<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-dnsop-ds-automation-04" category="bcp" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="DS Automation">Operational Recommendations for DS Automation</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-dnsop-ds-automation-04"/>
    <author initials="S." surname="Sheng" fullname="Steve Sheng">
      <organization/>
      <address>
        <email>steve.sheng@gmail.com</email>
      </address>
    </author>
    <author initials="P." surname="Thomassen" fullname="Peter Thomassen">
      <organization>deSEC</organization>
      <address>
        <email>peter@desec.io</email>
      </address>
    </author>
    <date/>
    <area>Internet</area>
    <workgroup>DNSOP Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 60?>

<t>Enabling support for automatic acceptance of DS parameters from the Child DNS operator (via RFCs 7344, 8078, 9615) requires the parental agent, often a registry or registrar, to make a number of technical decisions around acceptance checks, error and sucess reporting, and multi-party issues such as concurrent updates. This document describes how these points are best addressed in practice.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Domain Name System Operations Working Group mailing list (dnsop@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/dnsop/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/peterthomassen/draft-shetho-dnsop-ds-automation"/>.</t>
    </note>
  </front>
  <middle>
    <?line 64?>

<section anchor="introduction">
      <name>Introduction</name>
      <t><xref target="RFC7344"/>, <xref target="RFC8078"/>, <xref target="RFC9615"/> automate DNSSEC delegation trust maintenance by having the child publish CDS and/or CDNSKEY records which indicate the delegation's desired DNSSEC parameters ("DS automation").</t>
      <t>Parental Agents using these protocols have to make a number of technical decisions relating to issues of acceptance checks, timing, error reporting, locks, etc. Additionally, when using the RRR model (as is common amongst top-level domains), both the registrar and the registry can effect parent-side changes to the delegation. In such a situation, additional opportunities for implementation differences arise.</t>
      <t>Not all existing DS automation deployments have made the same choices with respect to these questions, leading to somewhat inconsistent behavior. From the perspective of a domain holder with domain names under various TLDs, this may be unexpected and confusing.</t>
      <t>New deployments of DS automation therefore SHOULD follow the recommendations set out in this document, both to achieve a more uniform treatment across suffixes — minimizing user surprise — and to prevent disruption of DNS and DNSSEC functionality. The recommendations are intended to provide baseline safety and uniformity of behavior across parents. Registries with additional requirements on DS update checks MAY implement any additional checks in line with local policy.</t>
      <t>In the following sections, operational questions are first raised and answered with the corresponding recommendations. Each section is concluded with an analysis of its recommendations, and related considerations. A combined view of the recommendations from all sections is given in <xref target="recommendations_overview"/>.</t>
      <t>Readers are expected to be familiar with DNSSEC <xref target="RFC9364"/><xref target="RFC9615"/><xref target="RFC9859"/>. For terminology, see <xref target="terminology"/>.</t>
      <section anchor="requirements-notation">
        <name>Requirements Notation</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
        </t>
      </section>
    </section>
    <section anchor="acceptance">
      <name>Acceptance Checks and Safety Measures</name>
      <t>This section provides recommendations to address the following questions:</t>
      <ul spacing="normal">
        <li>
          <t>What kind of acceptance checks should be performed on DS parameters?</t>
        </li>
        <li>
          <t>Should these checks be performed upon acceptance, or also continually when in place?</t>
        </li>
        <li>
          <t>How do TTLs and caching impact DS provisioning? How important is timing in a child key change?</t>
        </li>
        <li>
          <t>Are parameters for DS automation best conveyed as CDNSKEY or CDS records, or both?</t>
        </li>
      </ul>
      <section anchor="recommendations">
        <name>Recommendations</name>
        <ol spacing="normal" type="1"><li>
            <t>Entities performing automated DS maintenance SHOULD verify  </t>
            <ol spacing="normal" type="a"><li>
                <t>the unambigious intent of each DS update request as per <xref target="I-D.ietf-dnsop-cds-consistency"/>, by checking its consistency both      </t>
                <ul spacing="normal">
                  <li>
                    <t>between any published CDS and CDNSKEY records, and</t>
                  </li>
                  <li>
                    <t>across all authoritative nameservers in the delegation,</t>
                  </li>
                </ul>
                <t>
and</t>
              </li>
              <li>
                <t>that the resulting DS record set would allow continued DNSSEC validation if deployed,</t>
              </li>
            </ol>
            <t>
and cancel the update if the verifications do not succeed.</t>
          </li>
          <li>
            <t>Parent-side entities (such as registries) SHOULD reduce a DS record set's TTL to a value between 5–15 minutes when the set of records is changed, and restore the normal TTL value at a later occasion (but not before the previous DS RRset's TTL has expired).</t>
          </li>
          <li>
            <t>DNS operators SHOULD publish both CDNSKEY records as well as CDS records, and follow best practice for the choice of hash digest type <xref target="DS-IANA"/>.</t>
          </li>
        </ol>
      </section>
      <section anchor="analysis_acceptance">
        <name>Analysis</name>
        <section anchor="continuity-of-resolution">
          <name>Continuity of Resolution</name>
          <t>To maintain the basic resolution function, it is important to avoid the deployment of flawed DS record sets in the parent zone. It is therefore desirable for the Parent to verify that the DS record set resulting from an automated (or even manual) update does not break DNSSEC validation if deployed, and otherwise cancel the update.</t>
          <t>This is best done by</t>
          <ol spacing="normal" type="1"><li>
              <t>verifying that consistent CDS/CDNSKEY responses are served by all of the delegation's nameservers <xref target="I-D.ietf-dnsop-cds-consistency"/>;</t>
            </li>
            <li>
              <t>verifying that the resulting DS RRset does not break the delegation if applied (<xref section="4.1" sectionFormat="comma" target="RFC7344"/>), i.e., that it provides at least one valid path for validators to use (<xref section="5.11" sectionFormat="comma" target="RFC6840"/>). This is the case if the child's DNSKEY RRset has a valid RRSIG signature from a key that is referenced by at least one DS record, with the digest type and signing algorithm values designated as "RECOMMENDED" or "MUST" in the "Use for DNSSEC Validation" columns of the relevant IANA registries (<xref target="DS-IANA"/> and <xref target="DNSKEY-IANA"/>). (These checks need not be enforced when provisioning DS records manually in order to enable the use other digest types or algorithms for potentially non-interoperable purposes.)</t>
            </li>
          </ol>
          <t>Even without an update being requested, Parents MAY occasionally check whether the current DS contents would still be acceptable if they were newly submitted in CDS/CDNSKEY form (see <xref target="acceptance"/>).
Any failures — such as a missing DNSKEY due to improper rollover timing (<xref section="4.1" sectionFormat="comma" target="RFC6781"/>), or changed algorithm requirements — MAY be communicated in line with <xref target="reporting"/>.
The existing DS record set MUST NOT be altered or removed as a result of such checks.</t>
        </section>
        <section anchor="ttls-and-caching">
          <name>TTLs and Caching</name>
          <t>To further reduce the impact of any misconfigured DS record set — be it from automated or from manual provisioning — the option to quickly roll back the delegation's DNSSEC parameters is of great importance. This is achieved by setting a comparatively low TTL on the DS record set in the parent domain, at the cost of reduced resiliency against nameserver unreachability due to the earlier expiration of cached records. The availability risk can be mitigated by limiting such TTLs to a brief time period after a change to the DS configuration, during which rollbacks are most likely to occur.</t>
          <t>Registries therefore should significantly lower the DS RRset's TTL for some time following an update. Pragmatic values for the reduced TTL value range between 5–15 minutes.  Such low TTLs might be expected to cause increased load on the corresponding authoritative nameservers; however, recent research has demonstrated them to have negligible impact on the overall load of a registry's authoritative nameserver infrastructure <xref target="LowTTL"/>.</t>
          <t>The reduction should be in effect at least for a couple of days and until the previous DS record set has expired from caches, that is, the period during which the low-TTL is applied typically will significantly exceed the normal TTL value. When using EPP, the server MAY advertise its TTL policy via the domain <tt>&lt;info&gt;</tt> command described in <xref section="2.1.1.2" sectionFormat="comma" target="RFC9803"/>.</t>
          <t>While this approach enables quick rollbacks, timing of the desired DS update process itself is largely governed by the previous DS RRset's TTL, and therefore does not generally benefit from an overall speed-up. Note also that nothing is gained from first lowering the TTL of the old DS RRset: such an additional step would, in fact, require another wait period while resolver caches adjust. For the sake of completeless, there likewise is no point to increasing any DS TTL values beyond their normal value.</t>
        </section>
        <section anchor="cds-vs-cdnskey">
          <name>CDS vs. CDNSKEY</name>
          <t>DS records can be generated from information provided either in DS format (CDS) or in DNSKEY format (CDNSKEY). While the format of CDS records is identical to that of DS records (so the record data be taken verbatim), generation of a DS record from CDNSKEY information involves computing a hash.</t>
          <t>Whether a Parent processes CDS or CDNSKEY records depends on their preference:</t>
          <ul spacing="normal">
            <li>
              <t>Processing (and storing) CDNSKEY information allows the Parent to control the choice of hash algorithms. The Parent may then unilaterally regenerate DS records with a different choice of hash algorithm(s) whenever deemed appropriate.</t>
            </li>
            <li>
              <t>Processing CDS information allows the Child DNS operator to control the hash digest type used in DS records, enabling the Child DNS operator to deploy (for example) experimental hash digests and removing the need for registry-side changes when additional digest types become available.</t>
            </li>
          </ul>
          <t>The need to make a choice in the face of this dichotomy is not specific to DS automation: even when DNSSEC parameters are relayed to the Parent through conventional channels, the Parent has to make some choice about which format(s) to accept.</t>
          <t>As there exists no protocol for Child DNS Operators to discover a Parent's input format preference, it seems best for interoperability to publish both CDNSKEY as well as CDS records, in line with <xref section="5" sectionFormat="comma" target="RFC7344"/>. The choice of hash digest type should follow current best practice <xref target="DS-IANA"/>.</t>
          <t>Publishing the same information in two different formats is not ideal. Still, it is much less complex and costly than burdening the Child DNS operator with discovering each Parent's current policy; also, it is very easily automated. Operators should ensure that published RRsets are consistent with each other.</t>
          <t>If both RRsets are published, Parents are expected to verify consistency between them <xref target="I-D.ietf-dnsop-cds-consistency"/>, as determined by matching CDS and CDNSKEY records using hash digest algorithms whose support is mandatory <xref target="DS-IANA"/>. (Consistency of CDS records with optional or unsupported hash digest types need not be enforced.)</t>
          <t>By rejecting the DS update if RRsets are found to be inconsistent, Child DNS operators are held responsible when publishing contradictory information. Note that this does not imply a restriction to the hash digest types found in the CDS RRset: if no inconsistencies are found, the parent can publish DS records with whatever digest type(s) it prefers.</t>
        </section>
      </section>
    </section>
    <section anchor="reporting">
      <name>Reporting and Transparency</name>
      <t>This section provides recommendations to address the following question:</t>
      <ul spacing="normal">
        <li>
          <t>Should a failed (or even successful) DS update trigger a notification to anyone?</t>
        </li>
      </ul>
      <section anchor="recommendations-1">
        <name>Recommendations</name>
        <ol spacing="normal" type="1"><li>
            <t>For certain DS updates (see <xref target="analysis_reporting">analysis</xref>) and for DS deactivation, relevant points of contact known to the zone operator SHOULD be notified.</t>
          </li>
          <li>
            <t>For error conditions, the child DNS operator and the domain's technical contact (if applicable) SHOULD be notified first. The registrant SHOULD NOT be notified unless the problem persists for a prolonged amount of time (e.g., three days).</t>
          </li>
          <li>
            <t>Child DNS operators SHOULD be notified using a report query <xref target="RFC9567"/> to the agent domain as described in (<xref section="4" sectionFormat="comma" target="RFC9859"/>). Notifications to humans (domain holder) will be performed in accordance with the communication preferences established with the parent-side entity (registry or registrar). The same condition SHOULD NOT be reported unnecessarily frequently to the same recipient.</t>
          </li>
          <li>
            <t>In the RRR model, registries performing DS automation SHOULD inform the registrar of any DS record changes via the EPP Change Poll Extension <xref target="RFC8590"/> or a similar channel.</t>
          </li>
          <li>
            <t>The currently active DS configuration SHOULD be made accessible to the registrant (or their designated party) through the customer portal available for domain management. The DS update history MAY be made available in the same way.</t>
          </li>
        </ol>
      </section>
      <section anchor="analysis_reporting">
        <name>Analysis</name>
        <t>When accepting or rejecting a DS update, it cannot be assumed that relevant parties are aware of what's happening. For example, a registrar may not know when an automatic DS update is performed by the registry. Similarly, a Child DNS operator may not be aware when their CDS/CDNSKEY RRsets are out of sync across nameservers, thus being ignored.</t>
        <t>To help involved parties act appropriately and in a timely manner, entities performing automated DS maintenance should report on conditions they encounter. The following success situations may be of particular interest:</t>
        <ol spacing="normal" type="1"><li anchor="reporting-1">
            <t>A DS RRset has been provisioned  </t>
            <ol spacing="normal" type="a"><li anchor="reporting-1a">
                <t>manually;</t>
              </li>
              <li anchor="reporting-1b">
                <t>due to commencing DS automation (either via DNSSEC bootstrapping, or for the first time after a manual change; see <xref target="multiple"/>);</t>
              </li>
              <li anchor="reporting-1c">
                <t>automatically, as an update to an existing DS RRset that had itself been automatically provisioned.</t>
              </li>
            </ol>
          </li>
          <li anchor="reporting-2">
            <t>The DS RRset has been removed  </t>
            <ol spacing="normal" type="a"><li>
                <t>manually;</t>
              </li>
              <li>
                <t>automatically, using a delete signal (<xref section="4" sectionFormat="comma" target="RFC8078"/>).</t>
              </li>
            </ol>
          </li>
        </ol>
        <t>In addition, there are error conditions worthy of being reported:</t>
        <ol spacing="normal" type="1" start="3"><li anchor="reporting-3">
            <t>A pending DS update cannot be applied due to an error condition. There are various scenarios where an automated DS update might have been requested, but can't be fulfilled. These include:  </t>
            <ol spacing="normal" type="a"><li>
                <t>The new DS record set would break validation/resolution or is not acceptable to the Parent for some other reason (see <xref target="acceptance"/>).</t>
              </li>
              <li>
                <t>A lock prevents DS automation (see <xref target="locks"/>).</t>
              </li>
            </ol>
          </li>
          <li anchor="reporting-4">
            <t>No DS update is due, but it was determined that the Child zone is no longer compatible with the existing DS record set (e.g., DS RRset only references non-existing keys).</t>
          </li>
        </ol>
        <t>For these reportworthy cases, the entity performing DS automation would be justified to attempt communicating the situation. Potential recipients are:</t>
        <ul spacing="normal">
          <li>
            <t>Child DNS operator, preferably by making a report query <xref target="RFC9567"/> to the agent domain listed in the EDNS0 Report-Channel option of the DS update notification that triggered the DS update (<xref section="4" sectionFormat="comma" target="RFC9859"/>), or else via email to the address contained in the child zone's SOA RNAME field (see Sections <xref target="RFC1035" section="3.3.13" sectionFormat="bare"/> and <xref target="RFC1035" section="8" sectionFormat="bare"/> of <xref target="RFC1035"/>);</t>
          </li>
          <li>
            <t>Registrar (if DS automation is performed by the registry);</t>
          </li>
          <li>
            <t>Registrant (domain holder; in non-technical language, such as "DNSSEC security for your domain has been enabled and will be maintained automatically") or technical contact, in accordance with the communication preferences established with the parent-side entity.</t>
          </li>
        </ul>
        <t>For manual updates (<xref target="reporting-1a" format="none">case 1a</xref>), commencing DS automation (<xref target="reporting-1b" format="none">case 1b</xref>), and deactivating DNSSEC (<xref target="reporting-2" format="none">case 2</xref>), it seems worthwhile to notify both the domain's technical contact (if applicable) and the registrant. This will typically lead to one notification during normal operation of a domain. (<xref target="reporting-1c" format="none">Case 1c</xref>, the regular operation of automation, is not an interesting condition to report to a human.)</t>
        <t>For error conditions (cases <xref target="reporting-3" format="none">3</xref> and <xref target="reporting-4" format="none">4</xref>), the registrant need not always be involved. It seems advisable to first notify the domain's technical contact and the DNS operator serving the affected Child zone, and only if the problem persists for a prolonged amount of time (e.g., three days), notify the registrant.</t>
        <t>When the RRR model is used and the registry performs DS automation, the registrar should always stay informed of any DS record changes, e.g., via the EPP Change Poll Extension <xref target="RFC8590"/>.</t>
        <t>The same condition SHOULD NOT be reported unnecessarily frequently to the same recipient (e.g., no more than twice in a row). For example, when CDS and CDNSKEY records are inconsistent and prevent DS initialization, the registrant may be notified twice. Additional notifications may be sent with some back-off mechanism (in increasing intervals).</t>
        <t>The current DS configuration SHOULD be made accessible to the registrant (or their designated party) through the customer portal available for domain management. Ideally, the history of DS updates would also be available. However, due to the associated state requirements and the lack of direct operational impact, implementation of this is OPTIONAL.</t>
      </section>
    </section>
    <section anchor="locks">
      <name>Registration Locks</name>
      <t>This section provides recommendations to address the following question:</t>
      <ul spacing="normal">
        <li>
          <t>How does DS automation interact with other registration state parameters, such as registration locks?</t>
        </li>
      </ul>
      <section anchor="recommendations-2">
        <name>Recommendations</name>
        <ol spacing="normal" type="1"><li>
            <t>To secure ongoing operations, automated DS maintenance SHOULD NOT be suspended based on a registrar update lock alone (such as EPP status clientUpdateProhibited).</t>
          </li>
          <li>
            <t>When performed by the registry, automated DS maintenance SHOULD NOT be suspended based on a registry update lock alone (such as EPP status serverUpdateProhibited).</t>
          </li>
        </ol>
      </section>
      <section anchor="analysis_locks">
        <name>Analysis</name>
        <t>Registries and registrars can set various types of locks for domain registrations, usually upon the registrant's request. An overview of standardized locks using EPP, for example, is given in <xref section="2.3" sectionFormat="of" target="RFC5731"/>. Some registries may offer additional (or other) types of locks whose meaning and set/unset mechanisms are defined according to a proprietary policy.</t>
        <t>While some locks clearly should have no impact on DS automation (such as transfer or deletion locks), other types of locks, in particular "update locks", deserve a closer analysis.</t>
        <section anchor="registrar-vs-registry-lock">
          <name>Registrar vs. Registry Lock</name>
          <t>A registrar-side update lock (such as clientUpdateProhibited in EPP) protects against various types of accidental or malicious change (like unintended changes through the registrar's customer portal). Its security model does not prevent the registrar's (nor the registry's) actions. This is because a registrar-side lock can be removed by the registrar without an out-of-band interaction.</t>
          <t>Under such a security model, no tangible security benefit is gained by preventing automated DS maintenance based on a registrar lock alone, while preventing it would make maintenance needlessly difficult. It therefore seems reasonable not to suspend automation when such a lock is present.</t>
          <t>When a registry-side update lock is in place, the registrar cannot apply any changes (for security or delinquency or other reasons). However, it does not protect against changes made by the registry itself. This is exemplified by the serverUpdateProhibited EPP status, which demands only that the registrar's "[r]equests to update the object [...] MUST be rejected" (<xref section="2.3" sectionFormat="comma" target="RFC5731"/>). This type of lock therefore precludes DS automation by the registrar, while registry-side automation may continue.</t>
          <t>DS automation by the registry further is consistent with <xref section="2.3" sectionFormat="comma" target="RFC5731"/>, which explicitly notes that an EPP server (registry) may override status values set by an EPP client (registrar), subject to local server policies. The risk that DS changes from registry-side DS automation might go unnoticed by the registrar is mitigated by sending change notifications to the registrar; see Recommendation 4 of <xref target="reporting"/>.</t>
        </section>
        <section anchor="detailed-rationale">
          <name>Detailed Rationale</name>
          <t>Pre-DNSSEC, it was possible for a registration to be set up once, then locked and left alone (no maintenance required). With DNSSEC comes a change to this operational model: the configuration may have to be maintained in order to remain secure and operational. For example, the Child DNS operator may switch to another signing algorithm if the previous one is no longer deemed appropriate, or roll its SEP key for other reasons. Such changes entail updating the delegation's DS records.</t>
          <t>If authenticated, these operations do not qualify as accidental or malicious change, but as legitimate and normal activity for securing ongoing operation. The CDS/CDNSKEY method provides an automatic, authenticated means to convey DS update requests. The resulting DS update is subject to the parent's acceptance checks; in particular, it is not applied when it would break the delegation (see <xref target="acceptance"/>).</t>
          <t>Given that registrar locks protect against unintended changes (such as through the customer portal) while not preventing actions done by the registrar (or the registry) themself, such a lock is not suitable for defending against actions performed illegitimately by the registrar or registry (e.g., due to compromise). Any attack on the registration data that is feasible in the presence of a registrar lock is also feasible regardless of whether DS maintenance is done automatically; in other words, DS automation is orthogonal to the attack vector that a registrar lock protects against.</t>
          <t>Considering that automated DS updates are required to be authenticated and validated for correctness, it thus appears that honoring such requests, while in the registrant's interest, comes with no additional associated risk. Suspending automated DS maintenance therefore does not seem justified.</t>
          <t>Following this line of thought, some registries (e.g., .ch/.cz/.li) today perform automated DS maintenance even when an "update lock" is in place. Registries offering proprietary locks should carefully consider for each lock whether its scope warrants suspension.</t>
          <t>In case of a domain not yet secured with DNSSEC, automatic DS initialization is not required to maintain ongoing operation; however, authenticated DNSSEC bootstrapping <xref target="RFC9615"/> might be requested. Besides being in the interest of security, the fact that a Child is requesting DS initialization through an authenticated method expresses the registrant's intent to have the delegation secured.</t>
          <t>Further, some domains are equipped with an update lock by default. Not honoring DNSSEC bootstrapping requests then imposes an additional burden on the registrant, who has to unlock and relock the domain in order to facilitate DS provisioning after registration. This is a needless cost especially for large domain portfolios. It is also unexpected, as the registrant already has arranged for the necessary CDS/CDNSKEY records to be published. It therefore appears that DS initialization and rollovers should be treated the same way with respect to locks.</t>
        </section>
      </section>
    </section>
    <section anchor="multiple">
      <name>Multiple Submitting Parties</name>
      <t>This section provides recommendations to address the following questions:</t>
      <ul spacing="normal">
        <li>
          <t>How are conflicts resolved when DS parameters are accepted through multiple channels (e.g. via a conventional channel and via automation)?</t>
        </li>
        <li>
          <t>In case both the registry and the registrar are automating DS updates, how to resolve potential collisions?</t>
        </li>
      </ul>
      <section anchor="recommendations-3">
        <name>Recommendations</name>
        <ol spacing="normal" type="1"><li>
            <t>Registries and registrars SHOULD provide another (e.g., manual) channel for DS maintenance in order to enable recovery when the Child has lost access to its signing key(s). This out-of-band channel is also needed when a DNS operator does not support DS automation or refuses to cooperate.</t>
          </li>
          <li>
            <t>DS update requests SHOULD be executed immediately after verification of their authenticity, regardless of whether they are received in-band or via an out-of-band channel.</t>
          </li>
          <li>
            <t>When processing a CDS/CDNSKEY "delete" signal to remove the entire DS record set (<xref section="4" sectionFormat="comma" target="RFC8078"/>), DS automation SHOULD NOT be suspended. For all other removal requests (such as when received via EPP or a web form), DS automation SHOULD be suspended until a new DS record set has been provisioned, in order to prevent accidental re-initialization when the registrant intended to disable DNSSEC.</t>
          </li>
          <li>
            <t>Whenever a non-empty DS record set is provisioned, through whichever channel, DS automation SHOULD NOT (or no longer) be suspended (including after an earlier removal).</t>
          </li>
          <li>
            <t>In the RRR model, a registry SHOULD NOT automatically initialize DS records when it is known that the registrar does not provide a way for the domain holder to later disable DNSSEC. If the registrar has declared to be performing automated DS maintenance, the registry SHOULD publish the registrar's <xref target="RFC9859"/> notification endpoint (if applicable) and refrain from registry-side DS automation.</t>
          </li>
        </ol>
      </section>
      <section anchor="analysis_multiple">
        <name>Analysis</name>
        <t>In the RRR model, there are multiple channels through which DS parameters can be accepted:</t>
        <ul spacing="normal">
          <li>
            <t>The registry can retrieve information about an intended DS update automatically from the Child DNS Operator and apply the update directly;</t>
          </li>
          <li>
            <t>The registrar can retrieve the same and relay it to the registry;</t>
          </li>
          <li>
            <t>The registrar can obtain the information from the registrant through another channel (such as a non-automated "manual update" via webform submission), and relay it to the registry.</t>
          </li>
        </ul>
        <t>There are several considerations in this context, as follows.</t>
        <section anchor="necessity-of-non-automatic-updates">
          <name>Necessity of Non-automatic Updates</name>
          <t>Under special circumstances, it may be necessary to perform a non-automatic DS update. One important example is when the key used by for authentication of DS updates is destroyed: in this case, an automatic key rollover is impossible as the Child DNS operator can no longer authenticate the associated information. Another example is when several providers are involved, but one no longer cooperates (e.g., when removing a provider from a multi-provider setup). Disabling manual DS management interfaces is therefore strongly discouraged.</t>
          <t>Similarly, when the registrar is known to not support DNSSEC (or to lack a DS provisioning interface), it seems adequate for registries to not perform automated DS maintenance, in order to prevent situations in which a misconfigured delegation cannot be repaired by the registrant.</t>
        </section>
        <section anchor="impact-of-non-automatic-updates-when-to-suspend-automation">
          <name>Impact of Non-automatic Updates: When to Suspend Automation</name>
          <t>When an out-of-band (e.g., manual) DS update is performed while CDS/CDNSKEY records referencing the previous DS RRset's keys are present, the delegation's DS records may be reset to their previous state at the next run of the automation process. This section discusses in which situations it is appropriate to suspend DS automation after such a non-automatic update.</t>
          <t>One option is to suspend DS automation after a manual DS update, but only until a resumption signal is observed. In the past, it was proposed that seeing an updated SOA serial in the child zone may serve as a resumption signal. However, as any arbitrary modification of zone contents — including the regular updating of DNSSEC signature validity timestamps  — typically causes a change in SOA serial, resumption of DS automation after a serial change comes with a high risk of surprise. Additional issues arise if nameservers have different serial offsets (e.g., in a multi-provider setup). It is therefore advised to not follow this practice.</t>
          <t>Note also that "automatic rollback" due to old CDS/CDNSKEY RRsets can only occur if they are signed with a key authorized by one of new DS records. Acceptance checks described in <xref target="acceptance"/> further ensure that updates do not break validation.</t>
          <t>Removal of a DS record set is triggered either through a CDS/CDNSKEY "delete" signal observed by the party performing the automation (<xref section="4" sectionFormat="comma" target="RFC8078"/>), or by receiving a removal request out-of-band (e.g., via EPP or a web form). In the first case, it is useful to keep automation active for the delegation in question, to facilitate later DS bootstrapping. In the second case, it is likely that the registrant intends to disable DNSSEC for the domain, and DS automation is best suspended (until a new DS record is provisioned somehow).</t>
          <t>One may ask how a registry can know whether a removal request received via EPP was the result of the registrar observing a CDS/CDNSKEY "delete" signal. It turns out that the registry does not need to know that; in fact, the advice works out nicely regardless of who does the automation:</t>
          <ol spacing="normal" type="a"><li>
              <t>Only registry: If the registry performs automation, then the registry will consider any request received from the registrar as out-of-band (in the context of this automation). When such requests demand removal of the entire DS record set, the registry therefore should suspend automation.</t>
            </li>
            <li>
              <t>Only registrar: The registrar can always distinguish between removal requests obtained from a CDS/CDNSKEY "delete" signal and other registrant requests, and suspend automation as appropriate.</t>
            </li>
            <li>
              <t>In the (undesirable) case that both parties automate, there are two cases:  </t>
              <ul spacing="normal">
                <li>
                  <t>If the registrant submits a manual removal request to the registrar, it is out-of-band from the registrar perspective (e.g., web form), and also for the registry (e.g., EPP). As a consequence, both will suspend automation (which is the correct result).</t>
                </li>
                <li>
                  <t>If a CDS/CDNSKEY "delete" signal causes the registrar to request DS removal from the registry, then the registry will suspend automation (because the removal request is received out-of-band, such as via EPP). This is independent of whether the registry's automation has already seen the signal. The registrar, however, will be aware of the in-band nature of the request and not suspend automation (which is also the correct result).</t>
                </li>
              </ul>
              <t>
As a side effect, this works towards avoiding redundant automation at the registry.</t>
            </li>
          </ol>
          <t>All in all:</t>
          <ul spacing="normal">
            <li>
              <t>It appears advisable to generally not suspend in-band DS automation when an out-of-band DS update has occurred.</t>
            </li>
            <li>
              <t>An exception from this rule is when the entire DS record set was removed through an out-of-band request, in which case the registrant likely wants to disable DNSSEC for the domain. DS automation should then be suspended so that automatic re-initialization (bootstrapping) does not occur.</t>
            </li>
            <li>
              <t>In all other cases, any properly authenticated DS updates received, including through an automated method, are to be considered as the current intent of the domain holder.</t>
            </li>
          </ul>
        </section>
        <section anchor="concurrent-automatic-updates">
          <name>Concurrent Automatic Updates</name>
          <t>When the RRR model is used, there is a potential for collision if both the registry and the registrar are automating DS provisioning by scanning the child for CDS/CDNSKEY records. No disruptive consequences are expected if both parties perform DS automation. An exception is when during a key rollover, registry and registrar see different versions of the Child's DS update requests, such as when CDS/CDNSKEY records are retrieved from different vantage points. Although unlikely due to Recommendation 1a of <xref target="acceptance"/>, this may lead to flapping of DS updates; however, it is not expected to be harmful as either DS RRset will allow for the validation function to continue to work, as ensured by Recommendation 1b of <xref target="acceptance"/>. The effect subsides as the Child's state eventually becomes consistent (roughly, within the child's replication delay); any flapping until then will be a minor nuisance only.</t>
          <t>The issue disappears entirely when scanning is replaced by notifications that trigger DS maintenance through one party's designated endpoint <xref target="RFC9859"/>, and can otherwise be mitigated if the registry and registrar agree that only one of them will perform scanning.</t>
          <t>As a standard aspect of key rollovers <xref target="RFC6781"/>, the Child DNS operator is expected to monitor propagation of Child zone updates to all authoritative nameserver instances, and only proceed to the next step once replication has succeeded everywhere and the DS record set was subsequently updated (and in no case before the DS RRset's TTL has passed). Any breakage resulting from improper timing on the Child side is outside of the Parent's sphere of influence, and thus cannot be handled with only parent-side changes.</t>
        </section>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document considers security aspects throughout, and has no separate considerations.</t>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank the SSAC members who wrote the <xref target="SAC126"/> report on which this document is based.</t>
      <t>In order of first contribution or review: Barbara Jantzen, Matt Pounsett, Matthijs Mekking, Ondřej Caletka, Oli Schacher, Kim Davies, Jim Reid, Q Misell, Scott Hollenbeck, Tamás Csillag, Philip Homburg, Shumon Huque, Libor Peltan, Josh Simpson, Johan Stenstam, Stefan Ubbink, Viktor Dukhovni, Hugo Salgado, Wes Hardaker</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="DNSKEY-IANA" target="https://www.iana.org/assignments/dns-sec-alg-numbers/dns-sec-alg-numbers.xml#dns-sec-alg-numbers-1">
          <front>
            <title>DNS Security Algorithm Numbers</title>
            <author initials="" surname="IANA" fullname="IANA">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="DS-IANA" target="http://www.iana.org/assignments/ds-rr-types">
          <front>
            <title>Delegation Signer (DS) Resource Record (RR) Type Digest Algorithms</title>
            <author initials="" surname="IANA" fullname="IANA">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC7344">
          <front>
            <title>Automating DNSSEC Delegation Trust Maintenance</title>
            <author fullname="W. Kumari" initials="W." surname="Kumari"/>
            <author fullname="O. Gudmundsson" initials="O." surname="Gudmundsson"/>
            <author fullname="G. Barwood" initials="G." surname="Barwood"/>
            <date month="September" year="2014"/>
            <abstract>
              <t>This document describes a method to allow DNS Operators to more easily update DNSSEC Key Signing Keys using the DNS as a communication channel. The technique described is aimed at delegations in which it is currently hard to move information from the Child to Parent.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7344"/>
          <seriesInfo name="DOI" value="10.17487/RFC7344"/>
        </reference>
        <reference anchor="RFC8078">
          <front>
            <title>Managing DS Records from the Parent via CDS/CDNSKEY</title>
            <author fullname="O. Gudmundsson" initials="O." surname="Gudmundsson"/>
            <author fullname="P. Wouters" initials="P." surname="Wouters"/>
            <date month="March" year="2017"/>
            <abstract>
              <t>RFC 7344 specifies how DNS trust can be maintained across key rollovers in-band between parent and child. This document elevates RFC 7344 from Informational to Standards Track. It also adds a method for initial trust setup and removal of a secure entry point.</t>
              <t>Changing a domain's DNSSEC status can be a complicated matter involving multiple unrelated parties. Some of these parties, such as the DNS operator, might not even be known by all the organizations involved. The inability to disable DNSSEC via in-band signaling is seen as a problem or liability that prevents some DNSSEC adoption at a large scale. This document adds a method for in-band signaling of these DNSSEC status changes.</t>
              <t>This document describes reasonable policies to ease deployment of the initial acceptance of new secure entry points (DS records).</t>
              <t>It is preferable that operators collaborate on the transfer or move of a domain. The best method is to perform a Key Signing Key (KSK) plus Zone Signing Key (ZSK) rollover. If that is not possible, the method using an unsigned intermediate state described in this document can be used to move the domain between two parties. This leaves the domain temporarily unsigned and vulnerable to DNS spoofing, but that is preferred over the alternative of validation failures due to a mismatched DS and DNSKEY record.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8078"/>
          <seriesInfo name="DOI" value="10.17487/RFC8078"/>
        </reference>
        <reference anchor="RFC9615">
          <front>
            <title>Automatic DNSSEC Bootstrapping Using Authenticated Signals from the Zone's Operator</title>
            <author fullname="P. Thomassen" initials="P." surname="Thomassen"/>
            <author fullname="N. Wisiol" initials="N." surname="Wisiol"/>
            <date month="July" year="2024"/>
            <abstract>
              <t>This document introduces an in-band method for DNS operators to publish arbitrary information about the zones for which they are authoritative, in an authenticated fashion and on a per-zone basis. The mechanism allows managed DNS operators to securely announce DNSSEC key parameters for zones under their management, including for zones that are not currently securely delegated.</t>
              <t>Whenever DS records are absent for a zone's delegation, this signal enables the parent's registry or registrar to cryptographically validate the CDS/CDNSKEY records found at the child's apex. The parent can then provision DS records for the delegation without resorting to out-of-band validation or weaker types of cross-checks such as "Accept after Delay".</t>
              <t>This document establishes the DS enrollment method described in Section 4 of this document as the preferred method over those from Section 3 of RFC 8078. It also updates RFC 7344.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9615"/>
          <seriesInfo name="DOI" value="10.17487/RFC9615"/>
        </reference>
        <reference anchor="RFC9364">
          <front>
            <title>DNS Security Extensions (DNSSEC)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>This document describes the DNS Security Extensions (commonly called "DNSSEC") that are specified in RFCs 4033, 4034, and 4035, as well as a handful of others. One purpose is to introduce all of the RFCs in one place so that the reader can understand the many aspects of DNSSEC. This document does not update any of those RFCs. A second purpose is to state that using DNSSEC for origin authentication of DNS data is the best current practice. A third purpose is to provide a single reference for other documents that want to refer to DNSSEC.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="237"/>
          <seriesInfo name="RFC" value="9364"/>
          <seriesInfo name="DOI" value="10.17487/RFC9364"/>
        </reference>
        <reference anchor="RFC9859">
          <front>
            <title>Generalized DNS Notifications</title>
            <author fullname="J. Stenstam" initials="J." surname="Stenstam"/>
            <author fullname="P. Thomassen" initials="P." surname="Thomassen"/>
            <author fullname="J. Levine" initials="J." surname="Levine"/>
            <date month="September" year="2025"/>
            <abstract>
              <t>This document generalizes and extends the use of DNS NOTIFY (RFC 1996) beyond conventional zone transfer hints to allow other types of actions that were previously lacking a trigger mechanism to be triggered via the DNS. Notifications merely nudge the receiver to initiate a predefined action promptly (instead of on a schedule); they do not alter the action itself (including any security checks it might employ).</t>
              <t>To enable this functionality, a method for discovering the receiver endpoint for such notification messages is introduced, via the new DSYNC record type. Notification types are recorded in a new registry, with initial support for parental NS and DS record updates including DNSSEC bootstrapping.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9859"/>
          <seriesInfo name="DOI" value="10.17487/RFC9859"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="I-D.ietf-dnsop-cds-consistency">
          <front>
            <title>Clarifications on CDS/CDNSKEY and CSYNC Consistency</title>
            <author fullname="Peter Thomassen" initials="P." surname="Thomassen">
              <organization>SSE - Secure Systems Engineering GmbH</organization>
            </author>
            <date day="11" month="December" year="2025"/>
            <abstract>
              <t>   Maintenance of DNS delegations requires occasional changes of the DS
   and NS record sets on the parent side of the delegation.  For the
   case of DS records, "Automating DNSSEC Delegation Trust Maintenance"
   (RFC 7344) provides automation by allowing the child to publish CDS
   and/or CDNSKEY records holding the prospective DS parameters which
   the parent can ingest.  Similarly, "Child-to-Parent Synchronization
   in DNS" (RFC 7477) specifies CSYNC records to indicate a desired
   update of the delegation's NS (and glue) records.  Parent-side
   entities (e.g., Registries and Registrars) can query these records
   from the child and, after validation, use them to update the parent-
   side Resource Record Sets (RRsets) of the delegation.

   This document specifies under which conditions the target states
   expressed via CDS/CDNSKEY and CSYNC records are considered
   "consistent".  Parent-side entities accepting such records from the
   child have to ensure that update requests retrieved from different
   authoritative nameservers satisfy these consistency requirements
   before taking any action based on them.

   This document updates RFC 7344 and RFC 7477.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dnsop-cds-consistency-11"/>
        </reference>
        <reference anchor="RFC9567">
          <front>
            <title>DNS Error Reporting</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <date month="April" year="2024"/>
            <abstract>
              <t>DNS error reporting is a lightweight reporting mechanism that provides the operator of an authoritative server with reports on DNS resource records that fail to resolve or validate. A domain owner or DNS hosting organization can use these reports to improve domain hosting. The reports are based on extended DNS errors as described in RFC 8914.</t>
              <t>When a domain name fails to resolve or validate due to a misconfiguration or an attack, the operator of the authoritative server may be unaware of this. To mitigate this lack of feedback, this document describes a method for a validating resolver to automatically signal an error to a monitoring agent specified by the authoritative server. The error is encoded in the QNAME; thus, the very act of sending the query is to report the error.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9567"/>
          <seriesInfo name="DOI" value="10.17487/RFC9567"/>
        </reference>
        <reference anchor="RFC8590">
          <front>
            <title>Change Poll Extension for the Extensible Provisioning Protocol (EPP)</title>
            <author fullname="J. Gould" initials="J." surname="Gould"/>
            <author fullname="K. Feher" initials="K." surname="Feher"/>
            <date month="May" year="2019"/>
            <abstract>
              <t>This document describes an Extensible Provisioning Protocol (EPP) extension for notifying clients of operations on client-sponsored objects that were not initiated by the client through EPP. These operations may include contractual or policy requirements including, but not limited to, regular batch processes, customer support actions, Uniform Domain-Name Dispute-Resolution Policy (UDRP) or Uniform Rapid Suspension (URS) actions, court-directed actions, and bulk updates based on customer requests. Since the client is not directly involved or knowledgable of these operations, the extension is used along with an EPP object mapping to provide the resulting state of the postoperation object, and optionally a preoperation object, with the operation metadata of what, when, who, and why.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8590"/>
          <seriesInfo name="DOI" value="10.17487/RFC8590"/>
        </reference>
        <reference anchor="RFC1035">
          <front>
            <title>Domain names - implementation and specification</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1035"/>
          <seriesInfo name="DOI" value="10.17487/RFC1035"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="LowTTL" target="https://indico.dns-oarc.net/event/47/contributions/1010/attachments/958/1811/DS%20and%20DNSKEY%20TTL%20experiment.pdf">
          <front>
            <title>DS and DNSKEY low TTL experiments</title>
            <author initials="P." surname="Špaček" fullname="Petr Špaček">
              <organization>ISC</organization>
            </author>
            <date year="2023" month="September" day="06"/>
          </front>
          <seriesInfo name="at" value="DNS OARC 41"/>
        </reference>
        <reference anchor="SAC126" target="https://itp.cdn.icann.org/en/files/security-and-stability-advisory-committee-ssac-reports/sac-126-16-08-2024-en.pdf">
          <front>
            <title>SAC126: DNSSEC Delegation Signer (DS) Record Automation</title>
            <author initials="I. S. and S. A. C." surname="(SSAC)" fullname="ICANN Security and Stability Advisory Committee (SSAC)">
              <organization/>
            </author>
            <date year="2024" month="August" day="12"/>
          </front>
        </reference>
        <reference anchor="RFC6840">
          <front>
            <title>Clarifications and Implementation Notes for DNS Security (DNSSEC)</title>
            <author fullname="S. Weiler" initials="S." role="editor" surname="Weiler"/>
            <author fullname="D. Blacka" initials="D." role="editor" surname="Blacka"/>
            <date month="February" year="2013"/>
            <abstract>
              <t>This document is a collection of technical clarifications to the DNS Security (DNSSEC) document set. It is meant to serve as a resource to implementors as well as a collection of DNSSEC errata that existed at the time of writing.</t>
              <t>This document updates the core DNSSEC documents (RFC 4033, RFC 4034, and RFC 4035) as well as the NSEC3 specification (RFC 5155). It also defines NSEC3 and SHA-2 (RFC 4509 and RFC 5702) as core parts of the DNSSEC specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6840"/>
          <seriesInfo name="DOI" value="10.17487/RFC6840"/>
        </reference>
        <reference anchor="RFC6781">
          <front>
            <title>DNSSEC Operational Practices, Version 2</title>
            <author fullname="O. Kolkman" initials="O." surname="Kolkman"/>
            <author fullname="W. Mekking" initials="W." surname="Mekking"/>
            <author fullname="R. Gieben" initials="R." surname="Gieben"/>
            <date month="December" year="2012"/>
            <abstract>
              <t>This document describes a set of practices for operating the DNS with security extensions (DNSSEC). The target audience is zone administrators deploying DNSSEC.</t>
              <t>The document discusses operational aspects of using keys and signatures in the DNS. It discusses issues of key generation, key storage, signature generation, key rollover, and related policies.</t>
              <t>This document obsoletes RFC 4641, as it covers more operational ground and gives more up-to-date requirements with respect to key sizes and the DNSSEC operations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6781"/>
          <seriesInfo name="DOI" value="10.17487/RFC6781"/>
        </reference>
        <reference anchor="RFC9803">
          <front>
            <title>Extensible Provisioning Protocol (EPP) Mapping for DNS Time-to-Live (TTL) Values</title>
            <author fullname="G. Brown" initials="G." surname="Brown"/>
            <date month="June" year="2025"/>
            <abstract>
              <t>This document describes an extension to the Extensible Provisioning
Protocol (EPP) that allows EPP clients to manage the Time-to-Live
(TTL) value for domain name delegation records.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9803"/>
          <seriesInfo name="DOI" value="10.17487/RFC9803"/>
        </reference>
        <reference anchor="RFC5731">
          <front>
            <title>Extensible Provisioning Protocol (EPP) Domain Name Mapping</title>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
            <date month="August" year="2009"/>
            <abstract>
              <t>This document describes an Extensible Provisioning Protocol (EPP) mapping for the provisioning and management of Internet domain names stored in a shared central repository. Specified in XML, the mapping defines EPP command syntax and semantics as applied to domain names. This document obsoletes RFC 4931. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="69"/>
          <seriesInfo name="RFC" value="5731"/>
          <seriesInfo name="DOI" value="10.17487/RFC5731"/>
        </reference>
        <reference anchor="RFC5730">
          <front>
            <title>Extensible Provisioning Protocol (EPP)</title>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
            <date month="August" year="2009"/>
            <abstract>
              <t>This document describes an application-layer client-server protocol for the provisioning and management of objects stored in a shared central repository. Specified in XML, the protocol defines generic object management operations and an extensible framework that maps protocol operations to objects. This document includes a protocol specification, an object mapping template, and an XML media type registration. This document obsoletes RFC 4930. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="69"/>
          <seriesInfo name="RFC" value="5730"/>
          <seriesInfo name="DOI" value="10.17487/RFC5730"/>
        </reference>
      </references>
    </references>
    <?line 380?>

<section anchor="terminology">
      <name>Terminology</name>
      <t>Unless defined in this section, the terminology in this document is as defined in <xref target="RFC7344"/>.</t>
      <dl>
        <dt>Child zone:</dt>
        <dd>
          <t>DNS zone whose delegation is in the Parent zone.</t>
        </dd>
        <dt>Child (DNS operator):</dt>
        <dd>
          <t>DNS operator responsible for a Child zone.</t>
        </dd>
        <dt>DNS operator:</dt>
        <dd>
          <t>The entity holding the zone's primary copy before it is signed. Typically a DNS hosting provider in the domain holder's name, it controls the authoritative contents and delegations in the zone, and is thus operationally responsible for maintaining the "purposeful" records in the zone file (such as IP address, MX, or CDS/CDNSKEY records).
The parties involved in other functions for the zone, like signing and serving, are not relevant for this definition.</t>
        </dd>
        <dt>Parent zone:</dt>
        <dd>
          <t>DNS zone that holds a delegation for a Child zone.</t>
        </dd>
        <dt>Parent (DNS operator):</dt>
        <dd>
          <t>The DNS operator responsible for a Parent zone, and thus involved with the maintenance of the delegation's DNSSEC parameters (in particular, the acceptance of these parameters and the publication of corresponding DS records).</t>
        </dd>
        <dt>Registrant:</dt>
        <dd>
          <t>The entity responsible for records associated with a particular domain name in a domain name registry (typically under a TLD such as .com or an SLD such as co.uk). When the RRR model is used, the registrant maintains these records through a registrar who acts as an intermediary for both the registry and the registrant.</t>
        </dd>
        <dt>Registrar:</dt>
        <dd>
          <t>An entity through which registrants register domain names; the registrar performs this service by interacting directly with the registry in charge of the domain's suffix. A registrar may also provide other services such as DNS service or web hosting for the registrant. In some cases, the registry directly offers registration services to the public, that is, the registry may also perform the registrar function.</t>
        </dd>
        <dt>Registry:</dt>
        <dd>
          <t>The entity that controls the registry database and authoritative DNS service of domain names registered under a particular suffix, for example a top-level domain (TLD). A registry receives requests through an interface (usually EPP <xref target="RFC5730"/>) from registrars to read, add, delete, or modify domain name registrations, and then makes the requested changes in the registry database and associated DNS zone.</t>
        </dd>
        <dt>RRR Model:</dt>
        <dd>
          <t>The registrant-registrar-registry interaction framework, where registrants interact with a registrar to register and manage domain names, and registrars interact with the domain's registry for the provision and management of domain names on the registrant's behalf. This model is common amongst top-level domains.</t>
        </dd>
      </dl>
    </section>
    <section anchor="recommendations_overview">
      <name>Recommendations Overview</name>
      <t>For ease of review, the recommendations from this document are reproduced here without further comment. For background and analysis, see Sections <xref format="counter" target="acceptance"/>–<xref format="counter" target="multiple"/>.</t>
      <section anchor="acceptance-checks-and-safety-measures">
        <name>Acceptance Checks and Safety Measures</name>
        <ol spacing="normal" type="1"><li>
            <t>Entities performing automated DS maintenance SHOULD verify  </t>
            <ol spacing="normal" type="a"><li>
                <t>the unambigious intent of each DS update request as per <xref target="I-D.ietf-dnsop-cds-consistency"/>, by checking its consistency both      </t>
                <ul spacing="normal">
                  <li>
                    <t>between any published CDS and CDNSKEY records, and</t>
                  </li>
                  <li>
                    <t>across all authoritative nameservers in the delegation,</t>
                  </li>
                </ul>
                <t>
and</t>
              </li>
              <li>
                <t>that the resulting DS record set would allow continued DNSSEC validation if deployed,</t>
              </li>
            </ol>
            <t>
and cancel the update if the verifications do not succeed.</t>
          </li>
          <li>
            <t>Parent-side entities (such as registries) SHOULD reduce a DS record set's TTL to a value between 5–15 minutes when the set of records is changed, and restore the normal TTL value at a later occasion (but not before the previous DS RRset's TTL has expired).</t>
          </li>
          <li>
            <t>DNS operators SHOULD publish both CDNSKEY records as well as CDS records, and follow best practice for the choice of hash digest type <xref target="DS-IANA"/>.</t>
          </li>
        </ol>
      </section>
      <section anchor="reporting-and-transparency">
        <name>Reporting and Transparency</name>
        <ol spacing="normal" type="1"><li>
            <t>For certain DS updates (see <xref target="analysis_reporting">analysis</xref>) and for DS deactivation, relevant points of contact known to the zone operator SHOULD be notified.</t>
          </li>
          <li>
            <t>For error conditions, the child DNS operator and the domain's technical contact (if applicable) SHOULD be notified first. The registrant SHOULD NOT be notified unless the problem persists for a prolonged amount of time (e.g., three days).</t>
          </li>
          <li>
            <t>Child DNS operators SHOULD be notified using a report query <xref target="RFC9567"/> to the agent domain as described in (<xref section="4" sectionFormat="comma" target="RFC9859"/>). Notifications to humans (domain holder) will be performed in accordance with the communication preferences established with the parent-side entity (registry or registrar). The same condition SHOULD NOT be reported unnecessarily frequently to the same recipient.</t>
          </li>
          <li>
            <t>In the RRR model, registries performing DS automation SHOULD inform the registrar of any DS record changes via the EPP Change Poll Extension <xref target="RFC8590"/> or a similar channel.</t>
          </li>
          <li>
            <t>The currently active DS configuration SHOULD be made accessible to the registrant (or their designated party) through the customer portal available for domain management. The DS update history MAY be made available in the same way.</t>
          </li>
        </ol>
      </section>
      <section anchor="registration-locks">
        <name>Registration Locks</name>
        <ol spacing="normal" type="1"><li>
            <t>To secure ongoing operations, automated DS maintenance SHOULD NOT be suspended based on a registrar update lock alone (such as EPP status clientUpdateProhibited).</t>
          </li>
          <li>
            <t>When performed by the registry, automated DS maintenance SHOULD NOT be suspended based on a registry update lock alone (such as EPP status serverUpdateProhibited).</t>
          </li>
        </ol>
      </section>
      <section anchor="multiple-submitting-parties">
        <name>Multiple Submitting Parties</name>
        <ol spacing="normal" type="1"><li>
            <t>Registries and registrars SHOULD provide another (e.g., manual) channel for DS maintenance in order to enable recovery when the Child has lost access to its signing key(s). This out-of-band channel is also needed when a DNS operator does not support DS automation or refuses to cooperate.</t>
          </li>
          <li>
            <t>DS update requests SHOULD be executed immediately after verification of their authenticity, regardless of whether they are received in-band or via an out-of-band channel.</t>
          </li>
          <li>
            <t>When processing a CDS/CDNSKEY "delete" signal to remove the entire DS record set (<xref section="4" sectionFormat="comma" target="RFC8078"/>), DS automation SHOULD NOT be suspended. For all other removal requests (such as when received via EPP or a web form), DS automation SHOULD be suspended until a new DS record set has been provisioned, in order to prevent accidental re-initialization when the registrant intended to disable DNSSEC.</t>
          </li>
          <li>
            <t>Whenever a non-empty DS record set is provisioned, through whichever channel, DS automation SHOULD NOT (or no longer) be suspended (including after an earlier removal).</t>
          </li>
          <li>
            <t>In the RRR model, a registry SHOULD NOT automatically initialize DS records when it is known that the registrar does not provide a way for the domain holder to later disable DNSSEC. If the registrar has declared to be performing automated DS maintenance, the registry SHOULD publish the registrar's <xref target="RFC9859"/> notification endpoint (if applicable) and refrain from registry-side DS automation.</t>
          </li>
        </ol>
      </section>
    </section>
    <section anchor="change-history-to-be-removed-before-publication">
      <name>Change History (to be removed before publication)</name>
      <ul spacing="normal">
        <li>
          <t>draft-ietf-dnsop-ds-automation-04</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Editorial changes</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>draft-ietf-dnsop-ds-automation-03</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Editorial changes</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>draft-ietf-dnsop-ds-automation-02</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Add Appendix with recommendations overview</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Editorial changes</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Change type to BCP</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Fold CDS/CDNSKEY consistency requirements (Section 6) into Section 2 (on acceptance checks)</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Clarify continuity of validation</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>In RRR, clarify that registries should not bootstrap if registrar has no deactivation interface (or if registrar does the automation)</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Remove Appendix C ("Approaches not pursued")</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>draft-ietf-dnsop-ds-automation-01</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Remove Recommendation 6.1.2 which had told parents to require publication of both CDS and CDNSKEY</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Clarify Recommendation 5.1.3 (on suspension of automation after DS RRset removal) and provide extra analysis</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Providing access to DS update history is now optional</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Humans (domains holders) should be notified according to preferences established with registry/registrar (not necessarily via email)</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Remove redundant Recommendation 5.1.5 (same as 3.1.4)</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Editorial changes</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>draft-ietf-dnsop-ds-automation-00</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Rename after adoption</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>draft-shetho-dnsop-ds-automation-02</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Allow DS automation during registry update lock</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Editorial changes</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>draft-shetho-dnsop-ds-automation-01</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Incorporated various review feedback (editorial + adding TODOs)</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>draft-shetho-dnsop-ds-automation-00</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Initial public draft.</t>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
