<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc comments="yes"?>

<rfc ipr="trust200902" docName="draft-arends-parent-only-record-signalling-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="DNS-DD-EXT">DNS Delegation Extensions</title>

    <author initials="R." surname="Arends" fullname="Roy Arends">
      <organization>ICANN</organization>
      <address>
        <email>roy.arends@icann.org</email>
      </address>
    </author>

    <date year="2024" month="July" day="08"/>

    
    <workgroup>deleg</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>New RR types have been proposed that appear only at the parent side of a delegation, similar to the DS resource record (RR) type.</t>

<t>Supporting parent side RR types requires modifications to the DNS Security Extensions (DNSSEC).</t>

<t>Without these modifications, validating resolvers are susceptible to response modification attacks. An on-path adversary could potentially remove the parent-side resource records without being detected.</t>

<t>To detect the removal of a parent-side RR type, an authenticated denial record (such as NSEC or NSEC3) is necessary to confirm presence or absence of a parent-side RR type.</t>

<t>Currently, validating resolver do not expect authenticated denial records in a secure delegation response. Therefore, a secure signal is needed to inform the validating resolver to anticipate authenticated denial records for a delegation.</t>

<t>To support the future deployment of parent-side RR types, this draft designates a range of yet unallocated RR types specifically for parent-side use. Authoritative servers will include these records in a delegation response without requiring upgrades.</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>
<t>The DNS Security extensions introduced the Delegation Signer (DS) record. This was a new concept as it was a record type that can only appear at the parent-side of a delegation.</t>

<t>In the future, additional parent-side RR types may be proposed that will need to be protected against deletion.</t>

<t>This document provides future parent-side RRtypes the same protection as DS records already have. This protection is the same for all future parent-side RRtypes, and thus avoids the need for each new future RRtype needs its own signalling. This protection is provided by "authenticated denial records", which currently are NSEC and NSEC3 records.</t>

<t>Authenticated denial records are currently used to prove the presence or absence of DS records.
New parent-side RRtypes will need similar protection, and this document proposes to provide the protection using the same mechanism: NSEC and NSEC3 records.</t>

<t>Currently, validating resolvers do not expect an authenticated denial record when a DS is present. Validating resolvers that support parent-side RR types require a secure signal that an authenticated denial record is present in a response, since it can not determine if this response has these records removed by an adversary, or if the response originated from a server that does not support new parent-side records.</t>

<t>To avoid a downgrade attack, secure zones that contain parent-side RR types MUST include a secure signal. This signal is a DNSKEY record with a flag that indicates the secure signal.</t>

<t>To avoid a secure signal for every new parent-side RR type, this document designates a range for parent-side only RR types.</t>

</section>
<section anchor="requirements-notation"><name>Requirements Notation</name>
<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>

</section>
<section anchor="terminology"><name>Terminology</name>

<t>DNS Terminology used in this document is from BCP 219 <xref target="RFC8499"/>, with these additions:</t>

<dl>
  <dt>Parent-side RR type:</dt>
  <dd>
    <t>DNS RR types that can appear at the parent side of a delegation. These records MUST be signed by the parent. These records MUST NOT exist at the apex of the delegated zone.</t>
  </dd>
</dl>

</section>
<section anchor="overview"><name>Overview</name>

<section anchor="example"><name>Example</name>

</section>
<section anchor="authoritative-server-considerations"><name>Authoritative Server Considerations</name>

</section>
<section anchor="validating-resolver-considerations"><name>Validating Resolver Considerations</name>

</section>
<section anchor="stub-resolver-considerations"><name>Stub Resolver Considerations</name>

</section>
<section anchor="zone-validator-considerations"><name>Zone Validator Considerations</name>

</section>
<section anchor="domain-registry-considerations"><name>Domain Registry Considerations</name>

</section>
</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document reserves the RRtype range xxxx to yyyy for new parent-side RR types.</t>

<t>This document allocate flag X in the DNSKEY flags.</t>

</section>
<section anchor="operational-considerations"><name>Operational Considerations</name>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

</section>
<section anchor="acknowledgements"><name>Acknowledgements</name>

</section>


  </middle>

  <back>


    <references title='Normative References'>



<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname='S. Bradner' initials='S.' surname='Bradner'/>
    <date month='March' year='1997'/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name='BCP' value='14'/>
  <seriesInfo name='RFC' value='2119'/>
  <seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>

<reference anchor='RFC8174' target='https://www.rfc-editor.org/info/rfc8174'>
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname='B. Leiba' initials='B.' surname='Leiba'/>
    <date month='May' year='2017'/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name='BCP' value='14'/>
  <seriesInfo name='RFC' value='8174'/>
  <seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>




    </references>

    <references title='Informative References'>



<reference anchor='RFC8499' target='https://www.rfc-editor.org/info/rfc8499'>
  <front>
    <title>DNS Terminology</title>
    <author fullname='P. Hoffman' initials='P.' surname='Hoffman'/>
    <author fullname='A. Sullivan' initials='A.' surname='Sullivan'/>
    <author fullname='K. Fujiwara' initials='K.' surname='Fujiwara'/>
    <date month='January' year='2019'/>
    <abstract>
      <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has sometimes changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
      <t>This document obsoletes RFC 7719 and updates RFC 2308.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8499'/>
  <seriesInfo name='DOI' value='10.17487/RFC8499'/>
</reference>




    </references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

