<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 2.6.10) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-dnssd-multi-qtypes-07" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.25.0 -->
  <front>
    <title>DNS Multiple QTYPEs</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-dnssd-multi-qtypes-07"/>
    <author initials="R." surname="Bellis" fullname="Ray Bellis">
      <organization abbrev="ISC">Internet Systems Consortium, Inc.</organization>
      <address>
        <postal>
          <street>PO Box 360</street>
          <city>Newmarket</city>
          <code>NH 03857</code>
          <country>USA</country>
        </postal>
        <phone>+1 650 423 1300</phone>
        <email>ray@isc.org</email>
      </address>
    </author>
    <date year="2025" month="March" day="21"/>
    <area>Internet</area>
    <workgroup>DNSSD</workgroup>
    <keyword>DNS</keyword>
    <keyword>resource record</keyword>
    <abstract>
      <?line 35?>

<t>This document specifies a method for a DNS client to request additional
DNS record types to be delivered alongside the primary record type
specified in the question section of a DNS QUERY (OpCode=0).</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://dnssd-wg.github.io/draft-ietf-dnssd-multi-qtypes/draft-ietf-dnssd-multi-qtypes.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-dnssd-multi-qtypes/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        DNSSD Working Group mailing list (<eref target="mailto:dnssd@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/dnssd/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/dnssd/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/dnssd-wg/draft-ietf-dnssd-multi-qtypes"/>.</t>
    </note>
  </front>
  <middle>
    <?line 41?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>A commonly requested DNS <xref target="RFC1035"/> feature is the ability to receive
multiple related resource records (RRs) in a single DNS response.</t>
      <t>For example, it may be desirable to receive the A, AAAA and HTTPS
records for a domain name together, rather than having to issue
multiple queries.</t>
      <t>The DNS wire protocol in theory supported having multiple questions in a
single packet, but in practise this does not work.  In <xref target="RFC9619"/>,
<xref target="RFC1035"/> is updated to only permit a single question in a QUERY
(OpCode=0) request.</t>
      <t>Sending QTYPE=ANY does not guarantee that all RRsets will be returned.
<xref target="RFC8482"/> specifies that responders may return a single RRset of
their choosing.</t>
      <t>This document provides a solution for those cases where only the QTYPE
varies by specifying a new option for the Extension Mechanisms for DNS
(EDNS <xref target="RFC6891"/>) that contains an additional list of QTYPE values
that the client wishes to receive in addition to the single QTYPE
appearing in the question section.  A different EDNS option is used in
response packets as protection against DNS middleboxes that echo EDNS
options verbatim.</t>
      <t>The specification described herein is applicable both for queries from a
stub resolver to recursive servers, and from recursive resolvers to
authoritative servers. It does not apply to Multicast DNS queries
<xref target="RFC6762"/>, which are already designed to allow requesting multiple
records in a single query.</t>
    </section>
    <section anchor="terminology-used-in-this-document">
      <name>Terminology used in this document</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="description">
      <name>Description</name>
      <section anchor="multiple-qtype-edns-options-format">
        <name>Multiple QTYPE EDNS Options Format</name>
        <t>The overall format of an EDNS option is shown for reference below,
per <xref target="RFC6891"/>, followed by the option specific data:</t>
        <artwork><![CDATA[
   +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
0: |                          OPTION-CODE                          |
   +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
2: |                         OPTION-LENGTH                         |
   +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
4: |                                                               |
   /                          OPTION-DATA                          /
   /                                                               /
   +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
]]></artwork>
        <t>OPTION-CODE: MQTYPE-Query (TBD1) in queries and MQTYPE-Response (TBD2) in responses.</t>
        <t>OPTION-LENGTH: Size (in octets) of OPTION-DATA.</t>
        <t>OPTION-DATA: Option specific, as below:</t>
        <artwork><![CDATA[
                +0 (MSB)                            +1 (LSB)
   +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
0: |           QT1 (MSB)           |           QT1 (LSB)           |
   +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
2: /              ...              |              ...              /
   +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
   /           QTn (MSB)           |           QTn (LSB)           |
   +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
]]></artwork>
        <t>QT: a (potentially empty) list of 2 byte fields (QTx) in network order
(MSB first) each specifying a DNS RRTYPE that must be for a data RRTYPE
as described in Section 3.1 of <xref target="RFC6895"/>.</t>
      </section>
      <section anchor="server-handling">
        <name>Server Handling</name>
        <section anchor="request-parsing">
          <name>Request Parsing</name>
          <t>If MQTYPE-Query is received in any inbound DNS message with an OpCode
other than QUERY (0) the server <bcp14>MUST</bcp14> return a FORMERR response.</t>
          <t>A server that receives an MQTYPE-Response option in any inbound DNS
message <bcp14>MUST</bcp14> return a FORMERR response.</t>
          <t>A server that receives more than one MQTYPE-Query option in a query <bcp14>MUST</bcp14>
return a FORMERR response.</t>
          <t>If an MQTYPE-Query option is received in a query that contains no primary
question (i.e. QDCOUNT=0) the server <bcp14>MUST</bcp14> return a FORMERR response.</t>
          <t>If an MQTYPE-Query option is received in a query where the primary question
is a non-data RRTYPE (e.g. ANY, AXFR, etc.) the server <bcp14>MUST</bcp14> return a FORMERR
response.</t>
          <t>If any invalid QTx is received in the query (e.g. one corresponding to a
Meta RRTYPE) the server <bcp14>MUST</bcp14> return a FORMERR response.</t>
          <t>If any duplicate QTx (or one duplicating the primary QTYPE field) is
contained in a query the server <bcp14>MUST</bcp14> return a FORMERR response.</t>
        </section>
        <section anchor="response-generation">
          <name>Response Generation</name>
          <t>A conforming server that receives an MQTYPE-Query option in a query <bcp14>MUST</bcp14>
return an MQTYPE-Response option in its response, even if that response
is truncated (TC=1).</t>
          <t>The server <bcp14>MUST</bcp14> first start constructing a response for the primary
(QNAME, QCLASS, QTYPE) tuple specified in the Question section per
the existing DNS sections.  The RCODE and all other flags (e.g. AA,
AD, etc) <bcp14>MUST</bcp14> be determined at this time.</t>
          <t>If this initial response results in truncation (TC=1) then the
additional queries specified in the MQTYPE-Query option <bcp14>MUST NOT</bcp14> be
processed.</t>
          <t>After the initial response is prepared, the server <bcp14>MUST</bcp14> attempt to
combine the responses for individual (QNAME, QCLASS, QTx) combinations
into the response for the first query.  If a recursive server does
not yet have those responses available it <bcp14>MUST</bcp14> first make appropriate
outbound queries to populate its caches.</t>
          <t>For each individual combination the server <bcp14>MUST</bcp14> evaluate the resulting
RCODE and other flags and check that they all match the values generated
from the primary query.</t>
          <t>If any mismatch is detected the mismatching additional response <bcp14>MUST NOT</bcp14>
be included in the final combined response and its QTx value <bcp14>MUST NOT</bcp14> be
included in the MQTYPE-Response option's list.  This might happen, for example,
if the primary query resulted in a NOERROR response but a QTx query
resulted in a SERVFAIL, or if the primary response has AA=0 but a QTx
response has AA=1, such as might happen if the NS and DS records were
both requested at the parent side of a zone cut.</t>
          <t>The server <bcp14>MUST</bcp14> attempt to combine the remaining individual RRs into the
same sections in which they would have appeared in a standalone query,
i.e.  as if each combination had been "the question" per section 4.1 of
<xref target="RFC1035"/>.</t>
          <t>The server <bcp14>MUST</bcp14> detect duplicate RRs and keep only a single copy of each
RR in its respective section.  Duplicates can occur e.g. in the Answer
section if a CNAME chain is involved, or in the Authority section if
multiple QTYPEs don't exist, etc.  Note that RRs can be legitimately
duplicated in different sections, e.g. for the (SOA, TYPE12345)
combination on apex where TYPE12345 is not present.</t>
          <t>Handling of an MQTYE-Request option <bcp14>MUST NOT</bcp14> itself trigger a truncated
response.  If message size (or other) limits do not allow all of the
data obtained by querying for an additional QTx to be included in the
final response in their entireity (i.e. as complete RRsets) then the
server <bcp14>MUST NOT</bcp14> include the respective QTx in the MQTYPE-Response
option's list and <bcp14>MAY</bcp14> stop processing further QTx combinations.</t>
          <t>If all RRs for a single QTx combination fit into the message then the
server <bcp14>MUST</bcp14> include the respective QTx in the MQTYPE-Response option's list
to indicate that the given query type was completely processed.</t>
        </section>
      </section>
      <section anchor="client-response-processing">
        <name>Client Response Processing</name>
        <t>Recursive resolvers <bcp14>MAY</bcp14> use this method to obtain multiple records from
an authoritative server.  For the purposes of Section 5.4.1 of
<xref target="RFC2181"/> any authoritative answers received <bcp14>MUST</bcp14> be ranked the same
as the answer for the primary question.</t>
        <t>If the response to a query containing an MQTYPE-Query option does not
contain an MQTYPE-Response option, or if it erroneously contains an
MQTYPE-Query option, the client <bcp14>MUST</bcp14> treat the response as if this
option is unsupported by the server and <bcp14>SHOULD</bcp14> process the response as
if the MQTYPE-Query option had not been used.</t>
        <t>If the MQTYPE-Response option is present more than once or if a QTx
value is duplicated (or duplicates the primary QTYPE field) the client
<bcp14>MUST</bcp14> treat the answer as invalid (equivalent to FORMERR)</t>
        <t>The Question section and the list of types present in the
MQTYPE-Response option indicates the list of (QNAME, QCLASS, qtypes)
combinations which are completely contained within the received
response.  The answers to all query combinations share the same RCODE
and all other flags.</t>
        <t>All RRs required by existing DNS specifications are expected to be
present in the respective sections of the DNS message, including proofs
of nonexistence where required. The client <bcp14>MUST NOT</bcp14> rely on any
particular order of RRs in the message sections.</t>
        <t>Clients <bcp14>MUST</bcp14> take into account that individual RRs might originate from
different DNS zones and that proofs of non-existence might have been
produced by different signers.</t>
        <t>Absence of QTx values which were requested by client but are not present
in MQTYPE-Response option indicates that:</t>
        <ul spacing="normal">
          <li>
            <t>the server was unwilling to process the request (e.g. because a limit
was exceeded), and/or</t>
          </li>
          <li>
            <t>the individual responses could not be combined into one message
because of RCODE or other flag mismatches, and/or</t>
          </li>
          <li>
            <t>the message size limit would be exceeded</t>
          </li>
        </ul>
        <t>The client <bcp14>SHOULD</bcp14> subsequently initiate standalone queries (e.g. without
using the MQTYPE-Query option) for any QTx value which was requested but
is missing in the response.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The method documented here does not change any of the security
properties of the DNS protocol itself.</t>
      <t>It should however be noted that this method does increase the potential
amplification factor when the DNS protocol is used as a vector for a
denial of service attack.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>NB: to be rewritten once assignments have been made.</t>
      <t>IANA is requested to assign two new values (TBD1 and TBD2) in the DNS
EDNS0 Option Codes registry for MQTYPE-Query and MQTYPE-Response.  They
should be consecutive, with the -Query option being an even number.</t>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>The author wishes to thank the following for their feedback and reviews
during the initial development of this document: Michael Graff, Olafur
Gudmundsson, Matthijs Mekking, and Paul Vixie.</t>
      <t>In addition the author wishes to thank the following for subsequent
review during discussion in the DNSSD Working Group: Chris Box, Stuart
Cheshire, Esko Dijk, Ted Lemon, David Schinazi and Petr Spacek.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC1035">
          <front>
            <title>Domain names - implementation and specification</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1035"/>
          <seriesInfo name="DOI" value="10.17487/RFC1035"/>
        </reference>
        <reference anchor="RFC9619">
          <front>
            <title>In the DNS, QDCOUNT Is (Usually) One</title>
            <author fullname="R. Bellis" initials="R." surname="Bellis"/>
            <author fullname="J. Abley" initials="J." surname="Abley"/>
            <date month="July" year="2024"/>
            <abstract>
              <t>This document updates RFC 1035 by constraining the allowed value of the QDCOUNT parameter in DNS messages with OPCODE = 0 (QUERY) to a maximum of one, and it specifies the required behavior when values that are not allowed are encountered.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9619"/>
          <seriesInfo name="DOI" value="10.17487/RFC9619"/>
        </reference>
        <reference anchor="RFC6891">
          <front>
            <title>Extension Mechanisms for DNS (EDNS(0))</title>
            <author fullname="J. Damas" initials="J." surname="Damas"/>
            <author fullname="M. Graff" initials="M." surname="Graff"/>
            <author fullname="P. Vixie" initials="P." surname="Vixie"/>
            <date month="April" year="2013"/>
            <abstract>
              <t>The Domain Name System's wire protocol includes a number of fixed fields whose range has been or soon will be exhausted and does not allow requestors to advertise their capabilities to responders. This document describes backward-compatible mechanisms for allowing the protocol to grow.</t>
              <t>This document updates the Extension Mechanisms for DNS (EDNS(0)) specification (and obsoletes RFC 2671) based on feedback from deployment experience in several implementations. It also obsoletes RFC 2673 ("Binary Labels in the Domain Name System") and adds considerations on the use of extended labels in the DNS.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="75"/>
          <seriesInfo name="RFC" value="6891"/>
          <seriesInfo name="DOI" value="10.17487/RFC6891"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC6895">
          <front>
            <title>Domain Name System (DNS) IANA Considerations</title>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
            <date month="April" year="2013"/>
            <abstract>
              <t>This document specifies Internet Assigned Numbers Authority (IANA) parameter assignment considerations for the allocation of Domain Name System (DNS) resource record types, CLASSes, operation codes, error codes, DNS protocol message header bits, and AFSDB resource record subtypes. It obsoletes RFC 6195 and updates RFCs 1183, 2845, 2930, and 3597.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="42"/>
          <seriesInfo name="RFC" value="6895"/>
          <seriesInfo name="DOI" value="10.17487/RFC6895"/>
        </reference>
        <reference anchor="RFC2181">
          <front>
            <title>Clarifications to the DNS Specification</title>
            <author fullname="R. Elz" initials="R." surname="Elz"/>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <date month="July" year="1997"/>
            <abstract>
              <t>This document considers some areas that have been identified as problems with the specification of the Domain Name System, and proposes remedies for the defects identified. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2181"/>
          <seriesInfo name="DOI" value="10.17487/RFC2181"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8482">
          <front>
            <title>Providing Minimal-Sized Responses to DNS Queries That Have QTYPE=ANY</title>
            <author fullname="J. Abley" initials="J." surname="Abley"/>
            <author fullname="O. Gudmundsson" initials="O." surname="Gudmundsson"/>
            <author fullname="M. Majkowski" initials="M." surname="Majkowski"/>
            <author fullname="E. Hunt" initials="E." surname="Hunt"/>
            <date month="January" year="2019"/>
            <abstract>
              <t>The Domain Name System (DNS) specifies a query type (QTYPE) "ANY". The operator of an authoritative DNS server might choose not to respond to such queries for reasons of local policy, motivated by security, performance, or other reasons.</t>
              <t>The DNS specification does not include specific guidance for the behavior of DNS servers or clients in this situation. This document aims to provide such guidance.</t>
              <t>This document updates RFCs 1034 and 1035.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8482"/>
          <seriesInfo name="DOI" value="10.17487/RFC8482"/>
        </reference>
        <reference anchor="RFC6762">
          <front>
            <title>Multicast DNS</title>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <author fullname="M. Krochmal" initials="M." surname="Krochmal"/>
            <date month="February" year="2013"/>
            <abstract>
              <t>As networked devices become smaller, more portable, and more ubiquitous, the ability to operate with less configured infrastructure is increasingly important. In particular, the ability to look up DNS resource record data types (including, but not limited to, host names) in the absence of a conventional managed DNS server is useful.</t>
              <t>Multicast DNS (mDNS) provides the ability to perform DNS-like operations on the local link in the absence of any conventional Unicast DNS server. In addition, Multicast DNS designates a portion of the DNS namespace to be free for local use, without the need to pay any annual fee, and without the need to set up delegations or otherwise configure a conventional DNS server to answer for those names.</t>
              <t>The primary benefits of Multicast DNS names are that (i) they require little or no administration or configuration to set them up, (ii) they work when no infrastructure is present, and (iii) they work during infrastructure failures.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6762"/>
          <seriesInfo name="DOI" value="10.17487/RFC6762"/>
        </reference>
      </references>
    </references>
    <?line 290?>

<section anchor="examples">
      <name> Examples</name>
      <t>The examples below are shown as might be reported by the ISC Dig utility.
For the purposes of brevity irrelevant content is omitted.</t>
      <section anchor="stub-query-for-a-with-mqtype-request-for-aaaa-https">
        <name>Stub query for A with MQType-Request for AAAA + HTTPS</name>
        <t>In this example a stub resolver has requested the A record for
www.example.com, along with an MQTYPE-Request option requesting AAAA and
HTTPS records.  The stub resolver has also set the DO bit, indicating
DNSSEC support.</t>
        <t>The presence of the HTTPS QTYPE in the MQTYPE-Response option of the response
coupled with its absence from the answer section indicates that the
recursive server currently holds no data for this QTYPE.  The corresponding
type fields in the NSEC3 record further provide a cryptographic proof of
non-existence for the HTTPS QTYPE and the SOA record also indicates a
"negative answer".</t>
        <figure anchor="figaaaahttps">
          <name>A + AAAA + HTTPS</name>
          <artwork><![CDATA[
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 11111
;; flags: qr rd ra ad
;; QUERY: 1, ANSWER: 4, AUTHORITY: 4, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags: do; udp: 1232
; MQTYPE-Response: AAAA HTTPS

;; QUESTION SECTION:
;www.example.com.         IN  A

;; ANSWER SECTION:
www.example.com.    2849  IN  A       192.0.2.1
www.example.com.    2849  IN  RRSIG   A [...]
www.example.com.    3552  IN  AAAA    3fff::1234
www.example.com.    3552  IN  RRSIG   AAAA [...]

;; AUTHORITY SECTION:
example.com.        2830  IN  SOA     ns.example.com. [...]
example.com.        2830  IN  RRSIG   SOA 13 2 [...]
[...].example.com.  2830  IN  NSEC3   [...] A TXT AAAA RRSIG
[...].example.com.  2830  IN  RRSIG   NSEC3 [...]
]]></artwork>
        </figure>
      </section>
      <section anchor="stub-query-for-ds-with-mqtype-request-for-dnskey">
        <name>Stub query for DS with MQType-Request for DNSKEY</name>
        <t>In this similar example, the primary QTYPE is for DS and the MQTYPE-Request
field only contains DNSKEY.</t>
        <t>Both the DS and DNSKEY records are returned, along with their corresponding
RRSIG records.</t>
        <figure anchor="figdsdnskey">
          <name>Stub DS + DNSKEY</name>
          <artwork><![CDATA[
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 33333
;; flags: qr rd ra ad
;; QUERY: 1, ANSWER: 5, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags: do; udp: 1232
; MQTYPE-Response: DNSKEY

;; QUESTION SECTION:
;example.com.                 IN      DS

;; ANSWER SECTION:
example.com.        625   IN  DNSKEY  256 3 13 [...]
example.com.        625   IN  DNSKEY  257 3 13 [...]
example.com.        625   IN  RRSIG   DNSKEY [...] example.com. [...]
example.com.      86185   IN  DS      370 13 2 [...]
example.com.      86185   IN  RRSIG   DS [...] com. [...]
]]></artwork>
        </figure>
      </section>
      <section anchor="recursive-query-for-ds-with-mqtype-request-for-ns">
        <name>Recursive query for DS with MQType-Request for NS</name>
        <t>In this instance, a recursive resolver is sending a DS record query to the
parent zone's authoritative server and simultaneously requesting the NS
records for the zone.</t>
        <t>Since the DS record response is marked as authoritative (AA = 1) but the
NS record data on the parent side of a zone cut is not authoritative
(AA = 0) the server is unable to merge the responses, and the NS QTYPE
is omitted from the MQTYPE-Response field.</t>
        <figure anchor="figdsns">
          <name>Recursive DS + NS</name>
          <artwork><![CDATA[
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 33333
;; flags: qr aa
;; QUERY: 1, ANSWER: 5, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags: do; udp: 1232
; MQTYPE-Response: [empty]

;; QUESTION SECTION:
;example.com.             IN  DS

;; ANSWER SECTION:
example.com.      86185   IN  DS      370 13 2 [...]
example.com.      86185   IN  RRSIG   DS [...] com. [...]
]]></artwork>
        </figure>
      </section>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
