<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ye-problems-and-requirements-of-dns-for-ioa-01" category="info" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="Problems and Requirements of DNS for IoA">Problems Statement and Requirements Analysis of DNS for Internet of Agents (IoA)</title>
    <seriesInfo name="Internet-Draft" value="draft-ye-problems-and-requirements-of-dns-for-ioa-01"/>
    <author initials="J." surname="Ye" fullname="Jiaming Ye">
      <organization>China Mobile</organization>
      <address>
        <email>yejiaming@chinamobile.com</email>
      </address>
    </author>
    <author initials="W." surname="Cheng" fullname="Weiqiang Cheng">
      <organization>China Mobile</organization>
      <address>
        <email>chengweiqiang@chinamobile.com</email>
      </address>
    </author>
    <author initials="D." surname="Ma" fullname="Di Ma">
      <organization>ZDNS</organization>
      <address>
        <email>madi@zdns.cn</email>
      </address>
    </author>
    <date year="2025" month="November" day="02"/>
    <area>OPS</area>
    <workgroup>DNSOP</workgroup>
    <keyword>keyword1</keyword>
    <keyword>keyword2</keyword>
    <keyword>keyword3</keyword>
    <abstract>
      <?line 47?>
<t>In the AI-driven era, DNS is supposed to evolve with technological advancements to accommodate the complex and diverse requirements of the IoA. This draft analyzes the issues surrounding DNS in supporting agents collaboration and explores corresponding technical requirements.</t>
    </abstract>
  </front>
  <middle>
    <?line 50?>

<section anchor="intro">
      <name>Introduction</name>
      <t>In the AI-driven era of intelligence, as intelligent agents with autonomous capabilities in perception, decision-making, execution, and learning enter the network, the network ecosystem is undergoing a profound transformation towards intelligentization and autonomization. Agents, as the core interconnected entities in the Internet of Agents (IoA), autonomously discover, efficiently interact, and harmoniously collaborate with human users, other agents, and various tools, enabling flexible resource scheduling and promoting the Internet towards intelligentization and autonomization.</t>
      <t>Currently, the stable operation of the network heavily relies on IP addresses, with the Domain Name System (DNS) serving as a critical network infrastructure responsible for converting human-readable domain names to machine-readable addresses and acting as a bridge for  network resources access. Throughout decades of stable operation and global development, there are a suite of protocols and mechanisms also has been developed to establish a fully matured DNS ecosystem. For examples, DNS-Based Service Discovery (DNS-SD) <xref target="RFC6763"/> is designed to facilitate service discovery, Service Binding (SVCB) and HTTPS <xref target="RFC9640"/>records provide instruction of accessing a service, DNS Security (DNSSEC) <xref target="RFC4033"/> <xref target="RFC4034"/> <xref target="RFC4035"/> ensure data origin authentication and data integrity, and protocols such as DNS over HTTPS (DoH) <xref target="RFC8484"/>, DNS over TLS (DoT) <xref target="RFC7858"/> and DNS over QUIC (DoQ) <xref target="RFC9250"/> supply encrypted transmission and enhance privacy and security. Therefore, in the context of the flourishing development of AI agents, the DNS is supposed to evolve with technological advancements to serve the complex and diverse requirements of the IoA. During interactions and collaborations between humans and agents, agents and agents, DNS as an infrastructure will continue to play a key role, providing technical support for efficient agent registration and discovery, real-time data synchronization, and intelligent scheduling and decision-making. Moreover, its capabilities might be further expanded to achieve semantic awareness, and effective orchestration of agents interactions.</t>
      <t>This draft aims to conduct an in-depth analysis of the issues surrounding the DNS system in supporting agents collaboration and to explore corresponding technical requirements, thereby providing robust support for the large-scale implementation and efficiency enhancement of the IoA.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>DNS: Domain Name System</t>
        <t>DNS-SD: DNS-Based Service Discovery</t>
        <t>EDNS: Extension Mechanisms for DNS</t>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="problem-statement">
      <name>Problem Statement</name>
      <section anchor="identifiers-reconstruction">
        <name>Identifiers Reconstruction</name>
        <t>DNS, centered around domain names and IP addresses, fulfills a crucial role in addressing, mapping domain names to IP addresses. However, the existing IP addresses struggle to identify agents effectively. This because that it is predicted that the number of AI agents will reach the scale of hundreds of billions in the future. Given the limited address space of IPv4, it isinadequate to support large-scale agent deployment and ensure stable connectivity. Even if a full transition to IPv6, which offers abundant address resources, can alleviate the address shortage, issues such as address instability and oversized routing tables will still arise. This is because that the IPv6 interface IDs undergo periodic rotation for security. Additionally, the IPv6 addresses of some physical AI agents, such as embodied intelligent agents, dynamically change with variations of their geographical locations and the network they access. The aforementioned factors make it challenging to uniquely identify an intelligent agent using its IP address.</t>
      </section>
      <section anchor="proliferating-ai-agents">
        <name>Proliferating AI Agents</name>
        <t>With the emergence of new agents, corresponding resource records will be generated accordingly. However, manually adding records to authoritative servers are inefficient and cannot keep pace with the rapid generation of agents. Currently, there is no suitable capability-based registration and discovery.</t>
        <t>On one hand, the most interactions among agents are based on capabilities, but the current names of each level domains in the hierarchical architecture, which primarily convey information, such as organization and region, fails to intuitively grasp and describe their basic functionalities, making it difficult to directly use domain names to register and discover for agents.</t>
        <t>On the other hand, in the Internet, considering the intricate roles and the enormous quantity of devices involved, the current service discovery and registration mechanisms (e.g. DNS-SD) are deficient in essential security authentication capabilities, rendering them ineffective for application in the IoA. Consequently, these situation underscores an urgent necessity for developing a service discovery and registration mechanism specifically tailored to the IoA.</t>
      </section>
      <section anchor="high-density-and-parallel-interaction">
        <name>High-density and Parallel Interaction</name>
        <t>Interactions in IoA exhibit high frequency and complexity. Agent interactions often involve multiple subtask calls within a single task query, triggering multiple DNS queries and significantly increasing the number of queries and densities, accompanied by parallel queries. This high-frequency and concurrent query pattern imposes extremely high demands on the processing performance of the DNS sytem.</t>
      </section>
      <section anchor="dynamically-changing-services">
        <name>Dynamically Changing Services</name>
        <t>As services undergo continuous evolution and agents engage in frequent interactions, the services of agents are developing and upgrading, and their operational states are also in a state of constant change. New services continually emerge, while existing services may be gradually phased out or subject to updates. Meanwhile, agent states may transition from active to inactive, or continuously fluctuate load conditions. However, the resource records (RR) within the existing DNS system remain static and are updated only infrequently, thereby failing to accurately and promptly reflect the latest situations of agents.</t>
      </section>
      <section anchor="upgrade-of-resolution-mode">
        <name>Upgrade of Resolution Mode</name>
        <t>The resolution mechanism of the current DNS system is relatively simplistic and falls short of optimally matching capabilities with resources during agent interactions. When processing multiple resource records associated with the same tree-tuple (name, class, type), existing mechanisms frequently depend on scheduling dimensions such as round-robin, weights, and geographical proximity. Although there are scenarios that take resource load into account, these mechanisms merely offer crude estimations based on simple request counts. Such estimations can significantly deviate from the actual load, thereby leading to reduced scheduling flexibility and accuracy.</t>
      </section>
      <section anchor="security-issues">
        <name>Security Issues</name>
        <t>During the interaction of agents, the underlying security issues should not be overlooked. For example, it is crucial whether an agent's identity is forged, whether the capabilities it registers are genuine, and whether these capabilities accurately correspond to its claimed identity. Any lapses in these areas could potentially expose users to attacks, threats, privacy leakage and other risks, or even lead to widespread network breakdown.</t>
      </section>
    </section>
    <section anchor="requirements-analysis">
      <name>Requirements Analysis</name>
      <t>The proliferation of agents is driving the network towards enhanced efficiency, intelligence, and flexibility. During the processes of autonomous discovery, efficient interaction, and collaborative collaboration among agents as well as between agents and users, new requirements are imposed on the DNS, such as identitication, data structure, and resolution mode. The detailed requirement analysis of the key capabilities required for the DNS within the IoA is as below.</t>
      <section anchor="global-unique-identifier">
        <name>Global Unique Identifier</name>
        <t>It is of paramount importance to assign a unique identity identifier to each agent. Firstly, this immutable ID will effectively isolate the impact caused by the frequent changes of IP addresses or URLs. In addition, while facilitating precise identification and differentiation of individual agents, it also provide a solid foundation for the verification of agent identities.</t>
      </section>
      <section anchor="autonomous-capability-registration-and-discovery">
        <name>Autonomous Capability Registration and Discovery</name>
        <t>As services keep evolving, new agents are constantly emerging, and there will be new agents registered in the Internet at any given time. Therefore, it is of vital importance to achieve automatic capability registration, discovery, and publication of agents without manual intervention.</t>
        <t>One approach is to directly achieve the mapping from agents’ capabilities to their identity identifiers by introducing capability-aware domain names. New domain names ought to incorporate additional hierarchical levels that convey capability-related information, beyond the basic information (such as organizations and regions) typically found in conventional domain names. The newly introduced name levels should be capable of intuitively and succinctly representing the capabilities of a specific type of agent or other distinctive attributes. For example, a domain name designated for an image processing agent might include keywords relevant to image processing, such as "...appname.ImageProcess.organizer." This approach would enable authoritative servers to directly identify and retrieve all image processing agents through domain names when other agents or users are searching for image processing agents, thereby enhancing the efficiency of agent discovery.</t>
        <t>The other involves refining the existing DNS-SD mechanism. Crucially, this mechanism should be enhanced by incorporating authentication and rights verification to effectively prevent counterfeiting and impersonation attacks during the registration and discovery of a large number of agents. Furthermore, the structure "&lt; Service &gt;.&lt; Domain &gt;" defined in <xref target="RFC6763"/> also should intruduce capability-aware service names to handle the mapping from agents’ capabilities to domain names, locating a scope of candidate agents.</t>
      </section>
      <section anchor="information-exchange">
        <name>Information Exchange</name>
        <section anchor="rich-information-metadata">
          <name>Rich-information Metadata</name>
          <t>In addition to utilizing domain names or PTR <xref target="RFC1035"/> to narrow down the scope of agents that provide specific capabilities, there should also be other data presenting more detailed descriptions of these agents, thereby facilitating further decision-making. Therefore, resource records (e.g. SRV, TXT, SVCB) should be capable of carrying extensive metadata, encompassing detailed capability descriptions, configuration parameters, load conditions, and other pertinentially valuable information about the agents. These metadata serves as an agent's "digital business card," providing other agents, users, and schedulers with a comprehensive insight into the agent's information. For example, an agent's RRset could include its processing performance, supported protocol types, and current workload, thereby assisting schedulers and other agents in making well-informed decisions.</t>
          <t>Meanwhile, to gain a better understanding of requester intentions and preferences, it is recommended to incorporate additional information into DNS request messages through Extended DNS (EDNS) <xref target="RFC6891"/> or service-related tags labeled by recursive server or gateways.</t>
        </section>
        <section anchor="data-freshness-maintenance">
          <name>Data Freshness Maintenance</name>
          <t>Given the frequent changes in agent information, a data update mechanism is imperative to guarantee the freshness of data. Within this mechanism, subscription-push <xref target="RFC8490"/>, regular detection and/or periodic reporting should be employed to ensure that the data (e.g. RRset) remains up-to-date. For data with low change frequencies, such as capability descriptions and configurations, real-time updates can be adopted, pushing or reporting relevant resource records when subscribed data undergoes changes. For data with high change frequencies, such as workload and network performance, periodic updates can be utilized to to prevent adverse impacts on network and processing performance. Additionally, to prevent a large number of simultaneous data refreshes across the network, a standby mode can be configured for agents with low usage, thereby reducing network load while maintaining low power consumption.</t>
        </section>
      </section>
      <section anchor="high-performance-resolution-system">
        <name>High-Performance Resolution System</name>
        <t>With the growing number of agents and increasing interaction densities, the entire resolution system must possess high performance, capable of rapidly and accurately processing a large number of concurrent query requests.</t>
      </section>
      <section anchor="multi-dimensional-dynamic-scheduling-strategies">
        <name>Multi-Dimensional Dynamic Scheduling Strategies</name>
        <t>Given the enormous number of agents, selecting the most suitable one from a pool of agents of the same type poses a significant challenge. The DNS for IoA should be equipped with multi-dimensional dynamic scheduling capabilities. It should dynamically select the optimal resolution result based on agent resource records (including capability descriptions, geographical locations, workload, etc.), business demands obtained through EDNS or other labels in pakctes, and in conjunction with network environments and load-balance strategies to achieve appropriate resource allocation.</t>
      </section>
      <section anchor="authentication-and-authorization-mechanism">
        <name>Authentication and Authorization Mechanism</name>
        <t>In agent networks, authentication and authorization are crucial for ensuring network security and reliability. This includes verifying agent IDs and capabilities (e.g., resource records). Strict identity authentication guarantees that only legitimate agents whose IDs are corresponding to their feature can access the network for registration. Meanwhile, capability authentication serves to prevent the advertisement of false capability information, thereby ensuring the accuracy of information about agents. These verifications occur during capabilities registration, with authoritative servers validating the relevant information of service providers to ensure their capability and qualification to provide the corresponding services. Additionally, service consumers (e.g. terminals and other agents) also could validate the received data to prevent tampering during transmission by intermediate third parties. By establishing a robust authentication and authorization mechanism, a secure and reliable network ecosystem can be constructed for IoA.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TBD.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC6763">
          <front>
            <title>DNS-Based Service Discovery</title>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <author fullname="M. Krochmal" initials="M." surname="Krochmal"/>
            <date month="February" year="2013"/>
            <abstract>
              <t>This document specifies how DNS resource records are named and structured to facilitate service discovery. Given a type of service that a client is looking for, and a domain in which the client is looking for that service, this mechanism allows clients to discover a list of named instances of that desired service, using standard DNS queries. This mechanism is referred to as DNS-based Service Discovery, or DNS-SD.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6763"/>
          <seriesInfo name="DOI" value="10.17487/RFC6763"/>
        </reference>
        <reference anchor="RFC9640">
          <front>
            <title>YANG Data Types and Groupings for Cryptography</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="October" year="2024"/>
            <abstract>
              <t>This document presents a YANG 1.1 (RFC 7950) module defining identities, typedefs, and groupings useful to cryptographic applications.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9640"/>
          <seriesInfo name="DOI" value="10.17487/RFC9640"/>
        </reference>
        <reference anchor="RFC4033">
          <front>
            <title>DNS Security Introduction and Requirements</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>The Domain Name System Security Extensions (DNSSEC) add data origin authentication and data integrity to the Domain Name System. This document introduces these extensions and describes their capabilities and limitations. This document also discusses the services that the DNS security extensions do and do not provide. Last, this document describes the interrelationships between the documents that collectively describe DNSSEC. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4033"/>
          <seriesInfo name="DOI" value="10.17487/RFC4033"/>
        </reference>
        <reference anchor="RFC4034">
          <front>
            <title>Resource Records for the DNS Security Extensions</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of resource records and protocol modifications that provide source authentication for the DNS. This document defines the public key (DNSKEY), delegation signer (DS), resource record digital signature (RRSIG), and authenticated denial of existence (NSEC) resource records. The purpose and format of each resource record is described in detail, and an example of each resource record is given.</t>
              <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4034"/>
          <seriesInfo name="DOI" value="10.17487/RFC4034"/>
        </reference>
        <reference anchor="RFC4035">
          <front>
            <title>Protocol Modifications for the DNS Security Extensions</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of new resource records and protocol modifications that add data origin authentication and data integrity to the DNS. This document describes the DNSSEC protocol modifications. This document defines the concept of a signed zone, along with the requirements for serving and resolving by using DNSSEC. These techniques allow a security-aware resolver to authenticate both DNS resource records and authoritative DNS error indications.</t>
              <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4035"/>
          <seriesInfo name="DOI" value="10.17487/RFC4035"/>
        </reference>
        <reference anchor="RFC8484">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="RFC7858">
          <front>
            <title>Specification for DNS over Transport Layer Security (TLS)</title>
            <author fullname="Z. Hu" initials="Z." surname="Hu"/>
            <author fullname="L. Zhu" initials="L." surname="Zhu"/>
            <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="D. Wessels" initials="D." surname="Wessels"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
              <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7858"/>
          <seriesInfo name="DOI" value="10.17487/RFC7858"/>
        </reference>
        <reference anchor="RFC9250">
          <front>
            <title>DNS over Dedicated QUIC Connections</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>This document describes the use of QUIC to provide transport confidentiality for DNS. The encryption provided by QUIC has similar properties to those provided by TLS, while QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides more efficient packet-loss recovery than UDP. DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC 7858, and latency characteristics similar to classic DNS over UDP. This specification describes the use of DoQ as a general-purpose transport for DNS and includes the use of DoQ for stub to recursive, recursive to authoritative, and zone transfer scenarios.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9250"/>
          <seriesInfo name="DOI" value="10.17487/RFC9250"/>
        </reference>
        <reference anchor="RFC1035">
          <front>
            <title>Domain names - implementation and specification</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1035"/>
          <seriesInfo name="DOI" value="10.17487/RFC1035"/>
        </reference>
        <reference anchor="RFC6891">
          <front>
            <title>Extension Mechanisms for DNS (EDNS(0))</title>
            <author fullname="J. Damas" initials="J." surname="Damas"/>
            <author fullname="M. Graff" initials="M." surname="Graff"/>
            <author fullname="P. Vixie" initials="P." surname="Vixie"/>
            <date month="April" year="2013"/>
            <abstract>
              <t>The Domain Name System's wire protocol includes a number of fixed fields whose range has been or soon will be exhausted and does not allow requestors to advertise their capabilities to responders. This document describes backward-compatible mechanisms for allowing the protocol to grow.</t>
              <t>This document updates the Extension Mechanisms for DNS (EDNS(0)) specification (and obsoletes RFC 2671) based on feedback from deployment experience in several implementations. It also obsoletes RFC 2673 ("Binary Labels in the Domain Name System") and adds considerations on the use of extended labels in the DNS.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="75"/>
          <seriesInfo name="RFC" value="6891"/>
          <seriesInfo name="DOI" value="10.17487/RFC6891"/>
        </reference>
        <reference anchor="RFC8490">
          <front>
            <title>DNS Stateful Operations</title>
            <author fullname="R. Bellis" initials="R." surname="Bellis"/>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <author fullname="J. Dickinson" initials="J." surname="Dickinson"/>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="T. Lemon" initials="T." surname="Lemon"/>
            <author fullname="T. Pusateri" initials="T." surname="Pusateri"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>This document defines a new DNS OPCODE for DNS Stateful Operations (DSO). DSO messages communicate operations within persistent stateful sessions using Type Length Value (TLV) syntax. Three TLVs are defined that manage session timeouts, termination, and encryption padding, and a framework is defined for extensions to enable new stateful operations. This document updates RFC 1035 by adding a new DNS header OPCODE that has both different message semantics and a new result code. This document updates RFC 7766 by redefining a session, providing new guidance on connection reuse, and providing a new mechanism for handling session idle timeouts.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8490"/>
          <seriesInfo name="DOI" value="10.17487/RFC8490"/>
        </reference>
      </references>
    </references>
    <?line 167?>

<section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
    </section>
    <section numbered="false" anchor="contributors">
      <name>Contributors</name>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA6Vb7ZIbN3b9z6dAxj8ibZGMJMu2NOXYO5qRV7Olj9mZ0TpO
KpUCu0ESnu4G3egmRblUldfIvzxLHiVPknPvBdBocuR4k63d1bCJBnC/zz0A
Z7PZxHe6Kf9NV64xp6prezMpdGdWrt2fKtss3cT3i9p6b11zu99gzOXL2x8m
dtPyaN89efTo+aMnk0o3q1Nlmsmks12FYVetW1Sm9uqmw3y1aTqFhdS1+aW3
LX/26qzR1d5br9xSXby9UUvXqsumM21jOnp2tuJhDy7d2cOJXixas80mPpou
n8WdTUpXNLrGVspWL7vZ3sw24dUZXp212aszt5yVjZ/h1Zl1evbo8cQtvKtM
Z/zppN+Umv/4QtEfp+rJoydPZo/ov2o242cKQixtVZkSSlO671ytO1voqtqr
xV59qKsn7bJQdqka16mV3ZKmdGv0qXp3dTPZufZu1bp+c0oSvLuaTO52pxOl
ZurO7PFl+Tj/8CT/8CXm6bu1azF+hi9s40/Vn+fqJ4MPIv+fra5ts5JHrl3p
xn7E7lxzqs7XttHqjVvYir40tbbVqdqbn+WVPxb0fc1fzwtXq0m2yI9zvG6a
VVrnR2N/sfCD9Pj3rFXQ2F148zfXu5irNzotdmHl03iNf4b6hrlrXdo/foRh
5wXU3biWjLI1p5MJefbwaTKDGfXCd60uusllo7q1UWeXs7IlQynT6il7Fozs
+83GeZi5c8psXbU1ame7tepMsW5c5VZkdKXLrW6K4JYYqQsIUzv2FJobnzaV
+cAuXGKN1hvVHrgyjYMbz9XtGuuyD2M8Auaj8fwlgrI3tKMWntOUZGHeZCOb
bDt6oiWECldVeuFaVhMvaz5sKtca+qrFPxsnM7AcLEO+n7moqLZlCdshDhCl
rSv7gqf79QtLHz9N7lUdyYLvTVVZ7KUwU6V99qCLW2Q1UuQ0rnY99qU3Gn5g
O2tovNqYtjAbWnCqSlNYykizWt9h11NIY4peviPhKqPbhsQxlE14T0gpFGXT
/IMyhfN7j/REpoUOTbtyrDWFVLEkrSLJ6cYHZ4GsndvpthwJEJyPFw77D4/m
IYOxyGL31vCrbeGaxhQdHIlmiDKyzT+TAKeZcpBVSusLB8+B7MulLSwG4inP
DScWNax1W7vGyguDCwSXXfe1blTv4X1T5bB0G0whL291S29CYlfhkWn0oiLd
LOG4FmkUDuJdD5sojxgue/6SXoTqasfONxLnb9PcZHIOv2ahxGSoU7SogxvI
SyFEoinXRm8txGxNRcrEgMsrxGGJXXqD/UuU4oULpGao+i2yiLoR4z9A3DxU
UMSWZUBpUUVrOX+n+ZExWo0MAZ/vWxYeIeNZEVRwYE8Yg6VmvaK86JJ3XMp6
lLU4F9SakpwZBqRNih6KLm1i0dpyJfOnfUSte0oqeI3yA+J/tXZ9R3GhS8Pp
40hfNPmqcgvIVJqtqdyGQpuVC3k0/Q+Jw8I78DZs2Dl4jOypRlJAkvVUdCvv
4FdeLQzCO0wU0iEvaT2iWC17qnyIGeiq5LSUQm2ufoA85oOmFOg5sc5eaEqp
N2QA+NNFcO09G2Z2c/FQ/frr99c/nH/9zddffvpEsQoh7aqRdZe6oDRBfu3D
DDE44Dtx0hdWEtyDm7+ev3jIYr26vb26CVM///rpo0+fWuySfBTib21JoSoW
D/4mGpcEEZaSwnCD7AOHkQ3fvDyPG3766EvacPrwNP/wFT6YxpM3oTAgT7Z2
JeBhTbFRDGbjryluVrTINEZZsJDvizX5C22EhA5yPbhwr+I+nj19hqWnw5Db
1zzgNg745tlXz7AdmjiN+cv7y3Ma9Jc46PmTr6Ajri4wLnJ5u99QBuMUGTCi
1JZmTeUPe7RbXez5mQ8qIn+Fw8GnobuQ8hA8nfnQxZBeVvBw+BEpOnNVToiX
KUdxLP9/ijJZ8P9Qji+wN2wsZlrILEEyKrEUH92OQoSzQQjtmF0lq+ePSBAK
+eYwz+wAKlk/tukN7XpTaSiU0J9qAVCnwVfHtTsAAM4cqTzIYhBsZQnpDN41
BAtyUjXrbB080u+bAsklwitxvLx0H2T+g7IMvAYrS5Gy3UFFr+1q3UFLSBUt
1x4AEswhRqQUCcPDRFAeQkFp1A7TIPhkD5AJxROWQtBgC0kcilFRbm4eFJMc
Q9mazQ+lEoARnc9KQIu14KvQkHwGYkW3i7jh96EtckwBXL8Lb4WsjM5hsC56
F7RbI9PSXirdrszMYwZsl9yYJshgXrB+sY9RGUMpOjTg3Bfq1rTA+xQq+8kE
4p3eUyb5C2Tj099K2ZPJS3795YcOuY128WYoHrRnAui04qhzew3s30N5ZCjD
vr3jPHzy5v3N7clU/lVv3/Hf1y+Rma5fXtDfN6/OXr9Of0zCiJtX796/vhj+
Gt48f/fmzcu3F/IynqrRo8nJm7OfTsTFTt5d3V6+e3v2+kSyFPmPK3ppZFsO
xUXAcpvWUBrUfoKyBOCwkC7wxfnVf/3n46dInn+H5Pnk8ePnnP3pw7PH31Ap
2CHRy2quQUaVj7DLfqI3G0BY7iUp/vUG9a0SHOnXboe0AveA6f7wL6SZfz1V
3y6KzeOn34UHJPDoYdTZ6CHr7PjJ0cuixHse3bNM0ubo+YGmx/s9+2n0Oeo9
e/jt90gxRs0eP/v+uwm1H4EDGLgFdqnLkurm0iJ/w70Q36l4k+dOVcHdAFmK
o3mMzMgKY8QIDEMtvaDBvrAUo46irImjuPWoYSuuVAc4L59srl65neFESGEH
AO05X+RjFO12tarYtayIso8ZJSW8ah8awgWgHrA75tMdsiuVQfhhabmn4IeM
jvt6gdyaV04pKcj0heBhSR0YsYZOMAMnP6TpistYqNDLnqrRXP2JuzrOO7a2
7PWyf+U3uuBpLq+2T6eyI/TyJcKcu16XMleesaQkIflWbp84ogCKAoINnZLd
Mnh4SevbZYCYAj1s6Mxo6a+B9NcWojloDH6gF5BK08Rhnwk/wx80h5fZ2tiX
J2HW2Cj2Nh0qgGCsOICAodQyQTeU+7z9CH3AtaT3oc0HZcPY+H/0U94E6x0a
kJMxdi8JZUmqvLxILSn1vtbBtpg95HZKpQOkOitLVgLxTdNhssG3qCFwyOSb
NcobVZsMSEXZTL3AGqa8pzlHx72HYwdCi/L5KkAs6hID4pGaYlu1Mm7V6s2a
F6pcoQeQlHdslOiyJgbaJ1BIXoDh2Aa00DmYEGDCkD9hWRirWbF2HXRjf+kN
9bwpVprjraO/ZbQGvx+CTWoekkhll9weYQQUIt32ZPJjbBWxmZY5C5KtMbuk
jXENT41wbB/Y6KgOGE3TU5QU9A0GU/ymXABw07NGsS+ZSN4nBMScHnU1dit9
DXsz0wcZoiPcqRviFO+M2SiOwdTpwga2jJsYwaO5GnfXLROYjeMGUKIuYrX9
bMGV/vOwca4mk3eYHBkajlGK/9UOWGWMkWs3ICQSRObFbDkunKpFL+FQyA5D
QsXWOWNV1A+EXJuyE8BiqwEEBebTH4BVlLBiMkAjUsNRmQVBn75Xif8jVBsD
IKcSWUSSmQYsta3YKhAICuI0rODifhNgr1T94P6QC5G67JtCQjLIJZiYHLm0
ZMC+Ik4EH2B1om4oFxzWEFE6ETOZwjn2gx1Z86QC4W9E/wdEErkrkiQyScSv
RNdRf2m4oA2RaYgiJc4HOZtYqT2pHR2YLZie4s4q2Dda56jjTopLzpKxBw/M
HF1BbOrJCUoTfRm7plyFdamBiQ31QTc8dhXsYJCqlsgIfQHrCH1qfDHqhDq4
c6gDZWlwf2geRaSXkZxzfcHcKPFjLacRlCAq+NgRzRy60hET8LtUgDKJHmkZ
EmkHv3KttDwjOP4KzRFaksbH+nKlW0p+lRhVQoro1iy+ICHeB7ZY2wWcbI0p
1LJlOUMLHtpcqRgr0Xk2gVt2VFvFzKqGf1oMR3QsOu3vFG1ZWFoCQIrSKmEV
+gprUPcIp1qtxB7pbWqV6Gsb3IxoG5Y/0JUFgIiPfjmglfwV0QMbnHl0tIlU
pag5iloJw0NxJdFnh6I30WN5s3i1o+iglslRgTQfOqo92BMrrqTGs2QakTaG
LiwyPyjFnDpCVRjaQaK22HgXWak8p1JJr4VGCdXlzEePGep7aPAp9Ii/6AdW
NMC/ZoW/yMRBrLHpAkMaZx26YImwwVcxY79B4ioZuYawR8pKLCGFHmFqeZXJ
PrE202uYmFE14SkBAXP1FmUxrRzkYNGleHIGrjLIm8bWes81EruRFzZrKQjI
/wRu+sXPiGWu9HL+NkcrqRueLnAoca80VYYEl62rmUfdCpZu5O+pEp42aBor
LitiWUiyyml2EoFRh3j9qMA/uL5+GENhBOgzZqA1nMtpi0RgkDGhUpElNHzE
9YwSEbf8VG0CxoG/9wQgqn1i1jcdk9zLipXDBABU0A0JzOdlnh3yPZuczXcN
SYJ7vXFl6Lfb4eGQqIJvx6jJKQ8C0ZUOZdAT6UDSi4xLzhKMn2kKt+lQeQMX
XDCjN2KBGKsMlHYp3Jo+Sk5z9SPKQB6HKcMcGUd77wrLWk5QyBONgQg3s66n
lx5QiUVhrDRRSt1+Yx5OBytmFWswEHUphlv1nPYqbS08x9AjcHM5Q4dqAR12
hniuQFuNgDFk+UA9FCXjCmCvX60zLt6jWaUDGB/6A8LASVL2VqhHDhb7wOKj
imUbR/SRebgNov4V9oeb2DrSkxF8sf2E7iQ34umg7hsSJn+BmqVx8i5D48Th
xt0TBVPFuxu8uTK6DN6MStcXWDVTnxwmDX2UOHyxl0yaaPVL7sImk8C9BgwT
vWNweAlXzqrVXrJNmCH2cdBzVfIhPHIPVevKuTtTjg4lQveauv7d2sjpWCPL
/L0PPQfPS4BgRbAoDuOwGR1edgnISV7FJD3AijhF9po/eDEL/6Hj4JRGJGOl
4Xtl2grcqIG69cans0TPvqQpL5PUG9cJvKLs/IHqnpz+cabpOl3csQLxBmky
kvcw4B0VH25zeafoY2kkKYy6cbIwTbHDTvyGjrVSi7fAp7vS7eg874v7735I
CtoMvdiYxiXW1m4TQIitYzhLDJRmTnNODw+bKSkNXpb4+6ysh5I5HD1njPjQ
a2UONz0k/LfmkPMdNTvIc4YIgOFUIDsCCAew1F6Ozhy416vlXCPAEGaxYpoJ
dg8AdxoY+3hwMA0gdMjsSPfSZpeGcCe3dGm5I+abONiRL4bBZSKeqSJkJZCw
p/UiY+V2EsB/kvPG99yqZ/wcoCtHGJ00AsPVlHRY2LZjYEUO6SnbAHpIn59F
XJqFWXVqClmbCGHb+lBJiWKp61562csL6cgzEg2LuyqyPlgYdlVMxzCuZMYr
Ai0BOl6orZxSadX769dIlZfMB1qxgqCddCTJiLGlYxGTNp4f7FlKzxyU0fHp
mHJrCRKlnIb8wUgsnkrCzIgWsgRxW4kOol3DaYcVYhglVzGB+TgbXP089fkI
z4MOPyP1c9DKTAMfszGKHHgRdtkIECMCzJFmPM9amPytmBuFNR/dGdDkmHu5
L6XoXGp8ehh9aEvs+KH/hCOkdBcrozRGzdk0D3dGWf2iOlShIBWCpsLZSDbY
ClclBIihfrN15I/Wjzr7uBXmRQJbLBiVp/7vf/+PcahJNwhYfo/Pe/JPG27f
jODUfsaHZCMOQeD5iFUgnNEJLEZN2ch9EJ34wzGXwmxLgCCBOcnWYxTIVsvI
lIXZu0AnCBGSfase3Ee1+Ixr8Q8JjIXmSS7gYOe8dBM2OJbvlqvCrhqUgg3R
d3HvoeIvQmkVqjvncbgr7QsosxBojXhlGiIUiZFpyB9SD8+4cYgyhKDUx5Jh
pPQfqKutXfTcvowghs4FCfcZWJvMXFBjSkU3A7yyiBybYvaKEF24A8iA3Gyp
LSPDHrw5lIyT+XwO/6MV55c06koGzYM5TDs/kRY6ufKOtceXf8xnSMnc1TMu
lkwK2TkGq+oz8pBv8e2VsZPSSdjoShIpV7AKg2PDHkphhOefmXmAoIISoj2z
E9FkuoHLFDgiSwcqhLS7tE16P+v1ZjcXA+aeq3MBjKkEZbRP8sIEWTiOYwjy
to8vfrTcPIyzOhW9rJDBW7dcpqiGmnZpbBdbfSREaAxBI/MJwos9lvS1n+N0
xdH5pCZjZWJX+YMc2decheVyVryvcPJtOhP+bv5tPEX+7oSJvkZS/OgyD1e2
oB4K4Z5C+DirRZItUaNEdVZ/U07NPWwaziWEwCucxDEam9LyJc1Er9KxYpbA
Xn4QOEBfANDaYj3L89sbQCvCYXwTMiZVpjA6bOTj0TEhvPfq9joo5LFcCcJo
dH6to7y9a8IRncsSTcjHEQ2kbDTmRqXcBsWykhfRrxkpZlmO7DigQmGzN/mZ
jjdHMTVCOPEKx9H9j6xYH3MozAXfXP91qm7/6Xaq5F7Wvem6gD64nTNyq4Do
yaBpupjInKCEfpIiK/a5QMyFL+2qD07P6NN0jMAPOKBp1vFs+Gpfap62uup5
b7ntAf7DyUUMk9vQk8tOJV/6cM0nNpInpV0xelnQQRUdLULYcnqSXfwYX80M
7QJXLemjKSvK5VlmeFuzDjqy+EeqReCXU/c6bPuwKg07u772pgudY6w31Hfe
z4VO4/GuGa6mcX0Me408ErVvY4KALBeowUGeQfXpPk88QKFWKgSdGa4cUaxm
9CAEXmlmLtFx0QGKsPr0WwdW6TISHpzmOwEXPpBshjE5HxELxCSXrWsTbyd9
BjnlzsAqpw4p8iqIdq9XZqh3fEGmDJcjH7zkG6ghMT57/hh5gA94OekloNXp
lUdSRoMl9aMldsMPtZjeWWHkTu8ld32hLsjzfkDwrdm53miWliw2mQyH+UfN
jm0SCZdhOy2pQzjMrLpxtyUUslCuqx5xhYVMnD0sT8dJmGGufoyNY14lyYcW
KVZnm96v0/3F54/o/iIKVo+iRGFuili1/sG12QG5iXexspJb0/WCcD1Q7hak
Q3cWSFIRO/zDwNt6SDnr3IwklRjhkRxnaG/jGXg8ZeCUG2HWZ3JPPIgY0o/P
b9wFlpuJtgU5lqPLlVNFamCfbTPhEt47Pnsm6BT0SBeRxGJyzkCzi4EPReJD
j9+SKcYtCxFpmFH8JxMcCCKlLxxyuYRXdCn3LKX55pOWOG2guu/JMkc3HbL5
jtCKt8QR68YwpUOiIrLJFZlZa5334x8G8ClHUyKuiCuJ248Gi8g8+7EC+UHv
+ZpITGZMcdKmoyysMyEFyK1QnRhI0qsbtzN8IOH7ehMuvcezv6vslCnj7ONF
vHRDYQWcwMsdYLRwUzOdruVsaXaeJoe+nW1HhwCB56/puuHGEdkhZ2pje2f1
mS8aVDmD2wk0HSD5kXWOTuRCpgyg6w3R+7OLyK4jvYZjNXUzsMc3hF2BYYka
HpJZOsU+VAq82dCxSYS/fEch3Xig+wuCICE0itegy0CJyRkCtXxyZKhzPjzd
TgkkW/ZDtDwT/dLbzSYeTPARxqzMZAy3bHKGPEd1c3XZxdnyCzkiltwDkAOX
3Jz4k+4aJMY/XgM+xGNS5MecwgF4uv9mzzSr6qYr5g+nA5pJB6kLcn2+mhbq
H98zjy0zFzX5mY++K7qIGqT3/zlcpRCtpd/uNFvbuqZO7k4bmC10xUHjk2uM
yCBqazctH1skBUCFQZLEjh32YWfS+H6MKD8ULIH54X4A78pP72vj9Oh1ZsnC
0QJf0KaSlOeM4fIDN9GV1ZG7lrtjAsZCW7gfuAG6MSY3grLGh2vbMfx+OKfo
sUU3kEwHG081PPQbfGJZQaV8JmRSJlzTOQIvfXy5ORJZS8O/BJEbd3zja0Tn
L7m2Db3o6KQ3c8aDHQZAnRUBucPHP8Tx6aLzEt1P3lGOMc1AEvihMY7HUMIV
HWL8Mb7Pm3P4Ob0Ze+wDAj3nHOOv3e7hU9BdUBM6NOmh1OcbofIWOuLQBwoR
k+ANaT3XHNzilx4T5zRC7CC79aHhItd7WG/jmlK0aE2BTh1fH9fVMXB/KL2n
tBFBMhPkKgzEDgglN6ImLMndXLBI/vuSRfiRG8B/uLZp25L6OEmQL/bD75Ck
8IR78/9rWGYwVEsImiwAq/t+NDhABCFAAkYI13iG48vzcP9KfGQyuX1xwQMu
z96eHX85umpOP7VqnIwcfs5AP8Zc6OKOJjkr7hq3Q0ewkoOjya+nUvhM+Y8n
7Psnn/jSNBYSLtK1nxuE//wPanIMERQ+AAA=

-->

</rfc>
