00 version 20260317
This commit is contained in:
616
draft-kolkman-dns-in-tree-hints-00-20260317.txt
Normal file
616
draft-kolkman-dns-in-tree-hints-00-20260317.txt
Normal file
@@ -0,0 +1,616 @@
|
||||
|
||||
|
||||
|
||||
|
||||
dnsop O. Kolkman
|
||||
Internet-Draft 17 March 2026
|
||||
Intended status: Informational
|
||||
Expires: 18 September 2026
|
||||
|
||||
|
||||
In-Tree Hints for DNS Resiliency
|
||||
draft-kolkman-in-tree-hints
|
||||
|
||||
Abstract
|
||||
|
||||
We present a methodology by which networks that rely very strongly on
|
||||
specific domain names can become more resilience to failures in the
|
||||
parent domain.
|
||||
|
||||
The approach presented uses a hints-file-like mechanism in recursive
|
||||
nameservers in addition to having the authoritative servers follow a
|
||||
few operational practices.
|
||||
|
||||
The suggested method can be seen as a means for increasing digital
|
||||
sovereignty. We describe the approach, the necessary operational
|
||||
practices, and the dilemmas this approach introduces.
|
||||
|
||||
Status of This Memo
|
||||
|
||||
This Internet-Draft is submitted in full conformance with the
|
||||
provisions of BCP 78 and BCP 79.
|
||||
|
||||
Internet-Drafts are working documents of the Internet Engineering
|
||||
Task Force (IETF). Note that other groups may also distribute
|
||||
working documents as Internet-Drafts. The list of current Internet-
|
||||
Drafts is at https://datatracker.ietf.org/drafts/current/.
|
||||
|
||||
Internet-Drafts are draft documents valid for a maximum of six months
|
||||
and may be updated, replaced, or obsoleted by other documents at any
|
||||
time. It is inappropriate to use Internet-Drafts as reference
|
||||
material or to cite them other than as "work in progress."
|
||||
|
||||
This Internet-Draft will expire on 18 September 2026.
|
||||
|
||||
Copyright Notice
|
||||
|
||||
Copyright (c) 2026 IETF Trust and the persons identified as the
|
||||
document authors. All rights reserved.
|
||||
|
||||
This document is subject to BCP 78 and the IETF Trust's Legal
|
||||
Provisions Relating to IETF Documents (https://trustee.ietf.org/
|
||||
license-info) in effect on the date of publication of this document.
|
||||
|
||||
|
||||
|
||||
Kolkman Expires 18 September 2026 [Page 1]
|
||||
|
||||
Internet-Draft in-tree-hints March 2026
|
||||
|
||||
|
||||
Please review these documents carefully, as they describe your rights
|
||||
and restrictions with respect to this document. Code Components
|
||||
extracted from this document must include Revised BSD License text as
|
||||
described in Section 4.e of the Trust Legal Provisions and are
|
||||
provided without warranty as described in the Revised BSD License.
|
||||
|
||||
Table of Contents
|
||||
|
||||
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
|
||||
2. The in-tree hints concept . . . . . . . . . . . . . . . . . . 4
|
||||
2.1. Recursive nameserver . . . . . . . . . . . . . . . . . . 4
|
||||
2.2. Domain Owner . . . . . . . . . . . . . . . . . . . . . . 6
|
||||
3. Operational Considerations . . . . . . . . . . . . . . . . . 7
|
||||
3.1. Signaling . . . . . . . . . . . . . . . . . . . . . . . . 7
|
||||
3.2. Achieving true resiliency of services within the
|
||||
domain. . . . . . . . . . . . . . . . . . . . . . . . . . 7
|
||||
3.3. Serving stale data . . . . . . . . . . . . . . . . . . . 8
|
||||
4. Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . 8
|
||||
5. Security Considerations . . . . . . . . . . . . . . . . . . . 8
|
||||
6. Policy Considerations . . . . . . . . . . . . . . . . . . . . 9
|
||||
7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 10
|
||||
8. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 10
|
||||
9. References . . . . . . . . . . . . . . . . . . . . . . . . . 10
|
||||
9.1. Normative References . . . . . . . . . . . . . . . . . . 10
|
||||
9.2. Informative References . . . . . . . . . . . . . . . . . 10
|
||||
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 11
|
||||
|
||||
1. Introduction
|
||||
|
||||
|
||||
The Domain Name System (DNS) is a remarkably stable and resilient
|
||||
system. However, in many environments people are looking on how they
|
||||
can remain in control over the continuity of digital services in
|
||||
their own environments and reduce external dependencies. One those
|
||||
dependencies is the DNS, on which we focus in this document.
|
||||
|
||||
Consider the following failure case:
|
||||
|
||||
* A community of interest is highly dependent on services that are
|
||||
discoverable with names within the example.net domain;
|
||||
|
||||
* A failure in DNS resolution occurs in the delegation between .net
|
||||
and example.net;
|
||||
|
||||
* IP connectivity remains intact: The DNS servers that serve
|
||||
example.net authoritatively are still reachable by the community
|
||||
of interest. So are the recursive nameservers and the service of
|
||||
interest.
|
||||
|
||||
|
||||
|
||||
Kolkman Expires 18 September 2026 [Page 2]
|
||||
|
||||
Internet-Draft in-tree-hints March 2026
|
||||
|
||||
|
||||
This failure case may sound relatively limited. But here are a few
|
||||
less abstract examples of such failure.
|
||||
|
||||
Consider an enterprise campus operating under the domain example.net
|
||||
that provides essential services, such as logistics, to users on its
|
||||
campus. If the transit connection to the broader Internet were to
|
||||
fail, the consequences could be significant. Even when all
|
||||
infrastructure (DNS recursive and authoritative, and the servers for
|
||||
the services themselves, etc) is on premise a failure to resolve the
|
||||
delegation between top level domain .net and example.net would
|
||||
eventually lead to inability to contact services.
|
||||
|
||||
Another example is a small island nation state that has a number of
|
||||
its government services running on the island under its own TLD. Now
|
||||
considers a cable cut scenario where all upstream connectivity is
|
||||
lost. After a while, when authority information starts to time out
|
||||
from caches (for some implementations after 24 hours), connections to
|
||||
services on the island will start to fail.
|
||||
|
||||
A less benign example is an intervention in the DNS root. Where
|
||||
delegation data for a country's level top level domain(ccTLD) gets
|
||||
altered or removed. Such intervention would eventually debilitate
|
||||
users which rely on services within that ccTLDs domain, usually
|
||||
government services and local media outlets within that country.
|
||||
|
||||
While unthinkable even a few years ago these sort of scenario are now
|
||||
being considered in the context of international stability in
|
||||
cyberspace.
|
||||
|
||||
In this document we document an operational approach that, with minor
|
||||
support of recursive nameserver can offer one of the elements towards
|
||||
greater autonomy and resilience of infrastructure dependent on a
|
||||
specific domain. While certainly not the only approach to increase
|
||||
resiliency (e.g. the small island nation state example would be
|
||||
solved by having a local anycast instance of the root) we introduce
|
||||
this to offer confidence building mechanism that does not
|
||||
fundamentally change the DNS design. This approach is consistent
|
||||
with the architecture, design, and operation of the DNS. By
|
||||
following practices herein we avoid namespace fragmentation. We also
|
||||
avoid fundamental protocol changes, in particular we avoid
|
||||
alternative roots.
|
||||
|
||||
The approach called 'in-tree hints', offers protection against
|
||||
various attack vectors that could compromise the delegation process.
|
||||
For instance, on-path attackers may attempt to alter delegation
|
||||
records, which could lead to denial of service, particularly in
|
||||
systems utilizing Domain Name System Security Extensions (DNSSEC).
|
||||
Additionally, threats such as DNS supply chain attacks or inadvertent
|
||||
|
||||
|
||||
|
||||
Kolkman Expires 18 September 2026 [Page 3]
|
||||
|
||||
Internet-Draft in-tree-hints March 2026
|
||||
|
||||
|
||||
errors can result in unauthorized changes to the delegation,
|
||||
including DS (Delegation Signer) records. More general, we solve for
|
||||
the case that a DNS resolver receives parental data that is
|
||||
inconsistent with the intent from the domain owner, i.e. receiving
|
||||
data that is inconsistent with what is published on authoritative
|
||||
servers. That includes not receiving data at all.
|
||||
|
||||
In-tree hints can be seen as a building block for resiliency of
|
||||
critical infrastructure or digital autonomy. The approach is
|
||||
complementary to serving stale data from the cache [RFC8767], more on
|
||||
this in section Section 3.3.
|
||||
|
||||
In this memo we describe what the parties that are critically
|
||||
dependent on a specific domain and those that serve zones within that
|
||||
domain will need to do in order to guarantee continuous operation.
|
||||
|
||||
In section Section 2 we describe the idea and the requirements for a
|
||||
recursive DNS server and the requirements of the zone associated
|
||||
with. In section Section 3.2 we shortly point to other measures that
|
||||
must be taken in combination with this mechanism. In section
|
||||
Section 6 we discuss some policy considerations and the dilemmas that
|
||||
exist with respect to intentions of the DNS parent and child.
|
||||
|
||||
This document uses uppercase SHOULD, RECOMMENDED and MUST in the
|
||||
meaning defined by [RFC2119]. Their lowercase equivalents do not
|
||||
have normative meaning.
|
||||
|
||||
2. The in-tree hints concept
|
||||
|
||||
[RFC9499] describes the root hints file "Operators who manage a DNS
|
||||
recursive resolver typically need to configure a 'root hints file'.
|
||||
This file contains the names and IP addresses of the authoritative
|
||||
name servers for the root zone, so the software can bootstrap the DNS
|
||||
resolution process. For many pieces of software, this list comes
|
||||
built into the software."
|
||||
|
||||
The in-tree hints borrows this from this idea: by configuring a
|
||||
'hints file' for a specific domain one allows oneself to bootstrap
|
||||
from that domain down, even if its parents are not available.
|
||||
Implementing it requires a modification in recursive nameservers and
|
||||
adherence to some operational practices.
|
||||
|
||||
2.1. Recursive nameserver
|
||||
|
||||
Recursive nameserver software will need to be modified to deal to
|
||||
work with in-tree hints.
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Kolkman Expires 18 September 2026 [Page 4]
|
||||
|
||||
Internet-Draft in-tree-hints March 2026
|
||||
|
||||
|
||||
An in-tree hints is configuration for a recursive resolver that
|
||||
provides the names and IP addresses of authoritative name servers for
|
||||
a specific domain. A recursive name server may be configured for in-
|
||||
tree hints for multiple domains.
|
||||
|
||||
When there are no in-domain (in bailiwick) nameservers ([RFC9499]) in
|
||||
the NS set for the domain then this mechanism MUST [OMK: SHOULD?] not
|
||||
be used. Without this requirement the resiliency properties can
|
||||
potentially not be achieved as there are dependencies outside of
|
||||
control of the domain. This requirement can be enforced by the
|
||||
recursive nameserver software at the moment of configuration parsing.
|
||||
In addition the in bailiwick server should fate share IP connectivity
|
||||
with its dependendants. For instance, in our island example one in-
|
||||
domain name server should be on the isle. In our enterprise example
|
||||
one in-domain server should be on campus.
|
||||
|
||||
In-tree hints are only useful if the domain owner follows certain
|
||||
practices. A recursive nameserver MAY only implement the in-tree
|
||||
hints mechanism for a specific domain if the domain owner indicates
|
||||
it does so. Section Section 3.1 describes the RECOMMENDED way for
|
||||
domain name owners to signal their intent. [OMK: REVIEW 2019
|
||||
Keywords]
|
||||
|
||||
In-tree hints MUST only be used in combination with a DNSSEC trust-
|
||||
anchor. i.e. a trusted public DNSSEC key that is associated with the
|
||||
name. The trust-anchor MUST be maintained. It SHOULD be maintained
|
||||
by the mechanism described in [RFC5011]. Alternatively an
|
||||
appropriate and trustworthy off-band mechanism MAY be used. The
|
||||
operator of a recursive nameserver must validate that the domain
|
||||
associated with the in-tree hints follows the operational practices
|
||||
described in this memo. This can be achieved by out-of band
|
||||
mechanisms, or by querying the TXT record as described in {#auth}
|
||||
|
||||
When a recursive nameserver is configured with an in-tree hint then
|
||||
the NS Resource Record set contained in the in-tree hint MUST be used
|
||||
during the resolution process. Which means that they always
|
||||
overwrite the NS and DS resource records received from the parent.
|
||||
|
||||
When the NS RRset on the domain's authoritative server changes and
|
||||
has been validated using DNSSEC against configured key then the in-
|
||||
hints tree configuration SHOULD be updated with the changed
|
||||
authoritative NS set. This requirement guarantees that the intent of
|
||||
the domain holder will be followed.
|
||||
|
||||
The recursive nameserver should honor the TTLs to regular check a
|
||||
change of the authoritative NS RRset. Operators that implement in-
|
||||
tree hints SHOULD use tooling, possibly implemented in the recursive
|
||||
nameserver, to log and signal inconsistencies between information in
|
||||
|
||||
|
||||
|
||||
Kolkman Expires 18 September 2026 [Page 5]
|
||||
|
||||
Internet-Draft in-tree-hints March 2026
|
||||
|
||||
|
||||
the parents and the in-tree configuration to the operators of the
|
||||
recursive nameserver, these inconsistencies need to be well
|
||||
understood. They could be the result of a bona-fide re-delegation
|
||||
(in which case the parental records are likely a subset of the
|
||||
authoritative NS RR set), the withdrawal of the delegation by the
|
||||
parent, or an error or attack.
|
||||
|
||||
The trust anchor MUST be used for the validation of record within the
|
||||
tree-hint's domain even when a parental DS record exists. Nota bene,
|
||||
section 5 of [RFC5011] allows for deletion if a superior trust point
|
||||
exists - when a trust anchor is part of an in-tree hint that deletion
|
||||
with the motivation that a superior trust point exists MUST not
|
||||
happen. When a tree-hint exists for a subordinate domain, that trust
|
||||
anchor MUST take precedence.
|
||||
|
||||
Recursive nameservers that implement this mechanism SHOULD have a
|
||||
fallback mechanism implemented that will eventually allow them to
|
||||
reach the in-domain nameserver when other servers in the NS resource
|
||||
record set fail. [OMK: I think this is an existing requirement
|
||||
somewhere else in the mountain of RFCs]
|
||||
|
||||
2.2. Domain Owner
|
||||
|
||||
This section describes the operational practices that the domain
|
||||
owner has to follow in order to achieve the resiliency within the
|
||||
domain.
|
||||
|
||||
The domain owner MUST maintain its DNSSEC configuration using the
|
||||
mechanism described in [RFC5011].
|
||||
|
||||
The domain owner MUST have at least one in-domain authoritative
|
||||
nameserver in its NS set. If that nameserver's name is within a
|
||||
delegated child domain, then the nameservers for that delegated
|
||||
domain MUST also have at least one in-domain authoritative
|
||||
nameserver. This requirement is recursive for further delegation.
|
||||
|
||||
In order to benefit from the resiliency properties provided by this
|
||||
mechanism, the domain owner should require that delegated domains
|
||||
(zones) within the domain all have one nameserver that are in-domain.
|
||||
Note that delegated domains do not have to maintain a trust anchor
|
||||
and can rely on there being a chain of trust established using DS
|
||||
records from the trust-anchor down. [OMK: is this actually clear?
|
||||
Domain, sub-domain, in-domain, may become confusing]
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Kolkman Expires 18 September 2026 [Page 6]
|
||||
|
||||
Internet-Draft in-tree-hints March 2026
|
||||
|
||||
|
||||
Furthermore, the in-domain nameserver SHOULD be positioned in a
|
||||
network that shares connectivity fate with the clients. For
|
||||
instance, in our enterprise example it should be in the enterprise
|
||||
campus network. More generally the location is subject to a risk
|
||||
based assessment about the likelihood of not being able to obtain an
|
||||
IP connection the in-domain nameserver.
|
||||
|
||||
[OMK: should there be language here about out-of-domain nameservers?]
|
||||
|
||||
The domain owner should communicate to its community that it is
|
||||
deploying practices that support in-tree hints. That communication
|
||||
MAY be out of band. A RECOMMENDED in-band signaling mechanism in-
|
||||
band described in section Section 3.1.
|
||||
|
||||
3. Operational Considerations
|
||||
|
||||
bla
|
||||
|
||||
3.1. Signaling
|
||||
|
||||
It is RECOMMENDED that a domain owner (the owner of <domain>) signals
|
||||
to its user community that they are using the mechanism described in
|
||||
this section. Signaling is done by putting a TXT resource record
|
||||
with owner name _in-tree.<domain> containing an expiry timestamp in
|
||||
[RFC3339] format. The expiry timestamp indicates the date to which
|
||||
the owner is committed to follow the instructions in section
|
||||
Section 2.2.
|
||||
|
||||
The recursive nameserver operator should at first opportunity, but
|
||||
not longer than 30 days after the expiration, validate if a new
|
||||
expiry record has been published by the domain owner. If not, they
|
||||
SHOULD disable the in-tree hints configuration for the domain.
|
||||
|
||||
_in-tree.<domain> TXT <expiry timestamp>
|
||||
|
||||
[OMK: Alternatively we create a trivial RR type for this. EXP RR
|
||||
containing a timestamp as defined in RFC4034 section-3.1.5 ]
|
||||
|
||||
Out of band signaling is not in scope for this memo.
|
||||
|
||||
3.2. Achieving true resiliency of services within the domain.
|
||||
|
||||
This memo describes a method to achieve resiliency of name resolution
|
||||
for a community of interest of a particular domain. This is, by far,
|
||||
not sufficient to achieve actual resiliency for services that are
|
||||
provided within the domain. While a detailed discussion is out of
|
||||
scope for this memo we like to remind the reader of the following:
|
||||
|
||||
|
||||
|
||||
|
||||
Kolkman Expires 18 September 2026 [Page 7]
|
||||
|
||||
Internet-Draft in-tree-hints March 2026
|
||||
|
||||
|
||||
* The in-domain nameservers should run on IP addresses that can
|
||||
reasonably be expected to be reachable by the community of use.
|
||||
For example, if a service is critical for on-campus enterprise use
|
||||
then the in-domain nameserver should run on the campus network.
|
||||
|
||||
* Any service provider that offers a service under a certain name
|
||||
within the domain should make sure that those services itself can
|
||||
be reasonably expected to be reachable by the community of use.
|
||||
Any service dependencies should also be local.
|
||||
|
||||
* In an effort to create local resiliency one should not forget that
|
||||
resiliency is also achieved by having no single source of failure.
|
||||
Having in-domain nameservers, and having services in reach of the
|
||||
community of interest does not mean that one deploys
|
||||
infrastructure elsewhere.
|
||||
|
||||
3.3. Serving stale data
|
||||
|
||||
In-tree hints are complementary to serving stale data [RFC8767].
|
||||
Serving stale data will allow continuity for all zones when their
|
||||
authoritative servers are not reachable and the data happens to be in
|
||||
the resolvers cache. In-tree hints works for specific domains when
|
||||
data does not happen to be available in recursive nameserver caches
|
||||
or when the parent's server(s) deliver faulty delegation data.
|
||||
|
||||
In-tree hints is not scalable in the sense that there is significant
|
||||
operational overhead for both the domain owner, they have to run in-
|
||||
domain nameservers and follow [RFC5011], and the recursive nameserver
|
||||
operator as they will have to troubleshoot inconsistencies. Serving
|
||||
stale data is highly scalable as it only needs one configuration
|
||||
within the recursive nameserver and then it applies for all domains.
|
||||
|
||||
4. Conclusions
|
||||
|
||||
[TODO]
|
||||
|
||||
5. Security Considerations
|
||||
|
||||
In-tree hints can be used in recursive nameservers in combination
|
||||
with protective block-lists and does therefore not debilitate the
|
||||
available mechanism to protect the community of users of a recursive
|
||||
nameserver.
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Kolkman Expires 18 September 2026 [Page 8]
|
||||
|
||||
Internet-Draft in-tree-hints March 2026
|
||||
|
||||
|
||||
Malwares that use their own recursive nameservers configured with in-
|
||||
trees for their command and control domains to circumvent de-
|
||||
delegation by the parents. However, those recursive nameservers are
|
||||
likely under the control of the malware administrators and the risk
|
||||
of disproportional damage for blocking these recursive nameservers
|
||||
DNS after it has been established that they are used in command and
|
||||
control seems proportionate.
|
||||
|
||||
This mechanism intends to provide resilience for network failures.
|
||||
However, it adds complexity in software and operational procedures,
|
||||
thereby increasing the fragility.
|
||||
|
||||
When DNS validation takes place by clients that are 'behind' a
|
||||
recursive nameserver that is configured with in-tree hints for a
|
||||
particular domain then behavior in case of inconsistencies between
|
||||
the domain and its parent will lead to undefined behavior. These
|
||||
validating clients SHOULD also implement in-tree hints.
|
||||
|
||||
6. Policy Considerations
|
||||
|
||||
Inherently the approach described in this memo provides a mechanism
|
||||
for a community of users of a domain to overwrite the policies from
|
||||
the parent domain. For instance, it allows the community of users to
|
||||
continue to use the domain even when e.g. the delegation for that
|
||||
domain expires. As such, this mechanism allows a community to
|
||||
continue to use a domain when the parent has de-delegated the domain
|
||||
for instance in the context of a court order. At the same time this
|
||||
in-tree approach can be a building block to create resilience for a
|
||||
critical infrastructure. It can potentially be applied to a country
|
||||
code top-level domain (CCTLD) and its user community. While the
|
||||
failure mode at CCTLD level is extremely low, this approach may add
|
||||
to confidence in the domain name system as a whole in times of
|
||||
international tensions.
|
||||
|
||||
When an inconsistency exists between what is published in the parent
|
||||
and what is used as in-tree-hints there is a fragmentation of the DNS
|
||||
namespace. The operators of the recursive nameservers should pro-
|
||||
actively restore the situation to consistency. Note that there is no
|
||||
technical enforcement mechanism to aid that restoration but it is
|
||||
expected that if a recursive nameserver operator configures an in-
|
||||
tree domain he is part of the community of interest and therefore has
|
||||
out of band means to contact the domain administrator. Also note
|
||||
that the operators of the domain (e.g. example.net) do not have
|
||||
communication mechanism that can enforce the use or non-use of in-
|
||||
tree hints by recursive nameserver operators.
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Kolkman Expires 18 September 2026 [Page 9]
|
||||
|
||||
Internet-Draft in-tree-hints March 2026
|
||||
|
||||
|
||||
The authority for using or not using in-tree hints is with the
|
||||
operator of the recursive nameserver - as a user agent for its
|
||||
community. Users have in general been able to overwrite their DNS
|
||||
configuration since the first deployment of the DNS system. Users
|
||||
can use a recursive nameserver that does not use in-tree hints for a
|
||||
particular domain and therefore can opt-out of the mechanism.
|
||||
|
||||
7. IANA Considerations
|
||||
|
||||
No IANA considerations herein.
|
||||
|
||||
8. Acknowledgments
|
||||
|
||||
This document is inspired by various hallway conversations about
|
||||
digital autonomy.
|
||||
|
||||
The author is an employee of the Internet Society, this document does
|
||||
not necessarily reflect the position of the Internet Society.
|
||||
|
||||
{olaf: source="olaf"}
|
||||
|
||||
9. References
|
||||
|
||||
9.1. Normative References
|
||||
|
||||
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
|
||||
Requirement Levels", BCP 14, RFC 2119,
|
||||
DOI 10.17487/RFC2119, March 1997,
|
||||
<https://www.rfc-editor.org/rfc/rfc2119>.
|
||||
|
||||
[RFC3339] Klyne, G. and C. Newman, "Date and Time on the Internet:
|
||||
Timestamps", RFC 3339, DOI 10.17487/RFC3339, July 2002,
|
||||
<https://www.rfc-editor.org/rfc/rfc3339>.
|
||||
|
||||
[RFC5011] StJohns, M., "Automated Updates of DNS Security (DNSSEC)
|
||||
Trust Anchors", STD 74, RFC 5011, DOI 10.17487/RFC5011,
|
||||
September 2007, <https://www.rfc-editor.org/rfc/rfc5011>.
|
||||
|
||||
[RFC7344] Kumari, W., Gudmundsson, O., and G. Barwood, "Automating
|
||||
DNSSEC Delegation Trust Maintenance", RFC 7344,
|
||||
DOI 10.17487/RFC7344, September 2014,
|
||||
<https://www.rfc-editor.org/rfc/rfc7344>.
|
||||
|
||||
9.2. Informative References
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Kolkman Expires 18 September 2026 [Page 10]
|
||||
|
||||
Internet-Draft in-tree-hints March 2026
|
||||
|
||||
|
||||
[E-Gov-Resilience]
|
||||
Sommese et al, "Assessing e-Government DNS Resilience",
|
||||
IEEE Proceedings of the 2022 International Conference on
|
||||
Network and Service Management (CNSM 2022), 2022.
|
||||
|
||||
[RFC8767] Lawrence, D., Kumari, W., and P. Sood, "Serving Stale Data
|
||||
to Improve DNS Resiliency", RFC 8767,
|
||||
DOI 10.17487/RFC8767, March 2020,
|
||||
<https://www.rfc-editor.org/rfc/rfc8767>.
|
||||
|
||||
[RFC9499] Hoffman, P. and K. Fujiwara, "DNS Terminology", BCP 219,
|
||||
RFC 9499, DOI 10.17487/RFC9499, March 2024,
|
||||
<https://www.rfc-editor.org/rfc/rfc9499>.
|
||||
|
||||
Author's Address
|
||||
|
||||
Olaf Kolkman
|
||||
Email: kolkman@isoc.org
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Kolkman Expires 18 September 2026 [Page 11]
|
||||
Reference in New Issue
Block a user