<?xml version='1.0' encoding='utf-8'?>
<?xml-model href="rfc7991bis.rnc"?>
<?rfc toc="yes" ?>
<?rfc symrefs="yes" ?>
<?rfc sortrefs="yes" ?>
<?rfc compact="yes"?>
<?rfc subcompact="no" ?>
<?rfc linkmailto="no" ?>
<?rfc editing="no" ?>
<?rfc comments="yes" ?>
<?rfc inline="yes"?>
<?rfc rfcedstyle="yes"?>
<?rfc-ext allow-markup-in-artwork="yes" ?>
<?rfc-ext include-index="no" ?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" xmlns:x="http://purl.org/net/xml2rfc/ext" ipr="trust200902" category="info" docName="draft-ietf-dnsop-zoneversion-04" tocInclude="true" symRefs="true" sortRefs="true" version="3" submissionType="IETF">
  <front>
    <title abbrev="The ZONEVERSION EDNS option">The "ZONEVERSION" EDNS option for the version token of a Resource Record's zone</title>
    <author fullname="Hugo Salgado" initials="H." surname="Salgado">
      <organization>NIC Chile</organization>
      <address>
        <postal>
          <street>Miraflores 222, piso 14</street>
          <city>Santiago</city>
          <code>CP 8320198</code>
          <country>CL</country>
        </postal>
        <phone>+56 2 29407700</phone>
        <email>hsalgado@nic.cl</email>
      </address>
    </author>
    <author fullname="Mauricio Vergara Ereche" initials="M." surname="Vergara">
      <organization>DigitalOcean</organization>
      <address>
        <postal>
          <street>101 6th Ave</street>
          <city>New York</city>
          <code>NY 10013</code>
          <country>US</country>
        </postal>
        <email>mvergara@digitalocean.com</email>
      </address>
    </author>
    <date year="2023"/>
    <area>General</area>
    <workgroup>Internet Engineering Task Force</workgroup>
    <keyword>zoneversion</keyword>
    <abstract>
      <t>The "ZONEVERSION" EDNS option allows a DNS querier to request a DNS authoritative server to
        add an EDNS option in the answer of such query with a token field
        representing the version of the zone which contains the answered Resource Record ("RR"),
        such as the Start Of Authority ("SOA") serial field in zones when this number corresponds to the zone version.</t>

      <t>This "ZONEVERSION" data allows to debug and diagnose problems by helping to recognize the
        data source of an answer in an atomic single DNS query,
        by associating the response with a respective zone version of such domain name.</t>
    </abstract>
  </front>
  
  <middle>
    <section anchor="intro" title="Introduction">
      <t>The "ZONEVERSION" <xref target="RFC6891">EDNS option</xref>
        allows a DNS querier to request to a DNS authoritative server
        to add an EDNS option in the answer of such query
        with a token field representing the version of the zone associated to the answered Resource Record (RR),
        such as the SOA serial field in zones when this number corresponds to the zone version.</t>

      <t>This "ZONEVERSION" data allows to help debug by recognizing the data source of an answer,
        associating this answer with a respective zone version.</t>

      <t>DNS data is of loose coherent nature,
        meaning that a record obtained by a response could be out-of-sync with other authoritative sources of the same data.
        This makes it difficult to debug responses,
        because you'd need to couple an answer with the same version of the zone used to obtain such data.
        Even when in zones where the SOA serial field have the meaning of zone version
        you could use a separate query to ask for the SOA RR of the zone and therefore know its SOA serial,
        but such separate query is performed in a different time and could arrive from another authoritative source
        (for example, in the case the server is anycasted as described in <xref target="RFC4786" section="4.9"/>),
        so it's not directly correlated with the original query.</t>

      <t>This EDNS option is aimed to be used only on authoritative servers for a zone.
        It's intended for hop-to-hop communication (not transitive).</t>

      <t>The ZONEVERSION EDNS extension can have different meaning
        depending on the semantics of the zone maintainer and implementation of nameservers.
        This document defines one possible value,
        when the zone version corresponds to the serial field of the SOA RR of the zone,
        a classic behaviour defined in <xref target="RFC1034" section="4.3.5"/>. </t>

      <t>As of the writing of this document,
        we recognize there are cases where nameservers use different backends for its data sources
        (like relational databases or by using a different off-DNS synchronicity among others) therefore,
        the SOA version field doesn't offer much relevance as a versioning to its content,
        and in those cases the ZONEVERSION EDNS extension SHOULD be extended with a different type and have an opaque value for its data token.</t>

      <section title="Requirements Language">
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
          "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
          document are to be interpreted as described in <xref target="RFC2119"/>.</t>
      </section>
    </section>

    <section anchor="theoption" title="The ZONEVERSION Option">
      <t>The variable part of RDATA in the OPT RR <xref target="RFC6891" section="6.1.2"/>
        for ZONEVERSION is defined as follows:</t>

      <ul>
        <li><t>The OPTION-CODE for the ZONEVERSION option is &lt;TBD&gt;.</t></li>
        <li>The OPTION-LENGTH for the ZONEVERSION option MUST have a value of 0 for queries,
          and MUST have the value of the length in octets for the next OPTION-DATA for responses.</li>
        <li><t>The OPTION-DATA for the ZONEVERSION option is composed of the concatenation of</t>
          <ul>
            <li>An unsigned 1 byte Label Count number (LABELCOUNT)
              indicating the number of labels in the QNAME owner name this answer's zone name refers to</li>
            <li>An unsigned 1 byte type number (TYPE) that distingishes the format and meaning of TYPEDATA</li>
            <li>And the final Data value of the ZONEVERSION field as an opaque bit value (TYPEDATA).</li>
          </ul>
        </li>
      </ul>

      <figure>
        <name>Diagram with the OPTION-DATA format for ZONEVERSION option</name>
        <artset>
          <artwork type="ascii-art" name="zoneversion.txt">
<![CDATA[
                    +0 (MSB)                       +1 (LSB)
       +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
    0: |           LABELCOUNT          |            TYPE               |
       +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
    2: |                           TYPEDATA                            |
       /                                                               /
       +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
]]>
          </artwork>
        </artset>
      </figure>

      <t>The LABELCOUNT number helps to disambiguate the name of the zone that this ZONEVERSION refers to.
        For example if the response is a downward referral
        and the server is authoritative for some portion of the QNAME that differs from a server that is below the zone cut
        and is completely authoritative for a longer match of the labels in the QNAME.
        Also,
        if the ANSWER section has more than one RR set with different zones
        (like a CNAME and a target name in another zone)
        the number of labels in the QNAME disambiguate such situation.</t>

      <t>The value of the LABELCOUNT field MUST NOT count the null (root) label that terminates the QNAME owner name.
        The value of the LABELCOUNT field MUST be less than or equal to the number of labels in the QNAME owner name.
        For example,
        a QNAME "www.example.com." or "a.b.example.com" or "a.b.c.example.com" inside a "example.com." zone,
        that is not delegated not authoritative for those sub-zones in the same nameserver,
        has a LABELCOUNT field value of 2 for all such cases.
        Root zone (".") has a LABELCOUNT field value of 0.</t>

    <t>[RFC Editor: change &lt;TBD&gt; to the proper code when assigned by IANA.]</t>

        <section anchor="optionpresentation" title="The ZONEVERSION Option Presentation Format">
          <t>The presentation format of the RDATA portion is as follows:</t>

          <t>The OPTION-CODE field MUST be represented as the mnemonic value "ZONEVERSION".</t>

          <t>The OPTION-LENGTH field could be omitted in presentation format,
            but if used it MUST be represented as an unsigned decimal integer.</t>

          <t>The LABELCOUNT value of OPTION-DATA field could be omitted in presentation format,
            but if used it MUST be represented as an unsigned decimal integer.
            It's RECOMMENDED to display the zone name that represents this number of labels of the QNAME owner name,
            for a simpler human consumption.</t>

          <t>The TYPE, TYPEDATA values of OPTION-DATA field should be represented following its own format,
            as specified in the corresponding type's specification.</t>

        </section>
    </section>

    <section title="ZONEVERSION Processing">
      <section title="Initiator">
        <t>The EDNS ZONEVERSION option MAY be included on any QUERY,
          by adding a zero-length EDNS ZONEVERSION option to the options
          field of the OPT record when the query is made.</t>
      </section>

      <section title="Responder">
        <t>If an EDNS ZONEVERSION option is sent to a server that is Authoritative for the zone,
          then a name server that understands the ZONEVERSION option and chooses to honor a particular ZONEVERSION request,
          MUST put in the OPTION-DATA a type and value that corresponds to the properly semantic of such type number,
          and corresponds to a zone versioning value of the zone that holds the original QNAME of the reply
          (as per <xref target="RFC8499" section="4"/>).</t>

        <t>Otherwise,
          the answer MUST NOT add an EDNS ZONEVERSION option to the response.</t>

        <t>In case of a downward referral response,
          even when the Authoritative Answer bit is not set,
          this specification considers that the Answer  holds data that is authoritative for some portion of the QNAME
          (see "Referrals" in <xref target="RFC8499" section="4"/>).
          Given this,
          a ZONEVERSION option MUST be present as indicated in the paragraph above,
          with the zone versioning value that holds that portion of the QNAME where it is completely authoritative.</t>

      </section>
    </section>

    <section title="Type Definition for SOA-SERIAL">
      <t>The first and only ZONEVERSION type defined in this document for the ZONEVERSION Option has the TYPE of 0,
        and its corresponding TYPEDATA MUST be a copy of the unsigned 32 bit version number
        as defined in the SERIAL field of the "SOA RDATA Format" in <xref target="RFC1035" section="3.3.13"/>.</t>

      <t>The mnemonic of this type is SOA-SERIAL.</t>

      <t>The OPTION-LENGTH for this ZONEVERSION type MUST have a value of 6 for responses.</t>

      <t>Note that in the case of a SERVFAIL RCODE the responder MAY include the ZONEVERSION EDNS Option
        if the QNAME still belongs to an authoritative zone of the server,
        in which case that value MUST be the one included in the answer.</t>

      <t>Note that a NODATA response code as defined in <xref target="RFC8499" section="3"/>
        MUST also include the ZONEVERSION answer even when there's no ANSWER data for the QNAME,
        since the RCODE is NOERROR.</t>

        <section anchor="typepresentation" title="Type SOA-SERIAL Presentation Format">
          <t>The presentation format of this type content is as follows:</t>
          <t>The TYPE field MUST be represented as the mnemonic value "SOA-SERIAL".</t>
          <t>The TYPEDATA field MUST be represented as an unsigned decimal integer.</t>
        </section>
    </section>

    <section anchor="usage" title="Example usage">
      <t>A zone which utilizes the serial field of the SOA RR as a number of the zone version release,
        should answer a ZONEVERSION request with an EDNS option code ZONEVERSION,
        an OPTION-LENGTH with value 6,
        and an OPTION-DATA with a 1-byte LABELCOUNT with the number of labels that corresponds to the zone apex name,
        a 1-byte TYPE with value 0,
        and a copy of the unsigned 32 bit version number of the SERIAL field of its SOA zone Resource Record.</t>

      <t>An example of a proper diagnostic tool that implements ZONEVERSION EDNS extension towards a compliant authoritative DNS server could be:</t>
        <figure>
          <name>Example usage and dig output</name>
          <artwork>
<![CDATA[
  $ dig @ns.example.com www.example.com aaaa +zoneversion

  ; <<>> DiG 9.17.14-patched <<>> @ns.example.com www.example.com aaaa +zoneversion
  ; (1 server found)
  ;; global options: +cmd
  ;; Got answer:
  ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 7077
  ;; flags: qr aa; QUERY: 1, ANSWER: 1, AUTHORITY: 1, ADDITIONAL: 2

  ;; OPT PSEUDOSECTION:
  ; EDNS: version: 0, flags:; udp: 1232
  ; ZONEVERSION: 02 00 00 04 78 95 a4 e9 ("SOA-SERIAL: 2023073001 (example.com.)")
  ;; QUESTION SECTION:
  ;www.example.com.    IN  AAAA

  ;; ANSWER SECTION:
  www.example.com.  43200  IN  AAAA  2001:db8::80

  ;; AUTHORITY SECTION:
  example.com.    43200  IN  NS  ns.example.com.

  ;; ADDITIONAL SECTION:
  ns.example.com.    43200  IN  AAAA  2001:db8::53

  ;; Query time: 15 msec
  ;; SERVER: 2001:db8::53#53(2001:db8::53) (UDP)
  ;; WHEN: dom jul 30 19:51:04 -04 2023
  ;; MSG SIZE  rcvd: 129
]]>
          </artwork>
        </figure>
    </section>

    <section anchor="Acknowledgements" title="Acknowledgements">
      <t>The authors thanks all the comments and support made in the DNSOP mailing list,
        chats and discussions.
        In special for the suggestions to generalize the option using a registry of types from
        <contact fullname="Petr Špaček" asciiFullname="Petr Spacek"/> and Florian Obser,
        suggestions for implementation from
        <contact fullname="Stéphane Bortzmeyer" asciiFullname="Stephane Bortzmeyer"/>,
        security clarifications from George Michaelson,
        zone name disambiguation from Joe Abley and Brian Dickson,
        and reviews from Tim Wicinski and Peter Thomassen.</t>
    </section>

    <section anchor="IANA" title="IANA Considerations">
      <section title="DNS EDNS0 Option Code Registration">
        <t>This document defines a new EDNS0 option,
          entitled "ZONEVERSION" (see <xref target="theoption"/>),
          and assigns a value of &lt;TBD&gt; from the DNS EDNS0 Option Codes (OPT) Option space:</t>

        <table>
		  <name>DNS EDNS0 Option code</name>
          <thead>
            <tr><th>Value</th><th>Name</th><th>Status</th><th>Reference</th></tr>
          </thead>
          <tbody>
            <tr><th>&lt;TBD&gt;</th><th>ZONEVERSION</th><th>Standard</th><th>[this document]</th></tr>
          </tbody>
        </table>

        <t>[RFC Editor: change &lt;TBD&gt; to the proper code when assigned by IANA.]</t>
        <t>[RFC Editor: change "this document" with the proper RFC number for this document when assigned by IANA.]</t>
      </section>

      <section title="ZONEVERSION Registry">
        <t>The ZONEVERSION EDNS Option also defines a 8-bit TYPE field,
          for which IANA is requested to create and maintain a new registry entitled
          "DNS EDNS0 ZONEVERSION TYPE Values" (abbreviation "ZONEVERSION") used by the ZONEVERSION Option,
          inside the "Domain Name System (DNS) Parameters" group.
          Initial values for the DNS EDNS0 ZONEVERSION TYPE values registry are given below;
          future assignments in the 1-245 values are to be made through Specification Required Review <xref target="BCP26"/>.
          Assignments consist of a TYPE value as an unsigned 8-bit integer recorded in decimal,
          a Mnemonic name as an uppercase ASCII string with maximum length of 15 characters,
          and the required document reference.</t>

        <table>
		  <name>ZONEVERSION Registry</name>
          <thead>
            <tr><th>ZONEVERSION TYPE</th><th>Mnemonic</th><th>Reference</th></tr>
          </thead>
          <tbody>
            <tr><th>0</th><th>SOA-SERIAL</th><th>[this document]</th></tr>
            <tr><th>1-245</th><th>Unassigned</th><th></th></tr>
            <tr><th>246-254</th><th>Reserved for Local/Experimental Use</th><th>[this document]</th></tr>
            <tr><th>255</th><th>Reserved for future expansion</th><th>[this document]</th></tr>
          </tbody>
        </table>

        <t>[RFC Editor: change "this document" with the proper RFC number for this document when assigned by IANA.]</t>

        <t>The change control for this registry should be by means of an Standard action.</t>

        <section title="Expert Review Directives">
          <t>Allocation procedures for new code points in the ZONEVERSION TYPE registry require Specification Required review,
            and so it requires Expert Reviews as stated in <xref target="BCP26"/>.</t>

          <t>The expert should consider the following points:</t>
            <ul>
              <li>Duplication of code point allocations should be avoided.</li>
              <li>A Presentation Format section should be provided,
                with a clear code point mnemonic.</li>
              <li>The referenced document and stated use of the new code point should be appropriate for the intended use of a ZONEVERSION TYPE assignment.
                In particular the reference should state clear instructions for implementers about the syntax and semantic of the data.
                Also the Length of the Data must have proper limits.</li>
            </ul>

          <t>The expert reviewing the request MUST approve or disapprove the request within 10 business days from when she or he received the expert review request.</t>
        </section>
      </section>
    </section>

    <section anchor="Security" title="Security Considerations">
      <t>The EDNS extension data it's not covered by RRSIG records,
        so there's no way to verify its authenticity nor integrity using DNSSEC
        and could theoretically be tampered by a person-in-the-middle if the transport is made by insecure means.
        Caution should be taken to use the EDNS ZONEVERSION data for any means besides troubleshooting and debugging.</t>

      <t>If there's a need to certify the ZONEVERSION trustworthiness,
        it will be necessary to use an encrypted and authenticated DNS transport. </t>

      <t>If there's a need to authenticate data origin for the ZONEVERSION value,
        an answer with the SOA-SERIAL type as defined above could be compared to a separate regular SOA query with DO flag,
        whose answer shall be DNSSEC signed,
        with the cautions about Anycast and others as already stated in <xref target="intro" format="title"/>.</t>

      <t>With the SOA-SERIAL type defined above, there's no risk on disclosure of private information,
        as the SERIAL of the SOA record is already publicly available.</t>

      <t>Please note that the ZONEVERSION option can not be used for checking the correctness of an entire zone in a server.
        For such cases,
        the <xref target="RFC8976">ZONEMD record</xref> might be better suited at such task.
        ZONEVERSION can help identify and correlate a certain specific answer with a version of a zone,
        but it has no special integrity or verification function besides a normal field value inside a zone,
        as stated above.</t>
    </section>
  </middle>

  <back>
    <references title="Normative References">
      <reference anchor="RFC1034" target="https://www.rfc-editor.org/info/rfc1034" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.1034.xml">
        <front>
          <title>Domain names - concepts and facilities</title>
          <author initials="P.V." surname="Mockapetris" fullname="P.V. Mockapetris">
            <organization/>
          </author>
          <date year="1987" month="November"/>
          <abstract>
            <t>This RFC is the revised basic definition of The Domain Name System. It obsoletes RFC-882. This memo describes the domain style names and their used for host address look up and electronic mail forwarding. It discusses the clients and servers in the domain name system and the protocol used between them.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="13"/>
        <seriesInfo name="RFC" value="1034"/>
        <seriesInfo name="DOI" value="10.17487/RFC1034"/>
      </reference>
      <reference anchor="RFC1035" target="https://www.rfc-editor.org/info/rfc1035" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.1035.xml">
        <front>
          <title>Domain names - implementation and specification</title>
          <author initials="P.V." surname="Mockapetris" fullname="P.V. Mockapetris">
            <organization/>
          </author>
          <date year="1987" month="November"/>
          <abstract>
            <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System.  It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="13"/>
        <seriesInfo name="RFC" value="1035"/>
        <seriesInfo name="DOI" value="10.17487/RFC1035"/>
      </reference>
      <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author initials="S." surname="Bradner" fullname="S. Bradner">
            <organization/>
          </author>
          <date year="1997" month="March"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC6891" target="https://www.rfc-editor.org/info/rfc6891" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.6891.xml">
        <front>
          <title>Extension Mechanisms for DNS (EDNS(0))</title>
          <author initials="J." surname="Damas" fullname="J. Damas">
            <organization/>
          </author>
          <author initials="M." surname="Graff" fullname="M. Graff">
            <organization/>
          </author>
          <author initials="P." surname="Vixie" fullname="P. Vixie">
            <organization/>
          </author>
          <date year="2013" month="April"/>
          <abstract>
            <t>The Domain Name System's wire protocol includes a number of fixed fields whose range has been or soon will be exhausted and does not allow requestors to advertise their capabilities to responders.  This document describes backward-compatible mechanisms for allowing the protocol to grow.</t>
            <t>This document updates the Extension Mechanisms for DNS (EDNS(0)) specification (and obsoletes RFC 2671) based on feedback from deployment experience in several implementations.  It also obsoletes RFC 2673 ("Binary Labels in the Domain Name System") and adds considerations on the use of extended labels in the DNS.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="75"/>
        <seriesInfo name="RFC" value="6891"/>
        <seriesInfo name="DOI" value="10.17487/RFC6891"/>
      </reference>
    <reference anchor="BCP26" target="https://www.rfc-editor.org/info/rfc8126">
      <front>
        <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
        <author initials="M." surname="Cotton" fullname="M. Cotton">
          <organization/>
        </author>
        <author initials="B." surname="Leiba" fullname="B. Leiba">
          <organization/>
        </author>
        <author initials="T." surname="Narten" fullname="T. Narten">
          <organization/>
        </author>
        <date year="2017" month="June"/>
        <abstract>
          <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
          <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
          <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
        </abstract>
      </front>
      <seriesInfo name="BCP" value="26"/>
      <seriesInfo name="RFC" value="8126"/>
      <seriesInfo name="DOI" value="10.17487/RFC8126"/>
    </reference>
    </references>
    <references title="Informative References">
      <reference anchor="RFC4786" target="https://www.rfc-editor.org/info/rfc4786" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.4786.xml">
        <front>
          <title>Operation of Anycast Services</title>
          <author initials="J." surname="Abley" fullname="J. Abley">
            <organization/>
          </author>
          <author initials="K." surname="Lindqvist" fullname="K. Lindqvist">
            <organization/>
          </author>
          <date year="2006" month="December"/>
          <abstract>
            <t>As the Internet has grown, and as systems and networked services within enterprises have become more pervasive, many services with high availability requirements have emerged.  These requirements have increased the demands on the reliability of the infrastructure on which those services rely.</t>
            <t>Various techniques have been employed to increase the availability of services deployed on the Internet.  This document presents commentary and recommendations for distribution of services using anycast.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="126"/>
        <seriesInfo name="RFC" value="4786"/>
        <seriesInfo name="DOI" value="10.17487/RFC4786"/>
      </reference>
      <reference anchor="RFC8499" target="https://www.rfc-editor.org/info/rfc8499" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8499.xml">
        <front>
          <title>DNS Terminology</title>
          <author initials="P." surname="Hoffman" fullname="P. Hoffman">
            <organization/>
          </author>
          <author initials="A." surname="Sullivan" fullname="A. Sullivan">
            <organization/>
          </author>
          <author initials="K." surname="Fujiwara" fullname="K. Fujiwara">
            <organization/>
          </author>
          <date year="2019" month="January"/>
          <abstract>
            <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs.  The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has sometimes changed in the decades since the DNS was first defined.  This document gives current definitions for many of the terms used in the DNS in a single document.</t>
            <t>This document obsoletes RFC 7719 and updates RFC 2308.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="219"/>
        <seriesInfo name="RFC" value="8499"/>
        <seriesInfo name="DOI" value="10.17487/RFC8499"/>
      </reference>
      <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8976.xml"/>
      <reference anchor="ImplRef" target="https://github.com/huguei/rrserial">
          <front>
            <title>Zoneversion Implementations</title>
            <author fullname="Hugo Salgado" initials="H." surname="Salgado">
              <organization/>
            </author>
            <date year="2023"/>
          </front>
        </reference>
    </references>
    <section anchor="implementationcons" title="Implementation Considerations">
      <t>With very few
exceptions, EDNS options which elicit an EDNS option in the response
are independent of the QNAME. This is not the case of ZONEVERSION, so
its implementation may be more or less difficult depending on how EDNS
options are handled in the name server.
      </t>
    </section>
    <section anchor="implementation" title="Implementation References">
      <t>There's a patched NSD server version 4.7.0 with support for ZONEVERSION with an experimental opcode,
      with live test servers installed for compliance tests. Also there is a client command "dig" with added zoneversion support, along with test libraries in Perl, Python and Go. More information in the working document <xref target="ImplRef"/>.</t>

    </section>
    <!-- Change Log

v04 2023-08-03  MV   Clarification on LABELCOUNT, typos and formatting.
v04 2023-08-03  HS   Changed name of FLAG fields, removed flag length, typos and minor edits.
v03 2023-07-30  HS   Added a label number for zone name disambiguation, typos and minor edits.
v02 2022-04-21  HS   Upgraded from RRSERIAL to ZONEVERSION, to be versioning-agnostic.
v01 2022-04-06  HS   No changes, just for revive it after it expired
v00 2021-06-11  HS   No changes, just new filename as requested by DNSOP chairs for WG adoption
v01 2021-06-01  HS   Substantial changes and enhancements from DNSOP discussion
v00 2021-05-07  HS   New filename as requested by WG chair, to call for adoption
v01 2020-01-27  HS   No changes, just to avoid expiration
v00 2017-04-27  HS   Initial version

-->

</back>
</rfc>
