DNS Bidirectional Fallback: Hybrid Resolution With Legacy DNS Compatibility

by Nick Clark | Published March 27, 2026 | PDF

The adaptive index resolves names through its own governed namespace whenever the requested name falls within an adaptive scope known to the resolver. When the name does not fall within any known adaptive scope, or when the adaptive index reports no entry for it, the resolver falls through to legacy DNS as a bounded fallback path. The fallback is not unconditional. It is constrained to a configured set of zones, the DNS responses that pass through it must carry signatures that the resolver verifies before consumption, and every fallback consultation produces an audit record that is committed alongside the resolution lineage. The result is a hybrid resolution path that preserves the operational reach of DNS without inheriting its lack of governance.


Mechanism

The fallback mechanism is realized as a structured stage in the resolver pipeline. When a resolution request arrives, the resolver first determines whether the requested name is plausibly within an adaptive scope by consulting its local map of scope prefixes. If a matching prefix is found, the resolver dispatches the request through the adaptive index using the standard stepwise delegation protocol. If the adaptive index returns a positive resolution, the request is complete and no fallback is performed.

If the adaptive index returns a negative resolution, or if no adaptive scope prefix matches, the resolver enters the fallback stage. The fallback stage is gated by a fallback policy attached to the resolver's configuration. The policy enumerates the DNS zones that are eligible for fallback, the maximum recursion depth permitted, the signature requirements that DNS responses must satisfy, and the audit obligations that apply to each consultation. A request that does not satisfy the policy preconditions is rejected before any DNS query is emitted.

When the policy preconditions are satisfied, the resolver issues a DNS query through a constrained DNS client that enforces the policy at the query layer. The DNS client is restricted to the eligible zones and may not chase referrals outside the eligible set. The client requires that responses carry DNSSEC signatures or an equivalent signature chain that the resolver can verify against a trust anchor declared in the fallback policy. A response that lacks a verifiable signature chain is treated as if no response had been received, and the request fails through to the next configured fallback path or terminates with a structured error.

Each fallback consultation produces an audit record. The audit record captures the original request, the adaptive scopes that were consulted before fallback was invoked, the fallback policy that authorized the consultation, the DNS query that was issued, the signed response that was received, the verification outcome, and the final resolution returned to the caller. The audit record is signed by the resolver and committed to the resolution lineage that the calling scope maintains. A consumer of the lineage can therefore distinguish, after the fact, between names that were resolved natively within the adaptive index and names that were resolved through DNS fallback, and can reconstruct the exact provenance of every fallback consultation.

The audit-required posture is enforced by the protocol pipeline. The resolver cannot return a fallback resolution to the caller before the audit record has been committed to the lineage. The pipeline orders the commit before the response so that any resolution the caller observes has already been recorded. This ordering is what allows the system to make the structural claim that DNS fallback is auditable in the same sense that adaptive resolution is auditable, despite DNS itself providing no native audit facility.

Operating Parameters

The mechanism exposes a structured set of operating parameters per resolver. The first parameter is the adaptive-scope prefix map. The map enumerates the prefixes that the resolver treats as adaptive and the entry points it uses to reach each scope. A request whose name matches a prefix is dispatched to the adaptive index; a request whose name does not match any prefix is eligible for fallback subject to the policy.

The second parameter is the fallback zone allowlist. The allowlist enumerates the DNS zones that are eligible for fallback. A request for a name outside the allowlist is denied even if the adaptive index has no entry for it. The allowlist is the structural bound that prevents fallback from becoming an unrestricted gateway to the entire DNS hierarchy.

The third parameter is the signature requirement. The resolver declares the signature scheme that DNS responses must satisfy, the trust anchors that root the signature verification, and the freshness horizon within which the signatures must have been produced. A response that fails any of these checks is rejected. The default scheme is DNSSEC with a configured root anchor, but the mechanism admits alternative schemes for deployments that have access to stronger signing infrastructure.

The fourth parameter is the recursion depth bound. The fallback DNS client is permitted to follow a configured number of referrals within the allowlist. Beyond the bound, the client terminates with a structured error rather than continuing to chase referrals. The bound prevents pathological response patterns from extending the fallback into open-ended chains.

The fifth parameter is the audit retention horizon. Fallback audit records are retained for at least the duration mandated by the calling scope's governance policy. The lineage commitments that anchor the audit records remain valid indefinitely because the cryptographic commitment is independent of the storage tier in which the records are kept.

The sixth parameter is the fallback rate limit. The resolver may impose a per-caller or per-zone rate limit on fallback consultations to prevent fallback from being used as an amplification vector for unrelated DNS traffic. Requests in excess of the rate limit are denied with a structured error and an audit record indicating the rate-limit decision.

The seventh parameter is the negative-cache horizon. When a fallback consultation returns a negative response, the resolver may cache the negative outcome for a configured horizon to avoid repeated consultations for the same name. Negative cache entries are themselves anchored in the lineage so that a consumer can verify that a negative outcome was not silently elided.

Alternative Embodiments

In a first embodiment, the fallback path is unidirectional: the resolver consults the adaptive index first and falls back to DNS only when the adaptive index reports no entry. The reverse direction, where DNS clients reach adaptive resources, is not supported in this embodiment, which is suitable for deployments where DNS clients are not expected to reach adaptive scopes.

In a second embodiment, the fallback path is bidirectional. DNS zones include bridge records that point DNS resolvers to a bridge service that translates DNS queries into adaptive index resolutions. The bridge service applies the same fallback policy in reverse: it accepts only DNS queries that satisfy the bridge's audit requirements and produces lineage commitments for every translated query. This embodiment is suitable for deployments that need to provide adaptive resources to DNS-only clients during a migration window.

In a third embodiment, the signature scheme is DNSSEC with a configured root anchor. In a fourth embodiment, the signature scheme is a transport-layer attestation produced by a trusted DNS-over-HTTPS endpoint that carries its own signing key. In a fifth embodiment, the signature is a multi-party attestation in which several independent DNS sources must agree on the response before the resolver accepts it. The mechanism is agnostic to the specific signature scheme provided that the scheme produces a verifiable artifact bound to a declared trust anchor.

In a sixth embodiment, the fallback consultation is performed eagerly: the resolver issues the DNS query in parallel with the adaptive index consultation and uses whichever response arrives first that satisfies the policy. This embodiment trades additional DNS traffic for reduced latency in the common case where the adaptive index has no entry. In a seventh embodiment, the fallback is performed lazily, only after the adaptive index has confirmed the absence of an entry. The lazy embodiment minimizes DNS traffic at the cost of additional latency on miss.

In an eighth embodiment, the audit record is mirrored in real time to an external evidence store operated by an independent party. The mirror provides forensic resilience against compromise of the resolver itself: an attacker who controls the resolver cannot retroactively elide fallback consultations from the external store.

In a ninth embodiment, the fallback policy is itself anchored in the adaptive index. The policy is a governed object whose mutations are subject to the same audit and delegation rules as any other adaptive object. This embodiment closes the bootstrapping problem that arises when the policy that governs fallback is stored outside the system whose integrity it protects.

Composition

The fallback mechanism composes with the broader adaptive index along several axes. It composes with delegation: a parent scope that authorizes a child scope to perform fallback can constrain the child's fallback policy by intersection. The child cannot expand its fallback eligibility beyond the parent's bound. Composition through delegation is therefore monotone in the direction that the child cannot exceed the parent.

The mechanism composes with the contextual access subsystem. Eligibility to invoke fallback is itself a capability tier within the calling scope's policy graph. A principal that is permitted to resolve names within an adaptive scope may or may not be permitted to consume fallback responses, and the contextual access policy expresses both conditions in the same structure. Fallback is therefore not an escape hatch around access control; it is a governed capability subject to the same evaluation as any other.

The mechanism composes with the lineage layer. Fallback audit records appear in the same append-only chain that records adaptive resolutions, mutations, and delegations. A consumer of the chain can reconstruct the complete resolution history of a scope, distinguishing native and fallback resolutions and verifying that every fallback consultation was authorized by a policy in effect at the moment.

The mechanism composes with the trust score subsystem. A resolver that consistently returns fallback responses that fail verification, or that violates its rate limits, accumulates trust degradation that affects its identity tier in scopes that consume its outputs. Composition is structural rather than procedural: the trust subsystem updates a signal, the signal flows into the contextual access policy, and the policy responds.

Prior-Art Distinctions

Prior systems for hybrid name resolution fall into several categories. Stub resolvers that consult multiple back-ends in sequence implement a primitive form of fallback but typically do not enforce signature requirements on the responses, do not produce audit records, and do not bound the fallback to an explicit zone allowlist. The mechanism described here imposes all three properties as structural requirements.

DNSSEC-validating resolvers verify the signatures on DNS responses but do not produce audit records committed to a tamper-evident lineage and do not constrain fallback to a governed allowlist. The mechanism described here uses DNSSEC verification as one component of a broader policy that includes allowlist enforcement and audit commitment.

Split-horizon DNS configurations route different requests to different DNS back-ends based on the requesting network. The routing decision is made by the network rather than by a governance policy, and the routing produces no audit artifact that consumers of the resolved names can verify. The mechanism described here makes the fallback decision explicit, governed, and auditable.

Bridge gateways that translate between DNS and alternative naming systems exist in various deployments. These gateways typically operate as opaque translators that accept inputs and produce outputs without exposing the translation as a governed event. The mechanism described here treats every translation as a lineage-committed event subject to the same policy as any other governed operation, which is a structural departure from the bridge-gateway pattern.

Disclosure Scope

The disclosure encompasses any embodiment of the mechanism that satisfies the structural properties described above: bounded fallback to legacy DNS gated by an explicit zone allowlist; signature verification of DNS responses against a declared trust anchor; production of structured audit records committed to a tamper-evident lineage chain prior to response delivery; and uniform composition with delegation, contextual access, and trust score subsystems.

The disclosure encompasses unidirectional and bidirectional embodiments, eager and lazy consultation patterns, alternative signature schemes, alternative trust anchors, and alternative deployment topologies. It encompasses embodiments in which the fallback policy is anchored in the adaptive index itself and embodiments in which it is configured externally. It encompasses embodiments that mirror audit records to external evidence stores and embodiments that retain them locally.

Embodiments that omit the audit-required posture, that permit fallback without signature verification, or that allow fallback to chase referrals outside the configured allowlist fall outside the disclosure. The structural properties are not optional features; they are the properties that distinguish the mechanism from prior art and that justify its use in environments where governance and accountability are required for every name resolution.

Nick Clark Invented by Nick Clark Founding Investors:
Anonymous, Devin Wilkie
72 28 14 36 01