Internet-Draft rdap-x January 2026
Newton & Singh Expires 6 July 2026 [Page]
Workgroup:
Registration Protocols Extensions (regext)
Internet-Draft:
draft-ietf-regext-rdap-x-media-type-05
Published:
Intended Status:
Standards Track
Expires:
Authors:
A. Newton
ICANN
J. Singh
ARIN

The "exts_list" Parameter for the RDAP Media Type

Abstract

This document defines a new parameter for the RDAP media type that can be used to describe RDAP content with RDAP extensions. Additionally, this document describes the usage of this parameter with RDAP for the purposes of signalling RDAP extensions during content negotiation.

Status of This Memo

This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.

Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.

Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."

This Internet-Draft will expire on 6 July 2026.

Table of Contents

1. Background

[RFC7480] defines the "application/rdap+json" media type to be used with RDAP. This document defines a new parameter for this media type when an RDAP extension needs to be described during HTTP content negotiation.

This parameter enables an RDAP client to signal to an RDAP server the list of RDAP extensions supported by that client. For example, an RDAP client that supports the "foo" extension may use this mechanism as a signal to an RDAP server, thus allowing the server to respond with data using the "foo" extension inside an RDAP response only when it can be assured the client can understand the extension.

By using this method, there is no need for every RDAP extension to define their own unique signaling mechanism. Additionally, this method is designed to be backwards-compatible with the deployed RDAP ecosystem (see Appendix B for further information).

1.1. Document Terms

The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.

2. The RDAP Media Type With "exts_list" Parameter

The RDAP media type, "application/rdap+json", may have an optional parameter named "exts_list". This parameter is a whitespace-separated list of RDAP extension identifiers (as would be found in the "rdapConformance" array).

Here is an example:

application/rdap+json;exts_list="rdap_level_0 exts fred"

3. Using The "exts_list" Parameter

[RFC7480] specifies the usage of "application/json", "application/rdap+json" or both with HTTP "accept" header. The "exts_list" parameter may only be used with the "application/rdap+json" media type.

This is an example of the "accept" header using the RDAP media type with the "exts_list" parameter:

accept: application/json;q=0.9,
    application/rdap+json;exts_list="rdap_level_0 exts fred";q=1

If both a client and a server support the "exts_list" parameter, and the client requests an extension that is unimplemented by the server, the server MUST respond with only extensions included in the response by the server. This behavior is backwards-compatible as RDAP clients should ignore unknown RDAP extensions as specified by [RFC9083]. Responding with an HTTP 406 Not Acceptable status code is NOT RECOMMENDED because an RDAP client could interpret this status code to mean that the server does not understand RDAP in its entirety.

The extensions requested by the client represent a hint for the server in determining the extensions to include the response. If a server is required to use an extension in a response that was not requested by the client, the server MUST respond as if the client had requested the extension. This behavior is backwards-compatible as RDAP clients should ignore unknown extensions as specified by [RFC9083]. Responding with an HTTP 406 Not Acceptable status code is NOT RECOMMENDED for the reason stated above.

When the "exts_list" parameter is used in the RDAP media type in the "content-type" header, the values in the media type's "exts_list" parameter MUST match the values in the "rdapConformance" array in the returned JSON. However, implementation experience has shown that some HTTP server libraries do not support modification of the "content-type" header per query type. Therefore, use of the "exts_list" parameter with the media type of the "content-type" header is NOT REQUIRED. That is, when used in the "content-type" header, the values of the "exts_list" parameter must match that of the "rdapConformance" array but server may opt to omit the "exts_list" parameter from the media type in the "content-type" header.

If a server does use the "exts_list" parameter with the media type in the "content-type" header, the content of the "exts_list" parameter MUST mirror the content of the "rdapConformance" array in server responses. This includes the identifier "rdap_level_0", which is not an extension identifier but an identifier for the base RDAP specifications. Servers MUST follow the same rules for placing "rdap_level_0" in the content of the "exts_list" parameter and the "rdapConformance" array. Clients MUST interpret the "exts_list" parameter without "rdap_level_0" or one of its successor identifiers (e.g., "rdap_level_1") in the same manner as the interpretation of the "rdapConformance" array without "rdap_level_0" or one of its successors.

Nothing in this specification sidesteps or obviates the HTTP content negotiation defined in [RFC9110] for RDAP.

Likewise, nothing in this specification sidesteps or obviates the HTTP caching mechanisms defined in [RFC9110]. Further advice on the "vary" header can be found in Appendix A.

Some RDAP extensions, such as [RFC9560], have other protocol elements (e.g., extension-specific query parameters) passed from the client to the server, and the presence of these protocol elements may be used by servers to determine a client's capability to handle the related RDAP extension(s). This specification does not require the usage of those extension identifiers in the "exts_list" parameter, though clients SHOULD list the extension identifier in the "exts_list" parameter when using other protocol elements of those extensions for better compatibility with servers recognizing the "exts_list" parameter. Servers SHOULD NOT require the usage of extension identifiers in the "exts_list" parameter when these types of extension protocol elements are present in requests for better compatibility with the extensions using them.

3.1. Extension Identifier

This document defines an RDAP extension using the identifier "exts". This RDAP extension defines no additional RDAP queries or response structures.

The purpose of this RDAP extension is to allow servers to signal support for the "exts_list" parameter in "rdapConformance" arrays of responses to "/help" (aka "service discovery").

3.2. Examples

The following examples use the HTTP/1.1 message exchange syntax as seen in [RFC9110].

3.2.1. Classic Negotiation

This example demonstrates the negotiation of the "application/rdap+json" media type as defined in [RFC7480] using an RDAP "/help" query. This example also demonstrates the negotiation in which a client does not support the "exts" extension, but a server does support the "exts" extension.

Client Request:

GET /help HTTP/1.1
accept: application/rdap+json

Server Response:

HTTP/1.1 200 OK
content-type: application/rdap+json

{ "rdapConformance" : [ "rdap_level_0", "exts" ],
  "notices" : [
    { "description" : [ "my content includes a trailing CRLF" ] } ] }

3.2.2. Negotiation of an RDAP Extension

In this example, both the client and server support the "exts" extension and a fictional extension of "foo".

Client Request:

GET /help HTTP/1.1
accept: application/rdap+json;exts_list="rdap_level_0 exts foo"

Server Response:

HTTP/1.1 200 OK
content-type: application/rdap+json

{ "rdapConformance" : [ "rdap_level_0", "exts", "foo" ],
  "notices" : [
    { "description" : [ "my content includes a trailing CRLF" ] } ] }

3.2.3. No Server Support for "exts" Extension

In this example, only the client supports the "exts" extension, along with a fictional extension of "foo" by both.

Client Request:

GET /help HTTP/1.1
accept: application/rdap+json;exts_list="rdap_level_0 exts foo"

Server Response:

HTTP/1.1 200 OK
content-type: application/rdap+json

{ "rdapConformance" : [ "rdap_level_0", "foo" ],
  "notices" : [
    { "description" : [ "my content includes a trailing CRLF" ] } ] }

3.2.4. Differing Extension Negotiation

In this example, both the client and server support the "exts" extension. The client supports the extensions "foo" and "bar" while the server only support "foo".

Client Request:

GET /help HTTP/1.1
accept: application/rdap+json;exts_list="rdap_level_0 exts foo bar"

Server Response:

HTTP/1.1 200 OK
content-type: application/rdap+json

{ "rdapConformance" : [ "rdap_level_0", "exts", "foo" ],
  "notices" : [
    { "description" : [ "my content includes a trailing CRLF" ] } ] }

3.2.5. Transitioning from jCard to JSContact

This set of examples shows how a transition from RDAP's "legacy" contact format, jCard, to JSContact.

The first example of the transition shows a client that supports JSContact and a server that only supports jCard.

Client Request:

GET /entity/fizz1234 HTTP/1.1
accept: application/rdap+json;exts_list="rdap_level_0 jscontact"

Server Response:

HTTP/1.1 200 OK
content-type: application/rdap+json

{
  "rdapConformance": [ "rdap_level_0" ],
  "objectClassName": "entity",
  "handle": "fizz1234",
  "vcardArray": [
    "vcard",
    [
      [ "version", { }, "text", "4.0" ],
      [ "fn", { }, "text", "Bob Smurd" ],
      [ "email", { }, "text", "bob@example.com" ]
    ]
  ]
}

In the next example of the transition, the server supports both jCard and JSContact and returns JSContact because the client has signaled that it supports the JSContact extension:

Client Request:

GET /entity/fizz1234 HTTP/1.1
accept: application/rdap+json;exts_list="rdap_level_0 jscontact"

Server Response:

HTTP/1.1 200 OK
content-type: application/rdap+json

{
  "rdapConformance": [ "rdap_level_0", "jscontact" ],
  "objectClassName": "entity",
  "handle": "fizz1234",
  "jscontact_card": {
    "@type": "Card",
    "version": "2.0",
    "name": { "full": "Bob Smurd" },
    "emails": { "email": { "address": "bob@example.com" } }
  }
}

5. Implementation Status

RFC EDITOR NOTE: Please remove this section and the reference to RFC 7942 prior to publication as an RFC.

This section records the status of known implementations of the protocol defined by this specification at the time of posting of this Internet-Draft, and is based on a proposal described in RFC 7942 [RFC7942]. The description of implementations in this section is intended to assist the IETF in its decision processes in progressing drafts to RFCs. Please note that the listing of any individual implementation here does not imply endorsement by the IETF. Furthermore, no effort has been spent to verify the information presented here that was supplied by IETF contributors. This is not intended as, and must not be construed to be, a catalog of available implementations or their features. Readers are advised to note that other implementations may exist.

According to RFC 7942, "this will allow reviewers and working groups to assign due consideration to documents that have the benefit of running code, which may serve as evidence of valuable experimentation and feedback that have made the implemented protocols more mature. It is up to the individual working groups to use this information as they see fit".

5.1. IIT-CNR/Registro.it RDAP Server

  • Responsible Organization: Institute of Informatics and Telematics of National Research Council (IIT-CNR)/Registro.it

  • Location: https://rdap.pubtest.nic.it/

  • Description: This implementation includes support for RDAP queries using data from the public test environment of .it ccTLD.

  • Level of Maturity: This is an "alpha" test implementation.

  • Coverage: This implementation includes all the features described in this specification.

  • Contact Information: Mario Loffredo, mario.loffredo@iit.cnr.it

5.2. ICANN-RDAP Client

  • Responsible Organization: Internet Corporation for Assigned Names and Numbers

  • Location: https://github.com/icann/icann-rdap

  • Description: This is a general purpose RDAP client, including client libraries, used directly as CLI and embedded into other software such as intrusion detection systems.

  • Level of Maturity: This software is widely used, however the features of this specification are in a pre-release branch of the software.

  • Coverage: This implementation includes all the features described in this specification.

  • Contact Information: ICANN Global Support, globalsupport@icann.org

5.3. ICANN-RDAP Server

  • Responsible Organization: Internet Corporation for Assigned Names and Numbers

  • Location: https://github.com/icann/icann-rdap

  • Description: This is a general purpose RDAP server, including libraries, used for testing and embedded into production servers of some registry service providers.

  • Level of Maturity: The features of this specification are in a pre-release branch of the software.

  • Coverage: This implementation includes all the features described in this specification.

  • Contact Information: ICANN Global Support, globalsupport@icann.org

6. Security Considerations

As stated in Section 3, this specification does not override the protocol elements of RDAP security extensions, such as [RFC9560], nor does it override the protocol elements of other security features of HTTP.

This specification does contrast with solutions using query parameters in that those solutions require servers to blindly copy query parameters into redirect URLs in situations where such copying could cause harm, such as copying an API key intended for one server into the redirect URL of another server.

7. IANA Considerations

7.1. RDAP Extension Registry

The IETF requests the IANA to register the following extension in the RDAP Extensions Registry at [RDAP-EXTENSIONS]:

Extension identifier: exts

Registry operator: ALL

Published specification: [RFC Reference Once Published]

Person & email address to contact for further information:
The Internet Engineering Steering Group <iesg@ietf.org>

Intended usage: COMMON

7.2. Addition of "exts_list" Parameter to the RDAP Media Type

This document defines the optional parameter "exts_list" for the media type "application/rdap+json" as described in Section 2.

The IETF requests the IANA to add this document as an additional reference to the IANA Media Type registry at [MEDIA-TYPES] for the media type "application/rdap+json".

8. Acknowledgements

Pawel Kowalik provided extensive review of this document and conducted a study that forms the basis of re-using the existing RDAP media type. James Mitchell has provided ideas and feedbacks that have contributed to the content of this document based on his RDAP server implementation experience. Murray Kucherawy and Alexey Melnikov provided guidance on the use of media types and media type parameters. Maarten Wullink and Jame Gould provided feedback that contributed to the content of this document. Mario Loffredo has provided valuable feedback on the contents of this specification, including feedback from his implementation, that has helped to reduce interoperability issues.

9. References

9.1. Normative References

[RFC2119]
Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, , <https://www.rfc-editor.org/info/rfc2119>.
[RFC7480]
Newton, A., Ellacott, B., and N. Kong, "HTTP Usage in the Registration Data Access Protocol (RDAP)", STD 95, RFC 7480, DOI 10.17487/RFC7480, , <https://www.rfc-editor.org/info/rfc7480>.
[RFC8174]
Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, , <https://www.rfc-editor.org/info/rfc8174>.
[RFC8288]
Nottingham, M., "Web Linking", RFC 8288, DOI 10.17487/RFC8288, , <https://www.rfc-editor.org/info/rfc8288>.

9.2. Informative References

[I-D.ietf-regext-rdap-extensions]
Newton, A., Singh, J., and T. Harrison, "RDAP Extensions", Work in Progress, Internet-Draft, draft-ietf-regext-rdap-extensions-09, , <https://datatracker.ietf.org/doc/html/draft-ietf-regext-rdap-extensions-09>.
[MEDIA-TYPES]
IANA, "Media Types", <https://www.iana.org/assignments/media-types/>.
[RDAP-EXTENSIONS]
IANA, "RDAP Extensions", <https://www.iana.org/assignments/rdap-extensions/>.
[RFC2045]
Freed, N. and N. Borenstein, "Multipurpose Internet Mail Extensions (MIME) Part One: Format of Internet Message Bodies", RFC 2045, DOI 10.17487/RFC2045, , <https://www.rfc-editor.org/info/rfc2045>.
[RFC3986]
Berners-Lee, T., Fielding, R., and L. Masinter, "Uniform Resource Identifier (URI): Generic Syntax", STD 66, RFC 3986, DOI 10.17487/RFC3986, , <https://www.rfc-editor.org/info/rfc3986>.
[RFC7942]
Sheffer, Y. and A. Farrel, "Improving Awareness of Running Code: The Implementation Status Section", BCP 205, RFC 7942, DOI 10.17487/RFC7942, , <https://www.rfc-editor.org/info/rfc7942>.
[RFC9083]
Hollenbeck, S. and A. Newton, "JSON Responses for the Registration Data Access Protocol (RDAP)", STD 95, RFC 9083, DOI 10.17487/RFC9083, , <https://www.rfc-editor.org/info/rfc9083>.
[RFC9110]
Fielding, R., Ed., Nottingham, M., Ed., and J. Reschke, Ed., "HTTP Semantics", STD 97, RFC 9110, DOI 10.17487/RFC9110, , <https://www.rfc-editor.org/info/rfc9110>.
[RFC9560]
Hollenbeck, S., "Federated Authentication for the Registration Data Access Protocol (RDAP) Using OpenID Connect", RFC 9560, DOI 10.17487/RFC9560, , <https://www.rfc-editor.org/info/rfc9560>.

Appendix A. Using the Vary Header

Server implementers may want to consider using the "vary" header depending on the caching behavior desired of shared caches (i.e., middleboxes, not client caches).

Consider the following scenario where user Bob and user Alice send queries to the same RDAP server that is routed through a middlebox network element implementing a shared HTTP cache.

User Bob sends a query for the domain "example.com" (http://regy.example/domain/example.com) without the "exts_list" parameter. The "accept" header sent for Bob's query would be accept: application/rdap+json or accept: application/json.

User Alice later sends a query for the same domain, however her client uses the "exts_list" parameter. The "accept" header sent for Alice's query might be accept: application/rdap+json;exts_list="rdap_level_0 exts foo".

If no "vary" header is set in the response for these queries, the shared cache will compare only the URL of the query when processing cache items and therefore user Bob and user Alice would receive the same answer. In other words, since both queried "http://regy.example/domain/example.com" the shared cache would return the answer of the first query to the second query and all other subsequent queries until the item expired out of the cache.

If server implementers do not desire this behavior and would signal that caches consider each query separately, servers should also return a "vary: accept" header to inform the cache that the "accept" header should also be considered when processing cache items. Server implementers should also consult [RFC9110] regarding caching and other uses of the "vary" header.

Appendix B. Design Considerations

B.1. Reusing the Existing Media Type

Earliest versions of this document specified a new media type because the authors believed the addition of new parameter on the existing RDAP media type may be backwards-incompatible with many RDAP servers. However, a study conducted by Pawel Kowalik concluded that 99.65% of RDAP servers are compatible with a new parameter on the existing RDAP media type.

Additionally, [RFC2045] requires that the server ignore unknown parameters.

B.2. Inappropriate Use of Query Parameters

Another design approach to communicating RDAP extensions from the client to the server would be the use of URI query parameters:

https://rdap.example/domain/foo.example?exts_list=fizzbuzz

However, there are a few problems with using query parameters for this scenario. Some of these problems are specific to RDAP and are also documented in [I-D.ietf-regext-rdap-extensions]. The following sections also describe the problems.

B.2.1. Copy and Paste

Consider two RDAP users, Alice and Bob. Alice has an RDAP client that supports the extension "fizzbuzz", and Bob has an RDAP client that does not support this extension.

Now consider the scenario where Alice copies and pastes the RDAP URL from above into an email and sends it to Bob. When Bob uses that URL with his RDAP client, it will be communicating to the server that the extension "fizzbuzz" is understood by Bob's client when it is not.

In this scenario, Bob's client will be unable to render the RDAP extension regardless of the usage of the query parameter. However, if the server is using the query parameter for secondary purposes, such as gathering metrics and statistics, then the capabilities of Bob's client would have been incorrectly signalled to the server.

B.2.2. Redirects

The RDAP ecosystem uses redirects in many situations. [RFC7480] discusses "aggregators", which are RDAP servers used to help clients find authoritative RDAP servers using the RDAP bootstrap registries. Redirects are also heavily used by the RIRs when IP addresses or autonomous system numbers are transferred from one RIR to another.

Within HTTP, URI query parameters are not explicitly preserved during a redirect (probably due to architecture considerations: see the section below). Specific to RDAP, [RFC7480] instructs RDAP servers to ignore unknown query parameters and instructs clients not to transform the URL of a redirect.

Therefore, query parameters denoting RDAP extensions should not survive redirects in RDAP, and in many real-world examples they do not survive redirects. This can be readily observed in currently deployed RDAP servers:

curl -v https://rdap-bootstrap.arin.net/bootstrap/autnum/2830?exts_list=fizzbuzz

To further demonstrate that query parameters do not automatically survive redirects but that media types do, consider the code found here. This code consists of a simple client and a simple server. The client sets both a new media type and query parameters. The servers listen on two ports, redirecting the client from a URL on the first port to a URL on the second port.

Preservation of query parameters is not a guaranteed feature of HTTP client and server libraries, whereas preservation of media types is much more likely to occur.

B.2.3. Referral Compatibility

It is common in the RDAP ecosystem to link from one RDAP resource to another. These are typically conveyed in the link structure defined in Section 4.2 of [RFC9083] and use the "application/rdap+json" media type. One common usage is to link to a domain registration in a domain registrar from a domain registration in a domain registry.

{
  "value" : "https://regy.example/domain/foo.example",
  "rel" : "related",
  "href" : "https://regr.example/domain/foo.example",
  "type" : "application/rdap+json"
}

Usage of the "exts_list" media-type parameter does not require clients to conduct further processing of these referrals, whereas a query parameter approach would require clients to process and de-conflict any other query parameters if present.

Just as in the copy-and-paste scenario above, a referral with a query parameter representing the RDAP extensions understood by the client (i.e., the client's capability to understand RDAP responses), may indicate to a server some capabilities the client may not possess.

Consider a scenario in which a user has a client that does no support the JSContact extension (i.e., it only supports jCard) and encounters the following referral using a query parameter:

{
  "value" : "https://regy.example/domain/foo.example",
  "rel" : "related",
  "href" : "https://regr.example/domain/foo.example?exts_list=jscontact,
  "type" : "application/rdap+json"
}

Now consider that the server at regr.example is in a transition phase between jCard and JSContact and serves only JSContact when it is told the client understands JSContact. In this scenario, the user would not be capable of processing the contact information because their client only understands jCard and the server has responded only with JSContact.

B.2.4. Architectural Violations

Section 3.4 of [RFC3986] states the following:

The query component contains non-hierarchical data that, along with data in the path component (Section 3.3), serves to identify a resource within the scope of the URI's scheme and naming authority (if any).

Therefore, URI query parameters are meant to be part of the identity of the resource being identified by a URI and pointed to by the location of a URL. RDAP extensions change the portions of JSON returned by the server but are not intended to change the resource being identified. That is, a domain registration is the same domain registration regardless of whether the postal address in that domain registration is communicated via jCard or a new RDAP extension for JSContact.

Changing how the content of a resource is conveyed is called content negotiation and is discussed in detail in [RFC9110] using media types.

Authors' Addresses

Andy Newton
ICANN
Jasdip Singh
ARIN