<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 3.3.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-dnsop-generalized-notify-05" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.25.0 -->
  <front>
    <title abbrev="Generalized Notifications">Generalized DNS Notifications</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-dnsop-generalized-notify-05"/>
    <author initials="J." surname="Stenstam" fullname="Johan Stenstam">
      <organization>The Swedish Internet Foundation</organization>
      <address>
        <email>johan.stenstam@internetstiftelsen.se</email>
      </address>
    </author>
    <author initials="P." surname="Thomassen" fullname="Peter Thomassen">
      <organization>deSEC, Secure Systems Engineering</organization>
      <address>
        <email>peter@desec.io</email>
      </address>
    </author>
    <author initials="J." surname="Levine" fullname="John Levine">
      <organization>Standcore LLC</organization>
      <address>
        <email>standards@standcore.com</email>
      </address>
    </author>
    <date/>
    <area>Internet</area>
    <workgroup>DNSOP Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 37?>

<t>This document extends the use of DNS NOTIFY (RFC 1996) beyond conventional
zone transfer hints, bringing the benefits of ad-hoc notifications to DNS
delegation maintenance in general.  Use cases include DNSSEC bootstrapping
and key rollovers hints, and quicker changes to a delegation's NS record set.</t>
      <t>To enable this functionality, a method for discovering the receiver endpoint
for such notification message is introduced, via the new DSYNC record type.</t>
      <t>TO BE REMOVED: This document is being collaborated on in Github at:
<eref target="https://github.com/peterthomassen/draft-ietf-dnsop-generalized-notify">https://github.com/peterthomassen/draft-ietf-dnsop-generalized-notify</eref>.
The most recent working version of the document, open issues, etc. should all be
available there.  The authors (gratefully) accept pull requests.</t>
    </abstract>
  </front>
  <middle>
    <?line 52?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Traditional DNS notifications <xref target="RFC1996"/>, which are here referred to as
"NOTIFY(SOA)", are sent from a primary server to a secondary server to
minimize the latter's convergence time to a new version of the
zone. This mechanism successfully addresses a significant inefficiency
in the original protocol.</t>
      <t>Today similar inefficiencies occur in new use cases, in particular delegation
maintenance (DS and NS record updates). Just as in the NOTIFY(SOA) case, a new
set of notification types will have a major positive benefit by
allowing the DNS infrastructure to completely sidestep these
inefficiencies. For additional context, see <xref target="context"/>.</t>
      <t>No DNS protocol changes are introduced by this document. The mechanism
instead makes use of a wider range of DNS messages allowed by the protocol.
Future extension for further use cases (such as multi-signer key exchange)
is possible.</t>
      <t>Readers are expected to be familiar with DNSSEC <xref target="RFC9364"/>, including
<xref target="RFC6781"/>, <xref target="RFC7344"/>, <xref target="RFC7477"/>, <xref target="RFC7583"/>, <xref target="RFC8078"/>,
<xref target="RFC8901"/>, and <xref target="RFC9615"/>.
DNS-specific terminology can be found in <xref target="RFC9499"/>.</t>
      <section anchor="design-requirements">
        <name>Design Requirements</name>
        <t>When the parent operator is interested in notifications for delegation
maintenance (such as DS or NS update hints), a service will need to be
made available for accepting these notifications. Depending on the
context, this service may be run by the parent operator themselves,
or by a designated entity who is in charge of handling the domain's
delegation data (such as a domain registrar).</t>
        <t>It seems desirable to minimize the number of steps that the notification
sender needs to figure out where to send the NOTIFY. This suggests that
the lookup process be ignorant of the details of the parent-side
relationships (e.g., whether there is a registrar or not). This is
addressed by parameterizing the lookup with the name of the child. The
parent operator may then (optionally) announce the notification endpoint
in a delegation-specific way, by publishing it at a child-specific name.
(A catch-all endpoint may be indicated by wildcarding.)</t>
        <t>The solution proposed here is thus for the parent operator to publish
the address where someone listens for notifications, in a child-specific
way (see <xref target="signaling"/>). Potential senders can easily determine the name
of the parent and then look up that information (see <xref target="discovery"/>).</t>
      </section>
      <section anchor="requirements-notation">
        <name>Requirements Notation</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
        </t>
      </section>
    </section>
    <section anchor="dsyncrdtype">
      <name>DSYNC RR Type</name>
      <section anchor="wire-format">
        <name>Wire Format</name>
        <t>The DSYNC RDATA wire format is encoded as follows:</t>
        <artwork><![CDATA[
                     1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 3 3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| RRtype                        | Scheme        | Port
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
                | Target ...  /
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-/
]]></artwork>
        <dl>
          <dt>RRtype</dt>
          <dd>
            <t>The type of generalized NOTIFY that this DSYNC RR defines the
desired target address for (see "Resource Record (RR) TYPEs" IANA
registry). For now, only CDS and CSYNC are supported values, with
the former indicating an updated CDS or CDNSKEY record set.</t>
          </dd>
          <dt>Scheme</dt>
          <dd>
            <t>The mode used for contacting the desired notification address. This is an
8 bit unsigned integer. Records with value 0 (null scheme) are ignored by consumers.
Value 1 is described in this document, and values 128-255 are reserved for
private use.  All other values are currently unspecified.</t>
          </dd>
          <dt>Port</dt>
          <dd>
            <t>The port on the target host of the notification service. This
is a 16 bit unsigned integer in network byte order.</t>
          </dd>
          <dt>Target</dt>
          <dd>
            <t>The fully-qualified, uncompressed domain name of the target host
providing the service of listening for generalized notifications of the
specified type. This name MUST resolve to one or more address records.</t>
          </dd>
        </dl>
      </section>
      <section anchor="presentation-format">
        <name>Presentation Format</name>
        <t>The presentation format of the RDATA portion is as follows:</t>
        <ul spacing="normal">
          <li>
            <t>The RRtype field is represented as a mnemonic from the "Resource
Record (RR) TYPEs" registry.</t>
          </li>
          <li>
            <t>The Scheme field is represented as an unsigned decimal integer.</t>
          </li>
          <li>
            <t>The Port field is represented as an unsigned decimal integer.</t>
          </li>
          <li>
            <t>The Target field is represented as a &lt;domain-name&gt; (<xref section="5.1" sectionFormat="comma" target="RFC1035"/>).</t>
          </li>
        </ul>
      </section>
      <section anchor="semantics">
        <name>Semantics</name>
        <t>For now, the only scheme defined is scheme=1. It indicates that when a
new CDS/CDNSKEY (or CSYNC) RRset is published, a NOTIFY(CDS) (or
NOTIFY(CSYNC)) message should be sent to the address and port listed
in the corresponding DSYNC record, using conventional <xref target="RFC1035"/> DNS
transport.</t>
        <t>Example (for the owner names of these records, see <xref target="signaling"/>):</t>
        <artwork><![CDATA[
IN DSYNC CDS   1 5359 cds-scanner.example.net.
IN DSYNC CSYNC 1 5360 csync-scanner.example.net.
]]></artwork>
        <t>Should a need for other mechanisms arise, other schemes may be defined
to deal with such requirements using alternative logic.</t>
        <t>Schemes are independent of RRtype. They merely specify a method of
contacting the target (whereas the RRtype is part of the notification
payload).</t>
      </section>
    </section>
    <section anchor="signaling">
      <name>Publication of Notification Targets</name>
      <t>To use generalized notifications, it is necessary for the sender to know
where to direct each NOTIFY message. This section describes the
procedure for discovering that notification target.</t>
      <t>Note that generalized NOTIFY messages are but one mechanism for
improving the efficiency of automated delegation maintenance. Other
alternatives, such as contacting the parent operator via an API or
DNS Update (<xref target="RFC2136"/>), may (or may not) be more suitable in
individual cases. Like generalized notifications, they similarly require
a means for discovering where to send the API or DNS Update requests.</t>
      <t>The scope for the publication mechanism is therefore wider than only to
support generalized notifications, and a unified approach that works
independently of the notification method is specified in this section.</t>
      <t>Parent operators participating in the discovery scheme for the purpose of
delegation maintenance notifications MUST publish endpoint information
using the record type defined in <xref target="dsyncrdtype"/> under the <tt>_dsync</tt>
subdomain of the parent zone, as described in the following subsection.</t>
      <t>There MUST NOT be more than one DSYNC record for each combination of
RRtype and Scheme.
It is RECOMMENDED to secure the corresponding zone with DNSSEC.</t>
      <t>For practical purposes, the parent operator MAY delegate the <tt>_dsync</tt>
domain as a separate zone, and/or synthesize records under it. If
child-specificity is not needed, the parent can publish a static
wildcard DSYNC record.</t>
      <section anchor="wildcard-method">
        <name>Wildcard Method</name>
        <t>If the parent operator itself performs CDS/CDNSKEY or CSYNC processing
for some or all delegations, or wants to forward notifications to some
other party, a default notification target may be specified as follows:</t>
        <artwork><![CDATA[
*._dsync.example.  IN DSYNC  CDS   scheme port target
*._dsync.example.  IN DSYNC  CSYNC scheme port target
]]></artwork>
        <t>To accommodate indirect delegation management models, the
designated notification target may relay notifications to a third party
(such as the registrar, in ICANN's model). The details of such
arrangements are out of scope for this document.</t>
        <t>If for some reason the parent operator cannot publish wildcard records,
the wildcard label may be dropped from the DSYNC owner name (i.e., it
may be published at the <tt>_dsync</tt> label instead). This practice requires
an additional step during discovery (see <xref target="discovery"/>), and is
therefore NOT RECOMMENDED.</t>
      </section>
      <section anchor="child-specific-method">
        <name>Child-specific Method</name>
        <t>It is also possible to publish child-specific records, where in place of
the wildcard label, the child's FQDN with the parent zone's labels
stripped is used.</t>
        <t>As an example, consider a registrar offering domains like
<tt>child.example</tt>, delegated from <tt>example</tt> zone. If the registrar
provides the notification endpoint, e.g., <tt>rr-endpoint.example:5300</tt>,
the parent may publish this information as follows:</t>
        <artwork><![CDATA[
child._dsync.example.  IN DSYNC  CDS  1 5300 rr-endpoint.example.
]]></artwork>
      </section>
    </section>
    <section anchor="delegation-maintenance-cdscdnskey-and-csync-notifications">
      <name>Delegation Maintenance: CDS/CDNSKEY and CSYNC Notifications</name>
      <t>Delegation maintenance notifications address the inefficiencies related
to scanning child zones for CDS/CDNSKEY records
<xref target="RFC7344"/><xref target="RFC8078"/><xref target="RFC9615"/>. (For an overview of the issues,
see <xref target="context"/>.)</t>
      <t>NOTIFY messages for delegation maintenance MUST be formatted as described in
<xref target="RFC1996"/>, with the <tt>qtype</tt> field replaced as appropriate.</t>
      <t>To address the CDS/CDNSKEY dichotomy, the NOTIFY(CDS) message (with
<tt>qtype=CDS</tt>) is defined to indicate any child-side changes pertaining
to an upcoming update of DS records.
As the child DNS operator generally is unaware of whether the parent
side consumes CDS records or prefers CDNSKEY, or when that policy
changes, it seems advisable to publish both types of records,
preferably using automation features of common authoritative nameserver
software for ensuring consistency.</t>
      <t>Upon receipt of NOTIFY(CDS), the parent-side recipient (typically, registry or
registrar) SHOULD initiate the same DNS lookups and verifications for
DNSSEC bootstrapping <xref target="RFC9615"/> or DS maintenance
<xref target="RFC7344"/><xref target="RFC8078"/> that would otherwise be triggered based on a
timer.</t>
      <t>The CSYNC <xref target="RFC7477"/> inefficiency may be similarly treated, with the
child sending a NOTIFY(CSYNC) message (with <tt>qtype=CSYNC</tt>) to an address
where the parent operator (or a designated party) is listening for CSYNC
notifications.</t>
      <t>In both cases the notification will speed up processing times by
providing the recipient with a hint that a particular child zone has
published new CDS, CDNSKEY and/or CSYNC records.</t>
      <section anchor="discovery">
        <name>Endpoint Discovery</name>
        <t>To locate the target for outgoing delegation maintenance notifications,
the notification sender MUST perform the following procedure:</t>
        <ol spacing="normal" type="1"><li>
            <t>Construct the lookup name, by injecting the <tt>_dsync</tt> label after the
first label of the delegation owner name.</t>
          </li>
          <li>
            <t>Perform a lookup of type DSYNC for the lookup name, and validate the
response if DNSSEC is enabled. If a positive DSYNC answer results,
return it.</t>
          </li>
          <li>
            <t>If the query resulted in a negative response:  </t>
            <ul spacing="normal">
              <li>
                <t>If the response's SOA record indicates that the parent is more than
one label away from the <tt>_dsync</tt> label, construct a new lookup name
by inserting the <tt>_dsync</tt> label into the delegation owner name just
before the parent zone labels inferred from the negative response,
and go to step 2.      </t>
                <t>
For example, <tt>city.ise.mie.jp</tt> is delegated from <tt>jp</tt> (and not
from <tt>ise.mie.jp</tt> or <tt>mie.jp</tt>!). The initial DSYNC query relating
to it is thus directed at <tt>city._dsync.ise.mie.jp</tt>. This is
expected to result in a negative response from <tt>jp</tt>, and another
query for <tt>city.ise.mie._dsync.jp</tt> is then required;</t>
              </li>
              <li>
                <t>Otherwise, if the lookup name has any labels in front of the
<tt>_dsync</tt> label, remove them to construct a new lookup name (such
as <tt>_dsync.jp</tt>), and go to step 2.
(This is to enable zone structures without wildcards.)</t>
              </li>
              <li>
                <t>Otherwise, return null (no notification target available).</t>
              </li>
            </ul>
          </li>
        </ol>
      </section>
      <section anchor="sending-notifications">
        <name>Sending Notifications</name>
        <t>When creating or changing a CDS/CDNSKEY/CSYNC RRset in the child zone,
the DNS operator SHOULD send a suitable notification to one of the
endpoints discovered as described in the previous section.</t>
        <t>A NOTIFY message can only carry information about changes concerning one
child zone. When there are changes to several child zones, the sender
MUST send a separate notification for each one.</t>
        <t>When a primary name server publishes a new RRset in the child, there
typically is a time delay until all publicly visible copies of the zone
are updated. If the primary sends a notification at the exact time of
publication, there is a potential for CDS/CDNSKEY/CSYNC processing to be
attempted before the corresponding records are served. As a result, a
desired update may not be detected (or appear inconsistent), preventing
it from being applied.</t>
        <t>It is therefore RECOMMENDED that the child delays sending notifications
to the recipient until a consistent public view of the pertinent
records is ensured.</t>
        <section anchor="timeouts-and-error-handling">
          <name>Timeouts and Error Handling</name>
          <t>NOTIFY messages are expected to elicit a response from the recipient
(<xref target="RFC1996"/> Section 4.7). If no response is received, senders SHOULD
employ the same logic as for SOA notifications (<xref target="RFC1996"/> Sections
3.5 and 3.6).</t>
          <t>The recipient's attempt to act upon the delegation update request may
fail for a variety of reasons (e.g., due to violation of the continuity
requirement set forth in <xref target="RFC7344"/> Section 4.1). Such failures may
occur asynchronously, even after the NOTIFY response has been sent.</t>
          <t>In order to learn about such failures, senders MAY include an
<xref target="RFC9567"/> EDNS0 Report-Channel option in the NOTIFY message to
request the receiving side to report any errors by making a report query
with an appropriate extended DNS error code as described in
<xref target="RFC8914"/>.</t>
          <t>When including this EDNS0 option, its agent domain MUST be subordinate
or equal to one of the NS hostnames, as listed in the child's delegation
in the parent zone.
This is to prevent malicious senders from causing the NOTIFY recipient
to send unsolicited report queries to unrelated third parties.</t>
        </section>
        <section anchor="roles">
          <name>Roles</name>
          <t>While the CDS/CDNSKEY/CSYNC processing following the receipt of a NOTIFY
will often be performed by the registry, the protocol anticipates that
in some contexts (especially for ICANN gTLDs), registrars may take on
the task. In such cases, the current registrar notification endpoint may
be published, enabling notifications to be directed to the
appropriate target. The mechanics of how this is arranged between
registry and registrar are out of scope for this document; the protocol
only offers the possibility to arrange things such that from the child
perspective, it is inconsequential how the parent-side parties are
organized: notifications are simply sent to the published address.</t>
          <t>Because of the security model where a notification by itself never
causes a change (it can only speed up the time until the next
check for the same thing), the sender's identity is not crucial.
This opens up the possibility of having an arbitrary party (e.g., a
side-car service) send the notifications, enabling this functionality
even before the emergence of native support in nameserver software.</t>
        </section>
      </section>
      <section anchor="processing-of-notify-messages">
        <name>Processing of NOTIFY Messages</name>
        <t>NOTIFY(CDS) messages carrying notification payloads (records) for
several child zones MUST be discarded, as sending them is an error.</t>
        <t>Upon receipt of a (potentially forwarded) valid NOTIFY(CDS) message for
a particular child zone at the published address for CDS notifications,
the receiving side (parent registry or registrar) has two options:</t>
        <ol spacing="normal" type="1"><li>
            <t>Acknowledge receipt by sending a NOTIFY response as described in
<xref target="RFC1996"/> Section 4.7 (identical to NOTIFY query, but with QR
bit set) and schedule an immediate check of the CDS and CDNSKEY
RRsets as published by that particular child zone.  </t>
            <t>
If the NOTIFY message contains an <xref target="RFC9567"/> EDNS0 Report-Channel
option with an agent domain subordinate or equal to one of the NS
hostnames listed in the delegation, the processing party SHOULD
report any errors occuring during CDS/CDNSKEY processing by sending
a report query with an appropriate extended DNS error code as
described in <xref target="RFC8914"/>. Reporting may be done asynchronously
(outside of the NOTIFY transaction).  </t>
            <t>
When using period scanning, notifications preempt the scanning
timer. If the NOTIFY-induced check finds that the CDS/CDNSKEY RRset
is indeed new or has changed, the corresponding child's timer may
be reset and the scanning frequency reduced (e.g. to once a week).
If a CDS/CDNSKEY change is later detected through scanning (without
having received a notification), NOTIFY-related state SHOULD be
cleared, reverting to the default scanning schedule for this child.  </t>
            <t>
When introducing CDS/CDNSKEY scanning support at the same time as
NOTIFY(CDS) support, backwards compatibility considerations
regarding the scanning interval do not apply; a low-frequency
scanning schedule MAY thus be used by default in such cases.</t>
          </li>
          <li>
            <t>Do not act upon the notification. To prevent retries, recipients
SHOULD acknowledge the notification by sending a NOTIFY response
even when otherwise ignoring the request, combined with a report
query if feasible (see above). One reason to do this may be a rate
limit (see <xref target="security"/>), in which case "Blocked" (15) may be a
suitable extended DNS error code.</t>
          </li>
        </ol>
        <t>Implementing the first option will significantly decrease the
convergence time (between publication of a new CDS/CDNSKEY record in the
child and publication of the resulting DS), thereby providing improved
service for the child.</t>
        <t>If, in addition to scheduling an immediate check for the child zone of
the notification, the scanning schedule is also modified to be less
frequent, the cost of providing the scanning service will be reduced.</t>
        <t>Upon receipt of a NOTIFY(CSYNC) to the published address for CSYNC
notifications, the same options and considerations apply as for the
NOTIFY(CDS).</t>
      </section>
    </section>
    <section anchor="security">
      <name>Security Considerations</name>
      <t>The original NOTIFY specification sidesteps most security issues by not
relying on the information in the NOTIFY message in any way, and instead
only using it to "enter the state it would if the zone's refresh timer
had expired" (<xref section="4.7" sectionFormat="of" target="RFC1996"/>).</t>
      <t>This security model is reused for generalized NOTIFY messages. It
therefore seems impossible to affect the behaviour of the recipient of
the NOTIFY other than by hastening the timing for when different checks
are initiated.</t>
      <t>The receipt of a notification message will, in general, cause the
receiving party to perform one or more outbound queries for the records
of interest (for example, NOTIFY(CDS) will cause CDS/CDNSKEY
queries). When done using standard DNS, the size of these queries is
comparable to that of the NOTIFY messages themselves, rendering any
amplification attempts futile. The number of queries triggered per
notification is also limited by the requirement that a NOTIFY message
can refer to one child only.</t>
      <t>However, when the outgoing query occurs via encrypted transport, some
amplification is possible, both with respect to bandwidth and
computational burden. In this case, the usual principle of bounding the
work, even under unreasonable events, applies.</t>
      <t>Receivers therefore MUST implement rate limiting for notification
processing. It is RECOMMENDED to configure rate limiting independently
for both the notification's source IP address and the name of the zone
that is conveyed in the NOTIFY message. Rate limiting also mitigates
processing load from garbage notifications.</t>
      <t>Alternative solutions (such as signing notifications and validating
their signatures) appear significantly more expensive without tangible
benefit.</t>
      <t>In order to facilitate schemes that are authenticated outside of DNSSEC
(such as via SIG(0)), zones containing DSYNC records are not required to
be signed. Spoofed DSYNC responses would prevent notifications from
reaching their legitimate target, and a different party may receive
unsolicited notifications; both effects, however, can also be achieved
in the presence of DNSSEC. The illegitimate target is also enabled to
learn notification contents in real-time, which may be a privacy concern
for the sender. If so, the sender may choose to ignore unsigned DSYNC
records.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t><strong>Note to the RFC Editor</strong>: In this section, please replace occurrences of "(this document)" with a proper reference.</t>
      <section anchor="dsync-rr-type">
        <name>DSYNC RR Type</name>
        <t>IANA is requested to update the "Resource Record (RR) TYPEs" registry
under the "Domain Name System (DNS) Parameters" registry group as
follows:</t>
        <dl>
          <dt>Type</dt>
          <dd>
            <t>DSYNC</t>
          </dd>
          <dt>Value</dt>
          <dd>
            <t>66</t>
          </dd>
          <dt>Meaning</dt>
          <dd>
            <t>Endpoint discovery for delegation synchronization</t>
          </dd>
          <dt>Reference</dt>
          <dd>
            <t>(this document)</t>
          </dd>
        </dl>
      </section>
      <section anchor="dsync-scheme-registration">
        <name>DSYNC Scheme Registration</name>
        <t>IANA has created and will maintain the following new registry in the "Domain Name System (DNS) Parameters" registry group:</t>
        <dl>
          <dt>Name</dt>
          <dd>
            <t>DSYNC: Location of Synchronization Endpoints</t>
          </dd>
          <dt>Assignment Policy</dt>
          <dd>
            <t>Expert Review</t>
          </dd>
          <dt>Reference</dt>
          <dd>
            <t>(this document)</t>
          </dd>
        </dl>
        <t>The initial contents for the registry are as follows:</t>
        <table>
          <thead>
            <tr>
              <th align="left">RRtype</th>
              <th align="left">Scheme</th>
              <th align="left">Purpose</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left"> </td>
              <td align="left">0</td>
              <td align="left">Null scheme (no-op)</td>
              <td align="left">(this document)</td>
            </tr>
            <tr>
              <td align="left">CDS</td>
              <td align="left">1</td>
              <td align="left">Delegation management</td>
              <td align="left">(this document)</td>
            </tr>
            <tr>
              <td align="left">CSYNC</td>
              <td align="left">1</td>
              <td align="left">Delegation management</td>
              <td align="left">(this document)</td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left">2-127</td>
              <td align="left">Unassigned</td>
              <td align="left"> </td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left">128-255</td>
              <td align="left">Reserved (private use)</td>
              <td align="left">(this document)</td>
            </tr>
          </tbody>
        </table>
        <t>Requests to register additional entries MUST include the following fields:</t>
        <dl>
          <dt>RRtype</dt>
          <dd>
            <t>Lists an RRtype that is defined for use.</t>
          </dd>
          <dt>Scheme</dt>
          <dd>
            <t>The mode used for contacting the desired notification address</t>
          </dd>
          <dt>Purpose</dt>
          <dd>
            <t>Use case description</t>
          </dd>
          <dt>Reference</dt>
          <dd>
            <t>Location of specification or registration source</t>
          </dd>
        </dl>
        <t>Registration requests are to be recorded by IANA after Expert Review <xref target="RFC8126"/>.
The expert review should validate that the RRtype and Scheme do not conflict
with any existing allocations.</t>
      </section>
      <section anchor="dsync-underscore-name">
        <name>_dsync Underscore Name</name>
        <t>Per <xref target="RFC8552"/>, IANA is requested to add the following entries to the
"Underscored and Globally Scoped DNS Node Names" registry:</t>
        <artwork><![CDATA[
+---------+------------+-----------------+
| RR Type | _NODE NAME | Reference       |
+---------+------------+-----------------+
| DSYNC   | _dsync     | (this document) |
+---------+------------+-----------------+
]]></artwork>
      </section>
    </section>
    <section anchor="implementation-status">
      <name>Implementation Status</name>
      <t><strong>Note to the RFC Editor</strong>: please remove this entire section before publication.</t>
      <t>Johan Stenstam's experimental nameserver implements this draft
(https://github.com/johanix/tdns).</t>
      <section anchor="child-dns-operator-side">
        <name>Child DNS Operator-side</name>
        <ul spacing="normal">
          <li>
            <t>IronDNS implementation under way</t>
          </li>
          <li>
            <t>deSEC implementation under way (Q1/2025)</t>
          </li>
        </ul>
      </section>
      <section anchor="parent-side">
        <name>Parent-side</name>
        <ul spacing="normal">
          <li>
            <t>.SE/.NU will implement this once it is an RFC.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>In order of first contribution:
Joe Abley, Mark Andrews, Christian Elmerot, Ólafur Guðmundsson, Paul
Wouters, Brian Dickson, Warren Kumari, Patrick Mevzek, Tim Wicinski,
Q Misell, Stefan Ubbink</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC1996">
          <front>
            <title>A Mechanism for Prompt Notification of Zone Changes (DNS NOTIFY)</title>
            <author fullname="P. Vixie" initials="P." surname="Vixie"/>
            <date month="August" year="1996"/>
            <abstract>
              <t>This memo describes the NOTIFY opcode for DNS, by which a master server advises a set of slave servers that the master's data has been changed and that a query should be initiated to discover the new data. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1996"/>
          <seriesInfo name="DOI" value="10.17487/RFC1996"/>
        </reference>
        <reference anchor="RFC9364">
          <front>
            <title>DNS Security Extensions (DNSSEC)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>This document describes the DNS Security Extensions (commonly called "DNSSEC") that are specified in RFCs 4033, 4034, and 4035, as well as a handful of others. One purpose is to introduce all of the RFCs in one place so that the reader can understand the many aspects of DNSSEC. This document does not update any of those RFCs. A second purpose is to state that using DNSSEC for origin authentication of DNS data is the best current practice. A third purpose is to provide a single reference for other documents that want to refer to DNSSEC.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="237"/>
          <seriesInfo name="RFC" value="9364"/>
          <seriesInfo name="DOI" value="10.17487/RFC9364"/>
        </reference>
        <reference anchor="RFC7344">
          <front>
            <title>Automating DNSSEC Delegation Trust Maintenance</title>
            <author fullname="W. Kumari" initials="W." surname="Kumari"/>
            <author fullname="O. Gudmundsson" initials="O." surname="Gudmundsson"/>
            <author fullname="G. Barwood" initials="G." surname="Barwood"/>
            <date month="September" year="2014"/>
            <abstract>
              <t>This document describes a method to allow DNS Operators to more easily update DNSSEC Key Signing Keys using the DNS as a communication channel. The technique described is aimed at delegations in which it is currently hard to move information from the Child to Parent.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7344"/>
          <seriesInfo name="DOI" value="10.17487/RFC7344"/>
        </reference>
        <reference anchor="RFC7477">
          <front>
            <title>Child-to-Parent Synchronization in DNS</title>
            <author fullname="W. Hardaker" initials="W." surname="Hardaker"/>
            <date month="March" year="2015"/>
            <abstract>
              <t>This document specifies how a child zone in the DNS can publish a record to indicate to a parental agent that the parental agent may copy and process certain records from the child zone. The existence of the record and any change in its value can be monitored by a parental agent and acted on depending on local policy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7477"/>
          <seriesInfo name="DOI" value="10.17487/RFC7477"/>
        </reference>
        <reference anchor="RFC8078">
          <front>
            <title>Managing DS Records from the Parent via CDS/CDNSKEY</title>
            <author fullname="O. Gudmundsson" initials="O." surname="Gudmundsson"/>
            <author fullname="P. Wouters" initials="P." surname="Wouters"/>
            <date month="March" year="2017"/>
            <abstract>
              <t>RFC 7344 specifies how DNS trust can be maintained across key rollovers in-band between parent and child. This document elevates RFC 7344 from Informational to Standards Track. It also adds a method for initial trust setup and removal of a secure entry point.</t>
              <t>Changing a domain's DNSSEC status can be a complicated matter involving multiple unrelated parties. Some of these parties, such as the DNS operator, might not even be known by all the organizations involved. The inability to disable DNSSEC via in-band signaling is seen as a problem or liability that prevents some DNSSEC adoption at a large scale. This document adds a method for in-band signaling of these DNSSEC status changes.</t>
              <t>This document describes reasonable policies to ease deployment of the initial acceptance of new secure entry points (DS records).</t>
              <t>It is preferable that operators collaborate on the transfer or move of a domain. The best method is to perform a Key Signing Key (KSK) plus Zone Signing Key (ZSK) rollover. If that is not possible, the method using an unsigned intermediate state described in this document can be used to move the domain between two parties. This leaves the domain temporarily unsigned and vulnerable to DNS spoofing, but that is preferred over the alternative of validation failures due to a mismatched DS and DNSKEY record.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8078"/>
          <seriesInfo name="DOI" value="10.17487/RFC8078"/>
        </reference>
        <reference anchor="RFC9615">
          <front>
            <title>Automatic DNSSEC Bootstrapping Using Authenticated Signals from the Zone's Operator</title>
            <author fullname="P. Thomassen" initials="P." surname="Thomassen"/>
            <author fullname="N. Wisiol" initials="N." surname="Wisiol"/>
            <date month="July" year="2024"/>
            <abstract>
              <t>This document introduces an in-band method for DNS operators to publish arbitrary information about the zones for which they are authoritative, in an authenticated fashion and on a per-zone basis. The mechanism allows managed DNS operators to securely announce DNSSEC key parameters for zones under their management, including for zones that are not currently securely delegated.</t>
              <t>Whenever DS records are absent for a zone's delegation, this signal enables the parent's registry or registrar to cryptographically validate the CDS/CDNSKEY records found at the child's apex. The parent can then provision DS records for the delegation without resorting to out-of-band validation or weaker types of cross-checks such as "Accept after Delay".</t>
              <t>This document establishes the DS enrollment method described in Section 4 of this document as the preferred method over those from Section 3 of RFC 8078. It also updates RFC 7344.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9615"/>
          <seriesInfo name="DOI" value="10.17487/RFC9615"/>
        </reference>
        <reference anchor="RFC9499">
          <front>
            <title>DNS Terminology</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
              <t>This document updates RFC 2308 by clarifying the definitions of "forwarder" and "QNAME". It obsoletes RFC 8499 by adding multiple terms and clarifications. Comprehensive lists of changed and new definitions can be found in Appendices A and B.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="219"/>
          <seriesInfo name="RFC" value="9499"/>
          <seriesInfo name="DOI" value="10.17487/RFC9499"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC1035">
          <front>
            <title>Domain names - implementation and specification</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1035"/>
          <seriesInfo name="DOI" value="10.17487/RFC1035"/>
        </reference>
        <reference anchor="RFC2136">
          <front>
            <title>Dynamic Updates in the Domain Name System (DNS UPDATE)</title>
            <author fullname="P. Vixie" initials="P." role="editor" surname="Vixie"/>
            <author fullname="S. Thomson" initials="S." surname="Thomson"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <author fullname="J. Bound" initials="J." surname="Bound"/>
            <date month="April" year="1997"/>
            <abstract>
              <t>Using this specification of the UPDATE opcode, it is possible to add or delete RRs or RRsets from a specified zone. Prerequisites are specified separately from update operations, and can specify a dependency upon either the previous existence or nonexistence of an RRset, or the existence of a single RR. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2136"/>
          <seriesInfo name="DOI" value="10.17487/RFC2136"/>
        </reference>
        <reference anchor="RFC9567">
          <front>
            <title>DNS Error Reporting</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <date month="April" year="2024"/>
            <abstract>
              <t>DNS error reporting is a lightweight reporting mechanism that provides the operator of an authoritative server with reports on DNS resource records that fail to resolve or validate. A domain owner or DNS hosting organization can use these reports to improve domain hosting. The reports are based on extended DNS errors as described in RFC 8914.</t>
              <t>When a domain name fails to resolve or validate due to a misconfiguration or an attack, the operator of the authoritative server may be unaware of this. To mitigate this lack of feedback, this document describes a method for a validating resolver to automatically signal an error to a monitoring agent specified by the authoritative server. The error is encoded in the QNAME; thus, the very act of sending the query is to report the error.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9567"/>
          <seriesInfo name="DOI" value="10.17487/RFC9567"/>
        </reference>
        <reference anchor="RFC8914">
          <front>
            <title>Extended DNS Errors</title>
            <author fullname="W. Kumari" initials="W." surname="Kumari"/>
            <author fullname="E. Hunt" initials="E." surname="Hunt"/>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="W. Hardaker" initials="W." surname="Hardaker"/>
            <author fullname="D. Lawrence" initials="D." surname="Lawrence"/>
            <date month="October" year="2020"/>
            <abstract>
              <t>This document defines an extensible method to return additional information about the cause of DNS errors. Though created primarily to extend SERVFAIL to provide additional information about the cause of DNS and DNSSEC failures, the Extended DNS Errors option defined in this document allows all response types to contain extended error information. Extended DNS Error information does not change the processing of RCODEs.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8914"/>
          <seriesInfo name="DOI" value="10.17487/RFC8914"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC8552">
          <front>
            <title>Scoped Interpretation of DNS Resource Records through "Underscored" Naming of Attribute Leaves</title>
            <author fullname="D. Crocker" initials="D." surname="Crocker"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>Formally, any DNS Resource Record (RR) may occur under any domain name. However, some services use an operational convention for defining specific interpretations of an RRset by locating the records in a DNS branch under the parent domain to which the RRset actually applies. The top of this subordinate branch is defined by a naming convention that uses a reserved node name, which begins with the underscore character (e.g., "_name"). The underscored naming construct defines a semantic scope for DNS record types that are associated with the parent domain above the underscored branch. This specification explores the nature of this DNS usage and defines the "Underscored and Globally Scoped DNS Node Names" registry with IANA. The purpose of this registry is to avoid collisions resulting from the use of the same underscored name for different services.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="222"/>
          <seriesInfo name="RFC" value="8552"/>
          <seriesInfo name="DOI" value="10.17487/RFC8552"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC6781">
          <front>
            <title>DNSSEC Operational Practices, Version 2</title>
            <author fullname="O. Kolkman" initials="O." surname="Kolkman"/>
            <author fullname="W. Mekking" initials="W." surname="Mekking"/>
            <author fullname="R. Gieben" initials="R." surname="Gieben"/>
            <date month="December" year="2012"/>
            <abstract>
              <t>This document describes a set of practices for operating the DNS with security extensions (DNSSEC). The target audience is zone administrators deploying DNSSEC.</t>
              <t>The document discusses operational aspects of using keys and signatures in the DNS. It discusses issues of key generation, key storage, signature generation, key rollover, and related policies.</t>
              <t>This document obsoletes RFC 4641, as it covers more operational ground and gives more up-to-date requirements with respect to key sizes and the DNSSEC operations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6781"/>
          <seriesInfo name="DOI" value="10.17487/RFC6781"/>
        </reference>
        <reference anchor="RFC7583">
          <front>
            <title>DNSSEC Key Rollover Timing Considerations</title>
            <author fullname="S. Morris" initials="S." surname="Morris"/>
            <author fullname="J. Ihren" initials="J." surname="Ihren"/>
            <author fullname="J. Dickinson" initials="J." surname="Dickinson"/>
            <author fullname="W. Mekking" initials="W." surname="Mekking"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>This document describes the issues surrounding the timing of events in the rolling of a key in a DNSSEC-secured zone. It presents timelines for the key rollover and explicitly identifies the relationships between the various parameters affecting the process.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7583"/>
          <seriesInfo name="DOI" value="10.17487/RFC7583"/>
        </reference>
        <reference anchor="RFC8901">
          <front>
            <title>Multi-Signer DNSSEC Models</title>
            <author fullname="S. Huque" initials="S." surname="Huque"/>
            <author fullname="P. Aras" initials="P." surname="Aras"/>
            <author fullname="J. Dickinson" initials="J." surname="Dickinson"/>
            <author fullname="J. Vcelak" initials="J." surname="Vcelak"/>
            <author fullname="D. Blacka" initials="D." surname="Blacka"/>
            <date month="September" year="2020"/>
            <abstract>
              <t>Many enterprises today employ the service of multiple DNS providers to distribute their authoritative DNS service. Deploying DNSSEC in such an environment may present some challenges, depending on the configuration and feature set in use. In particular, when each DNS provider independently signs zone data with their own keys, additional key-management mechanisms are necessary. This document presents deployment models that accommodate this scenario and describes these key-management requirements. These models do not require any changes to the behavior of validating resolvers, nor do they impose the new key-management requirements on authoritative servers not involved in multi-signer configurations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8901"/>
          <seriesInfo name="DOI" value="10.17487/RFC8901"/>
        </reference>
        <reference anchor="I-D.ietf-dnsop-dnssec-automation">
          <front>
            <title>DNSSEC automation</title>
            <author fullname="Ulrich Wisser" initials="U." surname="Wisser">
         </author>
            <author fullname="Shumon Huque" initials="S." surname="Huque">
              <organization>Salesforce</organization>
            </author>
            <author fullname="Johan Stenstam" initials="J." surname="Stenstam">
              <organization>The Swedish Internet Foundation</organization>
            </author>
            <date day="19" month="October" year="2024"/>
            <abstract>
              <t>   This document describes an algorithm and protocol to automate the
   setup, operations, and decomissioning of Multi-Signer DNSSEC
   [RFC8901] configurations.  It employs Model 2 of the multi-signer
   specification, where each operator has their own distinct KSK and ZSK
   sets (or CSK sets), Managing DS Records from the Parent via CDS/
   CDNSKEY [RFC8078], and Child-to-Parent Synchronization in DNS
   [RFC7477] to accomplish this.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dnsop-dnssec-automation-03"/>
        </reference>
      </references>
    </references>
    <?line 583?>

<section anchor="context">
      <name>Efficiency and Convergence Issues in DNS Scanning</name>
      <section anchor="original-notify-for-zone-transfer-nudging">
        <name>Original NOTIFY for Zone Transfer Nudging</name>
        <t><xref target="RFC1996"/> introduced the concept of a DNS Notify message which was used
to improve the convergence time for secondary servers when a DNS zone
had been updated in the primary. The basic idea was to augment the
traditional "pull" mechanism (a periodic SOA query) with a "push"
mechanism (a Notify) for a common case that was otherwise very
inefficient (due to either slow convergence or wasteful overly
frequent scanning of the primary for changes).</t>
        <t>While it is possible to indicate how frequently checks should occur
(via the SOA Refresh parameter), these checks did not allow catching
zone changes that fall between checkpoints. <xref target="RFC1996"/> addressed the
optimization of the time-and-cost trade-off between a secondary checking
frequently for new versions of a zone, and infrequent checking, by
replacing scheduled scanning with the more efficient NOTIFY mechanism.</t>
      </section>
      <section anchor="similar-issues-for-ds-maintenance-and-beyond">
        <name>Similar Issues for DS Maintenance and Beyond</name>
        <t>Today, we have similar issues with slow updates of DNS data in spite of
the data having been published. The two most obvious cases are CDS and
CSYNC scanners deployed in a growing number of TLD registries. Because of
the large number of child delegations, scanning for CDS and CSYNC records
is rather slow (as in infrequent).</t>
        <t>It is only a very small number of the delegations that will have updated
CDS or CDNSKEY record in between two scanning runs. However, frequent
scanning for CDS and CDNSKEY records is costly, and infrequent scanning
causes slower convergence (i.e., delay until the DS RRset is updated).</t>
        <t>Unlike in the original case, where the primary is able to suggest the
scanning interval via the SOA Refresh parameter, an equivalent mechanism
does not exist for DS-related scanning.</t>
        <t>All of the above also applies to automated NS and glue record
maintenance via CSYNC scanning <xref target="RFC7477"/>. Again, given that CSYNC
records change only rarely, frequent scanning of a large number of
delegations seems disproportionately costly, while infrequent scanning
causes slower convergence (delay until the delegation is updated).</t>
        <t>While use of the NOTIFY mechanism for coordinating the key exchange in
multi-signer setups <xref target="I-D.ietf-dnsop-dnssec-automation"/> is
conceivable, the detailed specification is left for future work.</t>
      </section>
    </section>
    <section anchor="change-history-to-be-removed-before-publication">
      <name>Change History (to be removed before publication)</name>
      <ul spacing="normal">
        <li>
          <t>draft-ietf-dnsop-generalized-notify-05</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Editorial changes</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>draft-ietf-dnsop-generalized-notify-04</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Add section on Implementation Status</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Use assigned DSYNC RRtype value</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Define DSYNC presentation format</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Make all needed IANA requests</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Editorial changes</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>draft-ietf-dnsop-generalized-notify-03</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Include DNSSEC bootstrapping use case</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Remove sections with approaches not pursued</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Editorial changes</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>draft-ietf-dnsop-generalized-notify-02</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Nits by Tim Wicinski</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Dnsdir feedback</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Specify timeout and error handling</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Editorial nits</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Reserve scheme value 0</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>draft-ietf-dnsop-generalized-notify-01</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Reserve scheme values 128-255</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Rename NOTIFY rrtype to DSYNC (to distinguish from NOTIFY message)</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Describe endpoint discovery</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Discussion on garbage notifications</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>More discussion on amplification risks</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Clean-up, editorial changes</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>draft-ietf-dnsop-generalized-notify-00</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Revision after adoption.</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>draft-thomassen-dnsop-generalized-dns-notify-02</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Add rationale for staying in band</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Add John as an author</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>draft-thomassen-dnsop-generalized-dns-notify-01</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Mention Ry-to-Rr forwarding to accommodate RRR model</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Add port number flexibility</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Add scheme parameter</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Drop SRV-based alternative in favour of new NOTIFY RR</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Editorial improvements</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>draft-thomassen-dnsop-generalized-dns-notify-00</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Initial public draft.</t>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
