<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.7 (Ruby 2.7.3) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

<!ENTITY RFC1034 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.1034.xml">
<!ENTITY RFC1035 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.1035.xml">
<!ENTITY RFC2181 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2181.xml">
<!ENTITY RFC2308 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2308.xml">
<!ENTITY RFC8109 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8109.xml">
<!ENTITY RFC8806 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8806.xml">
<!ENTITY RFC8914 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8914.xml">
<!ENTITY RFC8976 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8976.xml">
<!ENTITY RFC9520 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9520.xml">
<!ENTITY RFC9567 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9567.xml">
<!ENTITY RFC2119 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC8174 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
<!ENTITY I-D.fujiwara-dnsop-resolver-update SYSTEM "https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.fujiwara-dnsop-resolver-update.xml">
<!ENTITY I-D.vixie-dnsext-resimprove SYSTEM "https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.vixie-dnsext-resimprove.xml">
<!ENTITY I-D.wijngaards-dnsext-resolver-side-mitigation SYSTEM "https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.wijngaards-dnsext-resolver-side-mitigation.xml">
<!ENTITY I-D.ietf-deleg SYSTEM "https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-deleg.xml">
]>


<rfc ipr="trust200902" docName="draft-ietf-dnsop-ns-revalidation-12" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="DNS Delegation Revalidation">Delegation Revalidation by DNS Resolvers</title>

    <author initials="S." surname="Huque" fullname="Shumon Huque">
      <organization>Salesforce</organization>
      <address>
        <postal>
          <street>415 Mission Street, 3rd Floor</street>
          <city>San Francisco</city>
          <region>CA</region>
          <code>94105</code>
          <country>United States of America</country>
        </postal>
        <email>shuque@gmail.com</email>
      </address>
    </author>
    <author initials="P." surname="Vixie" fullname="Paul Vixie">
      <organization>SIE Europe, U.G.</organization>
      <address>
        <email>paul@redbarn.org</email>
      </address>
    </author>
    <author initials="W." surname="Toorop" fullname="Willem Toorop">
      <organization>NLnet Labs</organization>
      <address>
        <postal>
          <street>Science Park 400</street>
          <city>Amsterdam</city>
          <code>1098 XH</code>
          <country>Netherlands</country>
        </postal>
        <email>willem@nlnetlabs.nl</email>
      </address>
    </author>

    <date year="2026" month="April" day="21"/>

    <area>Operations and Management Area</area>
    <workgroup>Domain Name System Operations</workgroup>
    <keyword>Internet-Draft</keyword> <keyword>DNS</keyword> <keyword>Resolver</keyword> <keyword>Delegation</keyword> <keyword>Revalidation</keyword> <keyword>Authoritative</keyword> <keyword>Name Server Record</keyword> <keyword>NS</keyword> <keyword>Parent</keyword> <keyword>Child</keyword> <keyword>Resource Record Set</keyword>

    <abstract>


<?line 189?>

<t>This document describes an optional algorithm for the processing of Name Server (NS) resource record (RR) sets (RRsets) during iterative resolution, and describes the benefits and considerations of using this approach.
When following a referral response from an authoritative server to a child zone, DNS resolvers should explicitly query the authoritative NS RRset at the apex of the child zone and cache this in preference to the NS RRset on the parent side of the zone cut.
The (A and AAAA) address RRsets in the additional section from referral responses and authoritative NS answers for the names of the NS RRset, should similarly be re-queried and used to replace the entries with the lower trustworthiness ranking in cache.
Resolvers should also periodically revalidate the delegation by re-querying the parent zone at the expiration of the TTL of either the parent or child NS RRset, whichever comes first.</t>



    </abstract>

    <note title="About This Document" removeInRFC="true">
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-dnsop-ns-revalidation/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        DNSOP Working Group mailing list (<eref target="mailto:dnsop@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/dnsop/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/dnsop/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/shuque/ns-revalidation"/>.</t>
    </note>


  </front>

  <middle>


<?line 196?>

<section anchor="intro"><name>Introduction</name>

<t>This document recommends improved DNS <xref target="RFC1034"/> <xref target="RFC1035"/> resolver behavior with respect to the processing of NS record sets during iterative resolution.</t>

<t><xref target="upgrade-ns">Upgrading NS RRset Credibility</xref> recommends that resolvers, when following a referral response from an authoritative server to a child zone, should explicitly query the authoritative NS RRset at the apex of the child zone and cache this in preference to the NS RRset on the parent side of the zone cut.</t>

<t><xref target="upgrade-ns">Upgrading NS RRset Credibility</xref> works most reliably with good quality child NS RRsets, where the name servers referenced in the Rdata of the NS RRset correspond to IP addresses of nameservers which correctly serve the child zone.
This document considers that both the root, as well as the zones delegated from the root, have good quality child NS RRset. There may be numerous zones further down the DNS delegation hierarchy that may not be competently administered, and may have incorrect or stale authoritative NS and associated address records. As a result they may require a resolver to fallback to data from the delegating side of the zone cut for successful resolution. <xref target="scoped-upgrading"/> describes limiting the upgrading of NS RRset credibility to address this.</t>

<t>The address records in the additional section from the referral response (as glue) or authoritative NS response that match the names of the NS RRset should similarly be re-queried if they are cached non-authoritatively.
The authoritative answers from those queries should replace the cached non-authoritative A and AAAA RRsets.
This is described in (see <xref target="upgrade-addresses">Upgrading A and AAAA RRset Credibility</xref>).</t>

<t><xref target="strict">Strict and opportunistic revalidation</xref> makes a distinction between strict and opportunistic revalidation.
Strict revalidation provides <xref target="impact">DNSSEC protection of infrastructure data</xref> with DNSSEC signed infrastructure data and validating resolvers, but for it to work correctly, good quality child NS RRsets are a pre-requisite.
Opportunistic revalidation allows for fallback to the non-authoritative data returned in the referral responses, but therefore does not provide the same degree of protection as strict revalidation does.</t>

<t>Finally, <xref target="revalidation">Delegation Revalidation</xref> recommends that resolvers revalidate the delegation by re-querying the parent zone at the expiration of the TTL of the parent side NS RRset.</t>

<section anchor="terminology"><name>Terminology</name>
<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

<t>This document uses the following terminology:</t>

<dl newline="true">
  <dt>Triggering query:</dt>
  <dd>
    <t>the DNS query that caused ("triggered") a referral response.</t>
  </dd>
  <dt>Infrastructure RRsets (data):</dt>
  <dd>
    <t>the NS and address (A and AAAA) RRsets used by resolvers to contact the authoritative name servers</t>
  </dd>
  <dt>Revalidation:</dt>
  <dd>
    <t>the process of obtaining the authoritative infrastructure data</t>
  </dd>
  <dt>Validation (validating) query:</dt>
  <dd>
    <t>the extra query that is performed to get the authoritative version of infrastructure RRsets</t>
  </dd>
  <dt>Delegation revalidation:</dt>
  <dd>
    <t>re-establishing the existence and validity of the parent-side NS RRset of a delegation</t>
  </dd>
  <dt>Revalidation point:</dt>
  <dd>
    <t>a delegation under revalidation</t>
  </dd>
  <dt>Re-delegation:</dt>
  <dd>
    <t>the process of changing a delegation information to another set of authoritative name servers, potentially under different administrative control</t>
  </dd>
</dl>

</section>
</section>
<section anchor="motivation"><name>Motivation</name>

<t>There is wide variability in the behavior of deployed DNS resolvers today with respect to how they process delegation records.
Some of them prefer the parent NS set, some prefer the child, and for others, what they preferentially cache depends on the dynamic state of queries and responses they have processed <xref target="SOMMESE"/>.</t>

<t>While this variability is expected to continue in deployed implementations, this document specifies an algorithm that can be adopted by resolvers to achieve several benefits.</t>

<t>This algoritm preferentially and predictably prefers the authoritative NS set at the apex of the child zone, which better comports with the the DNS protocol's data ranking rules. (Note that the proposed redesign of the DNS delegation mechanism in <xref target="I-D.ietf-deleg"/> is expected to fundamentally alter where authoritative delegation information will reside. This document deals with the DNS delegation mechanism as currently deployed.)</t>

<t>This algorithm also offers several security advantages.
The mechanisms described in this document help against GHOST domain attacks and a variety of cache poisoning attacks with resolvers that adhere to Sections <xref target="RFC2181" section="5.4.1" sectionFormat="bare">Ranking data</xref> and <xref target="RFC2181" section="6.1" sectionFormat="bare">Zone authority</xref> of <xref target="RFC2181"/>.
Strictly revalidating referral and authoritative NS RRset responses, enables the resolver to defend itself against query redirection attacks, see <xref target="security">Security and Privacy considerations</xref>.</t>

<t>The delegation NS RRset at the bottom of the parent zone and the apex NS RRset in the child zone are unsynchronized in the DNS protocol.
<xref section="4.2.2" sectionFormat="of" target="RFC1034"/> says "The administrators of both zones should insure that the NS and glue RRs which mark both sides of the cut are consistent and remain so.".
But for a variety of reasons they could not be <xref target="SOMMESE"/>.
Officially, a child zone's apex NS RRset is authoritative and thus has a higher cache credibility than the parent's delegation NS RRset, which is non-authoritative (Sections <xref target="RFC2181" section="5.4.1" sectionFormat="bare">Ranking data</xref> and <xref target="RFC2181" section="6.1" sectionFormat="bare">Zone authority</xref> of <xref target="RFC2181"/>).
Hence the NS RRset "below the zone cut" should immediately replace the parent's delegating NS RRset in cache when an iterative caching DNS resolver crosses a zone boundary.
However, this can only happen if (1) the resolver receives the authoritative NS RRset in the Authority section of a response from the child zone, which is not mandatory, or (2) if the resolver explicitly issues an NS RRset query to the child zone as part of its iterative resolution algorithm.
In the absence of this, it is possible for an iterative caching resolver to never learn the authoritative NS RRset for a zone, unless a downstream client of the resolver explicitly issues such an NS query, which is not something that normal end user applications do, and thus cannot be relied upon to occur with any regularity.</t>

<t>Increasingly, there is a trend towards minimizing unnecessary data in DNS responses.
Several popular DNS implementations default to such a configuration (see "minimal-responses" in BIND and NSD).
So, they may never include the authoritative NS RRset in the Authority section of their responses.</t>

<t>A common reason that zone owners want to ensure that resolvers place the authoritative NS RRset preferentially in their cache is that the TTLs may differ between the parent and child side of the zone cut.
Some DNS Top Level Domains (TLDs) only support long fixed TTLs in their delegation NS sets.
This inhibits a child zone owner's ability to make more rapid changes to their name server configuration using a shorter TTL, if resolvers have no systematic mechanism to observe and cache the child NS RRset.</t>

<t>Similarly, a child zone owner may also choose to have longer TTLs in their delegation NS sets and address records to decrease the attack window for cache poisoning attacks.
For example, at the time of writing, root-servers.net has a TTL of 6 weeks for the root server identifier address records, where the TTL in the priming response is 6 days.</t>

<t>A zone's delegation still needs to be periodically revalidated at the parent to make sure that the parent zone has not legitimately re-delegated the zone to a different set of name servers, or even removed the delegation.
Otherwise, resolvers that refresh the TTL of a child NS RRset on subsequent queries or due to pre-fetching, may cling to those name servers long after they have been re-delegated elsewhere.
This leads to the second recommendation in this document, "Delegation Revalidation" - Resolvers should record the TTL of the parent's delegating NS RRset, and use it to trigger a revalidation action.
Attacks exploiting lack of this revalidation have been described in <xref target="GHOST1"/>, <xref target="GHOST2"/>.</t>

</section>
<section anchor="upgrade-ns"><name>Upgrading NS RRset Credibility</name>

<t>When a referral response is received during iteration, a validation query <bcp14>SHOULD</bcp14> be sent in parallel with the resolution of the triggering query, to one of the delegated name servers for the newly discovered zone cut.
Note that DNSSEC validating resolvers today, when following a secure referral, already need to dispatch a query to one of the delegated name servers for the DNSKEY RRset, so this validation query could be sent in parallel with that DNSKEY query.</t>

<t>A validation query consists of a query for the child's apex NS RRset, sent to one of the newly discovered delegation's name servers.
Normal iterative logic applies to the processing of responses to validation queries, including storing the results in cache, trying the next server on SERVFAIL or timeout, and so on.
Positive responses to this validation query <bcp14>MAY</bcp14> be cached with an authoritative data ranking.
Successive queries directed to the same zone <bcp14>SHOULD</bcp14> be directed to the nameservers listed in the child's apex, due to the ranking of this answer.
If the validation query fails, the parent NS RRset <bcp14>SHOULD</bcp14> remain the one with the highest ranking and <bcp14>SHOULD</bcp14> be used for successive queries.</t>

<t>A response to the triggering query to the child may contain the NS RRset in the authority section as well.
This NS RRset however has a lower trustworthiness than the set from the direct query (<xref section="5.4.1" sectionFormat="of" target="RFC2181"/>), so regardless of the order in which the responses are received, the NS RRset from the answer section from the direct child's apex NS RRset query <bcp14>MAY</bcp14> be stored in the cache eventually.</t>

<t>When a resolver detects that the child's apex NS RRset contains different name servers than the non-authoritative version at the parent side of the zone cut, it <bcp14>MAY</bcp14> report the mismatch using DNS Error Reporting <xref target="RFC9567"/> on the Report-Channel for the child zone, as well as on the Report-Channel for the parent zone, with an extended DNS error code of TBD (See <xref target="IANA"/>).</t>

<t>A No Data response (see <xref section="2.2" sectionFormat="of" target="RFC2308"/>) for the validating NS query should be treated the same as a failed validating NS query.
The parent NS RRset <bcp14>SHOULD</bcp14> remain the one with the highest ranking and <bcp14>SHOULD</bcp14> be used for successive queries.
All resolution failures <bcp14>MUST</bcp14> be cached as directed in <xref target="RFC9520"/>, to prevent aggressive requeries.</t>

</section>
<section anchor="scoped-upgrading"><name>Limiting upgrading NS Credibility</name>
<t><xref target="upgrade-ns">Upgrading NS RRset Credibility</xref> works most reliably with good quality child NS RRsets, where the name servers referenced in the Rdata of the NS RRset result in IP addresses which serve the child zone.
The root and the zones delegated from the root have good quality child NS RRsets. However, because of the less transparently administered further delegations (among others by parties that are perhaps less devoted to DNS administration), some of those further delegations may be sub-optimal for upgrading NS RRset credibility.
An implementation <bcp14>MAY</bcp14> limit revalidation to delegations that cross administrative boundaries such as anywhere in ".ip6.arpa" and ".in-addr.arpa" as well as any so-called "public suffix" such as the root zone, top level zones such as ".com" or ".net", and effective top level zones such as ".ad.jp" or ".co.uk".</t>

</section>
<section anchor="upgrade-addresses"><name>Upgrading A and AAAA RRset Credibility</name>

<section anchor="upgrading-glue"><name>Upgrading glue</name>

<t>Additional validation queries for the "glue" address RRs of referral responses (if not already authoritatively present in cache) <bcp14>SHOULD</bcp14> be sent with the validation query for the NS RRset as well.
Positive responses <bcp14>SHOULD</bcp14> be cached with authoritative data ranking.
The non-authoritative "glue" <bcp14>MAY</bcp14> be cached with non-authoritative data ranking for fallback purposes.
Successive queries directed to the same zone <bcp14>SHOULD</bcp14> be directed to the authoritative nameservers denoted in the referral response.</t>

<t>The names from the NS RRset in a validating NS response may differ from the names from the NS RRset in the referral response.
Outstanding validation queries for "glue" address RRs that do not match names in a newly discovered authoritative NS RRset may be discarded, or they may be left running to completion.
Their result <bcp14>MUST</bcp14> no longer be used in queries for the zone.
Outstanding validation queries for "glue" address RRs that do match names in the authoritative NS RRset <bcp14>MUST</bcp14> be left running to completion.
They do not need to be re-queried after reception of the authoritative NS RRset (see <xref target="upgrade-addresses"/>).</t>

<t>Validated "glue" may result in unreachable destinations if they are obtained from poorly managed zones with incorrect address records.
A resolver <bcp14>MAY</bcp14> choose to keep the non-authoritative value for the "glue" next to the preferred authoritative value for fallback purposes.
Such a resolver <bcp14>MAY</bcp14> choose to fallback to use the non-authoritative value as a last resort, but <bcp14>SHOULD</bcp14> do so only if all other authoritative "glue" led to unreachable destinations as well.</t>

</section>
<section anchor="upgrading-additional-address-from-authoritative-ns-responses"><name>Upgrading additional address from authoritative NS responses</name>

<t>Authoritative responses for a zone's NS RRset at the apex can contain nameserver addresses in the Additional section.
An NS RRset validation response is an example of such a response.
A priming response is another example of an authoritative zone's NS RRset response <xref target="RFC8109"/>.</t>

<t>When additional addresses in authoritative NS RRset responses are DNSSEC verifiable (because the complete RRset is included, including a verifiable signature for the RRset) and DNSSEC secure, they <bcp14>MAY</bcp14> be cached authoritatively immediately without additional validation queries.
DNSSEC validation is enough validation in those cases.
Otherwise, the addresses cannot be assumed to be complete or even authoritatively present in the same zone, and additional validation queries <bcp14>SHOULD</bcp14> be made for these addresses.</t>

<t>Note that there may be outstanding address validation queries for the names of the authoritative NS RRset (from referral address validation queries).
In those cases no new validation queries need to be made.</t>

</section>
</section>
<section anchor="strict"><name>Strict and opportunistic revalidation</name>

<section anchor="strictly-revalidating-referrals-and-authoritative-ns-rrset-responses"><name>Strictly revalidating referrals and authoritative NS RRset responses</name>

<t>Resolvers may choose to delay the response to a triggering query until it can be verified that the answer came from a name server listening on an authoritatively acquired address for an authoritatively acquired name.
This would offer the most trustworthy responses with the least risk for forgery or eavesdropping, however without fallback to lower ranked NS RRsets and addresses, there is no failure mitigation and a failed NS RRset validation query, due to a broken child NS RRset or to malfunctioning child zone's authoritative servers, will then lead to a hard failure to query the referred to child zone.</t>

<t>If the resolver chooses to delay the response, and there are no nameserver names in common between the child's apex NS RRset and the parent's delegation NS RRset, then any responses received from sending the triggering query to the parent's delegated nameservers <bcp14>SHOULD</bcp14> be discarded, and this query should be sent again to one of the child's apex nameservers.</t>

<t>Scoping <strong>strict</strong> upgrading of NS, A and AAAA RRset credibility <bcp14>SHOULD</bcp14> be limited to the root zone and zones delegated from the root zone only (see <xref target="scoped-upgrading"/>).</t>

</section>
<section anchor="opportunistic"><name>Opportunistic revalidating referral and authoritative NS RRset responses</name>

<t>In practice, many implementations are expected to answer the triggering query in advance of the validation query for performance reasons.
An additional reason is that there are unfortunately a number of nameservers in the field that (incorrectly) fail to properly answer explicit queries for zone apex NS records, and thus the revalidation logic may need to be applied lazily and opportunistically to deal with them.
In cases where the delegated nameservers respond incorrectly to an NS query, the resolver <bcp14>SHOULD</bcp14> abandon this algorithm for the zone in question and fall back to using only the information from the parent's referral response.</t>

<t>Operators <bcp14>MAY</bcp14> limit <em>strict</em> upgrading of NS, A and AAAA RRset credibility to the root zone and zones delegated from the root zone, and perform <em>opportunistic</em> revalidations for further delegations (see <xref target="scoped-upgrading"/>).</t>

</section>
</section>
<section anchor="revalidation"><name>Delegation Revalidation</name>

<t>The essence of this mechanism is revalidation of all delegation metadata that directly or indirectly supports an owner name in cache.
This requires a cache to remember the delegated name server names for each zone cut as received from the parent (delegating) zone's name servers, and also the TTL of that NS RRset, and the TTL of the associated DS RRset (if seen).</t>

<t>A delegation under revalidation is called a "revalidation point" and is "still valid" if its parent zone's servers still respond to an in-zone question with a referral to the revalidation point, and if that referral overlaps with the previously cached referral by at least one name server name, and the DS RRset (if seen) overlaps the previously cached DS RRset (if also seen) by at least one delegated signer.</t>

<t>If the response is not a referral or refers to a different zone than before, then the shape of the delegation hierarchy has changed.
If the response is a referral to the revalidation point but to a wholly novel NS RRset or a wholly novel DS RRset, then the authority for that zone has changed.
For clarity, this includes transitions between empty and non-empty DS RRsets.</t>

<t>If the shape of the delegation hierarchy or the authority for a zone has been found to change, then currently cached data whose owner names are at or below that revalidation point <bcp14>MUST NOT</bcp14> be used.
Such non-use can be by directed garbage collection or lazy generational garbage collection or some other method befitting the architecture of the cache.
What matters is that the cache behave as though this data was removed.</t>

<t>Since revalidation can discover changes in the shape of the delegation hierarchy it is more efficient to revalidate from the top (root) downward (to the owner name) since an upper level revalidation may obviate lower level revalidations.
What matters is that the supporting chain of delegations from the root to the owner name be demonstrably valid; further specifics are implementation details.</t>

<t>Revalidation <bcp14>MUST</bcp14> be triggered when delegation meta-data has been cached for a period at most exceeding the delegating NS or DS (if seen) RRset TTL.
If the corresponding child zone's apex NS RRset TTL is smaller than the delegating NS RRset TTL, revalidation <bcp14>MUST</bcp14> happen at that interval instead.
However, resolvers <bcp14>SHOULD</bcp14> impose a sensible minimum TTL floor they are willing to endure to avoid potential computational DoS attacks inflicted by zones with very short TTLs.</t>

<t>In normal operations this meta-data can be quickly revalidated with no further work.
However, when re-delegation or take-down occurs, a revalidating cache <bcp14>SHOULD</bcp14> discover this within one delegation TTL period, allowing the rapid expulsion of old data from the cache.</t>

</section>
<section anchor="IANA"><name>IANA Considerations</name>

<t>IANA is requested to assign a value to the "Extended DNS Error Codes" registry <xref target="RFC8914"/>.</t>

<texttable>
      <ttcol align='left'>INFO-CODE</ttcol>
      <ttcol align='left'>Purpose</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>TBD</c>
      <c>referral NS RRset mismatch</c>
      <c>[this document]</c>
</texttable>

</section>
<section anchor="security"><name>Security and Privacy Considerations</name>

<section anchor="impact"><name>DNSSEC protection of infrastructure data</name>

<t>Referral response NS RRsets and glue, and the additional addresses from authoritative NS RRset responses (such as the root priming response), are not protected with DNSSEC signatures.
An attacker that is able to alter the unsigned A and AAAA RRsets in the additional section of referral and authoritative NS RRset responses, can fool a resolver into taking addresses under the control of the attacker to be authoritative for the zone.
Such an attacker can redirect all traffic to the zone (of the referral or authoritative NS RRset response) to a rogue name server.</t>

<t>A rogue name server can view all queries from the resolver to that zone and alter all unsigned parts of responses, such as the parent side NS RRsets and glue of further referral responses.
Resolvers following referrals from a rogue name server, that do not revalidate those referral responses, can subsequently be fooled into taking addresses under the control of the attacker to be authoritative for those delegations as well.
The higher up the DNS tree, the more impact such an attack has.
An attacker controlling a rogue name server for the root has potentially complete control over the entire domain name space and can alter all unsigned parts undetected.</t>

<t>Strictly revalidating referral and authoritative NS RRset responses (see <xref target="strict"/>), enables the resolver to defend itself against the above described attack with DNSSEC signed infrastructure RRsets.
Unlike cache poisoning defences that leverage increase entropy to protect the transaction, revalidation of NS RRsets and addresses also provides protection against on-path attacks.</t>

<t>Since December 6, 2023, the root zone contains a DNSSEC signed cryptographic message digest <xref target="RFC8976"/><xref target="ROOT-ZONEMD"/>, covering all root zone data.
This includes all non-authoritative data such as the A and AAAA RRsets for the IP addresses of the root server identifiers, as well as the NS RRsets and glue that make up the delegations.
A root zone local to the resolver <xref target="RFC8806"/> with a verified and validated ZONEMD RRset, would provide protection similarly strong to strictly revalidating the root and the top level domains.</t>

</section>
<section anchor="cache-poisoning-protection"><name>Cache poisoning protection</name>

<t>In <xref target="DNS-CACHE-INJECTIONS"/> an overview is given of 18 cache poisoning attacks of which 13 can be remedied with delegation revalidation.
The paper provides recommendations for handling records in DNS responses with respect to an earlier version of the idea presented in this document <xref target="I-D.wijngaards-dnsext-resolver-side-mitigation"/>.</t>

<t><xref target="upgrade-ns">Upgrading NS RRset Credibility</xref> allows resolvers to cache and utilize the authoritative child apex NS RRset in preference to the non-authoritative parent NS RRset.
However, it is important to implement the steps described in <xref target="revalidation">Delegation Revalidation</xref> at the expiration of the parent's delegating TTL.
Otherwise, the operator of a malicious child zone, originally delegated to, but subsequently delegated away from, can cause resolvers that refresh TTLs on subsequent NS set queries, or that pre-fetch NS queries, to never learn of the re-delegated zone <xref target="GHOST1"/>, <xref target="GHOST2"/>.</t>

</section>
<section anchor="other-considerations"><name>Other considerations</name>
<t>Some resolvers do not adhere to Sections <xref target="RFC2181" section="5.4.1" sectionFormat="bare"/> and <xref target="RFC2181" section="6.1" sectionFormat="bare"/> of <xref target="RFC2181"/>, and only use the non-authoritative parent side NS RRsets and glue returned in referral responses for contacting authoritative name servers <xref target="I-D.fujiwara-dnsop-resolver-update"/>.
As a consequence, they are not susceptible to many of the cache poisoning attacks enumerated in <xref target="DNS-CACHE-INJECTIONS"/> that are based upon the relative trustworthiness of DNS data.
Such resolvers are also not susceptible to the GHOST domain attacks <xref target="GHOST1"/>, <xref target="GHOST2"/>.
Such resolvers will however never benefit from DNSSEC protection of infrastructure RRsets and are susceptible to query redirection attacks.</t>

<t>Revalidating referral and authoritative NS RRset responses will induce more traffic from the resolver to the authoritative name servers.
The traffic increase may be substantial if the address RRsets for the names in the NS RRset's Rdata were provided non-authoritatively (as glue or as additional addresses) and need revalidation too <xref target="REDIRECTED-QUERY-TRAFFIC"/>.
Resolvers <bcp14>SHOULD</bcp14> take care to limit the amount of work they are willing to do to resolve a query to a sensible amount.</t>

</section>
</section>


  </middle>

  <back>


    <references title='Normative References' anchor="sec-normative-references">

&RFC1034;
&RFC1035;
&RFC2181;
&RFC2308;
&RFC8109;
&RFC8806;
&RFC8914;
&RFC8976;
&RFC9520;
&RFC9567;
&RFC2119;
&RFC8174;


    </references>

    <references title='Informative References' anchor="sec-informative-references">

&I-D.fujiwara-dnsop-resolver-update;
&I-D.vixie-dnsext-resimprove;
&I-D.wijngaards-dnsext-resolver-side-mitigation;
&I-D.ietf-deleg;
<reference anchor="GHOST1" target="https://www.ndss-symposium.org/ndss2012/">
  <front>
    <title>Ghost Domain Names: Revoked Yet Still Resolvable</title>
    <author initials="J." surname="Jiang" fullname="J Jiang">
      <organization></organization>
    </author>
    <author initials="J." surname="Liang" fullname="J Liang">
      <organization></organization>
    </author>
    <author initials="K." surname="Li" fullname="K Li">
      <organization></organization>
    </author>
    <author initials="J." surname="Li" fullname="J Li">
      <organization></organization>
    </author>
    <author initials="H." surname="Duan" fullname="H Duan">
      <organization></organization>
    </author>
    <author initials="J." surname="Wu" fullname="J Wu">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="GHOST2" target="https://www.ndss-symposium.org/ndss-paper/ghost-domain-reloaded-vulnerable-links-in-domain-name-delegation-and-revocation/">
  <front>
    <title>Ghost Domain Reloaded: Vulnerable Links in Domain Name Delegation and Revocation</title>
    <author initials="X." surname="Li" fullname="Xiang Li">
      <organization></organization>
    </author>
    <author initials="B." surname="Liu" fullname="Baojun Liu">
      <organization></organization>
    </author>
    <author initials="X." surname="Bai" fullname="Xuesong Bai">
      <organization></organization>
    </author>
    <author initials="M." surname="Zhang" fullname="Mingming Zhang">
      <organization></organization>
    </author>
    <author initials="Q." surname="Zhang" fullname="Qifan Zhang">
      <organization></organization>
    </author>
    <author initials="Z." surname="Li" fullname="Zhou Li">
      <organization></organization>
    </author>
    <author initials="H." surname="Duan" fullname="Haixin Duan">
      <organization></organization>
    </author>
    <author initials="Q." surname="Li" fullname="Qi Li">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="DNS-CACHE-INJECTIONS" target="https://ieeexplore.ieee.org/abstract/document/8057202">
  <front>
    <title>Internet-Wide Study of DNS Cache Injections</title>
    <author initials="A." surname="Klein" fullname="Amit Klein">
      <organization></organization>
    </author>
    <author initials="H." surname="Shulman" fullname="Haya Shulman">
      <organization></organization>
    </author>
    <author initials="M." surname="Waidner" fullname="Michael Waidner">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="ROOT-ZONEMD" target="https://lists.dns-oarc.net/pipermail/dns-operations/2023-December/022388.html">
  <front>
    <title>Root zone operational announcement: introducing ZONEMD for the root zone</title>
    <author initials="D." surname="Wessels" fullname="Duane Wessels">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="SOMMESE" target="https://par.nsf.gov/servlets/purl/10186683">
  <front>
    <title>When parents and children disagree: Diving into DNS delegation inconsistency</title>
    <author initials="R." surname="Sommese" fullname="Raffaele Sommese">
      <organization></organization>
    </author>
    <author initials="G. C. M." surname="Moura" fullname="Giovane C.M. Moura">
      <organization></organization>
    </author>
    <author initials="M." surname="Jonker" fullname="Mattijs Jonker">
      <organization></organization>
    </author>
    <author initials="R." surname="van Rijswijk-Deij" fullname="Roland van Rijswijk-Deij">
      <organization></organization>
    </author>
    <author initials="A." surname="Dainotti" fullname="Alberto Dainotti">
      <organization></organization>
    </author>
    <author initials="K. C." surname="Claffy" fullname="K.C. Claffy">
      <organization></organization>
    </author>
    <author initials="A." surname="Sperotto" fullname="Anna Sperotto">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="REDIRECTED-QUERY-TRAFFIC" target="https://www.icann.org/en/system/files/files/reduced-risk-redirected-query-traffic-signed-root-name-server-data-22may24-en.pdf#h.8mh7wvmas7vi">
  <front>
    <title>The reduced risk of redirected query traffic with signed root name server data</title>
    <author initials="W." surname="Toorop" fullname="Willem Toorop">
      <organization></organization>
    </author>
    <author initials="Y." surname="Thessalonikefs" fullname="Yorgos Thessalonikefs">
      <organization></organization>
    </author>
    <author initials="B." surname="Overeinder" fullname="Benno Overeinder">
      <organization></organization>
    </author>
    <author initials="M." surname="Müller" asciiSurname="Muller" fullname="Moritz Müller" asciiFullname="Moritz Muller">
      <organization></organization>
    </author>
    <author initials="M." surname="Davids" fullname="Marco Davids">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>


    </references>


<?line 466?>

<section anchor="Acknowledgements"><name>Acknowledgements</name>

<t>Wouter Wijngaards proposed explicitly obtaining authoritative child NS data in <xref target="I-D.wijngaards-dnsext-resolver-side-mitigation"/>.
This behavior has been implemented in the Unbound DNS resolver via the "harden-referral-path" option.
The combination of child NS fetch and revalidating the delegation was originally proposed in <xref target="I-D.vixie-dnsext-resimprove"/>, by Paul Vixie, Rodney Joffe, and Frederico Neves.</t>

<t>The authors would like to thank Ralph Dolmans who was an early collaborator on this work, as well as the many members of the IETF DNS Operations Working Group for helpful comments and discussion.</t>

</section>
<section anchor="implementation-status"><name>Implementation status</name>

<t><strong>Note to the RFC Editor</strong>: please remove this entire appendix before publication.</t>

<t><list style="symbols">
  <t>The Unbound resolver software has opportunistic revalidating of referral and authoritative NS RRset responses, as described in <xref target="upgrade-ns"/>, <xref target="upgrade-addresses"/> and <xref target="opportunistic"/> in this document, implemented since version 1.1 (released August 29, 2008).
It is enabled with a configuration option <spanx style="verb">harden-referral-path: yes</spanx> which is disabled by default.  <vspace blankLines='1'/>
"Redhat Enterprise Linux has been running Unbound with the <spanx style="verb">harden-referral-path:</spanx> option set to <spanx style="verb">yes</spanx> for years without problems", as mentioned by Paul Wouters during dnsop workgroup session at the IETF 119.</t>
  <t>The Knot Resolver software revalidates the priming response as part of priming the root zone since version 1.5.1 (released December 12, 2017)</t>
  <t><xref target="revalidation"/> has been implemented in the Unbound resolver since version 1.4.17 (released May 24, 2012).</t>
</list></t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

