<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.8 (Ruby 2.6.10) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-dnssd-multi-qtypes-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.20.1 -->
  <front>
    <title>DNS Multiple QTYPEs</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-dnssd-multi-qtypes-01"/>
    <author initials="R." surname="Bellis" fullname="Ray Bellis">
      <organization abbrev="ISC">Internet Systems Consortium, Inc.</organization>
      <address>
        <postal>
          <street>PO Box 360</street>
          <city>Newmarket</city>
          <code>NH 03857</code>
          <country>USA</country>
        </postal>
        <phone>+1 650 423 1300</phone>
        <email>ray@isc.org</email>
      </address>
    </author>
    <date year="2024" month="May" day="30"/>
    <area>Internet</area>
    <workgroup>DNSSD</workgroup>
    <keyword>DNS</keyword>
    <keyword>resource record</keyword>
    <abstract>
      <?line 35?>

<t>This document specifies a method for a DNS client to request additional
DNS record types to be delivered alongside the primary record type
specified in the question section of a DNS query.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://dnssd-wg.github.io/draft-ietf-dnssd-multi-qtypes/draft-ietf-dnssd-multi-qtypes.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-dnssd-multi-qtypes/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        DNSSD Working Group mailing list (<eref target="mailto:dnssd@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/dnssd/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/dnssd/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/dnssd-wg/draft-ietf-dnssd-multi-qtypes"/>.</t>
    </note>
  </front>
  <middle>
    <?line 41?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>A commonly requested DNS <xref target="RFC1035"/> feature is the ability to receive
multiple related resource records (RRs) in a single DNS response.</t>
      <t>For example, it may be desirable to receive the A, AAAA and HTTPS
records for a domain name together, rather than having to issue
multiple queries.</t>
      <t>The DNS wire protocol in theory supported having multiple questions in a
single packet, but in practise this does not work.  In
<xref target="I-D.draft-ietf-dnsop-qdcount-is-one"/>, <xref target="RFC1035"/> is updated to only
permit a single question in a QUERY (OpCode == 0) request.</t>
      <t>Sending QTYPE=ANY does not guarantee that all RRsets will be returned.
<xref target="RFC8482"/> specifies that responders may return a single RRset of
their choosing.</t>
      <t>To mitigate these issues, this document constrains the problem to those
cases where only the QTYPE varies by specifying a new option for the
Extension Mechanisms for DNS (EDNS <xref target="RFC6891"/>) that contains an
additional list of QTYPE values that the client wishes to receive in
addition to the single QTYPE appearing in the question section.  A
second EDNS option is used in response packets as protection against DNS
middleboxes that echo EDNS options verbatim.</t>
      <t>The specification described herein is applicable both for queries from a
stub resolver to recursive servers, and from recursive resolvers to
authoritative servers.</t>
    </section>
    <section anchor="terminology-used-in-this-document">
      <name>Terminology used in this document</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="description">
      <name>Description</name>
      <section anchor="multiple-qtype-edns-options-format">
        <name>Multiple QTYPE EDNS Options Format</name>
        <t>The overall format of an EDNS option is shown for reference below,
per <xref target="RFC6891"/>, followed by the option specific data:</t>
        <artwork><![CDATA[
   +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
0: |                          OPTION-CODE                          |
   +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
2: |                         OPTION-LENGTH                         |
   +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
4: |                                                               |
   /                          OPTION-DATA                          /
   /                                                               /
   +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
]]></artwork>
        <t>OPTION-CODE: MQTYPE-Query (TBD1) in queries and MQTYPE-Response (TBD2) in responses.</t>
        <t>OPTION-LENGTH: Size (in octets) of OPTION-DATA.</t>
        <t>OPTION-DATA: Option specific, as below:</t>
        <artwork><![CDATA[
                +0 (MSB)                            +1 (LSB)
   +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
0: |           QT1 (MSB)           |           QT1 (LSB)           |
   +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
2: /              ...              |              ...              /
   +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
   /           QTn (MSB)           |           QTn (LSB)           |
   +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
]]></artwork>
        <t>QT: a (potentially empty) list of 2 byte fields (QTx) in network order
(MSB first) each specifying a DNS RR type.  The RR types <bcp14>MUST</bcp14> be for
real resource records, and <bcp14>MUST NOT</bcp14> refer to pseudo RR types such as
"OPT", "IXFR", "TSIG", "*", etc.</t>
      </section>
      <section anchor="server-response-generation">
        <name>Server Response Generation</name>
        <t>A conforming server that receives an MQTYPE-Query option in a query <bcp14>MUST</bcp14>
return an MQTYPE-Response option in its response.  The use of a
secondary option code in responses serves as protection against DNS
middleboxes that echo EDNS OPT Records verbatim.</t>
        <t>A server that receives an MQTYPE-Response option in a query <bcp14>MUST</bcp14> return
a FORMERR response.</t>
        <t>On receipt of a valid MQTYPE-Query option the server <bcp14>SHOULD</bcp14> attempt to
return any resource records known to it that match the additional
(QNAME, QTx, QCLASS) tuples.  These records <bcp14>MUST</bcp14> be returned in the
Answer Section of the response, but the answer for the primary QTYPE
from the Question Section <bcp14>MUST</bcp14> be included first.</t>
        <t>If any invalid QTx is received in the query (e.g. one corresponding to a
meta-RR) the server <bcp14>MUST</bcp14> return a FORMERR response.</t>
        <t>For any particular QTx in the query, if the server provides additional
answers, or has knowledge that the RR type does not exist for that
QNAME (a "negative answer"), it must include that QTx value in the
Multiple QTYPE Option of its response.</t>
        <t>A negative answer is therefore indicated by the combination of the
presence of a QTx value in the Multiple QTYPE Option and the absence of
a matching record in the Answer Section.  This is necessary (in the
absence of DNSSEC) to differentiate between absence of the record from
the zone and absence of the record from the response.</t>
        <t>A server that is authoritative for the specified QNAME on receipt of a
Multiple QTYPE Option <bcp14>MUST</bcp14> attempt to return all specified RR types
except where that would result in truncation or a risk of a significant
DNS amplification attack in which case it <bcp14>MAY</bcp14> omit some (or all) of the
records for the additional RR types.  Those RR types <bcp14>MUST</bcp14> then also be
omitted from the Multiple QTYPE Option in the response.</t>
        <t>A caching recursive server receiving a Multiple QTYPE Option query
<bcp14>SHOULD</bcp14> attempt to fill its positive and negative caches with all of the
specified RR types before returning its response to the client.  It <bcp14>MAY</bcp14>
limit itself to a smaller subset of the specified RR types if the
processing overhead to fill its caches is too great or if there is a
risk of a significant DNS amplification attack.</t>
        <t>While this document specifies no limit on the number of QTx values that
may be specified, the author anticipates that server implementations
will provide configuration settings to constrain the response sizes.</t>
        <section anchor="dnssec">
          <name>DNSSEC</name>
          <t>If the DNS client sets the "DNSSEC OK" (DO) bit in the query then the
server <bcp14>MUST</bcp14> also return the related DNSSEC records that would have been
returned in a standalone query for the same QTYPE.</t>
          <t>A negative answer from a signed zone <bcp14>MUST</bcp14> contain the appropriate
authenticated denial of existence records, per <xref target="RFC4034"/> and
<xref target="RFC5155"/>.</t>
          <t>In a signed zone there is a theoretical risk of valid signatures for one
RR type and invalid signatures for another.  This is the only case known
to the author where the response code for any particular QNAME may be
inconsistent across different RR types.</t>
          <t>Should a validating resolver produce NOERROR for some RR types and
SERVFAIL for others it <bcp14>MUST</bcp14> omit the RR types that failed to validate
from its response and from the QTx fields on the Multiple QTYPE option.</t>
        </section>
      </section>
      <section anchor="client-response-processing">
        <name>Client Response Processing</name>
        <t>Recursive resolvers <bcp14>MAY</bcp14> use this method to obtain multiple records from
an authoritative server.  For the purposes of Section 5.4.1 of
<xref target="RFC2181"/> any authoritative answers received <bcp14>MUST</bcp14> be ranked the same
as the answer for the primary question.</t>
        <t>If the response to a query containing an MQTYPE-Query option does not
contain an MQTYPE-Response option, or if it erroneously contains an
MQTYPE-Query option, the client <bcp14>MUST</bcp14> treat the response as if this
option is unsupported by the server and <bcp14>SHOULD</bcp14> process the response as
normal.</t>
        <t>The client <bcp14>SHOULD</bcp14> subsequently initiate standalone queries (i.e. without
using the MQTYPE-Query option) for any QTx value that did not generate a
negative answer.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The method documented here does not change any of the security
properties of the DNS protocol itself.</t>
      <t>It should however be noted that this method does increase the potential
amplification factor when the DNS protocol is used as a vector for a
denial of service attack.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>NB: to be rewritten once assignments have been made.</t>
      <t>IANA is requested to assign two new values (TBD1 and TBD2) in the DNS
EDNS0 Option Codes registry for MQTYPE-Query and MQTYPE-Response.  They
should be consecutive, with the -Query option being an even number.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC1035">
          <front>
            <title>Domain names - implementation and specification</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1035"/>
          <seriesInfo name="DOI" value="10.17487/RFC1035"/>
        </reference>
        <reference anchor="I-D.draft-ietf-dnsop-qdcount-is-one">
          <front>
            <title>In the DNS, QDCOUNT is (usually) One</title>
            <author fullname="Ray Bellis" initials="R." surname="Bellis">
              <organization>Internet Systems Consortium, Inc.</organization>
            </author>
            <author fullname="Joe Abley" initials="J." surname="Abley">
              <organization>Cloudflare</organization>
            </author>
            <date day="29" month="May" year="2024"/>
            <abstract>
              <t>   This document updates RFC 1035 by constraining the allowed value of
   the QDCOUNT parameter in DNS messages with OPCODE = 0 (QUERY) to a
   maximum of one, and specifies the required behaviour when values that
   are not allowed are encountered.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dnsop-qdcount-is-one-03"/>
        </reference>
        <reference anchor="RFC6891">
          <front>
            <title>Extension Mechanisms for DNS (EDNS(0))</title>
            <author fullname="J. Damas" initials="J." surname="Damas"/>
            <author fullname="M. Graff" initials="M." surname="Graff"/>
            <author fullname="P. Vixie" initials="P." surname="Vixie"/>
            <date month="April" year="2013"/>
            <abstract>
              <t>The Domain Name System's wire protocol includes a number of fixed fields whose range has been or soon will be exhausted and does not allow requestors to advertise their capabilities to responders. This document describes backward-compatible mechanisms for allowing the protocol to grow.</t>
              <t>This document updates the Extension Mechanisms for DNS (EDNS(0)) specification (and obsoletes RFC 2671) based on feedback from deployment experience in several implementations. It also obsoletes RFC 2673 ("Binary Labels in the Domain Name System") and adds considerations on the use of extended labels in the DNS.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="75"/>
          <seriesInfo name="RFC" value="6891"/>
          <seriesInfo name="DOI" value="10.17487/RFC6891"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC4034">
          <front>
            <title>Resource Records for the DNS Security Extensions</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of resource records and protocol modifications that provide source authentication for the DNS. This document defines the public key (DNSKEY), delegation signer (DS), resource record digital signature (RRSIG), and authenticated denial of existence (NSEC) resource records. The purpose and format of each resource record is described in detail, and an example of each resource record is given.</t>
              <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4034"/>
          <seriesInfo name="DOI" value="10.17487/RFC4034"/>
        </reference>
        <reference anchor="RFC5155">
          <front>
            <title>DNS Security (DNSSEC) Hashed Authenticated Denial of Existence</title>
            <author fullname="B. Laurie" initials="B." surname="Laurie"/>
            <author fullname="G. Sisson" initials="G." surname="Sisson"/>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="D. Blacka" initials="D." surname="Blacka"/>
            <date month="March" year="2008"/>
            <abstract>
              <t>The Domain Name System Security (DNSSEC) Extensions introduced the NSEC resource record (RR) for authenticated denial of existence. This document introduces an alternative resource record, NSEC3, which similarly provides authenticated denial of existence. However, it also provides measures against zone enumeration and permits gradual expansion of delegation-centric zones. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5155"/>
          <seriesInfo name="DOI" value="10.17487/RFC5155"/>
        </reference>
        <reference anchor="RFC2181">
          <front>
            <title>Clarifications to the DNS Specification</title>
            <author fullname="R. Elz" initials="R." surname="Elz"/>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <date month="July" year="1997"/>
            <abstract>
              <t>This document considers some areas that have been identified as problems with the specification of the Domain Name System, and proposes remedies for the defects identified. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2181"/>
          <seriesInfo name="DOI" value="10.17487/RFC2181"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8482">
          <front>
            <title>Providing Minimal-Sized Responses to DNS Queries That Have QTYPE=ANY</title>
            <author fullname="J. Abley" initials="J." surname="Abley"/>
            <author fullname="O. Gudmundsson" initials="O." surname="Gudmundsson"/>
            <author fullname="M. Majkowski" initials="M." surname="Majkowski"/>
            <author fullname="E. Hunt" initials="E." surname="Hunt"/>
            <date month="January" year="2019"/>
            <abstract>
              <t>The Domain Name System (DNS) specifies a query type (QTYPE) "ANY". The operator of an authoritative DNS server might choose not to respond to such queries for reasons of local policy, motivated by security, performance, or other reasons.</t>
              <t>The DNS specification does not include specific guidance for the behavior of DNS servers or clients in this situation. This document aims to provide such guidance.</t>
              <t>This document updates RFCs 1034 and 1035.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8482"/>
          <seriesInfo name="DOI" value="10.17487/RFC8482"/>
        </reference>
      </references>
    </references>
    <?line 233?>

<section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>The author wishes to thank the following for their feedback and reviews
during the initial development of this document: Michael Graff, Olafur
Gudmundsson, Matthijs Mekking, and Paul Vixie.</t>
      <t>In addition the author wishes to thank the following for subsequent
review during discussion in the DNSSD Working Group: Chris Box, Stuart
Cheshire, Esko Dijk, Ted Lemon, and David Schinazi.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
