<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.34 (Ruby 3.2.3) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc compact="yes"?>
<?rfc subcompact="no"?>

<rfc ipr="trust200902" docName="draft-sury-dnsop-parent-centric-resolver-02" category="std" consensus="true" submissionType="IETF" updates="1034, 1035" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="Parent-Centric Resolver">Parent-Centric Delegation Handling in DNS Resolvers</title>

    <author initials="O." surname="Surý" fullname="Ondřej Surý">
      <organization>Internet Systems Consortium</organization>
      <address>
        <postal>
          <country>Czechia</country>
        </postal>
        <email>ondrej@isc.org</email>
      </address>
    </author>
    <author initials="C." surname="Vidal" fullname="Colin Vidal">
      <organization>Internet Systems Consortium</organization>
      <address>
        <postal>
          <country>France</country>
        </postal>
        <email>colin@isc.org</email>
      </address>
    </author>
    <author initials="E." surname="Hunt" fullname="Evan Hunt">
      <organization>Internet Systems Consortium</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>each@isc.org</email>
      </address>
    </author>

    <date year="2026" month="April" day="03"/>

    <area>Operations and Management</area>
    <workgroup>DNSOP</workgroup>
    <keyword>DNS</keyword> <keyword>delegation</keyword> <keyword>resolver</keyword> <keyword>parent-centric</keyword> <keyword>DELEG</keyword>

    <abstract>


<?line 113?>

<t>This document specifies an optional parent-centric behavioral model for DNS
recursive resolvers, in which delegation decisions are always based on
the NS RRset (or DELEG RRset) received from the parent side of a zone
cut and are never overwritten by child-side NS data.</t>

<t>The parent-centric model eliminates the "two sources of truth" problem
inherent in the current DNS delegation design, closes the Ghost Domain
and Phoenix Domain attack vectors, provides deterministic behavior in
the presence of parent/child NS mismatches, and enables resolvers to
safely accept sibling (out-of-bailiwick) glue by scoping delegation
information to individual zone cuts.  It also provides the behavioral
foundation required for deployment of the DELEG extensible delegation
mechanism.</t>

<t>This document updates <xref target="RFC1034"/> and <xref target="RFC1035"/>.</t>



    </abstract>



  </front>

  <middle>


<?line 131?>

<section anchor="introduction"><name>Introduction</name>

<t>The Domain Name System (DNS) <xref target="RFC1034"/> <xref target="RFC1035"/> uses NS (Name Server)
records to delegate authority over portions of the namespace from a parent
zone to a child zone.  A fundamental consequence of the current delegation
model is that NS records exist in two places: at the delegation point in
the parent zone (the "parent-side" NS RRset) and at the apex of the child
zone (the "child-side" or "apex" NS RRset).</t>

<t>Historically, most recursive resolver implementations have followed a
"child-centric" approach: when a referral is received from a parent zone,
the resolver caches the parent-side NS RRset, but subsequently replaces it
with the child-side apex NS RRset if one is observed in a response from
the delegated zone.  This replacement is performed on the assumption that
the child zone's apex NS RRset is "more authoritative" than the parent's
delegation point NS RRset.</t>

<t>This document specifies an optional "parent-centric" behavioral model for recursive
resolvers, in which delegation decisions are always based on the NS RRset
(or DELEG RRset) received from the parent side of a zone cut, and are
never overwritten by child-side NS data.  The parent-centric model
eliminates an entire class of inconsistency and security problems inherent
in the child-centric approach.  It also provides the behavioral foundation
needed for the deployment of extensible delegation mechanisms such as the
DELEG record <xref target="I-D.ietf-deleg"/>.</t>

<t>The <xref target="I-D.ietf-dnsop-ns-revalidation"/> provides an alternative approach that
recommends improved DNS <xref target="RFC1034"/> and <xref target="RFC1035"/> resolver behavior with
respect to the processing of NS record sets during iterative resolution.  That
document recommends that resolvers, when following a referral response from an
authoritative server to a child zone, should explicitly query the authoritative
NS RRset at the apex of the child zone and cache this in preference to the NS
RRset on the parent side of the zone cut.  The DNS resolvers can choose one of
the algorithms described in this document or in <xref target="I-D.ietf-dnsop-ns-revalidation"/>
for its delegation algorithm.</t>

<t>This document does not prescribe any particular cache architecture,
data-structure layout, or lookup ordering for implementations.
Conforming implementations are free to use any internal organization --
including a single unified cache -- that achieves the required behavior.</t>

<section anchor="terminology"><name>Terminology</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

<dl>
  <dt>Parent-side NS RRset:</dt>
  <dd>
    <t>The set of NS records present at a delegation point in the parent zone
and optional glue records (A + AAAA) <xref target="RFC9471"/> required for the
iterative clients to find the addresses of name servers that are
contained within a delegated zone.  These records are non-authoritative
in the parent zone and are included in referral responses.</t>
  </dd>
  <dt>Child-side NS RRset:</dt>
  <dd>
    <t>The set of NS records present at the apex of the delegated (child) zone.
These records are authoritative within the child zone.</t>
  </dd>
  <dt>Delegation information:</dt>
  <dd>
    <t>The data a resolver uses to determine which nameservers are responsible
for a zone cut: nameserver names, associated addresses from the glue records,
and (when DELEG <xref target="I-D.ietf-deleg"/> is supported) DELEG and DELEGPARAM
parameters. This information originates from referral responses received
from a parent zone's nameservers.</t>
  </dd>
  <dt>Child-centric resolver:</dt>
  <dd>
    <t>A resolver that replaces parent-side delegation information with
child-side apex NS data when available.</t>
  </dd>
  <dt>Parent-centric resolver:</dt>
  <dd>
    <t>A resolver that retains parent-side delegation information as the
authoritative source for delegation decisions and does not overwrite it
with child-side NS data.</t>
  </dd>
  <dt>Answer data:</dt>
  <dd>
    <t>Resource records cached by the resolver for the purpose of answering
client queries.  In the context of this document, the child-side NS
RRset is answer data: it is the authoritative answer to an NS query
at a zone apex.</t>
  </dd>
  <dt>Delegation data:</dt>
  <dd>
    <t>Information used internally by the resolver to determine which
nameservers to contact when resolving queries.  In the context of this
document, the parent-side NS RRset (and associated glue) is delegation
data.  Delegation data is never returned to clients as an answer.</t>
  </dd>
</dl>

</section>
</section>
<section anchor="problem-statement"><name>Problem Statement</name>

<section anchor="two-sources"><name>Two Sources of Truth</name>

<t><xref target="RFC1034"/> Section 4.2.1 specifies that NS records appear both at the
delegation point in the parent zone and at the apex of the child zone.
Ideally these two NS RRsets are identical, but in practice they frequently
diverge.  A large-scale measurement study <xref target="PARENT-CHILD-DISAGREE"/> found
that approximately 8% of second-level domains under .com, .net, and .org
(roughly 13 million domains) had inconsistent parent and child NS RRsets,
with inconsistencies classified into disjoint sets, subset, superset, and
mixed categories.  When a zone administrator updates the nameserver set, it
is common for either the parent or the child NS RRset to be updated first,
creating a window (sometimes indefinitely long) during which the two
disagree.</t>

<t>A child-centric resolver that replaces parent-side NS data with child-side
NS data effectively trusts the child zone to define its own delegation.
This creates several problems:</t>

<t><list style="symbols">
  <t>A compromised or misconfigured child zone can redirect resolution by
publishing NS records pointing to servers not sanctioned by the parent.</t>
  <t>NS RRsets learned from the child side may include nameservers that are
not present at the delegation point, creating inconsistencies in the
resolver's view of the namespace.  Alternatively, the NS RRsets learned from the child
side may not include nameservers that are present at the delegation point,
again creating inconsistencies in the resolver's view of the namespace.
It is up to the implementation whether the two distinct sets of NS RRsets
get merged or whether the child-side NS RRset replace the parent-side
delegation information.</t>
  <t>The child-side NS RRset may have a different (often longer) TTL than the
parent-side delegation, causing the resolver to use stale delegation
information.  Alternative parent-side NS RRsets may have a different TTL
than the child-side NS RRset.  It is again up to the implementation
whether the parent-side NS RRset TTL is honored, the child-side NS RRset
TTL is honored or the smallest value of the two is chosen.</t>
</list></t>

</section>
<section anchor="ghost-domains"><name>Ghost Domain Attacks</name>

<t>The Ghost Domain attack <xref target="GHOST-DOMAIN"/> demonstrated that a child-centric
resolver's willingness to replace cached delegation data with fresher
child-side NS records allows an attacker to keep a revoked domain name
resolvable indefinitely.  The attack works by exploiting the cache update
logic: even after the parent zone has removed the delegation, the attacker
can trigger queries that cause the resolver to contact the (still-running)
rogue nameserver, which returns a child-side NS RRset with a fresh TTL,
overwriting the stale (or absent) parent-side delegation data in the
cache.  Experiments showed that more than 70% of tested open resolvers
were still resolving a revoked domain a week after removal from the parent
zone at the time the research was published.</t>

<t>The follow-up work on Phoenix Domain <xref target="PHOENIX-DOMAIN"/> showed that the
original Ghost Domain mitigations (TTL capping on NS replacement) were
insufficient.  The Phoenix Domain attack uncovered additional vulnerable
cache operations in the delegation process that allowed revoked domains
to remain resolvable for over a month on more than 25% of tested
resolvers at the time this research was published.  Critically, the
Phoenix Domain paper identifies the child-centric vs. parent-centric
distinction as a key architectural factor: parent-centric resolvers
that do not overwrite delegation data with child-side NS records are
immune to the T1 class of Phoenix Domain attacks, because the attacker
cannot inject fresh delegation data through child-zone responses.</t>

<t>A parent-centric resolver as specified in this document eliminates the
Ghost Domain and Phoenix Domain T1 attack vectors entirely, because
delegation decisions are never influenced by child-side NS data.</t>

</section>
<section anchor="inconsistent-rpz-behavior"><name>Inconsistent RPZ Behavior</name>

<t>Response Policy Zones (RPZ) <xref target="I-D.ietf-dnsop-dns-rpz"/> include NSDNAME and NSIP trigger
types that match against the nameservers of the zone containing the
answer.  When a child-centric resolver replaces the parent-side NS RRset
with the child-side NS RRset, the set of nameserver names and addresses
visible to RPZ policy evaluation changes unpredictably depending on
whether the child-side data has been cached yet.  This leads to
inconsistent policy enforcement: the same query may or may not trigger an
RPZ rule depending on the cache state.</t>

<t>A parent-centric resolver provides a stable set of delegation information
for RPZ evaluation, because the delegation data used for resolution is
always the parent-side data received in referrals, regardless of what
child-side NS data may exist in the cache.</t>

</section>
<section anchor="impediment-to-deleg-deployment"><name>Impediment to DELEG Deployment</name>

<t>The DELEG record <xref target="I-D.ietf-deleg"/> is an extensible delegation mechanism
that is authoritative on the parent side of a zone cut.  DELEG records can
carry server addresses, transport parameters, and other extensible
metadata directly in the delegation, eliminating the need for additional
queries to resolve nameserver addresses.  The companion DELEGPARAM record
provides an indirection mechanism for sharing delegation parameters across
multiple zones.</t>

<t>A child-centric resolver cannot cleanly support DELEG, because:</t>

<t><list style="symbols">
  <t>DELEG data is exclusively parent-side; there is no child-side equivalent.
A child-centric resolver that overwrites parent-side data with child-side
NS data would lose the DELEG information.</t>
  <t><xref target="I-D.ietf-deleg"/> Section 5.1.1 requires that when DELEG records exist
at a delegation point, a DELEG-aware resolver <bcp14>MUST</bcp14> use the name servers
from those DELEG records and <bcp14>MUST NOT</bcp14> use NS records for the zone, even
if resolution using DELEG records has failed.  A parent-centric resolver
naturally enforces this rule because it never overwrites parent-side
delegation data with child-side NS data.</t>
</list></t>

</section>
<section anchor="strict-glue-problem"><name>Interaction with Strict Glue Checking</name>

<t>Recent resolver releases have adopted strict (hardened) glue checking
<xref target="STRICT-GLUE"/>: glue records in referral responses are only accepted when
the NS target name is at or below the delegation point (in-domain glue).
Glue for out-of-domain, but in-the-bailiwick nameserver names -- "sibling
glue" -- is discarded, and those names must be resolved iteratively.</t>

<t>For example, given the delegation from <spanx style="verb">.org</spanx>:</t>

<figure><artwork><![CDATA[
example.org.          NS  ns1.example.org.
example.org.          NS  ns2.otherdomain.org.
ns1.example.org.      A   198.51.100.42
ns2.otherdomain.org.  A   203.0.113.53
]]></artwork></figure>

<t>strict glue checking accepts the A record for <spanx style="verb">ns1.example.org</spanx> (which is
below <spanx style="verb">example.org</spanx>) but discards the A record for <spanx style="verb">ns2.otherdomain.org</spanx>
(which is not).  The resolver must then iteratively resolve
<spanx style="verb">ns2.otherdomain.org</spanx>, following a separate delegation chain through the
<spanx style="verb">otherdomain.org</spanx> zone.</t>

<t>This strict checking revealed a misconfiguration where a set of domains
used cyclic sibling glue and relied on the relaxed acceptance
of the glue records for resolution.</t>

<t>For example, give the delegation from <spanx style="verb">.org</spanx>:</t>

<figure><artwork><![CDATA[
example.org.          NS  ns1.otherdomain.org.
example.org.          NS  ns2.otherdomain.org.
ns1.otherdomain.org.  A   198.51.100.42
ns2.otherdomain.org.  A   203.0.113.53

otherdomain.org.      NS  ns1.example.org.
otherdomain.org.      NS  ns2.example.org.
ns1.example.org.      A   198.51.100.42
ns2.example.org.      A   203.0.113.53
]]></artwork></figure>

<t>strict glue validation would throw away both set of glue records and make
both example.org and otherdomain.org would fail to resolve.</t>

<section anchor="why-strict-glue-was-necessary"><name>Why Strict Glue Was Necessary</name>

<t>In a child-centric resolver that stores all cached data in a shared namespace,
sibling glue is dangerous because it can contaminate unrelated delegations.  If
the attacker can spoof an answer for <spanx style="verb">trigger$RANDOM.example.net.</spanx>  they can
overwrite the A/AAAA records for <spanx style="verb">ns.example.net.</spanx> via the AUTHORITY section.
By using the pseudorandom subdomain pattern for attacking the <spanx style="verb">example.net.</spanx>
domain, the attacker creates the window of opportunity for spoofing the off-path
response.  There are more variants of this attack that allow poisoning the
cache with delegation records in the AUTHORITY section and extra sibling GLUE.</t>

<t>Strict glue checking prevents this cross-delegation contamination by
rejecting all sibling glue.  However, this strict policy causes
significant operational problems:</t>

<t><list style="symbols">
  <t>When sibling glue is rejected, the resolver performs more iterative
lookups, each of which traverses additional delegation chains.  Any
parent/child NS mismatch along those chains can cause resolution
failures or inconsistent behavior.</t>
  <t>In pathological cases, the combination of strict glue rejection and
nested sibling delegations can produce resolution failures that
succeed on retry (after intermediate records have been cached), making
the problem intermittent and difficult to diagnose.</t>
  <t>The increased query volume puts additional load on authoritative servers
and increases resolution latency for end users.</t>
</list></t>

</section>
<section anchor="how-parent-centric-behavior-resolves-this"><name>How Parent-Centric Behavior Resolves This</name>

<t>The parent-centric model eliminates the underlying security problem that
strict glue checking was designed to address, because delegation
information is self-contained per zone cut and is not shared across
delegations.</t>

<t>When a parent-centric resolver accepts sibling glue for <spanx style="verb">ns1.example2.org</spanx>
in a referral for <spanx style="verb">example.org</spanx>, that address is recorded as part of the
<spanx style="verb">example.org</spanx> delegation information.  It is used only when contacting
servers for <spanx style="verb">example.org</spanx> and is never used when resolving names under
<spanx style="verb">example2.org</spanx> or any other zone.  The delegation information for
<spanx style="verb">example2.org</spanx> is a separate entry, populated from referrals received from
the <spanx style="verb">.org</spanx> zone's parent, and is completely unaffected by glue received in
referrals for <spanx style="verb">example.org</spanx>.</t>

<t>This scoping means that a parent-centric resolver can safely accept
sibling glue again without risk of cross-delegation contamination.
The operational problems caused by strict glue rejection -- increased
query volume, resolution failures due to nested out-of-bailiwick
delegations, and sensitivity to parent/child NS mismatches -- are avoided,
because the sibling glue is used directly from the delegation information
without requiring additional iterative resolution.</t>

<t>Resolver implementations adopting the parent-centric model <bcp14>MAY</bcp14> therefore
accept sibling glue from referral responses, provided that the glue is
stored as part of the delegation information for the specific zone cut and
is not used for any other purpose.</t>

</section>
</section>
</section>
<section anchor="specification"><name>Specification</name>

<section anchor="core-behavioral-requirement"><name>Core Behavioral Requirement</name>

<t>A conforming resolver <bcp14>MUST</bcp14> use delegation information received from parent
zones (via referral responses) as the basis for all delegation decisions.
Delegation information <bcp14>MUST NOT</bcp14> be overwritten, replaced, or supplemented
by child-side NS RRsets observed in authoritative responses from the
delegated zone.</t>

<t>This requirement applies regardless of how the resolver organizes its
internal data structures.  Any particular cache architecture, data-structure
choice, or lookup strategy is an implementation detail and out-of-the-scope
for this document.</t>

</section>
<section anchor="processing-referrals"><name>Processing Referrals</name>

<t>When a resolver receives a referral (a response with no answer, containing
NS records in the authority section and optional glue in the additional
section), it <bcp14>MUST</bcp14> process the delegation as follows:</t>

<t><list style="numbers" type="1">
  <t>Extract the zone cut name from the owner name of the NS RRset in the
authority section.</t>
  <t>Record the delegation information: the nameserver names from the NS
RRset, and any A/AAAA glue records present in the additional section
for those nameserver names.  Because delegation information in the
parent-centric model is scoped to the individual zone cut and is not
shared across delegations, both in-domain glue and sibling glue can
be safely accepted; see <xref target="strict-glue-problem"/> for the security analysis.
The effective TTL of the delegation information <bcp14>SHOULD</bcp14> be the minimum
of the NS RRset TTL and the accepted glue records (A/AAAA) TTLs.</t>
  <t>Use this delegation information for subsequent resolution of names
under the zone cut, until it expires or is replaced by a newer referral
for the same zone cut.</t>
</list></t>

<t>The resolver <bcp14>MUST NOT</bcp14> use the referral NS RRset to respond to the ordinary
DNS clients.  The referral NS RRset is parent-side data and <bcp14>MUST</bcp14> be treated
as delegation information only.</t>

</section>
<section anchor="processing-auth"><name>Processing Authoritative Responses</name>

<t>When a resolver receives an authoritative response (AA bit set) that
includes a child-side NS RRset (either in the answer section for an
NS-type query, or in the authority section as part of the response), the
resolver <bcp14>MUST</bcp14> cache the child-side NS RRset as answer data, subject to
normal cache admission policies.  This cached child-side NS RRset is used
to answer explicit NS queries from clients (<xref target="answering-ns-queries"/>) but
<bcp14>MUST NOT</bcp14> be used to update, replace, or supplement the delegation
information used for delegation decisions.</t>

<t>The child-side NS RRset is authoritative data from the child zone and is
the correct answer to an NS query.  The parent-side NS RRset received in
referrals is non-authoritative delegation information and <bcp14>MUST NOT</bcp14> be
returned as the answer to an NS query.</t>

</section>
<section anchor="answering-ns-queries"><name>Answering Explicit NS Queries</name>

<t>When a recursive resolver receives a query  for the NS RRset at
a zone name (QTYPE=NS, QNAME=&lt;zone apex&gt;), it <bcp14>MUST</bcp14> resolve
and return the child-side (authoritative) NS RRset, not the parent-side
delegation data.  This is a fundamental distinction of the parent-centric
model: parent-side NS data drives delegation decisions internally, but
the child-side NS data is the authoritative answer to NS queries.</t>

<t>The resolver processes this query through normal recursive resolution:</t>

<t><list style="numbers" type="1">
  <t>Using its delegation information, the resolver contacts an
authoritative server for the queried zone.</t>
  <t>The authoritative server returns the apex NS RRset with the AA
(Authoritative Answer) flag set.</t>
  <t>The resolver caches this child-side NS RRset as answer data and
returns it to the client.</t>
</list></t>

<t>The response to the client <bcp14>MUST</bcp14> accurately reflect the properties of the
child-side NS data:</t>

<dl>
  <dt>AA flag:</dt>
  <dd>
    <t>The child-side NS RRset is authoritative data from the child zone.
When a resolver that is also configured as an authoritative server for
the queried zone returns this data, it <bcp14>MUST</bcp14> set the AA flag.  When a
purely recursive resolver returns a cached child-side NS RRset, it
<bcp14>SHOULD</bcp14> set the AA flag to indicate that the data originates from the
authoritative child zone, distinguishing the response from a referral
(which would contain parent-side NS data without the AA flag).
This is consistent with the principle that the answer to an NS query
at a zone apex is authoritative data, regardless of how the resolver
obtained it.</t>
  </dd>
  <dt>AD flag:</dt>
  <dd>
    <t>If the child-side NS RRset has been DNSSEC-validated, the resolver
<bcp14>SHOULD</bcp14> set the AD (Authenticated Data) flag in the response, subject
to the normal AD flag rules (<xref target="RFC4035"/> Section 3.2.3 and
<xref target="RFC6840"/> Section 5.8).  DNSSEC validation of the child-side NS
RRset provides the client with cryptographic assurance that the
nameserver set is authentic, a property that parent-side delegation
NS data (which is unsigned glue) can never provide.</t>
  </dd>
</dl>

<t>The resolver <bcp14>MUST NOT</bcp14> return the parent-side delegation NS data as the
answer to an NS query under any circumstances.  The parent-side data
is non-authoritative and would provide the client with incorrect
information about the zone's published nameserver set.</t>

<t>Note that the child-side NS RRset returned to the client may differ from
the parent-side NS RRset used for delegation.  This is expected and
correct: the two serve different purposes.  The child-side NS is the
zone's own statement of its nameservers (answer data), while the
parent-side NS is the parent's statement of which servers are delegated
(delegation data).</t>

<section anchor="interaction-with-minimal-responses"><name>Interaction with Minimal Responses</name>

<t>When QNAME minimization <xref target="RFC9156"/> is enabled (as <bcp14>RECOMMENDED</bcp14> for cached
responses in <xref target="impact-on-responses"/>), the resolver omits the NS RRset from
the authority section of non-NS-type responses.  This has no effect on
explicit NS queries: when the client queries for NS records specifically,
the full child-side NS RRset is returned in the answer section regardless
of the minimal responses setting.</t>

</section>
<section anchor="ns-queries-when-child-side-ns-is-not-cached"><name>NS Queries When Child-Side NS Is Not Cached</name>

<t>If the resolver receives an NS query for a zone name and does not have
the child-side NS RRset cached, it <bcp14>MUST</bcp14> resolve the query through normal
recursion (contacting the zone's authoritative servers) rather than
returning the parent-side delegation data from its delegation information.
The parent-side data is not a valid answer to an NS query.</t>

</section>
</section>
<section anchor="best-zone-cut-selection"><name>Best Zone Cut Selection</name>

<t>When a resolver needs to determine the closest enclosing zone cut for a
query name (the "best zone cut"), it <bcp14>MUST</bcp14> select among the following
sources in this order of preference:</t>

<t><list style="numbers" type="1">
  <t>Locally configured zones: forward zones, stub zones, static-stub
zones, and other policy-configured delegations.</t>
  <t>Delegation information learned from referrals, as described in
<xref target="processing-referrals"/>.</t>
  <t>Root hints, if no other delegation information is available.</t>
</list></t>

<t>The root zone is a special case: it is not itself delegated from a
parent zone, so no referral exists for it.  Root hints provide the
initial set of root server names and addresses.  After startup, the
resolver performs root priming <xref target="RFC9609"/> to obtain the authoritative
root NS RRset and associated addresses directly from a root server.
The priming response replaces the root hints as the delegation
information for the root zone.  This is the one case where
authoritative NS data is also used as delegation information, because
the root zone has no parent to provide a referral.</t>

<t>When both a locally configured zone and referral-learned delegation
information exist for overlapping names, the more specific (closer to the
query name) delegation is preferred, with the exception that static-stub
zones always take precedence over referral-learned delegations at the same
name.</t>

<t>Child-side NS RRsets cached from authoritative responses
(<xref target="processing-auth"/>) <bcp14>MUST NOT</bcp14> be considered when selecting the best zone
cut.</t>

</section>
<section anchor="ttl-and-expiration"><name>TTL and Expiration</name>

<t>Delegation information learned from referrals is subject to TTL-based
expiration.  The TTL is computed as described in <xref target="processing-referrals"/>.
Expired delegation information <bcp14>MUST NOT</bcp14> be used for delegation decisions;
the resolver <bcp14>MUST</bcp14> fall back to the next available delegation source (a
less specific referral-learned delegation, a locally configured zone, or
root hints).</t>

<t>Implementations <bcp14>SHOULD NOT</bcp14> apply neither a minimum TTL floor or a maximum
TTL ceiling to delegation information that differs from the floor applied
to cached answer data, as the two serve different purposes and have
different operational characteristics.  The implementations <bcp14>MAY</bcp14> have a
seperate configuration options to apply the limits to the TTL received
for the delegation information.</t>

</section>
<section anchor="delegation-information-replacement"><name>Delegation Information Replacement</name>

<t>When a resolver receives a new referral for a zone cut for which it
already holds unexpired delegation information, the new referral replaces
the existing delegation information.  This ensures that the resolver
tracks changes in the parent zone's delegation.</t>

<t>A resolver <bcp14>MUST NOT</bcp14> merge delegation information from multiple referrals
for the same zone cut.  Each referral provides a complete delegation, and
the most recently received delegation supersedes any previous one.</t>

</section>
<section anchor="deleg-integration"><name>DELEG Integration</name>

<t>When a resolver supports the DELEG record <xref target="I-D.ietf-deleg"/>, delegation
information for a zone cut may include DELEG parameters (server addresses,
server names, DELEGPARAM references, transport parameters) in addition to
or instead of NS-based delegation data.</t>

<t>A conforming resolver that receives a referral containing DELEG records
at a zone cut <bcp14>MUST</bcp14> use the DELEG-based delegation information to populate
its delegation information (per <xref target="I-D.ietf-deleg"/> Section 5.1.3 and
Section 5.1.4) and <bcp14>MUST NOT</bcp14> use NS records for that zone, even if
DELEG-based resolution fails (per <xref target="I-D.ietf-deleg"/> Section 5.1.1).</t>

<t>The parent-centric model naturally accommodates DELEG because:</t>

<t><list style="symbols">
  <t>DELEG data is exclusively parent-side and arrives in referrals, which is
exactly the data the parent-centric resolver trusts.</t>
  <t>DELEG records can carry server addresses directly (via server-ipv4 and
server-ipv6 parameters), eliminating the need for glue records and the
associated trust questions.  DELEGPARAM records can provide an additional
layer of indirection for shared delegation configurations.</t>
  <t>DELEG records are signed on the parent side, enabling DNSSEC validation
of delegation parameters -- a capability fundamentally impossible with
unsigned parent-side NS records.</t>
</list></t>

</section>
</section>
<section anchor="interaction-with-other-mechanisms"><name>Interaction with Other Mechanisms</name>

<section anchor="qname-minimization"><name>QNAME Minimization</name>

<t>QNAME minimization <xref target="RFC9156"/> relies on knowing the current best zone cut
in order to construct minimized queries.  A parent-centric resolver
provides more reliable zone cut information for QNAME minimization because
the delegation data used for zone cut determination is never polluted by
child-side NS data that might indicate a different (and potentially
incorrect) zone boundary.</t>

<t>When resuming QNAME minimization after receiving a referral, the resolver
uses the updated delegation information as the basis for subsequent
minimized queries.</t>

</section>
<section anchor="dnssec-validation"><name>DNSSEC Validation</name>

<t>Parent-side NS records are not signed (they are referrals / glues), so
delegation information learned from NS-based referrals is not directly
DNSSEC-validated.  This is consistent with current practice: even child-centric
resolvers use unsigned referral NS data to locate authoritative servers.</t>

<t>The DNSSEC chain of trust for a delegated zone is established through DS
records, which are authoritative on the parent side and are validated
normally.  The parent-centric model does not change DS record processing.</t>

<t>When DELEG records are deployed (<xref target="deleg-integration"/>), the delegation
parameters are signed on the parent side and can be validated as part of
the delegation.  This provides a cryptographic binding between the
delegation parameters and the parent zone's DNSSEC chain -- a significant
security improvement over the current unsigned NS-based delegation model.</t>

</section>
<section anchor="delegation-limits"><name>Delegation Limits</name>

<t>Resolvers typically impose a limit on the number of nameservers or
addresses they will process from a single delegation, to prevent excessive
resource consumption from very large delegations.  The parent-centric
model preserves this limit.  Implementations <bcp14>SHOULD</bcp14> make this limit
configurable with a reasonable default (e.g., 26).  Q?: is 2 * 13 good number?</t>

</section>
</section>
<section anchor="operational-considerations"><name>Operational Considerations</name>

<section anchor="compatibility-with-existing-infrastructure"><name>Compatibility with Existing Infrastructure</name>

<t>The parent-centric model is fully compatible with the existing DNS
infrastructure.  No changes are required to authoritative servers,
registries, registrars, or stub resolvers.  The change is entirely within
the recursive resolver's internal processing.</t>

<t>This approach has been deployed in production by multiple resolver
implementations, including Nominum Vantio and Google Public DNS, without
causing widespread operational issues.  Controlled experiments using RIPE
Atlas vantage points <xref target="PARENT-CHILD-DISAGREE"/> confirmed that resolvers
overwhelmingly use parent-side NS records for delegation decisions,
especially when authoritative servers return minimal responses -- indicating
that parent-centric behavior is already the de facto norm for most deployed
resolvers.</t>

<t>More implementations here???</t>

</section>
<section anchor="impact-on-responses"><name>Impact on Responses to Recursive Clients</name>

<t>A child-centric resolver that has both parent-side and child-side NS data
may include the child-side NS in the authority section of responses to
recursive clients (when minimal responses option is disabled).  A
parent-centric resolver that does not use child-side NS data for
delegation has no reason to look up the child-side NS RRset during
resolution; therefore, the child-side NS may not be readily available for
inclusion in the authority section.</t>

<t>Implementations adopting the parent-centric model <bcp14>SHOULD</bcp14> treat recursive
responses served from the cache as if minimal response option is enabled,
omitting the NS RRset from the authority section.  This is consistent with
modern best practice, reduces response size, and avoids the need to
perform additional lookups solely for populating the authority section.</t>

<t>This only affects responses served from the cache by a recursive resolver.
Authoritative responses (where the server is authoritative for the queried
zone) are not affected by this change.</t>

<t>TODO: I am actually not sure if this is a correct mechanism or not :shrug:.
Alternative proposal below, but since this only impact the partial forwarders,
I would say - it is a reasonable compromise to make...</t>

<t>When a recursiver resolver receives a query with RD flag not set (RD=0)
for the NS RRset at a zone name (QTYPE=NS, QNAME=&lt;delegation point&gt;),
it <bcp14>MUST</bcp14> resolve and return the parent-side (delegation) NS RRset, not the
child-side (authoritative) NS RRset.</t>

<t>There might be downstream forwarding resolvers (e.g. DNS resolver using
this resolver for DNS resolution).  Returning child-side NS RRset is
generally not a problem when the downstream DNS resolver is configured
to do the forwarding for the whole DNS tree, but there might be
configurations where the forwarding is configured only for certain
parts of the DNS tree and the downstream DNS forwarder need to receive
the parent-side delegation information.</t>

</section>
<section anchor="zones-with-differing-parent-and-child-ns-sets"><name>Zones with Differing Parent and Child NS Sets</name>

<t>Some zones intentionally maintain different NS RRsets at the parent and
child, for example to include "stealth" nameservers in the child-side NS
RRset that are not registered at the parent.  Under the parent-centric
model, these stealth nameservers will not be used for delegation decisions.
This is the intended and correct behavior: the parent zone is the
authority for delegation, and nameservers not listed in the parent's
delegation are not part of the delegation.  Also this behavior was already
breaking the existing DNS standards, the parent-side and child-side NS
RRset is supposed to be in sync.</t>

<t>The child-side NS RRset remains available for answering explicit NS
queries (<xref target="answering-ns-queries"/>) and for any purpose other than
delegation decisions.  Clients that query for the NS RRset at a zone
apex will receive the child-side NS data (with the AA flag set),
which may include nameservers not present in the parent-side delegation.
This makes the difference between the two NS sets visible and auditable
by zone operators.</t>

</section>
<section anchor="transition-considerations"><name>Transition Considerations</name>

<t>Resolver operators transitioning from a child-centric to a parent-centric
implementation should be aware of the following:</t>

<t><list style="symbols">
  <t>After the transition, responses to queries with RD=1 may no longer
include NS records in the authority section for cached answers.
Monitoring systems that check for the presence of authority-section NS
records in recursive responses should be updated.</t>
  <t>Zones that rely on child-side NS records to "override" the parent's
delegation (e.g., to work around stale delegation data at a registry)
will no longer benefit from this override.  Such zones should instead
update their parent-side delegation.</t>
  <t>RPZ rules that were tuned based on child-side NS data may need to be
reviewed, as the nameserver set visible to RPZ evaluation will be
the (more stable) parent-side set.</t>
  <t>Resolver implementations that have previously deployed strict glue
checking (rejecting sibling glue) may relax this restriction after
adopting the parent-centric model, because delegation information is
scoped per zone cut and sibling glue can no longer contaminate
unrelated delegations (see <xref target="strict-glue-problem"/>).  Accepting sibling
glue again reduces the number of iterative queries needed to resolve
out-of-bailiwick delegations and avoids the resolution failures
associated with strict glue rejection.</t>
</list></t>

</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<section anchor="elimination-of-child-side-ns-overwrite-attacks"><name>Elimination of Child-Side NS Overwrite Attacks</name>

<t>The most significant security benefit of the parent-centric model is that
a compromised or malicious child zone cannot redirect resolution by
publishing rogue NS records at its apex.  Since the resolver never uses
child-side NS data for delegation decisions, such attacks are ineffective.</t>

<t>This closes an attack vector that has been present in child-centric
resolvers since the inception of the DNS: an attacker who compromises only
the child zone (but not the parent) can add NS records pointing to
attacker-controlled servers, and a child-centric resolver will follow
those NS records for subsequent queries.</t>

</section>
<section anchor="mitigation-of-ghost-domain-and-phoenix-domain-attacks"><name>Mitigation of Ghost Domain and Phoenix Domain Attacks</name>

<t>As discussed in <xref target="ghost-domains"/>, the Ghost Domain <xref target="GHOST-DOMAIN"/> and
Phoenix Domain <xref target="PHOENIX-DOMAIN"/> attacks exploit the child-centric cache
update logic to keep revoked domain names resolvable.  A parent-centric
resolver is immune to the T1 class of these attacks because:</t>

<t><list style="symbols">
  <t>It does not accept child-side NS RRsets as delegation data, so an
attacker cannot refresh a stale or removed delegation by responding with
a child-side NS RRset carrying a new TTL.</t>
  <t>Once the parent-side delegation information expires (or is never
received because the parent has removed the delegation), the resolver
falls back to the next enclosing zone cut or root hints, which will not
lead to the revoked zone.</t>
</list></t>

<t>The T2 class of Phoenix Domain attacks (which exploits protocol-level
TTL semantics in referral responses from still-delegated parent zones) is
not fully addressed by the parent-centric model alone, but the attack
surface is significantly reduced because the resolver maintains a clear
separation between delegation data and answer data.</t>

<section anchor="elimination-of-cross-delegation-glue-contamination"><name>Elimination of Cross-Delegation Glue Contamination</name>

<t>In a child-centric resolver with a shared cache, the primary risk of sibling
glue is cross-delegation contamination: an A/AAAA record for <spanx style="verb">ns.example2.org</spanx>
received in a referral for <spanx style="verb">example.org</spanx> enters the shared cache and can be used
when resolving <spanx style="verb">example2.org</spanx>.  This is the attack vector that strict glue
checking <xref target="STRICT-GLUE"/> was designed to prevent.</t>

<t>In the parent-centric model, delegation information is self-contained per
zone cut.  Glue received in a referral for <spanx style="verb">example.org</spanx> is part of the
<spanx style="verb">example.org</spanx> delegation and is used only for contacting servers for that
zone.  It has no effect on the delegation information for <spanx style="verb">example2.org</spanx> or
any other zone.  This scoping eliminates the cross-delegation
contamination vector entirely, without the operational cost of discarding
sibling glue.</t>

<t>A parent-centric resolver can therefore safely accept sibling glue from
referral responses (see <xref target="strict-glue-problem"/>), recovering the
operational benefits of sibling glue (fewer iterative queries, faster
resolution, tolerance of out-of-bailiwick delegation configurations) while
maintaining security against cross-delegation poisoning.</t>

</section>
<section anchor="remaining-glue-trust-considerations"><name>Remaining Glue Trust Considerations</name>

<t>Even with per-delegation scoping, glue records are still non-authoritative
data that can be forged by an on-path attacker between the parent zone's
authoritative server and the resolver.  A forged glue record would cause
the resolver to contact an attacker-controlled server for the specific
delegation that received the forged glue.  This risk is identical to the
existing risk of forged referral responses and is mitigated by the same
mechanisms (source port randomization, DNS cookies, DNSSEC validation of
the subsequent responses from the delegation).</t>

<t>When DELEG records are used, server addresses included directly in the
DELEG RDATA are signed on the parent side, providing DNSSEC-validated
address information.  This eliminates the glue trust problem entirely for
DELEG-aware delegations, as the addresses are authenticated data rather
than unsigned glue, and out-of-bailiwick resolution of nameserver names
is no longer necessary.</t>

</section>
</section>
<section anchor="stable-delegation-view"><name>Stable Delegation View</name>

<t>By ensuring that delegation decisions are always based on parent-side
data, the parent-centric model provides a more stable and predictable view
of the delegation hierarchy.  This stability benefits security mechanisms
that depend on knowing the authoritative server set, including RPZ, DNS
firewall policies, and logging/auditing systems.</t>

</section>
</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document has no IANA actions.</t>

</section>
<section anchor="implementation-status"><name>Implementation Status</name>

<ul empty="true"><li>
  <t><strong>Note to the RFC Editor:</strong> Please remove this section before publication.</t>
</li></ul>

<t>The parent-centric resolver behavior described in this document has been
implemented in BIND 9 as part of a resolver refactoring.  The
implementation ensures that delegation decisions are based on
referral-learned data rather than child-side NS RRsets from the cache.
The fetch context uses a delegation set abstraction (containing nameserver
names, IPv4/IPv6 addresses, and DELEG/DELEGPARAM parameters) instead of
raw NS rdatasets throughout the resolution process.</t>

<t>The implementation passes the full BIND 9 system test suite with
adjustments to tests that previously depended on child-side NS records
appearing in the authority section of recursive responses.</t>

<t>The parent-centric approach has also been deployed in production by
Google Public DNS and was previously used by Nominum Vantio.</t>

<t>More implementations?</t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC1034">
  <front>
    <title>Domain names - concepts and facilities</title>
    <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
    <date month="November" year="1987"/>
    <abstract>
      <t>This RFC is the revised basic definition of The Domain Name System. It obsoletes RFC-882. This memo describes the domain style names and their used for host address look up and electronic mail forwarding. It discusses the clients and servers in the domain name system and the protocol used between them.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="13"/>
  <seriesInfo name="RFC" value="1034"/>
  <seriesInfo name="DOI" value="10.17487/RFC1034"/>
</reference>

<reference anchor="RFC1035">
  <front>
    <title>Domain names - implementation and specification</title>
    <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
    <date month="November" year="1987"/>
    <abstract>
      <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="13"/>
  <seriesInfo name="RFC" value="1035"/>
  <seriesInfo name="DOI" value="10.17487/RFC1035"/>
</reference>

<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>

<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>

<reference anchor="RFC9471">
  <front>
    <title>DNS Glue Requirements in Referral Responses</title>
    <author fullname="M. Andrews" initials="M." surname="Andrews"/>
    <author fullname="S. Huque" initials="S." surname="Huque"/>
    <author fullname="P. Wouters" initials="P." surname="Wouters"/>
    <author fullname="D. Wessels" initials="D." surname="Wessels"/>
    <date month="September" year="2023"/>
    <abstract>
      <t>The DNS uses glue records to allow iterative clients to find the addresses of name servers that are contained within a delegated zone. Authoritative servers are expected to return all available glue records for in-domain name servers in a referral response. If message size constraints prevent the inclusion of all glue records for in-domain name servers, the server must set the TC (Truncated) flag to inform the client that the response is incomplete and that the client should use another transport to retrieve the full response. This document updates RFC 1034 to clarify correct server behavior.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9471"/>
  <seriesInfo name="DOI" value="10.17487/RFC9471"/>
</reference>

<reference anchor="RFC4035">
  <front>
    <title>Protocol Modifications for the DNS Security Extensions</title>
    <author fullname="R. Arends" initials="R." surname="Arends"/>
    <author fullname="R. Austein" initials="R." surname="Austein"/>
    <author fullname="M. Larson" initials="M." surname="Larson"/>
    <author fullname="D. Massey" initials="D." surname="Massey"/>
    <author fullname="S. Rose" initials="S." surname="Rose"/>
    <date month="March" year="2005"/>
    <abstract>
      <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of new resource records and protocol modifications that add data origin authentication and data integrity to the DNS. This document describes the DNSSEC protocol modifications. This document defines the concept of a signed zone, along with the requirements for serving and resolving by using DNSSEC. These techniques allow a security-aware resolver to authenticate both DNS resource records and authoritative DNS error indications.</t>
      <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4035"/>
  <seriesInfo name="DOI" value="10.17487/RFC4035"/>
</reference>

<reference anchor="RFC6840">
  <front>
    <title>Clarifications and Implementation Notes for DNS Security (DNSSEC)</title>
    <author fullname="S. Weiler" initials="S." role="editor" surname="Weiler"/>
    <author fullname="D. Blacka" initials="D." role="editor" surname="Blacka"/>
    <date month="February" year="2013"/>
    <abstract>
      <t>This document is a collection of technical clarifications to the DNS Security (DNSSEC) document set. It is meant to serve as a resource to implementors as well as a collection of DNSSEC errata that existed at the time of writing.</t>
      <t>This document updates the core DNSSEC documents (RFC 4033, RFC 4034, and RFC 4035) as well as the NSEC3 specification (RFC 5155). It also defines NSEC3 and SHA-2 (RFC 4509 and RFC 5702) as core parts of the DNSSEC specification.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6840"/>
  <seriesInfo name="DOI" value="10.17487/RFC6840"/>
</reference>

<reference anchor="RFC9156">
  <front>
    <title>DNS Query Name Minimisation to Improve Privacy</title>
    <author fullname="S. Bortzmeyer" initials="S." surname="Bortzmeyer"/>
    <author fullname="R. Dolmans" initials="R." surname="Dolmans"/>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <date month="November" year="2021"/>
    <abstract>
      <t>This document describes a technique called "QNAME minimisation" to improve DNS privacy, where the DNS resolver no longer always sends the full original QNAME and original QTYPE to the upstream name server. This document obsoletes RFC 7816.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9156"/>
  <seriesInfo name="DOI" value="10.17487/RFC9156"/>
</reference>

<reference anchor="RFC9609">
  <front>
    <title>Initializing a DNS Resolver with Priming Queries</title>
    <author fullname="P. Koch" initials="P." surname="Koch"/>
    <author fullname="M. Larson" initials="M." surname="Larson"/>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <date month="February" year="2025"/>
    <abstract>
      <t>This document describes the queries that a DNS resolver should emit to initialize its cache. The result is that the resolver gets both a current NS resource record set (RRset) for the root zone and the necessary address information for reaching the root servers.</t>
      <t>This document obsoletes RFC 8109.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="209"/>
  <seriesInfo name="RFC" value="9609"/>
  <seriesInfo name="DOI" value="10.17487/RFC9609"/>
</reference>




    </references>

    <references title='Informative References' anchor="sec-informative-references">

<reference anchor="GHOST-DOMAIN" target="https://www.ndss-symposium.org/ndss2012/">
  <front>
    <title>Ghost Domain Names: Revoked Yet Still Resolvable</title>
    <author initials="J." surname="Jiang" fullname="Jian Jiang">
      <organization></organization>
    </author>
    <author initials="J." surname="Liang" fullname="Jinjin Liang">
      <organization></organization>
    </author>
    <author initials="K." surname="Li" fullname="Kang Li">
      <organization></organization>
    </author>
    <author initials="J." surname="Li" fullname="Jun Li">
      <organization></organization>
    </author>
    <author initials="H." surname="Duan" fullname="Haixin Duan">
      <organization></organization>
    </author>
    <author initials="J." surname="Wu" fullname="Jianping Wu">
      <organization></organization>
    </author>
    <date year="2012" month="February"/>
  </front>
  <seriesInfo name="In" value="Proceedings of the Network and Distributed System Security Symposium (NDSS 2012)"/>
</reference>
<reference anchor="PHOENIX-DOMAIN" target="https://www.ndss-symposium.org/ndss-paper/ghost-domain-reloaded-vulnerable-links-in-domain-name-delegation-and-revocation/">
  <front>
    <title>Ghost Domain Reloaded: Vulnerable Links in Domain Name Delegation and Revocation</title>
    <author initials="X." surname="Li" fullname="Xiang Li">
      <organization></organization>
    </author>
    <author initials="B." surname="Liu" fullname="Baojun Liu">
      <organization></organization>
    </author>
    <author initials="X." surname="Bai" fullname="Xuesong Bai">
      <organization></organization>
    </author>
    <author initials="H." surname="Duan" fullname="Haixin Duan">
      <organization></organization>
    </author>
    <author initials="Q." surname="Li" fullname="Qi Li">
      <organization></organization>
    </author>
    <author initials="Q." surname="Pan" fullname="Qingfeng Pan">
      <organization></organization>
    </author>
    <date year="2023" month="February"/>
  </front>
  <seriesInfo name="In" value="Proceedings of the Network and Distributed System Security Symposium (NDSS 2023)"/>
</reference>
<reference anchor="PARENT-CHILD-DISAGREE" target="https://www.caida.org/catalog/papers/2020_when_parents_children_disagree/when_parents_children_disagree.pdf">
  <front>
    <title>When Parents and Children Disagree: Diving into DNS Delegation Inconsistency</title>
    <author initials="R." surname="Sommese" fullname="Raffaele Sommese">
      <organization></organization>
    </author>
    <author initials="G. C. M." surname="Moura" fullname="Giovane C.M. Moura">
      <organization></organization>
    </author>
    <author initials="M." surname="Jonker" fullname="Mattijs Jonker">
      <organization></organization>
    </author>
    <author initials="R." surname="van Rijswijk-Deij" fullname="Roland van Rijswijk-Deij">
      <organization></organization>
    </author>
    <author initials="A." surname="Dainotti" fullname="Alberto Dainotti">
      <organization></organization>
    </author>
    <author initials="K. C." surname="Claffy" fullname="K.C. Claffy">
      <organization></organization>
    </author>
    <author initials="A." surname="Sperotto" fullname="Anna Sperotto">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
  <seriesInfo name="In" value="Proceedings of the Passive and Active Measurement Conference (PAM 2020)"/>
</reference>
<reference anchor="STRICT-GLUE" target="https://kb.isc.org/docs/strict-glue">
  <front>
    <title>Operational Notification: Impact of Stricter Glue Checking</title>
    <author >
      <organization>Internet Systems Consortium</organization>
    </author>
    <date year="2025" month="December"/>
  </front>
</reference>



<reference anchor="I-D.ietf-deleg">
   <front>
      <title>Extensible Delegation for DNS</title>
      <author fullname="Petr Špaček" initials="P." surname="Špaček">
         <organization>ISC</organization>
      </author>
      <author fullname="Ralf Weber" initials="R." surname="Weber">
         <organization>Akamai Technologies</organization>
      </author>
      <author fullname="David C Lawrence" initials="" surname="Lawrence">
         <organization>Salesforce</organization>
      </author>
      <date day="16" month="March" year="2026"/>
      <abstract>
	 <t>   This document proposes a new extensible method for the delegation of
   authority for a domain in the Domain Name System (DNS) using DELEG
   and DELEGPARAM records.

   A delegation in the DNS enables efficient and distributed management
   of the DNS namespace.  The traditional DNS delegation is based on NS
   records which contain only hostnames of servers and no other
   parameters.  The new delegation records are extensible, can be
   secured with DNSSEC, and eliminate the problem of having two sources
   of truth for delegation information.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-deleg-08"/>
   
</reference>


<reference anchor="I-D.ietf-dnsop-ns-revalidation">
   <front>
      <title>Delegation Revalidation by DNS Resolvers</title>
      <author fullname="Shumon Huque" initials="S." surname="Huque">
         <organization>Salesforce</organization>
      </author>
      <author fullname="Paul A. Vixie" initials="P. A." surname="Vixie">
         <organization>SIE Europe, U.G.</organization>
      </author>
      <author fullname="Willem Toorop" initials="W." surname="Toorop">
         <organization>NLnet Labs</organization>
      </author>
      <date day="19" month="October" year="2025"/>
      <abstract>
	 <t>   This document describes an optional algorithm for the processing of
   Name Server (NS) resource record (RR) sets (RRsets) during iterative
   resolution, and describes the benefits and considerations of using
   this approach.  When following a referral response from an
   authoritative server to a child zone, DNS resolvers should explicitly
   query the authoritative NS RRset at the apex of the child zone and
   cache this in preference to the NS RRset on the parent side of the
   zone cut.  The (A and AAAA) address RRsets in the additional section
   from referral responses and authoritative NS answers for the names of
   the NS RRset, should similarly be re-queried and used to replace the
   entries with the lower trustworthiness ranking in cache.  Resolvers
   should also periodically revalidate the delegation by re-querying the
   parent zone at the expiration of the TTL of either the parent or
   child NS RRset, whichever comes first.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-dnsop-ns-revalidation-11"/>
   
</reference>


<reference anchor="I-D.ietf-dnsop-dns-rpz">
   <front>
      <title>DNS Response Policy Zones (RPZ)</title>
      <author fullname="Paul A. Vixie" initials="P. A." surname="Vixie">
         <organization>Farsight Security</organization>
      </author>
      <author fullname="Vernon Schryver" initials="V." surname="Schryver">
         <organization>Rhyolite Software</organization>
      </author>
      <date day="9" month="March" year="2017"/>
      <abstract>
	 <t>   This document describes a method for expressing DNS response policy
   inside a specially constructed DNS zone, and for recursive name
   servers to use such policy to return modified results to DNS clients.
   The modified DNS results can stop access to selected HTTP servers,
   redirect users to &quot;walled gardens&quot;, block objectionable email, and
   otherwise defend against attack.  These &quot;DNS Firewalls&quot; are widely
   used in fighting Internet crime and abuse.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-dnsop-dns-rpz-00"/>
   
</reference>




    </references>

</references>


<?line 913?>

<section anchor="rationale-for-delegations-in-positive-responses"><name>Rationale for Delegations in Positive Responses</name>

<t>During implementation, the question arose of whether delegation
information should also be recorded when it appears in positive
authoritative responses (AA set) rather than only in referrals.  Consider
the following zone structure:</t>

<figure><artwork><![CDATA[
zone             nameserver
----             ----------
example          ns1
foo.example      ns2
bar.foo.example  ns2
]]></artwork></figure>

<t>To resolve <spanx style="verb">a.bar.foo.example</spanx>, the resolver:</t>

<t><list style="numbers" type="1">
  <t>Asks a root server for <spanx style="verb">example</spanx>, receives a referral to <spanx style="verb">ns1</spanx>.</t>
  <t>Asks <spanx style="verb">ns1</spanx> for <spanx style="verb">foo.example</spanx>, receives a referral to <spanx style="verb">ns2</spanx>.</t>
  <t>Asks <spanx style="verb">ns2</spanx> for <spanx style="verb">bar.foo.example/NS</spanx>, receives a positive authoritative
answer (AA set) with the NS in the answer section.</t>
</list></t>

<t>If the delegation from step 3 is not recorded, the closest zone cut known
to the resolver is <spanx style="verb">foo.example</spanx>, which still works because <spanx style="verb">ns2</spanx> is
authoritative for both <spanx style="verb">foo.example</spanx> and <spanx style="verb">bar.foo.example</spanx>.</t>

<t>However, not recording this delegation means the resolver will not have
address information for <spanx style="verb">bar.foo.example</spanx> nameservers available, so
additional section data in subsequent responses may be incomplete.  Whether
this trade-off is acceptable depends on the deployment context and whether
minimal responses options is in use.</t>

<t>Implementations <bcp14>MAY</bcp14> choose to record delegation information learned from
positive authoritative responses, but <bcp14>SHOULD</bcp14> carefully evaluate the impact
on query volume and consistency.</t>

</section>
<section anchor="relationship-to-deleg"><name>Relationship to DELEG</name>

<t>The DELEG record <xref target="I-D.ietf-deleg"/> defines an extensible delegation
mechanism that is exclusively parent-side.  The parent-centric resolver
behavior described in this document provides the necessary behavioral
foundation for DELEG support:</t>

<t><list style="symbols">
  <t>Delegation information as defined in this document naturally accommodates
DELEG data alongside or instead of NS-based delegations.</t>
  <t>Each delegation can contain DELEG entries with embedded server addresses
(server-ipv4, server-ipv6), server names (server-name), and DELEGPARAM
references (include-delegparam), in addition to traditional NS names and
glue.</t>
  <t>When DELEG records are present at a delegation point, the parent-centric
model provides a natural enforcement point for the rule from
<xref target="I-D.ietf-deleg"/> Section 5.1.1 that a DELEG-aware resolver <bcp14>MUST</bcp14> use
name servers from DELEG records and <bcp14>MUST NOT</bcp14> fall back to NS records.</t>
  <t>Because DELEG is signed on the parent side, a parent-centric resolver
can validate delegation parameters through the normal DNSSEC chain of
trust -- a capability that is fundamentally impossible with unsigned
parent-side NS records.</t>
</list></t>

<t>The parent-centric behavioral model is a prerequisite for correct DELEG
implementation.  A child-centric resolver that overwrites parent-side
delegation data with child-side NS data would lose the DELEG information
and could not maintain the invariant that DELEG takes precedence over NS.</t>

</section>
<section anchor="intellectual-property-note"><name>Intellectual Property Note</name>

<ul empty="true"><li>
  <t><strong>Note to the RFC Editor:</strong> Please remove this appendix before
publication.</t>
</li></ul>

<t>The authors are aware of U.S. Patent 7,769,826 ("Systems and methods of
providing DNS services using separate answer and referral caches", filed
June 26, 2003, assigned to Nominum, Inc., now held by Akamai
Technologies).  That patent claims a specific cache architecture in which
answer information and referral information are stored in separate data
structures (a flat/hash table for answers and a hierarchical/tree
structure for referrals) with a particular lookup order and
classification-based routing of responses to the appropriate store.</t>

<t>This document intentionally does not specify, recommend, or require any
particular cache architecture, data-structure choice, lookup ordering, or
response classification scheme.  It specifies only the behavioral
requirement that delegation decisions be based on parent-side NS (or
DELEG) data from referrals and not be overwritten by child-side NS data.
Conforming implementations are free to use any internal organization --
including a single unified cache -- that achieves the required behavior.</t>

<t>The authors believe that this document is not Covered by the above mentioned
patent.</t>

</section>
<section numbered="false" anchor="acknowledgements"><name>Acknowledgements</name>

<t>The concept of parent-centric delegation handling has been explored by
multiple DNS implementations over the years.  The authors would like to
acknowledge the prior work by Nominum (Vantio) and Google (Public DNS) in
deploying parent-centric resolvers at scale, which demonstrated the
viability of this approach.</t>

<t>The BIND 9 implementation was developed by Colin Vidal with contributions
from Evan Hunt and Ondřej Surý, building on the issue analysis by Petr
Špaček.</t>

<t>The authors also acknowledge Kazunori Fujiwara for his earlier work on
resolver algorithm updates proposing separation of authoritative data and
delegation caches.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

