<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.11 (Ruby 3.2.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-dnssd-multi-qtypes-02" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.21.0 -->
  <front>
    <title>DNS Multiple QTYPEs</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-dnssd-multi-qtypes-02"/>
    <author initials="R." surname="Bellis" fullname="Ray Bellis">
      <organization abbrev="ISC">Internet Systems Consortium, Inc.</organization>
      <address>
        <postal>
          <street>PO Box 360</street>
          <city>Newmarket</city>
          <code>NH 03857</code>
          <country>USA</country>
        </postal>
        <phone>+1 650 423 1300</phone>
        <email>ray@isc.org</email>
      </address>
    </author>
    <date year="2024" month="June" day="10"/>
    <area>Internet</area>
    <workgroup>DNSSD</workgroup>
    <keyword>DNS</keyword>
    <keyword>resource record</keyword>
    <abstract>
      <?line 35?>

<t>This document specifies a method for a DNS client to request additional
DNS record types to be delivered alongside the primary record type
specified in the question section of a DNS query.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://dnssd-wg.github.io/draft-ietf-dnssd-multi-qtypes/draft-ietf-dnssd-multi-qtypes.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-dnssd-multi-qtypes/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        DNSSD Working Group mailing list (<eref target="mailto:dnssd@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/dnssd/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/dnssd/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/dnssd-wg/draft-ietf-dnssd-multi-qtypes"/>.</t>
    </note>
  </front>
  <middle>
    <?line 41?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>A commonly requested DNS <xref target="RFC1035"/> feature is the ability to receive
multiple related resource records (RRs) in a single DNS response.</t>
      <t>For example, it may be desirable to receive the A, AAAA and HTTPS
records for a domain name together, rather than having to issue
multiple queries.</t>
      <t>The DNS wire protocol in theory supported having multiple questions in a
single packet, but in practise this does not work.  In
<xref target="I-D.draft-ietf-dnsop-qdcount-is-one"/>, <xref target="RFC1035"/> is updated to only
permit a single question in a QUERY (OpCode == 0) request.</t>
      <t>Sending QTYPE=ANY does not guarantee that all RRsets will be returned.
<xref target="RFC8482"/> specifies that responders may return a single RRset of
their choosing.</t>
      <t>This document provides a solution for those cases where only the QTYPE
varies by specifying a new option for the Extension Mechanisms for DNS
(EDNS <xref target="RFC6891"/>) that contains an additional list of QTYPE values
that the client wishes to receive in addition to the single QTYPE
appearing in the question section.  A different EDNS option is used in
response packets as protection against DNS middleboxes that echo EDNS
options verbatim.</t>
      <t>The specification described herein is applicable both for queries from a
stub resolver to recursive servers, and from recursive resolvers to
authoritative servers.</t>
    </section>
    <section anchor="terminology-used-in-this-document">
      <name>Terminology used in this document</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="description">
      <name>Description</name>
      <section anchor="multiple-qtype-edns-options-format">
        <name>Multiple QTYPE EDNS Options Format</name>
        <t>The overall format of an EDNS option is shown for reference below,
per <xref target="RFC6891"/>, followed by the option specific data:</t>
        <artwork><![CDATA[
   +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
0: |                          OPTION-CODE                          |
   +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
2: |                         OPTION-LENGTH                         |
   +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
4: |                                                               |
   /                          OPTION-DATA                          /
   /                                                               /
   +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
]]></artwork>
        <t>OPTION-CODE: MQTYPE-Query (TBD1) in queries and MQTYPE-Response (TBD2) in responses.</t>
        <t>OPTION-LENGTH: Size (in octets) of OPTION-DATA.</t>
        <t>OPTION-DATA: Option specific, as below:</t>
        <artwork><![CDATA[
                +0 (MSB)                            +1 (LSB)
   +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
0: |           QT1 (MSB)           |           QT1 (LSB)           |
   +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
2: /              ...              |              ...              /
   +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
   /           QTn (MSB)           |           QTn (LSB)           |
   +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
]]></artwork>
        <t>QT: a (potentially empty) list of 2 byte fields (QTx) in network order
(MSB first) each specifying a DNS RR type.  The RR types <bcp14>MUST</bcp14> be for
real resource records, and <bcp14>MUST NOT</bcp14> refer to pseudo RR types such as
"OPT", "IXFR", "TSIG", "*", etc.</t>
      </section>
      <section anchor="server-response-generation">
        <name>Server Response Generation</name>
        <t>A conforming server that receives an MQTYPE-Query option in a query <bcp14>MUST</bcp14>
return an MQTYPE-Response option in its response.  A server that
receives an MQTYPE-Response option in a query <bcp14>MUST</bcp14> return a FORMERR
response.</t>
        <t>On receipt of a valid MQTYPE-Query option the server <bcp14>SHOULD</bcp14> attempt to
return any resource records known to it that match the additional
(QNAME, QTx, QCLASS) tuples.  These records <bcp14>MUST</bcp14> be returned in the
Answer Section of the response, but the answer for the primary QTYPE
from the Question Section <bcp14>MUST</bcp14> be included first.</t>
        <t>If any invalid QTx is received in the query (e.g. one corresponding to a
meta-RR) the server <bcp14>MUST</bcp14> return a FORMERR response.</t>
        <t>For any particular QTx in the query, if the server provides additional
answers, or has knowledge that the RR type does not exist for that QNAME
(a "negative answer"), it <bcp14>MUST</bcp14> include that QTx value in the list of
QTYPEs in its MQTYPE-Response option.  If the server does not provide an
answer (whether positive or negative) for that QTx then that value <bcp14>MUST</bcp14>
be omitted from the list of QTYPEs in it MQTYPE-Response option.</t>
        <t>A negative answer is therefore indicated by the combination of the
presence of a QTx value in the Multiple QTYPE Option and the absence of
a matching record in the Answer Section.  This is necessary (in the
absence of DNSSEC) to differentiate between absence of the record from
the zone and absence of the record from the response.</t>
        <t>A server that is authoritative for the specified QNAME on receipt of a
Multiple QTYPE Option <bcp14>MUST</bcp14> attempt to return all specified RR types
except where that would result in truncation or a risk of a significant
DNS amplification attack in which case it <bcp14>MAY</bcp14> omit some (or all) of the
records for the additional RR types.</t>
        <t>A caching recursive server receiving a Multiple QTYPE Option query
<bcp14>SHOULD</bcp14> attempt to fill its positive and negative caches with all of the
specified RR types before returning its response to the client.  It <bcp14>MAY</bcp14>
limit itself to a smaller subset of the specified RR types if the
processing overhead to fill its caches is too great or if there is a
risk of a significant DNS amplification attack.</t>
        <t>While this document specifies no limit on the number of QTx values that
may be specified, the author anticipates that server implementations
will provide configuration settings to constrain the response sizes.</t>
        <section anchor="dnssec">
          <name>DNSSEC</name>
          <t>If the DNS client sets the "DNSSEC OK" (DO) bit in the query then the
server <bcp14>MUST</bcp14> also return the related DNSSEC records that would have been
returned in a standalone query for the same QTYPE.</t>
          <t>A negative answer from a signed zone <bcp14>MUST</bcp14> contain the appropriate
authenticated denial of existence records, per <xref target="RFC4034"/> and
<xref target="RFC5155"/>.</t>
          <t>In a signed zone there is a theoretical risk of valid signatures for one
RR type and invalid signatures for another.  This is the only case known
to the author where the response code for any particular QNAME may be
inconsistent across different RR types.</t>
          <t>Should a validating resolver produce NOERROR for some RR types and
SERVFAIL for others it <bcp14>MUST</bcp14> omit the RR types that failed to validate
from its response and from the QTx fields on the Multiple QTYPE option.</t>
        </section>
      </section>
      <section anchor="client-response-processing">
        <name>Client Response Processing</name>
        <t>Recursive resolvers <bcp14>MAY</bcp14> use this method to obtain multiple records from
an authoritative server.  For the purposes of Section 5.4.1 of
<xref target="RFC2181"/> any authoritative answers received <bcp14>MUST</bcp14> be ranked the same
as the answer for the primary question.</t>
        <t>If the response to a query containing an MQTYPE-Query option does not
contain an MQTYPE-Response option, or if it erroneously contains an
MQTYPE-Query option, the client <bcp14>MUST</bcp14> treat the response as if this
option is unsupported by the server and <bcp14>SHOULD</bcp14> process the response as
if the MQTYPE-Query option had not been used.</t>
        <t>The client <bcp14>SHOULD</bcp14> subsequently initiate standalone queries (i.e. without
using the MQTYPE-Query option) for any QTx value that did not generate a
negative answer.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The method documented here does not change any of the security
properties of the DNS protocol itself.</t>
      <t>It should however be noted that this method does increase the potential
amplification factor when the DNS protocol is used as a vector for a
denial of service attack.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>NB: to be rewritten once assignments have been made.</t>
      <t>IANA is requested to assign two new values (TBD1 and TBD2) in the DNS
EDNS0 Option Codes registry for MQTYPE-Query and MQTYPE-Response.  They
should be consecutive, with the -Query option being an even number.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC1035">
          <front>
            <title>Domain names - implementation and specification</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1035"/>
          <seriesInfo name="DOI" value="10.17487/RFC1035"/>
        </reference>
        <reference anchor="I-D.draft-ietf-dnsop-qdcount-is-one">
          <front>
            <title>In the DNS, QDCOUNT is (usually) One</title>
            <author fullname="Ray Bellis" initials="R." surname="Bellis">
              <organization>Internet Systems Consortium, Inc.</organization>
            </author>
            <author fullname="Joe Abley" initials="J." surname="Abley">
              <organization>Cloudflare</organization>
            </author>
            <date day="29" month="May" year="2024"/>
            <abstract>
              <t>   This document updates RFC 1035 by constraining the allowed value of
   the QDCOUNT parameter in DNS messages with OPCODE = 0 (QUERY) to a
   maximum of one, and specifies the required behaviour when values that
   are not allowed are encountered.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dnsop-qdcount-is-one-03"/>
        </reference>
        <reference anchor="RFC6891">
          <front>
            <title>Extension Mechanisms for DNS (EDNS(0))</title>
            <author fullname="J. Damas" initials="J." surname="Damas"/>
            <author fullname="M. Graff" initials="M." surname="Graff"/>
            <author fullname="P. Vixie" initials="P." surname="Vixie"/>
            <date month="April" year="2013"/>
            <abstract>
              <t>The Domain Name System's wire protocol includes a number of fixed fields whose range has been or soon will be exhausted and does not allow requestors to advertise their capabilities to responders. This document describes backward-compatible mechanisms for allowing the protocol to grow.</t>
              <t>This document updates the Extension Mechanisms for DNS (EDNS(0)) specification (and obsoletes RFC 2671) based on feedback from deployment experience in several implementations. It also obsoletes RFC 2673 ("Binary Labels in the Domain Name System") and adds considerations on the use of extended labels in the DNS.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="75"/>
          <seriesInfo name="RFC" value="6891"/>
          <seriesInfo name="DOI" value="10.17487/RFC6891"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC4034">
          <front>
            <title>Resource Records for the DNS Security Extensions</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of resource records and protocol modifications that provide source authentication for the DNS. This document defines the public key (DNSKEY), delegation signer (DS), resource record digital signature (RRSIG), and authenticated denial of existence (NSEC) resource records. The purpose and format of each resource record is described in detail, and an example of each resource record is given.</t>
              <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4034"/>
          <seriesInfo name="DOI" value="10.17487/RFC4034"/>
        </reference>
        <reference anchor="RFC5155">
          <front>
            <title>DNS Security (DNSSEC) Hashed Authenticated Denial of Existence</title>
            <author fullname="B. Laurie" initials="B." surname="Laurie"/>
            <author fullname="G. Sisson" initials="G." surname="Sisson"/>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="D. Blacka" initials="D." surname="Blacka"/>
            <date month="March" year="2008"/>
            <abstract>
              <t>The Domain Name System Security (DNSSEC) Extensions introduced the NSEC resource record (RR) for authenticated denial of existence. This document introduces an alternative resource record, NSEC3, which similarly provides authenticated denial of existence. However, it also provides measures against zone enumeration and permits gradual expansion of delegation-centric zones. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5155"/>
          <seriesInfo name="DOI" value="10.17487/RFC5155"/>
        </reference>
        <reference anchor="RFC2181">
          <front>
            <title>Clarifications to the DNS Specification</title>
            <author fullname="R. Elz" initials="R." surname="Elz"/>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <date month="July" year="1997"/>
            <abstract>
              <t>This document considers some areas that have been identified as problems with the specification of the Domain Name System, and proposes remedies for the defects identified. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2181"/>
          <seriesInfo name="DOI" value="10.17487/RFC2181"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8482">
          <front>
            <title>Providing Minimal-Sized Responses to DNS Queries That Have QTYPE=ANY</title>
            <author fullname="J. Abley" initials="J." surname="Abley"/>
            <author fullname="O. Gudmundsson" initials="O." surname="Gudmundsson"/>
            <author fullname="M. Majkowski" initials="M." surname="Majkowski"/>
            <author fullname="E. Hunt" initials="E." surname="Hunt"/>
            <date month="January" year="2019"/>
            <abstract>
              <t>The Domain Name System (DNS) specifies a query type (QTYPE) "ANY". The operator of an authoritative DNS server might choose not to respond to such queries for reasons of local policy, motivated by security, performance, or other reasons.</t>
              <t>The DNS specification does not include specific guidance for the behavior of DNS servers or clients in this situation. This document aims to provide such guidance.</t>
              <t>This document updates RFCs 1034 and 1035.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8482"/>
          <seriesInfo name="DOI" value="10.17487/RFC8482"/>
        </reference>
      </references>
    </references>
    <?line 231?>

<section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>The author wishes to thank the following for their feedback and reviews
during the initial development of this document: Michael Graff, Olafur
Gudmundsson, Matthijs Mekking, and Paul Vixie.</t>
      <t>In addition the author wishes to thank the following for subsequent
review during discussion in the DNSSD Working Group: Chris Box, Stuart
Cheshire, Esko Dijk, Ted Lemon, and David Schinazi.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
