd97NJkW9SYpX7hYv9QlRpZ/yhBdE9lmNyV69OkwH5/PImtz/
yYdHJrN6YUxVNwsQ5tbtgxmqefLbeDy22dS3TTbDgV5eF96C81YLV7W2YzRv
MZx1P4KIubctiL/yztZz4ew3lydffmcH518e2r2XL58P7dSt6yo3s7q6xTg4
j6y0P4FJwINZ5ecg4zWOAbzR1jYry/oOXxRXV0wsW2P4xrbrJWbFDFgXy8Nt
kfHENGN7nbX2zoEAS0hRUa98ubZlNmOezcJgduFmOPrCLyamJ1v4onF4o1rl
V44HbdzMgR4NLaioiraA/GAgjJ67OWif6zLwSb1YtuXaDHBkrctyWiI+z6yf
Xbt8VbrhZzTiGlS0EE5sj7iG5tARita7ck7vz8pVzguu1tYT8xTt2mKU2Y3H
U3ZRXF23ONllWa+HE5xNbV2VTUtaMU5pvqpmQlq8NsICFg7SlVscroVYzOpb
IWdvezi+ZQ3SG3rKr2bXtkoIgyG8z65Ad4yPp5o6X81cPrKB9pW7s0cX350e
0ojQCHxKfeLqwUHB6DOgXUH0oXcbd1WA1bDcu6K9VkqXWMhyCXVBSzdLvFm1
+BDHTDx3dBHmWi1JxdHCAuHACpA8O63rlhh4ucSHRKg39otje378+s1fj49I
VaQ8jZ+njl6e1WWZTesGY+Z0gljkV1jUamqzdt/823XbLv3+o0dX/BlJ0SMW
3TbI/6MP0Mv/MfiHDIPTJ323qH3LR4lt3KmCxqF6ojq4kA4obHNk66XDnrxf
OYiZa2cT66/rVZmTvIECJruFxlBugjRMLKtU0dDeDq6ILvNVWa6HYNyZW7Z2
id8w/Q8YsfUT0RyLIs9LZ8xHpISZXVj7mssmywsVfBLYqid+79//E3QFqYpf
fgErXBfgQ2IYWghmgH6A3LFu8GZHtMvg4s3BcGfEj3kiwByCyBJaLLKG5KdR
8c1IlmpSg8mnZgFeW4CkTKUya3EEH3vLCqoBwWf4olg4eZ84tU9XQ8prIpwU
lQrJzwwCw1SyWZ43+IVY3/riquLtEr9Vbo4fC8yxhurl+Wvop4JIA20CY1mX
LN15hgVjkWXWpG8VpAZn0A7EobQ00ryzzNO54hPIS1vMVvRS7kp3JeYP5gBm
rspoY4MjkaTTTUkaTuyfAQlAZasLS2jNU4yEGsbDuIIS1X05vyvAFNfZLWnL
RfY9tMqy9gXZFjAZNgE9Nl0b1vFBGRE/wAY1GWQW/EI2E2SHZCxLSEZJRIB5
bN2SnoZp7tNiAivfELUDe+EMWxgm4AznwFn66y+/gKanNU8WqGzp4K5UOXXq
DQsUjRqEZ8KiEM/ZBE2/yG7wshq+DFvPwVsNDRksYdSfvOEwtEvO+csVb5gt
KTMYKeL5qmGbF0/WDlg342AWq7ItxsRQ+B44DG/KLoYGKwatfQEZxl7PsULw
LO/N/bh0s1ZEaOrsPANTFWAQVrqqNEUGXz55/pRkMOpU8/79H/H58xef7tHn
8tSLJ0+fJr89ffFCfqMnXzz79En33ae7Lz7FbzrKpy93eRTiPp3v+d4zOhos
YuyxSGInC1mEeNZlfQXzB9hHSyYkR1yprz19+ZJP9KOP7JEjathzKKKicXRe
3phvr51wsJgP0n5QYCCtGDLoFd+KIeprIjaWD4hNOAKID57C6YrYCHQZjljR
NLcFHmUhANZTgmOYHPIQFSxNIjpURQDH3FvGBJuCumabVvM+TORq5sww0QIq
AtRpVlXkrI394rMF8MUttIPBr3gqwwaJYmznCI0BZNxd10IZEolG+BdclZdB
RvOaSPExvJBIHIvNZx1VMn0m2PSsIYxy0pIYAv3SnI2Yl9r2lG+1WkzBy5iR
ZNwLluMvEpJA41QkXURUT0PMiyuSm3oF08dmAp/RM4naUv3sV8B+sFA8sGF1
X9c3qyUJIalrIiDIAcNftdFsuhaH5cOvQtQx6SEDoCiHdF1gsQM3uZqQyXIC
UnkpBVEjkoGYBVsZ6nIK+HpqGlgdYGwAe3Bk8VMgtq6PpZMJgQfCUmbXRZmz
QjKbR03M0BLfD+ql6EI21lUF2Zm5eyTtsB/Dse5gO0G8y4DMaI2raQnHitYH
/Y3jyWQd3ZO0xIkZHEBe29n1mDBFGD4waQF+njHTYURISD6DY0IAbWgYzfi6
XAVIDT2G5wIxgZREMrcyeB2Wx2ertFWm8PXCkZuBr0m/8iA9SRsJFu3vxmDf
YGw2HywpJAa//IITPKtbkhiCqMyPnvWTy3wBM5U7UVwuHprp8Q+rPT4gOmBo
D2H16H5h6zppgOtrmpSVXKrdKC6QKazC4GQEyBv3duf124tLYCL+LwkB/Xx+
/M3bk/PjI/r54uuDV6/iD0afuPj6zdtXR91P3ZuHb16/Pj49kpfxqe19ZHZe
H3y3I9p8583Z5cmb04NXOwIdUoSdiXQyC4BC8KGICTLSJX7WFFPRw18cnv3P
f+09VQX/eG8PCj4Ykb0XMDd0pJXMVlflWn8l18oA6TsGSQxmZ9mygMOAs4Va
Asi9q5iTJuaf/1jS6Yyf//FzQxBVPJfzc3sJ6GLff5T7dTVrcgIyv6jrC+go
uo69PvF042v0oKJV1jNTT2C4gjdIlps9L5N6Xlulz8sBf4vTJSQDRpBj1VmO
Di4PIC0NW41Fxv4KgE+dMwnxIQELD7/dPvRvb8v/Hm/53xP7RAbZ5Qee2Kf2
mX1uX9hP7cvf8xkP8ofx3/k/HuVnUJmJ/MC/n+0F3OOF634/g9v4D1zA/Qkv
yTy2djKBg/ToA2Z6BCTGezASo+LtQC1cpXE+iZeo4St8x2EJ2xm2oAQpZAVB
0ZFKY7Wxc+58vWqg6c8F1Q/Oz4f28ruzY79jTw5OD0zwtoeCmav6biSidKge
wSHPyy6VeOCY7jYr2WUka8QalvjQNUGdS7xCoVDOI2HoQ+C5vxx/F/wLuAvg
cjkrpcMCHBylhDE7hUMC2tCt9gRGNxzNKKY1n46nMEirivFwzvrlyjUTpYAX
E8o7AGcOKnJYPa9iKJifzL4YJKzAQ101EMe/8vN7NEVPQ/W0migiIY7de/zp
+PGzZxrkYCdTpB/e6C1BRGwU/HKA6SWYpe/R83DkGtUZVeZlIyAWM7KQikMh
AgPD4V+T56/GpUckBYZCJMNAZO/5ViKJ99hS3AD7b8kJzTdJZwLpHiaWEYHQ
pbLrO/5hBcaeFxQoAvKAH6doRwFiCmeS/YBY9W2RBx4IEBcPivWmL4hXUsnp
g3f1zdWMO41GCb/wpGwXsZgaeJhMEkEDAk4UOQ3yJCyrWvmMTrMSa9vTzsv0
C9XMuiVR2XRoHN3zfTU9ZjqpWsMiy5weaZwOKFodrnPlFnUFYMVhDRo2ijeU
zhYBD7I9CVOoZtw6BY6wAI6IkxRwX5X1WJdgCiAfHiCMCyQyEua9K+Cu0CKr
jqdyUHwBVBQEMCzijKN4D+3yAwZQdfswof79n4WrxnTA//65HWgsaffJsxG2
caH2+9lkL2KpC7cA1C9mcBOjGuQoDKlC2bUNUV5MuWcHgVD7qqqhQE/aCGjV
syA8osEiaMFHQQUOSB2SXh3i1CluQm66AFYSkCzEWPDOkB424Xd+ZxhCCCFa
N9VwF7g3hbukjFhPsKzkIbAENsHXy1pcyTRSC9H0EvVMQvId7QC3sH7D4Xka
F5Q7/jGjiIwdBCQOYEUeGegeRM+HGK8P0ZcUPitIOTnVhbCxsMH6PXvy7KWd
5X7sAakx8MTJfJOKjMfGi/yf+OLzXTsj6Lb9VXOhcU7xyGn1ooRjQIcUcUHB
LflcWMAHv0VZwYDiuQOR2Kaw19ukoFzIydH9inMpQPlXxSzavRBlytmzd+Jr
ih5gd24dkhCivtZdAL+emw37qFpzwE5OJqhUVQpxV9ZsNQ5wGNdlneUkBkC/
Z8SEajbwdC9mL2LngYm7A+SEA0WkHlTAI/IOSdc68qsp3hpYRb13kPAG4mai
x56DfLMWDhSoqcep/B6c94i/xRALFGLPPV8JKN5IbkAR98OSvBUO/rVOvt+C
vbpAHQadrlo2DV1kl2x5sWADpUfQBXE5+LdqoYVaVmQxPpIEjyb2DbGWSdiD
RERDJxunu+nhUrIFuvLg7ATGiiJl9q0EngbBV3rynNUzMexAAwEUcSDuZdvm
V3CIKPZSVIa0FszsiiKlFFqc2FfFza8eKmevNBAN/lSuN8SfWQiZJUdwPxwj
K7fJypOsAbv+s3rpOg8/YczuCDgOgJHntCEJtbaUE2at3dYm5Ix+ZSOkJDPY
HAEHcBqbmhhPkofAQd4k4lmutwIslUlizQgzAjZUZiX01j9Cr1H5YimAWbVz
dPOD1eko0FAEhCR/Oz9tAB/GNWpUurhLElgwop009RcSdZ2Vo7hq6v3+Airl
mqZ89zf+5h0oPFUE1w9rUC6Efe0NtOwU9tDM7BwH6lwyh4QgReRSPU7XzygS
TVg/AEhOiyroK/Wq+ExFwU4o2IhTSGIUwoWchb9vDTn/nETAJwIHlpT4BmXL
cAoiAfek8vXBd0HYXZ9OSiSGJ95RfA9PKJGq/BElWtcVWUuKgKq9VHoXLZAF
1H0vHEUBWtKqdcsWjFBDsiAKQIWjzyjh31IAS8NrPVKGQIN+9Zo52ZiT+db9
SVra4lfiIt/DNAHShBAq5Qk4gVwvGFBTFKZjXBAQn91lZCUpcls3dzR/n4Xp
pGqKmLEJJnHhHDY4NFuVW1V6sM+dHN6Lh3wykTOJgOA++lDJY9Uh437Am/yf
LW+ShcxmYFR4t3TopGvZwPWkuIKh4cAY+cClsJdJYvIP7ZUiz+v7ZKNMfAF6
Ms1MjMeLrGsMmsOcJ4cHp6cfe5l2KEmtJNBNL5qs4fyVQJpMA+z0ZaKh08wY
s088egIj9fa8CyGzuo2cGhk04EUOLcRPy2zqygjAmnq5JOQWXCE5hg5+2kEx
cRNCH0ZfiQDbai4hCKeOrBm8EJNXmXfBtnmTVWlKkZOPwBukNjqlvSVYKzYG
nndnqjbCpiKEh/3oeRRFVmBZ6euYyUvi25sx96A61OD2FfLH3vBW5RTBBEWf
hjwWmOHLb45OQ2CaXGMStsJLZIayyWXGPviW48FODtiJUxEZcViADXMv+zGf
Cy4Qtejhodw4807yGPrqu1FUpbrEd+EbK5l2VVJxWA0WaER2a2B1ZCU3865p
xuGzMOH+sye7u++E6ZRoxDmB0MzjaVz+nmaR5f+GdokOyu6u3bIIgeFHnWp4
3Rn4/Z6+7WJz/ZJAc/Qh6CD4iLTZjToCTmaJb8O+E3uEtDUmu2C7dCHKciZN
A6eJ3l5S1w44Mw9rfUuxHPjFihu0CsVsJuiHxmzC8X4+trdJxg/TEBfXgEAK
QcxGWUlIp737gZDDOw0qNI55XMIJBAmXDRV7SX1VSrqUDnD8r2tA/vUoLZNg
Fz746wMOoMlc/4Jv3g0loCiIi8vKJHzA5V4q2uDoWJQAzQndTEdCx8MxVlgW
OiHNO1ONwUUXrzrwnWAz1o66VyFxyTBiVWV3rNjnadZSpcDICiS8xzY/ahmG
RlSK40N0V8y6JNqhZpc1UPva6PLZF5TUb5bfFj7b0GXTmk4j1PRFKyBT4OF1
cKjFs+Iwm8uoVoJfYBtbaXlS0YrDzaEIrvAxvp63vE2Gj9hOo8EOz7HEGcXJ
3gIJSiXckm1ccoopwpJTwXPFsiBFMcCqCR+WOPwQHSPHrMt7W82jxcJBdoHJ
UNGxSHZXQjbkMvWKD8y2ErZerQR7UhepJDwojcGzoehHF7qbulAPSZHAzEu1
W2ao3qlRh0yUTVre0atbitArOoUtTH9LyDRImWBY9gGlBrMX1upLiQ1SQt9B
ToTdVfbMPfMW+Zp83V41A0MglrN+yJgHNv0SC1jbSrhQKmzu2REu4oCxdVQf
lSBdLgzzVMXUD1h3HMJ7yrguRI4gS6uyOv1qrzNvOqiikcORTdT+owi1e3Hp
4+DjHUU08v6jDoiw7irrWeA9BZEc+lq1VzWb4w8wHWIgNxIM7KiIxym+waar
R1UcMJN7E3uIMbimKy1rICnlqgKAAai4QL4NhJbNtUyWzO28aHyrX8QKjbj8
DgiCOI8n9kyXlYUZ6RXyFcU0Bye7txxN5hS5koxmFV8RElPMQ5EUJ19JleUM
SbKuuE3Gzip/RzVgjKP8SEaB0qIqXyzuSQQyP6zozOS5riD2SvRYmFiwxrgD
P/IxUNvFm4PgH/ej0KmcUG1i8Kslm8mlEEJeKnGIYLBPewFycm4Sz05IJQP9
1umBn+qHj8l+v/KtDiQgeQO8WoWugGBS+hlXeo9GIxmHzu+qZi+SsPrjiSbE
CYFEfPqOXOkJdOBkUbjJ98t3YpH7wJM+HtBwYHsZQz5PX8Og7/Tnf1JHKpQu
Cx+E4y053iPDkMlvYzmLOIbioMi6FEwm83QVQzxAWsUXkPpWvul2ojGvirW/
jCJLIyHok0OnV6pwmYp6Q/lE+fBNsCEjEokNGSJlxlAmnh0tI5ZUyeSbjNa4
RX3Lx7+Qms8H+U4KzfSwfRiIlqtOV//0+blByBS3sVKeuSvWmUqWk2vI1LXx
BEI3N6sizOnjQVVvddBjdV9MMonh2wDsXJc4I2PJtX2NoD2xkAnAfHSoFQCc
MKoSYMdxJFbLPYiniINDrlkX7+2vVBOech6x/iR6tPcRtMildlQk4c2DjbA5
B6E4EAsaNuu+6zQl+gZQixOeuaaSwsYAEsTFCyWblIttOhjMIbxbwq+pZzJK
0gqGjVHYegi49bYeg4g0k55CVyvO/KWl4cEce2XB+0cwkkWaCAOl3o/LxXMO
0ayqtig5CCahbDwCBMze/KxeFjFdxluh1qtQPhHNQ1fFTu012UYhhGh5qDUy
rAUn000SNB+lZYjLWLG24cs92ozgaa0quVKLJWeJO93cj5wGl0Bq76nYYWIP
pOaRtBLkMRarqKuiGQlJp7WixRi9hcKtiMxbiDNxHC0amrPQwn5p0cDjZcH6
6KTtJwR6Qd9gB4Vf+Ex8RKI9gGPUTHXYTc+ucxU0ZjWzqQe7ZNNHDlOgBSMD
uBlOwqwf2UscDDhfcP5x02C3X2tF7X03d7NI25UU9hWKJiq9t1QzSP3bmOl+
OnkxZD6q6gTB+NDyk49i6aLoDCMNRZ2PwmlLiXg0DDT60YSts3pAm2e80yeT
50N1IuJKAViUqxjag2tXSw0TJvhg1UsNEcuYOXSqVEsDnDWFa9fiLFKUMdbe
5it2LKGjypjMFJ4lFoImXJskUUu1SDQkdxv1ytkTCu6BghcUR6UFsJ2g1UjT
RUZ25xqWjZvMRpZYtUOrQTFGypNVnDrHwLkVp4MLbWjJJXg/KEifTtedEWUZ
pBaf4gTq6b189pw8smMI8q49dxSBHh9eU+ob8HgpZSdp/0ZU021tAnmVlcAS
jNnJxWVYweFsMuOOWJbcHGpzEAOl3zKCMOLkVGnMRPsBtb+VB7BUqfhAYObT
l3tPuYif1XHXxcXRN9mc7GbE1SrYAI5Pkysh+ONX05qqiDE7lbc7Kj3qGzoq
1KfyIg4OcJpKSiR6Ov1jn3BiKJ5IAOnEJFBC1RPoQlIqllFOi4V0lnXJtsgN
QWZDWnRV+Zpl3OUpWQsxeKtKA3NJaJ9aXUSznNelYyhRSLPWr2v1zjGLRy7h
juCSG3Z0a3Awd1qoU9f1qnQ9emKZtHeGS2gooRnqX0A1TgJoPI/kk0PVbCJJ
iDn/YK8uXx1Rt0QMl0ihRZvdUAWOEXfV30CFVSIU2trEZyW1ckl0eWvkl6U1
zQKMBP7dU/9alhyxuFgDk7K0lg+kHUAztt/X1KQaKhEla0Ims72DsMdKS1aJ
3Wp/O6HyWY/IhjEVR9AlQCFZgYI6PFmVyrw0RHXlhVxs/fphfoMzpaMgJyHU
aIjJlXplQgeynX7MS9mOlm2029rl+5vR5YbjQMty3StMSjIwWrdpzBeOZCMK
Zmxx5YSUpjE2sI5UqlEisiIQaHgAzxX7vPNB0XbgMwZrmIkIGIk1F8fxx9Zw
L21XlELWjkk3TOEkdEGRa1+Mpl1n8BdAJNUC1EnpwzTpiXDTzK1WxGbNtKBD
X0tUKlirjEOsY+DkUOE47AolNuoVItPe7+81bHYShEaletK3SH154g+Gkgit
uVSEG0KjocIxaooYArWvFZcYsyWy7QXk3yto1+oiyL1ioiEHNLeA96i9yfPI
Gs5oZx1CY2+wkNQS2ZAtodrMDiKwFe1yx+MMJYizNSBPi3koEBcCJ5tMG0Dz
trDYhvUcqLlIQsJJKxTjgPauVosmaaQ9wOYZFUSVjvrOw/6m63th0w5PbJpS
dnQfAoIQD+bkmRhFHYvt94irnNiIf3OusRiO2LdDVlqhe51OoVjAHLA2FAFS
+Y1V42J6ZBD2l7jmtSMmGxLKEGyjfYjUqOez6VhSaRRlDbPY+vcw+NEg11LD
t4pPUtiQwAX7IFyQYSJm2MALHU6IBjEIkAi6wmoe5D6eYhAp+VDJSaRppWSs
jgk05tFDX/b3oS8ZoufZ9yCY0pHmDTl3looe1NWYCvk0xO9177y4UFQuNBiG
E2VYJ1gIBqio85hjHG3YECAq8Q64Fkye0aAZJyX6zDEuKunTVXVeyBUUKsMp
PZkZZSA2ebnTMDtIQwIpRkTrafo+boCFvAAGFBqv5AL/2MvVpU3njKwpOQIf
kJenGp/Za0aWDdDgZjiJ7N6L+ASDRrmLjJyJ6Ce3OIHV1XU300CDVsqnYnGC
e7dhQGHZlGgBUVKFkAvxoqnG5WbkihAhCNpqVDcEcKUAJ84eFUPELpILTw89
9FJv8nc3iFomPTOxxGSwA6+mClwfhsbKZjek5z03h2N/andD3YH69Cp5V9Je
2D8l7kCDjYi3cSwBXD7jVMHdOB6hDHF/y+SNcfR2qr0r03UkUJHCVabG44k9
0llSlzc9HuDKzp9oXEsOwKhzF3QvelhZYivu5WV+zWho+JgQA6dru1wg93R0
vgG7hiOttMP2NJElmicNHxdzysZKSIvLYODE3jp4zW+qrgqoJiIzh6hSwUjk
p/E4ZbGAuQlNlooEuYKmqLSnjihpd74o69mNy3fsYO/ZMI6kJxTinA+oPvK3
KfS/kGiSJKo4lxSNBOX4utsZuIuTwrNeskD37oMYKMLvFakyINms+4/pmSQb
ylX6/Re7shup0B9q9I66bmN6UUqPXW5CU0yAsEH0TubSyKolSxw0FaZVNLpp
wnsDCAbSIp+Uq0Z94YlyEIqUANy10Yb9qJLStSpEbVCq0qi00dsTR0wb5lm3
surcivj6CeSH3IyH8r2jTtEoBOPT6KsOUQch9kXnlughKde5CE7LYf/N9x9F
JuaaOLLNs9ABlOTbg0+dbKy7MkkCHe5HjMSvQmdDIRhVHF7C1BtOUzG73gjm
CAyRtL9sSLM1siBzneUSkuoti3x3doYs3YHVddlN1Wm7p3EyuKWz1ptuZDGX
0gbBIf1e9g1osV/VQCHT3sUUpos9xP1SnnJrVXZopNRNfKbOuMTK+MINE2nF
SbAV5bTasPpe74Za6rTMYpiQVmtjArJ/1Dn0AiJq71jkmNga/IxXuqguDlV7
mkXXG0283OETFyqVUXQclH2kdpDuCoheVmV7fI9UAKAmt+1zIaKUOUoYQZBY
wR76DnVQqRfMeKAIdSJFl5n4mILGEGcqiCMUxIyDE6PA/g7FgVNPAyfR+SAS
AZaK+JRbOQwdmz5/pQ2D+quSGkqpI4IWTIoihf14sVNHIKheNZ1CDeF8VWo6
vN4kRnXmIDEOT2tENF4QykXYSEKzzZ1UWPMNXEbad6SiJ+dyK8kSCGZwfG9R
uVl718brN8JNJlKPnktXB98XxN09TV0mDUmjGFpi+JByaxdc7zTItju7WKey
VVA6j2wUZLOpLCiqqVUTaU8kQOaUL14JsclgNkIdIGYPt6lIX1iU9hTAsXaX
yRMLaXTQoab+2OUQJg3X1pFqVMVNtfKxySwspyDaLSjhp0zBXkC9zZNMj4IQ
FkV69K41Q0tO02ucqqCAS1uU0pyVXFISw7RReYJyPVsTzSNjnFTpd1kILQvq
r9EQi3ABXPBJxTyT+OLYv67vCJ2PQs2d64p5BJWxb+mZs8CRzZqzeLGFbyQF
9v3NJncGjaQaijFfw6FbVhVTHMVdkbO7mTO5V9L2Ct02XTVQyhyqFU+Ar4ii
la38iq+zgj4uqGkQhGNOUmnjCyY1dyKdDxTyJtgocI7wMAXrOd/n+TYjubAu
zflxFKkI+I6xpZA8yHG/+S361tK8ea9RBFKol8r0R+pZH25zkNrFDXsIbant
9ydnvbZMfjBpeeakr9z8oReOrbvowmYT3HlvKQK68DMVrPhkS5YibxL1hdsz
JfHfrHY7SDoTw1Uryb1SDILvxceTsiiuQ712RWOl3I7yVMOQwO1DaNYdZNqB
kG5drLFoqdIBx2v0IrCNbNg8m5E7RxsOHZgiJY1LjTeVK3YhCKnL6roeiPcv
Tr4a7A4BpCXYqCGkzQZYiVyTeg1lLpQe46JGbsG3F8u6nruuhUZ8Ka92Mjht
G9dH4QSgXLPZtTI6yFUCLcC4dMmE0IjWWRhRwtLjwXxu0vxQb4rPhPucgK8R
xe1FKZDuYP4g9wjzu9uuDVh6pmcJxbRoqby3uKi8tM6NiCJ5yp6K4yQPQSe+
8Ckrx4QQwtV90d3j6w9m61D1YfrtoBzW8XUae+dXAaio+Y3qpfjKga5LnI/C
dJWQdM3gwenBBhY35pNPpNlTfAS6hvQYjlHdfPLJftRVWs0ystAfGTcua6/D
TLJMMynT2Bn08jPDneAUU9yNS/34DGcaTu9dKQP+ptUx6mHXWoCuJrppab96
Z0fAm6brxds5kjjmKekTuVjWDnCiQ3sWrpFKXrR8hS/FVLrmhUu5ikQoKVdd
4Nfnz4157TKOu+131aVdr8tGHX4IDOr1u6SflQx4fYNiJiGMXkpwrgCax4Ln
1L9p4AGycdWUNPxxwWp2r8kwvVE0ON7/H4qBTPR4INO+fVV3DvtFf+uRWJ7a
YYhP2RidSTE8aPkj1Ypgx1Q+8ht0ukzqCKOAdZArpBQb1+9HibfkdNfh/Gxf
h7sdfrZn2k268Q+vhcWETzDUmP/Z8EPyU/pj/9/9L3ioOI/8240/8Yen3WUs
VFQ3rpdD+WKDLDyU9OrFAfbofbGU9OHR1u66h4aS/px/xFDJBh+P9x6/6G/w
bbzOZYPs9w4iHSpcJdMb6jzcKTNILpQZbl2VOdfWainnIJ5xvesx8RzjV0FP
WlrSlyNujCHOijcXHVSBxwJwCY0sxJ5YzD/qdh+oIWVcHUk45GO+yKshzy3n
ZjbqggktavevYjFGeR6DvNU7NDX9sbyvr1Lp7rvpSQpP1J5cwGJ6+iv0sif3
nMWLjoH8WZdJfVBPF8S7zR4/DzdZSk0rGIeKSfg6b1ZD5gzv6tPPnj2mXqat
ChIk3DjIcNZa17DTjSyxyK/KesoJ1AuqRgjX0ucyb6IWtentD1G+/5AK+x/G
m/+627vkarWf7d9O3xwd29OD18db9c7/a3TttKPRhXAP6Y/fOTrDiuBWyBlf
4L+r3wAWEUdoSTNXBLYFhy8kTqLp+iQCjHPv32z/scTEmmIhl14nefvo6Xgt
GeEr97ddKM0X3Bc/Pmrzyg+ThlM+3zdaMiy3WZqxPYEx4yt4+1sW0HGXrekZ
vtH+wSfs4Ju9R493Hz8bSklBclsm3r349uTy8Gs7mBx+/Wjy6mS4OUzhu5H4
3p/JxfGjyelbCRt0/h1vmjNpUsECquEABAUmaXS9ADZ6FhBqCflzlKWYrjrJ
JjHcxwE4ewCoux7Z11lzA10HTXQHaH143YD7C8xzXAKe1ADu//ufZTZfNfar
1f/+9wKr9p4Q5Fm2Ks238EogXCP7RUOvHBWzG/7y24zQpP3LapE1BT2LRcxu
7Gt3+5ODC3xZLOy3APqVvylG5hv7uvCO4jZgiDmGeTudFtUNrazF/r+H2nY3
N5xB/Qv9DQD60wRfgj78yWkxq8usMK/cGrYLU39VQEfCQbNfFkC1+G6kf7Pg
OwesfllXa/uqkOXbuPxz4CUsP6vWZXGnt3pT4o3pfNy1gHHmP0mPnEjoEmsi
ZroIEf73H4X+TuaNNxthUTIP/0qRjsvwhwBOV/kV18j2ihqS25m1tpOvIO/i
53wvehf7Yj/kLpNGZqq60xRKeLuf1eEG9o1Lwr3VC51oePbZY9w8XHYXvSsu
1haXapp5ulArdxlPT2p5daX86+g+pWiId+j+9J3khpNBpnlyDEB1txzUGQZ/
A4/76x3Te1x2PdQSWe2JnEnyijr/sIAu10c4Prk7u7UDrZx1BYdFPf3ZhZQ0
fGmD51vfuYWXoh+a3OkyOHW/YH0eWhocax6pURR5TYO3sfeVys7CoGX8Ywd6
1xW7YmYQ/tgA0eRcA9Lx1lzJl3kXXs2LXP/MAm+HbqMlbvpJomnaUsAlcnLv
vWTz+GW9jrNfTdPd1UvnR6mjRUD+IREBDhpDGsac66ITduN6Po9jp/fP8zx8
W0a3Z45UdTfMy9+46O4L4avRlerhdWqfM+Kwpnm5rsCia3aWWEw88xhfin8I
g5tV9JZ5leG5tJgm7ei8kC/kj3jIzfTw9Z3c8x6vqJeX5XosIn74+wx6Fzpf
F01Z8mXRxmwjf6glDNOYV6WEnogTlUxxiqSeShOKNGsS1NLyIxNu4+CrvwiY
Ujl76KmDPyeuYYzfXr46CriGb4/vihLlbmi+/rp7PPYQdJeZdCUfWhzWteeH
uDhBs6yTqoHcqN+d5DC2MHBqJrNyC9CCeLKbu19upHzbXbCvashsv3OzqCIH
EhHjopsV3S8eY8lhRWb7rvp9/xKx9G25vseasWxHKzRp367p6RO9pSPtkaEd
Yqp4MZ5uicjztqKLIoKOjek0CTEnPcGqeAgQqHLRC79ZYO8XfvyqNhlx0eEP
KzhZJZd4xzv/89pJMsb9CNZREemKanQajrPGHlUuipBomkayxR6Eu8L0L5pc
0R2bQuHehfO00oS5u0Zw6cie2IMrPD2yV8Vt6ME/TANkoaSIWazJKJvYnXdP
g2ebbG9SttML3AvPF3PztZYZ/12GwAqS+PqdzLDJBkl0qc8IYkOSuuFNHaY+
phb2BS8z/dsIVCjZ+8MJYDdqwX///o8n46NJ8rdW8P+hrcfdrQOEPThDR3HZ
jNMkslq6N4dOvucwUvWWm7f6Rxz4LztQpkNA6qGs5WvwT03XxwRfkfyFfItz
ADT9yYf+sS/zuT05vvhKQW20dAM8QYveD5EWoGROWocbLT/jbL917MUUWTmk
kU6pCoGTCW+WPi8ai9MmYrc6/Aev63l/tK/A2E03yJaJtn11VPW++sCpn9Eg
x2FbgSAf/PpTev0gz6Pvhv97wCf8nEMMMdYTIsAcLeH7c+mRIw6X6JdbIxaf
w97eOO4alFu+xMkP0YW/bztPmEE02LP1ionwp0bowXNxYXXratLDdXmqBper
BuY+//uW9Tie9HTd84SYZHLucxBD/I/P7YVejdlKb538DTKu9rqOrXXpeqpC
CKfxsyAEeqvxBy9z76Ex4s3P8gBn+ULtXSPhslrPfMC3XXpSTyu6/4RZu5/t
GwqjSJFu18wSg/D8NX5Zea8cuTXXx6xEqiTvPdvP+8KzveEnD0uXVePVctTp
gN99jLuyfepxrUMvXJZLmdWkGyX+iastQ+GTPleQ7DWaZ1YHrc3WYsk5Jx0e
4j+IJ7cJy20wv39CPt/XcguuPV+P23p83oSmAq2FTa91Oz8/l4KWsAauZVXj
OS+BEKQwNeoQvSkuoAw+SNhSe3H+17HcwJLeG0ud89mtlrOQZ6Bscn7e5251
aTXg8Xs3vSsqQbIN2uLKI0zM/wExQP3JtXIAAA==

-->

</rfc>
