<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.35 (Ruby 3.4.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-hardaker-dnsop-rss-usage-considerations-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="DNS RSS Usage Considerations">DNS Root Server System Usage Considerations</title>
    <seriesInfo name="Internet-Draft" value="draft-hardaker-dnsop-rss-usage-considerations-00"/>
    <author fullname="Wes Hardaker">
      <organization>Google, Inc.</organization>
      <address>
        <email>ietf@hardakers.net</email>
      </address>
    </author>
    <author fullname="Warren Kumari">
      <organization>Google</organization>
      <address>
        <email>warren@kumari.net</email>
      </address>
    </author>
    <date year="2026" month="April" day="28"/>
    <area>Operations and Management</area>
    <workgroup>Domain Name System Operations</workgroup>
    <keyword>DNS</keyword>
    <keyword>DNSSEC</keyword>
    <keyword>root zone</keyword>
    <abstract>
      <?line 86?>

<t>This document explores various technologies developed to enhance the DNS,
focusing specifically on interactions with the DNS Root Server System (RSS). It
examines a number of the protocols and evaluates their impact on
communication with the RSS.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-hardaker-dnsop-rss-usage-considerations/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Domain Name System Operations Working Group mailing list (<eref target="mailto:dnsop@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/dnsop/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/dnsop/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/https://github.com/hardaker/draft-hardaker-dnsop-rss-usage-considerations"/>.</t>
    </note>
  </front>
  <middle>
    <?line 93?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document explores various technologies developed to enhance the DNS,
focusing specifically on interactions with the DNS Root Server System (RSS). It
examines a number of the protocols and evaluates their impact on
communication with the RSS.</t>
      <t>While the necessity of a centralized source for a unique internet naming system
is beyond the scope of this document, it is thoroughly addressed in
<xref target="RFC2826"/>.</t>
      <t>The document begins by briefly describing and referencing various communication
enhancements in <xref target="techniques"/>. It then provides an analysis of how these
enhancements impact communication with the RSS in <xref target="analysis"/>.</t>
      <section anchor="document-conventions">
        <name>Document Conventions</name>
        <t>To evaluate the potential changes to RSS communication in <xref target="analysis"/>, this
document categorizes the solutions using the following keywords:</t>
        <ul spacing="normal">
          <li>
            <t><strong>Minimal</strong>: The technique addresses a problem with only a minimal amount
of improvement.</t>
          </li>
          <li>
            <t><strong>Moderate</strong>: The technique provides a moderate level of improvement in
addressing a problem.</t>
          </li>
          <li>
            <t><strong>Significant</strong>: The technique offers substantial improvement for
communicating with the RSS, even though it does not entirely address the
problem space.</t>
          </li>
          <li>
            <t><strong>Complete</strong>: The technique fully enhances communication with the RSS and/or
completely mitigates the defined concern.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="techniques">
      <name>Techniques Improving Communication with the RSS</name>
      <t>This section outlines various techniques designed to improve
communication with the DNS Root Server System (RSS), particularly in
addressing security or efficiency concerns.  These techniques are
further analyzed in <xref target="analysis"/> to evaluate their effectiveness in
mitigating each of the concerns.</t>
      <section anchor="qname-minimization">
        <name>QName Minimization</name>
        <t>The original DNS protocol specifications <xref target="RFC1035"/> indicated that
the entire query name being handled by a resolver should be sent to
upstream authoritative servers; this behavior leaks all the labels in a query to
all the authoritative servers used in the resolution process, even when
the authoritative server doesn't use all the labels when generating a
response.</t>
        <t>The "DNS Query Name Minimisation to Improve Privacy" <xref target="RFC9156"/>
specification describes how recursive resolvers can minimize this
privacy leakage by describing how the resolver "no longer always sends
the full original QNAME and original QTYPE to the upstream name
server."</t>
      </section>
      <section anchor="aggressive-nsec">
        <name>Aggressive NSEC</name>
        <t>The "Aggressive Use of DNSSEC-Validated Cache" <xref target="RFC8198"/> <xref target="RFC9077"/>
specification describes how validating recursive resolvers can reduce the
number of queries sent to authoritative servers by allowing "DNSSEC-validating
resolvers to generate negative answers within a range and positive answers from
wildcards."</t>
        <t>(Ed note: The NSEC example used in this paragraph is an accurate example as of this writing, but may change over time.)
Aggressive NSEC leverages NSEC records to prevent redundant queries for
non-existent TLDs. Validating resolvers can use NSEC records to synthesize
negative responses for non-existent TLDs based on previously received NSEC
records. For example, a query for a non-existent TLD (e.g.,
".example") will return an NSEC record cryptographically proving that the no
names between ".events" and ".exchange" exist. Subsequent queries within the NSEC
TTL for a non-existent TLD that falls between ".events" and ".exchange" (e.g.,
".evil") can be answered immediately without sending a query to the RSS.</t>
        <t>This technique is particularly effective in reducing queries to the RSS for
non-existent TLDs, as once a single query between two valid TLDs has been sent,
validating resolvers can make use of the returned NSEC records to prevent
future queries between the two bounding TLDs from needing resolution. This
improves both privacy (<xref target="privacy"/>) and latency (<xref target="latency"/>)
when communicating with the RSS, as fewer
queries are sent and more responses can be generated immediately from the cache.</t>
      </section>
      <section anchor="encrypted-dns">
        <name>Encrypted DNS</name>
        <t>There are a variety of protocols that enable encrypted DNS
transactions both between stubs and recursive resolvers, and between recursive
resolvers and authoritative servers. These include "DNS over Transport
Layer Security" (TLS) <xref target="RFC7858"/> and "DNS over Datagram Transport
Layer Security (DTLS)" <xref target="RFC8094"/> (along with supplemental
information <xref target="RFC8310"/>) which collectively are referred to as "DNS
over (D)TLS".</t>
        <t>In addition, "DNS Queries over HTTPS (DoH)" <xref target="RFC8484"/>, "DNS over Dedicated QUIC
Connections" <xref target="RFC9250"/>, and "Oblivious DNS over HTTPS" <xref target="RFC9230"/> enable DNS
over encrypted HTTP transports.</t>
        <t>The "Unilateral Opportunistic Deployment of Encrypted Recursive-to-Authoritative"
DNS <xref target="RFC9539"/> specification defines how recursive resolvers can communicate
with authoritative servers that support encrypted TLS sessions. However,
the specification is currently published under an EXPERIMENTAL status.</t>
      </section>
      <section anchor="serve-stale">
        <name>Serve Stale</name>
        <t>The "Serving Stale Data to Improve DNS Resiliency" <xref target="RFC8767"/> specification
specifies how resolvers can continue to serve previously cached records even
after their Time-To-Live (TTL) has expired. This approach enhances DNS
resiliency by ensuring that responses remain available during periods when
authoritative servers are unreachable, such as during network outages or server
failures.</t>
      </section>
      <section anchor="dnssec">
        <name>DNSSEC</name>
        <t>DNSSEC <xref target="RFC9364"/> provides cryptographic assurance of the authenticity and
integrity of DNS responses. Using digital signatures, DNSSEC ensures that data
from the root and other signed zones cannot be maliciously modified without
detection. This allows validating resolvers, and their clients, to verify the
origin, authenticity, and correctness of DNS data.</t>
      </section>
      <section anchor="localroot">
        <name>LocalRoot</name>
        <t>LocalRoot enables recursive resolvers to maintain and use a local copy
of the root zone, eliminating the need to query the root servers
directly. This concept has been documented for over a decade in
<xref target="RFC7706"/>, <xref target="RFC8806"/>, and <xref target="LOCALROOT"/>, and in academic research
<xref target="NOROOTS"/>, <xref target="ROOTPRIVACY"/>. It is implemented in <xref target="BINDMIRROR"/>,
<xref target="KNOTMODULE"/>, <xref target="UNBOUNDAUTHZONE"/>, <xref target="LOCALROOTISI"/>.</t>
        <t>The initial LocalRoot implementations relied on AXFR for transferring
root zone data. More recent implementations instead support HTTP-based
transfers, providing additional flexibility and scalability.</t>
      </section>
    </section>
    <section anchor="analysis">
      <name>RSS Communication Improvement Effectiveness Comparison</name>
      <t>This section evaluates the impact of the techniques described in <xref target="techniques"/>
on recursive resolvers' communication with the Root Server System (RSS).</t>
      <section anchor="privacy">
        <name>Privacy</name>
        <t>Queries sent to the RSS include those within existing Top-Level Domains (TLDs)
(e.g., ".com", ".org") and for queries under non-existent domains (e.g.,
"sensitive.internal", sensitive.con" (sic)).</t>
        <t>When a resolver's cache lacks an answer for a domain within an associated TLD, the
query is forwarded to the RSS. This exposes the query to the 12 Root
Server Operators (RSOs) managing the 26 RSS identifiers (13 IPv4 and
13 IPv6) and the networks in between.</t>
        <t>The privacy sensitivity of queries sent to the RSS can vary widely,
ranging from unlikely sensitive (such as a query for just ".example"
without any left-hand labels) to more critical queries that leak
potentially personal or system-sensitive information that was not
intended to leak beyond an internal network boundary (such as
".wpad" records).  Names reaching the RSS can be single labels that reveal
only the TLD's name (".com" or ".xxx"), which may or may not be sensitive
in nature by themselves.  Queries can also contain more labels that may leak
more sensitive information ("private.sensitive.example").</t>
        <t>Accidental leaks can stem from typos, web browser keyword searches,
misconfigured software, or simply because it needed to be resolved,
and no privacy-protecting techniques are deployed.</t>
        <t>Note that beyond the analysis of a single record being observed, a
larger or temporal analysis of all of a client's queries may reveal
additional information and/or behavioral patterns (<xref target="ROOTPRIVACY"/>).
For example, the collection of unique ccTLDs observed during the
course of a 24 hour period may reveal the political bias in a
resolver's clients.</t>
        <t>To mitigate issues with potentially sensitive queries leaving a resolver,
various techniques are available for use that include:</t>
        <ul spacing="normal">
          <li>
            <t><strong>Aggressive NSEC: Significant</strong>  </t>
            <t>
Because Aggressive NSEC greatly reduces the quantity of queries
requiring NXDOMAIN responses, it can greatly enhance a resolver's
privacy by simply sending less queries.  </t>
            <t>
The rough worst-case scenario with a long lived cache is a transmission of 1
query per TLD in the root zone in the course of one TTL (2 days, or other
implementation upper limit which can commonly be 1 day).  Note that resolvers
that prefer client NS records, which often have a lower TTL, may send data
more frequently than what the root zone's TTL specifies.  Note that DNSSEC
(or at least an understanding of the NSEC record) is required to implement
Aggressive NSEC.  </t>
            <t>
Note that Aggressive NSEC does not prevent queries for existing TLDs
from leaking.</t>
          </li>
          <li>
            <t><strong>QName Minimization: Significant</strong>  </t>
            <t>
QName Minimisation greatly improves privacy in the case where any
sensitive information exists in the labels before the TLD
(e.g. sensitive.example).  However, this cannot entirely minimize
the leakage of TLD names themselves, which may or may not be
sensitive in nature (".xxx" is used as a common example of a TLD
that may be considered sensitive).  Note that like the Aggressive
NSEC technique above, the sent queries are typically cached for a
period of time.  Unlike NSEC Aggressive Caching though, DNSSEC is
not required to implement QName Minimization.</t>
          </li>
          <li>
            <t><strong>Encrypted DNS: Moderate</strong>  </t>
            <t>
Encrypted DNS protocols, such as DNS over (D)TLS, protect queries from
intermediate observers by encrypting communication. However, as of this
writing, only 2 of the 13 root server identifiers support encrypted DNS,
limiting the effectiveness of this technique with respect to the RSS.</t>
          </li>
          <li>
            <t><strong>LocalRoot: Complete</strong>  </t>
            <t>
LocalRoot implementations maintain a local copy of the root zone,
thereby completely eliminating the need to send queries to the
RSS. This ensures complete privacy with respect the RSS, as no
queries leave the resolver toward the RSS.  </t>
            <t>
Furthermore, because the data is received and verified before being
used, there are only two remaining sources of trust for the
information used: IANA itself and the RZM which is responsible for
creating the root zone, although even they have no visibility into
how resolvers make use of the data.</t>
          </li>
        </ul>
      </section>
      <section anchor="disconnected-operations">
        <name>Disconnected operations</name>
        <t>At times, a region may become disconnected from the broader internet due to
various causes, such as network outages, intentional disruptions, or natural
disasters. In such scenarios, the Root Server System (RSS), as the pinnacle of
the DNS hierarchy, becomes inaccessible to resolvers needing information about
TLDs not in their cache. While a complete disconnection from the internet
results in failures for all resolutions to external resources,
local infrastructure may still be functioning and
remain reachable (e.g., a ccTLD may be accessible even if the RSS is not).</t>
        <t>Solutions available for resolvers to continue operating even when disconnected
from the RSS include:</t>
        <ul spacing="normal">
          <li>
            <t><strong>Serve Stale: Significant</strong>  </t>
            <t>
Serve Stale allows resolvers to reuse cached data when authoritative servers
are unreachable. This approach can significantly aid disconnected scenarios,
provided the required records are already in the cache. However, it cannot
assist when the necessary information has not been recently cached.</t>
          </li>
          <li>
            <t><strong>LocalRoot: Significant or Complete</strong>  </t>
            <t>
LocalRoot implementations that populate their cache with root zone records
offer significant protection, similar to Serve Stale.  But cached records may
still expire if not recently accessed.  </t>
            <t>
Implementations that ensure the root zone contents are always
available (e.g., via RFC8806 parallel infrastructure, special cache
retention flags, or when loaded from a persistently refreshed file)
provide complete protection against RSS disconnection.</t>
          </li>
        </ul>
      </section>
      <section anchor="records">
        <name>Record Protection</name>
        <t>DNSSEC RRSIG records ensure the integrity and authenticity of DNS resource
records (RRs). However, delegation-related records, such as NS records and
associated glue records, are exceptions to this protection. These records,
served by the parent zone, assist resolvers in reaching child zones but are not
cryptographically signed.</t>
        <t>Once the resolver verifies that the child zone is serving accurate information
and the DS record validates the child's DNSKEY, the child's data becomes
authoritative. If the parent-side delegation records are modified, resolvers
may initially be directed to incorrect infrastructure. With DNSSEC validation
enabled, this would result in a denial of service or, at worst, a temporary
eavesdropping issue.</t>
        <t>We analyze record protection by dividing it into in two parts:
authoritative RR protection and non-authoritative delegation record
protection (NS and glue).</t>
        <section anchor="authoritative-rr-protection">
          <name>Authoritative RR Protection</name>
          <t>All root zone records, except NS and glue records, are protected by DNSSEC,
ensuring tamper resistance. Solutions for safeguarding these records include:</t>
          <ul spacing="normal">
            <li>
              <t><strong>DNSSEC: Significant</strong>  </t>
              <t>
DNSSEC protects against record modification for records served from
the RSS, assuming validation is performed using a root zone DNSSEC
trust anchor and the chain of trust from it is followed all the way
to the child zone.  Note that
not all TLDs in the root zone are protected, and thus this is
considered Significant since most TLDs do offer DNSSEC support and
most resolvers are child-centric.  </t>
              <t>
Note that DNSSEC, when combined with NSEC records, allows
verification of negative answers received from the root.  Thus,
responses for non-existent records from the root are verifiable as
authentic.</t>
            </li>
            <li>
              <t><strong>Encrypted DNS: Complete</strong>  </t>
              <t>
If the resolver is able to connect to a root server instance that
offers authenticated and encrypted DNS support, then any answers
they receive over that protected path can be considered properly
validated even without checking the corresponding DNSSEC records.
However, checking the DNSSEC records for validity themselves may
still be recommended.  Encrypted DNS protection is considered Complete
when the authentication of the TLS connection to the RSS can be properly
verified.</t>
            </li>
            <li>
              <t><strong>LocalRoot: Complete</strong>  </t>
              <t>
LocalRoot implementations download and verify the entire root zone using
DNSSEC and ZONEMD records, ensuring all data is tamper-resistant. Proper
DNSSEC validation of at least the ZONEMD record is required.</t>
            </li>
          </ul>
        </section>
        <section anchor="glue">
          <name>Non-Authoritative Data (Glue) Protection</name>
          <t>Although DNSSEC protects many of the records within the root zone, the
TLD's NS, A and AAAA records in the root zone are not signed.
This lack of signing leaves these records vulnerable to attacks
such as man-in-the-middle modifications
or cache injection.</t>
          <t>These attacks could redirect traffic to non-responsive servers,
causing denial-of-service issues.</t>
          <t>Alternatively, the addresses can be modified to point to alternate
addresses that do respond.  While these responding addresses will
be unable to alter DNSSEC signed records in the root zone,
they can still act as eavesdroppers and modify any unsigned glue
records being passed.</t>
          <t>Note that
NS and glue records from the root zone are typically cached for a
lengthy period of time, which is a benefit for resolvers that receive
the correct records but a detriment for those that receive modified
records and have a parent-side preference.</t>
          <t>Mitigation strategies include:</t>
          <ul spacing="normal">
            <li>
              <t><strong>DNSSEC: None to Significant</strong>  </t>
              <t>
DNSSEC prevents unauthorized modification of authoritative records in
DNS zones, ensuring that unsigned data cannot be falsely inserted.
However, as discussed above, it does not prevent NS and
glue record modification.  The protection offered by DNSSEC depends
on whether the resolver uses DNSSEC to validate the child side's NS, A
and AAAA records.
Furthermore, the TLD must be signed for this protection to be effective.</t>
            </li>
            <li>
              <t><strong>Encrypted DNS: Complete</strong>  </t>
              <t>
Encrypted DNS provides secure communication with
root server instances, provided their
identities are properly verified.
Data received over these secure channels can be considered
authentic and encrypted.
However, since NS glue records in the parent
zone lack RRSIGs, DNSSEC validation still requires
consultation with the child zone for data authenticity verification.</t>
            </li>
            <li>
              <t><strong>LocalRoot: Complete</strong>  </t>
              <t>
LocalRoot implementations download and verify the entire contents of
the root zone, including NS and glue records,
effectively eliminating this threat.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="bit-flipping">
        <name>Bit Flipping</name>
        <t>"Bit flipping" is the term used to describe accidental modifications
to bits due to memory corruption in a device or during transmission.
The net effect is that at least one bit may flip randomly from 0 to 1,
or vice versa.  Though rare, they have been measured in
network traffic arriving at very popular servers of all types.</t>
        <t>The root-servers.net zone is, unsurprisingly, a very popular domain: it
bootstraps all Internet DNS resolutions.  Researchers have shown that by
registering alternate domain names with single or double bit flips in the
root-servers.net domain name allows these alternate servers to receive requests
that were intended to be sent to the real root-servers.net domain.  These bit
flips can cause problems similar to the above discussed glue record
modifications (<xref target="glue"/>).</t>
        <t>Note that in this section we only discuss bitflips that are received
by or sent by the resolver.  Bitflips that occur in packets leaving
the resolver toward the client that submitted the original query are
out of scope and not covered in this document as the resolver (and the
RSS) has no control over them.</t>
        <t>Solutions to detecting and rejecting bitflipped data include:</t>
        <ul spacing="normal">
          <li>
            <t><strong>DNSSEC: Significant</strong>  </t>
            <t>
Cryptographic techniques like DNSSEC properly identify and reject
data with modifications of any kind, including bit flipping
techniques.
However, DNSSEC does not prevent NS and glue record
modification since these records, as discussed above,
are not protected by DNSSEC
unless verified through to the client's copy of the records.  </t>
            <t>
Research has shown that some validating resolvers fail to detect when some
bit flipping situations have occurred, however.</t>
          </li>
          <li>
            <t><strong>LocalRoot: Complete</strong>  </t>
            <t>
LocalRoot implementations within resolvers download and verify the
entire contents of the root zone using DNSSEC and ZONEMD,
including associated glue records, and thus
eliminates this threat entirely for incoming queries.</t>
          </li>
        </ul>
      </section>
      <section anchor="latency">
        <name>Latency</name>
        <t>Even though almost all answers to user queries are served from the cache, some
resolver operators have concerns about the latency of queries sent to the RSS.
In addition, because negative answers are frequent and may be
from end-user typos waiting for a response, latency to the RSS may at
least matter a little.  In fact, this is one motivation listed in
<xref target="RFC8806"/> for implementing LocalRoot.</t>
        <t>Techniques that support reducing latency to the root, often by having
the answers already available, include:</t>
        <ul spacing="normal">
          <li>
            <t><strong>Aggressive NSEC: Significant</strong>  </t>
            <t>
With Aggressive NSEC deployed, queries containing right-most labels
(TLD labels) that are not in the root may be answered
immediately by generating the answer using an NSEC record in the
(validating) resolver's cache.  The result is similar to the privacy
analysis showing that Aggressive NSEC provides significant latency
reduction to the root zone.</t>
          </li>
          <li>
            <t><strong>LocalRoot: Complete</strong>  </t>
            <t>
As above, a LocalRoot implementation already has all the records in
the root zone and thus can answer immediately and without ever sending
any queries to the RSS.</t>
          </li>
          <li>
            <t><strong>Serve Stale: N/A</strong>  </t>
            <t>
Note that though Serve Stale may have an answer in the cache that is
usable, it does not help with latency since the answer should not be
used until an attempt to query the RSS has already been made.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="summary">
      <name>Summary</name>
      <t>In summary, the following table summarizes the analysis in
<xref target="analysis"/> given the DNS communication technologies in
<xref target="techniques"/> and how they affect communication with the RSS.</t>
      <table>
        <thead>
          <tr>
            <th align="left"> </th>
            <th align="left">QName-Min</th>
            <th align="left">Aggr.-NSEC</th>
            <th align="left">Encrypt</th>
            <th align="left">Serve-Stale</th>
            <th align="left">DNSSEC</th>
            <th align="left">LocalRoot</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">Privacy</td>
            <td align="left">Signif</td>
            <td align="left">Signif</td>
            <td align="left">Moderate</td>
            <td align="left"> </td>
            <td align="left"> </td>
            <td align="left">Complete</td>
          </tr>
          <tr>
            <td align="left">Disconnection</td>
            <td align="left"> </td>
            <td align="left"> </td>
            <td align="left"> </td>
            <td align="left">Signif</td>
            <td align="left"> </td>
            <td align="left">Complete*</td>
          </tr>
          <tr>
            <td align="left">Auth Prot</td>
            <td align="left"> </td>
            <td align="left"> </td>
            <td align="left">Complete</td>
            <td align="left"> </td>
            <td align="left">Signif</td>
            <td align="left">Complete</td>
          </tr>
          <tr>
            <td align="left">Non-auth Prot</td>
            <td align="left"> </td>
            <td align="left"> </td>
            <td align="left">Complete</td>
            <td align="left"> </td>
            <td align="left">Signif</td>
            <td align="left">Complete</td>
          </tr>
          <tr>
            <td align="left">Bit Flipping</td>
            <td align="left"> </td>
            <td align="left"> </td>
            <td align="left"> </td>
            <td align="left"> </td>
            <td align="left">Signif</td>
            <td align="left">Complete</td>
          </tr>
          <tr>
            <td align="left">Latency</td>
            <td align="left"> </td>
            <td align="left">Signif</td>
            <td align="left"> </td>
            <td align="left"> </td>
            <td align="left"> </td>
            <td align="left">Complete</td>
          </tr>
        </tbody>
      </table>
      <t>(*): as discussed above, this depends on the implementation with some
implementations only being Significant while others are Complete.</t>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>TBD</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document discusses a large number of security related cases in
<xref target="analysis"/> and proposes mitigation strategies, their effectiveness,
and associated trade-offs.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>None.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="RFC1035">
        <front>
          <title>Domain names - implementation and specification</title>
          <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
          <date month="November" year="1987"/>
          <abstract>
            <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="13"/>
        <seriesInfo name="RFC" value="1035"/>
        <seriesInfo name="DOI" value="10.17487/RFC1035"/>
      </reference>
      <reference anchor="RFC2826">
        <front>
          <title>IAB Technical Comment on the Unique DNS Root</title>
          <author>
            <organization abbrev="IAB">Internet Architecture Board</organization>
          </author>
          <date month="May" year="2000"/>
          <abstract>
            <t>This document discusses the existence of a globally unique public name space in the Internet called the DNS (Domain Name System). This name space is a hierarchical name space derived from a single, globally unique root. It is a technical constraint inherent in the design of the DNS. One root must be supported by a set of coordinated root servers administered by a unique naming authority. It is not technically feasible for there to be more than one root in the public DNS. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="2826"/>
        <seriesInfo name="DOI" value="10.17487/RFC2826"/>
      </reference>
      <reference anchor="RFC7706">
        <front>
          <title>Decreasing Access Time to Root Servers by Running One on Loopback</title>
          <author fullname="W. Kumari" initials="W." surname="Kumari"/>
          <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
          <date month="November" year="2015"/>
          <abstract>
            <t>Some DNS recursive resolvers have longer-than-desired round-trip times to the closest DNS root server. Some DNS recursive resolver operators want to prevent snooping of requests sent to DNS root servers by third parties. Such resolvers can greatly decrease the round-trip time and prevent observation of requests by running a copy of the full root zone on a loopback address (such as 127.0.0.1). This document shows how to start and maintain such a copy of the root zone that does not pose a threat to other users of the DNS, at the cost of adding some operational fragility for the operator.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7706"/>
        <seriesInfo name="DOI" value="10.17487/RFC7706"/>
      </reference>
      <reference anchor="RFC7858">
        <front>
          <title>Specification for DNS over Transport Layer Security (TLS)</title>
          <author fullname="Z. Hu" initials="Z." surname="Hu"/>
          <author fullname="L. Zhu" initials="L." surname="Zhu"/>
          <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
          <author fullname="A. Mankin" initials="A." surname="Mankin"/>
          <author fullname="D. Wessels" initials="D." surname="Wessels"/>
          <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
          <date month="May" year="2016"/>
          <abstract>
            <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
            <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7858"/>
        <seriesInfo name="DOI" value="10.17487/RFC7858"/>
      </reference>
      <reference anchor="RFC8094">
        <front>
          <title>DNS over Datagram Transport Layer Security (DTLS)</title>
          <author fullname="T. Reddy" initials="T." surname="Reddy"/>
          <author fullname="D. Wing" initials="D." surname="Wing"/>
          <author fullname="P. Patil" initials="P." surname="Patil"/>
          <date month="February" year="2017"/>
          <abstract>
            <t>DNS queries and responses are visible to network elements on the path between the DNS client and its server. These queries and responses can contain privacy-sensitive information, which is valuable to protect.</t>
            <t>This document proposes the use of Datagram Transport Layer Security (DTLS) for DNS, to protect against passive listeners and certain active attacks. As latency is critical for DNS, this proposal also discusses mechanisms to reduce DTLS round trips and reduce the DTLS handshake size. The proposed mechanism runs over port 853.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8094"/>
        <seriesInfo name="DOI" value="10.17487/RFC8094"/>
      </reference>
      <reference anchor="RFC8198">
        <front>
          <title>Aggressive Use of DNSSEC-Validated Cache</title>
          <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
          <author fullname="A. Kato" initials="A." surname="Kato"/>
          <author fullname="W. Kumari" initials="W." surname="Kumari"/>
          <date month="July" year="2017"/>
          <abstract>
            <t>The DNS relies upon caching to scale; however, the cache lookup generally requires an exact match. This document specifies the use of NSEC/NSEC3 resource records to allow DNSSEC-validating resolvers to generate negative answers within a range and positive answers from wildcards. This increases performance, decreases latency, decreases resource utilization on both authoritative and recursive servers, and increases privacy. Also, it may help increase resilience to certain DoS attacks in some circumstances.</t>
            <t>This document updates RFC 4035 by allowing validating resolvers to generate negative answers based upon NSEC/NSEC3 records and positive answers in the presence of wildcards.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8198"/>
        <seriesInfo name="DOI" value="10.17487/RFC8198"/>
      </reference>
      <reference anchor="RFC8310">
        <front>
          <title>Usage Profiles for DNS over TLS and DNS over DTLS</title>
          <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
          <author fullname="D. Gillmor" initials="D." surname="Gillmor"/>
          <author fullname="T. Reddy" initials="T." surname="Reddy"/>
          <date month="March" year="2018"/>
          <abstract>
            <t>This document discusses usage profiles, based on one or more authentication mechanisms, which can be used for DNS over Transport Layer Security (TLS) or Datagram TLS (DTLS). These profiles can increase the privacy of DNS transactions compared to using only cleartext DNS. This document also specifies new authentication mechanisms -- it describes several ways that a DNS client can use an authentication domain name to authenticate a (D)TLS connection to a DNS server. Additionally, it defines (D)TLS protocol profiles for DNS clients and servers implementing DNS over (D)TLS. This document updates RFC 7858.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8310"/>
        <seriesInfo name="DOI" value="10.17487/RFC8310"/>
      </reference>
      <reference anchor="RFC8484">
        <front>
          <title>DNS Queries over HTTPS (DoH)</title>
          <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
          <author fullname="P. McManus" initials="P." surname="McManus"/>
          <date month="October" year="2018"/>
          <abstract>
            <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8484"/>
        <seriesInfo name="DOI" value="10.17487/RFC8484"/>
      </reference>
      <reference anchor="RFC8767">
        <front>
          <title>Serving Stale Data to Improve DNS Resiliency</title>
          <author fullname="D. Lawrence" initials="D." surname="Lawrence"/>
          <author fullname="W. Kumari" initials="W." surname="Kumari"/>
          <author fullname="P. Sood" initials="P." surname="Sood"/>
          <date month="March" year="2020"/>
          <abstract>
            <t>This document defines a method (serve-stale) for recursive resolvers to use stale DNS data to avoid outages when authoritative nameservers cannot be reached to refresh expired data. One of the motivations for serve-stale is to make the DNS more resilient to DoS attacks and thereby make them less attractive as an attack vector. This document updates the definitions of TTL from RFCs 1034 and 1035 so that data can be kept in the cache beyond the TTL expiry; it also updates RFC 2181 by interpreting values with the high-order bit set as being positive, rather than 0, and suggests a cap of 7 days.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8767"/>
        <seriesInfo name="DOI" value="10.17487/RFC8767"/>
      </reference>
      <reference anchor="RFC8806">
        <front>
          <title>Running a Root Server Local to a Resolver</title>
          <author fullname="W. Kumari" initials="W." surname="Kumari"/>
          <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
          <date month="June" year="2020"/>
          <abstract>
            <t>Some DNS recursive resolvers have longer-than-desired round-trip times to the closest DNS root server; those resolvers may have difficulty getting responses from the root servers, such as during a network attack. Some DNS recursive resolver operators want to prevent snooping by third parties of requests sent to DNS root servers. In both cases, resolvers can greatly decrease the round-trip time and prevent observation of requests by serving a copy of the full root zone on the same server, such as on a loopback address or in the resolver software. This document shows how to start and maintain such a copy of the root zone that does not cause problems for other users of the DNS, at the cost of adding some operational fragility for the operator.</t>
            <t>This document obsoletes RFC 7706.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8806"/>
        <seriesInfo name="DOI" value="10.17487/RFC8806"/>
      </reference>
      <reference anchor="RFC9077">
        <front>
          <title>NSEC and NSEC3: TTLs and Aggressive Use</title>
          <author fullname="P. van Dijk" initials="P." surname="van Dijk"/>
          <date month="July" year="2021"/>
          <abstract>
            <t>Due to a combination of unfortunate wording in earlier documents, aggressive use of NSEC and NSEC3 records may deny the existence of names far beyond the intended lifetime of a denial. This document changes the definition of the NSEC and NSEC3 TTL to correct that situation. This document updates RFCs 4034, 4035, 5155, and 8198.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9077"/>
        <seriesInfo name="DOI" value="10.17487/RFC9077"/>
      </reference>
      <reference anchor="RFC9156">
        <front>
          <title>DNS Query Name Minimisation to Improve Privacy</title>
          <author fullname="S. Bortzmeyer" initials="S." surname="Bortzmeyer"/>
          <author fullname="R. Dolmans" initials="R." surname="Dolmans"/>
          <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
          <date month="November" year="2021"/>
          <abstract>
            <t>This document describes a technique called "QNAME minimisation" to improve DNS privacy, where the DNS resolver no longer always sends the full original QNAME and original QTYPE to the upstream name server. This document obsoletes RFC 7816.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9156"/>
        <seriesInfo name="DOI" value="10.17487/RFC9156"/>
      </reference>
      <reference anchor="RFC9230">
        <front>
          <title>Oblivious DNS over HTTPS</title>
          <author fullname="E. Kinnear" initials="E." surname="Kinnear"/>
          <author fullname="P. McManus" initials="P." surname="McManus"/>
          <author fullname="T. Pauly" initials="T." surname="Pauly"/>
          <author fullname="T. Verma" initials="T." surname="Verma"/>
          <author fullname="C.A. Wood" initials="C.A." surname="Wood"/>
          <date month="June" year="2022"/>
          <abstract>
            <t>This document describes a protocol that allows clients to hide their IP addresses from DNS resolvers via proxying encrypted DNS over HTTPS (DoH) messages. This improves privacy of DNS operations by not allowing any one server entity to be aware of both the client IP address and the content of DNS queries and answers.</t>
            <t>This experimental protocol has been developed outside the IETF and is published here to guide implementation, ensure interoperability among implementations, and enable wide-scale experimentation.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9230"/>
        <seriesInfo name="DOI" value="10.17487/RFC9230"/>
      </reference>
      <reference anchor="RFC9250">
        <front>
          <title>DNS over Dedicated QUIC Connections</title>
          <author fullname="C. Huitema" initials="C." surname="Huitema"/>
          <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
          <author fullname="A. Mankin" initials="A." surname="Mankin"/>
          <date month="May" year="2022"/>
          <abstract>
            <t>This document describes the use of QUIC to provide transport confidentiality for DNS. The encryption provided by QUIC has similar properties to those provided by TLS, while QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides more efficient packet-loss recovery than UDP. DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC 7858, and latency characteristics similar to classic DNS over UDP. This specification describes the use of DoQ as a general-purpose transport for DNS and includes the use of DoQ for stub to recursive, recursive to authoritative, and zone transfer scenarios.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9250"/>
        <seriesInfo name="DOI" value="10.17487/RFC9250"/>
      </reference>
      <reference anchor="RFC9364">
        <front>
          <title>DNS Security Extensions (DNSSEC)</title>
          <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
          <date month="February" year="2023"/>
          <abstract>
            <t>This document describes the DNS Security Extensions (commonly called "DNSSEC") that are specified in RFCs 4033, 4034, and 4035, as well as a handful of others. One purpose is to introduce all of the RFCs in one place so that the reader can understand the many aspects of DNSSEC. This document does not update any of those RFCs. A second purpose is to state that using DNSSEC for origin authentication of DNS data is the best current practice. A third purpose is to provide a single reference for other documents that want to refer to DNSSEC.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="237"/>
        <seriesInfo name="RFC" value="9364"/>
        <seriesInfo name="DOI" value="10.17487/RFC9364"/>
      </reference>
      <reference anchor="RFC9539">
        <front>
          <title>Unilateral Opportunistic Deployment of Encrypted Recursive-to-Authoritative DNS</title>
          <author fullname="D. K. Gillmor" initials="D. K." role="editor" surname="Gillmor"/>
          <author fullname="J. Salazar" initials="J." role="editor" surname="Salazar"/>
          <author fullname="P. Hoffman" initials="P." role="editor" surname="Hoffman"/>
          <date month="February" year="2024"/>
          <abstract>
            <t>This document sets out steps that DNS servers (recursive resolvers and authoritative servers) can take unilaterally (without any coordination with other peers) to defend DNS query privacy against a passive network monitor. The protections provided by the guidance in this document can be defeated by an active attacker, but they should be simpler and less risky to deploy than more powerful defenses.</t>
            <t>The goal of this document is to simplify and speed up deployment of opportunistic encrypted transport in the recursive-to-authoritative hop of the DNS ecosystem. Wider easy deployment of the underlying encrypted transport on an opportunistic basis may facilitate the future specification of stronger cryptographic protections against more-powerful attacks.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9539"/>
        <seriesInfo name="DOI" value="10.17487/RFC9539"/>
      </reference>
      <reference anchor="KNOTMODULE" target="https://knot-resolver.readthedocs.io/en/latest/lib.html">
        <front>
          <title>know module to support LocalRoot</title>
          <author>
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="BINDMIRROR" target="https://bind9.readthedocs.io/en/v9.18.41/reference.html">
        <front>
          <title>bind instructions for mirroring the root zone</title>
          <author>
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="LOCALROOT" target="https://datatracker.ietf.org/doc/draft-wkumari-dnsop-localroot-bcp/">
        <front>
          <title>Populating resolvers with the root zone</title>
          <author>
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="LOCALROOTISI" target="https://localroot.isi.edu/">
        <front>
          <title>The LocalRoot project to help operators use LocalRoot</title>
          <author>
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="UNBOUNDAUTHZONE" target="https://unbound.docs.nlnetlabs.nl/en/latest/manpages/unbound.conf.html">
        <front>
          <title>Unbound documentation for supporting LocalRoot</title>
          <author>
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="NOROOTS" target="https://www.icir.org/mallman/pubs/All19b/All19b.pdf">
        <front>
          <title>On Eliminating Root Nameservers from the DNS</title>
          <author>
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="ROOTPRIVACY" target="http://www.isi.edu/~hardaker/papers/2018-02-ndss-analyzing-root-privacy.pdf">
        <front>
          <title>Analyzing and mitigating privacy with the DNS root service</title>
          <author>
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="QUERYCOMPOSITION" target="https://arxiv.org/pdf/2308.07966">
        <front>
          <title>Understanding DNS Query Composition at B-Root</title>
          <author>
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="DITL" target="https://www.dns-oarc.net/oarc/data/ditl">
        <front>
          <title>A Day In The Life of the Internet</title>
          <author>
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="DNSMAGNITUDE" target="https://magnitude.research.icann.org/">
        <front>
          <title>ICANN DNS Magnitude statistics page</title>
          <author>
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="DNSMAGNITUDE2020" target="https://www.icann.org/en/system/files/files/dns-magnitude-05aug20-en.pdf">
        <front>
          <title>DNS Magnitude - A Popularity Figure for Domain Names, and its Application to L-root Traffic</title>
          <author>
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
    </references>
    <?line 563?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TBD</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
