<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.39 (Ruby 3.4.9) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-dnsop-ds-automation-08" category="bcp" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="DS Automation">Operational Recommendations for DNSSEC Delegation Signer (DS) Automation</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-dnsop-ds-automation-08"/>
    <author initials="S." surname="Sheng" fullname="Steve Sheng">
      <organization/>
      <address>
        <email>steve.sheng@gmail.com</email>
      </address>
    </author>
    <author initials="P." surname="Thomassen" fullname="Peter Thomassen">
      <organization>deSEC</organization>
      <address>
        <email>peter@desec.io</email>
      </address>
    </author>
    <date/>
    <area>Internet</area>
    <workgroup>DNSOP Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 60?>

<t>Enabling support for automatic acceptance of DNSSEC Delegation Signer (DS) parameters from the Child DNS operator (via RFCs 7344, 8078, 9615) requires the parental agent, often a registry or registrar, to make a number of technical decisions around acceptance checks, error and success reporting, and multi-party issues such as concurrent updates. This document describes recommendations about how these points are best addressed in practice.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Domain Name System Operations Working Group mailing list (dnsop@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/dnsop/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/peterthomassen/draft-shetho-dnsop-ds-automation"/>.</t>
    </note>
  </front>
  <middle>
    <?line 64?>

<section anchor="introduction">
      <name>Introduction</name>
      <t><xref target="RFC7344"/>, <xref target="RFC8078"/>, and <xref target="RFC9615"/> automate DNSSEC <xref target="RFC9364"/> delegation trust maintenance by having the child publish Child DS (CDS) and/or Child DNSKEY (CDNSKEY) records which indicate the delegation's desired DNSSEC parameters ("DS automation").</t>
      <t>Parental Agents using these protocols have to make a number of technical decisions relating to issues of acceptance checks, timing, error reporting, locks, etc. Additionally, when using the registrant-registrar-registry (RRR) model (as is common amongst top-level domains), both the registrar and the registry can effect parent-side changes to the delegation. In such a situation, additional opportunities for implementation differences arise.</t>
      <t>Not all existing DS automation deployments have made the same choices with respect to these questions, leading to somewhat inconsistent behavior. From the perspective of a domain holder with domain names under various TLDs, this may be unexpected and confusing.</t>
      <t>In the following sections, operational questions are first raised and answered with the corresponding recommendations. Each section is concluded with an analysis of its recommendations and related considerations. A combined view of the recommendations from all sections is given in <xref target="recommendations_overview"/>.</t>
      <t>Readers are expected to be familiar with DNSSEC <xref target="RFC9364"/><xref target="RFC9615"/><xref target="RFC9859"/>.</t>
      <t>The core issues addressed in the document are derived from Section 4.4 of <xref target="SAC126"/>. Readers are referred to this report for additional background.</t>
      <section anchor="requirements-notation">
        <name>Requirements Notation</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
        </t>
      </section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The term Parental Agent is used as defined in <xref section="1.1" sectionFormat="of" target="RFC7344"/>. The document also uses terms defined in <xref target="RFC9499"/>, in particular:</t>
      <ul spacing="normal">
        <li>
          <t>DNS operator</t>
        </li>
        <li>
          <t>Registry</t>
        </li>
        <li>
          <t>Registrant</t>
        </li>
        <li>
          <t>Registrar</t>
        </li>
      </ul>
      <t>In addition, the document makes use of the following terms:</t>
      <dl>
        <dt>Child zone:</dt>
        <dd>
          <t>DNS zone whose delegation is in the Parent zone.</t>
        </dd>
        <dt>Child (DNS operator):</dt>
        <dd>
          <t>DNS operator responsible for a Child zone.</t>
        </dd>
        <dt>Parent zone:</dt>
        <dd>
          <t>DNS zone that holds a delegation for a Child zone.</t>
        </dd>
        <dt>Parent:</dt>
        <dd>
          <t>The operator responsible for a Parent zone and, thus, involved with the maintenance of the delegation's DNSSEC parameters (in particular, the acceptance of these parameters and the publication of corresponding DS records).</t>
        </dd>
        <dt>RRR Model:</dt>
        <dd>
          <t>The registrant-registrar-registry (RRR) interaction framework, where registrants interact with a registrar to register and manage domain names, and registrars interact with the domain's registry for the provision and management of domain names on the registrant's behalf. This model is common amongst TLDs.</t>
        </dd>
      </dl>
    </section>
    <section anchor="recommendations-for-deployments-of-ds-automation">
      <name>Recommendations for Deployments of DS Automation</name>
      <t>The guidelines for deploying DS automation set out in this document are meant to achieve more uniform treatment across suffixes — minimizing user surprise and providing baseline safety and uniformity of behavior.
They are also intended to prevent disruption of DNS and DNSSEC functionality.
At a minimum, compliance with this RFC requires support for both DNSSEC bootstrapping <xref target="RFC9615"/> and subsequent updates <xref target="RFC7344"/>, <xref target="RFC8078"/> under the implementation guidance below.</t>
      <t>The recommendations optimize interoperability and safety. In certain cases, local policy may take precedence, such as when a registry is subjected to national cryptographic policy requirements or performs out-of-band verification of DS changes with a human for high-stake domains.
However, not following any requirements designated with the "SHOULD" key word will generally lead to undesirable effects of ambiguity and interoperability issues.
When implementing these recommendations, operators have to carefully weigh whether any particular deviation is justified in their particular context.</t>
      <t>Registries with additional requirements on DS update checks MAY implement any additional checks in line with local policy.</t>
    </section>
    <section anchor="acceptance">
      <name>Acceptance Checks and Safety Measures</name>
      <t>This section provides recommendations to address the following operational questions:</t>
      <ul spacing="normal">
        <li>
          <t>What kind of acceptance checks should be performed on DS parameters?</t>
        </li>
        <li>
          <t>Should these checks be performed upon acceptance or also continually when in place?</t>
        </li>
        <li>
          <t>How do TTLs and caching impact DS provisioning? How important is timing in a child key change?</t>
        </li>
        <li>
          <t>Are parameters for DS automation best conveyed as CDNSKEY or CDS records, or both?</t>
        </li>
      </ul>
      <section anchor="recommendations">
        <name>Recommendations</name>
        <ol spacing="normal" type="1"><li>
            <t>Entities performing automated DS maintenance MUST verify:  </t>
            <ol spacing="normal" type="a"><li>
                <t>the unambiguous intent of each DS update request as per <xref target="I-D.ietf-dnsop-cds-consistency"/>, by checking its consistency both      </t>
                <ul spacing="normal">
                  <li>
                    <t>between any published CDS and CDNSKEY records, and</t>
                  </li>
                  <li>
                    <t>across all authoritative nameservers in the delegation,</t>
                  </li>
                </ul>
                <t>
and</t>
              </li>
              <li>
                <t>that the resulting DS record set would allow continued DNSSEC validation if deployed,</t>
              </li>
            </ol>
            <t>
and cancel the update if the verifications do not succeed.</t>
          </li>
          <li>
            <t>Parent-side entities (such as registries) SHOULD reduce a DS record set's TTL to a value between 5–15 minutes when a new set of records is published, and restore the normal TTL value at a later occasion (but not before the previous DS RRset's TTL has expired).</t>
          </li>
          <li>
            <t>DNS operators SHOULD publish both CDNSKEY and CDS records, and follow best practice for the choice of hash digest type <xref target="DS-IANA"/>.</t>
          </li>
        </ol>
      </section>
      <section anchor="analysis_acceptance">
        <name>Analysis</name>
        <section anchor="continuity-of-resolution">
          <name>Continuity of Resolution</name>
          <t>To maintain the basic resolution function, it is important to avoid the deployment of flawed DS record sets in the parent zone. It is therefore desirable for the Parent to verify that the DS record set resulting from an automated (or even manual) update does not break DNSSEC validation if deployed, and otherwise cancel the update.</t>
          <t>This is best achieved by:</t>
          <ol spacing="normal" type="1"><li>
              <t>verifying that consistent CDS/CDNSKEY responses are served by all of the delegation's nameservers <xref target="I-D.ietf-dnsop-cds-consistency"/>;</t>
            </li>
            <li>
              <t>verifying that the resulting DS Resource Record set (RRset) does not break the delegation if applied (<xref section="4.1" sectionFormat="comma" target="RFC7344"/>), i.e., it provides at least one valid path for validators to use (<xref section="5.11" sectionFormat="comma" target="RFC6840"/>). This is the case if the child's DNSKEY RRset has a valid RRSIG signature from a key that is referenced by at least one DS record, with the digest type and signing algorithm values designated as "RECOMMENDED" or "MUST" in the "Use for DNSSEC Validation" columns of the relevant IANA registries (<xref target="DS-IANA"/> and <xref target="DNSKEY-IANA"/>). Note that these checks need not be enforced when provisioning DS records manually in order to enable the use other digest types or algorithms for potentially non-interoperable purposes.</t>
            </li>
          </ol>
          <t>Even without an update being requested, Parents may occasionally check whether the current DS contents would still be acceptable if they were newly submitted in CDS/CDNSKEY form (see <xref target="acceptance"/>).
Any failures — such as a missing DNSKEY due to improper rollover timing (<xref section="4.1" sectionFormat="comma" target="RFC6781"/>), or changed algorithm requirements — can then be communicated in line with <xref target="reporting"/>, without altering or removing the existing DS RRset.</t>
        </section>
        <section anchor="ttls-and-caching">
          <name>TTLs and Caching</name>
          <t>To further reduce the impact of any misconfigured DS record set — be it from automated or from manual provisioning — the option to quickly roll back the delegation's DNSSEC parameters is of great importance. This is achieved by setting a comparatively low TTL on the DS record set in the parent domain, at the cost of reduced resiliency against nameserver unreachability due to the earlier expiration of cached records. The availability risk can be mitigated by limiting such TTLs to a brief time period after a change to the DS configuration, during which rollbacks are most likely to occur.</t>
          <t>Registries therefore should significantly lower the DS RRset's TTL for some time following bootstrapping or an update. Pragmatic values for the reduced TTL value range between 5–15 minutes.  Such low TTLs might be expected to cause increased load on the corresponding authoritative nameservers; however, recent measurements have demonstrated them to have negligible impact on the overall load of a registry's authoritative nameserver infrastructure <xref target="LowTTL"/>.</t>
          <t>The reduction should be in effect at least for a couple of days and until the previous DS record set has expired from caches, that is, the period during which the low-TTL is applied typically will significantly exceed the normal TTL value. When using the Extensible Provisioning Protocol (EPP) <xref target="RFC5730"/>, the domain <tt>&lt;info&gt;</tt> command described in <xref section="2.1.1.2" sectionFormat="of" target="RFC9803"/> is available for advertising the server's TTL policy.</t>
          <t>While this approach enables quick rollbacks, timing of the desired DS update process itself is largely governed by the previous DS RRset's TTL, and therefore does not generally benefit from an overall speed-up. Note also that nothing is gained from first lowering the TTL of the old DS RRset: such an additional step would, in fact, require another wait period while resolver caches adjust. For the sake of completeness, there likewise is no point to increasing any DS TTL values beyond their normal value.</t>
        </section>
        <section anchor="cds-vs-cdnskey">
          <name>CDS vs. CDNSKEY</name>
          <t>DS records can be generated from information provided either in DS format (CDS) or in DNSKEY format (CDNSKEY). While the format of CDS records is identical to that of DS records (so the record data be taken verbatim), generation of a DS record from CDNSKEY information involves computing a hash.</t>
          <t>Whether a Parent processes CDS or CDNSKEY records depends on their preference:</t>
          <ul spacing="normal">
            <li>
              <t>Processing (and storing) CDNSKEY information allows the Parent to control the choice of hash algorithms. The Parent may then unilaterally regenerate DS records with a different choice of hash algorithm(s) whenever deemed appropriate.</t>
            </li>
            <li>
              <t>Processing CDS information allows the Child DNS operator to control the hash digest type used in DS records, enabling the Child DNS operator to deploy (for example) experimental hash digests and removing the need for registry-side changes when additional digest types become available.</t>
            </li>
          </ul>
          <t>The need to make a choice in the face of this dichotomy is not specific to DS automation: even when DNSSEC parameters are relayed to the Parent through conventional channels, the Parent has to make some choice about which format(s) to accept.</t>
          <t>As there exists no protocol for Child DNS operators to discover a Parent's input format preference, it is best for interoperability to publish both CDNSKEY as well as CDS records, in line with <xref section="5" sectionFormat="of" target="RFC7344"/>. The choice of hash digest type should follow current best practice <xref target="DS-IANA"/>.</t>
          <t>Publishing the same information in two different formats is not ideal. Still, it is much less complex and costly than burdening the Child DNS operator with discovering each Parent's current policy. Also, it is very easily automated. Operators should ensure that published RRsets are consistent with each other.</t>
          <t>If both RRsets are published, Parents are expected to verify consistency between them by verifying that they refer to the same set of keys <xref target="I-D.ietf-dnsop-cds-consistency"/>. By not second-guessing inconsistencies (such as by RRset recency) and instead rejecting them, responsibility to clearly express each update request is placed on the Child DNS operator.</t>
          <t>CDS records need only be considered for CDNSKEY consistency when their digest type field is designated as "MUST" in the "Implement for DNSSEC Delegation" column of the "Digest Algorithms" registry <xref target="DS-IANA"/>.
Consistency of records with other digest types need not be verified, especially when the digest type is unsupported; such records can be ignored.
Note that this does not imply a restriction on the DS hash digest types: if no inconsistencies are found, the parent can publish DS records with whatever digest type(s) it prefers.</t>
        </section>
      </section>
    </section>
    <section anchor="reporting">
      <name>Reporting and Transparency</name>
      <t>This section provides recommendations to address the following operational question:</t>
      <ul spacing="normal">
        <li>
          <t>Should a failed (or even successful) DS update trigger a notification to anyone?</t>
        </li>
      </ul>
      <section anchor="recommendations-1">
        <name>Recommendations</name>
        <ol spacing="normal" type="1"><li>
            <t>For certain DS updates (see <xref target="analysis_reporting">analysis</xref>) and for DS deactivation, relevant points of contact known to the parent-side entity (registry or registrar) SHOULD be notified.</t>
          </li>
          <li>
            <t>For error conditions, the child DNS operator and the domain's technical contact (if applicable) SHOULD be notified first. The registrant SHOULD NOT be notified unless the problem persists for a prolonged amount of time (e.g., three days).</t>
          </li>
          <li>
            <t>Child DNS operators SHOULD be notified of errors using a report query <xref target="RFC9567"/> to the agent domain as described in <xref section="4" sectionFormat="of" target="RFC9859"/>. Notifications to humans (domain holder) will be performed in accordance with the communication preferences established with the parent-side entity. The same condition SHOULD NOT be reported unnecessarily frequently to the same recipient.</t>
          </li>
          <li>
            <t>In the RRR model, registries performing DS automation SHOULD inform the registrar of any DS record changes via the EPP Change Poll Extension <xref target="RFC8590"/> or a similar channel.</t>
          </li>
          <li>
            <t>The currently active DS configuration SHOULD be made accessible to the registrant (or their designated party) through the customer portal available for domain management. The DS update history MAY be made available in the same way.</t>
          </li>
        </ol>
      </section>
      <section anchor="analysis_reporting">
        <name>Analysis</name>
        <t>When accepting or rejecting a DS update, it cannot be assumed that relevant parties are aware of what's happening. For example, a registrar may not know when an automatic DS update is performed by the registry. Similarly, a Child DNS operator may not be aware when their CDS/CDNSKEY RRsets are out of sync across nameservers, causing them to be ignored.</t>
        <t>To help involved parties act appropriately and in a timely manner, entities performing automated DS maintenance should report on conditions they encounter. The following success situations may be of particular interest:</t>
        <ol spacing="normal" type="1"><li anchor="reporting-1">
            <t>A DS RRset has been provisioned  </t>
            <ol spacing="normal" type="a"><li anchor="reporting-1a">
                <t>manually;</t>
              </li>
              <li anchor="reporting-1b">
                <t>due to commencing DS automation (either via DNSSEC bootstrapping, or for the first time after a manual change; see <xref target="multiple"/>);</t>
              </li>
              <li anchor="reporting-1c">
                <t>automatically, as an update to an existing DS RRset that had itself been automatically provisioned.</t>
              </li>
            </ol>
          </li>
          <li anchor="reporting-2">
            <t>The DS RRset has been removed  </t>
            <ol spacing="normal" type="a"><li>
                <t>manually;</t>
              </li>
              <li>
                <t>automatically, using a delete signal (<xref section="4" sectionFormat="comma" target="RFC8078"/>).</t>
              </li>
            </ol>
          </li>
        </ol>
        <t>In addition, there are error conditions worthy of being reported:</t>
        <ol spacing="normal" type="1" start="3"><li anchor="reporting-3">
            <t>A pending DS update cannot be applied due to an error condition. There are various scenarios where an automated DS update might have been requested, but can't be fulfilled. These include:  </t>
            <ol spacing="normal" type="a"><li>
                <t>The new DS record set would break validation/resolution or is not acceptable to the Parent for some other reason (see <xref target="acceptance"/>).</t>
              </li>
              <li>
                <t>A lock prevents DS automation (see <xref target="locks"/>).</t>
              </li>
            </ol>
          </li>
          <li anchor="reporting-4">
            <t>No DS update is due, but it was determined that the Child zone is no longer compatible with the existing DS record set (e.g., DS RRset only references non-existing keys).</t>
          </li>
        </ol>
        <t>In these latter two cases, the entity performing DS automation would be justified to attempt communicating the situation. Potential recipients are:</t>
        <ul spacing="normal">
          <li>
            <t>Child DNS operator, preferably by making a report query <xref target="RFC9567"/> to the agent domain listed in the EDNS0 Report-Channel option of the DS update notification that triggered the DS update (<xref section="4" sectionFormat="comma" target="RFC9859"/>), or else via email to the address contained in the child zone's SOA RNAME field (see Sections <xref target="RFC1035" section="3.3.13" sectionFormat="bare"/> and <xref target="RFC1035" section="8" sectionFormat="bare"/> of <xref target="RFC1035"/>);</t>
          </li>
          <li>
            <t>Registrar (if DS automation is performed by the registry);</t>
          </li>
          <li>
            <t>Registrant (domain holder; in non-technical language, such as "DNSSEC security for your domain has been enabled and will be maintained automatically") or technical contact, in accordance with the communication preferences established with the parent-side entity.</t>
          </li>
        </ul>
        <t>For manual updates (<xref target="reporting-1a" format="none">case 1a</xref>), commencing DS automation (<xref target="reporting-1b" format="none">case 1b</xref>), and deactivating DNSSEC (<xref target="reporting-2" format="none">case 2</xref>), it seems worthwhile to notify both the domain's technical contact (if applicable) and the registrant. This will typically lead to one notification during normal operation of a domain. (<xref target="reporting-1c" format="none">Case 1c</xref>, the regular operation of automation, is not an interesting condition to report to a human.)</t>
        <t>For error conditions (cases <xref target="reporting-3" format="none">3</xref> and <xref target="reporting-4" format="none">4</xref>), the registrant need not always be involved. It seems advisable to first notify the domain's technical contact and the DNS operator serving the affected Child zone, and only if the problem persists for a prolonged amount of time (e.g., three days), notify the registrant.</t>
        <t>When the RRR model is used and the registry performs DS automation, the registrar should always stay informed of any DS record changes, e.g., via the EPP Change Poll Extension <xref target="RFC8590"/>.</t>
        <t>Overly frequent reporting of the same condition to the same recipient is discouraged (e.g., no more than twice in a row). For example, when CDS and CDNSKEY records are inconsistent and prevent DS initialization, the registrant may be notified twice. Additional notifications may be sent with some back-off mechanism (in increasing intervals).</t>
        <t>The registrant (or their designated party) should be able to retrieve the current DS configuration through the customer portal available for domain management. Ideally, the history of DS updates would also be available. However, due to the associated state requirements and the lack of direct operational impact, implementation of this is optional.</t>
        <t>For troubleshooting, dispute resolution, and post-incident analysis, it is instrumental for the Parental Agent to retain structured records of DS automation decisions, including timestamp, triggering CDS/CDNSKEY RRsets, notification channel, authoritative nameservers consulted, verification results, decision outcome, and the applied DS RRset or cancellation reason.</t>
      </section>
    </section>
    <section anchor="locks">
      <name>Registration Locks</name>
      <t>This section provides recommendations to address the following operational question:</t>
      <ul spacing="normal">
        <li>
          <t>How does DS automation interact with other registration state parameters, such as registration locks?</t>
        </li>
      </ul>
      <section anchor="recommendations-2">
        <name>Recommendations</name>
        <ol spacing="normal" type="1"><li>
            <t>To secure ongoing operations, automated DS maintenance MUST NOT be suspended based on a registrar update lock alone (such as EPP status clientUpdateProhibited <xref target="RFC5731"/>).</t>
          </li>
          <li>
            <t>When performed by the registry, automated DS maintenance MUST NOT be suspended based on a registry update lock alone (such as EPP status serverUpdateProhibited <xref target="RFC5731"/>).</t>
          </li>
        </ol>
      </section>
      <section anchor="analysis_locks">
        <name>Analysis</name>
        <t>Registries and registrars can set various types of locks for domain registrations, usually upon the registrant's request. An overview of standardized locks using EPP, for example, is given in <xref section="2.3" sectionFormat="of" target="RFC5731"/>. Some registries may offer additional (or other) types of locks whose meaning and set/unset mechanisms are defined according to a proprietary policy.</t>
        <t>While some locks clearly should have no impact on DS automation (such as transfer or deletion locks), other types of locks, in particular "update locks", deserve a closer analysis.</t>
        <section anchor="registrar-vs-registry-lock">
          <name>Registrar vs. Registry Lock</name>
          <t>A registrar-side update lock (such as clientUpdateProhibited in EPP) protects against various types of accidental or malicious change (like unintended changes through the registrar's customer portal). Its security model does not prevent the registrar's (nor the registry's) actions. This is because a registrar-side lock can be removed by the registrar without an out-of-band interaction.</t>
          <t>Under such a security model, no tangible security benefit is gained by preventing automated DS maintenance based on a registrar lock alone, while preventing it would make maintenance needlessly difficult. It therefore seems reasonable not to suspend automation when such a lock is present.</t>
          <t>When a registry-side update lock is in place, the registrar cannot apply any changes (for security or delinquency or other reasons). However, it does not protect against changes made by the registry itself. This is exemplified by the serverUpdateProhibited EPP status, which demands only that the registrar's "[r]equests to update the object [...] MUST be rejected" (<xref section="2.3" sectionFormat="of" target="RFC5731"/>). This type of lock therefore precludes DS automation by the registrar, while registry-side automation may continue.</t>
          <t>DS automation by the registry further is consistent with <xref section="2.3" sectionFormat="of" target="RFC5731"/>, which explicitly notes that an EPP server (registry) may override status values set by an EPP client (registrar), subject to local server policies. The risk that DS changes from registry-side DS automation might go unnoticed by the registrar is mitigated by sending change notifications to the registrar; see Recommendation 4 of <xref target="reporting"/>.</t>
        </section>
        <section anchor="detailed-rationale">
          <name>Detailed Rationale</name>
          <t>Pre-DNSSEC, it was possible for a registration to be set up once, then locked and left alone (no maintenance required). With DNSSEC comes a change to this operational model: the configuration may have to be maintained in order to remain secure and operational. For example, the Child DNS operator may switch to another signing algorithm if the previous one is no longer deemed appropriate, or roll its Secure Entry Point (SEP) key for other reasons. Such changes entail updating the delegation's DS records.</t>
          <t>If authenticated, these operations do not qualify as accidental or malicious change, but as legitimate and normal activity for securing ongoing operation. The CDS/CDNSKEY method provides an automatic, authenticated means to convey DS update requests. The resulting DS update is subject to the parent's acceptance checks; in particular, it is not applied when it would break the delegation (see <xref target="acceptance"/>).</t>
          <t>Given that registrar locks protect against unintended changes (such as through the customer portal) while not preventing actions done by the registrar (or the registry) themself, such a lock is not suitable for defending against actions performed illegitimately by the registrar or registry (e.g., due to compromise). Any attack on the registration data that is feasible in the presence of a registrar lock is also feasible regardless of whether DS maintenance is done automatically; in other words, DS automation is orthogonal to the attack vector that a registrar lock protects against.</t>
          <t>Considering that automated DS updates are required to be authenticated and validated for correctness, it thus appears that honoring such requests, while in the registrant's interest, comes with no additional associated risk. Suspending automated DS maintenance therefore does not seem justified.</t>
          <t>Following this line of thought, at the time of document writing some registries (e.g., .ch/.cz/.li) perform automated DS maintenance even when an "update lock" is in place. Registries offering proprietary locks should carefully consider for each lock whether its scope warrants suspension.</t>
          <t>In case of a domain not yet secured with DNSSEC, automatic DS initialization is not required to maintain ongoing operation; however, authenticated DNSSEC bootstrapping <xref target="RFC9615"/> might be requested. Besides being in the interest of security, the fact that a Child is requesting DS initialization through an authenticated method expresses the registrant's intent to have the delegation secured.</t>
          <t>Further, some domains are equipped with an update lock by default. Not honoring DNSSEC bootstrapping requests then imposes an additional burden on the registrant, who has to unlock and relock the domain in order to facilitate DS provisioning after registration. This is a needless cost especially for large domain portfolios. It is also unexpected, as the registrant already has arranged for the necessary CDS/CDNSKEY records to be published. DS initialization and rollovers therefore should be treated the same way with respect to locks.</t>
        </section>
      </section>
    </section>
    <section anchor="multiple">
      <name>Multiple Submitting Parties</name>
      <t>This section provides recommendations to address the following operational questions:</t>
      <ul spacing="normal">
        <li>
          <t>How are conflicts resolved when DS parameters are accepted through multiple channels (e.g., via a conventional channel and via automation)?</t>
        </li>
        <li>
          <t>In case both the registry and the registrar are automating DS updates, how to resolve potential collisions?</t>
        </li>
      </ul>
      <section anchor="recommendations-3">
        <name>Recommendations</name>
        <ol spacing="normal" type="1"><li>
            <t>Registries and registrars MUST provide another (e.g., manual) channel for DS maintenance in order to enable recovery when the Child has lost access to its signing key(s). This out-of-band channel is also needed when a DNS operator does not support DS automation or refuses to cooperate.</t>
          </li>
          <li>
            <t>DS update requests SHOULD be executed immediately after verification of their authenticity, regardless of whether they are received in-band or via an out-of-band channel.</t>
          </li>
          <li>
            <t>When processing a CDS/CDNSKEY "delete" signal to remove the entire DS record set (<xref section="4" sectionFormat="comma" target="RFC8078"/>), DS automation MUST NOT be suspended. For all other removal requests (such as when received via EPP or a web form), DS automation SHOULD be suspended until a new DS record set has been provisioned, in order to prevent accidental re-initialization when the registrant intended to disable DNSSEC.</t>
          </li>
          <li>
            <t>Whenever a non-empty DS record set is provisioned, through whichever channel, DS automation SHOULD NOT (or no longer) be suspended (including after an earlier removal).</t>
          </li>
          <li>
            <t>In the RRR model, a registry SHOULD NOT automatically initialize DS records when it is known that the registrar does not provide a way for the domain holder to later disable DNSSEC. If the registrar has declared that it performs automated DS maintenance, the registry SHOULD publish the registrar's <xref target="RFC9859"/> notification endpoint (if applicable) and refrain from registry-side DS automation.</t>
          </li>
        </ol>
      </section>
      <section anchor="analysis_multiple">
        <name>Analysis</name>
        <t>In the RRR model, there are multiple channels through which DS parameters can be accepted:</t>
        <ul spacing="normal">
          <li>
            <t>The registry can retrieve information about an intended DS update automatically from the Child DNS operator and apply the update directly;</t>
          </li>
          <li>
            <t>The registrar can retrieve the same and relay it to the registry;</t>
          </li>
          <li>
            <t>The registrar can obtain the information from the registrant through another channel (such as a non-automated "manual update" via webform submission), and relay it to the registry.</t>
          </li>
        </ul>
        <t>There are several considerations in this context, as discussed in the following subsections.</t>
        <section anchor="necessity-of-non-automatic-updates">
          <name>Necessity of Non-automatic Updates</name>
          <t>Under special circumstances, it may be necessary to perform a non-automatic DS update. One important example is when the key used for authentication of DS updates is destroyed: in this case, an automatic key rollover is impossible as the Child DNS operator can no longer authenticate the associated information. Another example is when several providers are involved, but one no longer cooperates (e.g., when removing a provider from a multi-provider setup). Disabling manual DS management interfaces is therefore strongly discouraged.</t>
          <t>Similarly, when the registrar is known to not support DNSSEC (or to lack a DS provisioning interface), it seems adequate for registries to not perform automated DS maintenance, in order to prevent situations in which a misconfigured delegation cannot be repaired by the registrant.</t>
        </section>
        <section anchor="impact-of-non-automatic-updates-when-to-suspend-automation">
          <name>Impact of Non-automatic Updates: When to Suspend Automation</name>
          <t>When an out-of-band (e.g., manual) DS update is performed while CDS/CDNSKEY records referencing the previous DS RRset's keys are present, the delegation's DS records may be reset to their previous state at the next run of the automation process. This section discusses in which situations it is appropriate to suspend DS automation after such a non-automatic update.</t>
          <t>One option is to suspend DS automation after a manual DS update, but only until a resumption signal is observed. In the past, it was proposed that seeing an updated SOA serial in the child zone may serve as a resumption signal. However, as any arbitrary modification of zone contents — including the regular updating of DNSSEC signature validity timestamps — typically causes a change in SOA serial, resumption of DS automation after a serial change comes with a high risk of surprise. Additional issues arise if nameservers have different serial offsets (e.g., in a multi-provider setup). This practice therefore is NOT RECOMMENDED.</t>
          <t>Note also that "automatic rollback" due to old CDS/CDNSKEY RRsets can only occur if they are signed with a key authorized by one of new DS records. Acceptance checks described in <xref target="acceptance"/> further ensure that updates do not break validation.</t>
          <t>Removal of a DS record set is triggered either through a CDS/CDNSKEY "delete" signal observed by the party performing the automation (<xref section="4" sectionFormat="comma" target="RFC8078"/>), or by receiving a removal request out-of-band (e.g., via EPP or a web form). In the first case, it is useful to keep automation active for the delegation in question, to facilitate later DS bootstrapping. In the second case, it is likely that the registrant intends to disable DNSSEC for the domain, and DS automation is best suspended (until a new DS record is provisioned somehow).</t>
          <t>One may ask how a registry can know whether a removal request received via EPP was the result of the registrar observing a CDS/CDNSKEY "delete" signal. It turns out that the registry does not need to know that; in fact, the advice works out nicely regardless of who does the automation:</t>
          <ol spacing="normal" type="a"><li>
              <t>Only registry: If the registry performs automation, then the registry will consider any request received from the registrar as out-of-band (in the context of this automation). When such requests demand removal of the entire DS record set, the registry therefore should suspend automation.</t>
            </li>
            <li>
              <t>Only registrar: The registrar can always distinguish between removal requests obtained from a CDS/CDNSKEY "delete" signal and other registrant requests, and suspend automation as appropriate.</t>
            </li>
            <li>
              <t>In the (undesirable) case that both parties automate, there are two cases:  </t>
              <ul spacing="normal">
                <li>
                  <t>If the registrant submits a manual removal request to the registrar, it is out-of-band from the registrar perspective (e.g., web form), and also for the registry (e.g., EPP). As a consequence, both will suspend automation (which is the correct result).</t>
                </li>
                <li>
                  <t>If a CDS/CDNSKEY "delete" signal causes the registrar to request DS removal from the registry, then the registry will suspend automation (because the removal request is received out-of-band, such as via EPP). This is independent of whether the registry's automation has already seen the signal. The registrar, however, will be aware of the in-band nature of the request and not suspend automation (which is also the correct result).</t>
                </li>
              </ul>
              <t>
As a side effect, this works towards avoiding redundant automation at the registry.</t>
            </li>
          </ol>
          <t>All in all:</t>
          <ul spacing="normal">
            <li>
              <t>It is advisable to generally not suspend in-band DS automation when an out-of-band DS update has occurred.</t>
            </li>
            <li>
              <t>An exception from this rule is when the entire DS record set was removed through an out-of-band request, in which case the registrant likely wants to disable DNSSEC for the domain. DS automation should then be suspended so that automatic re-initialization (bootstrapping) does not occur.</t>
            </li>
            <li>
              <t>In all other cases, any properly authenticated DS updates received, including through an automated method, are to be considered as the current intent of the domain holder.</t>
            </li>
          </ul>
        </section>
        <section anchor="concurrent-automatic-updates">
          <name>Concurrent Automatic Updates</name>
          <t>When the RRR model is used, there is a potential for collision if both the registry and the registrar are automating DS provisioning by scanning the child for CDS/CDNSKEY records. No disruptive consequences are expected if both parties perform DS automation. An exception is when during a key rollover, registry and registrar see different versions of the Child's DS update requests, such as when CDS/CDNSKEY records are retrieved from different vantage points. Although unlikely due to Recommendation 1a of <xref target="acceptance"/>, this may lead to flapping of DS updates. However, it is not expected to be harmful as either DS RRset will allow for the validation function to continue to work, as ensured by Recommendation 1b of <xref target="acceptance"/>. The effect subsides as the Child's state eventually becomes consistent (roughly, within the child's replication delay); any flapping until then will be a minor nuisance only.</t>
          <t>The issue disappears entirely when scanning is replaced by notifications that trigger DS maintenance through one party's designated endpoint <xref target="RFC9859"/>, and can otherwise be mitigated if the registry and registrar agree that only one of them will perform scanning.</t>
          <t>As a standard aspect of key rollovers <xref target="RFC6781"/>, the Child DNS operator is expected to monitor propagation of Child zone updates to all authoritative nameserver instances, and only proceed to the next step once replication has succeeded everywhere and the DS record set was subsequently updated (and in no case before the DS RRset's TTL has passed). Any breakage resulting from improper timing on the Child side is outside of the Parent's sphere of influence, and thus cannot be handled with only parent-side changes.</t>
        </section>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>The document provides operational recommendations for DNSSEC DS automation. There are no additional operational considerations beyond those listed in <xref target="recommendations_overview"/>.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document considers security aspects throughout, and has no separate considerations.</t>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank the members of ICANN's Security and Stability Advisory Committee (SSAC) who wrote the <xref target="SAC126"/> report on which this document is based.</t>
      <t>Additional thanks are extended to the following individuals (in the order of their first contribution or review): Barbara Jantzen, Matt Pounsett, Matthijs Mekking, Ondřej Caletka, Oli Schacher, Kim Davies, Jim Reid, Q Misell, Scott Hollenbeck, Tamás Csillag, Philip Homburg, Shumon Huque (Document Shepherd), Libor Peltan, Josh Simpson, Johan Stenstam, Stefan Ubbink, Viktor Dukhovni, Hugo Salgado, Wes Hardaker, Mohamed Boucadair (Area Director), Meir Goldman, Thomas Fossati, Peter van Dijk, Jiankang Yao, Donald Eastlake, James Gannon, Roman Danyliw</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="DNSKEY-IANA" target="https://www.iana.org/assignments/dns-sec-alg-numbers/dns-sec-alg-numbers.xml#dns-sec-alg-numbers-1">
          <front>
            <title>DNS Security Algorithm Numbers</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="DS-IANA" target="http://www.iana.org/assignments/ds-rr-types">
          <front>
            <title>Delegation Signer (DS) Resource Record (RR) Type Digest Algorithms</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC7344">
          <front>
            <title>Automating DNSSEC Delegation Trust Maintenance</title>
            <author fullname="W. Kumari" initials="W." surname="Kumari"/>
            <author fullname="O. Gudmundsson" initials="O." surname="Gudmundsson"/>
            <author fullname="G. Barwood" initials="G." surname="Barwood"/>
            <date month="September" year="2014"/>
            <abstract>
              <t>This document describes a method to allow DNS Operators to more easily update DNSSEC Key Signing Keys using the DNS as a communication channel. The technique described is aimed at delegations in which it is currently hard to move information from the Child to Parent.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7344"/>
          <seriesInfo name="DOI" value="10.17487/RFC7344"/>
        </reference>
        <reference anchor="RFC8078">
          <front>
            <title>Managing DS Records from the Parent via CDS/CDNSKEY</title>
            <author fullname="O. Gudmundsson" initials="O." surname="Gudmundsson"/>
            <author fullname="P. Wouters" initials="P." surname="Wouters"/>
            <date month="March" year="2017"/>
            <abstract>
              <t>RFC 7344 specifies how DNS trust can be maintained across key rollovers in-band between parent and child. This document elevates RFC 7344 from Informational to Standards Track. It also adds a method for initial trust setup and removal of a secure entry point.</t>
              <t>Changing a domain's DNSSEC status can be a complicated matter involving multiple unrelated parties. Some of these parties, such as the DNS operator, might not even be known by all the organizations involved. The inability to disable DNSSEC via in-band signaling is seen as a problem or liability that prevents some DNSSEC adoption at a large scale. This document adds a method for in-band signaling of these DNSSEC status changes.</t>
              <t>This document describes reasonable policies to ease deployment of the initial acceptance of new secure entry points (DS records).</t>
              <t>It is preferable that operators collaborate on the transfer or move of a domain. The best method is to perform a Key Signing Key (KSK) plus Zone Signing Key (ZSK) rollover. If that is not possible, the method using an unsigned intermediate state described in this document can be used to move the domain between two parties. This leaves the domain temporarily unsigned and vulnerable to DNS spoofing, but that is preferred over the alternative of validation failures due to a mismatched DS and DNSKEY record.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8078"/>
          <seriesInfo name="DOI" value="10.17487/RFC8078"/>
        </reference>
        <reference anchor="RFC9615">
          <front>
            <title>Automatic DNSSEC Bootstrapping Using Authenticated Signals from the Zone's Operator</title>
            <author fullname="P. Thomassen" initials="P." surname="Thomassen"/>
            <author fullname="N. Wisiol" initials="N." surname="Wisiol"/>
            <date month="July" year="2024"/>
            <abstract>
              <t>This document introduces an in-band method for DNS operators to publish arbitrary information about the zones for which they are authoritative, in an authenticated fashion and on a per-zone basis. The mechanism allows managed DNS operators to securely announce DNSSEC key parameters for zones under their management, including for zones that are not currently securely delegated.</t>
              <t>Whenever DS records are absent for a zone's delegation, this signal enables the parent's registry or registrar to cryptographically validate the CDS/CDNSKEY records found at the child's apex. The parent can then provision DS records for the delegation without resorting to out-of-band validation or weaker types of cross-checks such as "Accept after Delay".</t>
              <t>This document establishes the DS enrollment method described in Section 4 of this document as the preferred method over those from Section 3 of RFC 8078. It also updates RFC 7344.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9615"/>
          <seriesInfo name="DOI" value="10.17487/RFC9615"/>
        </reference>
        <reference anchor="RFC9364">
          <front>
            <title>DNS Security Extensions (DNSSEC)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>This document describes the DNS Security Extensions (commonly called "DNSSEC") that are specified in RFCs 4033, 4034, and 4035, as well as a handful of others. One purpose is to introduce all of the RFCs in one place so that the reader can understand the many aspects of DNSSEC. This document does not update any of those RFCs. A second purpose is to state that using DNSSEC for origin authentication of DNS data is the best current practice. A third purpose is to provide a single reference for other documents that want to refer to DNSSEC.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="237"/>
          <seriesInfo name="RFC" value="9364"/>
          <seriesInfo name="DOI" value="10.17487/RFC9364"/>
        </reference>
        <reference anchor="RFC9859">
          <front>
            <title>Generalized DNS Notifications</title>
            <author fullname="J. Stenstam" initials="J." surname="Stenstam"/>
            <author fullname="P. Thomassen" initials="P." surname="Thomassen"/>
            <author fullname="J. Levine" initials="J." surname="Levine"/>
            <date month="September" year="2025"/>
            <abstract>
              <t>This document generalizes and extends the use of DNS NOTIFY (RFC 1996) beyond conventional zone transfer hints to allow other types of actions that were previously lacking a trigger mechanism to be triggered via the DNS. Notifications merely nudge the receiver to initiate a predefined action promptly (instead of on a schedule); they do not alter the action itself (including any security checks it might employ).</t>
              <t>To enable this functionality, a method for discovering the receiver endpoint for such notification messages is introduced, via the new DSYNC record type. Notification types are recorded in a new registry, with initial support for parental NS and DS record updates including DNSSEC bootstrapping.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9859"/>
          <seriesInfo name="DOI" value="10.17487/RFC9859"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC9499">
          <front>
            <title>DNS Terminology</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
              <t>This document updates RFC 2308 by clarifying the definitions of "forwarder" and "QNAME". It obsoletes RFC 8499 by adding multiple terms and clarifications. Comprehensive lists of changed and new definitions can be found in Appendices A and B.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="219"/>
          <seriesInfo name="RFC" value="9499"/>
          <seriesInfo name="DOI" value="10.17487/RFC9499"/>
        </reference>
        <reference anchor="I-D.ietf-dnsop-cds-consistency">
          <front>
            <title>Clarifications on CDS/CDNSKEY and CSYNC Consistency</title>
            <author fullname="Peter Thomassen" initials="P." surname="Thomassen">
              <organization>SSE - Secure Systems Engineering GmbH</organization>
            </author>
            <date day="11" month="December" year="2025"/>
            <abstract>
              <t>   Maintenance of DNS delegations requires occasional changes of the DS
   and NS record sets on the parent side of the delegation.  For the
   case of DS records, "Automating DNSSEC Delegation Trust Maintenance"
   (RFC 7344) provides automation by allowing the child to publish CDS
   and/or CDNSKEY records holding the prospective DS parameters which
   the parent can ingest.  Similarly, "Child-to-Parent Synchronization
   in DNS" (RFC 7477) specifies CSYNC records to indicate a desired
   update of the delegation's NS (and glue) records.  Parent-side
   entities (e.g., Registries and Registrars) can query these records
   from the child and, after validation, use them to update the parent-
   side Resource Record Sets (RRsets) of the delegation.

   This document specifies under which conditions the target states
   expressed via CDS/CDNSKEY and CSYNC records are considered
   "consistent".  Parent-side entities accepting such records from the
   child have to ensure that update requests retrieved from different
   authoritative nameservers satisfy these consistency requirements
   before taking any action based on them.

   This document updates RFC 7344 and RFC 7477.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dnsop-cds-consistency-11"/>
        </reference>
        <reference anchor="RFC9567">
          <front>
            <title>DNS Error Reporting</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <date month="April" year="2024"/>
            <abstract>
              <t>DNS error reporting is a lightweight reporting mechanism that provides the operator of an authoritative server with reports on DNS resource records that fail to resolve or validate. A domain owner or DNS hosting organization can use these reports to improve domain hosting. The reports are based on extended DNS errors as described in RFC 8914.</t>
              <t>When a domain name fails to resolve or validate due to a misconfiguration or an attack, the operator of the authoritative server may be unaware of this. To mitigate this lack of feedback, this document describes a method for a validating resolver to automatically signal an error to a monitoring agent specified by the authoritative server. The error is encoded in the QNAME; thus, the very act of sending the query is to report the error.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9567"/>
          <seriesInfo name="DOI" value="10.17487/RFC9567"/>
        </reference>
        <reference anchor="RFC8590">
          <front>
            <title>Change Poll Extension for the Extensible Provisioning Protocol (EPP)</title>
            <author fullname="J. Gould" initials="J." surname="Gould"/>
            <author fullname="K. Feher" initials="K." surname="Feher"/>
            <date month="May" year="2019"/>
            <abstract>
              <t>This document describes an Extensible Provisioning Protocol (EPP) extension for notifying clients of operations on client-sponsored objects that were not initiated by the client through EPP. These operations may include contractual or policy requirements including, but not limited to, regular batch processes, customer support actions, Uniform Domain-Name Dispute-Resolution Policy (UDRP) or Uniform Rapid Suspension (URS) actions, court-directed actions, and bulk updates based on customer requests. Since the client is not directly involved or knowledgable of these operations, the extension is used along with an EPP object mapping to provide the resulting state of the postoperation object, and optionally a preoperation object, with the operation metadata of what, when, who, and why.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8590"/>
          <seriesInfo name="DOI" value="10.17487/RFC8590"/>
        </reference>
        <reference anchor="RFC1035">
          <front>
            <title>Domain names - implementation and specification</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1035"/>
          <seriesInfo name="DOI" value="10.17487/RFC1035"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="LowTTL" target="https://indico.dns-oarc.net/event/47/contributions/1010/attachments/958/1811/DS%20and%20DNSKEY%20TTL%20experiment.pdf">
          <front>
            <title>DS and DNSKEY low TTL experiments</title>
            <author initials="P." surname="Špaček" fullname="Petr Špaček">
              <organization>ISC</organization>
            </author>
            <date year="2023" month="September" day="06"/>
          </front>
          <seriesInfo name="at" value="DNS OARC 41"/>
        </reference>
        <reference anchor="SAC126" target="https://itp.cdn.icann.org/en/files/security-and-stability-advisory-committee-ssac-reports/sac-126-16-08-2024-en.pdf">
          <front>
            <title>SAC126: DNSSEC Delegation Signer (DS) Record Automation</title>
            <author>
              <organization>ICANN Security and Stability Advisory Committee (SSAC)</organization>
            </author>
            <date year="2024" month="August" day="12"/>
          </front>
        </reference>
        <reference anchor="RFC6840">
          <front>
            <title>Clarifications and Implementation Notes for DNS Security (DNSSEC)</title>
            <author fullname="S. Weiler" initials="S." role="editor" surname="Weiler"/>
            <author fullname="D. Blacka" initials="D." role="editor" surname="Blacka"/>
            <date month="February" year="2013"/>
            <abstract>
              <t>This document is a collection of technical clarifications to the DNS Security (DNSSEC) document set. It is meant to serve as a resource to implementors as well as a collection of DNSSEC errata that existed at the time of writing.</t>
              <t>This document updates the core DNSSEC documents (RFC 4033, RFC 4034, and RFC 4035) as well as the NSEC3 specification (RFC 5155). It also defines NSEC3 and SHA-2 (RFC 4509 and RFC 5702) as core parts of the DNSSEC specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6840"/>
          <seriesInfo name="DOI" value="10.17487/RFC6840"/>
        </reference>
        <reference anchor="RFC6781">
          <front>
            <title>DNSSEC Operational Practices, Version 2</title>
            <author fullname="O. Kolkman" initials="O." surname="Kolkman"/>
            <author fullname="W. Mekking" initials="W." surname="Mekking"/>
            <author fullname="R. Gieben" initials="R." surname="Gieben"/>
            <date month="December" year="2012"/>
            <abstract>
              <t>This document describes a set of practices for operating the DNS with security extensions (DNSSEC). The target audience is zone administrators deploying DNSSEC.</t>
              <t>The document discusses operational aspects of using keys and signatures in the DNS. It discusses issues of key generation, key storage, signature generation, key rollover, and related policies.</t>
              <t>This document obsoletes RFC 4641, as it covers more operational ground and gives more up-to-date requirements with respect to key sizes and the DNSSEC operations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6781"/>
          <seriesInfo name="DOI" value="10.17487/RFC6781"/>
        </reference>
        <reference anchor="RFC5730">
          <front>
            <title>Extensible Provisioning Protocol (EPP)</title>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
            <date month="August" year="2009"/>
            <abstract>
              <t>This document describes an application-layer client-server protocol for the provisioning and management of objects stored in a shared central repository. Specified in XML, the protocol defines generic object management operations and an extensible framework that maps protocol operations to objects. This document includes a protocol specification, an object mapping template, and an XML media type registration. This document obsoletes RFC 4930. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="69"/>
          <seriesInfo name="RFC" value="5730"/>
          <seriesInfo name="DOI" value="10.17487/RFC5730"/>
        </reference>
        <reference anchor="RFC9803">
          <front>
            <title>Extensible Provisioning Protocol (EPP) Mapping for DNS Time-to-Live (TTL) Values</title>
            <author fullname="G. Brown" initials="G." surname="Brown"/>
            <date month="June" year="2025"/>
            <abstract>
              <t>This document describes an extension to the Extensible Provisioning
Protocol (EPP) that allows EPP clients to manage the Time-to-Live
(TTL) value for domain name delegation records.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9803"/>
          <seriesInfo name="DOI" value="10.17487/RFC9803"/>
        </reference>
        <reference anchor="RFC5731">
          <front>
            <title>Extensible Provisioning Protocol (EPP) Domain Name Mapping</title>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
            <date month="August" year="2009"/>
            <abstract>
              <t>This document describes an Extensible Provisioning Protocol (EPP) mapping for the provisioning and management of Internet domain names stored in a shared central repository. Specified in XML, the mapping defines EPP command syntax and semantics as applied to domain names. This document obsoletes RFC 4931. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="69"/>
          <seriesInfo name="RFC" value="5731"/>
          <seriesInfo name="DOI" value="10.17487/RFC5731"/>
        </reference>
      </references>
    </references>
    <?line 423?>

<section anchor="recommendations_overview">
      <name>Recommendations Overview</name>
      <t>For ease of review and referencing, the recommendations from this document are reproduced here without further comment. For background and analysis, refer to Sections <xref format="counter" target="acceptance"/>–<xref format="counter" target="multiple"/>.</t>
      <section anchor="acceptance-checks-and-safety-measures">
        <name>Acceptance Checks and Safety Measures</name>
        <ol spacing="normal" type="1"><li>
            <t>Entities performing automated DS maintenance MUST verify:  </t>
            <ol spacing="normal" type="a"><li>
                <t>the unambiguous intent of each DS update request as per <xref target="I-D.ietf-dnsop-cds-consistency"/>, by checking its consistency both      </t>
                <ul spacing="normal">
                  <li>
                    <t>between any published CDS and CDNSKEY records, and</t>
                  </li>
                  <li>
                    <t>across all authoritative nameservers in the delegation,</t>
                  </li>
                </ul>
                <t>
and</t>
              </li>
              <li>
                <t>that the resulting DS record set would allow continued DNSSEC validation if deployed,</t>
              </li>
            </ol>
            <t>
and cancel the update if the verifications do not succeed.</t>
          </li>
          <li>
            <t>Parent-side entities (such as registries) SHOULD reduce a DS record set's TTL to a value between 5–15 minutes when a new set of records is published, and restore the normal TTL value at a later occasion (but not before the previous DS RRset's TTL has expired).</t>
          </li>
          <li>
            <t>DNS operators SHOULD publish both CDNSKEY and CDS records, and follow best practice for the choice of hash digest type <xref target="DS-IANA"/>.</t>
          </li>
        </ol>
      </section>
      <section anchor="reporting-and-transparency">
        <name>Reporting and Transparency</name>
        <ol spacing="normal" type="1"><li>
            <t>For certain DS updates (see <xref target="analysis_reporting">analysis</xref>) and for DS deactivation, relevant points of contact known to the parent-side entity (registry or registrar) SHOULD be notified.</t>
          </li>
          <li>
            <t>For error conditions, the child DNS operator and the domain's technical contact (if applicable) SHOULD be notified first. The registrant SHOULD NOT be notified unless the problem persists for a prolonged amount of time (e.g., three days).</t>
          </li>
          <li>
            <t>Child DNS operators SHOULD be notified of errors using a report query <xref target="RFC9567"/> to the agent domain as described in <xref section="4" sectionFormat="of" target="RFC9859"/>. Notifications to humans (domain holder) will be performed in accordance with the communication preferences established with the parent-side entity. The same condition SHOULD NOT be reported unnecessarily frequently to the same recipient.</t>
          </li>
          <li>
            <t>In the RRR model, registries performing DS automation SHOULD inform the registrar of any DS record changes via the EPP Change Poll Extension <xref target="RFC8590"/> or a similar channel.</t>
          </li>
          <li>
            <t>The currently active DS configuration SHOULD be made accessible to the registrant (or their designated party) through the customer portal available for domain management. The DS update history MAY be made available in the same way.</t>
          </li>
        </ol>
      </section>
      <section anchor="registration-locks">
        <name>Registration Locks</name>
        <ol spacing="normal" type="1"><li>
            <t>To secure ongoing operations, automated DS maintenance MUST NOT be suspended based on a registrar update lock alone (such as EPP status clientUpdateProhibited <xref target="RFC5731"/>).</t>
          </li>
          <li>
            <t>When performed by the registry, automated DS maintenance MUST NOT be suspended based on a registry update lock alone (such as EPP status serverUpdateProhibited <xref target="RFC5731"/>).</t>
          </li>
        </ol>
      </section>
      <section anchor="multiple-submitting-parties">
        <name>Multiple Submitting Parties</name>
        <ol spacing="normal" type="1"><li>
            <t>Registries and registrars MUST provide another (e.g., manual) channel for DS maintenance in order to enable recovery when the Child has lost access to its signing key(s). This out-of-band channel is also needed when a DNS operator does not support DS automation or refuses to cooperate.</t>
          </li>
          <li>
            <t>DS update requests SHOULD be executed immediately after verification of their authenticity, regardless of whether they are received in-band or via an out-of-band channel.</t>
          </li>
          <li>
            <t>When processing a CDS/CDNSKEY "delete" signal to remove the entire DS record set (<xref section="4" sectionFormat="comma" target="RFC8078"/>), DS automation MUST NOT be suspended. For all other removal requests (such as when received via EPP or a web form), DS automation SHOULD be suspended until a new DS record set has been provisioned, in order to prevent accidental re-initialization when the registrant intended to disable DNSSEC.</t>
          </li>
          <li>
            <t>Whenever a non-empty DS record set is provisioned, through whichever channel, DS automation SHOULD NOT (or no longer) be suspended (including after an earlier removal).</t>
          </li>
          <li>
            <t>In the RRR model, a registry SHOULD NOT automatically initialize DS records when it is known that the registrar does not provide a way for the domain holder to later disable DNSSEC. If the registrar has declared that it performs automated DS maintenance, the registry SHOULD publish the registrar's <xref target="RFC9859"/> notification endpoint (if applicable) and refrain from registry-side DS automation.</t>
          </li>
        </ol>
      </section>
    </section>
    <section anchor="change-history-to-be-removed-before-publication">
      <name>Change History (to be removed before publication)</name>
      <ul spacing="normal">
        <li>
          <t>draft-ietf-dnsop-ds-automation-08</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Elevate some defining features of DS automation from SHOULD to MUST</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>draft-ietf-dnsop-ds-automation-07</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Editorial changes from proofreading</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Editorial changes (Telechat review, James Gannon)</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Editorial changes (IETF LC, Donald Eastlake)</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>draft-ietf-dnsop-ds-automation-06</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Add historic background (IETF LC, Jiankang Yao)</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Editorial changes (IETF LC, Peter van Dijk)</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Point out importance of retaining decision details for troubleshooting
  (IETF LC, Meir Goldman)</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Editorial changes (IETF LC, Thomas Fossati)</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>draft-ietf-dnsop-ds-automation-05</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Editorial changes from AD Review</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>draft-ietf-dnsop-ds-automation-04</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Editorial changes</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>draft-ietf-dnsop-ds-automation-03</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Editorial changes</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>draft-ietf-dnsop-ds-automation-02</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Add Appendix with recommendations overview</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Editorial changes</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Change type to BCP</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Fold CDS/CDNSKEY consistency requirements (Section 6) into Section 2 (on acceptance checks)</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Clarify continuity of validation</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>In RRR, clarify that registries should not bootstrap if registrar has no deactivation interface (or if registrar does the automation)</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Remove Appendix C ("Approaches not pursued")</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>draft-ietf-dnsop-ds-automation-01</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Remove Recommendation 6.1.2 which had told parents to require publication of both CDS and CDNSKEY</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Clarify Recommendation 5.1.3 (on suspension of automation after DS RRset removal) and provide extra analysis</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Providing access to DS update history is now optional</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Humans (domains holders) should be notified according to preferences established with registry/registrar (not necessarily via email)</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Remove redundant Recommendation 5.1.5 (same as 3.1.4)</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Editorial changes</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>draft-ietf-dnsop-ds-automation-00</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Rename after adoption</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>draft-shetho-dnsop-ds-automation-02</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Allow DS automation during registry update lock</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Editorial changes</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>draft-shetho-dnsop-ds-automation-01</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Incorporated various review feedback (editorial + adding TODOs)</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>draft-shetho-dnsop-ds-automation-00</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Initial public draft.</t>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
