<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.21 (Ruby 2.6.10) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-homburg-deleg-incremental-deleg-02" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.25.0 -->
  <front>
    <title abbrev="incremental-deleg">Incrementally Deployable Extensible Delegation for DNS</title>
    <seriesInfo name="Internet-Draft" value="draft-homburg-deleg-incremental-deleg-02"/>
    <author fullname="Philip Homburg">
      <organization>NLnet Labs</organization>
      <address>
        <email>philip@nlnetlabs.nl</email>
      </address>
    </author>
    <author fullname="Tim Wicinski">
      <organization>Cox Communications</organization>
      <address>
        <email>tjw.ietf@gmail.com</email>
      </address>
    </author>
    <author fullname="Jesse van Zutphen">
      <organization>University of Amsterdam</organization>
      <address>
        <email>Jesse.vanZutphen@os3.nl</email>
      </address>
    </author>
    <author fullname="Willem Toorop">
      <organization>NLnet Labs</organization>
      <address>
        <email>willem@nlnetlabs.nl</email>
      </address>
    </author>
    <date year="2025" month="March" day="03"/>
    <area>int</area>
    <workgroup>DNS Delegation</workgroup>
    <keyword>Internet-Draft</keyword>
    <keyword>DNS</keyword>
    <keyword>Resolver</keyword>
    <keyword>Delegation</keyword>
    <keyword>Authoritative</keyword>
    <keyword>Deployable</keyword>
    <keyword>Extensible</keyword>
    <abstract>
      <t>This document proposes a mechanism for extensible delegations in the DNS.
The mechanism realizes delegations with resource record sets placed below a <tt>_deleg</tt> label in the apex of the delegating zone.
This authoritative delegation point can be aliased to other names using CNAME and DNAME.
This document proposes a new DNS resource record type, IDELEG, which is based on the SVCB and inherits extensibility from it.</t>
      <t>Support in recursive resolvers suffices for the mechanism to be fully functional.
The number of subsequent interactions between the recursive resolver and the authoritative name servers is comparable with those for DNS Query Name Minimisation.
Additionally, but not required, support in the authoritative name servers enables optimized behavior with reduced (simultaneous) queries.
None, mixed or full deployment of the mechanism on authoritative name servers are all fully functional, allowing for the mechanism to be incrementally deployed.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-homburg-deleg-incremental-deleg/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        deleg Working Group mailing list (<eref target="mailto:dd@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/dd/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/dd/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/NLnetLabs/incremental-deleg"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>This document describes a delegation mechanism for the Domain Name System (DNS) <xref target="STD13"/> that addresses several matters that, at the time of writing, are suboptimally supported or not supported at all.
These matters are elaborated upon in sections <xref format="counter" target="signaling"/>, <xref format="counter" target="outsourcing"/> and <xref format="counter" target="dnssec-protection"/>.
In addition, the mechanism described in this document aspires to be maximally deployable, which is elaborated upon in <xref target="deployability"/>.</t>
      <section anchor="signaling">
        <name>Signaling capabilities of the authoritative name servers</name>
        <t>A new IDELEG resource record (RR) type is introduced in this document, which is based on and inherits the wire and presentation format from SVCB <xref target="RFC9460"/>.
All Service Binding Mappings, as well as the capability signalling, that are specified in <xref target="RFC9461"/> are also applicable to IDELEG, with the exception of the limitations on AliasMode records in <xref section="6" sectionFormat="of" target="RFC9460"/>.
Capability signalling of <xref target="RFC7858">DNS over Transport Layer Protocol</xref> (DoT), <xref target="RFC8484">DNS Queries over HTTPS</xref> and <xref target="RFC9250">DNS over Dedicated QUIC Connections</xref>, on default or alternative ports, can all be used as specified in <xref target="RFC9461"/>.
The IDELEG RR type inherits its extensibility from the SVCB RR type, which is designed to be extensible to support future uses (such as keys for encrypting the TLS ClientHello <xref target="I-D.ietf-tls-esni"/>.)</t>
      </section>
      <section anchor="note-to-the-rfc-editor-please-remove-this-subsection-before-publication">
        <name><em>Note to the RFC Editor</em>: please remove this subsection before publication.</name>
        <t>The name IDELEG is chosen to avoid confusion with <xref target="I-D.wesplaap-deleg"/>.</t>
      </section>
      <section anchor="outsourcing">
        <name>Outsourcing operation of the delegation</name>
        <t>Delegation information is stored at an authoritative location in the zone with this mechanism.
Legacy methods to redirect this information to another location, possible under the control of another operator, such as (CNAME <xref section="3.6.2" sectionFormat="of" target="RFC1034"/>) and DNAME <xref target="RFC6672"/> remain functional.
One could even outsource all delegation operational practice to another party with an DNAME on the <tt>_deleg</tt> label on the apex of the delegating zone.</t>
        <t>Additional to the legacy methods, a delegation may be outsourced to a third parties by having RRs in AliasMode.
Unlike SVCB, IDELEG allows for more than a single IDELEG RR in AliasMode in a IDELEG RRset, enabling outsourcing a delegation to multiple different operators.</t>
      </section>
      <section anchor="dnssec-protection">
        <name>DNSSEC protection of the delegation</name>
        <t>With legacy delegations, the NS RRset at the parent side of a delegation as well as glue records for the names in the NS RRset are not authoritative and not DNSSEC signed.
An adversary that is able to spoof a referral response, can alter this information and redirect all traffic for the delegation to a rogue name server undetected.
The adversary can then perceive all queries for the redirected zone (Privacy concern) and alter all unsigned parts of responses (such as further referrals, which is a Security concern).</t>
        <t>DNSSEC protection of delegation information prevents that, and is the only countermeasure that also works against on-path attackers.
At the time of writing, the only way to DNSSEC validate and verify delegations at all levels in the DNS hierarchy is to revalidate delegations <xref target="I-D.ietf-dnsop-ns-revalidation"/>, which is done after the fact and has other security concerns (<xref section="7" sectionFormat="of" target="I-D.ietf-dnsop-ns-revalidation"/>).</t>
        <t>Direct delegation information (provided by IDELEG RRs in ServiceMode) includes the hostnames of the authoritative name servers for the delegation as well as IP addresses for those hostnames.
Since the information is stored authoritatively in the delegating zone, it will be DNSSEC signed if the zone is signed.
When the delegation is outsourced, then it's protected when the zones providing the aliasing resource records <em>and</em> the zones serving the targets of the aliases are all DNSSEC signed.</t>
      </section>
      <section anchor="deployability">
        <name>Maximize ease of deployment</name>
        <t>Delegation information is stored authoritatively within the delegation zone.
No semantic changes as to what zones are authoritative for what data are needed.
As a consequence, existing DNS software, such as authoritative name servers and DNSSEC signing software, can remain unmodified.
Unmodified authoritative name server software will serve the delegation information when queried for.
Unmodified signers will sign the delegation information in the delegating zone.
Only the recursive resolver needs modification to follow referrals as provided by the delegation information.</t>
        <t>Such a resolver would explicitly query for the delegations administered as specified in <xref target="delegation-administration"/>.
The number of round trips from the recursive resolver to the authoritative name server is comparable to what is needed for DNS Query Name Minimisation <xref target="RFC9156"/>.
Additional implementation in the authoritative name server optimizes resolution and reduces the number of simultaneous in parallel queries to that what would be needed for legacy delegations.
None, mixed or full deployment of the mechanism on authoritative name servers are all fully functional, allowing for the mechanism to be incrementally deployed on the authoritative name servers.</t>
        <t>Implementation in the recursive may be less demanding with respect to (among other things) DNSSEC validation because there is no need to make additional exceptions as to what is authoritative at the parent side of a delegation.</t>
      </section>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <t>This document follows terminology as defined in <xref target="BCP219"/>.</t>
        <t>Throughout this document we will also use terminology with the meaning as defined below:</t>
        <dl newline="true">
          <dt>Incremental deleg:</dt>
          <dd>
            <t>The delegation mechanism as specified in this document.</t>
          </dd>
          <dt>Incremental delegation:</dt>
          <dd>
            <t>A delegation as specified in this document</t>
          </dd>
          <dt>Legacy delegations:</dt>
          <dd>
            <t>The way delegations are done in the DNS traditionally as defined in <xref target="STD13"/>.</t>
          </dd>
          <dt>Delegating zone:</dt>
          <dd>
            <t>The zone in which the delegation is administered.
Sometimes also called the "parent zone" of a delegation.</t>
          </dd>
          <dt>Subzone:</dt>
          <dd>
            <t>The zone that is delegated to from the delegating zone.</t>
          </dd>
          <dt>Delegating name:</dt>
          <dd>
            <t>The name which realizes the delegation.
In legacy delegations, this name is the same as the name of the subzone to which the delegation refers.
Delegations described in this document are provided with a different name than the zone that is delegated to.</t>
          </dd>
          <dt>Delegation point:</dt>
          <dd>
            <t>The location in the delegating zone where the RRs are provided that make up the delegation.
In legacy delegations, this is the parent side of the zone cut and has the same name as the subzone.
With incremental deleg, this is the location given by the delegating name.</t>
          </dd>
          <dt>Triggering query:</dt>
          <dd>
            <t>The query on which resolution a recursive resolver is working.</t>
          </dd>
          <dt>Target zone:</dt>
          <dd>
            <t>The zone for which the authoritative servers, that a resolver contacts while iterating, are authoritative.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="the-deleg-resource-record-type">
      <name>The IDELEG resource record type</name>
      <t>The IDELEG RR type is a variant of SVCB <xref target="RFC9460"/> for use with resolvers to perform iterative resolution (<xref section="5.3.3" sectionFormat="of" target="RFC1034"/>).
The IDELEG type requires registration in the "Resource Record (RR) TYPEs" registry under the "Domain Name System (DNS) Parameters" registry group (see <xref target="deleg-rr-type">IDELEG RR type</xref>).
The protocol-specific mapping specification for iterative resolutions are the same as those for "DNS Servers" <xref target="RFC9461"/>.</t>
      <t><xref section="2.4.2" sectionFormat="of" target="RFC9460"/> states that SVCB RRsets <bcp14>SHOULD</bcp14> only have a single RR in AliasMode, and that if multiple AliasMode RRs are present, clients or recursive resolvers <bcp14>SHOULD</bcp14> pick one at random.
Different from SVCB (<xref section="2.4.2" sectionFormat="of" target="RFC9460"/>), IDELEG allows for multiple AliasMode RRs to be present in a single IDELEG RRset.
Note however that the target of a IDELEG RR in AliasMode is a SVCB RRset for the "dns" service type adhering fully to the Service Binding Mapping for DNS Servers as specified in <xref target="RFC9461"/>.</t>
      <t><xref section="2.4.1" sectionFormat="of" target="RFC9460"/> states that within an SVCB RRset, all RRs <bcp14>SHOULD</bcp14> have the same mode, and that if an RRset contains a record in AliasMode, the recipient <bcp14>MUST</bcp14> ignore any ServiceMode records in the set.
Different from SVCB, mixed ServiceMode and AliasMode RRs are allowed in a IDELEG RRset.</t>
      <!-- TODO: Describe how priorities work; First pick one AliasMode or all ServiceMode RRs from within the IDELEG RRset; Then within resulting SVCB or IDELEG in ServiceMode RRset adhere to ServicePriority) -->

<t>At the delegation point (for example <tt>customer._deleg.example.</tt>), the host names of the authoritative name servers for the subzone, are given in the TargetName RDATA field of IDELEG records in ServiceMode.
Port Prefix Naming <xref section="3" sectionFormat="of" target="RFC9461"/> is not used at the delegation point, but <bcp14>MUST</bcp14> be used when resolving the aliased to name servers with IDELEG RRs in AliasMode.</t>
    </section>
    <section anchor="delegation-administration">
      <name>Delegation administration</name>
      <t>An extensible delegation is realized with a IDELEG Resource Record set (RRset) <xref target="RFC9460"/> below a specially for the purpose reserved label with the name <tt>_deleg</tt> at the apex of the delegating zone.
The <tt>_deleg</tt> label scopes the interpretation of the IDELEG records and requires registration in the "Underscored and Globally Scoped DNS Node Names" registry (see <xref target="node-name">_deleg Node Name</xref>).
The full scoping of delegations includes the labels that are <strong>below</strong> the <tt>_deleg</tt> label and those, together with the name of the delegating domain, make up the name of the subzone to which the delegation refers.
For example, if the delegating zone is <tt>example.</tt>, then a delegation to subzone <tt>customer.example.</tt> is realized by a IDELEG RRset at the name <tt>customer._deleg.example.</tt> in the parent zone.
A fully scoped delegating name (such as <tt>customer._deleg.example.</tt>) is referred to further in this document as the "delegation point".</t>
      <t>Note that if the delegation is outsourcing to a single operator represented in a single IDELEG RR, it is <bcp14>RECOMMENDED</bcp14> to refer to the name of the operator's IDELEG RRset with a CNAME on the delegation point instead of a IDELEG RR in AliasMode <xref section="10.2" sectionFormat="of" target="RFC9460"/>.</t>
      <section anchor="examples">
        <name>Examples</name>
        <section anchor="one-name-server-within-the-subzone">
          <name>One name server within the subzone</name>
          <figure anchor="zone-within">
            <name>One name server within the subzone</name>
            <sourcecode type="~"><![CDATA[
$ORIGIN example.
@                 IN  SOA    ns zonemaster ...
customer1._deleg  IN  IDELEG 1 ( ns.customer1
                                 ipv4hint=198.51.100.1,203.0.113.1
                                 ipv6hint=2001:db8:1::1,2001:db8:2::1
                               )
]]></sourcecode>
          </figure>
        </section>
        <section anchor="two-name-servers-within-the-subzone">
          <name>Two name servers within the subzone</name>
          <figure anchor="zones-within">
            <name>Two name servers within the subzone</name>
            <artwork><![CDATA[
$ORIGIN example.
@                 IN  SOA    ns zonemaster ...
customer2._deleg  IN  IDELEG 1 ns1.customer2 ( ipv4hint=198.51.100.1
                                               ipv6hint=2001:db8:1::1
                                             )
                  IN  IDELEG 1 ns2.customer2 ( ipv4hint=203.0.113.1
                                               ipv6hint=2001:db8:2::1
                                             )
]]></artwork>
          </figure>
        </section>
        <section anchor="outsourced-to-an-operator">
          <name>Outsourced to an operator</name>
          <figure anchor="outsourced-cname">
            <name>Outsourced with CNAME</name>
            <artwork><![CDATA[
$ORIGIN example.
@                 IN  SOA   ns zonemaster ...
customer3._deleg  IN  CNAME _dns.ns.operator1
]]></artwork>
          </figure>
          <t>Instead of using CNAME, the outsourcing could also been accomplished with a IDELEG RRset with a single IDELEG RR in AliasMode.
The configuration below is operationally equivalent to the CNAME configuration above.
It is <bcp14>RECOMMENDED</bcp14> to use a CNAME over a IDELEG RRset with a single IDELEG RR in AliasMode (<xref section="10.2" sectionFormat="of" target="RFC9460"/>).
Note that a IDELEG RRset refers with TargetName to an DNS service, which will be looked up using Port Prefix Naming <xref section="3" sectionFormat="of" target="RFC9461"/>, but that CNAME refers to the domain name of the target IDELEG RRset (or CNAME) which may have an <tt>_dns</tt> prefix.</t>
          <figure anchor="outsourced-svcb">
            <name>Outsourced with an AliasMode IDELEG RR</name>
            <artwork><![CDATA[
$ORIGIN example.
@                 IN  SOA    ns zonemaster ...
customer3._deleg  IN  IDELEG 0 ns.operator1
]]></artwork>
          </figure>
          <t>The operator IDELEG RRset could for example be:</t>
          <figure anchor="operator-zone">
            <name>Operator zone</name>
            <artwork><![CDATA[
$ORIGIN operator1.example.
@                 IN  SOA    ns zonemaster ...
_dns.ns           IN  IDELEG 1 ns ( alpn=h2,dot,h3,doq
                                    ipv4hint=192.0.2.1
                                    ipv6hint=2001:db8:3::1
                                    dohpath=/q{?dns}
                                  )
                  IN  IDELEG 2 ns ( ipv4hint=192.0.2.2
                                    ipv6hint=2001:db8:3::2
                                  )
ns                IN  AAAA   2001:db8:3::1
                  IN  AAAA   2001:db8:3::2
                  IN  A      192.0.2.1
                  IN  A      192.0.2.2
]]></artwork>
          </figure>
        </section>
        <section anchor="dnssec-signed-name-servers-within-the-subzone">
          <name>DNSSEC signed name servers within the subzone</name>
          <figure anchor="dnssec-zone">
            <name>DNSSEC signed incremental deleg zone</name>
            <artwork><![CDATA[
$ORIGIN
@                 IN  SOA    ns zonemaster ...
                  IN  RRSIG  SOA ...
                  IN  DNSKEY 257 3 15 ...
                  IN  RRSIG  DNSKEY ...
                  IN  NS     ns.example.
                  IN  NSEC   customer5._deleg SOA RRSIG NSEC DNSKEY
                  IN  RRSIG  NSEC ...

customer5._deleg  IN  IDELEG 1 ns.customer5 alpn=h2,h3 (
                                            ipv4hint=198.51.100.5
                                            ipv6hint=2001:db8:5::1
                                            dohpath=/dns-query{?dns}
                                            )
                  IN  RRSIG  IDELEG ...
                  IN  NSEC   customer7._deleg RRSIG NSEC IDELEG
                  IN  RRSIG  NSEC ...

customer7._deleg  IN  CNAME  customer5._deleg
                  IN  RRSIG  CNAME ...
                  IN  NSEC   customer5 CNAME RRSIG NSEC
                  IN  RRSIG  NSEC ...

customer5         IN  NS     ns.customer5
ns.customer5      IN  A      198.51.100.5
                  IN  AAAA   2001:db8:5::1
customer5         IN  DS     17405 15 2 ...
                  IN  RRSIG  DS ...
                  IN  NSEC   customer6 NS DS RRSIG NSEC
                  IN  RRSIG  NSEC ...

customer6         IN  NS     ns.customer6
ns.customer6      IN  A      203.0.113.1
                  IN  AAAA   2001:db8:6::1
customer6         IN  DS     ...
                  IN  RRSIG  DS ...
                  IN  NSEC   customer7 NS DS RRSIG NSEC
                  IN  RRSIG  NSEC ...

customer7         IN  NS     ns.customer5
                  IN  DS     ...
                  IN  RRSIG  DS ...
                  IN  NSEC   example. NS DS RRSIG NSEC
                  IN  RRSIG  NSEC ...
]]></artwork>
          </figure>
          <t><tt>customer5.example.</tt> is delegated to in an extensible way and <tt>customer6.example.</tt> is delegated only in a legacy way.
<tt>customer7.example.</tt>'s delegation is outsourced to customer5's delegation.</t>
          <t>The delegation signals that the authoritative name server supports DoH.
<tt>customer5.example.</tt>, <tt>customer6.example.</tt> and <tt>example.</tt> are all DNSSEC signed.
The DNSSEC authentication chain links from <tt>example.</tt> to <tt>customer5.example.</tt> in the for DNSSEC conventional way with the signed <tt>customer5.example. DS</tt> RRset in the <tt>example.</tt> zone.
Also, <tt>customer6.example.</tt> is linked to from <tt>example.</tt> with the signed <tt>customer6.example. DS</tt> RRset in the <tt>example.</tt> zone.</t>
          <t>Note that both <tt>customer5.example.</tt> and <tt>customer6.example.</tt> have legacy delegations in the zone as well.
It is important to have those legacy delegations to maintain support for legacy resolvers, that do not support incremental deleg.
DNSSEC signers <bcp14>SHOULD</bcp14> construct the NS RRset and glue for the legacy delegation from the IDELEG RRset.</t>
        </section>
      </section>
    </section>
    <section anchor="minimal-implementation">
      <name>Minimal implementation</name>
      <t>Support in recursive resolvers suffices for the mechanism to be fully functional.
<xref target="recursive-resolver-behavior"/> specifies the basic algorithm for resolving incremental delegations.
In <xref target="presence"/>, an optimization is presented that will reduce the number of (parallel) queries especially for when authoritative name server support is still lacking and there are still many zones that do not contain incremental delegations.</t>
      <section anchor="recursive-resolver-behavior">
        <name>Recursive Resolver behavior</name>
        <t>If the triggering query name is the same as the name of the target zone apex, then no further delegation will occur, and resolution will complete.
No special behavior or processing is needed.</t>
        <t>Otherwise, the triggering query is below the target zone apex and a delegation may exist in the target zone.
In this case two parallel queries <bcp14>MUST</bcp14> be sent.
One for the triggering query in the way that is conventional with legacy delegations (which could be just the triggering query or a minimised query <xref target="RFC9156"/>), and one <em>incremental deleg query</em> with query type IDELEG.</t>
        <t>The incremental deleg query name is constructed by concatenating the first label below the part that the triggering query name has in common with the target zone, a <tt>_deleg</tt> label and the name of the target zone.
For example if the triggering query is <tt>www.customer.example.</tt> and the target zone <tt>example.</tt>, then the incremental deleg query name is <tt>customer._deleg.example.</tt>
For another example, if the triggering query is <tt>www.faculty.university.example.</tt> and the target zone <tt>example.</tt> then the incremental deleg name is <tt>university._deleg.example.</tt></t>
        <t>Normal DNAME, CNAME and IDELEG in AliasMode processing should happen as before, though note that when following a IDELEG RR in AliasMode the target RR type is SVCB (see <xref target="the-deleg-resource-record-type"/>).
The eventual incremental deleg query response, after following all redirections caused by DNAME, CNAME and AliasMode IDELEG RRs, has three possible outcomes:</t>
        <ol spacing="normal" type="1"><li>
            <t>A IDELEG RRset in ServiceMode is returned in the response's answer section containing the delegation for the subzone.  </t>
            <t>
The IDELEG RRs in the RRset <bcp14>MUST</bcp14> be used to follow the referral.
The TargetName data field in the IDELEG RRs in the RRset <bcp14>MUST</bcp14> be used as the names for the name servers to contact for the subzone, and the ipv4hint and ipv6hint parameters <bcp14>MUST</bcp14> be used as the IP addresses for the TargetName in the same IDELEG RR.  </t>
            <t>
The NS RRset and glue, in the response of the legacy query that was sent in parallel to the incremental deleg query, <bcp14>MUST NOT</bcp14> be used, but the signed DS record (or NSEC(3) records indicating that there was no DS) <bcp14>MUST</bcp14> be used in linking the DNSSEC authentication chain as which would conventionally be done with DNSSEC as well.</t>
          </li>
          <li>
            <t>The incremental deleg query name does not exist (NXDOMAIN).  </t>
            <t>
There is no incremental delegation for the subzone, and the referral response for the legacy delegation <bcp14>MUST</bcp14> be processed  as would be done with legacy DNS and DNSSEC processing.</t>
          </li>
          <li>
            <t>The incremental deleg query name does exist, but resulted in a NOERROR no answer response (also known as a NODATA response).  </t>
            <t>
If the legacy query, did result in a referral for the same number of labels as the subdomain that the incremental deleg query was for, then there was no incremental delegation for the subzone, and the referral response for the legacy delegation <bcp14>MUST</bcp14> be processed as would be done with legacy DNS and DNSSEC processing.  </t>
            <t>
Otherwise, the subzone may be more than one label below the delegating zone.  </t>
            <t>
If the response to the legacy query resulted in a referral, then a new incremental deleg query <bcp14>MUST</bcp14> be spawned, matching the zone cut of the legacy referral response.
For example if the triggering query is <tt>www.university.ac.example.</tt> and the target zone <tt>example.</tt>, and the legacy response contained an NS RRset for <tt>university.ac.example.</tt>, then the incremental deleg query name is <tt>university.ac._deleg.example.</tt>
The response to the new incremental deleg query <bcp14>MUST</bcp14> be processed as described above, as if it was the initial incremental deleg query.  </t>
            <t>
If the legacy query was sent minimised and needs a followup query, then parallel to that followup query a new incremental deleg query will be sent, adding a single label to the previous incremental deleg query name.
For example if the triggering query is <tt>www.university.ac.example.</tt> and the target zone is <tt>example.</tt> and the minimised legacy query name is <tt>ac.example.</tt> (which also resulted in a NOERROR no answer response), then the incremental deleg query to be sent along in parallel with the followup legacy query will become <tt>university.ac.example.</tt>
Processing of the responses of those two new queries will be done as described above.</t>
          </li>
        </ol>
      </section>
      <section anchor="presence">
        <name><tt>_deleg</tt> label presence</name>
        <t>Absence of the <tt>_deleg</tt> label in a zone is a clear signal that the zone does not contain any incremental deleg delegations.
Recursive resolvers <bcp14>SHOULD NOT</bcp14> send any additional incremental deleg queries for zones for which it is known that it does not contain the <tt>_deleg</tt> label at the apex.
The state regarding the presence of the <tt>_deleg</tt> label within a resolver can be "unknown", "known not to be present", or "known to be present".</t>
        <t>The state regarding the presence of the <tt>_deleg</tt> label can be deduced from the response of the incremental deleg query, if the target zone is signed with DNSSEC.
If the target zone is unsigned, the procedure as described in the remainder of this section <bcp14>SHOULD</bcp14> be followed.</t>
        <t>When the presence of a <tt>_deleg</tt> label is "unknown", a <tt>_deleg</tt> presence test query <bcp14>SHOULD</bcp14> be sent in parallel to the next query for the unsigned target zone (though not when the target name server is known to support incremental deleg, which will be discussed in <xref target="authoritative-name-server-support"/>).
The query name for the test query is the <tt>_deleg</tt> label prepended to the apex of zone for which to test presence, with query type A.</t>
        <t>The testing query can have three possible outcomes:</t>
        <ol spacing="normal" type="1"><li>
            <t>The <tt>_deleg</tt> label does not exist within the zone, and an NXDOMAIN response is returned.  </t>
            <t>
The non-existence of the <tt>_deleg</tt> label <bcp14>MUST</bcp14> be cached for the duration indicated by the "minimum" RDATA field of the SOA resource record in the authority section, adjusted to the boundaries for TTL values that the resolver has (<xref section="4" sectionFormat="of" target="RFC8767"/>).
For the period the non-existence of the <tt>_deleg</tt> label is cached, the label is "known not to be present" and the resolver <bcp14>SHOULD NOT</bcp14> send any (additional) incremental deleg queries.</t>
          </li>
          <li>
            <t>The <tt>_deleg</tt> label does exist within the zone but contains no data.
A NOERROR response is returned with no RRs in the answer section.  </t>
            <t>
The existence of the <tt>_deleg</tt> name <bcp14>MUST</bcp14> be cached for the duration indicated by the "minimum" RDATA field of the SOA resource record in the authority section, adjusted to the resolver's TTL boundaries.
For the period the existence of the empty non-terminal at the <tt>_deleg</tt> label is cached, the label is "known to be present" and the resolver <bcp14>MUST</bcp14> send additional incremental deleg queries as described in <xref target="recursive-resolver-behavior"/>.</t>
          </li>
          <li>
            <t>The <tt>_deleg</tt> label does exist within the zone and contains data.
A NOERROR response is returned with an A RRset in the answer section.  </t>
            <t>
The resolver <bcp14>MUST</bcp14> record that the <tt>_deleg</tt> label is known to be present for a duration indicated by A RRset's TTL value, adjusted to the resolver's TTL boundaries, for example by caching the RRset.
For the period any RRset at the <tt>_deleg</tt> label is cached, the label is "known to be present" and the resolver <bcp14>MUST</bcp14> send additional incremental deleg queries as described in <xref target="recursive-resolver-behavior"/>.</t>
          </li>
        </ol>
      </section>
    </section>
    <section anchor="optimized-implementation">
      <name>Optimized implementation</name>
      <t>Support for authoritative name servers enables optimized query behavior by resolvers with reduced (simultaneous) queries.
<xref target="authoritative-name-server-support"/> specifies how incremental deleg supporting authoritative name servers return referral responses for delegations.
In <xref target="behavior-with-auth-support"/> we specify how resolvers can benefit from those authoritative servers.</t>
      <section anchor="authoritative-name-server-support">
        <name>Authoritative name server support</name>
        <t>Incremental delegations supporting authoritative name servers include the incremental delegation information (or the NSEC(3) records showing the non-existence) in the authority section of referral responses to legacy DNS queries.
For example, querying the zone from <xref target="dnssec-zone"/> for <tt>www.customer5.example. A</tt>, will return the following referral response:</t>
        <figure anchor="deleg-response">
          <name>An incremental deleg referral response</name>
          <artwork><![CDATA[
;; ->>HEADER<<- opcode: QUERY, rcode: NOERROR, id: 54349
;; flags: qr ; QUERY: 1, ANSWER: 0, AUTHORITY: 5, ADDITIONAL: 2
;; QUESTION SECTION:
;; www.customer5.example.       IN      A

;; ANSWER SECTION:

;; AUTHORITY SECTION:
customer5.example.      3600    IN      NS      ns.customer5.example.
customer5.example.      3600    IN      DS      ...
customer5.example.      3600    IN      RRSIG   DS ...
customer5._deleg.example.       3600    IN      IDELEG 1 (
                ns.customer5.example. alpn=h2,h3
                ipv4hint=198.51.100.5 ipv6hint=2001:db8:5::1
                dohpath=/dns-query{?dns}
                )
customer5._deleg.example.       3600    IN      RRSIG   IDELEG ...

;; ADDITIONAL SECTION:
ns.customer5.example.   3600    IN      A       198.51.100.5
ns.customer5.example.   3600    IN      AAAA    2001:db8:5::1

;; Query time: 0 msec
;; EDNS: version 0; flags: do ; udp: 1232
;; SERVER: 192.0.2.53
;; WHEN: Mon Feb 24 20:36:25 2025
;; MSG SIZE  rcvd: 456
]]></artwork>
        </figure>
        <t>The referral response in <xref target="deleg-response"/> includes the signed IDELEG RRset in the authority section.</t>
        <t>As another example, querying the zone from <xref target="dnssec-zone"/> for <tt>www.customer6.example. A</tt>, will return the following referral response:</t>
        <figure anchor="no-incr-deleg-response">
          <name>Referral response without incremental deleg</name>
          <artwork><![CDATA[
;; ->>HEADER<<- opcode: QUERY, rcode: NOERROR, id: 36574
;; flags: qr ; QUERY: 1, ANSWER: 0, AUTHORITY: 9, ADDITIONAL: 2
;; QUESTION SECTION:
;; www.customer6.example.       IN      A

;; ANSWER SECTION:

;; AUTHORITY SECTION:
customer6.example.      3600    IN      NS      ns.customer6.example.
customer6.example.      3600    IN      DS      ...
customer6.example.      3600    IN      RRSIG   DS ...
customer5._deleg.example.       1234    IN      NSEC    (
                customer7._deleg.example.  RRSIG NSEC IDELEG )
customer5._deleg.example.       1234    IN      RRSIG   NSEC ...
example.        1234    IN      NSEC    (
                customer5._deleg.example.  NS SOA RRSIG NSEC DNSKEY )
example.        1234    IN      RRSIG   NSEC ...

;; ADDITIONAL SECTION:
ns.customer6.example.   3600    IN      A       203.0.113.1
ns.customer6.example.   3600    IN      AAAA    2001:db8:6::1

;; Query time: 0 msec
;; EDNS: version 0; flags: do ; udp: 1232
;; SERVER: 192.0.2.53
;; WHEN: Tue Feb 25 10:23:53 2025
;; MSG SIZE  rcvd: 744
]]></artwork>
        </figure>
        <t>Next to the legacy delegation, the incremental deleg supporting authoritative returns the NSEC(3) RRs needed to show that there was no incremental delegation in the referral response in <xref target="no-incr-deleg-response"/>.</t>
        <t>Querying the zone from <xref target="dnssec-zone"/> for <tt>www.customer7.example. A</tt>, will return the following referral response:</t>
        <figure anchor="alias-response">
          <name>Aliasing referral response</name>
          <artwork><![CDATA[
;; ->>HEADER<<- opcode: QUERY, rcode: NOERROR, id: 9456
;; flags: qr ; QUERY: 1, ANSWER: 0, AUTHORITY: 7, ADDITIONAL: 2
;; QUESTION SECTION:
;; www.customer7.example.       IN      A

;; ANSWER SECTION:

;; AUTHORITY SECTION:
customer7.example.      3600    IN      NS      ns.customer5.example.
customer7.example.      3600    IN      DS      ...
customer7.example.      3600    IN      RRSIG   DS ...
customer7._deleg.example.       3600    IN      CNAME   (
                customer5._deleg.example. )
customer7._deleg.example.       3600    IN      RRSIG   CNAME ...
customer5._deleg.example.       3600    IN      IDELEG   1 (
                ns.customer5.example. alpn=h2,h3
                ipv4hint=198.51.100.5 ipv6hint=2001:db8:5::1 )
customer5._deleg.example.       3600    IN      RRSIG   IDELEG ...

;; ADDITIONAL SECTION:
ns.customer5.example.   3600    IN      A       198.51.100.5
ns.customer5.example.   3600    IN      AAAA    2001:db8:5::1

;; Query time: 0 msec
;; EDNS: version 0; flags: do ; udp: 1232
;; SERVER: 192.0.2.53
;; WHEN: Tue Feb 25 10:55:07 2025
;; MSG SIZE  rcvd: 593
]]></artwork>
        </figure>
        <t>The incremental delegation of <tt>customer7.example.</tt> is aliased to the one that is also used by <tt>customer5.example.</tt>
Since both delegations are in the same zone, the authoritative name server for <tt>example.</tt> returns both the CNAME realising the alias, as well as the IDELEG RRset which is the target of the alias in <xref target="alias-response"/>.
In other cases an returned CNAME or IDELEG RR in AliasMode may need further chasing by the resolver.
<!-- TODO: Add an AliasMode referral without expansion within the zone -->
        </t>
        <t>With unsigned zones, only if an incremental deleg delegation exists, the IDELEG RRset (or CNAME) will be present in the authority section of referral responses.
<!-- TODO: Add a referral response for an unsigned zone -->
If the incremental deleg does not exist, then it is simply absent from the authority section and the referral response is indistinguishable from an non supportive authoritative.
<!-- TODO: Add a non incremental deleg referral response for an unsigned zone -->
        </t>
      </section>
      <section anchor="behavior-with-auth-support">
        <name>Resolver behavior with authoritative name server support</name>
        <t>Incremental deleg supporting authoritative name servers will include the incremental delegation information (or the NSEC(3) records showing the non-existence) in the authority section of referral responses.
If it is known that an authoritative name server supports incremental deleg, then no direct queries for the incremental delegation need to be sent in parallel to the legacy delegation query.
A resolver <bcp14>SHOULD</bcp14> register that an authoritative name server supports incremental deleg when the authority section, of the returned referral responses from that authoritative name server, contains incremental delegation information.</t>
        <t>When the authority section of a referral response contains a IDELEG RRset or a CNAME on the incremental delegation name, or valid NSEC(3) RRs showing the non-existence of such IDELEG or CNAME RRset, then the resolver <bcp14>SHOULD</bcp14> register that the contacted authoritative name server supports incremental deleg for the duration indicated by the TTL for that IDELEG, CNAME or NSEC(3) RRset, adjusted to the resolver's TTL boundaries, but only if it is longer than any already registered duration.
Subsequent queries <bcp14>SHOULD NOT</bcp14> include incremental deleg queries, as described in <xref target="recursive-resolver-behavior"/>, to be send in parallel for the duration support for incremental deleg is registered for the authoritative name server.</t>
        <t>For example, in <xref target="deleg-response"/>, the IDELEG RRset at the incremental delegation point has TTL 3600.
The resolver should register that the contacted authoritative name server supports incremental deleg for (at least) 3600 seconds (one hour).
All subsequent queries to that authoritative name server <bcp14>SHOULD NOT</bcp14> include incremental deleg queries to be send in parallel.</t>
        <t>If the authority section contains more than one RRset making up the incremental delegation, then the RRset with the longest TTL <bcp14>MUST</bcp14> be taken to determine the duration for which incremental deleg support is registered.</t>
        <t>For example, in <xref target="alias-response"/>, both a CNAME and a IDELEG RRset for the incremental delegation are included in the authority section.
The longest TTL must be taken for incremental support registration, though because the TTL of both RRsets is 3600, it does not matter in this case.</t>
        <t>With DNSSEC signed zones, support is apparent with all referral responses, with unsigned zones only from referral responses for which an incremental delegation exists.</t>
        <t>If the resolver knows that the authoritative name server supports incremental deleg, <em>and</em> a DNSSEC signed zone is being served, then all referrals <bcp14>MUST</bcp14> contain either an incremental delegation, or NSEC(3) records showing that the delegation does not exist.
If a referral is returned that does not contain an incremental delegation nor an indication that it does not exist, then the resolver <bcp14>MUST</bcp14> send an additional incremental deleg query to find the incremental delegation (or denial of its existence).</t>
      </section>
    </section>
    <section anchor="extra-optimized-implementation">
      <name>Extra optimized implementation</name>
      <t>A IDELEG RRset on an incremental delegation point, with a IDELEG RR in AliasMode, aliasing to the root zone, <bcp14>MUST</bcp14> be interpreted to mean that the legacy delegation information <bcp14>MUST</bcp14> be used to follow the referral.
All service parameters for such AliasMode (aliasing to the root) IDELEG RRs on the incremental delegation point, <bcp14>MUST</bcp14> be ignored.</t>
      <t>For example, such a IDELEG RRset registered on the wildcard below the <tt>_deleg</tt> label on the apex of a zone, can signal that legacy DNS referrals <bcp14>MUST</bcp14> be used for both signed and <em>unsigned</em> zones:</t>
      <figure anchor="wildcard-deleg">
        <name>Wildcard incremental deleg to control duration of detected support</name>
        <artwork><![CDATA[
$ORIGIN example.
@                 IN  SOA   ns zonemaster ...
*._deleg   86400  IN  IDELEG 0 .
customer1._deleg  IN  IDELEG 1 ( ns.customer1
                                 ipv4hint=198.51.100.1,203.0.113.1
                                 ipv6hint=2001:db8:1::1,2001:db8:2::1
                               )
customer3._deleg  IN  CNAME _dns.ns.operator1
]]></artwork>
      </figure>
      <t>Resolvers <bcp14>SHOULD</bcp14> register that an authoritative name server supports incremental deleg, if such a IDELEG RRset is returned in the authority section of referral responses, for the duration of the TTL if the IDELEG RRset, adjusted to the resolver's TTL boundaries, but only if it is longer than any already registered duration.
Note that this will also be included in referral responses for unsigned zones, which would otherwise not have signalling of incremental deleg support by the authoritative name server.
Also, signed zones need fewer RRs to indicate that no incremental delegation exists.
The wildcard expansion already shows the closest encloser (i.e. <tt>_deleg.&lt;apex&gt;</tt>), so only one additional NSEC(3) is needed to show non-existence of the queried for name below the closest encloser.</t>
      <t>This method of signalling that the legacy delegation <bcp14>MUST</bcp14> be used, is <bcp14>RECOMMENDED</bcp14>.</t>
    </section>
    <section anchor="priming-queries">
      <name>Priming queries</name>
      <t>Some zones, such as the root zone, are targeted directly from hints files.
Information about which authoritative name servers and with capabilities, <bcp14>MAY</bcp14> be provided in a IDELEG RRset directly at the <tt>_deleg</tt> label under the apex of the zone.
Priming queries from a incremental deleg supporting resolver, <bcp14>MUST</bcp14> send an <tt>_deleg.&lt;apex&gt; IDELEG</tt> query in parallel to the legacy <tt>&lt;apex&gt; NS</tt> query and process the content as if it was found through an incremental referral response.</t>
    </section>
    <section anchor="how-does-incremental-deleg-meet-the-requirements">
      <name>How does incremental deleg meet the requirements</name>
      <t>This section will discuss how incremental deleg meets the requirements for a new delegation mechanism as described in <xref target="I-D.ietf-deleg-requirements-02"/></t>
      <ul spacing="normal">
        <li>
          <t>H1. DELEG must not disrupt the existing registration model of domains.  </t>
          <t>
The existing zone structure including the concept of delegations from
a parent zone to a child zone is left unchanged.</t>
        </li>
        <li>
          <t>H2. DELEG must be backwards compatible with the existing ecosystem.  </t>
          <t>
The new delegations do not interfere with legacy software.  </t>
          <t>
The behavior of incremental deleg-aware resolvers includes a fallback to NS
records if no incremental delegation is present (See <xref target="recursive-resolver-behavior"/>).</t>
        </li>
        <li>
          <t>H3. DELEG must not negatively impact most DNS software.  </t>
          <t>
Incremental deleg introduces a new RR type.
Software that parses zone file format needs to be changed to support the new
type.
Though unknown type notation <xref target="RFC3597"/> can be used in some cases if no support for the new RR type is present.
Existing authoritatives can serve incremental deleg zones (though less efficiently), existing signers can sign incremental deleg zones, existing diagnostic tools can query incremental deleg zones.
Non-recursive DNSSEC validators can operate independently from (possibly legacy) recursive resolvers.</t>
        </li>
        <li>
          <t>H4. DELEG must be able to secure delegations with DNSSEC.  </t>
          <t>
Incremental delegations are automatically secured with DNSSEC
(if the parent zone is signed). A replacement for DS records is described in <xref target="I-D.homburg-deleg-incremental-dnssec"/>.</t>
        </li>
        <li>
          <t>H5. DELEG must support updates to delegation information with the same relative ease as currently exists with NS records.  </t>
          <t>
Incremental delegations are affected by TTL like any other
DNS record.</t>
        </li>
        <li>
          <t>H6. DELEG must be incrementally deployable and not require any sort of flag day of universal change.  </t>
          <t>
Incremental deleg zones can be added without upgrading authoritatives.
Incremental deleg zones still work with old resolvers and validators.
Basically any combination of old and new should work, though with
reduced efficiency for some combinations.</t>
        </li>
        <li>
          <t>H7. DELEG must allow multiple independent operators to simultaneously serve a zone.  </t>
          <t>
Incremental deleg allows for multiple IDELEG records. This allows
multiple operators to serve the zone.</t>
        </li>
        <li>
          <t>S1. DELEG should facilitate the use of new DNS transport mechanisms  </t>
          <t>
New transports are already defined for the DNS mode of SVCB (<xref target="RFC9461"/>).
The same parameters are used for IDELEG.</t>
        </li>
        <li>
          <t>S2. DELEG should make clear all of the necessary details for contacting a service  </t>
          <t>
Most of the needed SVCB parameters are already defined in existing standards.
The exception is a replacement for the DS records, which is described in <xref target="I-D.homburg-deleg-incremental-dnssec"/>.</t>
        </li>
        <li>
          <t>S3. DELEG should minimize transaction cost in its usage.  </t>
          <t>
Assuming Qname-minimisation, there are no extra queries needed in most cases
if the authoritative name server has incremental deleg support. The exception
is when the parent zone is not signed and has no incremental deleg records.
In that case, one extra query is needed when the parent zone is first
contacted (and every TTL).  </t>
          <t>
Additional queries may be needed to resolve aliases.</t>
        </li>
        <li>
          <t>S4. DELEG should simplify management of a zone's DNS service.  </t>
          <t>
Zone management can be simplified using the alias mode of IDELEG.
This allows the zone operator to change the details of the delegation
without involving the parent zone.  </t>
          <t>
Draft <xref target="I-D.homburg-deleg-incremental-dnssec"/> defines the dnskeyref parameter which offers the same simplification for DNSSEC delegations.</t>
        </li>
        <li>
          <t>S5. DELEG should allow for backward compatibility to the conventional NS-based delegation mechanism.  </t>
          <t>
NS records and glue can be extracted from the IDELEG record assuming no aliasing is used.  </t>
          <t>
The ds parameter in <xref target="I-D.homburg-deleg-incremental-dnssec"/> has the same value as the rdata of a DS record.</t>
        </li>
        <li>
          <t>S6. DELEG should be extensible and allow for the easy incremental addition of new delegation features after initial deployment.  </t>
          <t>
SVCB-style records are extensible by design.</t>
        </li>
        <li>
          <t>S7. DELEG should be able to convey a security model for delegations stronger than currently exists with DNSSEC.  </t>
          <t>
Increment delegations are protected by DNSSEC, unlike
NS records at the parent zone.</t>
        </li>
      </ul>
    </section>
    <section anchor="comparison-with-other-delegation-mechanisms">
      <name>Comparison with other delegation mechanisms</name>
      <t>Table <xref target="xtraqueries"/> provides an overview of when extra queries, in parallel to the legacy query, are sent.</t>
      <table anchor="xtraqueries">
        <name>Additional queries in parallel to the legacy query</name>
        <thead>
          <tr>
            <th align="center"> </th>
            <th align="center">apex query</th>
            <th align="center">auth support</th>
            <th align="center">_deleg presence</th>
            <th align="left"> </th>
            <th align="center">&lt;sub&gt;._deleg.&lt;apex&gt; IDELEG</th>
            <th align="center">_deleg.&lt;apex&gt; A</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="center">1</td>
            <td align="center">Yes</td>
            <td align="center">*</td>
            <td align="center">*</td>
            <td align="left"> </td>
            <td align="center"> </td>
            <td align="center"> </td>
          </tr>
          <tr>
            <td align="center">2</td>
            <td align="center">No</td>
            <td align="center">*</td>
            <td align="center">No</td>
            <td align="left"> </td>
            <td align="center"> </td>
            <td align="center"> </td>
          </tr>
          <tr>
            <td align="center">3</td>
            <td align="center">No</td>
            <td align="center">Yes</td>
            <td align="center">*</td>
            <td align="left"> </td>
            <td align="center"> </td>
            <td align="center"> </td>
          </tr>
          <tr>
            <td align="center">4</td>
            <td align="center">No</td>
            <td align="center">Unknown</td>
            <td align="center">Yes</td>
            <td align="left"> </td>
            <td align="center">X</td>
            <td align="center"> </td>
          </tr>
          <tr>
            <td align="center">5</td>
            <td align="center">No</td>
            <td align="center">Unknown</td>
            <td align="center">Unknown</td>
            <td align="left"> </td>
            <td align="center">X</td>
            <td align="center">only for unsigned zones</td>
          </tr>
        </tbody>
      </table>
      <t>The three headers on the left side of the table mean the following:</t>
      <dl newline="true">
        <dt>apex query:</dt>
        <dd>
          <t>Whether the query is for the apex of the target zone.
"Yes" means an apex query, "No" means a query below the apex which may be delegated</t>
        </dd>
        <dt>auth support:</dt>
        <dd>
          <t>Whether or not the target authoritative server supports incremental deleg.
"Yes" means it supports it and "Unknown" means support is not detected.
"*" means it does not matter</t>
        </dd>
        <dt><tt>_deleg</tt> presence:</dt>
        <dd>
          <t>Whether or not the <tt>_deleg</tt> label is present in the target zone (and thus incremental delegations)</t>
        </dd>
      </dl>
      <t>On the right side of the table are the extra queries, to be sent in parallel with the legacy query.
The <tt>_deleg</tt> presence test query (most right column) only needs to be sent to unsigned target zones, because its non-existence will be show in the NSEC(3) records showing the non-existence of the incremental delegation (second from right column).</t>
      <t>If the query name is the same as the apex of the target zone, no extra queries need to be sent (Row 1).
If the <tt>_deleg</tt> label is known not to exist in the target zone (Row 2) or if the target name server is known to support incremental deleg (Row 3), no extra queries need to be sent.
Only if it is unknown that the target name server supports incremental deleg, and the <tt>_deleg</tt> label is known to exist in the target zone (Row 4) or it is not known whether or not the <tt>_deleg</tt> label exists (Row 5), and extra incremental deleg query is sent in parallel to the legacy query.
If the target zone is unsigned, presence of the <tt>_deleg</tt> label needs to be tested explicitly (Row 5).</t>
      <section anchor="comparison-with-legacy-delegations">
        <name>Comparison with legacy delegations</name>
      </section>
      <section anchor="comparison-with-name-dns-query-name-minimisation">
        <name>Comparison with Name DNS Query Name Minimisation</name>
      </section>
      <section anchor="comparison-with-i-dwesplaap-deleg">
        <name>Comparison with <xref target="I-D.wesplaap-deleg"/></name>
        <table>
          <name>Comparison of [I-D.wesplaap-deleg] with [this document]</name>
          <thead>
            <tr>
              <th align="left">[?I-D.wesplaap-deleg]</th>
              <th align="left">[this document]</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Requires implementation in both authoritative name server as well as in the resolver, DNSSEC signers and validators and all other DNS software</td>
              <td align="left">Only resolver implementation required. But optimized with updated authoritative software.</td>
            </tr>
            <tr>
              <td align="left">DELEG resolvers need to contact DELEG authoritatives directly</td>
              <td align="left">IDELEG resolvers can query for the incremental delegation data, therefore direct contact with IDELEG supporting authoritatives is not necessary. All legacy infrastructure (including forwarders etc.) is supported.</td>
            </tr>
            <tr>
              <td align="left">DNSKEY flag needed to signal IDELEG support with all authoritative name servers that serve the parent (delegating) domain. Special requirements for the child domain.</td>
              <td align="left">No DNSKEY flag needed. Separation of concerns.</td>
            </tr>
            <tr>
              <td align="left">Authoritative name servers need to be updated all at once</td>
              <td align="left">Authoritative name servers may be updated gradually for optimization</td>
            </tr>
            <tr>
              <td align="left">New semantics about what is authoritative (BOGUS with current DNSSEC validators)</td>
              <td align="left">Works with current DNS and DNSSEC semantics. Easier to implement.</td>
            </tr>
            <tr>
              <td align="left">No extra queries</td>
              <td align="left">One extra query, in parallel to the legacy query, <em>per authoritative</em> server when incremental deleg support is not yet detected, and one extra query <em>per unsigned zone</em> to determine presence of the <tt>_deleg</tt> label</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
    <section anchor="implementation-status">
      <name>Implementation Status</name>
      <t><strong>Note to the RFC Editor</strong>: please remove this entire section before publication.</t>
      <t>We are using Rtype 65280 for experiments.</t>
      <t>Jesse van Zutphen has built a proof of concept implementation supporting delegations as specified in this document for the Unbound recursive resolver as part of his master thesis for the Security and Network Engineering master program of the University of Amsterdam. <xref target="JZUTPHEN"/>
The source code of his implementation is available on github <xref target="DELEG4UNBOUND"/></t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Incremental deleg moves the location of  referral information to a unique  location that currently exists. However, as this is a new approach, thought must be given to usage.   There must be some checks to ensure that the registering a _deleg subdomain happens at the time the domain is provisioned. The same care needs to be addressed when a domain is deprovisioned that the _deleg is removed.  This is similar to what happens to NS A records deployed in parent zones to act as Glue.</t>
      <t>While the recommendation is to deploy DNSSEC with incremental deleg, it is not mandatory.  However, using incremental deleg with unsigned zones can create possibilities of domain hijackings. This could  be hard to detect when not speaking directly to the authoritative name server.
This risk of domain hijacking is not expected to increase significantly compared to the situation without incremental deleg.</t>
      <t>There are bound to be other considerations.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="deleg-rr-type">
        <name>IDELEG RR type</name>
        <t>IANA is requested to update the "Resource Record (RR) TYPEs" registry under the "Domain Name System (DNS) Parameters" registry group as follows:</t>
        <table>
          <thead>
            <tr>
              <th align="left">TYPE</th>
              <th align="left">Value</th>
              <th align="left">Meaning</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">IDELEG</td>
              <td align="left">TBD</td>
              <td align="left">Delegation</td>
              <td align="left">[this document]</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="node-name">
        <name>_deleg Node Name</name>
        <t>Per <xref target="RFC8552"/>, IANA is requested to add the following entry to the DNS "Underscored and Globally Scoped DNS Node Names" registry:</t>
        <table>
          <name>Entry in the Underscored and Globally Scoped DNS Node Names registry</name>
          <thead>
            <tr>
              <th align="left">RR Type</th>
              <th align="left">_NODE NAME</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">IDELEG</td>
              <td align="left">_deleg</td>
              <td align="left">[this document]</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <referencegroup anchor="STD13" target="https://www.rfc-editor.org/info/std13">
          <reference anchor="RFC1034" target="https://www.rfc-editor.org/info/rfc1034">
            <front>
              <title>Domain names - concepts and facilities</title>
              <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
              <date month="November" year="1987"/>
              <abstract>
                <t>This RFC is the revised basic definition of The Domain Name System. It obsoletes RFC-882. This memo describes the domain style names and their used for host address look up and electronic mail forwarding. It discusses the clients and servers in the domain name system and the protocol used between them.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="13"/>
            <seriesInfo name="RFC" value="1034"/>
            <seriesInfo name="DOI" value="10.17487/RFC1034"/>
          </reference>
          <reference anchor="RFC1035" target="https://www.rfc-editor.org/info/rfc1035">
            <front>
              <title>Domain names - implementation and specification</title>
              <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
              <date month="November" year="1987"/>
              <abstract>
                <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="13"/>
            <seriesInfo name="RFC" value="1035"/>
            <seriesInfo name="DOI" value="10.17487/RFC1035"/>
          </reference>
        </referencegroup>
        <reference anchor="RFC9460">
          <front>
            <title>Service Binding and Parameter Specification via the DNS (SVCB and HTTPS Resource Records)</title>
            <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
            <author fullname="M. Bishop" initials="M." surname="Bishop"/>
            <author fullname="E. Nygren" initials="E." surname="Nygren"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies the "SVCB" ("Service Binding") and "HTTPS" DNS resource record (RR) types to facilitate the lookup of information needed to make connections to network services, such as for HTTP origins. SVCB records allow a service to be provided from multiple alternative endpoints, each with associated parameters (such as transport protocol configuration), and are extensible to support future uses (such as keys for encrypting the TLS ClientHello). They also enable aliasing of apex domains, which is not possible with CNAME. The HTTPS RR is a variation of SVCB for use with HTTP (see RFC 9110, "HTTP Semantics"). By providing more information to the client before it attempts to establish a connection, these records offer potential benefits to both performance and privacy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9460"/>
          <seriesInfo name="DOI" value="10.17487/RFC9460"/>
        </reference>
        <reference anchor="RFC9461">
          <front>
            <title>Service Binding Mapping for DNS Servers</title>
            <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>The SVCB DNS resource record type expresses a bound collection of endpoint metadata, for use when establishing a connection to a named service. DNS itself can be such a service, when the server is identified by a domain name. This document provides the SVCB mapping for named DNS servers, allowing them to indicate support for encrypted transport protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9461"/>
          <seriesInfo name="DOI" value="10.17487/RFC9461"/>
        </reference>
        <reference anchor="RFC7858">
          <front>
            <title>Specification for DNS over Transport Layer Security (TLS)</title>
            <author fullname="Z. Hu" initials="Z." surname="Hu"/>
            <author fullname="L. Zhu" initials="L." surname="Zhu"/>
            <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="D. Wessels" initials="D." surname="Wessels"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
              <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7858"/>
          <seriesInfo name="DOI" value="10.17487/RFC7858"/>
        </reference>
        <reference anchor="RFC8484">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="RFC9250">
          <front>
            <title>DNS over Dedicated QUIC Connections</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>This document describes the use of QUIC to provide transport confidentiality for DNS. The encryption provided by QUIC has similar properties to those provided by TLS, while QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides more efficient packet-loss recovery than UDP. DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC 7858, and latency characteristics similar to classic DNS over UDP. This specification describes the use of DoQ as a general-purpose transport for DNS and includes the use of DoQ for stub to recursive, recursive to authoritative, and zone transfer scenarios.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9250"/>
          <seriesInfo name="DOI" value="10.17487/RFC9250"/>
        </reference>
        <reference anchor="RFC6672">
          <front>
            <title>DNAME Redirection in the DNS</title>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <author fullname="W. Wijngaards" initials="W." surname="Wijngaards"/>
            <date month="June" year="2012"/>
            <abstract>
              <t>The DNAME record provides redirection for a subtree of the domain name tree in the DNS. That is, all names that end with a particular suffix are redirected to another part of the DNS. This document obsoletes the original specification in RFC 2672 as well as updates the document on representing IPv6 addresses in DNS (RFC 3363). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6672"/>
          <seriesInfo name="DOI" value="10.17487/RFC6672"/>
        </reference>
        <reference anchor="RFC9156">
          <front>
            <title>DNS Query Name Minimisation to Improve Privacy</title>
            <author fullname="S. Bortzmeyer" initials="S." surname="Bortzmeyer"/>
            <author fullname="R. Dolmans" initials="R." surname="Dolmans"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="November" year="2021"/>
            <abstract>
              <t>This document describes a technique called "QNAME minimisation" to improve DNS privacy, where the DNS resolver no longer always sends the full original QNAME and original QTYPE to the upstream name server. This document obsoletes RFC 7816.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9156"/>
          <seriesInfo name="DOI" value="10.17487/RFC9156"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8767">
          <front>
            <title>Serving Stale Data to Improve DNS Resiliency</title>
            <author fullname="D. Lawrence" initials="D." surname="Lawrence"/>
            <author fullname="W. Kumari" initials="W." surname="Kumari"/>
            <author fullname="P. Sood" initials="P." surname="Sood"/>
            <date month="March" year="2020"/>
            <abstract>
              <t>This document defines a method (serve-stale) for recursive resolvers to use stale DNS data to avoid outages when authoritative nameservers cannot be reached to refresh expired data. One of the motivations for serve-stale is to make the DNS more resilient to DoS attacks and thereby make them less attractive as an attack vector. This document updates the definitions of TTL from RFCs 1034 and 1035 so that data can be kept in the cache beyond the TTL expiry; it also updates RFC 2181 by interpreting values with the high-order bit set as being positive, rather than 0, and suggests a cap of 7 days.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8767"/>
          <seriesInfo name="DOI" value="10.17487/RFC8767"/>
        </reference>
        <reference anchor="RFC3597">
          <front>
            <title>Handling of Unknown DNS Resource Record (RR) Types</title>
            <author fullname="A. Gustafsson" initials="A." surname="Gustafsson"/>
            <date month="September" year="2003"/>
            <abstract>
              <t>Extending the Domain Name System (DNS) with new Resource Record (RR) types currently requires changes to name server software. This document specifies the changes necessary to allow future DNS implementations to handle new RR types transparently. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3597"/>
          <seriesInfo name="DOI" value="10.17487/RFC3597"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="DELEG4UNBOUND" target="https://github.com/jessevz/unbound/">
          <front>
            <title>A proof of concept implementation of incremental deleg</title>
            <author initials="J." surname="van Zutphen" fullname="Jesse van Zutphen">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="JZUTPHEN" target="https://nlnetlabs.nl/downloads/publications/extensible-deleg-in-resolvers_2024-07-08.pdf">
          <front>
            <title>Extensible delegations in DNS Recursive resolvers</title>
            <author initials="J." surname="van Zutphen" fullname="Jesse van Zutphen">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="I-D.ietf-tls-esni">
          <front>
            <title>TLS Encrypted Client Hello</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Independent</organization>
            </author>
            <author fullname="Kazuho Oku" initials="K." surname="Oku">
              <organization>Fastly</organization>
            </author>
            <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
              <organization>Cryptography Consulting LLC</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="19" month="February" year="2025"/>
            <abstract>
              <t>   This document describes a mechanism in Transport Layer Security (TLS)
   for encrypting a ClientHello message under a server public key.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/tlswg/draft-ietf-tls-esni
   (https://github.com/tlswg/draft-ietf-tls-esni).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-esni-23"/>
        </reference>
        <reference anchor="I-D.wesplaap-deleg">
          <front>
            <title>Extensible Delegation for DNS</title>
            <author fullname="Tim April" initials="T." surname="April">
              <organization>Google, LLC</organization>
            </author>
            <author fullname="Petr Špaček" initials="P." surname="Špaček">
              <organization>ISC</organization>
            </author>
            <author fullname="Ralf Weber" initials="R." surname="Weber">
              <organization>Akamai Technologies</organization>
            </author>
            <author fullname="David C Lawrence" initials="" surname="Lawrence">
              <organization>Salesforce</organization>
            </author>
            <date day="18" month="February" year="2025"/>
            <abstract>
              <t>   A delegation in the Domain Name System (DNS) is a mechanism that
   enables efficient and distributed management of the DNS namespace.
   It involves delegating authority over subdomains to specific DNS
   servers via NS records, allowing for a hierarchical structure and
   distributing the responsibility for maintaining DNS records.

   An NS record contains the hostname of the nameserver for the
   delegated namespace.  Any facilities of that nameserver must be
   discovered through other mechanisms.  This document proposes a new
   extensible DNS record type, DELEG, for delegation the authority for a
   domain.  Future documents then can use this mechanism to use
   additional information about the delegated namespace and the
   capabilities of authoritative nameservers for the delegated
   namespace.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-wesplaap-deleg-02"/>
        </reference>
        <reference anchor="I-D.ietf-dnsop-ns-revalidation">
          <front>
            <title>Delegation Revalidation by DNS Resolvers</title>
            <author fullname="Shumon Huque" initials="S." surname="Huque">
              <organization>Salesforce</organization>
            </author>
            <author fullname="Paul A. Vixie" initials="P. A." surname="Vixie">
              <organization>SIE Europe, U.G.</organization>
            </author>
            <author fullname="Willem Toorop" initials="W." surname="Toorop">
              <organization>NLnet Labs</organization>
            </author>
            <date day="27" month="February" year="2025"/>
            <abstract>
              <t>   This document recommends improved DNS resolver behavior with respect
   to the processing of Name Server (NS) resource record (RR) sets
   (RRsets) during iterative resolution.  When following a referral
   response from an authoritative server to a child zone, DNS resolvers
   should explicitly query the authoritative NS RRset at the apex of the
   child zone and cache this in preference to the NS RRset on the parent
   side of the zone cut.  The (A and AAAA) address RRsets in the
   additional section from referral responses and authoritative NS
   answers for the names of the NS RRset, should similarly be re-queried
   and used to replace the entries with the lower trustworthiness
   ranking in cache.  Resolvers should also periodically revalidate the
   delegation by re-querying the parent zone at the expiration of the
   TTL of either the parent or child NS RRset, whichever comes first.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dnsop-ns-revalidation-09"/>
        </reference>
        <referencegroup anchor="BCP219" target="https://www.rfc-editor.org/info/bcp219">
          <reference anchor="RFC9499" target="https://www.rfc-editor.org/info/rfc9499">
            <front>
              <title>DNS Terminology</title>
              <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
              <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
              <date month="March" year="2024"/>
              <abstract>
                <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
                <t>This document updates RFC 2308 by clarifying the definitions of "forwarder" and "QNAME". It obsoletes RFC 8499 by adding multiple terms and clarifications. Comprehensive lists of changed and new definitions can be found in Appendices A and B.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="219"/>
            <seriesInfo name="RFC" value="9499"/>
            <seriesInfo name="DOI" value="10.17487/RFC9499"/>
          </reference>
        </referencegroup>
        <reference anchor="I-D.ietf-deleg-requirements-02">
          <front>
            <title>Problem Statement and Requirements for an Improved DNS Delegation Mechanism abbrev: DNS DELEG Requirements</title>
            <author fullname="David C Lawrence" initials="" surname="Lawrence">
              <organization>Salesforce</organization>
            </author>
            <author fullname="Edward Lewis" initials="E." surname="Lewis">
         </author>
            <author fullname="Jim Reid" initials="J." surname="Reid">
         </author>
            <author fullname="Tim Wicinski" initials="T." surname="Wicinski">
              <organization>Cox Communications</organization>
            </author>
            <date day="12" month="October" year="2024"/>
            <abstract>
              <t>   Authoritative control of parts of the Domain Name System namespace
   are indicated with a special record type, the NS record, that can
   only indicate the name of the server which a client resolver should
   contact for more information.  Any other features of that server must
   then be discovered through other mechanisms.  This draft considers
   the limitations of the current system, benefits that could be gained
   by changing it, and what requirements constrain an updated design.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-deleg-requirements-02"/>
        </reference>
        <reference anchor="I-D.homburg-deleg-incremental-dnssec">
          <front>
            <title>Incrementally Deployable DNSSEC Delegation</title>
            <author fullname="Philip Homburg" initials="P." surname="Homburg">
              <organization>NLnet Labs</organization>
            </author>
            <author fullname="Willem Toorop" initials="W." surname="Toorop">
              <organization>NLnet Labs</organization>
            </author>
            <date day="16" month="January" year="2025"/>
            <abstract>
              <t>   This document proposes a DNSSEC delegation mechanism that complements
   [I-D.homburg-deleg-incremental-deleg].  In addition this mechanism
   simplifies multi-signer setups by removing the need to coordinate for
   signers during key rollovers.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-homburg-deleg-incremental-dnssec-00"/>
        </reference>
        <reference anchor="RFC8552">
          <front>
            <title>Scoped Interpretation of DNS Resource Records through "Underscored" Naming of Attribute Leaves</title>
            <author fullname="D. Crocker" initials="D." surname="Crocker"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>Formally, any DNS Resource Record (RR) may occur under any domain name. However, some services use an operational convention for defining specific interpretations of an RRset by locating the records in a DNS branch under the parent domain to which the RRset actually applies. The top of this subordinate branch is defined by a naming convention that uses a reserved node name, which begins with the underscore character (e.g., "_name"). The underscored naming construct defines a semantic scope for DNS record types that are associated with the parent domain above the underscored branch. This specification explores the nature of this DNS usage and defines the "Underscored and Globally Scoped DNS Node Names" registry with IANA. The purpose of this registry is to avoid collisions resulting from the use of the same underscored name for different services.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="222"/>
          <seriesInfo name="RFC" value="8552"/>
          <seriesInfo name="DOI" value="10.17487/RFC8552"/>
        </reference>
        <reference anchor="I-D.tapril-ns2">
          <front>
            <title>Parameterized Nameserver Delegation with NS2 and NS2T</title>
            <author fullname="Tim April" initials="T." surname="April">
              <organization>Akamai Technologies</organization>
            </author>
            <date day="13" month="July" year="2020"/>
            <abstract>
              <t>   Within the DNS, there is no mechanism for authoritative servers to
   advertise which transport methods they are capable of.  If secure
   transport methods are adopted by authoritative operators, transport
   signaling would be required to negotiate how authoritative servers
   would be contacted by resolvers.  This document provides two new
   Resource Record Types, NS2 and NS2T, to facilitate this negotiation
   by allowing zone owners to signal how the authoritative nameserver(s)
   for their zone(s) may accept queries.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-tapril-ns2-01"/>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The idea to utilize SVCB based RRs to signal capabilities was first proposed by Tim April in <xref target="I-D.tapril-ns2"/>.</t>
      <t>The idea to utilize SVCB for extensible delegations (and also the idea described in this document) emerged from the DNS Hackathon at the IETF 118.
The following participants contributed to this brainstorm session: Vandan Adhvaryu, Roy Arends, David Blacka, Manu Bretelle, Vladimír Čunát, Klaus Darilion, Peter van Dijk, Christian Elmerot, Bob Halley, Philip Homburg, Shumon Huque, Shane Kerr, David C Lawrence, Edward Lewis, George Michaelson, Erik Nygren, Libor Peltan, Ben Schwartz, Petr Špaček, Jan Včelák and Ralf Weber</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
