<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.39 (Ruby 3.4.9) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-dnsop-ds-automation-09" category="bcp" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="DS Automation">Operational Recommendations for DNSSEC Delegation Signer (DS) Automation</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-dnsop-ds-automation-09"/>
    <author initials="S." surname="Sheng" fullname="Steve Sheng">
      <organization/>
      <address>
        <email>steve.sheng@gmail.com</email>
      </address>
    </author>
    <author initials="P." surname="Thomassen" fullname="Peter Thomassen">
      <organization>deSEC</organization>
      <address>
        <email>peter@desec.io</email>
      </address>
    </author>
    <date/>
    <area>Internet</area>
    <workgroup>DNSOP Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 60?>

<t>Enabling support for automatic acceptance of DNSSEC Delegation Signer (DS) parameters from the Child DNS operator (via RFCs 7344, 8078, 9615) requires the parental agent, often a registry or registrar, to make a number of technical decisions around acceptance checks, error and success reporting, and multi-party issues such as concurrent updates. This document describes recommendations about how these points are best addressed in practice.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Domain Name System Operations Working Group mailing list (dnsop@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/dnsop/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/peterthomassen/draft-shetho-dnsop-ds-automation"/>.</t>
    </note>
  </front>
  <middle>
    <?line 64?>

<section anchor="introduction">
      <name>Introduction</name>
      <t><xref target="RFC7344"/>, <xref target="RFC8078"/>, and <xref target="RFC9615"/> automate DNSSEC <xref target="RFC9364"/> delegation trust maintenance by having the child publish Child DS (CDS) and/or Child DNSKEY (CDNSKEY) records which indicate the delegation's desired DNSSEC parameters ("DS automation").</t>
      <t>Parental Agents using these protocols have to make a number of technical decisions relating to issues of acceptance checks, timing, error reporting, locks, etc. Additionally, when using the registrant-registrar-registry (RRR) model (as is common amongst top-level domains), both the registrar and the registry can effect parent-side changes to the delegation. In such a situation, additional opportunities for implementation differences arise.</t>
      <t>Not all existing DS automation deployments have made the same choices with respect to these questions, leading to somewhat inconsistent behavior. From the perspective of a domain holder with domain names under various TLDs, this may be unexpected and confusing.</t>
      <t>In the following sections, operational questions are first raised and answered with the corresponding recommendations. Each section is concluded with an analysis of its recommendations and related considerations. A combined view of the recommendations from all sections is given in <xref target="recommendations_overview"/>.</t>
      <t>Readers are expected to be familiar with DNSSEC <xref target="RFC9364"/><xref target="RFC9615"/><xref target="RFC9859"/>.</t>
      <t>The core issues addressed in the document are derived from Section 4.4 of <xref target="SAC126"/>. Readers are referred to this report for additional background.</t>
      <section anchor="requirements-notation">
        <name>Requirements Notation</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
        </t>
      </section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The term Parental Agent is used as defined in <xref section="1.1" sectionFormat="of" target="RFC7344"/>. The document also uses terms defined in <xref target="RFC9499"/>, in particular:</t>
      <ul spacing="normal">
        <li>
          <t>DNS operator</t>
        </li>
        <li>
          <t>Registry</t>
        </li>
        <li>
          <t>Registrant</t>
        </li>
        <li>
          <t>Registrar</t>
        </li>
      </ul>
      <t>In addition, the document makes use of the following terms:</t>
      <dl>
        <dt>Child zone:</dt>
        <dd>
          <t>DNS zone whose delegation is in the Parent zone.</t>
        </dd>
        <dt>Child (DNS operator):</dt>
        <dd>
          <t>DNS operator responsible for a Child zone.</t>
        </dd>
        <dt>Parent zone:</dt>
        <dd>
          <t>DNS zone that holds a delegation for a Child zone.</t>
        </dd>
        <dt>Parent:</dt>
        <dd>
          <t>The operator responsible for a Parent zone and, thus, involved with the maintenance of the delegation's DNSSEC parameters (in particular, the acceptance of these parameters and the publication of corresponding DS records).</t>
        </dd>
        <dt>RRR Model:</dt>
        <dd>
          <t>The registrant-registrar-registry (RRR) interaction framework, where registrants interact with a registrar to register and manage domain names, and registrars interact with the domain's registry for the provision and management of domain names on the registrant's behalf. This model is common amongst TLDs.</t>
        </dd>
      </dl>
    </section>
    <section anchor="recommendations-for-deployments-of-ds-automation">
      <name>Recommendations for Deployments of DS Automation</name>
      <t>The guidelines for deploying DS automation set out in this document are meant to achieve more uniform treatment across suffixes — minimizing user surprise and providing baseline safety and uniformity of behavior.
They are also intended to prevent disruption of DNS and DNSSEC functionality.
At a minimum, compliance with this RFC requires support for both DNSSEC bootstrapping <xref target="RFC9615"/> and subsequent updates <xref target="RFC7344"/>, <xref target="RFC8078"/> under the implementation guidance below.</t>
      <t>The recommendations optimize interoperability and safety. In certain cases, local policy may take precedence, such as when a registry is subjected to national cryptographic policy requirements.
However, not following any requirements designated with the "SHOULD" key word will generally lead to undesirable effects of ambiguity and interoperability issues.
When implementing these recommendations, operators MUST mitigate issues arising from any particular deviation.</t>
      <t>Registries with additional requirements on DS update checks MAY implement any additional checks in line with local policy.</t>
    </section>
    <section anchor="acceptance">
      <name>Acceptance Checks and Safety Measures</name>
      <t>This section provides recommendations to address the following operational questions:</t>
      <ul spacing="normal">
        <li>
          <t>What kind of acceptance checks should be performed on DS parameters?</t>
        </li>
        <li>
          <t>Should these checks be performed upon acceptance or also continually when in place?</t>
        </li>
        <li>
          <t>How do TTLs and caching impact DS provisioning? How important is timing in a child key change?</t>
        </li>
        <li>
          <t>Are parameters for DS automation best conveyed as CDNSKEY or CDS records, or both?</t>
        </li>
      </ul>
      <section anchor="recommendations">
        <name>Recommendations</name>
        <ol spacing="normal" type="1"><li>
            <t>Entities performing automated DS maintenance MUST verify:  </t>
            <ol spacing="normal" type="a"><li anchor="acceptance-rec1a">
                <t>the unambiguous intent of each DS bootstrapping or update request as per <xref target="I-D.ietf-dnsop-cds-consistency"/>, by checking its consistency both      </t>
                <ul spacing="normal">
                  <li>
                    <t>between any published CDS and CDNSKEY records, and</t>
                  </li>
                  <li>
                    <t>across all authoritative nameservers in the delegation,</t>
                  </li>
                </ul>
                <t>
and</t>
              </li>
              <li>
                <t>that the resulting DS record set would allow continued DNSSEC validation if deployed,</t>
              </li>
            </ol>
            <t>
and cancel the update if the verifications do not succeed.</t>
          </li>
          <li>
            <t>Parent-side entities (such as registries) SHOULD reduce a DS record set's TTL to a value between 5–15 minutes when a new set of records is published, and restore the previous (or, if unavailable, default) TTL value at a later occasion (but not before the previous DS RRset's TTL has expired).</t>
          </li>
          <li>
            <t>DNS operators MUST publish both CDNSKEY and CDS records (unless the parent's preference is known), and follow best practice for the choice of hash digest type <xref target="DS-IANA"/>.</t>
          </li>
        </ol>
      </section>
      <section anchor="analysis_acceptance">
        <name>Analysis</name>
        <section anchor="continuity-of-resolution">
          <name>Continuity of Resolution</name>
          <t>To maintain the basic resolution function, it is critical to avoid deployment of flawed DS record sets in the parent zone. It is therefore necessary for the Parent to verify that the DS record set resulting from an automated (or even manual) update does not break DNSSEC validation if deployed, and otherwise cancel the update.</t>
          <t>This is best achieved by:</t>
          <ol spacing="normal" type="1"><li>
              <t>verifying that consistent CDS/CDNSKEY responses are served by all of the delegation's nameservers <xref target="I-D.ietf-dnsop-cds-consistency"/>;</t>
            </li>
            <li>
              <t>verifying that the resulting DS Resource Record set (RRset) does not break the delegation if applied (<xref section="4.1" sectionFormat="comma" target="RFC7344"/>), i.e., it provides at least one valid path for validators to use (<xref section="5.11" sectionFormat="comma" target="RFC6840"/>). This is the case if the child's DNSKEY RRset has a valid RRSIG signature from a key that is referenced by at least one DS record, with the digest type and signing algorithm values designated as "RECOMMENDED" or "MUST" in the "Use for DNSSEC Validation" columns of the relevant IANA registries (<xref target="DS-IANA"/> and <xref target="DNSKEY-IANA"/>). Note that these checks need not be enforced when provisioning DS records manually in order to enable the use other digest types or algorithms for potentially non-interoperable purposes.</t>
            </li>
          </ol>
          <t>Even without an update being requested, Parents may occasionally check whether the current DS contents would still be acceptable if they were newly submitted in CDS/CDNSKEY form (see <xref target="acceptance"/>).
Any failures — such as a missing DNSKEY due to improper rollover timing (<xref section="4.1" sectionFormat="comma" target="RFC6781"/>), or changed algorithm requirements — can then be communicated in line with <xref target="reporting"/>, without altering or removing the existing DS RRset.</t>
        </section>
        <section anchor="ttls-and-caching">
          <name>TTLs and Caching</name>
          <t>To further reduce the impact of any misconfigured DS record set — be it from automated or from manual provisioning — the option to quickly roll back the delegation's DNSSEC parameters is of great importance. This is achieved by setting a comparatively low TTL on the DS record set in the parent domain, at the cost of reduced resiliency against nameserver unreachability due to the earlier expiration of cached records. The availability risk can be mitigated by limiting such TTLs to a brief time period after a change to the DS configuration, during which rollbacks are most likely to occur.</t>
          <t>Registries therefore should significantly lower the DS RRset's TTL for some time following bootstrapping or an update. Pragmatic values for the reduced TTL value range between 5–15 minutes.
Using values below 5 minutes risks excessive queries, and using values greater than 15 minutes may impact recovery from operational mistakes.</t>
          <t>Note that recent measurements have demonstrated low TTLs like the above to have negligible impact on the overall load of a registry's authoritative nameserver infrastructure <xref target="LowTTL"/>.</t>
          <t>The reduction should be in effect at least for a couple of days and until the previous DS record set has expired from caches, that is, the period during which the low-TTL is applied typically will significantly exceed the normal TTL value. When using the Extensible Provisioning Protocol (EPP) <xref target="RFC5730"/>, the domain <tt>&lt;info&gt;</tt> command described in <xref section="2.1.1.2" sectionFormat="of" target="RFC9803"/> can be used by the registrar to obtain the registry's TTL policy.</t>
          <t>While this approach enables quick rollbacks, timing of the desired DS update process itself is largely governed by the previous DS RRset's TTL, and therefore does not generally benefit from an overall speed-up. Note also that nothing is gained from first lowering the TTL of the old DS RRset: such an additional step would, in fact, require another wait period while resolver caches adjust. For the sake of completeness, there likewise is no point to increasing any DS TTL values beyond their normal value.</t>
        </section>
        <section anchor="cds-vs-cdnskey">
          <name>CDS vs. CDNSKEY</name>
          <t>DS records can be generated from information provided either in DS format (CDS) or in DNSKEY format (CDNSKEY). While the format of CDS records is identical to that of DS records (so the record data be taken verbatim), generation of a DS record from CDNSKEY information involves computing a hash.</t>
          <t>Whether a Parent processes CDS or CDNSKEY records depends on their preference:</t>
          <ul spacing="normal">
            <li>
              <t>Processing (and storing) CDNSKEY information allows the Parent to control the choice of hash algorithms. The Parent may then unilaterally regenerate DS records with a different choice of hash algorithm(s) whenever deemed appropriate.</t>
            </li>
            <li>
              <t>Processing CDS information allows the Child DNS operator to control the hash digest type used in DS records, enabling the Child DNS operator to deploy (for example) experimental hash digests and removing the need for registry-side changes when additional digest types become available.</t>
            </li>
          </ul>
          <t>The need to make a choice in the face of this dichotomy is not specific to DS automation: even when DNSSEC parameters are relayed to the Parent through conventional channels, the Parent has to make some choice about which format(s) to accept.</t>
          <t>As there exists no protocol for Child DNS operators to discover a Parent's input format preference, interoperability requires publication of both CDNSKEY as well as CDS records, in line with <xref section="5" sectionFormat="of" target="RFC7344"/>. The choice of hash digest type should follow current best practice <xref target="DS-IANA"/>.</t>
          <t>Publishing the same information in two different formats is not ideal. Still, it is much less complex and costly than burdening the Child DNS operator with discovering each Parent's current policy. Also, it is very easily automated. Operators should ensure that published RRsets are consistent with each other.</t>
          <t>If both RRsets are published, Parents are expected to verify consistency between them by verifying that they refer to the same set of keys <xref target="I-D.ietf-dnsop-cds-consistency"/>. By not second-guessing inconsistencies (such as by RRset recency) and instead rejecting them, responsibility to clearly express each update request is placed on the Child DNS operator.</t>
          <t>CDS records need only be considered for CDNSKEY consistency when their digest type field is designated as "MUST" in the "Implement for DNSSEC Delegation" column of the "Digest Algorithms" registry <xref target="DS-IANA"/>.
Consistency of records with other digest types need not be verified, especially when the digest type is unsupported; such records can be ignored.
Note that this does not imply a restriction on the DS hash digest types: if no inconsistencies are found, the parent can publish DS records with whatever digest type(s) it prefers.</t>
        </section>
      </section>
    </section>
    <section anchor="reporting">
      <name>Reporting and Transparency</name>
      <t>This section provides recommendations to address the following operational question:</t>
      <ul spacing="normal">
        <li>
          <t>Should a failed (or even successful) DS update trigger a notification to anyone?</t>
        </li>
      </ul>
      <section anchor="recommendations-1">
        <name>Recommendations</name>
        <ol spacing="normal" type="1"><li>
            <t>For certain DS updates (see <xref target="analysis_reporting">analysis</xref>) and for DS deactivation, relevant points of contact known to the parent-side entity (registry or registrar) SHOULD be notified.</t>
          </li>
          <li>
            <t>For error conditions, the child DNS operator and the domain's technical contact (if applicable) SHOULD be notified first. The registrant SHOULD NOT be notified unless the problem persists for a prolonged amount of time (e.g., three days).</t>
          </li>
          <li>
            <t>Child DNS operators SHOULD be notified of errors using a report query <xref target="RFC9567"/> to the agent domain as described in <xref section="4" sectionFormat="of" target="RFC9859"/>. Notifications to humans (domain holder) will be performed in accordance with the communication preferences established with the parent-side entity. The same condition SHOULD NOT be reported unnecessarily frequently to the same recipient.</t>
          </li>
          <li>
            <t>In the RRR model, registries performing DS automation SHOULD inform the registrar of any DS record changes via the EPP Change Poll Extension <xref target="RFC8590"/> or a similar channel.</t>
          </li>
          <li>
            <t>The currently active DS configuration SHOULD be made accessible to the registrant (or their designated party) through the customer portal available for domain management. The DS update history MAY be made available in the same way.</t>
          </li>
        </ol>
      </section>
      <section anchor="analysis_reporting">
        <name>Analysis</name>
        <t>When accepting or rejecting a DS update, it cannot be assumed that relevant parties are aware of what's happening. For example, a registrar may not know when an automatic DS update is performed by the registry. Similarly, a Child DNS operator may not be aware when their CDS/CDNSKEY RRsets are out of sync across nameservers, causing them to be ignored.</t>
        <t>To help involved parties act appropriately and in a timely manner, entities performing automated DS maintenance should report on conditions they encounter. The following success situations may be of particular interest:</t>
        <ol spacing="normal" type="1"><li anchor="reporting-1">
            <t>A DS RRset has been provisioned  </t>
            <ol spacing="normal" type="a"><li anchor="reporting-1a">
                <t>manually;</t>
              </li>
              <li anchor="reporting-1b">
                <t>due to commencing DS automation (either via DNSSEC bootstrapping, or for the first time after a manual change; see <xref target="multiple"/>);</t>
              </li>
              <li anchor="reporting-1c">
                <t>automatically, as an update to an existing DS RRset that had itself been automatically provisioned.</t>
              </li>
            </ol>
          </li>
          <li anchor="reporting-2">
            <t>The DS RRset has been removed  </t>
            <ol spacing="normal" type="a"><li>
                <t>manually;</t>
              </li>
              <li>
                <t>automatically, using a delete signal (<xref section="4" sectionFormat="comma" target="RFC8078"/>).</t>
              </li>
            </ol>
          </li>
        </ol>
        <t>In addition, there are error conditions worthy of being reported:</t>
        <ol spacing="normal" type="1" start="3"><li anchor="reporting-3">
            <t>A pending DS update cannot be applied due to an error condition. There are various scenarios where an automated DS update might have been requested, but can't be fulfilled. These include:  </t>
            <ol spacing="normal" type="a"><li>
                <t>The new DS record set would break validation/resolution or is not acceptable to the Parent for some other reason (see <xref target="acceptance"/>).</t>
              </li>
              <li>
                <t>A lock prevents DS automation (see <xref target="locks"/>).</t>
              </li>
            </ol>
          </li>
          <li anchor="reporting-4">
            <t>No DS update is due, but it was determined that the Child zone is no longer compatible with the existing DS record set (e.g., DS RRset only references non-existing keys).</t>
          </li>
        </ol>
        <t>In these latter two cases, the entity performing DS automation would be justified to attempt communicating the situation. Potential recipients are:</t>
        <ul spacing="normal">
          <li>
            <t>Child DNS operator, preferably by making a report query <xref target="RFC9567"/> to the agent domain listed in the EDNS0 Report-Channel option of the DS update notification that triggered the DS update (<xref section="4" sectionFormat="comma" target="RFC9859"/>), or else via email to the address contained in the child zone's SOA RNAME field (see Sections <xref target="RFC1035" section="3.3.13" sectionFormat="bare"/> and <xref target="RFC1035" section="8" sectionFormat="bare"/> of <xref target="RFC1035"/>);</t>
          </li>
          <li>
            <t>Registrar (if DS automation is performed by the registry);</t>
          </li>
          <li>
            <t>Registrant (domain holder; in non-technical language, such as "DNSSEC security for your domain has been enabled and will be maintained automatically") or technical contact, in accordance with the communication preferences established with the parent-side entity.</t>
          </li>
        </ul>
        <t>For manual updates (<xref target="reporting-1a" format="none">case 1a</xref>), commencing DS automation (<xref target="reporting-1b" format="none">case 1b</xref>), and deactivating DNSSEC (<xref target="reporting-2" format="none">case 2</xref>), it seems worthwhile to notify both the domain's technical contact (if applicable) and the registrant. This will typically lead to one notification during normal operation of a domain. (<xref target="reporting-1c" format="none">Case 1c</xref>, the regular operation of automation, is not an interesting condition to report to a human.)</t>
        <t>For error conditions (cases <xref target="reporting-3" format="none">3</xref> and <xref target="reporting-4" format="none">4</xref>), the registrant need not always be involved. It seems advisable to first notify the domain's technical contact and the DNS operator serving the affected Child zone, and only if the problem persists for a prolonged amount of time (e.g., three days), notify the registrant.</t>
        <t>When the RRR model is used and the registry performs DS automation, the registrar should always stay informed of any DS record changes, e.g., via the EPP Change Poll Extension <xref target="RFC8590"/>.</t>
        <t>Overly frequent reporting of the same condition to the same recipient is discouraged (e.g., no more than twice in a row). For example, when CDS and CDNSKEY records are inconsistent and prevent DS initialization, the registrant may be notified twice. Additional notifications may be sent with some back-off mechanism (in increasing intervals).</t>
        <t>The registrant (or their designated party) should be able to retrieve the current DS configuration through the customer portal available for domain management.
Failure to provide the registrant a means to inspect the current configuration after it has been changed may hinder recovery from operational incidents because the registrant may have out-of-date information.</t>
        <t>Ideally, the history of DS updates would also be available. However, due to the associated state requirements and the lack of direct operational impact, implementation of this is optional.
If supported by the registry, the DS TTL currently in effect can be obtained using the RDAP TTL extension <xref target="I-D.ietf-regext-rdap-ttl-extension"/>.</t>
        <t>For troubleshooting, dispute resolution, and post-incident analysis, it is instrumental for the Parental Agent to retain structured records of DS automation decisions, including timestamp, triggering CDS/CDNSKEY RRsets, notification channel, authoritative nameservers consulted, verification results, decision outcome, and the applied DS RRset or cancellation reason.</t>
      </section>
    </section>
    <section anchor="locks">
      <name>Registration Locks</name>
      <t>This section provides recommendations to address the following operational question:</t>
      <ul spacing="normal">
        <li>
          <t>How does DS automation interact with other registration state parameters, such as registration locks?</t>
        </li>
      </ul>
      <section anchor="recommendations-2">
        <name>Recommendations</name>
        <ol spacing="normal" type="1"><li>
            <t>To secure ongoing operations, automated DS maintenance MUST NOT be suspended based on a registrar update lock alone (such as EPP status clientUpdateProhibited <xref target="RFC5731"/>).</t>
          </li>
          <li>
            <t>When performed by the registry, automated DS maintenance MUST NOT be suspended based on a registry update lock alone (such as EPP status serverUpdateProhibited <xref target="RFC5731"/>).</t>
          </li>
        </ol>
      </section>
      <section anchor="analysis_locks">
        <name>Analysis</name>
        <t>Registries and registrars can set various types of locks for domain registrations, usually upon the registrant's request. An overview of standardized locks using EPP, for example, is given in <xref section="2.3" sectionFormat="of" target="RFC5731"/>. Some registries may offer additional (or other) types of locks whose meaning and set/unset mechanisms are defined according to a proprietary policy.</t>
        <t>While some locks clearly should have no impact on DS automation (such as transfer or deletion locks), other types of locks, in particular "update locks", deserve a closer analysis.</t>
        <section anchor="registrar-vs-registry-lock">
          <name>Registrar vs. Registry Lock</name>
          <t>A registrar-side update lock (such as clientUpdateProhibited in EPP) protects against various types of accidental or malicious change (like unintended changes through the registrar's customer portal). Its security model does not prevent the registrar's (nor the registry's) actions. This is because a registrar-side lock can be removed by the registrar without an out-of-band interaction.</t>
          <t>Under such a security model, no tangible security benefit is gained by preventing automated DS maintenance based on a registrar lock alone, while preventing it would make maintenance needlessly difficult. It is therefore not justified to suspend automation when such a lock is present.</t>
          <t>When a registry-side update lock is in place, the registrar cannot apply any changes (for security or delinquency or other reasons). However, it does not protect against changes made by the registry itself. This is exemplified by the serverUpdateProhibited EPP status, which demands only that the registrar's "[r]equests to update the object [...] MUST be rejected" (<xref section="2.3" sectionFormat="of" target="RFC5731"/>). This type of lock therefore precludes DS automation by the registrar, while registry-side automation remains unaffected.</t>
          <t>DS automation by the registry further is consistent with <xref section="2.3" sectionFormat="of" target="RFC5731"/>, which explicitly notes that an EPP server (registry) may override status values set by an EPP client (registrar), subject to local server policies. The risk that DS changes from registry-side DS automation might go unnoticed by the registrar is mitigated by sending change notifications to the registrar; see Recommendation 4 of <xref target="reporting"/>.</t>
        </section>
        <section anchor="detailed-rationale">
          <name>Detailed Rationale</name>
          <t>Pre-DNSSEC, it was possible for a registration to be set up once, then locked and left alone (no maintenance required). With DNSSEC comes a change to this operational model: the configuration may have to be maintained in order to remain secure and operational. For example, the Child DNS operator may switch to another signing algorithm if the previous one is no longer deemed appropriate, or roll its Secure Entry Point (SEP) key for other reasons. Such changes entail updating the delegation's DS records.</t>
          <t>If authenticated, these operations do not qualify as accidental or malicious change, but as legitimate and normal activity for securing ongoing operation. The CDS/CDNSKEY method provides an automatic, authenticated means to convey DS bootstrapping and update requests <xref target="RFC9615"/><xref target="RFC7344"/>. The resulting operation is subject to the parent's acceptance checks; in particular, it is not applied when it would break the delegation (see <xref target="acceptance"/>).</t>
          <t>Given that registrar locks protect against unintended changes (such as through the customer portal) while not preventing actions done by the registrar (or the registry) itself, such a lock is not suitable for defending against actions performed illegitimately by the registrar or registry (e.g., due to compromise). Any attack on the registration data that is feasible in the presence of a registrar lock is also feasible regardless of whether DS maintenance is done automatically; in other words, DS automation is orthogonal to the attack vector that a registrar lock protects against.</t>
          <t>Considering that automated DS bootstrapping and update requests are required to be authenticated and validated for correctness, honoring such requests — while in the registrant's interest — comes with no additional associated risk when compared to other authenticated update methods. Suspending automated DS maintenance therefore is not justified.</t>
          <t>Following this line of thought, at the time of document writing some registries (e.g., .ch/.cz/.li) perform automated DS maintenance even when an "update lock" is in place. Registries offering proprietary locks should carefully consider for each lock whether its scope warrants suspension.</t>
          <t>In case of a domain not yet secured with DNSSEC, automatic DS initialization is not required to maintain ongoing operation; however, authenticated DNSSEC bootstrapping <xref target="RFC9615"/> might be requested. Besides being in the interest of security, the fact that a Child is requesting DS initialization through an authenticated method expresses the registrant's intent to have the delegation secured.</t>
          <t>Further, some domains are equipped with an update lock by default. Not honoring DNSSEC bootstrapping requests then imposes an additional burden on the registrant, who has to unlock and relock the domain in order to facilitate DS provisioning after registration. This is a needless cost especially for large domain portfolios. It is also unexpected, as the registrant already has arranged for the necessary CDS/CDNSKEY records to be published. DS initialization and rollovers therefore should be treated the same way with respect to locks.</t>
        </section>
      </section>
    </section>
    <section anchor="multiple">
      <name>Multiple Submitting Parties and Suspension of Automation</name>
      <t>This section provides recommendations to address the following operational questions:</t>
      <ul spacing="normal">
        <li>
          <t>How are conflicts resolved when DS parameters are accepted through multiple channels (e.g., via a conventional channel and via automation)?</t>
        </li>
        <li>
          <t>In case both the registry and the registrar are automating DS provisioning, how to resolve potential collisions?</t>
        </li>
      </ul>
      <section anchor="recommendations-3">
        <name>Recommendations</name>
        <ol spacing="normal" type="1"><li>
            <t>Registries and registrars MUST provide another (e.g., manual) channel for DS maintenance in order to enable recovery when the Child has lost access to its signing key(s). This out-of-band channel is also needed when a DNS operator does not support DS automation or refuses to cooperate.</t>
          </li>
          <li>
            <t>DS bootstrapping and update requests MUST be executed at the next publication opportunity after verification of their authenticity, regardless of whether they are received in-band or via an out-of-band channel.</t>
          </li>
          <li anchor="multiple-rec3">
            <t>When processing a CDS/CDNSKEY "delete" signal to remove the entire DS record set (<xref section="4" sectionFormat="comma" target="RFC8078"/>), DS automation MUST NOT be suspended. For all other removal requests (such as when received via EPP or a web form), DS automation SHOULD be suspended until a new DS record set has been provisioned, in order to prevent accidental re-initialization when the registrant intended to disable DNSSEC.</t>
          </li>
          <li>
            <t>Whenever a non-empty DS record set is provisioned, through whichever channel, DS automation SHOULD NOT (or no longer) be suspended (including after an earlier removal).</t>
          </li>
          <li>
            <t>In the RRR model, a registry MUST NOT automatically initialize DS records when it is known that the registrar does not provide a way for the domain holder to later disable DNSSEC. If the registrar has declared that it performs automated DS maintenance, the registry SHOULD publish the registrar's <xref target="RFC9859"/> notification endpoint (if applicable) and refrain from registry-side DS automation.</t>
          </li>
        </ol>
      </section>
      <section anchor="analysis_multiple">
        <name>Analysis</name>
        <t>In the RRR model, there are multiple channels through which DS parameters can be accepted:</t>
        <ul spacing="normal">
          <li>
            <t>The registry can retrieve information about an intended DS provisioning request automatically from the Child DNS operator and apply the it directly;</t>
          </li>
          <li>
            <t>The registrar can retrieve the same and relay it to the registry;</t>
          </li>
          <li>
            <t>The registrar can obtain the information from the registrant through another channel (such as a non-automated "manual update" via webform submission), and relay it to the registry.</t>
          </li>
        </ul>
        <t>There are several considerations in this context, as discussed in the following subsections.</t>
        <section anchor="necessity-of-non-automatic-updates">
          <name>Necessity of Non-automatic Updates</name>
          <t>Under special circumstances, it may be necessary to perform a non-automatic DS update. One important example is when the key used for authentication of DS updates is destroyed: in this case, an automatic key rollover is impossible as the Child DNS operator can no longer authenticate the associated information. Another example is when several providers are involved, but one no longer cooperates (e.g., when removing a provider from a multi-provider setup). Disabling all other DS management interfaces therefore poses significant operational risk.</t>
          <t>Similarly, when the registrar is known to not support DNSSEC (especially, to not provide a means to remove a DS RRset), registries are cautioned against automatically initializing DS records, in order to prevent situations in which a misconfigured or undesired DS RRset cannot be repaired by the registrant.</t>
        </section>
        <section anchor="impact-of-non-automatic-updates-when-to-suspend-automation">
          <name>Impact of Non-automatic Updates: When to Suspend Automation</name>
          <t>When an out-of-band (e.g., manual) DS update is performed while CDS/CDNSKEY records referencing the previous DS RRset's keys are present, the delegation's DS records may be reset to their previous state at the next run of the automation process. This section discusses in which situations it is appropriate to suspend DS automation after such a non-automatic update.</t>
          <t>One option is to suspend DS automation after a manual DS update, but only until a resumption signal is observed. In the past, it was proposed that seeing an updated SOA serial in the child zone may serve as a resumption signal. However, as any arbitrary modification of zone contents — including the regular updating of DNSSEC signature validity timestamps — typically causes a change in SOA serial, resumption of DS automation after a serial change comes with a high risk of surprise. Additional issues arise if nameservers have different serial offsets (e.g., in a multi-provider setup). This practice therefore is NOT RECOMMENDED.</t>
          <t>Note also that "automatic rollback" due to old CDS/CDNSKEY RRsets can only occur if they are signed with a key authorized by one of new DS records. Acceptance checks described in <xref target="acceptance"/> further ensure that updates do not break validation.</t>
          <t>Removal of a DS record set is triggered either through a CDS/CDNSKEY "delete" signal observed by the party performing the automation (<xref section="4" sectionFormat="comma" target="RFC8078"/>), or by receiving a removal request out-of-band (e.g., via EPP or a web form). In the first case, the registrant can expect automation to be kept active for the delegation to facilitate later DS bootstrapping. In the second case, it is likely that the registrant intends to disable DNSSEC for the domain, and DS automation is best suspended (until a new DS record is provisioned somehow).</t>
          <t>One may ask how a registry can know whether a removal request received via EPP was the result of the registrar observing a CDS/CDNSKEY "delete" signal. It turns out that the registry does not need to know that; in fact, the advice works out nicely regardless of who does the automation:</t>
          <ol spacing="normal" type="a"><li>
              <t>Only registry: If the registry performs automation, then the registry will consider any request received from the registrar as out-of-band (in the context of this automation). When such requests demand removal of the entire DS record set, the registry therefore should suspend automation.</t>
            </li>
            <li>
              <t>Only registrar: The registrar can always distinguish between removal requests obtained from a CDS/CDNSKEY "delete" signal and other registrant requests, and suspend automation as appropriate.</t>
            </li>
            <li>
              <t>In the (undesirable) case that both parties automate, there are two cases:  </t>
              <ul spacing="normal">
                <li>
                  <t>If the registrant submits a manual removal request to the registrar, it is out-of-band from the registrar perspective (e.g., web form), and also for the registry (e.g., EPP). As a consequence, both will suspend automation (which is the correct result).</t>
                </li>
                <li>
                  <t>If a CDS/CDNSKEY "delete" signal causes the registrar to request DS removal from the registry, then the registry will suspend automation (because the removal request is received out-of-band, such as via EPP). This is independent of whether the registry's automation has already seen the signal. The registrar, however, will be aware of the in-band nature of the request and not suspend automation (which is also the correct result).</t>
                </li>
              </ul>
              <t>
As a side effect, this works towards avoiding redundant automation at the registry.</t>
            </li>
          </ol>
          <t>All in all:</t>
          <ul spacing="normal">
            <li>
              <t>It is advisable to generally not suspend in-band DS automation when an out-of-band DS update has occurred.</t>
            </li>
            <li>
              <t>An exception to this rule is when the entire DS record set was removed through an out-of-band request, in which case the registrant likely wants to disable DNSSEC for the domain. DS automation should then be suspended so that automatic re-initialization (bootstrapping) does not occur.</t>
            </li>
            <li>
              <t>In all other cases, any properly authenticated DS updates received, including through an automated method, are to be considered as the current intent of the domain holder.</t>
            </li>
          </ul>
        </section>
        <section anchor="concurrent-automatic-updates">
          <name>Concurrent Automatic Updates</name>
          <t>When the RRR model is used, there is a potential for collision if both the registry and the registrar are automating DS provisioning by scanning the child for CDS/CDNSKEY records. No disruptive consequences are expected if both parties perform DS automation. An exception is when during a key rollover, registry and registrar see different versions of the Child's DS update requests, such as when CDS/CDNSKEY records are retrieved from different vantage points. Although unlikely due to Recommendation 1a of <xref target="acceptance"/>, this may lead to flapping of DS updates. However, it is not expected to be harmful as either DS RRset will allow for the validation function to continue to work, as ensured by Recommendation 1b of <xref target="acceptance"/>. The effect subsides as the Child's state eventually becomes consistent (roughly, within the child's replication delay); any flapping until then will be a minor nuisance only.</t>
          <t>The issue disappears entirely when scanning is replaced by notifications that trigger DS maintenance through one party's designated endpoint <xref target="RFC9859"/>, and can otherwise be mitigated if the registry and registrar agree that only one of them will perform scanning.</t>
          <t>As a standard aspect of key rollovers <xref target="RFC6781"/>, the Child DNS operator is expected to monitor propagation of Child zone updates to all authoritative nameserver instances, and only proceed to the next step once replication has succeeded everywhere and the DS record set was subsequently updated (and in no case before the DS RRset's TTL has passed). Any breakage resulting from improper timing on the Child side is outside of the Parent's sphere of influence, and thus cannot be handled with only parent-side changes.</t>
        </section>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>The document provides operational recommendations for DNSSEC DS automation. There are no additional operational considerations beyond those listed in <xref target="recommendations_overview"/>.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The recommendations in this document are designed to improve the safety and interoperability of DNSSEC delegation maintenance. Relevant security implications and various trade-offs are explained in the analysis subsections above. This section notes additional aspects worth considering.</t>
      <t>When inconsistencies between CDS/CDNSKEY RRsets are ignored (contrary to <xref target="acceptance-rec1a" format="none">Recommendation 4.1.1.a</xref>), a number of security risks result. For example, when a nameserver domain expires and is re-registered maliciously, the adversary may be able to initialize a DS RRset and subsequently redelegate the domain using CSYNC synchronization <xref target="RFC7477"/>, resulting in a full hijack of the domain. For details, refer to <xref section="A" sectionFormat="of" target="I-D.ietf-dnsop-cds-consistency"/>.</t>
      <t>Similar risks of total adversarial control exist when the child's SEP key is compromised, as this key can authorize DS update or removal requests if consistently published on all nameservers. This reinforces that loss of key control poses severe risks; utmost care must be taken when managing SEP keys.</t>
      <t>When a domain is stripped of its DNSSEC protection by removing the DS RRset — either manually or using an automatic delete signal (<xref target="multiple-rec3" format="none">Recommendation 7.1.3</xref>) —, DNSSEC security guarantees and associated benefits are no longer in effect. For example, an email operator may enforce DANE <xref target="RFC7672"/> for domains previously observed to support it, and as a result experience a service disruption in email delivery. Both child and parent DNS operators MUST take such service disruptions into account when considering removal of the DS RRset for their zone.</t>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank the members of ICANN's Security and Stability Advisory Committee (SSAC) who wrote the <xref target="SAC126"/> report on which this document is based.</t>
      <t>Additional thanks are extended to the following individuals (in the order of their first contribution or review): Barbara Jantzen, Matt Pounsett, Matthijs Mekking, Ondřej Caletka, Oli Schacher, Kim Davies, Jim Reid, Q Misell, Scott Hollenbeck, Tamás Csillag, Philip Homburg, Shumon Huque (Document Shepherd), Libor Peltan, Josh Simpson, Johan Stenstam, Stefan Ubbink, Viktor Dukhovni, Hugo Salgado, Wes Hardaker, Mohamed Boucadair (responsible Area Director), Meir Goldman, Thomas Fossati, Peter van Dijk, Jiankang Yao, Donald Eastlake, James Gannon, Roman Danyliw, Andy Newton, Éric Vyncke, Mike Bishop, Mahesh Jethanandani, Deb Cooley, Charles Eckel, Christopher Inacio, Ketan Talaulikar</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="DNSKEY-IANA" target="https://www.iana.org/assignments/dns-sec-alg-numbers/dns-sec-alg-numbers.xml#dns-sec-alg-numbers-1">
          <front>
            <title>DNS Security Algorithm Numbers</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="DS-IANA" target="https://www.iana.org/assignments/ds-rr-types">
          <front>
            <title>DNSSEC Delegation Signer (DS) Resource Record (RR) Type Digest Algorithms</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC7344">
          <front>
            <title>Automating DNSSEC Delegation Trust Maintenance</title>
            <author fullname="W. Kumari" initials="W." surname="Kumari"/>
            <author fullname="O. Gudmundsson" initials="O." surname="Gudmundsson"/>
            <author fullname="G. Barwood" initials="G." surname="Barwood"/>
            <date month="September" year="2014"/>
            <abstract>
              <t>This document describes a method to allow DNS Operators to more easily update DNSSEC Key Signing Keys using the DNS as a communication channel. The technique described is aimed at delegations in which it is currently hard to move information from the Child to Parent.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7344"/>
          <seriesInfo name="DOI" value="10.17487/RFC7344"/>
        </reference>
        <reference anchor="RFC8078">
          <front>
            <title>Managing DS Records from the Parent via CDS/CDNSKEY</title>
            <author fullname="O. Gudmundsson" initials="O." surname="Gudmundsson"/>
            <author fullname="P. Wouters" initials="P." surname="Wouters"/>
            <date month="March" year="2017"/>
            <abstract>
              <t>RFC 7344 specifies how DNS trust can be maintained across key rollovers in-band between parent and child. This document elevates RFC 7344 from Informational to Standards Track. It also adds a method for initial trust setup and removal of a secure entry point.</t>
              <t>Changing a domain's DNSSEC status can be a complicated matter involving multiple unrelated parties. Some of these parties, such as the DNS operator, might not even be known by all the organizations involved. The inability to disable DNSSEC via in-band signaling is seen as a problem or liability that prevents some DNSSEC adoption at a large scale. This document adds a method for in-band signaling of these DNSSEC status changes.</t>
              <t>This document describes reasonable policies to ease deployment of the initial acceptance of new secure entry points (DS records).</t>
              <t>It is preferable that operators collaborate on the transfer or move of a domain. The best method is to perform a Key Signing Key (KSK) plus Zone Signing Key (ZSK) rollover. If that is not possible, the method using an unsigned intermediate state described in this document can be used to move the domain between two parties. This leaves the domain temporarily unsigned and vulnerable to DNS spoofing, but that is preferred over the alternative of validation failures due to a mismatched DS and DNSKEY record.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8078"/>
          <seriesInfo name="DOI" value="10.17487/RFC8078"/>
        </reference>
        <reference anchor="RFC9615">
          <front>
            <title>Automatic DNSSEC Bootstrapping Using Authenticated Signals from the Zone's Operator</title>
            <author fullname="P. Thomassen" initials="P." surname="Thomassen"/>
            <author fullname="N. Wisiol" initials="N." surname="Wisiol"/>
            <date month="July" year="2024"/>
            <abstract>
              <t>This document introduces an in-band method for DNS operators to publish arbitrary information about the zones for which they are authoritative, in an authenticated fashion and on a per-zone basis. The mechanism allows managed DNS operators to securely announce DNSSEC key parameters for zones under their management, including for zones that are not currently securely delegated.</t>
              <t>Whenever DS records are absent for a zone's delegation, this signal enables the parent's registry or registrar to cryptographically validate the CDS/CDNSKEY records found at the child's apex. The parent can then provision DS records for the delegation without resorting to out-of-band validation or weaker types of cross-checks such as "Accept after Delay".</t>
              <t>This document establishes the DS enrollment method described in Section 4 of this document as the preferred method over those from Section 3 of RFC 8078. It also updates RFC 7344.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9615"/>
          <seriesInfo name="DOI" value="10.17487/RFC9615"/>
        </reference>
        <reference anchor="RFC9364">
          <front>
            <title>DNS Security Extensions (DNSSEC)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>This document describes the DNS Security Extensions (commonly called "DNSSEC") that are specified in RFCs 4033, 4034, and 4035, as well as a handful of others. One purpose is to introduce all of the RFCs in one place so that the reader can understand the many aspects of DNSSEC. This document does not update any of those RFCs. A second purpose is to state that using DNSSEC for origin authentication of DNS data is the best current practice. A third purpose is to provide a single reference for other documents that want to refer to DNSSEC.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="237"/>
          <seriesInfo name="RFC" value="9364"/>
          <seriesInfo name="DOI" value="10.17487/RFC9364"/>
        </reference>
        <reference anchor="RFC9859">
          <front>
            <title>Generalized DNS Notifications</title>
            <author fullname="J. Stenstam" initials="J." surname="Stenstam"/>
            <author fullname="P. Thomassen" initials="P." surname="Thomassen"/>
            <author fullname="J. Levine" initials="J." surname="Levine"/>
            <date month="September" year="2025"/>
            <abstract>
              <t>This document generalizes and extends the use of DNS NOTIFY (RFC 1996) beyond conventional zone transfer hints to allow other types of actions that were previously lacking a trigger mechanism to be triggered via the DNS. Notifications merely nudge the receiver to initiate a predefined action promptly (instead of on a schedule); they do not alter the action itself (including any security checks it might employ).</t>
              <t>To enable this functionality, a method for discovering the receiver endpoint for such notification messages is introduced, via the new DSYNC record type. Notification types are recorded in a new registry, with initial support for parental NS and DS record updates including DNSSEC bootstrapping.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9859"/>
          <seriesInfo name="DOI" value="10.17487/RFC9859"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC9499">
          <front>
            <title>DNS Terminology</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
              <t>This document updates RFC 2308 by clarifying the definitions of "forwarder" and "QNAME". It obsoletes RFC 8499 by adding multiple terms and clarifications. Comprehensive lists of changed and new definitions can be found in Appendices A and B.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="219"/>
          <seriesInfo name="RFC" value="9499"/>
          <seriesInfo name="DOI" value="10.17487/RFC9499"/>
        </reference>
        <reference anchor="I-D.ietf-dnsop-cds-consistency">
          <front>
            <title>Clarifications on CDS/CDNSKEY and CSYNC Consistency</title>
            <author fullname="Peter Thomassen" initials="P." surname="Thomassen">
              <organization>SSE - Secure Systems Engineering GmbH</organization>
            </author>
            <date day="11" month="December" year="2025"/>
            <abstract>
              <t>   Maintenance of DNS delegations requires occasional changes of the DS
   and NS record sets on the parent side of the delegation.  For the
   case of DS records, "Automating DNSSEC Delegation Trust Maintenance"
   (RFC 7344) provides automation by allowing the child to publish CDS
   and/or CDNSKEY records holding the prospective DS parameters which
   the parent can ingest.  Similarly, "Child-to-Parent Synchronization
   in DNS" (RFC 7477) specifies CSYNC records to indicate a desired
   update of the delegation's NS (and glue) records.  Parent-side
   entities (e.g., Registries and Registrars) can query these records
   from the child and, after validation, use them to update the parent-
   side Resource Record Sets (RRsets) of the delegation.

   This document specifies under which conditions the target states
   expressed via CDS/CDNSKEY and CSYNC records are considered
   "consistent".  Parent-side entities accepting such records from the
   child have to ensure that update requests retrieved from different
   authoritative nameservers satisfy these consistency requirements
   before taking any action based on them.

   This document updates RFC 7344 and RFC 7477.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dnsop-cds-consistency-11"/>
        </reference>
        <reference anchor="RFC9567">
          <front>
            <title>DNS Error Reporting</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <date month="April" year="2024"/>
            <abstract>
              <t>DNS error reporting is a lightweight reporting mechanism that provides the operator of an authoritative server with reports on DNS resource records that fail to resolve or validate. A domain owner or DNS hosting organization can use these reports to improve domain hosting. The reports are based on extended DNS errors as described in RFC 8914.</t>
              <t>When a domain name fails to resolve or validate due to a misconfiguration or an attack, the operator of the authoritative server may be unaware of this. To mitigate this lack of feedback, this document describes a method for a validating resolver to automatically signal an error to a monitoring agent specified by the authoritative server. The error is encoded in the QNAME; thus, the very act of sending the query is to report the error.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9567"/>
          <seriesInfo name="DOI" value="10.17487/RFC9567"/>
        </reference>
        <reference anchor="RFC8590">
          <front>
            <title>Change Poll Extension for the Extensible Provisioning Protocol (EPP)</title>
            <author fullname="J. Gould" initials="J." surname="Gould"/>
            <author fullname="K. Feher" initials="K." surname="Feher"/>
            <date month="May" year="2019"/>
            <abstract>
              <t>This document describes an Extensible Provisioning Protocol (EPP) extension for notifying clients of operations on client-sponsored objects that were not initiated by the client through EPP. These operations may include contractual or policy requirements including, but not limited to, regular batch processes, customer support actions, Uniform Domain-Name Dispute-Resolution Policy (UDRP) or Uniform Rapid Suspension (URS) actions, court-directed actions, and bulk updates based on customer requests. Since the client is not directly involved or knowledgable of these operations, the extension is used along with an EPP object mapping to provide the resulting state of the postoperation object, and optionally a preoperation object, with the operation metadata of what, when, who, and why.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8590"/>
          <seriesInfo name="DOI" value="10.17487/RFC8590"/>
        </reference>
        <reference anchor="RFC1035">
          <front>
            <title>Domain names - implementation and specification</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1035"/>
          <seriesInfo name="DOI" value="10.17487/RFC1035"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="LowTTL" target="https://indico.dns-oarc.net/event/47/contributions/1010/attachments/958/1811/DS%20and%20DNSKEY%20TTL%20experiment.pdf">
          <front>
            <title>DS and DNSKEY low TTL experiments</title>
            <author initials="P." surname="Špaček" fullname="Petr Špaček">
              <organization>ISC</organization>
            </author>
            <date year="2023" month="September" day="06"/>
          </front>
          <seriesInfo name="at" value="DNS OARC 41"/>
        </reference>
        <reference anchor="SAC126" target="https://itp.cdn.icann.org/en/files/security-and-stability-advisory-committee-ssac-reports/sac-126-16-08-2024-en.pdf">
          <front>
            <title>SAC126: DNSSEC Delegation Signer (DS) Record Automation</title>
            <author>
              <organization>ICANN Security and Stability Advisory Committee (SSAC)</organization>
            </author>
            <date year="2024" month="August" day="12"/>
          </front>
        </reference>
        <reference anchor="RFC6840">
          <front>
            <title>Clarifications and Implementation Notes for DNS Security (DNSSEC)</title>
            <author fullname="S. Weiler" initials="S." role="editor" surname="Weiler"/>
            <author fullname="D. Blacka" initials="D." role="editor" surname="Blacka"/>
            <date month="February" year="2013"/>
            <abstract>
              <t>This document is a collection of technical clarifications to the DNS Security (DNSSEC) document set. It is meant to serve as a resource to implementors as well as a collection of DNSSEC errata that existed at the time of writing.</t>
              <t>This document updates the core DNSSEC documents (RFC 4033, RFC 4034, and RFC 4035) as well as the NSEC3 specification (RFC 5155). It also defines NSEC3 and SHA-2 (RFC 4509 and RFC 5702) as core parts of the DNSSEC specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6840"/>
          <seriesInfo name="DOI" value="10.17487/RFC6840"/>
        </reference>
        <reference anchor="RFC6781">
          <front>
            <title>DNSSEC Operational Practices, Version 2</title>
            <author fullname="O. Kolkman" initials="O." surname="Kolkman"/>
            <author fullname="W. Mekking" initials="W." surname="Mekking"/>
            <author fullname="R. Gieben" initials="R." surname="Gieben"/>
            <date month="December" year="2012"/>
            <abstract>
              <t>This document describes a set of practices for operating the DNS with security extensions (DNSSEC). The target audience is zone administrators deploying DNSSEC.</t>
              <t>The document discusses operational aspects of using keys and signatures in the DNS. It discusses issues of key generation, key storage, signature generation, key rollover, and related policies.</t>
              <t>This document obsoletes RFC 4641, as it covers more operational ground and gives more up-to-date requirements with respect to key sizes and the DNSSEC operations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6781"/>
          <seriesInfo name="DOI" value="10.17487/RFC6781"/>
        </reference>
        <reference anchor="RFC5730">
          <front>
            <title>Extensible Provisioning Protocol (EPP)</title>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
            <date month="August" year="2009"/>
            <abstract>
              <t>This document describes an application-layer client-server protocol for the provisioning and management of objects stored in a shared central repository. Specified in XML, the protocol defines generic object management operations and an extensible framework that maps protocol operations to objects. This document includes a protocol specification, an object mapping template, and an XML media type registration. This document obsoletes RFC 4930. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="69"/>
          <seriesInfo name="RFC" value="5730"/>
          <seriesInfo name="DOI" value="10.17487/RFC5730"/>
        </reference>
        <reference anchor="RFC9803">
          <front>
            <title>Extensible Provisioning Protocol (EPP) Mapping for DNS Time-to-Live (TTL) Values</title>
            <author fullname="G. Brown" initials="G." surname="Brown"/>
            <date month="June" year="2025"/>
            <abstract>
              <t>This document describes an extension to the Extensible Provisioning
Protocol (EPP) that allows EPP clients to manage the Time-to-Live
(TTL) value for domain name delegation records.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9803"/>
          <seriesInfo name="DOI" value="10.17487/RFC9803"/>
        </reference>
        <reference anchor="I-D.ietf-regext-rdap-ttl-extension">
          <front>
            <title>RDAP Extension for DNS Time-To-Live (TTL Values)</title>
            <author fullname="Gavin Brown" initials="G." surname="Brown">
              <organization>ICANN</organization>
            </author>
            <date day="21" month="May" year="2026"/>
            <abstract>
              <t>   This document specifies an extension to the Registration Data Access
   Protocol which allows the Time-To-Live (TTL) values for relevant DNS
   record types to be included in RDAP responses.

About this draft

   This note is to be removed before publishing as an RFC.

   The source for this draft, and an issue tracker, may can be found at
   https://github.com/gbxyz/rdap-ttl-extension.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-regext-rdap-ttl-extension-11"/>
        </reference>
        <reference anchor="RFC5731">
          <front>
            <title>Extensible Provisioning Protocol (EPP) Domain Name Mapping</title>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
            <date month="August" year="2009"/>
            <abstract>
              <t>This document describes an Extensible Provisioning Protocol (EPP) mapping for the provisioning and management of Internet domain names stored in a shared central repository. Specified in XML, the mapping defines EPP command syntax and semantics as applied to domain names. This document obsoletes RFC 4931. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="69"/>
          <seriesInfo name="RFC" value="5731"/>
          <seriesInfo name="DOI" value="10.17487/RFC5731"/>
        </reference>
        <reference anchor="RFC7477">
          <front>
            <title>Child-to-Parent Synchronization in DNS</title>
            <author fullname="W. Hardaker" initials="W." surname="Hardaker"/>
            <date month="March" year="2015"/>
            <abstract>
              <t>This document specifies how a child zone in the DNS can publish a record to indicate to a parental agent that the parental agent may copy and process certain records from the child zone. The existence of the record and any change in its value can be monitored by a parental agent and acted on depending on local policy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7477"/>
          <seriesInfo name="DOI" value="10.17487/RFC7477"/>
        </reference>
        <reference anchor="RFC7672">
          <front>
            <title>SMTP Security via Opportunistic DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS)</title>
            <author fullname="V. Dukhovni" initials="V." surname="Dukhovni"/>
            <author fullname="W. Hardaker" initials="W." surname="Hardaker"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>This memo describes a downgrade-resistant protocol for SMTP transport security between Message Transfer Agents (MTAs), based on the DNS-Based Authentication of Named Entities (DANE) TLSA DNS record. Adoption of this protocol enables an incremental transition of the Internet email backbone to one using encrypted and authenticated Transport Layer Security (TLS).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7672"/>
          <seriesInfo name="DOI" value="10.17487/RFC7672"/>
        </reference>
      </references>
    </references>
    <?line 435?>

<section anchor="recommendations_overview">
      <name>Recommendations Overview</name>
      <t>For ease of review and referencing, the recommendations from this document are reproduced here without further comment. For background and analysis, refer to Sections <xref format="counter" target="acceptance"/>–<xref format="counter" target="multiple"/>.</t>
      <section anchor="acceptance-checks-and-safety-measures">
        <name>Acceptance Checks and Safety Measures</name>
        <ol spacing="normal" type="1"><li>
            <t>Entities performing automated DS maintenance MUST verify:  </t>
            <ol spacing="normal" type="a"><li>
                <t>the unambiguous intent of each DS bootstrapping or update request as per <xref target="I-D.ietf-dnsop-cds-consistency"/>, by checking its consistency both      </t>
                <ul spacing="normal">
                  <li>
                    <t>between any published CDS and CDNSKEY records, and</t>
                  </li>
                  <li>
                    <t>across all authoritative nameservers in the delegation,</t>
                  </li>
                </ul>
                <t>
and</t>
              </li>
              <li>
                <t>that the resulting DS record set would allow continued DNSSEC validation if deployed,</t>
              </li>
            </ol>
            <t>
and cancel the update if the verifications do not succeed.</t>
          </li>
          <li>
            <t>Parent-side entities (such as registries) SHOULD reduce a DS record set's TTL to a value between 5–15 minutes when a new set of records is published, and restore the previous (or, if unavailable, default) TTL value at a later occasion (but not before the previous DS RRset's TTL has expired).</t>
          </li>
          <li>
            <t>DNS operators MUST publish both CDNSKEY and CDS records (unless the parent's preference is known), and follow best practice for the choice of hash digest type <xref target="DS-IANA"/>.</t>
          </li>
        </ol>
      </section>
      <section anchor="reporting-and-transparency">
        <name>Reporting and Transparency</name>
        <ol spacing="normal" type="1"><li>
            <t>For certain DS updates (see <xref target="analysis_reporting">analysis</xref>) and for DS deactivation, relevant points of contact known to the parent-side entity (registry or registrar) SHOULD be notified.</t>
          </li>
          <li>
            <t>For error conditions, the child DNS operator and the domain's technical contact (if applicable) SHOULD be notified first. The registrant SHOULD NOT be notified unless the problem persists for a prolonged amount of time (e.g., three days).</t>
          </li>
          <li>
            <t>Child DNS operators SHOULD be notified of errors using a report query <xref target="RFC9567"/> to the agent domain as described in <xref section="4" sectionFormat="of" target="RFC9859"/>. Notifications to humans (domain holder) will be performed in accordance with the communication preferences established with the parent-side entity. The same condition SHOULD NOT be reported unnecessarily frequently to the same recipient.</t>
          </li>
          <li>
            <t>In the RRR model, registries performing DS automation SHOULD inform the registrar of any DS record changes via the EPP Change Poll Extension <xref target="RFC8590"/> or a similar channel.</t>
          </li>
          <li>
            <t>The currently active DS configuration SHOULD be made accessible to the registrant (or their designated party) through the customer portal available for domain management. The DS update history MAY be made available in the same way.</t>
          </li>
        </ol>
      </section>
      <section anchor="registration-locks">
        <name>Registration Locks</name>
        <ol spacing="normal" type="1"><li>
            <t>To secure ongoing operations, automated DS maintenance MUST NOT be suspended based on a registrar update lock alone (such as EPP status clientUpdateProhibited <xref target="RFC5731"/>).</t>
          </li>
          <li>
            <t>When performed by the registry, automated DS maintenance MUST NOT be suspended based on a registry update lock alone (such as EPP status serverUpdateProhibited <xref target="RFC5731"/>).</t>
          </li>
        </ol>
      </section>
      <section anchor="multiple-submitting-parties-and-suspension-of-automation">
        <name>Multiple Submitting Parties and Suspension of Automation</name>
        <ol spacing="normal" type="1"><li>
            <t>Registries and registrars MUST provide another (e.g., manual) channel for DS maintenance in order to enable recovery when the Child has lost access to its signing key(s). This out-of-band channel is also needed when a DNS operator does not support DS automation or refuses to cooperate.</t>
          </li>
          <li>
            <t>DS bootstrapping and update requests MUST be executed at the next publication opportunity after verification of their authenticity, regardless of whether they are received in-band or via an out-of-band channel.</t>
          </li>
          <li>
            <t>When processing a CDS/CDNSKEY "delete" signal to remove the entire DS record set (<xref section="4" sectionFormat="comma" target="RFC8078"/>), DS automation MUST NOT be suspended. For all other removal requests (such as when received via EPP or a web form), DS automation SHOULD be suspended until a new DS record set has been provisioned, in order to prevent accidental re-initialization when the registrant intended to disable DNSSEC.</t>
          </li>
          <li>
            <t>Whenever a non-empty DS record set is provisioned, through whichever channel, DS automation SHOULD NOT (or no longer) be suspended (including after an earlier removal).</t>
          </li>
          <li>
            <t>In the RRR model, a registry MUST NOT automatically initialize DS records when it is known that the registrar does not provide a way for the domain holder to later disable DNSSEC. If the registrar has declared that it performs automated DS maintenance, the registry SHOULD publish the registrar's <xref target="RFC9859"/> notification endpoint (if applicable) and refrain from registry-side DS automation.</t>
          </li>
        </ol>
      </section>
    </section>
    <section anchor="change-history-to-be-removed-before-publication">
      <name>Change History (to be removed before publication)</name>
      <ul spacing="normal">
        <li>
          <t>draft-ietf-dnsop-ds-automation-09</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Add substance to Security Considerations based on IESG review</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Editorial changes and three more MUSTs from IESG review</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>draft-ietf-dnsop-ds-automation-08</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Elevate some defining features of DS automation from SHOULD to MUST</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>draft-ietf-dnsop-ds-automation-07</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Editorial changes from proofreading</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Editorial changes (Telechat review, James Gannon)</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Editorial changes (IETF LC, Donald Eastlake)</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>draft-ietf-dnsop-ds-automation-06</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Add historic background (IETF LC, Jiankang Yao)</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Editorial changes (IETF LC, Peter van Dijk)</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Point out importance of retaining decision details for troubleshooting
  (IETF LC, Meir Goldman)</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Editorial changes (IETF LC, Thomas Fossati)</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>draft-ietf-dnsop-ds-automation-05</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Editorial changes from AD Review</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>draft-ietf-dnsop-ds-automation-04</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Editorial changes</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>draft-ietf-dnsop-ds-automation-03</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Editorial changes</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>draft-ietf-dnsop-ds-automation-02</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Add Appendix with recommendations overview</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Editorial changes</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Change type to BCP</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Fold CDS/CDNSKEY consistency requirements (Section 6) into Section 2 (on acceptance checks)</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Clarify continuity of validation</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>In RRR, clarify that registries should not bootstrap if registrar has no deactivation interface (or if registrar does the automation)</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Remove Appendix C ("Approaches not pursued")</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>draft-ietf-dnsop-ds-automation-01</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Remove Recommendation 6.1.2 which had told parents to require publication of both CDS and CDNSKEY</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Clarify Recommendation 5.1.3 (on suspension of automation after DS RRset removal) and provide extra analysis</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Providing access to DS update history is now optional</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Humans (domains holders) should be notified according to preferences established with registry/registrar (not necessarily via email)</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Remove redundant Recommendation 5.1.5 (same as 3.1.4)</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Editorial changes</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>draft-ietf-dnsop-ds-automation-00</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Rename after adoption</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>draft-shetho-dnsop-ds-automation-02</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Allow DS automation during registry update lock</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Editorial changes</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>draft-shetho-dnsop-ds-automation-01</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Incorporated various review feedback (editorial + adding TODOs)</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>draft-shetho-dnsop-ds-automation-00</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Initial public draft.</t>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
