rfc9609.original   rfc9609.txt 
Network Working Group P. Koch Internet Engineering Task Force (IETF) P. Koch
Internet-Draft DENIC eG Request for Comments: 9609 DENIC eG
Obsoletes: 8109 (if approved) M. Larson BCP: 209 M. Larson
Intended status: Best Current Practice P. Hoffman Obsoletes: 8109 P. Hoffman
Expires: 28 February 2025 ICANN Category: Best Current Practice ICANN
27 August 2024 ISSN: 2070-1721 November 2024
Initializing a DNS Resolver with Priming Queries Initializing a DNS Resolver with Priming Queries
draft-ietf-dnsop-rfc8109bis-07
Abstract Abstract
This document describes the queries that a DNS resolver should emit This document describes the queries that a DNS resolver should emit
to initialize its cache. The result is that the resolver gets both a to initialize its cache. The result is that the resolver gets both a
current NS resource record set (RRset) for the root zone and the current NS resource record set (RRset) for the root zone and the
necessary address information for reaching the root servers. necessary address information for reaching the root servers.
This document, when published, obsoletes RFC 8109. See Appendix A This document obsoletes RFC 8109.
for the list of changes from RFC 8109.
Status of This Memo Status of This Memo
This Internet-Draft is submitted in full conformance with the This memo documents an Internet Best Current Practice.
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months This document is a product of the Internet Engineering Task Force
and may be updated, replaced, or obsoleted by other documents at any (IETF). It represents the consensus of the IETF community. It has
time. It is inappropriate to use Internet-Drafts as reference received public review and has been approved for publication by the
material or to cite them other than as "work in progress." Internet Engineering Steering Group (IESG). Further information on
BCPs is available in Section 2 of RFC 7841.
This Internet-Draft will expire on 28 February 2025. Information about the current status of this document, any errata,
and how to provide feedback on it may be obtained at
https://www.rfc-editor.org/info/rfc9609.
Copyright Notice Copyright Notice
Copyright (c) 2024 IETF Trust and the persons identified as the Copyright (c) 2024 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents (https://trustee.ietf.org/ Provisions Relating to IETF Documents
license-info) in effect on the date of publication of this document. (https://trustee.ietf.org/license-info) in effect on the date of
Please review these documents carefully, as they describe your rights publication of this document. Please review these documents
and restrictions with respect to this document. Code Components carefully, as they describe your rights and restrictions with respect
extracted from this document must include Revised BSD License text as to this document. Code Components extracted from this document must
described in Section 4.e of the Trust Legal Provisions and are include Revised BSD License text as described in Section 4.e of the
provided without warranty as described in the Revised BSD License. Trust Legal Provisions and are provided without warranty as described
in the Revised BSD License.
Table of Contents Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 1. Introduction
1.1. Terminology . . . . . . . . . . . . . . . . . . . . . . . 3 1.1. Terminology
2. Description of Priming . . . . . . . . . . . . . . . . . . . 3 2. Description of Priming
2.1. Content of Priming Information . . . . . . . . . . . . . 4 2.1. Content of Priming Information
3. Priming Queries . . . . . . . . . . . . . . . . . . . . . . . 4 3. Priming Queries
3.1. Repeating Priming Queries . . . . . . . . . . . . . . . . 5 3.1. Repeating Priming Queries
3.2. Target Selection . . . . . . . . . . . . . . . . . . . . 5 3.2. Target Selection
3.3. DNSSEC with Priming Queries . . . . . . . . . . . . . . . 5 3.3. DNSSEC with Priming Queries
4. Priming Responses . . . . . . . . . . . . . . . . . . . . . . 6 4. Priming Responses
4.1. Expected Properties of the Priming Response . . . . . . . 6 4.1. Expected Properties of the Priming Response
4.2. Completeness of the Response . . . . . . . . . . . . . . 7 4.2. Completeness of the Response
5. Post-Priming Strategies . . . . . . . . . . . . . . . . . . . 8 5. Post-Priming Strategies
6. Security Considerations . . . . . . . . . . . . . . . . . . . 8 6. Security Considerations
7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 8 7. IANA Considerations
8. References . . . . . . . . . . . . . . . . . . . . . . . . . 8 8. References
8.1. Normative References . . . . . . . . . . . . . . . . . . 8 8.1. Normative References
8.2. Informative References . . . . . . . . . . . . . . . . . 9 8.2. Informative References
Appendix A. Changes from RFC 8109 . . . . . . . . . . . . . . . 10 Appendix A. Changes from RFC 8109
Appendix B. Acknowledgements . . . . . . . . . . . . . . . . . . 11 Acknowledgements
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 11 Authors' Addresses
1. Introduction 1. Introduction
Recursive DNS resolvers need a starting point to resolve queries. Recursive DNS resolvers need a starting point to resolve queries.
[RFC1034] describes a common scenario for recursive resolvers: they [RFC1034] describes a common scenario for recursive resolvers: They
begin with an empty cache and some configuration for finding the begin with an empty cache and some configuration for finding the
names and addresses of the DNS root servers. [RFC1034] describes names and addresses of the DNS root servers. [RFC1034] describes
that configuration as a list of servers that will give authoritative that configuration as a list of servers that will give authoritative
answers to queries about the root. This has become a common answers to queries about the root. This has become a common
implementation choice for recursive resolvers, and is the topic of implementation choice for recursive resolvers and is the topic of
this document. this document.
This document describes the steps needed for this common This document describes the steps needed for this common
implementation choice. Note that this is not the only way to start a implementation choice. Note that this is not the only way to start a
recursive name server with an empty cache, but it is the only one recursive name server with an empty cache, but it is the only one
described in [RFC1034]. Some implementers have chosen other described in [RFC1034]. Some implementers have chosen other
directions, some of which work well and others of which fail directions, some of which work well and others of which fail
(sometimes disastrously) under different conditions. For example, an (sometimes disastrously) under different conditions. For example, an
implementation that only gets the addresses of the root name servers implementation that only gets the addresses of the root name servers
from configuration, not from the DNS as described in this document, from configuration, not from the DNS as described in this document,
will have stale data that could cause slower resolution. will have stale data that could cause slower resolution.
This document only deals with recursive name servers (recursive This document only deals with recursive name servers (also called
resolvers, resolvers) for the IN class. "recursive resolvers" and just "resolvers") for the IN class.
See Appendix A for the list of changes from [RFC8109].
1.1. Terminology 1.1. Terminology
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in BCP "OPTIONAL" in this document are to be interpreted as described in
14 [RFC2119] [RFC8174] when, and only when, they appear in all BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all
capitals, as shown here. capitals, as shown here.
See [RSSAC026v2] for terminology that relates to the root server See [RSSAC026v2] for terminology that relates to the root server
system. See [RFC9499] for terminology that relates to the DNS in system. See [RFC9499] for terminology that relates to the DNS in
general. general.
2. Description of Priming 2. Description of Priming
Priming is the act of finding the list of root servers from a Priming is the act of finding the list of root servers from a
configuration that lists some or all of the purported IP addresses of configuration that lists some or all of the purported IP addresses of
some or all of those root servers. In priming, a recursive resolver some or all of those root servers. In priming, a recursive resolver
starts with no cached information about the root servers, and starts with no cached information about the root servers, and it
finishes with a full list of their names and their addresses in its finishes with a full list of their names and addresses in its cache.
cache.
Priming is described in Sections 5.3.2 and 5.3.3 of [RFC1034]. (It Priming is described in Sections 5.3.2 and 5.3.3 of [RFC1034]. (It
is called "SBELT", a "safety belt" structure, in that document.) The is called "SBELT", a "safety belt" structure, in that document.) The
scenario used in that description, that of a recursive server that is scenario used in that description, that of a recursive server that is
also authoritative, is no longer as common. also authoritative, is no longer as common.
The configured list of IP addresses for the root servers usually The configured list of IP addresses for the root servers usually
comes from the vendor or distributor of the recursive server comes from the vendor or distributor of the recursive server
software. Although this list is generally accurate and complete at software. Although this list is generally accurate and complete at
the time of distribution, it may become outdated over time. the time of distribution, it may become outdated over time.
skipping to change at page 4, line 7 skipping to change at line 144
Therefore, it is important that resolvers are able to cope with Therefore, it is important that resolvers are able to cope with
change, even without relying upon configuration updates to be applied change, even without relying upon configuration updates to be applied
by their operator. Root server identifier and address changes are by their operator. Root server identifier and address changes are
the main reasons that resolvers need to use priming to get a full and the main reasons that resolvers need to use priming to get a full and
accurate list of root servers, instead of just using a statically accurate list of root servers, instead of just using a statically
configured list. configured list.
See [RSSAC023v2] for a history of the root server system. See [RSSAC023v2] for a history of the root server system.
Although this document is targeted at the global DNS, it also could Although this document is targeted at the global DNS, it could apply
apply to a private DNS as well. These terms are defined in to a private DNS as well. These terms are defined in [RFC9499].
[RFC9499].
Some systems serve a copy of the full root zone on the same server as Some systems serve a copy of the full root zone on the same server as
the resolver, such as is described in [RFC8806]. In such a setup, the resolver, e.g., as described in [RFC8806]. In such a setup, the
the resolver primes its cache using the same methods as described in resolver primes its cache using the same methods as those described
the rest of this document. in the rest of this document.
2.1. Content of Priming Information 2.1. Content of Priming Information
As described above, the configuration for priming is a list of IP As described above, the configuration for priming is a list of IP
addresses. The priming information in software may be in any format addresses. The priming information in software may be in any format
that gives the software the addresses associated with at least some that gives the software the addresses associated with at least some
of the root server identifiers. of the root server identifiers.
Some software has configuration that also contains the root server Some software has configuration that also contains the root server
identifiers (such as "L.ROOT-SERVERS.NET"), sometimes as comments and identifiers (such as "L.ROOT-SERVERS.NET"), sometimes as comments and
sometimes as data consumed by the software. For example, the "root sometimes as data consumed by the software. For example, the "root
hints file" published by IANA at <https://www.internic.net/domain/ hints file" published by IANA at <https://www.internic.net/domain/
named.root> is derived directly from the root zone and contains all named.root> is derived directly from the root zone and contains all
of the addresses of the root server identifiers found in the root of the addresses of the root server identifiers found in the root
zone. It is in DNS zone file presentation format, and includes the zone. It is in DNS zone file presentation format and includes the
root server identifiers. Although there is no harm to adding these root server identifiers. Although there is no harm in adding these
names, they are not useful in the priming process. names, they are not useful in the priming process.
3. Priming Queries 3. Priming Queries
A priming query is a DNS query whose response provides root server A priming query is a DNS query whose response provides root server
identifiers and addresses. It has a QNAME of ".", a QTYPE of NS, and identifiers and addresses. It has a QNAME of ".", a QTYPE of NS, and
a QCLASS of IN; it is sent to one of the addresses in the a QCLASS of IN; it is sent to one of the addresses in the
configuration for the recursive resolver. The priming query can be configuration for the recursive resolver. The priming query can be
sent over either UDP or TCP. If the query is sent over UDP, the sent over either UDP or TCP. If the query is sent over UDP, the
source port SHOULD be randomly selected (see [RFC5452]) to hamper on- source port SHOULD be randomly selected (see [RFC5452]) to hamper on-
path attacks. DNS cookies [RFC7873] can also be used to hamper on- path attacks. DNS cookies [RFC7873] can also be used to hamper on-
path attacks. The Recursion Desired (RD) bit SHOULD be set to 0. path attacks. The Recursion Desired (RD) bit SHOULD be set to 0.
The meaning when RD is set to 1 is undefined for priming queries and The meaning when RD is set to 1 is undefined for priming queries and
outside the scope of this document. is outside the scope of this document.
The recursive resolver SHOULD use EDNS0 [RFC6891] for priming queries The recursive resolver SHOULD use EDNS0 [RFC6891] for priming queries
and SHOULD announce and handle a reassembly size of at least 1024 and SHOULD announce and handle a reassembly size of at least 1024
octets [RFC3226]. Doing so allows responses that cover the size of a octets [RFC3226]. Doing so allows responses that cover the size of a
full priming response (see Section 4.2) for the current set of root full priming response (see Section 4.2) for the current set of root
servers. See Section 3.3 for discussion of setting the DNSSEC OK servers. See Section 3.3 for discussion of setting the DNSSEC OK
(DO) bit (defined in [RFC4033]). (DO) bit (defined in [RFC4033]).
3.1. Repeating Priming Queries 3.1. Repeating Priming Queries
The recursive resolver SHOULD send a priming query only when it is The recursive resolver SHOULD send a priming query only when it is
needed, such as when the resolver starts with an empty cache or when needed, such as when the resolver starts with an empty cache or when
the NS RRset for the root zone has expired. Because the NS records the NS resource record set (RRset) for the root zone has expired.
for the root zone are not special, the recursive resolver expires Because the NS records for the root zone are not special, the
those NS records according to their TTL values. (Note that a recursive resolver expires those NS records according to their TTL
recursive resolver MAY pre-fetch the NS RRset before it expires.) values. (Note that a recursive resolver MAY pre-fetch the NS RRset
before it expires.)
If a resolver chooses to pre-fetch the root NS RRset before that If a resolver chooses to pre-fetch the root NS RRset before that
RRset has expired in its cache, it needs to choose whether to use the RRset has expired in its cache, it needs to choose whether to use the
addresses for the root NS RRset that it already has in its cache or addresses for the root NS RRset that it already has in its cache or
to use the addresses it has in its configuration. Such a resolver to use the addresses it has in its configuration. Such a resolver
SHOULD send queries to the addresses in its cache in order to reduce SHOULD send queries to the addresses in its cache in order to reduce
the chance of delay due to out-of-date addresses in its the chance of delay due to out-of-date addresses in its
configuration. configuration.
If a priming query does not get a response, the recursive resolver If a priming query does not get a response, the recursive resolver
skipping to change at page 5, line 40 skipping to change at line 225
randomly from the list of addresses. The recursive resolver might randomly from the list of addresses. The recursive resolver might
choose either IPv4 or IPv6 addresses based on its knowledge of choose either IPv4 or IPv6 addresses based on its knowledge of
whether the system on which it is running has adequate connectivity whether the system on which it is running has adequate connectivity
on either type of address. on either type of address.
Note that this recommended method is not the only way to choose from Note that this recommended method is not the only way to choose from
the list in a recursive resolver's configuration. Two other common the list in a recursive resolver's configuration. Two other common
methods include picking the first from the list, and remembering methods include picking the first from the list, and remembering
which address in the list gave the fastest response earlier and using which address in the list gave the fastest response earlier and using
that one. There are probably other methods in use today. However, that one. There are probably other methods in use today. However,
the random method listed above SHOULD be used for priming. the random method SHOULD be used for priming.
3.3. DNSSEC with Priming Queries 3.3. DNSSEC with Priming Queries
The root NS RRset is signed and can be validated by a DNSSEC The root NS RRset is signed and can be validated by a DNSSEC
validating resolver. At the time this document is published, the validating resolver. At the time this document was published, the
addresses for the names in the root NS RRset are in the "root- addresses for the names in the root NS RRset are in the "root-
servers.net" zone. All root servers are also authoritative for the servers.net" zone. All root servers are also authoritative for the
"root-servers.net" zone, which allows priming responses to include "root-servers.net" zone, which allows priming responses to include
the appropriate root name server A and AAAA RRsets. However, because the appropriate root name server A and AAAA RRsets. However, because
at the time this document is published the "root-servers.net" zone is at the time this document was published the "root-servers.net" zone
not signed, the root name server A and AAAA RRsets cannot be is not signed, the root name server A and AAAA RRsets cannot be
validated. An attacker that is able to provide a spoofed priming validated. An attacker that is able to provide a spoofed priming
response can provide alternative A and AAAA RRsets and thus fool a response can provide alternative A and AAAA RRsets and thus fool a
resolver into considering addresses under the control of the attacker resolver into considering addresses under the control of the attacker
to be authoritative for the root zone. to be authoritative for the root zone.
A rogue root name server can view all queries from the resolver to A rogue root name server can view all queries from the resolver to
the root and alter all unsigned parts of responses, such as the the root and alter all unsigned parts of responses, such as the
parent side NS RRsets and glue in referral responses. A resolver can parent-side NS RRsets and glue in referral responses. A resolver can
be fooled into trusting child (TLD) NS addresses that are under the be fooled into trusting child (Top-Level Domain (TLD)) NS addresses
control of the attacker as being authoritative if the resolver: that are under the control of the attacker as being authoritative if
the resolver:
* follows referrals from a rogue root server, * follows referrals from a rogue root server,
* and does not explicitly query the authoritative NS RRset at the * and does not explicitly query the authoritative NS RRset at the
apex of the child (TLD) zone, apex of the child (TLD) zone,
* and does not explicitly query for the authoritative A and AAAA * and does not explicitly query for the authoritative A and AAAA
RRsets for the child (TLD) NS RRsets. RRsets for the child (TLD) NS RRsets.
With such resolvers, an attacker that controls a rogue root server With such resolvers, an attacker that controls a rogue root server
effectively controls the entire domain name space and can view all effectively controls the entire domain name space and can view all
queries and alter all unsigned data undetected unless other queries and alter all unsigned data undetected unless other
protections are configured at the resolver. protections are configured at the resolver.
An attacker controlling a rogue root name server also has complete An attacker controlling a rogue root name server also has complete
control over all unsigned delegations, and over the entire domain control over all unsigned delegations and over the entire domain name
name space in case of non DNSSEC validating resolvers. space in the case of non-DNSSEC validating resolvers.
If the "root-servers.net" zone is later signed, or if the root If the "root-servers.net" zone is later signed or if the root servers
servers are named in a different zone and that zone is signed, having are named in a different zone and that zone is signed, having DNSSEC
DNSSEC validation for the priming queries might be valuable. The validation for the priming queries might be valuable. The benefits
benefits and costs of resolvers validating the responses will depend and costs of resolvers validating the responses will depend heavily
heavily on the naming scheme used. on the naming scheme used.
4. Priming Responses 4. Priming Responses
A priming query is a normal DNS query. Thus, a root server cannot A priming query is a normal DNS query. Thus, a root server cannot
distinguish a priming query from any other query for the root NS distinguish a priming query from any other query for the root NS
RRset. Thus, the root server's response will also be a normal DNS RRset. Thus, the root server's response will also be a normal DNS
response. response.
4.1. Expected Properties of the Priming Response 4.1. Expected Properties of the Priming Response
The priming response MUST have an RCODE of NOERROR, and MUST have the The priming response MUST have an RCODE of NOERROR and MUST have the
Authoritative Answer (AA) bit set. Also, it MUST have an NS RRset in Authoritative Answer (AA) bit set. Also, it MUST have an NS RRset in
the Answer section (because the NS RRset originates from the root the Answer section (because the NS RRset originates from the root
zone), and an empty Authority section (because the NS RRset already zone) and an empty Authority section (because the NS RRset already
appears in the Answer section). There will also be an Additional appears in the Answer section). There will also be an Additional
section with A and/or AAAA RRsets for the root servers pointed at by section with A and/or AAAA RRsets for the root servers pointed at by
the NS RRset. the NS RRset.
Resolver software SHOULD treat the response to the priming query as a Resolver software SHOULD treat the response to the priming query as a
normal DNS response, just as it would use any other data fed to its normal DNS response, just as it would use any other data fed to its
cache. Resolver software SHOULD NOT expect 13 NS RRs because, cache. Resolver software SHOULD NOT expect 13 NS RRs because,
historically, some root servers have returned fewer. historically, some root servers have returned fewer.
4.2. Completeness of the Response 4.2. Completeness of the Response
At the time this document is published, there are 13 root server At the time this document was published, there are 13 root server
operators operating a total of more than 1,500 root server instances. operators operating a total of more than 1500 root server instances.
Each instance has one IPv4 address and one IPv6 address. The Each instance has one IPv4 address and one IPv6 address. The
combined size of all the A and AAAA RRsets exceeds the original combined size of all the A and AAAA RRsets exceeds the original
512-octet payload limit from [RFC1035]. 512-octet payload limit specified in [RFC1035].
In the event of a response where the Additional section omits certain In the event of a response where the Additional section omits certain
root server address information, re-issuing of the priming query does root server address information, reissuing of the priming query does
not help with those root name servers that respond with a fixed order not help with those root name servers that respond with a fixed order
of addresses in the Additional section. Instead, the recursive of addresses in the Additional section. Instead, the recursive
resolver needs to issue direct queries for A and AAAA RRsets for the resolver needs to issue direct queries for A and AAAA RRsets for the
remaining names. At the time this document is published, these remaining names. At the time this document was published, these
RRsets would be authoritatively available from the root name servers. RRsets would be authoritatively available from the root name servers.
If some root server addresses are omitted from the Additional If some root server addresses are omitted from the Additional
section, there is no expectation that the TC bit in the response will section, there is no expectation that the TC bit in the response will
be set to 1. At the time that this document is written, many of the be set to 1. At the time this document was published, many of the
root servers are not setting the TC bit when omitting addresses from root servers are not setting the TC bit when omitting addresses from
the Additional section. the Additional section.
Note that [RFC9471] updates [RFC1035] with respect to the use of the Note that [RFC9471] updates [RFC1034] with respect to the use of the
TC bit. It says "If message size constraints prevent the inclusion TC bit. It says
of all glue records for in-domain name servers, the server must set
the TC (Truncated) flag to inform the client that the response is | If message size constraints prevent the inclusion of all glue
incomplete and that the client should use another transport to | records for in-domain name servers over the chosen transport, the
retrieve the full response." Because the priming response is not a | server MUST set the TC (Truncated) flag to inform the client that
referral, root server addresses in the priming response are not | the response is incomplete and that the client SHOULD use another
considered glue records. Thus, [RFC9471] does not apply to the | transport to retrieve the full response.
priming response and root servers are not required to set the TC bit
if not all root server addresses fit within message size constraints. Because the priming response is not a referral, root server addresses
There are no requirements on the number of root server addresses that in the priming response are not considered glue records. Thus,
a root server must include in a priming response. [RFC9471] does not apply to the priming response and root servers are
not required to set the TC bit if not all root server addresses fit
within message size constraints. There are no requirements on the
number of root server addresses that a root server must include in a
priming response.
5. Post-Priming Strategies 5. Post-Priming Strategies
When a resolver has a zone's NS RRset in cache, and it receives a When a resolver has a zone's NS RRset in its cache and it receives a
query for a domain in that zone that cannot be answered from its query for a domain in that zone that cannot be answered from its
cache, the resolver has to choose which NS to send queries to. (This cache, the resolver has to choose which NS to send queries to. (This
statement is as true for the root zone as for any other zone in the statement is as true for the root zone as for any other zone in the
DNS.) Two common strategies for choosing are "determine the fastest DNS.) Two common strategies for choosing are "determine the fastest
name server and always use it" and "create buckets of fastness and name server and always use it" and "create buckets of fastness and
pick randomly in the buckets". This document gives no preference to pick randomly in the buckets". This document does not specify a
any particular strategy other than to suggest that resolvers not preference for any particular strategy other than to suggest that
treat the root zone as special for this decision. resolvers not treat the root zone as special for this decision.
6. Security Considerations 6. Security Considerations
Spoofing a response to a priming query can be used to redirect all of Spoofing a response to a priming query can be used to redirect all of
the queries originating from a victim recursive resolver to one or the queries originating from a victim recursive resolver to one or
more servers for the attacker. Until the responses to priming more servers for the attacker. Until the responses to priming
queries are protected with DNSSEC, there is no definitive way to queries are protected with DNSSEC, there is no definitive way to
prevent such redirection. prevent such redirection.
An on-path attacker who sees a priming query coming from a resolver An on-path attacker who sees a priming query coming from a resolver
can inject false answers before a root server can give correct can inject false answers before a root server can give correct
answers. If the attacker's answers are accepted, this can set up the answers. If the attacker's answers are accepted, this can set up the
ability to give further false answers for future queries to the ability to give further false answers for future queries to the
resolver. False answers for root servers are more dangerous than, resolver. False answers for root servers are more dangerous than,
say, false answers for Top-Level Domains (TLDs), because the root is say, false answers for TLDs, because the root is the highest node of
the highest node of the DNS. See Section 3.3 for more discussion. the DNS. See Section 3.3 for more discussion.
In both of the scenarios above, a validating resolver will be able to In both of the scenarios listed here, a validating resolver will be
detect the attack if its chain of queries comes to a zone that is able to detect the attack if its chain of queries comes to a zone
signed, but not for those that are unsigned. that is signed, but not for those that are unsigned.
7. IANA Considerations 7. IANA Considerations
This document does not require any IANA actions. This document has no IANA actions.
8. References 8. References
8.1. Normative References 8.1. Normative References
[RFC1034] Mockapetris, P., "Domain names - concepts and facilities", [RFC1034] Mockapetris, P., "Domain names - concepts and facilities",
STD 13, RFC 1034, DOI 10.17487/RFC1034, November 1987, STD 13, RFC 1034, DOI 10.17487/RFC1034, November 1987,
<https://www.rfc-editor.org/info/rfc1034>. <https://www.rfc-editor.org/info/rfc1034>.
[RFC1035] Mockapetris, P., "Domain names - implementation and [RFC1035] Mockapetris, P., "Domain names - implementation and
skipping to change at page 10, line 5 skipping to change at line 430
Glue Requirements in Referral Responses", RFC 9471, Glue Requirements in Referral Responses", RFC 9471,
DOI 10.17487/RFC9471, September 2023, DOI 10.17487/RFC9471, September 2023,
<https://www.rfc-editor.org/info/rfc9471>. <https://www.rfc-editor.org/info/rfc9471>.
[RFC9499] Hoffman, P. and K. Fujiwara, "DNS Terminology", BCP 219, [RFC9499] Hoffman, P. and K. Fujiwara, "DNS Terminology", BCP 219,
RFC 9499, DOI 10.17487/RFC9499, March 2024, RFC 9499, DOI 10.17487/RFC9499, March 2024,
<https://www.rfc-editor.org/info/rfc9499>. <https://www.rfc-editor.org/info/rfc9499>.
8.2. Informative References 8.2. Informative References
[OLD-J] Wessels, D., "Thirteen Years of 'Old J Root'", 2015, [OLD-J] Wessels, D., Castonguay, J., and P. Barber, "Thirteen
Years of 'Old J Root'", DNS-OARC Fall 2015 Workshop,
October 2015,
<https://indico.dns-oarc.net/event/24/contributions/378/>. <https://indico.dns-oarc.net/event/24/contributions/378/>.
[RFC8806] Kumari, W. and P. Hoffman, "Running a Root Server Local to [RFC8806] Kumari, W. and P. Hoffman, "Running a Root Server Local to
a Resolver", RFC 8806, DOI 10.17487/RFC8806, June 2020, a Resolver", RFC 8806, DOI 10.17487/RFC8806, June 2020,
<https://www.rfc-editor.org/info/rfc8806>. <https://www.rfc-editor.org/info/rfc8806>.
[RSSAC023v2] [RSSAC023v2]
"History of the Root Server System", 2016, "History of the Root Server System", A Report from the
ICANN Root Server System Advisory Committee (RSSAC),
RSSAC023v2, June 2020,
<https://www.icann.org/en/system/files/files/rssac- <https://www.icann.org/en/system/files/files/rssac-
023-17jun20-en.pdf>. 023-17jun20-en.pdf>.
[RSSAC026v2] [RSSAC026v2]
"RSSAC Lexicon", 2020, "RSSAC Lexicon", An Advisory from the ICANN Root Server
System Advisory Committee (RSSAC), RSSAC026v2, March 2020,
<https://www.icann.org/en/system/files/files/rssac-026- <https://www.icann.org/en/system/files/files/rssac-026-
lexicon-12mar20-en.pdf>. lexicon-12mar20-en.pdf>.
Appendix A. Changes from RFC 8109 Appendix A. Changes from RFC 8109
This document obsoletes [RFC8109]. The significant changes from RFC This document obsoletes [RFC8109]. The significant changes from RFC
8109 are: 8109 are as follows:
* Added section on the content of priming information. * Added section on the content of priming information.
* Added paragraph about no expectation that the TC bit in responses * Added paragraph about no expectation that the TC bit in responses
will be set. will be set.
* Added paragraph about RFC 9471 and requirements on authoritative * Added paragraph about RFC 9471 and requirements on authoritative
servers and the TC bit. This clarified the role of glue records servers and the TC bit. This clarified the role of glue records
and truncation for responses from the root zone. and truncation for responses from the root zone.
skipping to change at page 10, line 47 skipping to change at line 477
more inclusive and more technically accurate. more inclusive and more technically accurate.
* Clarified that there are other effects of machine-in-the-middle * Clarified that there are other effects of machine-in-the-middle
attacks. attacks.
* Clarified language for root server domain names as "root server * Clarified language for root server domain names as "root server
identifiers". identifiers".
* Added short discussion of post-priming strategies. * Added short discussion of post-priming strategies.
* Added informative references to RSSAC documents. * Added informative references to Root Server System Advisory
Committee (RSSAC) documents.
* Added short discussion about this document and private DNS. * Added short discussion about this document and private DNS.
* Clarified that machine-in-the-middle attacks could be successful * Clarified that machine-in-the-middle attacks could be successful
for non-signed TLDs. for non-signed TLDs.
* Added discussion of where resolvers that pre-fetch should get the * Added discussion of where resolvers that pre-fetch should get the
root NS addresses. root NS addresses.
* Elevated the expectations in "Expected Properties of the Priming * Elevated the expectations in Section 4.1 ("Expected Properties of
Response" to MUST-level. the Priming Response") to MUST-level.
* Clarified that "currently" means at the time that this document is * Clarified that "currently" means "at the time this document was
published. published".
* Added a note about priming and RFC 8806. * Added a note about priming and RFC 8806.
* Added a reference to research about discontinued root server * Added a reference to research about discontinued root server
addresses. addresses.
Appendix B. Acknowledgements Acknowledgements
RFC 8109 was the product of the DNSOP WG and benefitted from the RFC 8109 was the product of the DNSOP WG and benefited from the
reviews done there. This document also benefitted from review by reviews done there. This document also benefited from review by
Duane Wessels. Duane Wessels.
Authors' Addresses Authors' Addresses
Peter Koch Peter Koch
DENIC eG DENIC eG
Kaiserstrasse 75-77 Kaiserstrasse 75-77
60329 Frankfurt 60329 Frankfurt
Germany Germany
Phone: +49 69 27235 0 Phone: +49 69 27235 0
 End of changes. 46 change blocks. 
126 lines changed or deleted 134 lines changed or added

This html diff was produced by rfcdiff 1.48.