Domain Name System Operations (dnsop) Internet Drafts


      
 IP Fragmentation Avoidance in DNS over UDP
 
 draft-ietf-dnsop-avoid-fragmentation-17.txt
 Date: 29/02/2024
 Authors: Kazunori Fujiwara, Paul Vixie
 Working Group: Domain Name System Operations (dnsop)
The widely deployed EDNS0 feature in the DNS enables a DNS receiver to indicate its received UDP message size capacity, which supports the sending of large UDP responses by a DNS server. Large DNS/UDP messages are more likely to be fragmented and IP fragmentation has exposed weaknesses in application protocols. It is possible to avoid IP fragmentation in DNS by limiting the response size where possible, and signaling the need to upgrade from UDP to TCP transport where necessary. This document specifies techniques to avoid IP fragmentation in DNS.
 Delegation Revalidation by DNS Resolvers
 
 draft-ietf-dnsop-ns-revalidation-06.txt
 Date: 17/03/2024
 Authors: Shumon Huque, Paul Vixie, Willem Toorop
 Working Group: Domain Name System Operations (dnsop)
This document recommends improved DNS [RFC1034] [RFC1035] resolver behavior with respect to the processing of Name Server (NS) resource record sets (RRset) during iterative resolution. When following a referral response from an authoritative server to a child zone, DNS resolvers should explicitly query the authoritative NS RRset at the apex of the child zone and cache this in preference to the NS RRset on the parent side of the zone cut. The (A and AAAA) address RRsets in the additional section from referral responses and authoritative NS answers for the names of the NS RRset, should similarly be re- queried and used to replace the entries with the lower trustworthiness ranking in cache. Resolvers should also periodically revalidate the child delegation by re-querying the parent zone at the expiration of the TTL of the parent side NS RRset.
 DNS Error Reporting
 
 draft-ietf-dnsop-dns-error-reporting-08.txt
 Date: 04/03/2024
 Authors: Roy Arends, Matt Larson
 Working Group: Domain Name System Operations (dnsop)
DNS error reporting is a lightweight reporting mechanism that provides the operator of an authoritative server with reports on DNS resource records that fail to resolve or validate. A domain owner or DNS hosting organization can use these reports to improve domain hosting. The reports are based on extended DNS errors as described in [RFC8914]. When a domain name fails to resolve or validate due to a misconfiguration or an attack, the operator of the authoritative server may be unaware of this. To mitigate this lack of feedback, this document describes a method for a validating resolver to automatically signal an error to a monitoring agent specified by the authoritative server. The error is encoded in the QNAME, thus the very act of sending the query is to report the error.
 The DNS Zone Version (ZONEVERSION) Option
 
 draft-ietf-dnsop-zoneversion-05.txt
 Date: 15/01/2024
 Authors: Hugo Salgado, Mauricio Ereche, Duane Wessels
 Working Group: Domain Name System Operations (dnsop)
The DNS ZONEVERSION option is a way for DNS clients to request, and for authoritative DNS servers to provide, information regarding the version of the zone from which a response is generated. The Serial field from the Start Of Authority (SOA) resource record is a good example of a zone's version, and the only one defined by this specification. Additional version types may be defined by future specifications. Including zone version data in a response simplifies and improves the quality of debugging and and diagnostics since the version and the data are provided atomically. This can be especially useful for zones and DNS providers that leverage IP anycast or multiple backend systems. It functions similarly to the NSID option.
 Automatic DNSSEC Bootstrapping using Authenticated Signals from the Zone's Operator
 
 draft-ietf-dnsop-dnssec-bootstrapping-08.txt
 Date: 11/04/2024
 Authors: Peter Thomassen, Nils Wisiol
 Working Group: Domain Name System Operations (dnsop)
This document introduces an in-band method for DNS operators to publish arbitrary information about the zones they are authoritative for, in an authenticated fashion and on a per-zone basis. The mechanism allows managed DNS operators to securely announce DNSSEC key parameters for zones under their management, including for zones that are not currently securely delegated. Whenever DS records are absent for a zone's delegation, this signal enables the parent's registry or registrar to cryptographically validate the CDS/CDNSKEY records found at the child's apex. The parent can then provision DS records for the delegation without resorting to out-of-band validation or weaker types of cross-checks such as "Accept after Delay". This document deprecates the DS enrollment methods described in Section 3 of RFC 8078 in favor of Section 4 of this document, and also updates RFC 7344. [ Ed note: This document is being collaborated on at https://github.com/desec-io/draft-ietf-dnsop-dnssec-bootstrapping/ (https://github.com/desec-io/draft-ietf-dnsop-dnssec-bootstrapping/). The authors gratefully accept pull requests. ]
 DNSSEC automation
 
 draft-ietf-dnsop-dnssec-automation-02.txt
 Date: 22/10/2023
 Authors: Ulrich Wisser, Shumon Huque, Johan Stenstam
 Working Group: Domain Name System Operations (dnsop)
This document describes an algorithm and protocol to automate the setup, operations, and decomissioning of Multi-Signer DNSSEC [RFC8901] configurations. It employs Model 2 of the Multi-Signer specification, where each operator has their own distinct KSK and ZSK sets (or CSK sets), Managing DS Records from the Parent via CDS/ CDNSKEY [RFC8078], and Child-to-Parent Synchronization in DNS [RFC7477] to accomplish this.
 Domain Control Validation using DNS
 
 draft-ietf-dnsop-domain-verification-techniques-04.txt
 Date: 03/03/2024
 Authors: Shivan Sahib, Shumon Huque, Paul Wouters, Erik Nygren
 Working Group: Domain Name System Operations (dnsop)
Many application services on the Internet need to verify ownership or control of a domain in the Domain Name System (DNS). The general term for this process is "Domain Control Validation", and can be done using a variety of methods such as email, HTTP/HTTPS, or the DNS itself. This document focuses only on DNS-based methods, which typically involve the application service provider requesting a DNS record with a specific format and content to be visible in the requester's domain. There is wide variation in the details of these methods today. This document proposes some best practices to avoid known problems.
 Using DNSSEC Authentication of Named Entities (DANE) with DNS Service Bindings (SVCB) and QUIC
 
 draft-ietf-dnsop-svcb-dane-03.txt
 Date: 29/11/2023
 Authors: Benjamin Schwartz, Robert Evans
 Working Group: Domain Name System Operations (dnsop)
Service Binding (SVCB) records introduce a new form of name indirection in DNS. They also convey information about the endpoint's supported protocols, such as whether QUIC transport is available. This document specifies how DNS-Based Authentication of Named Entities (DANE) interacts with Service Bindings to secure connections, including use of port numbers and transport protocols discovered via SVCB queries. The "_quic" transport name label is introduced to distinguish TLSA records for DTLS and QUIC.
 Structured Error Data for Filtered DNS
 
 draft-ietf-dnsop-structured-dns-error-08.txt
 Date: 31/01/2024
 Authors: Dan Wing, Tirumaleswar Reddy.K, Neil Cook, Mohamed Boucadair
 Working Group: Domain Name System Operations (dnsop)
DNS filtering is widely deployed for various reasons, including network security. However, filtered DNS responses lack structured information for end users to understand the reason for the filtering. Existing mechanisms to provide explanatory details to end users cause harm especially if the blocked DNS response is for HTTPS resources. This document updates RFC 8914 by signaling client support for structuring the EXTRA-TEXT field of the Extended DNS Error to provide details on the DNS filtering. Such details can be parsed by the client and displayed, logged, or used for other purposes.
 Compact Denial of Existence in DNSSEC
 
 draft-ietf-dnsop-compact-denial-of-existence-03.txt
 Date: 04/03/2024
 Authors: Shumon Huque, Christian Elmerot, Olafur Gudmundsson
 Working Group: Domain Name System Operations (dnsop)
This document describes a technique to generate a signed DNS response on demand for a non-existent name by claiming that the name exists but doesn't have any data for the queried record type. Such answers require only one minimal NSEC record, allow online signing servers to minimize signing operations and response sizes, and prevent zone content disclosure. Discussion Venues This note is to be removed before publishing as an RFC. Source for this draft and an issue tracker can be found at https://github.com/shuque/id-dnssec-compact-lies.
 Initializing a DNS Resolver with Priming Queries
 
 draft-ietf-dnsop-rfc8109bis-04.txt
 Date: 14/02/2024
 Authors: Peter Koch, Matt Larson, Paul Hoffman
 Working Group: Domain Name System Operations (dnsop)
This document describes the queries that a DNS resolver should emit to initialize its cache. The result is that the resolver gets both a current NS Resource Record Set (RRset) for the root zone and the necessary address information for reaching the root servers. This document, when published, obsoletes RFC 8109. See Section 1.1 for the list of changes from RFC 8109.
 Generalized DNS Notifications
 
 draft-ietf-dnsop-generalized-notify-01.txt
 Date: 04/03/2024
 Authors: Johan Stenstam, Peter Thomassen, John Levine
 Working Group: Domain Name System Operations (dnsop)
This document extends the use of DNS NOTIFY ([RFC1996] beyond conventional zone transfer hints, bringing the benefits of ad-hoc notifications to DNS delegation maintenance in general. Use cases include DNSSEC key rollovers hints, and quicker changes to a delegation's NS record set. To enable this functionality, a method for discovering the receiver endpoint for such notification message is introduced, via the new NOTIFY record type. TO BE REMOVED: This document is being collaborated on in Github at: https://github.com/peterthomassen/draft-ietf-dnsop-generalized-notify (https://github.com/peterthomassen/draft-ietf-dnsop-generalized- notify). The most recent working version of the document, open issues, etc. should all be available there. The authors (gratefully) accept pull requests.
 In the DNS,QDCOUNT is (usually) One
 
 draft-ietf-dnsop-qdcount-is-one-02.txt
 Date: 04/03/2024
 Authors: Ray Bellis, Joe Abley
 Working Group: Domain Name System Operations (dnsop)
This document clarifies the allowable values of the QDCOUNT parameter in DNS messages with OPCODE = 0 (QUERY) and specifies the required behaviour when values that are not allowed are encountered.
 DNSSEC Trust Anchor Publication for the Root Zone
 
 draft-ietf-dnsop-rfc7958bis-01.txt
 Date: 04/03/2024
 Authors: Joe Abley, Jakob Schlyter, Guillaume Bailey, Paul Hoffman
 Working Group: Domain Name System Operations (dnsop)
The root zone of the Domain Name System (DNS) has been cryptographically signed using DNS Security Extensions (DNSSEC). In order to obtain secure answers from the root zone of the DNS using DNSSEC, a client must configure a suitable trust anchor. This document describes the format and publication mechanisms IANA uses to distribute the DNSSEC trust anchors.


data-group-menu-data-url="/group/groupmenu.json"> Skip to main content

Domain Name System Operations (dnsop)

WG Name Domain Name System Operations
Acronym dnsop
Area Operations and Management Area (ops)
State Active
Charter charter-ietf-dnsop-04 Approved
Document dependencies
Additional resources Legacy Jabber Logs
Wiki
Zulip stream
github
mastodon
twitter
Personnel Chairs Benno Overeinder, Suzanne Woolf, Tim Wicinski
Area Director Warren "Ace" Kumari
Mailing list Address dnsop@ietf.org
To subscribe http://www.ietf.org/mailman/listinfo/dnsop
Archive https://mailarchive.ietf.org/arch/browse/dnsop/
Chat Room address https://zulip.ietf.org/#narrow/stream/dnsop

Charter for Working Group

The DNS Operations Working Group will develop guidelines for the
operation of DNS software and services and for the administration
of DNS zones. These guidelines will provide technical information
relating to the implementation of the DNS protocol by the operators
and administrators of DNS zones. The group will perform the following
activities:

  1. Describe practices by which Domain Name System (DNS) software
    may be efficiently and correctly administered, configured, and
    operated on Internet networks. This will include root zone name
    servers, TLD name servers, or any other resolver or server
    functioning as part of the global DNS. As part of this effort,
    the group will produce documents explaining to the general
    Internet community what processes and mechanisms should be
    employed for the effective management and operation of DNS
    software and services, including root, TLD, and recursive servers.

  2. Publish documents concerning DNSSEC operational procedures.

  3. Publish documents concerning DNS operational
    procedures in IPv6 and mixed IPv6-IPv4 networks, and provide
    documentation and guidance on DNS-related IPv6 transition and
    coexistence issues.

  4. Publish documents to address operational issues with the DNS
    protocols by extending or performing protocol maintenance
    on them. Act as focal-point for operator discussion and provide
    advice to the Ops ADs and other WGs on EDNS0 options, new
    RRTYPEs, DNSSEC, record synthesis, or other mechanics of
    extending DNS to support other applications.

  5. Serve as a home for drafts that document the problem space
    around existing or new DNS issues. The group, with the advice
    and consent of the responsible AD in coordination with other areas,
    will then decide whether these issues belong in DNSOP under
    the existing charter and, if not, will work with the authors and
    appropriate ADs to determine the proper place for the work to be
    carried out.

  6. Publish documents that attempt to better define the overlapping
    area among the public DNS root, DNS-like names as used in local
    or restricted naming scopes, and the 'special names' registry
    that IETF manages, perhaps including how they might interact.
    This work must take into consideration issues that are strictly
    beyond the operation of the DNS itself, and the working group
    will consult with IETF liaisons to other organizations as
    appropriate.

Done milestones

Date Milestone Associated documents
Done IESG Appoval for dnssec-key-timing