<?xml version='1.0' encoding='utf-8'?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" version="3" category="bcp" docName="draft-ietf-regext-epp-delete-bcp-10" number="9874" ipr="trust200902" obsoletes="" updates="" submissionType="IETF" xml:lang="en" consensus="true" tocInclude="true" tocDepth="5" sortRefs="true" symRefs="true" prepTime="2025-09-28T18:47:13" indexInclude="true" scripts="Common,Latin">
  <link href="https://datatracker.ietf.org/doc/draft-ietf-regext-epp-delete-bcp-10" rel="prev"/>
  <link href="https://dx.doi.org/10.17487/rfc9874" rel="alternate"/>
  <link href="urn:issn:2070-1721" rel="alternate"/>
  <front>
    <title abbrev="Domain and Host Object Deletion in EPP">Best Practices for Deletion of Domain and Host Objects in the Extensible Provisioning Protocol (EPP)</title>
    <seriesInfo name="RFC" value="9874" stream="IETF"/>
    <seriesInfo name="BCP" value="244" stream="IETF"/>
    <author initials="S." surname="Hollenbeck" fullname="Scott Hollenbeck">
      <organization showOnFrontPage="true">Verisign Labs</organization>
      <address>
        <postal>
          <street>12061 Bluemont Way</street>
          <city>Reston</city>
          <region>VA</region>
          <code>20190</code>
          <country>United States of America</country>
        </postal>
        <email>shollenbeck@verisign.com</email>
        <uri>https://www.verisignlabs.com/</uri>
      </address>
    </author>
    <author initials="W." surname="Carroll" fullname="William Carroll">
      <organization showOnFrontPage="true">Verisign Labs</organization>
      <address>
        <postal>
          <street>12061 Bluemont Way</street>
          <city>Reston</city>
          <region>VA</region>
          <code>20190</code>
          <country>United States of America</country>
        </postal>
        <phone>+1 703 948-3200</phone>
        <email>wicarroll@verisign.com</email>
        <uri>https://verisign.com</uri>
      </address>
    </author>
    <author initials="G." surname="Akiwate" fullname="Gautam Akiwate">
      <organization showOnFrontPage="true">Stanford University</organization>
      <address>
        <postal>
          <street>450 Jane Stanford Way</street>
          <city>Stanford</city>
          <region>CA</region>
          <code>94305</code>
          <country>United States of America</country>
        </postal>
        <phone>+1 650 723-2300</phone>
        <email>gakiwate@cs.stanford.edu</email>
        <uri>https://cs.stanford.edu/~gakiwate/</uri>
      </address>
    </author>
    <date month="09" year="2025"/>
    <area>ART</area>
    <workgroup>regext</workgroup>
    <keyword>EPP</keyword>
    <abstract pn="section-abstract">
      <t indent="0" pn="section-abstract-1">The Extensible Provisioning Protocol (EPP) includes commands for clients to delete
                domain and host objects, both of which are used to publish information in the Domain
                Name System (DNS). EPP also includes guidance for deletions that is intended
                to avoid DNS resolution disruptions and maintain data consistency. However,
                operational relationships between objects can make that guidance difficult to
                implement. Some EPP clients have developed operational practices to delete those
                objects that have unintended impacts on DNS resolution and security. This document
				describes best current practices and proposes new potential practices to delete
				domain and host objects that reduce the risk of DNS resolution failure and maintain
				client-server data consistency.</t>
    </abstract>
    <boilerplate>
      <section anchor="status-of-memo" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.1">
        <name slugifiedName="name-status-of-this-memo">Status of This Memo</name>
        <t indent="0" pn="section-boilerplate.1-1">
            This memo documents an Internet Best Current Practice.
        </t>
        <t indent="0" pn="section-boilerplate.1-2">
            This document is a product of the Internet Engineering Task Force
            (IETF).  It represents the consensus of the IETF community.  It has
            received public review and has been approved for publication by
            the Internet Engineering Steering Group (IESG).  Further information
            on BCPs is available in Section 2 of RFC 7841.
        </t>
        <t indent="0" pn="section-boilerplate.1-3">
            Information about the current status of this document, any
            errata, and how to provide feedback on it may be obtained at
            <eref target="https://www.rfc-editor.org/info/rfc9874" brackets="none"/>.
        </t>
      </section>
      <section anchor="copyright" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.2">
        <name slugifiedName="name-copyright-notice">Copyright Notice</name>
        <t indent="0" pn="section-boilerplate.2-1">
            Copyright (c) 2025 IETF Trust and the persons identified as the
            document authors. All rights reserved.
        </t>
        <t indent="0" pn="section-boilerplate.2-2">
            This document is subject to BCP 78 and the IETF Trust's Legal
            Provisions Relating to IETF Documents
            (<eref target="https://trustee.ietf.org/license-info" brackets="none"/>) in effect on the date of
            publication of this document. Please review these documents
            carefully, as they describe your rights and restrictions with
            respect to this document. Code Components extracted from this
            document must include Revised BSD License text as described in
            Section 4.e of the Trust Legal Provisions and are provided without
            warranty as described in the Revised BSD License.
        </t>
      </section>
    </boilerplate>
    <toc>
      <section anchor="toc" numbered="false" removeInRFC="false" toc="exclude" pn="section-toc.1">
        <name slugifiedName="name-table-of-contents">Table of Contents</name>
        <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1">
          <li pn="section-toc.1-1.1">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.1"><xref derivedContent="1" format="counter" sectionFormat="of" target="section-1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-introduction">Introduction</xref></t>
          </li>
          <li pn="section-toc.1-1.2">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.2.1"><xref derivedContent="2" format="counter" sectionFormat="of" target="section-2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-conventions-used-in-this-do">Conventions Used in This Document</xref></t>
          </li>
          <li pn="section-toc.1-1.3">
            <t indent="0" pn="section-toc.1-1.3.1"><xref derivedContent="3" format="counter" sectionFormat="of" target="section-3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-rationale-for-should-not-be">Rationale for "SHOULD NOT be deleted"</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.3.2">
              <li pn="section-toc.1-1.3.2.1">
                <t indent="0" keepWithNext="true" pn="section-toc.1-1.3.2.1.1"><xref derivedContent="3.1" format="counter" sectionFormat="of" target="section-3.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-dns-considerations">DNS Considerations</xref></t>
              </li>
              <li pn="section-toc.1-1.3.2.2">
                <t indent="0" pn="section-toc.1-1.3.2.2.1"><xref derivedContent="3.2" format="counter" sectionFormat="of" target="section-3.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-client-server-consistency-c">Client-Server Consistency Considerations</xref></t>
              </li>
              <li pn="section-toc.1-1.3.2.3">
                <t indent="0" pn="section-toc.1-1.3.2.3.1"><xref derivedContent="3.3" format="counter" sectionFormat="of" target="section-3.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-relational-consistency-cons">Relational Consistency Considerations</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.4">
            <t indent="0" pn="section-toc.1-1.4.1"><xref derivedContent="4" format="counter" sectionFormat="of" target="section-4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-host-object-renaming-risk">Host Object Renaming Risk</xref></t>
          </li>
          <li pn="section-toc.1-1.5">
            <t indent="0" pn="section-toc.1-1.5.1"><xref derivedContent="5" format="counter" sectionFormat="of" target="section-5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-analysis-of-practices-for-d">Analysis of Practices for Domain and Host Object Deletion</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.5.2">
              <li pn="section-toc.1-1.5.2.1">
                <t indent="0" pn="section-toc.1-1.5.2.1.1"><xref derivedContent="5.1" format="counter" sectionFormat="of" target="section-5.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-renaming-to-sacrificial-hos">Renaming to Sacrificial Hosts</xref></t>
                <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.5.2.1.2">
                  <li pn="section-toc.1-1.5.2.1.2.1">
                    <t indent="0" pn="section-toc.1-1.5.2.1.2.1.1"><xref derivedContent="5.1.1" format="counter" sectionFormat="of" target="section-5.1.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-practice-benefits">Practice Benefits</xref></t>
                  </li>
                  <li pn="section-toc.1-1.5.2.1.2.2">
                    <t indent="0" pn="section-toc.1-1.5.2.1.2.2.1"><xref derivedContent="5.1.2" format="counter" sectionFormat="of" target="section-5.1.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-practice-detriments">Practice Detriments</xref></t>
                  </li>
                  <li pn="section-toc.1-1.5.2.1.2.3">
                    <t indent="0" pn="section-toc.1-1.5.2.1.2.3.1"><xref derivedContent="5.1.3" format="counter" sectionFormat="of" target="section-5.1.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-observed-practices-for-rena">Observed Practices for Renaming to Sacrificial Hosts</xref></t>
                    <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.5.2.1.2.3.2">
                      <li pn="section-toc.1-1.5.2.1.2.3.2.1">
                        <t indent="0" pn="section-toc.1-1.5.2.1.2.3.2.1.1"><xref derivedContent="5.1.3.1" format="counter" sectionFormat="of" target="section-5.1.3.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-renaming-to-external-presum">Renaming to External, Presumed Non-Existent Hosts</xref></t>
                        <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.5.2.1.2.3.2.1.2">
                          <li pn="section-toc.1-1.5.2.1.2.3.2.1.2.1">
                            <t indent="0" pn="section-toc.1-1.5.2.1.2.3.2.1.2.1.1"><xref derivedContent="5.1.3.1.1" format="counter" sectionFormat="of" target="section-5.1.3.1.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-practice-benefits-2">Practice Benefits</xref></t>
                          </li>
                          <li pn="section-toc.1-1.5.2.1.2.3.2.1.2.2">
                            <t indent="0" pn="section-toc.1-1.5.2.1.2.3.2.1.2.2.1"><xref derivedContent="5.1.3.1.2" format="counter" sectionFormat="of" target="section-5.1.3.1.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-practice-detriments-2">Practice Detriments</xref></t>
                          </li>
                        </ul>
                      </li>
                      <li pn="section-toc.1-1.5.2.1.2.3.2.2">
                        <t indent="0" pn="section-toc.1-1.5.2.1.2.3.2.2.1"><xref derivedContent="5.1.3.2" format="counter" sectionFormat="of" target="section-5.1.3.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-renaming-to-as112arpa">Renaming to "AS112.ARPA"</xref></t>
                        <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.5.2.1.2.3.2.2.2">
                          <li pn="section-toc.1-1.5.2.1.2.3.2.2.2.1">
                            <t indent="0" pn="section-toc.1-1.5.2.1.2.3.2.2.2.1.1"><xref derivedContent="5.1.3.2.1" format="counter" sectionFormat="of" target="section-5.1.3.2.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-practice-benefits-3">Practice Benefits</xref></t>
                          </li>
                          <li pn="section-toc.1-1.5.2.1.2.3.2.2.2.2">
                            <t indent="0" pn="section-toc.1-1.5.2.1.2.3.2.2.2.2.1"><xref derivedContent="5.1.3.2.2" format="counter" sectionFormat="of" target="section-5.1.3.2.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-practice-detriments-3">Practice Detriments</xref></t>
                          </li>
                        </ul>
                      </li>
                      <li pn="section-toc.1-1.5.2.1.2.3.2.3">
                        <t indent="0" pn="section-toc.1-1.5.2.1.2.3.2.3.1"><xref derivedContent="5.1.3.3" format="counter" sectionFormat="of" target="section-5.1.3.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-renaming-to-non-authoritati">Renaming to Non-Authoritative Hosts</xref></t>
                        <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.5.2.1.2.3.2.3.2">
                          <li pn="section-toc.1-1.5.2.1.2.3.2.3.2.1">
                            <t indent="0" pn="section-toc.1-1.5.2.1.2.3.2.3.2.1.1"><xref derivedContent="5.1.3.3.1" format="counter" sectionFormat="of" target="section-5.1.3.3.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-practice-benefits-4">Practice Benefits</xref></t>
                          </li>
                          <li pn="section-toc.1-1.5.2.1.2.3.2.3.2.2">
                            <t indent="0" pn="section-toc.1-1.5.2.1.2.3.2.3.2.2.1"><xref derivedContent="5.1.3.3.2" format="counter" sectionFormat="of" target="section-5.1.3.3.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-practice-detriments-4">Practice Detriments</xref></t>
                          </li>
                        </ul>
                      </li>
                      <li pn="section-toc.1-1.5.2.1.2.3.2.4">
                        <t indent="0" pn="section-toc.1-1.5.2.1.2.3.2.4.1"><xref derivedContent="5.1.3.4" format="counter" sectionFormat="of" target="section-5.1.3.4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-renaming-to-client-maintain">Renaming to Client-Maintained Dedicated Sacrificial Name Server Host Objects</xref></t>
                        <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.5.2.1.2.3.2.4.2">
                          <li pn="section-toc.1-1.5.2.1.2.3.2.4.2.1">
                            <t indent="0" pn="section-toc.1-1.5.2.1.2.3.2.4.2.1.1"><xref derivedContent="5.1.3.4.1" format="counter" sectionFormat="of" target="section-5.1.3.4.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-practice-benefits-5">Practice Benefits</xref></t>
                          </li>
                          <li pn="section-toc.1-1.5.2.1.2.3.2.4.2.2">
                            <t indent="0" pn="section-toc.1-1.5.2.1.2.3.2.4.2.2.1"><xref derivedContent="5.1.3.4.2" format="counter" sectionFormat="of" target="section-5.1.3.4.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-practice-detriments-5">Practice Detriments</xref></t>
                          </li>
                        </ul>
                      </li>
                    </ul>
                  </li>
                  <li pn="section-toc.1-1.5.2.1.2.4">
                    <t indent="0" pn="section-toc.1-1.5.2.1.2.4.1"><xref derivedContent="5.1.4" format="counter" sectionFormat="of" target="section-5.1.4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-potential-practices-for-ren">Potential Practices for Renaming to Sacrificial Hosts</xref></t>
                    <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.5.2.1.2.4.2">
                      <li pn="section-toc.1-1.5.2.1.2.4.2.1">
                        <t indent="0" pn="section-toc.1-1.5.2.1.2.4.2.1.1"><xref derivedContent="5.1.4.1" format="counter" sectionFormat="of" target="section-5.1.4.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-renaming-to-pseudo-tld">Renaming to Pseudo-TLD</xref></t>
                        <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.5.2.1.2.4.2.1.2">
                          <li pn="section-toc.1-1.5.2.1.2.4.2.1.2.1">
                            <t indent="0" pn="section-toc.1-1.5.2.1.2.4.2.1.2.1.1"><xref derivedContent="5.1.4.1.1" format="counter" sectionFormat="of" target="section-5.1.4.1.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-practice-benefits-6">Practice Benefits</xref></t>
                          </li>
                          <li pn="section-toc.1-1.5.2.1.2.4.2.1.2.2">
                            <t indent="0" pn="section-toc.1-1.5.2.1.2.4.2.1.2.2.1"><xref derivedContent="5.1.4.1.2" format="counter" sectionFormat="of" target="section-5.1.4.1.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-practice-detriments-6">Practice Detriments</xref></t>
                          </li>
                        </ul>
                      </li>
                      <li pn="section-toc.1-1.5.2.1.2.4.2.2">
                        <t indent="0" pn="section-toc.1-1.5.2.1.2.4.2.2.1"><xref derivedContent="5.1.4.2" format="counter" sectionFormat="of" target="section-5.1.4.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-renaming-to-existing-specia">Renaming to Existing Special-Use TLD</xref></t>
                        <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.5.2.1.2.4.2.2.2">
                          <li pn="section-toc.1-1.5.2.1.2.4.2.2.2.1">
                            <t indent="0" pn="section-toc.1-1.5.2.1.2.4.2.2.2.1.1"><xref derivedContent="5.1.4.2.1" format="counter" sectionFormat="of" target="section-5.1.4.2.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-renaming-to-reserved-tld">Renaming to Reserved TLD</xref></t>
                          </li>
                        </ul>
                      </li>
                      <li pn="section-toc.1-1.5.2.1.2.4.2.3">
                        <t indent="0" pn="section-toc.1-1.5.2.1.2.4.2.3.1"><xref derivedContent="5.1.4.3" format="counter" sectionFormat="of" target="section-5.1.4.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-renaming-to-a-special-use-d">Renaming to a Special-Use Domain</xref></t>
                        <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.5.2.1.2.4.2.3.2">
                          <li pn="section-toc.1-1.5.2.1.2.4.2.3.2.1">
                            <t indent="0" pn="section-toc.1-1.5.2.1.2.4.2.3.2.1.1"><xref derivedContent="5.1.4.3.1" format="counter" sectionFormat="of" target="section-5.1.4.3.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-practice-benefits-8">Practice Benefits</xref></t>
                          </li>
                          <li pn="section-toc.1-1.5.2.1.2.4.2.3.2.2">
                            <t indent="0" pn="section-toc.1-1.5.2.1.2.4.2.3.2.2.1"><xref derivedContent="5.1.4.3.2" format="counter" sectionFormat="of" target="section-5.1.4.3.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-practice-detriments-8">Practice Detriments</xref></t>
                          </li>
                        </ul>
                      </li>
                      <li pn="section-toc.1-1.5.2.1.2.4.2.4">
                        <t indent="0" pn="section-toc.1-1.5.2.1.2.4.2.4.1"><xref derivedContent="5.1.4.4" format="counter" sectionFormat="of" target="section-5.1.4.4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-renaming-to-community-sacri">Renaming to Community Sacrificial Name Server Service</xref></t>
                        <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.5.2.1.2.4.2.4.2">
                          <li pn="section-toc.1-1.5.2.1.2.4.2.4.2.1">
                            <t indent="0" pn="section-toc.1-1.5.2.1.2.4.2.4.2.1.1"><xref derivedContent="5.1.4.4.1" format="counter" sectionFormat="of" target="section-5.1.4.4.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-practice-benefits-9">Practice Benefits</xref></t>
                          </li>
                          <li pn="section-toc.1-1.5.2.1.2.4.2.4.2.2">
                            <t indent="0" pn="section-toc.1-1.5.2.1.2.4.2.4.2.2.1"><xref derivedContent="5.1.4.4.2" format="counter" sectionFormat="of" target="section-5.1.4.4.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-practice-detriments-9">Practice Detriments</xref></t>
                          </li>
                        </ul>
                      </li>
                    </ul>
                  </li>
                </ul>
              </li>
              <li pn="section-toc.1-1.5.2.2">
                <t indent="0" pn="section-toc.1-1.5.2.2.1"><xref derivedContent="5.2" format="counter" sectionFormat="of" target="section-5.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-deletion-of-hosts">Deletion of Hosts</xref></t>
                <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.5.2.2.2">
                  <li pn="section-toc.1-1.5.2.2.2.1">
                    <t indent="0" pn="section-toc.1-1.5.2.2.2.1.1"><xref derivedContent="5.2.1" format="counter" sectionFormat="of" target="section-5.2.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-observed-practices-for-dele">Observed Practices for Deletion of Hosts</xref></t>
                    <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.5.2.2.2.1.2">
                      <li pn="section-toc.1-1.5.2.2.2.1.2.1">
                        <t indent="0" pn="section-toc.1-1.5.2.2.2.1.2.1.1"><xref derivedContent="5.2.1.1" format="counter" sectionFormat="of" target="section-5.2.1.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-implicit-deletion-of-affect">Implicit Deletion of Affected Host Objects</xref></t>
                        <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.5.2.2.2.1.2.1.2">
                          <li pn="section-toc.1-1.5.2.2.2.1.2.1.2.1">
                            <t indent="0" pn="section-toc.1-1.5.2.2.2.1.2.1.2.1.1"><xref derivedContent="5.2.1.1.1" format="counter" sectionFormat="of" target="section-5.2.1.1.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-practice-benefits-10">Practice Benefits</xref></t>
                          </li>
                          <li pn="section-toc.1-1.5.2.2.2.1.2.1.2.2">
                            <t indent="0" pn="section-toc.1-1.5.2.2.2.1.2.1.2.2.1"><xref derivedContent="5.2.1.1.2" format="counter" sectionFormat="of" target="section-5.2.1.1.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-practice-detriments-10">Practice Detriments</xref></t>
                          </li>
                        </ul>
                      </li>
                      <li pn="section-toc.1-1.5.2.2.2.1.2.2">
                        <t indent="0" pn="section-toc.1-1.5.2.2.2.1.2.2.1"><xref derivedContent="5.2.1.2" format="counter" sectionFormat="of" target="section-5.2.1.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-inform-affected-clients">Inform Affected Clients</xref></t>
                        <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.5.2.2.2.1.2.2.2">
                          <li pn="section-toc.1-1.5.2.2.2.1.2.2.2.1">
                            <t indent="0" pn="section-toc.1-1.5.2.2.2.1.2.2.2.1.1"><xref derivedContent="5.2.1.2.1" format="counter" sectionFormat="of" target="section-5.2.1.2.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-practice-benefits-11">Practice Benefits</xref></t>
                          </li>
                          <li pn="section-toc.1-1.5.2.2.2.1.2.2.2.2">
                            <t indent="0" pn="section-toc.1-1.5.2.2.2.1.2.2.2.2.1"><xref derivedContent="5.2.1.2.2" format="counter" sectionFormat="of" target="section-5.2.1.2.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-practice-detriments-11">Practice Detriments</xref></t>
                          </li>
                        </ul>
                      </li>
                    </ul>
                  </li>
                  <li pn="section-toc.1-1.5.2.2.2.2">
                    <t indent="0" pn="section-toc.1-1.5.2.2.2.2.1"><xref derivedContent="5.2.2" format="counter" sectionFormat="of" target="section-5.2.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-potential-practices-for-del">Potential Practices for Deletion of Hosts</xref></t>
                    <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.5.2.2.2.2.2">
                      <li pn="section-toc.1-1.5.2.2.2.2.2.1">
                        <t indent="0" pn="section-toc.1-1.5.2.2.2.2.2.1.1"><xref derivedContent="5.2.2.1" format="counter" sectionFormat="of" target="section-5.2.2.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-request-explicit-deletion-o">Request Explicit Deletion of Affected Host Objects</xref></t>
                        <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.5.2.2.2.2.2.1.2">
                          <li pn="section-toc.1-1.5.2.2.2.2.2.1.2.1">
                            <t indent="0" pn="section-toc.1-1.5.2.2.2.2.2.1.2.1.1"><xref derivedContent="5.2.2.1.1" format="counter" sectionFormat="of" target="section-5.2.2.1.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-practice-benefits-12">Practice Benefits</xref></t>
                          </li>
                          <li pn="section-toc.1-1.5.2.2.2.2.2.1.2.2">
                            <t indent="0" pn="section-toc.1-1.5.2.2.2.2.2.1.2.2.1"><xref derivedContent="5.2.2.1.2" format="counter" sectionFormat="of" target="section-5.2.2.1.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-practice-detriments-12">Practice Detriments</xref></t>
                          </li>
                        </ul>
                      </li>
                      <li pn="section-toc.1-1.5.2.2.2.2.2.2">
                        <t indent="0" pn="section-toc.1-1.5.2.2.2.2.2.2.1"><xref derivedContent="5.2.2.2" format="counter" sectionFormat="of" target="section-5.2.2.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-provide-additional-deletion">Provide Additional Deletion Details</xref></t>
                        <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.5.2.2.2.2.2.2.2">
                          <li pn="section-toc.1-1.5.2.2.2.2.2.2.2.1">
                            <t indent="0" pn="section-toc.1-1.5.2.2.2.2.2.2.2.1.1"><xref derivedContent="5.2.2.2.1" format="counter" sectionFormat="of" target="section-5.2.2.2.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-practice-benefits-13">Practice Benefits</xref></t>
                          </li>
                          <li pn="section-toc.1-1.5.2.2.2.2.2.2.2.2">
                            <t indent="0" pn="section-toc.1-1.5.2.2.2.2.2.2.2.2.1"><xref derivedContent="5.2.2.2.2" format="counter" sectionFormat="of" target="section-5.2.2.2.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-practice-detriments-13">Practice Detriments</xref></t>
                          </li>
                        </ul>
                      </li>
                      <li pn="section-toc.1-1.5.2.2.2.2.2.3">
                        <t indent="0" pn="section-toc.1-1.5.2.2.2.2.2.3.1"><xref derivedContent="5.2.2.3" format="counter" sectionFormat="of" target="section-5.2.2.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-allow-explicit-deletion-of-">Allow Explicit Deletion of a Domain with Restore Capability</xref></t>
                        <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.5.2.2.2.2.2.3.2">
                          <li pn="section-toc.1-1.5.2.2.2.2.2.3.2.1">
                            <t indent="0" pn="section-toc.1-1.5.2.2.2.2.2.3.2.1.1"><xref derivedContent="5.2.2.3.1" format="counter" sectionFormat="of" target="section-5.2.2.3.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-practice-benefits-14">Practice Benefits</xref></t>
                          </li>
                          <li pn="section-toc.1-1.5.2.2.2.2.2.3.2.2">
                            <t indent="0" pn="section-toc.1-1.5.2.2.2.2.2.3.2.2.1"><xref derivedContent="5.2.2.3.2" format="counter" sectionFormat="of" target="section-5.2.2.3.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-practice-detriments-14">Practice Detriments</xref></t>
                          </li>
                        </ul>
                      </li>
                    </ul>
                  </li>
                </ul>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.6">
            <t indent="0" pn="section-toc.1-1.6.1"><xref derivedContent="6" format="counter" sectionFormat="of" target="section-6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-recommendations">Recommendations</xref></t>
          </li>
          <li pn="section-toc.1-1.7">
            <t indent="0" pn="section-toc.1-1.7.1"><xref derivedContent="7" format="counter" sectionFormat="of" target="section-7"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-iana-considerations">IANA Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.8">
            <t indent="0" pn="section-toc.1-1.8.1"><xref derivedContent="8" format="counter" sectionFormat="of" target="section-8"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-security-considerations">Security Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.9">
            <t indent="0" pn="section-toc.1-1.9.1"><xref derivedContent="9" format="counter" sectionFormat="of" target="section-9"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-references">References</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.9.2">
              <li pn="section-toc.1-1.9.2.1">
                <t indent="0" pn="section-toc.1-1.9.2.1.1"><xref derivedContent="9.1" format="counter" sectionFormat="of" target="section-9.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-normative-references">Normative References</xref></t>
              </li>
              <li pn="section-toc.1-1.9.2.2">
                <t indent="0" pn="section-toc.1-1.9.2.2.1"><xref derivedContent="9.2" format="counter" sectionFormat="of" target="section-9.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-informative-references">Informative References</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.10">
            <t indent="0" pn="section-toc.1-1.10.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.a"/><xref derivedContent="" format="title" sectionFormat="of" target="name-acknowledgments">Acknowledgments</xref></t>
          </li>
          <li pn="section-toc.1-1.11">
            <t indent="0" pn="section-toc.1-1.11.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.b"/><xref derivedContent="" format="title" sectionFormat="of" target="name-authors-addresses">Authors' Addresses</xref></t>
          </li>
        </ul>
      </section>
    </toc>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" removeInRFC="false" toc="include" pn="section-1">
      <name slugifiedName="name-introduction">Introduction</name>
      <t indent="0" pn="section-1-1"><xref target="RFC5731" section="3.2.2" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc5731#section-3.2.2" derivedContent="RFC5731"/> contains text that has led some
                domain name registrars (acting as EPP clients) to adopt an operational practice of
                renaming name server host objects so that they can delete domain objects:</t>
      <blockquote pn="section-1-2">
        <t indent="0" pn="section-1-2.1">A domain object <bcp14>SHOULD NOT</bcp14> be deleted if subordinate host objects are associated
                with the domain object. For example, if domain "example.com" exists and host object
                "ns1.example.com" also exists, then domain "example.com" <bcp14>SHOULD NOT</bcp14> be deleted until
                host "ns1.example.com" has either been deleted or renamed to exist in a different
                superordinate domain.</t>
      </blockquote>
      <t indent="0" pn="section-1-3">Similarly, <xref target="RFC5732" section="3.2.2" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc5732#section-3.2.2" derivedContent="RFC5732"/> contains this text
                regarding deletion of host objects:</t>
      <blockquote pn="section-1-4">
        <t indent="0" pn="section-1-4.1">A host name object <bcp14>SHOULD NOT</bcp14> be deleted if the host object is associated with any
                other object. For example, if the host object is associated with a domain object,
                the host object <bcp14>SHOULD NOT</bcp14> be deleted until the existing association has been
                broken. Deleting a host object without first breaking existing associations can
                cause DNS resolution failure for domain objects that refer to the deleted host
                object.</t>
      </blockquote>
      <t indent="0" pn="section-1-5">These recommendations create a dilemma when the sponsoring client for "example.com"
                intends to delete "example.com" but its associated host object "ns1.example.com" is
                also associated with domain objects sponsored by another client. It is advised not
                to delete the host object due to its associated domain objects. However, the
                associated domain objects cannot be directly updated because they are sponsored by
                another client. This situation affects all EPP operators that have implemented
                support for host objects.</t>
      <t indent="0" pn="section-1-6"><xref target="RFC5732" section="3.2.5" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc5732#section-3.2.5" derivedContent="RFC5732"/> describes host object renaming:</t>
      <blockquote pn="section-1-7">
        <t indent="0" pn="section-1-7.1">Host name changes can have an impact on associated objects that refer to the host
                object. A host name change <bcp14>SHOULD NOT</bcp14> require additional updates of associated
                objects to preserve existing associations, with one exception: changing an external
                host object that has associations with objects that are sponsored by a different
                client. Attempts to update such hosts directly <bcp14>MUST</bcp14> fail with EPP error code 2305.
                The change can be provisioned by creating a new external host with a new name and
                any needed new attributes, and subsequently updating the other objects sponsored by
                the client.</t>
      </blockquote>
      <t indent="0" pn="section-1-8"><xref target="RFC5732" section="1.1" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc5732#section-1.1" derivedContent="RFC5732"/> includes a description of external hosts. Some EPP
                clients have developed operational practices that use host object renaming to break
                association between a domain object and host object. Note that the specific
                method used to rename the host object can create DNS delegation failures and introduce
                risks of loss of management control. If the new external host refers
                to an unregistered domain, then a malicious actor may register the domain and create
                the host object to gain control of DNS resolution for the domain previously associated
                with "ns1.example.com". If the new external host offers an authoritative DNS service but
                the domain is not assigned to an account, then a malicious actor may add the domain
                to a service account and gain control of (i.e., hijack) DNS resolution functionality. If the
                new external host
                offers recursive DNS service or no DNS service, then DNS requests for the domain
                will result in SERVFAIL messages or other errors. Aggressive requeries by DNS
                resolvers may then create large numbers of spurious DNS queries for an unresolvable
                domain. Note that renaming a host object to a name of an external host cannot be
            reversed by the EPP client.</t>
      <t indent="0" pn="section-1-9">This document describes the rationale for the "<bcp14>SHOULD NOT</bcp14> be deleted" text in <xref target="RFC5731" format="default" sectionFormat="of" derivedContent="RFC5731"/> and <xref target="RFC5732" format="default" sectionFormat="of" derivedContent="RFC5732"/> as well as the risk 
                associated with host object renaming. <xref target="practice-analysis" format="default" sectionFormat="of" derivedContent="Section 5"/> includes a detailed analysis 
                of the practices that have been and can be used to mitigate that risk. 
                <xref target="recommendations" format="default" sectionFormat="of" derivedContent="Section 6"/> includes specific recommendations for the best practices.</t>
    </section>
    <section numbered="true" removeInRFC="false" toc="include" pn="section-2">
      <name slugifiedName="name-conventions-used-in-this-do">Conventions Used in This Document</name>
      <t indent="0" pn="section-2-1">
    The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
    "<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
    described in BCP 14 <xref target="RFC2119" format="default" sectionFormat="of" derivedContent="RFC2119"/> <xref target="RFC8174" format="default" sectionFormat="of" derivedContent="RFC8174"/> 
    when, and only when, they appear in all capitals, as shown here.
      </t>
    </section>
    <section anchor="rationale" numbered="true" removeInRFC="false" toc="include" pn="section-3">
      <name slugifiedName="name-rationale-for-should-not-be">Rationale for "<bcp14>SHOULD NOT</bcp14> be deleted"</name>
      <section anchor="dns-cons" numbered="true" removeInRFC="false" toc="include" pn="section-3.1">
        <name slugifiedName="name-dns-considerations">DNS Considerations</name>
        <t indent="0" pn="section-3.1-1">The primary consideration when deleting domain and host objects concerns the
                    potential impact on DNS resolution. Deletion of a domain object will make all
                    name servers associated with subordinate host objects unresolvable. Deletion of
                    a host object will make any domain that has been delegated to the associated
                    name server unresolvable. The text in <xref target="RFC5731" format="default" sectionFormat="of" derivedContent="RFC5731"/> and <xref target="RFC5732" format="default" sectionFormat="of" derivedContent="RFC5732"/> was written to
                    encourage clients to take singular, discrete steps to delete objects in a way
                    that avoids breaking DNS resolution functionality. Additionally, allowing host
                    objects to exist after deletion of their superordinate domain object invites
                    hijacking, as a malicious actor may reregister the domain object, potentially
                    controlling resolution for the host objects and for their associated domain
                    objects. It also creates orphan glue as described in <xref target="SAC048" format="default" sectionFormat="of" derivedContent="SAC048"/>.</t>
      </section>
      <section anchor="client-server-cons" numbered="true" removeInRFC="false" toc="include" pn="section-3.2">
        <name slugifiedName="name-client-server-consistency-c">Client-Server Consistency Considerations</name>
        <t indent="0" pn="section-3.2-1">A server that implicitly deletes subordinate host objects in response to a
                    request to delete a domain object can create a data inconsistency condition in
                    which the EPP client and the EPP server have different views of what remains
                    registered after processing a &lt;delete&gt; command. The text in <xref target="RFC5731" format="default" sectionFormat="of" derivedContent="RFC5731"/> and
                    <xref target="RFC5732" format="default" sectionFormat="of" derivedContent="RFC5732"/> was written to encourage clients to take singular, discrete steps to delete
                    objects in a way that maintains client-server data consistency. Experience
					suggests that this inconsistency poses little operational risk.</t>
      </section>
      <section anchor="relational-cons" numbered="true" removeInRFC="false" toc="include" pn="section-3.3">
        <name slugifiedName="name-relational-consistency-cons">Relational Consistency Considerations</name>
        <t indent="0" pn="section-3.3-1">Implementations of EPP can have dependencies on the hierarchical domain
                    object / host object relationship, which can exist in a relational database. In such
                    instances, deletion of a domain object without addressing the existing
                    subordinate host objects can cause relational consistency and integrity issues.
                    The text in <xref target="RFC5731" format="default" sectionFormat="of" derivedContent="RFC5731"/> and <xref target="RFC5732" format="default" sectionFormat="of" derivedContent="RFC5732"/> was written to reduce the risk of these issues
                    arising as a result of implicit object deletion.</t>
      </section>
    </section>
    <section anchor="renaming-risk" numbered="true" removeInRFC="false" toc="include" pn="section-4">
      <name slugifiedName="name-host-object-renaming-risk">Host Object Renaming Risk</name>
      <t indent="0" pn="section-4-1">As described in <xref target="RFC5731" format="default" sectionFormat="of" derivedContent="RFC5731"/>, it is possible to delete a domain object that has associated
                host objects that are managed by other clients by renaming the host object to exist
                in a different superordinate domain. This is commonly required when the sponsoring
                client is unable to disassociate a host object from a domain object managed by
                another client because only the second client is authorized to make changes to their
                domain object and the EPP server requires host object disassociation to process a
                request to delete a domain object. For example:</t>
      <t indent="0" pn="section-4-2">Domain object "domain1.example" is registered by ClientX.</t>
      <t indent="0" pn="section-4-3">Domain object "domain2.example" is registered by ClientY.</t>
      <t indent="0" pn="section-4-4">Subordinate host object "ns1.domain1.example" is registered and associated with
                domain object "domain1.example" by ClientX.</t>
      <t indent="0" pn="section-4-5">Host object "ns1.domain1.example" is associated with domain object "domain2.example"
                by ClientY.</t>
      <t indent="0" pn="section-4-6">ClientX wishes to delete domain object "domain1.example". It can modify domain object
                "domain1.example" to remove the association of host object "ns1.domain1.example",
                but
                ClientX cannot remove the association of host object "ns1.domain1.example" from
                domain
                object "domain2.example" because "domain2.example" is sponsored by ClientY and
                ClientX is unable to determine that relationship. Only ClientY can
                modify domain object "domain2.example", and if they do not do so, ClientX will need
                to
                rename host object "ns1.domain1.example" so that "domain1.example" can be deleted.</t>
      <t indent="0" pn="section-4-7">ClientX renames host object "ns1.domain1.example" to "ns1.example.org", creating an
                external host and meeting the EPP server's subordinate host object disassociation
                requirement. The renamed host object "ns1.example.org" is referred to as a "sacrificial"
                host <xref target="Risky-BIZness" format="default" sectionFormat="of" derivedContent="Risky-BIZness"/>.</t>
      <t indent="0" pn="section-4-8">If domain "example.org" does not exist, this practice introduces a risk of DNS
                resolution hijacking if someone were to register the "example.org" domain and create
                a subordinate
                host object named "ns1.example.org". That name server would receive DNS queries for
                all domains delegated to it, allowing the operator of the name server to respond in
                potentially malicious ways.</t>
    </section>
    <section anchor="practice-analysis" numbered="true" removeInRFC="false" toc="include" pn="section-5">
      <name slugifiedName="name-analysis-of-practices-for-d">Analysis of Practices for Domain and Host Object Deletion</name>
      <t indent="0" pn="section-5-1">EPP servers can employ a range of practices for domain
                and host object deletion. Notably, the scope of any practice
                discussed here is the EPP server that adopts the practice, the
                domains managed by it, and the associated host objects where "associated" is described in <xref target="RFC5731" format="default" sectionFormat="of" derivedContent="RFC5731"/> and <xref target="RFC5732" format="default" sectionFormat="of" derivedContent="RFC5732"/>. The practices described in this document fall into two broad
                categories: renaming objects to use sacrificial hosts and allowing objects to be
                deleted even if there are existing data relationships. These practice categories are
                described in the following sections. 
                For a broader consideration of practices and potential impacts on registries and registrars, 
                <xref target="SAC125" format="default" sectionFormat="of" derivedContent="SAC125"/> 
                offers some complementary insight.
      </t>
      <section anchor="renaming-overall" numbered="true" removeInRFC="false" toc="include" pn="section-5.1">
        <name slugifiedName="name-renaming-to-sacrificial-hos">Renaming to Sacrificial Hosts</name>
        <t indent="0" pn="section-5.1-1">Sacrificial hosts are hosts whose name is intended to remove an existing relationship
                between domain and host objects. To that end, sacrificial hosts are either renamed to an
                external host or associated with a different domain object in the EPP server.
                The first group of deletion practices use sacrificial
                hosts leveraging existing  EPP server support for renaming host objects.</t>
        <section anchor="renaming-overall-pros" numbered="true" removeInRFC="false" toc="include" pn="section-5.1.1">
          <name slugifiedName="name-practice-benefits">Practice Benefits</name>
          <t indent="0" pn="section-5.1.1-1">Affected domains remain delegated in the zone. Registrars and 
                    registrants of affected domains may be able to determine the intention 
                    of the change.</t>
        </section>
        <section anchor="renaming-overall-cons" numbered="true" removeInRFC="false" toc="include" pn="section-5.1.2">
          <name slugifiedName="name-practice-detriments">Practice Detriments</name>
          <t indent="0" pn="section-5.1.2-1">Zones are crowded with irrelevant records. Registrars and registrants of affected domains are required to clean them up.</t>
        </section>
        <section anchor="renaming-observed" numbered="true" removeInRFC="false" toc="include" pn="section-5.1.3">
          <name slugifiedName="name-observed-practices-for-rena">Observed Practices for Renaming to Sacrificial Hosts</name>
          <section anchor="renaming-external" numbered="true" removeInRFC="false" toc="include" pn="section-5.1.3.1">
            <name slugifiedName="name-renaming-to-external-presum">Renaming to External, Presumed Non-Existent Hosts</name>
            <t indent="0" pn="section-5.1.3.1-1">As described above, this practice renames subordinate host objects to an
                            external host in order to allow the deletion of the superordinate domain object.
                            The
                            external host is presumed to be non-existent by the deleting EPP client, but
                            no check for existence is typically performed.
                            This practice has been observed in use. This practice <bcp14>MUST NOT</bcp14> be used.
            </t>
            <section anchor="renaming-external-pros" numbered="true" removeInRFC="false" toc="include" pn="section-5.1.3.1.1">
              <name slugifiedName="name-practice-benefits-2">Practice Benefits</name>
              <t indent="0" pn="section-5.1.3.1.1-1">The primary benefit is convenience for the deleting EPP client. The deleting
                                EPP client is not required to
                                maintain an authoritative DNS service or receive traffic.</t>
            </section>
            <section anchor="renaming-external-cons" numbered="true" removeInRFC="false" toc="include" pn="section-5.1.3.1.2">
              <name slugifiedName="name-practice-detriments-2">Practice Detriments</name>
              <t indent="0" pn="section-5.1.3.1.2-1">Malicious actors have registered these parent domains and 
                                created child host objects to take control of DNS resolution
                                for associated domains <xref target="Risky-BIZness" format="default" sectionFormat="of" derivedContent="Risky-BIZness"/>.</t>
              <t indent="0" pn="section-5.1.3.1.2-2">Sponsoring clients of the associated domains are not informed of the change.
                                Associated domains may no longer resolve if all their hosts are renamed.
                                Associated domains may still resolve if they continue to be associated with
                                existent hosts; in which case, their partial vulnerability to hijacking is
                                more difficult to detect.</t>
            </section>
          </section>
          <section anchor="renaming-as112" numbered="true" removeInRFC="false" toc="include" pn="section-5.1.3.2">
            <name slugifiedName="name-renaming-to-as112arpa">Renaming to "AS112.ARPA"</name>
            <t indent="0" pn="section-5.1.3.2-1">Some domain registrars, acting as EPP clients, have renamed host objects
                            to subdomains of "AS112.ARPA" or "EMPTY.AS112.ARPA" <xref target="Risky-BIZness-IRTF" format="default" sectionFormat="of" derivedContent="Risky-BIZness-IRTF"/>.
                            This practice has been observed in use.
            </t>
            <section anchor="renaming-as112-pros" numbered="true" removeInRFC="false" toc="include" pn="section-5.1.3.2.1">
              <name slugifiedName="name-practice-benefits-3">Practice Benefits</name>
              <t indent="0" pn="section-5.1.3.2.1-1">
                                The primary benefit is convenience for the deleting EPP client. The deleting
                                EPP client is
                                not required to
                                maintain an authoritative DNS service or receive traffic.
              </t>
            </section>
            <section anchor="renaming-as112-cons" numbered="true" removeInRFC="false" toc="include" pn="section-5.1.3.2.2">
              <name slugifiedName="name-practice-detriments-3">Practice Detriments</name>
              <t indent="0" pn="section-5.1.3.2.2-1"> This is a misuse of AS112, which is for reverse lookups on non-unique IPs,
                                primarily so local admins can sinkhole non-global traffic <xref target="RFC7535" format="default" sectionFormat="of" derivedContent="RFC7535"/>. 
                                "EMPTY.AS112.ARPA" is designed to be used with DNAME aliasing, not as a parent domain for sacrificial name servers (see <xref target="RFC7535" section="3" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc7535#section-3" derivedContent="RFC7535"/>).
                                    Unexpected AS112 traffic has previously caused
                                problems with intrusion detection systems and firewalls <xref target="RFC6305" format="default" sectionFormat="of" derivedContent="RFC6305"/>. Local administrators can potentially hijack
                                requests. AS112 infrastructure must be maintained. </t>
            </section>
          </section>
          <section anchor="renaming-non-provisioned" numbered="true" removeInRFC="false" toc="include" pn="section-5.1.3.3">
            <name slugifiedName="name-renaming-to-non-authoritati">Renaming to Non-Authoritative Hosts</name>
            <t indent="0" pn="section-5.1.3.3-1">Some domain registrars, acting as EPP clients, have maintained host objects
                            with glue records pointing to prominent public recursive DNS services.
                            This practice has been observed in use. This practice <bcp14>MUST NOT</bcp14> be used.
            </t>
            <section anchor="renaming-non-provisioned-pros" numbered="true" removeInRFC="false" toc="include" pn="section-5.1.3.3.1">
              <name slugifiedName="name-practice-benefits-4">Practice Benefits</name>
              <t indent="0" pn="section-5.1.3.3.1-1">The primary benefit is convenience for the deleting EPP client. The deleting
                                EPP client is
                                not required to
                                maintain an authoritative DNS service or receive traffic. </t>
            </section>
            <section anchor="renaming-non-provisioned-cons" numbered="true" removeInRFC="false" toc="include" pn="section-5.1.3.3.2">
              <name slugifiedName="name-practice-detriments-4">Practice Detriments</name>
              <t indent="0" pn="section-5.1.3.3.2-1"> Queries for the associated domains result in SERVFAIL or other failure
                                responses. Some recursive name server implementations may aggressively
                                requery for these responses, potentially resulting in large numbers of
                                queries for unresolvable domains <xref target="RFC9520" format="default" sectionFormat="of" derivedContent="RFC9520"/>.</t>
            </section>
          </section>
          <section anchor="control-rename" numbered="true" removeInRFC="false" toc="include" pn="section-5.1.3.4">
            <name slugifiedName="name-renaming-to-client-maintain">Renaming to Client-Maintained Dedicated Sacrificial Name Server Host Objects</name>
            <t indent="0" pn="section-5.1.3.4-1">EPP clients <bcp14>MAY</bcp14> rename the host object to be deleted to a
                        sacrificial name server host object maintained by the client.  This
                        requires that the client maintain the registration of the sacrificial
                        name server's superordinate domain.  The client may consider long
                        registration periods and the use of registrar and registry lock
                        services to maintain and protect the superordinate domain and the
                        host object.  Failures to maintain these registrations have allowed
                        domain hijacks <xref target="Risky-BIZness" format="default" sectionFormat="of" derivedContent="Risky-BIZness"/>.
            </t>
            <t indent="0" pn="section-5.1.3.4-2">
                        The client-maintained dedicated sacrificial name server <bcp14>MUST</bcp14> resolve to one or more IP addresses,
                        and the client <bcp14>MUST</bcp14> operate an authoritative DNS name server on those addresses.  
                        The name server <bcp14>MAY</bcp14> provide any valid response.
            </t>
            <t indent="0" pn="section-5.1.3.4-3">
                        This practice has been observed in use.
            </t>
            <section anchor="control-rename-pros" numbered="true" removeInRFC="false" toc="include" pn="section-5.1.3.4.1">
              <name slugifiedName="name-practice-benefits-5">Practice Benefits</name>
              <t indent="0" pn="section-5.1.3.4.1-1"> Associated domains are not able to be hijacked, remain in the zone, and have
                                valid DNS records and a responsive DNS service. The service may provide
                                responses that indicate problems with a domain's delegation, such as
                                non-existence or including controlled interruption IP addresses <xref target="RFC8023" format="default" sectionFormat="of" derivedContent="RFC8023"/>. </t>
            </section>
            <section anchor="control-rename-cons" numbered="true" removeInRFC="false" toc="include" pn="section-5.1.3.4.2">
              <name slugifiedName="name-practice-detriments-5">Practice Detriments</name>
              <t indent="0" pn="section-5.1.3.4.2-1">This requires that the client maintain the registration of the sacrificial
                                name server's superordinate domain. The client may consider long
                                registration periods and the use of registrar and registry lock services to
                                maintain and protect the superordinate domain and the host object. Failures
                                to maintain these registrations have allowed domain hijacks <xref target="Risky-BIZness" format="default" sectionFormat="of" derivedContent="Risky-BIZness"/>. 
              </t>
              <t indent="0" pn="section-5.1.3.4.2-2">Failure responses may cause aggressive requerying (see <xref target="renaming-non-provisioned-cons" format="default" sectionFormat="of" derivedContent="Section 5.1.3.3.2"/>).</t>
            </section>
          </section>
        </section>
        <section anchor="renaming-potential" numbered="true" removeInRFC="false" toc="include" pn="section-5.1.4">
          <name slugifiedName="name-potential-practices-for-ren">Potential Practices for Renaming to Sacrificial Hosts</name>
          <section anchor="renaming-pseudo-tld" numbered="true" removeInRFC="false" toc="include" pn="section-5.1.4.1">
            <name slugifiedName="name-renaming-to-pseudo-tld">Renaming to Pseudo-TLD</name>
            <t indent="0" pn="section-5.1.4.1-1">Clients may rename host objects to use ".alt" or another non-DNS pseudo-TLD (Top-Level Domain), as suggested in <xref target="Risky-BIZness-IRTF" format="default" sectionFormat="of" derivedContent="Risky-BIZness-IRTF"/>. 
                            This practice has not been observed in use. This practice <bcp14>MUST NOT</bcp14> be used.
            </t>
            <section anchor="renaming-pseudo-tld-pros" numbered="true" removeInRFC="false" toc="include" pn="section-5.1.4.1.1">
              <name slugifiedName="name-practice-benefits-6">Practice Benefits</name>
              <t indent="0" pn="section-5.1.4.1.1-1">The primary benefit is convenience for the deleting
                                EPP client. The deleting EPP client is not required to
                                maintain an authoritative DNS service or receive
                                traffic. Dependent domains cannot be hijacked through
                                the registration of these identifiers and delegation in
                                the DNS.</t>
            </section>
            <section anchor="renaming-pseudo-tld-cons" numbered="true" removeInRFC="false" toc="include" pn="section-5.1.4.1.2">
              <name slugifiedName="name-practice-detriments-6">Practice Detriments</name>
              <t indent="0" pn="section-5.1.4.1.2-1">The ".alt" pseudo-TLD is to be used "to signify that this is an alternative
                                (non-DNS) namespace and should not be looked up in a DNS context" <xref target="RFC9476" format="default" sectionFormat="of" derivedContent="RFC9476"/>. Some EPP servers may restrict TLDs to valid
                                IANA-delegated TLDs. These entries would mix DNS and non-DNS protocols, risk
                                name collisions, create confusion, and potentially result in unpredictable
                                resolver behaviors. These identifiers may be registered in non-DNS
                                namespaces, potentially leading to hijacking vulnerabilities based in other
                                systems. </t>
            </section>
          </section>
          <section anchor="renaming-existing-special-use" numbered="true" removeInRFC="false" toc="include" pn="section-5.1.4.2">
            <name slugifiedName="name-renaming-to-existing-specia">Renaming to Existing Special-Use TLD</name>
            <t indent="0" pn="section-5.1.4.2-1">Clients may rename host objects to a special-use TLD that cannot resolve in the DNS. Several variations have been suggested.
                            This practice has not been observed in use.</t>
            <section anchor="renaming-existing-special-use-reserved" numbered="true" removeInRFC="false" toc="include" pn="section-5.1.4.2.1">
              <name slugifiedName="name-renaming-to-reserved-tld">Renaming to Reserved TLD</name>
              <t indent="0" pn="section-5.1.4.2.1-1">Clients may rename host objects to use a reserved special-use <xref target="RFC6761" format="default" sectionFormat="of" derivedContent="RFC6761"/> TLD,
                                as suggested in <xref target="Risky-BIZness" format="default" sectionFormat="of" derivedContent="Risky-BIZness"/>.</t>
              <section anchor="renaming-existing-special-use-pros" numbered="true" removeInRFC="false" toc="exclude" pn="section-5.1.4.2.1.1">
                <name slugifiedName="name-practice-benefits-7">Practice Benefits</name>
                <t indent="0" pn="section-5.1.4.2.1.1-1">The primary benefit is convenience for the deleting
                                    EPP client. These TLDs are already reserved and will not
                                    resolve. The deleting EPP client is not required to
                                    maintain an authoritative DNS service or receive
                                    traffic. Dependent domains cannot be hijacked.</t>
              </section>
              <section anchor="renaming-existing-special-use-cons" numbered="true" removeInRFC="false" toc="exclude" pn="section-5.1.4.2.1.2">
                <name slugifiedName="name-practice-detriments-7">Practice Detriments</name>
                <t indent="0" pn="section-5.1.4.2.1.2-1">The use of TLDs reserved for special purposes <xref target="RFC6761" format="default" sectionFormat="of" derivedContent="RFC6761"/> may be confusing without a 
                                domain designated by the community for this purpose 
                                (see "sacrificial.invalid" in Sections <xref target="renaming-new-special-use" format="counter" sectionFormat="of" derivedContent="5.1.4.3"/> and <xref target="recommendations" format="counter" sectionFormat="of" derivedContent="6"/>). 
                                In addition, their use may be prevented by EPP server policy.</t>
              </section>
            </section>
          </section>
          <section anchor="renaming-new-special-use" numbered="true" removeInRFC="false" toc="include" pn="section-5.1.4.3">
            <name slugifiedName="name-renaming-to-a-special-use-d">Renaming to a Special-Use Domain</name>
            <t indent="0" pn="section-5.1.4.3-1">
                            Clients would rename hosts to a special-use domain or subdomain thereof.
                            The domain may be a special-use SLD (Second-Level Domain) (e.g., sacrificial.invalid) or a new reserved TLD (e.g., .sacrificial).
                            Use of this domain would communicate the client's intention to create a sacrificial host.
                            IANA would add this domain to the "Special-Use Domain Name" registry if such a new TLD is created using either
                            IETF or ICANN processes. This practice has not been observed in use.
                            In terms of the questions from <xref target="RFC6761" format="default" sectionFormat="of" derivedContent="RFC6761"/>:
            </t>
            <ol type="1" spacing="normal" indent="adaptive" start="1" pn="section-5.1.4.3-2">
                            <li derivedCounter="1." pn="section-5.1.4.3-2.1">
                                These names are not expected to be visible to human users.
                                However, the purpose of these domains is expected to be semantically recognizable to human users.
                            </li>
              <li derivedCounter="2." pn="section-5.1.4.3-2.2">
                                Application software is not expected to recognize these names
                                as special or treat them differently than other allowed domain names.
                            </li>
              <li derivedCounter="3." pn="section-5.1.4.3-2.3">
                                Name resolution APIs and libraries are not expected to recognize
                                these names as special or treat them differently than other allowed domain names.
                            </li>
              <li derivedCounter="4." pn="section-5.1.4.3-2.4">
                                Caching name servers are not expected to recognize these names
                                as special or treat them differently than other allowed domain names.
                            </li>
              <li derivedCounter="5." pn="section-5.1.4.3-2.5">
                                Authoritative name servers are not expected to recognize
                                these names as special or treat them differently than other allowed domain names.
                                Requests to the root for this domain would result in an NXDOMAIN response <xref target="RFC9499" format="default" sectionFormat="of" derivedContent="RFC9499"/>.
                            </li>
              <li derivedCounter="6." pn="section-5.1.4.3-2.6">
                                DNS server operators will treat this domain and its subdomains as they would any other allowed names in the DNS.
                            </li>
              <li derivedCounter="7." pn="section-5.1.4.3-2.7">
                                DNS registries/registrars will not be able to register this domain and must deny requests to register it or its subdomains.
                            </li>
            </ol>
            <section anchor="renaming-new-special-use-pros" numbered="true" removeInRFC="false" toc="include" pn="section-5.1.4.3.1">
              <name slugifiedName="name-practice-benefits-8">Practice Benefits</name>
              <t indent="0" pn="section-5.1.4.3.1-1">
                                    This option would offer clarity concerning the intentions of registrars that rename hosts. 
                                    It would also enable registrars of affected domains ease of detection of renamed hosts.
                                    This option is also convenient for the deleting EPP client. 
                                    The deleting EPP client is not required to
                                    maintain an authoritative DNS service or receive
                                    traffic. 
                                    Dependent domains cannot be hijacked through
                                    the registration of these identifiers and delegation in
                                    the DNS. 
              </t>
            </section>
            <section anchor="renaming-new-special-use-cons" numbered="true" removeInRFC="false" toc="include" pn="section-5.1.4.3.2">
              <name slugifiedName="name-practice-detriments-8">Practice Detriments</name>
              <t indent="0" pn="section-5.1.4.3.2-1">
                                    This would require cooperation and policy changes for registrars and registries. 
              </t>
            </section>
          </section>
          <section anchor="new-service" numbered="true" removeInRFC="false" toc="include" pn="section-5.1.4.4">
            <name slugifiedName="name-renaming-to-community-sacri">Renaming to Community Sacrificial Name Server Service</name>
            <t indent="0" pn="section-5.1.4.4-1">A new community-wide service could be created explicitly intended for use for
                            renaming host records. This would require maintenance of name servers capable of
                            authoritatively responding with NXDOMAIN or a controlled interruption IP
                            addresses <xref target="RFC8023" format="default" sectionFormat="of" derivedContent="RFC8023"/> for all queries without delegating domains
                            or records. This service could use a new special-use TLD created through
                            ICANN or IETF processes (e.g., ".sacrificial"), as an IAB request that IANA
                            delegate an SLD for ".arpa" (e.g.,
                            "sacrificial-nameserver.arpa"), or as a contracted sinkhole service by ICANN or
                            other DNS ecosystem actors. This practice has not been observed in use.</t>
            <section anchor="new-service-pros" numbered="true" removeInRFC="false" toc="include" pn="section-5.1.4.4.1">
              <name slugifiedName="name-practice-benefits-9">Practice Benefits</name>
              <t indent="0" pn="section-5.1.4.4.1-1">This is convenient for the deleting EPP client. The deleting EPP client is
                                not required to
                                maintain an authoritative DNS service or receive traffic. The associated
                                domains are not vulnerable to hijacking.
                                This would provide a well-understood, industry-standard solution, allowing
                                registrars and registrants to easily identify associated domains that have
                                been affected. Infrastructure operators could monitor traffic to identify
                                affected associated domains that result in significant traffic and attempt
                                to contact registrars and registrants.
                                Economies of scale would allow reduced overall costs to the industry (in
                                contrast to each client running an independent service).</t>
            </section>
            <section anchor="new-service-cons" numbered="true" removeInRFC="false" toc="include" pn="section-5.1.4.4.2">
              <name slugifiedName="name-practice-detriments-9">Practice Detriments</name>
              <t indent="0" pn="section-5.1.4.4.2-1">Some entity must maintain the infrastructure for the service.</t>
            </section>
          </section>
        </section>
      </section>
      <section anchor="delete-overall" numbered="true" removeInRFC="false" toc="include" pn="section-5.2">
        <name slugifiedName="name-deletion-of-hosts">Deletion of Hosts</name>
        <t indent="0" pn="section-5.2-1">The second group of practices is based on EPP server support for allowing objects to be deleted
                even if there are existing data relationships. The recommendations in <xref target="RFC5731" format="default" sectionFormat="of" derivedContent="RFC5731"/> are intended to
                maintain consistency. However, they are not requirements. </t>
        <section anchor="delete-observed" numbered="true" removeInRFC="false" toc="include" pn="section-5.2.1">
          <name slugifiedName="name-observed-practices-for-dele">Observed Practices for Deletion of Hosts</name>
          <section anchor="automatic-delete" numbered="true" removeInRFC="false" toc="include" pn="section-5.2.1.1">
            <name slugifiedName="name-implicit-deletion-of-affect">Implicit Deletion of Affected Host Objects</name>
            <t indent="0" pn="section-5.2.1.1-1"> EPP servers may relax
                            their constraints and allow sponsoring clients to delete host objects without consideration of 
                            associations with domain objects sponsored by other clients. The registry automatically
                            disassociates the deleted host objects from domain objects sponsored by other clients.
                            This practice has been observed in use.
            </t>
            <section anchor="automatic-delete-pros" numbered="true" removeInRFC="false" toc="include" pn="section-5.2.1.1.1">
              <name slugifiedName="name-practice-benefits-10">Practice Benefits</name>
              <t indent="0" pn="section-5.2.1.1.1-1">
                                This is convenient for the deleting EPP client. The deleting EPP client is
                                not required to
                                maintain an authoritative DNS service or receive traffic. The associated
                                domains are not vulnerable to hijacking.
              </t>
            </section>
            <section anchor="automatic-delete-cons" numbered="true" removeInRFC="false" toc="include" pn="section-5.2.1.1.2">
              <name slugifiedName="name-practice-detriments-10">Practice Detriments</name>
              <t indent="0" pn="section-5.2.1.1.2-1">This could
                                result in domains with no name servers being removed from the zone
                                or
                                domains with only one name server remaining in the zone.
                                Deletions could potentially affect large numbers of associated domains,
                                placing strain on domain registries.
              </t>
            </section>
          </section>
          <section anchor="inform-affected-client" numbered="true" removeInRFC="false" toc="include" pn="section-5.2.1.2">
            <name slugifiedName="name-inform-affected-clients">Inform Affected Clients</name>
            <t indent="0" pn="section-5.2.1.2-1"> The sponsoring clients of affected domain objects may also be informed of
                            the change (e.g., through the EPP Change Poll extension <xref target="RFC8590" format="default" sectionFormat="of" derivedContent="RFC8590"/>).
                            This practice has been observed in use.
            </t>
            <section anchor="inform-affected-client-pros" numbered="true" removeInRFC="false" toc="include" pn="section-5.2.1.2.1">
              <name slugifiedName="name-practice-benefits-11">Practice Benefits</name>
              <t indent="0" pn="section-5.2.1.2.1-1">Updates help achieve the goals of client-server data consistency
                                and minimal interruptions to resolution.
                                The sponsoring clients of affected domain objects are able to
                                update their database to reflect the change and would be able to inform
                                the domain's registrant.
                                The sponsoring clients can automatically update the
                                affected domains to use another authoritative host. </t>
            </section>
            <section anchor="inform-affected-client-cons" numbered="true" removeInRFC="false" toc="include" pn="section-5.2.1.2.2">
              <name slugifiedName="name-practice-detriments-11">Practice Detriments</name>
              <t indent="0" pn="section-5.2.1.2.2-1">
                                This change requires additional development on the part of EPP
                                servers and clients. There may be scalability concerns if large numbers
                                of domain objects are updated in a single transaction.
              </t>
            </section>
          </section>
        </section>
        <section anchor="delete-potential" numbered="true" removeInRFC="false" toc="include" pn="section-5.2.2">
          <name slugifiedName="name-potential-practices-for-del">Potential Practices for Deletion of Hosts</name>
          <section anchor="explicit-delete" numbered="true" removeInRFC="false" toc="include" pn="section-5.2.2.1">
            <name slugifiedName="name-request-explicit-deletion-o">Request Explicit Deletion of Affected Host Objects</name>
            <t indent="0" pn="section-5.2.2.1-1">Sponsoring clients requesting the deletion of host objects would explicitly request 
                            their disassociation from domain objects sponsored by other clients. 
                            This practice has not been observed in use.
            </t>
            <section anchor="explicit-delete-pros" numbered="true" removeInRFC="false" toc="include" pn="section-5.2.2.1.1">
              <name slugifiedName="name-practice-benefits-12">Practice Benefits</name>
              <t indent="0" pn="section-5.2.2.1.1-1">
                                Registries would not be required to unilaterally take responsibility for deletion. 
                                The deleting EPP client is not required to maintain an authoritative DNS service or receive traffic. 
                                The associated domains are not vulnerable to hijacking.
              </t>
            </section>
            <section anchor="explicit-delete-cons" numbered="true" removeInRFC="false" toc="include" pn="section-5.2.2.1.2">
              <name slugifiedName="name-practice-detriments-12">Practice Detriments</name>
              <t indent="0" pn="section-5.2.2.1.2-1">This could result in domains with no name servers being removed from the zone or domains with only one name server remaining in the zone.
                                Deletions could potentially affect large numbers of associated domains,
                                placing strain on domain registries.
              </t>
            </section>
          </section>
          <section anchor="additional-deletion-details" numbered="true" removeInRFC="false" toc="include" pn="section-5.2.2.2">
            <name slugifiedName="name-provide-additional-deletion">Provide Additional Deletion Details</name>
            <t indent="0" pn="section-5.2.2.2-1">The EPP server may provide the deleting EPP client with additional details of the affected
                            objects. The deleting EPP client may receive a response (e.g., using msg, reason, or msgQ elements of the EPP response <xref target="RFC5730" format="default" sectionFormat="of" derivedContent="RFC5730"/>)
                            that deletion of the host object would affect
                            domain objects sponsored by another client and may receive details about those objects (e.g., using the EPP poll command).
                            This practice has not been observed in use.
            </t>
            <section anchor="additional-deletion-details-pros" numbered="true" removeInRFC="false" toc="include" pn="section-5.2.2.2.1">
              <name slugifiedName="name-practice-benefits-13">Practice Benefits</name>
              <t indent="0" pn="section-5.2.2.2.1-1">
                                The deleting EPP client would be able to better understand and assess
                                the potential harms of host object deletion.
                                Depending on the content of the message, the deleting EPP client might
                                choose additional actions, such as delaying the deletion until manual
                                approval can be obtained, renaming the host objects, or informing
                                affected EPP clients.
                                This would give EPP clients greater flexibility with respect to
                                deletion. For example, they may choose only to exercise deletions that
                                have no impact on other clients.
              </t>
            </section>
            <section anchor="additional-deletion-details-cons" numbered="true" removeInRFC="false" toc="include" pn="section-5.2.2.2.2">
              <name slugifiedName="name-practice-detriments-13">Practice Detriments</name>
              <t indent="0" pn="section-5.2.2.2.2-1">
                                This change would require additional development on the part of EPP
                                servers and clients. There may be scalability concerns if large numbers
                                of domain objects are updated in a single transaction. The EPP server
                                must
                                determine the relevant information to provide for the EPP client's
                                assessment.
              </t>
            </section>
          </section>
          <section anchor="delete-with-restore" numbered="true" removeInRFC="false" toc="include" pn="section-5.2.2.3">
            <name slugifiedName="name-allow-explicit-deletion-of-">Allow Explicit Deletion of a Domain with Restore Capability</name>
            <t indent="0" pn="section-5.2.2.3-1">
                            Explicit deletion of a domain name with a
                            cascade purge of subordinate host objects and associations
                            with other domains may be an unrecoverable operation, increasing
                            the potential negative effects of malicious or accidental actions. 
            </t>
            <t indent="0" pn="section-5.2.2.3-2">
                            To mitigate this risk, EPP servers can allow for the explicit deletion of a domain with
                            subordinate host objects associated with other domains only when the
                            associations can be restored by the &lt;restore&gt; operation described in <xref target="RFC3915" format="default" sectionFormat="of" derivedContent="RFC3915"/>.
            </t>
            <t indent="0" pn="section-5.2.2.3-3">
                            In order to allow restore, EPP servers may keep the subordinate host objects with a "pendingDelete" status 
                            and keep associations with other domains. This makes the objects unavailable in the DNS and
                            provides a preview of the deletion.
            </t>
            <t indent="0" pn="section-5.2.2.3-4">
                            If the action was malicious, accidental, or had
                            negative side effects, the domain, its subordinate host objects, and
                            the associations with other domains can be restored with the
                            &lt;restore&gt; operation <xref target="RFC3915" format="default" sectionFormat="of" derivedContent="RFC3915"/> during the redemption period.  The
                            purge of the domain will correspond with the purging of the
                            subordinate hosts objects and the associations at the end of the
                            pending delete period <xref target="RFC3915" format="default" sectionFormat="of" derivedContent="RFC3915"/>.  
            </t>
            <t indent="0" pn="section-5.2.2.3-5">
                            Due to the potentially large
                            number of associations, the server can asynchronously update (e.g.,
                            add and remove from DNS) and purge the associations.
            </t>
            <t indent="0" pn="section-5.2.2.3-6">
                            This practice has not been observed in use.
            </t>
            <section anchor="delete-with-restore-pros" numbered="true" removeInRFC="false" toc="include" pn="section-5.2.2.3.1">
              <name slugifiedName="name-practice-benefits-14">Practice Benefits</name>
              <t indent="0" pn="section-5.2.2.3.1-1">
                                This practice enables the clients to directly delete the domains that
                                they need since the server will fully support restoration of the
                                associations during the redemption period.  The management of the
                                domain and the subordinate hosts will be simplified for the client by
                                supporting the explicit deletion of the domain with the capability of
                                mitigating a destructive malicious or accidental action.
              </t>
            </section>
            <section anchor="delete-with-restore-cons" numbered="true" removeInRFC="false" toc="include" pn="section-5.2.2.3.2">
              <name slugifiedName="name-practice-detriments-14">Practice Detriments</name>
              <t indent="0" pn="section-5.2.2.3.2-1">
                                By making it easier for a client to explicitly delete a domain having subordinate hosts
                                with associations, there is higher risk of inadvertent side effects in a single delete command.
                                There is existing risk in EPP of inadvertent side effects, such as adding the "clientHold"
                                status to the domain that will impact the DNS resolution of the subordinate hosts and the
                                associated delegations. The ability to easily roll back the command is key to minimize the
                                impact of the side effects. Another issue is the potential size of the database transaction to
                                disable, re-enable, or purge the subordinate host associations, since there is no limit to the
                                number of associations to delegated domains. Servers can break up the disable, re-enable, or purge
                                of the subordinate host associations into smaller transactions by implementing it asynchronously.
              </t>
            </section>
          </section>
        </section>
      </section>
    </section>
    <section anchor="recommendations" numbered="true" removeInRFC="false" toc="include" pn="section-6">
      <name slugifiedName="name-recommendations">Recommendations</name>
      <t indent="0" pn="section-6-1">EPP servers and clients <bcp14>MUST</bcp14> implement one of the following practices to delete domain and host objects with minimal undesired side effects:</t>
      <ul bare="false" empty="false" indent="3" spacing="normal" pn="section-6-2">
        <li pn="section-6-2.1">Rename host objects to a sacrificial name server host object maintained by the client
                    (see <xref target="control-rename" format="default" sectionFormat="of" derivedContent="Section 5.1.3.4"/>).
                </li>
        <li pn="section-6-2.2"> 
                     Delete host objects and associations with the restore option (see <xref target="delete-with-restore" format="default" sectionFormat="of" derivedContent="Section 5.2.2.3"/>)
                     based on explicit client requests (see <xref target="explicit-delete" format="default" sectionFormat="of" derivedContent="Section 5.2.2.1"/>). 
                     Provide requesting clients additional deletion details (see <xref target="additional-deletion-details" format="default" sectionFormat="of" derivedContent="Section 5.2.2.2"/>),
                     and inform affected clients of changes (see <xref target="inform-affected-client" format="default" sectionFormat="of" derivedContent="Section 5.2.1.2"/>).
                </li>
        <li pn="section-6-2.3">
                    Rename host objects to a sacrificial name server host object that uses a special-use domain (see <xref target="renaming-new-special-use" format="default" sectionFormat="of" derivedContent="Section 5.1.4.3"/>)
                    that avoids the special-use domain issues described in <xref target="RFC8244" format="default" sectionFormat="of" derivedContent="RFC8244"/>. Use of "sacrificial.invalid" (see <xref target="renaming-new-special-use" format="default" sectionFormat="of" derivedContent="Section 5.1.4.3"/>) as the parent domain for the host objects is
                    <bcp14>RECOMMENDED</bcp14> to avoid the overhead of creating a new TLD using either IETF or ICANN processes
                    that offers no additional operational benefit.
                </li>
      </ul>
      <t indent="0" pn="section-6-3">All other practices described in <xref target="practice-analysis" format="default" sectionFormat="of" derivedContent="Section 5"/> are <bcp14>NOT RECOMMENDED</bcp14> due to undesired side effects.</t>
    </section>
    <section anchor="IANA" numbered="true" removeInRFC="false" toc="include" pn="section-7">
      <name slugifiedName="name-iana-considerations">IANA Considerations</name>
      <t indent="0" pn="section-7-1">This document has no IANA actions.</t>
    </section>
    <section anchor="Security" numbered="true" removeInRFC="false" toc="include" pn="section-8">
      <name slugifiedName="name-security-considerations">Security Considerations</name>
      <t indent="0" pn="section-8-1">This document describes guidance found in <xref target="RFC5731" format="default" sectionFormat="of" derivedContent="RFC5731"/> and <xref target="RFC5732" format="default" sectionFormat="of" derivedContent="RFC5732"/> regarding the deletion
                of domain and host objects by EPP clients. That guidance sometimes requires that
                host objects be renamed such that they become "external" hosts (see 
                <xref target="RFC5731" section="1.1" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc5731#section-1.1" derivedContent="RFC5731"/>) in order to meet an EPP server's requirements
                for host object disassociation prior to domain object deletion. Host object renaming
                can introduce a risk of DNS resolution hijack under certain operational
                conditions. This document provides guidance that is intended to reduce the risk of
                DNS resolution failure or hijacking as part of the process of deleting EPP domain or
                host objects.</t>
      <t indent="0" pn="section-8-2">Child domains that depend on host objects associated with domain objects sponsored by
                another EPP client for DNS resolution may be protected from hijacking through the use
                of DNSSEC. Their resolution may be protected from the effects of deletion by using
                host objects associated with multiple domain objects. DNSSEC and multiple
                host objects may interfere with the use of controlled interruption IP addresses to alert
                registrants to DNS changes. EPP clients can periodically scan sponsored domains for
                association with sacrificial name servers and alert end users concerning those domains.</t>
      <t indent="0" pn="section-8-3">In absence of DNSSEC use by the victim, an attacker who gains control of a
                single name server can use DNSSEC to instead take over the victim domain completely
                if the registry operator and registrar process for automated DS maintenance neglects
                to check all name servers for consistency in CDS/CDNSKEY records. In this scenario,
                the domain will end up with DS records derived from the attacker CDS/CDNSKEY records
                if, by chance, the queries happen to hit the attacker-controlled name server. Subsequently, validating
                resolvers will no longer accept responses from the legitimate name servers.
		Moreover, with
                the use of CSYNC, an attacker may update the domain NS records, removing the legitimate
                name servers entirely.</t>
    </section>
  </middle>
  <back>
    <references pn="section-9">
      <name slugifiedName="name-references">References</name>
      <references pn="section-9.1">
        <name slugifiedName="name-normative-references">Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" quoteTitle="true" derivedAnchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t indent="0">In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC3915" target="https://www.rfc-editor.org/info/rfc3915" quoteTitle="true" derivedAnchor="RFC3915">
          <front>
            <title>Domain Registry Grace Period Mapping for the Extensible Provisioning Protocol (EPP)</title>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
            <date month="September" year="2004"/>
            <abstract>
              <t indent="0">This document describes an Extensible Provisioning Protocol (EPP) extension mapping for the management of Domain Name System (DNS) domain names subject to "grace period" policies defined by the Internet Corporation for Assigned Names and Numbers (ICANN). Grace period policies exist to allow protocol actions to be reversed or otherwise revoked during a short period of time after the protocol action has been performed. Specified in XML, this mapping extends the EPP domain name mapping to provide additional features required for grace period processing. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3915"/>
          <seriesInfo name="DOI" value="10.17487/RFC3915"/>
        </reference>
        <reference anchor="RFC5730" target="https://www.rfc-editor.org/info/rfc5730" quoteTitle="true" derivedAnchor="RFC5730">
          <front>
            <title>Extensible Provisioning Protocol (EPP)</title>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
            <date month="August" year="2009"/>
            <abstract>
              <t indent="0">This document describes an application-layer client-server protocol for the provisioning and management of objects stored in a shared central repository. Specified in XML, the protocol defines generic object management operations and an extensible framework that maps protocol operations to objects. This document includes a protocol specification, an object mapping template, and an XML media type registration. This document obsoletes RFC 4930. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="69"/>
          <seriesInfo name="RFC" value="5730"/>
          <seriesInfo name="DOI" value="10.17487/RFC5730"/>
        </reference>
        <reference anchor="RFC5731" target="https://www.rfc-editor.org/info/rfc5731" quoteTitle="true" derivedAnchor="RFC5731">
          <front>
            <title>Extensible Provisioning Protocol (EPP) Domain Name Mapping</title>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
            <date month="August" year="2009"/>
            <abstract>
              <t indent="0">This document describes an Extensible Provisioning Protocol (EPP) mapping for the provisioning and management of Internet domain names stored in a shared central repository. Specified in XML, the mapping defines EPP command syntax and semantics as applied to domain names. This document obsoletes RFC 4931. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="69"/>
          <seriesInfo name="RFC" value="5731"/>
          <seriesInfo name="DOI" value="10.17487/RFC5731"/>
        </reference>
        <reference anchor="RFC5732" target="https://www.rfc-editor.org/info/rfc5732" quoteTitle="true" derivedAnchor="RFC5732">
          <front>
            <title>Extensible Provisioning Protocol (EPP) Host Mapping</title>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
            <date month="August" year="2009"/>
            <abstract>
              <t indent="0">This document describes an Extensible Provisioning Protocol (EPP) mapping for the provisioning and management of Internet host names stored in a shared central repository. Specified in XML, the mapping defines EPP command syntax and semantics as applied to host names. This document obsoletes RFC 4932. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="69"/>
          <seriesInfo name="RFC" value="5732"/>
          <seriesInfo name="DOI" value="10.17487/RFC5732"/>
        </reference>
        <reference anchor="RFC6761" target="https://www.rfc-editor.org/info/rfc6761" quoteTitle="true" derivedAnchor="RFC6761">
          <front>
            <title>Special-Use Domain Names</title>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <author fullname="M. Krochmal" initials="M." surname="Krochmal"/>
            <date month="February" year="2013"/>
            <abstract>
              <t indent="0">This document describes what it means to say that a Domain Name (DNS name) is reserved for special use, when reserving such a name is appropriate, and the procedure for doing so. It establishes an IANA registry for such domain names, and seeds it with entries for some of the already established special domain names.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6761"/>
          <seriesInfo name="DOI" value="10.17487/RFC6761"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" quoteTitle="true" derivedAnchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t indent="0">RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8244" target="https://www.rfc-editor.org/info/rfc8244" quoteTitle="true" derivedAnchor="RFC8244">
          <front>
            <title>Special-Use Domain Names Problem Statement</title>
            <author fullname="T. Lemon" initials="T." surname="Lemon"/>
            <author fullname="R. Droms" initials="R." surname="Droms"/>
            <author fullname="W. Kumari" initials="W." surname="Kumari"/>
            <date month="October" year="2017"/>
            <abstract>
              <t indent="0">The policy defined in RFC 6761 for IANA registrations in the "Special-Use Domain Names" registry has been shown, through experience, to present challenges that were not anticipated when RFC 6761 was written. This memo presents a list, intended to be comprehensive, of the problems that have since been identified. In addition, it reviews the history of domain names and summarizes current IETF publications and some publications from other organizations relating to Special-Use Domain Names.</t>
              <t indent="0">This document should be considered required reading for IETF participants who wish to express an informed opinion on the topic of Special-Use Domain Names.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8244"/>
          <seriesInfo name="DOI" value="10.17487/RFC8244"/>
        </reference>
        <reference anchor="RFC9476" target="https://www.rfc-editor.org/info/rfc9476" quoteTitle="true" derivedAnchor="RFC9476">
          <front>
            <title>The .alt Special-Use Top-Level Domain</title>
            <author fullname="W. Kumari" initials="W." surname="Kumari"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="September" year="2023"/>
            <abstract>
              <t indent="0">This document reserves a Top-Level Domain (TLD) label "alt" to be used in non-DNS contexts. It also provides advice and guidance to developers creating alternative namespaces.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9476"/>
          <seriesInfo name="DOI" value="10.17487/RFC9476"/>
        </reference>
      </references>
      <references pn="section-9.2">
        <name slugifiedName="name-informative-references">Informative References</name>
        <reference anchor="RFC6305" target="https://www.rfc-editor.org/info/rfc6305" quoteTitle="true" derivedAnchor="RFC6305">
          <front>
            <title>I'm Being Attacked by PRISONER.IANA.ORG!</title>
            <author fullname="J. Abley" initials="J." surname="Abley"/>
            <author fullname="W. Maton" initials="W." surname="Maton"/>
            <date month="July" year="2011"/>
            <abstract>
              <t indent="0">Many sites connected to the Internet make use of IPv4 addresses that are not globally unique. Examples are the addresses designated in RFC 1918 for private use within individual sites.</t>
              <t indent="0">Hosts should never normally send DNS reverse-mapping queries for those addresses on the public Internet. However, such queries are frequently observed. Authoritative servers are deployed to provide authoritative answers to such queries as part of a loosely coordinated effort known as the AS112 project.</t>
              <t indent="0">Since queries sent to AS112 servers are usually not intentional, the replies received back from those servers are typically unexpected. Unexpected inbound traffic can trigger alarms on intrusion detection systems and firewalls, and operators of such systems often mistakenly believe that they are being attacked.</t>
              <t indent="0">This document provides background information and technical advice to those firewall operators. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6305"/>
          <seriesInfo name="DOI" value="10.17487/RFC6305"/>
        </reference>
        <reference anchor="RFC7535" target="https://www.rfc-editor.org/info/rfc7535" quoteTitle="true" derivedAnchor="RFC7535">
          <front>
            <title>AS112 Redirection Using DNAME</title>
            <author fullname="J. Abley" initials="J." surname="Abley"/>
            <author fullname="B. Dickson" initials="B." surname="Dickson"/>
            <author fullname="W. Kumari" initials="W." surname="Kumari"/>
            <author fullname="G. Michaelson" initials="G." surname="Michaelson"/>
            <date month="May" year="2015"/>
            <abstract>
              <t indent="0">AS112 provides a mechanism for handling reverse lookups on IP addresses that are not unique (e.g., RFC 1918 addresses). This document describes modifications to the deployment and use of AS112 infrastructure that will allow zones to be added and dropped much more easily, using DNAME resource records.</t>
              <t indent="0">This approach makes it possible for any DNS zone administrator to sink traffic relating to parts of the global DNS namespace under their control to the AS112 infrastructure without coordination with the operators of AS112 infrastructure.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7535"/>
          <seriesInfo name="DOI" value="10.17487/RFC7535"/>
        </reference>
        <reference anchor="RFC8023" target="https://www.rfc-editor.org/info/rfc8023" quoteTitle="true" derivedAnchor="RFC8023">
          <front>
            <title>Report from the Workshop and Prize on Root Causes and Mitigation of Name Collisions</title>
            <author fullname="M. Thomas" initials="M." surname="Thomas"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="L. Zhang" initials="L." surname="Zhang"/>
            <date month="November" year="2016"/>
            <abstract>
              <t indent="0">This document provides context and a report on the workshop on "Root Causes and Mitigation of Name Collisions", which took place in London, United Kingdom, from March 8 to 10, 2014. The main goal of the workshop was to foster a discussion on the causes and potential mitigations of domain name collisions. This report provides a small amount of background and context; then, it provides a summary of the workshop's discussions.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8023"/>
          <seriesInfo name="DOI" value="10.17487/RFC8023"/>
        </reference>
        <reference anchor="RFC8590" target="https://www.rfc-editor.org/info/rfc8590" quoteTitle="true" derivedAnchor="RFC8590">
          <front>
            <title>Change Poll Extension for the Extensible Provisioning Protocol (EPP)</title>
            <author fullname="J. Gould" initials="J." surname="Gould"/>
            <author fullname="K. Feher" initials="K." surname="Feher"/>
            <date month="May" year="2019"/>
            <abstract>
              <t indent="0">This document describes an Extensible Provisioning Protocol (EPP) extension for notifying clients of operations on client-sponsored objects that were not initiated by the client through EPP. These operations may include contractual or policy requirements including, but not limited to, regular batch processes, customer support actions, Uniform Domain-Name Dispute-Resolution Policy (UDRP) or Uniform Rapid Suspension (URS) actions, court-directed actions, and bulk updates based on customer requests. Since the client is not directly involved or knowledgable of these operations, the extension is used along with an EPP object mapping to provide the resulting state of the postoperation object, and optionally a preoperation object, with the operation metadata of what, when, who, and why.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8590"/>
          <seriesInfo name="DOI" value="10.17487/RFC8590"/>
        </reference>
        <reference anchor="RFC9499" target="https://www.rfc-editor.org/info/rfc9499" quoteTitle="true" derivedAnchor="RFC9499">
          <front>
            <title>DNS Terminology</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
            <date month="March" year="2024"/>
            <abstract>
              <t indent="0">The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
              <t indent="0">This document updates RFC 2308 by clarifying the definitions of "forwarder" and "QNAME". It obsoletes RFC 8499 by adding multiple terms and clarifications. Comprehensive lists of changed and new definitions can be found in Appendices A and B.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="219"/>
          <seriesInfo name="RFC" value="9499"/>
          <seriesInfo name="DOI" value="10.17487/RFC9499"/>
        </reference>
        <reference anchor="RFC9520" target="https://www.rfc-editor.org/info/rfc9520" quoteTitle="true" derivedAnchor="RFC9520">
          <front>
            <title>Negative Caching of DNS Resolution Failures</title>
            <author fullname="D. Wessels" initials="D." surname="Wessels"/>
            <author fullname="W. Carroll" initials="W." surname="Carroll"/>
            <author fullname="M. Thomas" initials="M." surname="Thomas"/>
            <date month="December" year="2023"/>
            <abstract>
              <t indent="0">In the DNS, resolvers employ caching to reduce both latency for end users and load on authoritative name servers. The process of resolution may result in one of three types of responses: (1) a response containing the requested data, (2) a response indicating the requested data does not exist, or (3) a non-response due to a resolution failure in which the resolver does not receive any useful information regarding the data's existence. This document concerns itself only with the third type.</t>
              <t indent="0">RFC 2308 specifies requirements for DNS negative caching. There, caching of TYPE 2 responses is mandatory and caching of TYPE 3 responses is optional. This document updates RFC 2308 to require negative caching for DNS resolution failures.</t>
              <t indent="0">RFC 4035 allows DNSSEC validation failure caching. This document updates RFC 4035 to require caching for DNSSEC validation failures.</t>
              <t indent="0">RFC 4697 prohibits aggressive requerying for NS records at a failed zone's parent zone. This document updates RFC 4697 to expand this requirement to all query types and to all ancestor zones.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9520"/>
          <seriesInfo name="DOI" value="10.17487/RFC9520"/>
        </reference>
        <reference anchor="Risky-BIZness" quoteTitle="true" target="https://doi.org/10.1145/3487552.3487816" derivedAnchor="Risky-BIZness">
          <front>
            <title>Risky BIZness: Risks Derived from Registrar Name Management</title>
            <author fullname="Gautam Akiwate" initials="G." surname="Akiwate"/>
            <author fullname="Stefan Savage" initials="S." surname="Savage"/>
            <author fullname="Geoffrey M. Voelker" initials="G." surname="Voelker"/>
            <author fullname="KC Claffy" initials="K." surname="Claffy"/>
            <date year="2021" month="Nov"/>
          </front>
          <refcontent>IMC '21: Proceedings of the 21st ACM Internet Measurement Conference</refcontent>
          <seriesInfo name="DOI" value="10.1145/3487552.3487816"/>
        </reference>
        <reference anchor="Risky-BIZness-IRTF" target="https://datatracker.ietf.org/doc/slides-115-irtfopen-risky-bizness-risks-derived-from-registrar-name-management/" quoteTitle="true" derivedAnchor="Risky-BIZness-IRTF">
          <front>
            <title>Risky BIZness: Risks Derived from Registrar Name Management</title>
            <author fullname="Gautam Akiwate" initials="G." surname="Akiwate"/>
            <author fullname="Stefan Savage" initials="S." surname="Savage"/>
            <author fullname="Geoffrey M. Voelker" initials="G." surname="Voelker"/>
            <author fullname="KC Claffy" initials="K." surname="Claffy"/>
            <date year="2022" month="Nov"/>
          </front>
          <refcontent>IETF 115 Proceedings</refcontent>
        </reference>
        <reference anchor="SAC048" target="https://itp.cdn.icann.org/en/files/security-and-stability-advisory-committee-ssac-reports/sac-048-en.pdf" quoteTitle="true" derivedAnchor="SAC048">
          <front>
            <title>SSAC Comment on Orphan Glue Records in the Draft Applicant Guidebook</title>
            <author>
              <organization showOnFrontPage="true">ICANN Security and Stability Advisory Committee</organization>
            </author>
            <date year="2011" month="May" day="12"/>
          </front>
          <seriesInfo name="SAC" value="048"/>
        </reference>
        <reference anchor="SAC125" target="https://itp.cdn.icann.org/en/files/security-and-stability-advisory-committee-ssac-reports/sac-125-09-05-2024-en.pdf" quoteTitle="true" derivedAnchor="SAC125">
          <front>
            <title>SSAC Report on Registrar Nameserver Management</title>
            <author>
              <organization showOnFrontPage="true">ICANN Security and Stability Advisory Committee</organization>
            </author>
            <date year="2024" month="May" day="9"/>
          </front>
          <seriesInfo name="SAC" value="125"/>
        </reference>
      </references>
    </references>
    <section anchor="acks" numbered="false" removeInRFC="false" toc="include" pn="section-appendix.a">
      <name slugifiedName="name-acknowledgments">Acknowledgments</name>
      <t indent="0" pn="section-appendix.a-1">The authors would like to thank the following people for their contributions to this
                document: <contact fullname="David Blacka"/>, <contact fullname="Brian Dickson"/>, <contact fullname="James Gould"/>, <contact fullname="Pawel Kowalik"/>, <contact fullname="Mario Loffredo"/>, <contact fullname="James Mitchell"/>, <contact fullname="Matthew Thomas"/>, <contact fullname="Peter                 Thomassen"/>, and <contact fullname="Duane Wessels"/>.</t>
    </section>
    <section anchor="authors-addresses" numbered="false" removeInRFC="false" toc="include" pn="section-appendix.b">
      <name slugifiedName="name-authors-addresses">Authors' Addresses</name>
      <author initials="S." surname="Hollenbeck" fullname="Scott Hollenbeck">
        <organization showOnFrontPage="true">Verisign Labs</organization>
        <address>
          <postal>
            <street>12061 Bluemont Way</street>
            <city>Reston</city>
            <region>VA</region>
            <code>20190</code>
            <country>United States of America</country>
          </postal>
          <email>shollenbeck@verisign.com</email>
          <uri>https://www.verisignlabs.com/</uri>
        </address>
      </author>
      <author initials="W." surname="Carroll" fullname="William Carroll">
        <organization showOnFrontPage="true">Verisign Labs</organization>
        <address>
          <postal>
            <street>12061 Bluemont Way</street>
            <city>Reston</city>
            <region>VA</region>
            <code>20190</code>
            <country>United States of America</country>
          </postal>
          <phone>+1 703 948-3200</phone>
          <email>wicarroll@verisign.com</email>
          <uri>https://verisign.com</uri>
        </address>
      </author>
      <author initials="G." surname="Akiwate" fullname="Gautam Akiwate">
        <organization showOnFrontPage="true">Stanford University</organization>
        <address>
          <postal>
            <street>450 Jane Stanford Way</street>
            <city>Stanford</city>
            <region>CA</region>
            <code>94305</code>
            <country>United States of America</country>
          </postal>
          <phone>+1 650 723-2300</phone>
          <email>gakiwate@cs.stanford.edu</email>
          <uri>https://cs.stanford.edu/~gakiwate/</uri>
        </address>
      </author>
    </section>
  </back>
</rfc>
