<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-ietf-iotops-iot-dns-guidelines-00" category="bcp" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="IoT-DNS-Guidelines">IoT DNS Security and Privacy Guidelines</title>

    <author initials="A." surname="Mishra" fullname="Abhishek Mishra">
      <organization>Inria</organization>
      <address>
        <email>abhishek.mishra@inria.fr</email>
      </address>
    </author>
    <author initials="A." surname="Losty" fullname="Andrew Losty">
      <organization>UCL</organization>
      <address>
        <email>andrew.losty.23@ucl.ac.uk</email>
      </address>
    </author>
    <author initials="A. M." surname="Mandalari" fullname="Anna Maria Mandalari">
      <organization>UCL</organization>
      <address>
        <email>a.mandalari@ucl.ac.uk</email>
      </address>
    </author>
    <author initials="J." surname="Mozley" fullname="Jim Mozley">
      <organization>Infoblox</organization>
      <address>
        <email>jmozley@infoblox.com</email>
      </address>
    </author>
    <author initials="M." surname="Cunche" fullname="Mathieu Cunche">
      <organization>Inria</organization>
      <address>
        <email>mathieu.cunche@inria.fr</email>
      </address>
    </author>

    <date year="2025" month="November" day="20"/>

    <area>ops</area>
    <workgroup>iotops</workgroup>
    

    <abstract>


<?line 44?>

<t>This document outlines best current practices for Internet of Things (IoT) device providers regarding the implementation of DNS stub resolvers, with the aim of mitigating security threats, enhancing privacy, and resolving operational challenges. It also provides guidelines for network operators on mitigating the risks identified in this draft.</t>



    </abstract>

    <note title="About This Document" removeInRFC="true">
      <t>
        The latest revision of this draft can be found at <eref target="https://miishra.github.io/IoT-DNS-Guidelines/draft-mishra-iotops-iot-dns-guidelines-latest.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-iotops-iot-dns-guidelines/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/miishra/IoT-DNS-Guidelines"/>.</t>
    </note>


  </front>

  <middle>


<?line 48?>

<section anchor="introduction"><name>Introduction</name>

<t>Research into the DNS behavior of IoT devices shows widespread non-compliance with protocol standards, gaps in protocol support, and security vulnerabilities. This leads to unpredictable operational behavior and exposes devices to fingerprinting and denial-of-service attacks.</t>

<t>While the recommendations in this BCP may apply to all DNS stub resolver behavior, we treat IoT devices as a specific case where targeted recommendations are useful for the following reasons:</t>

<t><list style="symbols">
  <t>The recommendations address specific IoT-related security concerns not seen in the DNS behavior of general-purpose operating systems</t>
  <t>IoT devices have different resource characteristics from general-purpose devices, such as constrained power consumption, meaning incorrect software implementations can have an increased operational impact</t>
  <t>IoT devices do not typically have security agents installed on them</t>
  <t>There are many DNS RFCs, and this BCP can be used to identify those related to specific security issues observed through research into IoT devices, with the aim of making it easier to address these vulnerabilities</t>
  <t>IoT devices may be deployed at scale on dedicated networks, and these recommendations will be useful to network security teams in mitigating vulnerabilities, especially where device behavior cannot be changed</t>
  <t>Manufacturers may use standard software distributions aimed at IoT devices without considering DNS behavior. This BCP provides recommendations that can be used as part of the criteria to evaluate these distributions</t>
  <t>IoT devices typically perform the same set of DNS queries on start-up, which makes them both more vulnerable because of this predictable behavior and also more prone to fingerprinting</t>
</list></t>

<t>DNS terminology in this draft conforms to RFC 9499. In this context, Stub Resolver refers to the IoT device, and Resolver refers to the DNS server used by the IoT device.</t>

</section>
<section anchor="conventions-and-definitions"><name>Conventions and Definitions</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
<section anchor="recommendations-for-iot-device-stub-resolvers"><name>Recommendations for IoT Device Stub Resolvers</name>

<section anchor="encrypted-standards"><name>Compliance with Encrypted DNS Standards</name>

<t>The majority of IoT devices use unencrypted DNS over port 53, which means this traffic can be captured and is open to interception and manipulation.</t>

<t>IoT devices <bcp14>SHOULD</bcp14> support encrypted DNS protocols such as DNS over TLS (DoT) <xref target="RFC7858"/>, DNS over QUIC (DoQ) <xref target="RFC9250"/>, or DNS over HTTPS (DoH) <xref target="RFC8484"/> for enhanced privacy, security, and compatibility. To mitigate against fingerprinting IoT devices, DNS queries can be padded as detailed in <xref target="RFC7830"/> and <xref target="RFC8467"/>. Encrypted DNS protocols are not mandated for compliance with DNS standards, but the use of encrypted DNS may be mandated by some regulators and advised by competent authorities in deployment guidelines.</t>

</section>
<section anchor="configuring-resolvers"><name>Configuration of DNS servers used by IoT Stub Resolvers</name>

<t>IoT devices have been observed to fall back to hard-coded IP addresses for DNS resolvers or ignore addresses assigned to them via automated configuration methods such as DHCP Option 6.</t>

<t>DNS resolvers on devices <bcp14>MUST</bcp14> be configurable via network configuration protocols. Stub resolvers <bcp14>MUST NOT</bcp14> fall back to hard-coded resolvers.  This may result in an insecure communication channel, and the open resolvers used in these hard-coded configurations may be blocked by network policy, preventing the device from working.</t>

<t>Devices <bcp14>SHOULD</bcp14> use the following priority order for selecting a resolver. The first one that results in a discovered service should be selected.</t>

<t><list style="numbers" type="1">
  <t>Manual user configuration</t>
  <t>Device management software</t>
  <t>IPv6 Router Advertisement (RA) <xref target="RFC8106"/>, DHCPv6 <xref target="RFC8415"/> (if M=1 bit in RA), IPv4 DHCP <xref target="RFC2132"/>. When Encrypted resolver options are present <xref target="RFC9463"/>, then they <bcp14>SHOULD</bcp14> be used.</t>
</list></t>

<t>If the selected resolver is a plain IP address (e.g. from options 4 or 5) this implies unencrypted DNS. In such cases Discovery of Designated Resolvers <xref target="RFC9462"/> <bcp14>SHOULD</bcp14> be performed to upgrade to encrypted access, where available.</t>

</section>
<section anchor="source-port-and-transaction-id-randomization"><name>Source Port and Transaction ID Randomization</name>

<t>Some IoT devices have been observed to have insufficient or no randomization in the source ports of DNS queries or DNS transaction IDs. This leaves them vulnerable to spoofed responses. A combination of Source Port and Transaction ID is used, amongst other criteria, by the stub resolver when accepting a DNS response.</t>

<t>IoT devices <bcp14>MUST</bcp14> undergo adequate Source Port and Transaction ID randomization in their DNS queries as a mitigation against cache poisoning from spoofed responses. Having both of these values correctly randomized decreases the chances of a successful spoofed attack. Stub resolvers <bcp14>MUST</bcp14> follow the recommendations of <xref target="RFC5452"/> as described in Section 4.5 to ensure Source Port randomization and Transaction ID randomization as required by <xref target="RFC1035"/>.</t>

</section>
<section anchor="handling-of-ttl-values"><name>Handling of TTL Values</name>

<t>IoT devices have been observed making unexpectedly high numbers of DNS queries even when DNS record Time-To-Live values (TTLs) would mean this should be unnecessary. Devices have also been observed issuing DNS queries at fixed, highly predictable intervals for the same domain names, regardless of operational changes or TTL values.</t>

<t>Unnecessary queries may lead to a drain of power in resource-constrained IoT devices. Conversely, very high TTLs may impact device operations such as communicating with management servers, receiving software updates, or other changes, which may lead to security issues. Deterministic querying behavior increases the risk of device fingerprinting by adversaries who can profile query timing to identify specific device models or firmware versions.</t>

<t>The ideal operational scenario is for the owners of the authoritative zones used to manage the devices setting TTL values appropriately for the zones and specific records within them. Devices would then query these records only as needed.</t>

<t>IoT devices <bcp14>MUST</bcp14> cache DNS responses and <bcp14>SHOULD</bcp14> honour TTLs when caching. If for operational reasons this is not ideal, such as the case where a management server record could be cached for an extended period preventing failover or change, then minimum and maximum TTLs <bcp14>MAY</bcp14> be configurable on the device but <bcp14>MUST NOT</bcp14> not be hardcoded values. Where IoT stub resolvers cannot be configured with minimum and maximum TTL values, this can be mitigated by setting these on the network resolver.</t>

<t>If certain device operational requirements necessitate periodic revalidation of critical domains (e.g. management servers), these repeated queries <bcp14>SHOULD</bcp14> use non-deterministic inter-query timing to avoid fixed intervals.</t>

<t>In case of unsuccessful resolution, such as when the resolver is unavailable, IoT devices should implement exponential back-off strategies.</t>

</section>
<section anchor="support-of-edns0"><name>Support of EDNS(0)</name>

<t>Devices have been observed having limited support for EDNS(0), causing them to revert to TCP for queries over 512 bytes, affecting the device's efficiency. Other research findings include consuming additional processing resources and failing to maintain their network connectivity when responses to DNS requests exceed 512 bytes.</t>

<t>IoT devices <bcp14>MUST</bcp14> support EDNS(0) and send a supported UDP packet size via OPT 41 <xref target="RFC6891"/>. To avoid fragmentation of UDP packets, which may be dropped by intervening networks, the maximum packet size <bcp14>SHOULD</bcp14> be set to 1220 bytes as a default, although device configuration <bcp14>MAY</bcp14> allow this to be configurable. Although the networks to which IoT devices connect may support larger packet sizes than 1220 bytes, the nature of these devices in being deployed on many network types and DNS queries traversing networks controlled by different operators means it is operationally more effective to use this value. In addition, IoT devices <bcp14>MUST</bcp14> support using TCP for queries when a TC bit is returned from the resolver <xref target="RFC1035"/>.</t>

</section>
<section anchor="improve-device-behavior-in-response-to-resolution-problems"><name>Improve Device Behavior in Response to Resolution Problems</name>

<t>When resolving domain names, IoT devices may be unable to obtain an answer, and as a result, surges in the number of queries and retries have been observed, or an increase in queries using an alternate protocol (more aggressively querying via IPv6 rather than IPv4).</t>

<t>The use of serve-stale <xref target="RFC8767"/> by resolver software on the IoT device may mitigate the impact of failed resolution, such as when authoritative servers are unavailable. If the stub-resolver has this capability, device manufacturers should consider the benefits and any impact of using this. Network operators <bcp14>SHOULD</bcp14> configure DNS resolvers to use serve-stale for networks supporting IoT devices, especially where these networks are dedicated to this type of device, to limit any operational impact on IoT devices when resolution fails. Network operators <bcp14>MUST</bcp14> support IoT devices with dual-stack resolvers, rather than providing only IPv4 resolvers when devices are configured with both IPv4 and IPv6.</t>

</section>
<section anchor="use-of-dnssec"><name>Use of DNSSEC</name>

<t>IoT devices can be induced to contact an adversary server or make large volumes of DNS queries via spoofed responses to queries. It would be difficult for manufacturers to mitigate this by implementing checks of data received via DNS queries, such as validating IP addresses in the A/AAAA record RDATA. In addition any validation of this type does not address the problem of MiTM attacks that could be the attack vector.</t>

<t>Devices <bcp14>MAY</bcp14> improve security in their DNS stacks by utilizing DNSSEC validation <xref target="RFC9364"/>. Where the stub resolver is not capable of DNSSEC validation, but does support checking that queries are validated, the resolver used by the device as described in section &lt;&lt;configuring-resolvers&gt;&gt; <bcp14>MUST</bcp14> be configured to validate responses. Manufacturers should consider the type of network the device is likely to be deployed on, such as a home network vs. other types, in determining the likelihood of DNSSEC being available on the network and thus deciding if the device should rely on a validating resolver or making the device independently capable of validation.</t>

<t>Manufacturers <bcp14>MUST</bcp14> sign public zones used for device management and services to ensure queries can be validated to support any of their stub-resolvers or more generally resolvers that will use DNSSEC for validation. This will improve security regardless of whether devices can support checking that queries are validated.</t>

<t>IoT stub-resolvers may adopt one of two models for validation:
- Resolver validation - stub-resolvers using the Authenticated Data (AD) bit, which is suitable for constrained devices but requires explicit trust in the upstream resolver
- Full validation - local cryptographic checks, providing stronger assurance</t>

<t>Both models improve security over unvalidated queries, but manufacturers should weigh the security considerations, such as trust assumptions, against the operational feasibility when considering which approach to take.</t>

<section anchor="resolver-validation"><name>Resolver Validation</name>

<t>Where a manufacturer does utilize DNSSEC validation on the device the minimum implementation, from a device perspective, will be a validating resolver and the device supporting the AD bit. Relying solely on the AD bit assumes that the upstream resolver is trustworthy and uncompromised.</t>

<t>Manufacturers may implement a testing mechanism to determine if the network resolver supports DNSSEC so that it can utilize validation in a network that supports it, or fall back to unvalidated queries. Any test of the resolver will only validate that it supports DNSSEC, given that the resolver is performing the validation it must be explicitly trusted.</t>

<t>In order to check that a DNS query has been validated a stub-resolver <bcp14>MUST</bcp14> check the Authenticated Data (AD) bit <xref target="RFC4035"/> in responses to determine whether data was validated by the resolver it is using. When checking for the AD bit stub-resolvers <bcp14>MUST</bcp14> treat DNSSEC validation failures as fatal. Responses that fail validation <bcp14>MUST NOT</bcp14> be used for name resolution.</t>

</section>
<section anchor="full-validation"><name>Full Validation</name>

<t>Device stub-resolvers can perform validation themselves in cases where the network resolver does not validate queries or the device does not trust the network resolver to do so.</t>

<t>Considerations for device manufacturers in implementing full validation include:</t>

<t><list style="symbols">
  <t>Devices performing local validation gain end-to-end trust but at higher computational cost</t>
  <t>Devices should cache results including intermediate validation results to reduce repeated computation</t>
  <t>Devices will need to be shipped with a root trust anchor and have a mechanism to securely update this</t>
</list></t>

<t>To implement full local validation stub-resolvers <bcp14>MUST</bcp14> conform to <xref target="RFC4035"/> section 4.9. In practice it is likely to be easier for manufacturers to implement a minimum footprint validating recursive server on the device, configured to forward queries to a network resolver if necessary, rather than develop this capability in any stub resolver.</t>

</section>
</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>This BCP discusses security considerations for IoT devices in section Recommendations for IoT Device Stub Resolvers and mitigations that can be implemented on DNS resolvers. More general DNS security considerations in managing networks with IoT devices are detailed here.</t>

<t>Most IoT devices do not have specific security software agents installed on them, as is typically the case with general-purpose operating systems and supply chain vulnerabilities may mean that these devices are compromised before reaching the consumer. Network operators can use DNS resolvers to mitigate these risks.</t>

<t>Private network operators <bcp14>MAY</bcp14> block DNS traffic to any resolvers other than those managed by the operator, so that traffic is not bypassing any DNS security controls such as response policy zones or DNS traffic logging. This is more likely to be the case on enterprise or other private networks rather than service providers that don't want to limit customers using alternate resolvers.</t>

<t>Providers <bcp14>SHOULD</bcp14> alter resolver configuration to mitigate some of the security risks or operational issues identified in this BCP where it does not impact the operation of other types of DNS clients. For instance the use of serve-stale <xref target="RFC8767"/> is likely to benefit all stub resolvers on a network.</t>

<t>Where operators have networks dedicated to IoT devices, they <bcp14>MAY</bcp14> limit DNS resolution to only domain names used by those IoT devices to mitigate any impact in the event of a compromise to the device. Manufacturers <bcp14>SHOULD</bcp14> provide domain names used for communication to facilitate this and other security measures used to secure devices and identify those that are compromised. Manufacturer Usage Descriptions (MUDs) could provide details of domain names used in device operations that can then be added to DNS security controls.</t>

<t>DNS queries are most commonly carried over UDP and compromised devices have been used in DoS attacks by sending queries with forged source addresses, hence network operators <bcp14>MUST</bcp14> implement <xref target="RFC2827"/> network ingress filtering. Network operators should implement DNS Response Rate Limiting (RRL) on resolvers to mitigate high query volumes from devices causing DoS to the DNS infrastructure.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document has no IANA actions.</t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>

<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>




    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC7858">
  <front>
    <title>Specification for DNS over Transport Layer Security (TLS)</title>
    <author fullname="Z. Hu" initials="Z." surname="Hu"/>
    <author fullname="L. Zhu" initials="L." surname="Zhu"/>
    <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
    <author fullname="A. Mankin" initials="A." surname="Mankin"/>
    <author fullname="D. Wessels" initials="D." surname="Wessels"/>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <date month="May" year="2016"/>
    <abstract>
      <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
      <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7858"/>
  <seriesInfo name="DOI" value="10.17487/RFC7858"/>
</reference>

<reference anchor="RFC9250">
  <front>
    <title>DNS over Dedicated QUIC Connections</title>
    <author fullname="C. Huitema" initials="C." surname="Huitema"/>
    <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
    <author fullname="A. Mankin" initials="A." surname="Mankin"/>
    <date month="May" year="2022"/>
    <abstract>
      <t>This document describes the use of QUIC to provide transport confidentiality for DNS. The encryption provided by QUIC has similar properties to those provided by TLS, while QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides more efficient packet-loss recovery than UDP. DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC 7858, and latency characteristics similar to classic DNS over UDP. This specification describes the use of DoQ as a general-purpose transport for DNS and includes the use of DoQ for stub to recursive, recursive to authoritative, and zone transfer scenarios.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9250"/>
  <seriesInfo name="DOI" value="10.17487/RFC9250"/>
</reference>

<reference anchor="RFC8484">
  <front>
    <title>DNS Queries over HTTPS (DoH)</title>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <author fullname="P. McManus" initials="P." surname="McManus"/>
    <date month="October" year="2018"/>
    <abstract>
      <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8484"/>
  <seriesInfo name="DOI" value="10.17487/RFC8484"/>
</reference>

<reference anchor="RFC7830">
  <front>
    <title>The EDNS(0) Padding Option</title>
    <author fullname="A. Mayrhofer" initials="A." surname="Mayrhofer"/>
    <date month="May" year="2016"/>
    <abstract>
      <t>This document specifies the EDNS(0) "Padding" option, which allows DNS clients and servers to pad request and response messages by a variable number of octets.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7830"/>
  <seriesInfo name="DOI" value="10.17487/RFC7830"/>
</reference>

<reference anchor="RFC8467">
  <front>
    <title>Padding Policies for Extension Mechanisms for DNS (EDNS(0))</title>
    <author fullname="A. Mayrhofer" initials="A." surname="Mayrhofer"/>
    <date month="October" year="2018"/>
    <abstract>
      <t>RFC 7830 specifies the "Padding" option for Extension Mechanisms for DNS (EDNS(0)) but does not specify the actual padding length for specific applications. This memo lists the possible options ("padding policies"), discusses the implications of each option, and provides a recommended (experimental) option.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8467"/>
  <seriesInfo name="DOI" value="10.17487/RFC8467"/>
</reference>

<reference anchor="RFC8106">
  <front>
    <title>IPv6 Router Advertisement Options for DNS Configuration</title>
    <author fullname="J. Jeong" initials="J." surname="Jeong"/>
    <author fullname="S. Park" initials="S." surname="Park"/>
    <author fullname="L. Beloeil" initials="L." surname="Beloeil"/>
    <author fullname="S. Madanapalli" initials="S." surname="Madanapalli"/>
    <date month="March" year="2017"/>
    <abstract>
      <t>This document specifies IPv6 Router Advertisement (RA) options (called "DNS RA options") to allow IPv6 routers to advertise a list of DNS Recursive Server Addresses and a DNS Search List to IPv6 hosts.</t>
      <t>This document, which obsoletes RFC 6106, defines a higher default value of the lifetime of the DNS RA options to reduce the likelihood of expiry of the options on links with a relatively high rate of packet loss.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8106"/>
  <seriesInfo name="DOI" value="10.17487/RFC8106"/>
</reference>

<reference anchor="RFC8415">
  <front>
    <title>Dynamic Host Configuration Protocol for IPv6 (DHCPv6)</title>
    <author fullname="T. Mrugalski" initials="T." surname="Mrugalski"/>
    <author fullname="M. Siodelski" initials="M." surname="Siodelski"/>
    <author fullname="B. Volz" initials="B." surname="Volz"/>
    <author fullname="A. Yourtchenko" initials="A." surname="Yourtchenko"/>
    <author fullname="M. Richardson" initials="M." surname="Richardson"/>
    <author fullname="S. Jiang" initials="S." surname="Jiang"/>
    <author fullname="T. Lemon" initials="T." surname="Lemon"/>
    <author fullname="T. Winters" initials="T." surname="Winters"/>
    <date month="November" year="2018"/>
    <abstract>
      <t>This document describes the Dynamic Host Configuration Protocol for IPv6 (DHCPv6): an extensible mechanism for configuring nodes with network configuration parameters, IP addresses, and prefixes. Parameters can be provided statelessly, or in combination with stateful assignment of one or more IPv6 addresses and/or IPv6 prefixes. DHCPv6 can operate either in place of or in addition to stateless address autoconfiguration (SLAAC).</t>
      <t>This document updates the text from RFC 3315 (the original DHCPv6 specification) and incorporates prefix delegation (RFC 3633), stateless DHCPv6 (RFC 3736), an option to specify an upper bound for how long a client should wait before refreshing information (RFC 4242), a mechanism for throttling DHCPv6 clients when DHCPv6 service is not available (RFC 7083), and relay agent handling of unknown messages (RFC 7283). In addition, this document clarifies the interactions between models of operation (RFC 7550). As such, this document obsoletes RFC 3315, RFC 3633, RFC 3736, RFC 4242, RFC 7083, RFC 7283, and RFC 7550.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8415"/>
  <seriesInfo name="DOI" value="10.17487/RFC8415"/>
</reference>

<reference anchor="RFC2132">
  <front>
    <title>DHCP Options and BOOTP Vendor Extensions</title>
    <author fullname="S. Alexander" initials="S." surname="Alexander"/>
    <author fullname="R. Droms" initials="R." surname="Droms"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>This document specifies the current set of DHCP options. Future options will be specified in separate RFCs. The current list of valid options is also available in ftp://ftp.isi.edu/in-notes/iana/assignments. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2132"/>
  <seriesInfo name="DOI" value="10.17487/RFC2132"/>
</reference>

<reference anchor="RFC9463">
  <front>
    <title>DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers (DNR)</title>
    <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
    <author fullname="T. Reddy.K" initials="T." role="editor" surname="Reddy.K"/>
    <author fullname="D. Wing" initials="D." surname="Wing"/>
    <author fullname="N. Cook" initials="N." surname="Cook"/>
    <author fullname="T. Jensen" initials="T." surname="Jensen"/>
    <date month="November" year="2023"/>
    <abstract>
      <t>This document specifies new DHCP and IPv6 Router Advertisement options to discover encrypted DNS resolvers (e.g., DNS over HTTPS, DNS over TLS, and DNS over QUIC). Particularly, it allows a host to learn an Authentication Domain Name together with a list of IP addresses and a set of service parameters to reach such encrypted DNS resolvers.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9463"/>
  <seriesInfo name="DOI" value="10.17487/RFC9463"/>
</reference>

<reference anchor="RFC9462">
  <front>
    <title>Discovery of Designated Resolvers</title>
    <author fullname="T. Pauly" initials="T." surname="Pauly"/>
    <author fullname="E. Kinnear" initials="E." surname="Kinnear"/>
    <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
    <author fullname="P. McManus" initials="P." surname="McManus"/>
    <author fullname="T. Jensen" initials="T." surname="Jensen"/>
    <date month="November" year="2023"/>
    <abstract>
      <t>This document defines Discovery of Designated Resolvers (DDR), a set of mechanisms for DNS clients to use DNS records to discover a resolver's encrypted DNS configuration. An Encrypted DNS Resolver discovered in this manner is referred to as a "Designated Resolver". These mechanisms can be used to move from unencrypted DNS to encrypted DNS when only the IP address of a resolver is known. These mechanisms are designed to be limited to cases where Unencrypted DNS Resolvers and their Designated Resolvers are operated by the same entity or cooperating entities. It can also be used to discover support for encrypted DNS protocols when the name of an Encrypted DNS Resolver is known.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9462"/>
  <seriesInfo name="DOI" value="10.17487/RFC9462"/>
</reference>

<reference anchor="RFC5452">
  <front>
    <title>Measures for Making DNS More Resilient against Forged Answers</title>
    <author fullname="A. Hubert" initials="A." surname="Hubert"/>
    <author fullname="R. van Mook" initials="R." surname="van Mook"/>
    <date month="January" year="2009"/>
    <abstract>
      <t>The current Internet climate poses serious threats to the Domain Name System. In the interim period before the DNS protocol can be secured more fully, measures can already be taken to harden the DNS to make 'spoofing' a recursing nameserver many orders of magnitude harder.</t>
      <t>Even a cryptographically secured DNS benefits from having the ability to discard bogus responses quickly, as this potentially saves large amounts of computation.</t>
      <t>By describing certain behavior that has previously not been standardized, this document sets out how to make the DNS more resilient against accepting incorrect responses. This document updates RFC 2181. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5452"/>
  <seriesInfo name="DOI" value="10.17487/RFC5452"/>
</reference>

<reference anchor="RFC1035">
  <front>
    <title>Domain names - implementation and specification</title>
    <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
    <date month="November" year="1987"/>
    <abstract>
      <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="13"/>
  <seriesInfo name="RFC" value="1035"/>
  <seriesInfo name="DOI" value="10.17487/RFC1035"/>
</reference>

<reference anchor="RFC6891">
  <front>
    <title>Extension Mechanisms for DNS (EDNS(0))</title>
    <author fullname="J. Damas" initials="J." surname="Damas"/>
    <author fullname="M. Graff" initials="M." surname="Graff"/>
    <author fullname="P. Vixie" initials="P." surname="Vixie"/>
    <date month="April" year="2013"/>
    <abstract>
      <t>The Domain Name System's wire protocol includes a number of fixed fields whose range has been or soon will be exhausted and does not allow requestors to advertise their capabilities to responders. This document describes backward-compatible mechanisms for allowing the protocol to grow.</t>
      <t>This document updates the Extension Mechanisms for DNS (EDNS(0)) specification (and obsoletes RFC 2671) based on feedback from deployment experience in several implementations. It also obsoletes RFC 2673 ("Binary Labels in the Domain Name System") and adds considerations on the use of extended labels in the DNS.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="75"/>
  <seriesInfo name="RFC" value="6891"/>
  <seriesInfo name="DOI" value="10.17487/RFC6891"/>
</reference>

<reference anchor="RFC8767">
  <front>
    <title>Serving Stale Data to Improve DNS Resiliency</title>
    <author fullname="D. Lawrence" initials="D." surname="Lawrence"/>
    <author fullname="W. Kumari" initials="W." surname="Kumari"/>
    <author fullname="P. Sood" initials="P." surname="Sood"/>
    <date month="March" year="2020"/>
    <abstract>
      <t>This document defines a method (serve-stale) for recursive resolvers to use stale DNS data to avoid outages when authoritative nameservers cannot be reached to refresh expired data. One of the motivations for serve-stale is to make the DNS more resilient to DoS attacks and thereby make them less attractive as an attack vector. This document updates the definitions of TTL from RFCs 1034 and 1035 so that data can be kept in the cache beyond the TTL expiry; it also updates RFC 2181 by interpreting values with the high-order bit set as being positive, rather than 0, and suggests a cap of 7 days.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8767"/>
  <seriesInfo name="DOI" value="10.17487/RFC8767"/>
</reference>

<reference anchor="RFC9364">
  <front>
    <title>DNS Security Extensions (DNSSEC)</title>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <date month="February" year="2023"/>
    <abstract>
      <t>This document describes the DNS Security Extensions (commonly called "DNSSEC") that are specified in RFCs 4033, 4034, and 4035, as well as a handful of others. One purpose is to introduce all of the RFCs in one place so that the reader can understand the many aspects of DNSSEC. This document does not update any of those RFCs. A second purpose is to state that using DNSSEC for origin authentication of DNS data is the best current practice. A third purpose is to provide a single reference for other documents that want to refer to DNSSEC.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="237"/>
  <seriesInfo name="RFC" value="9364"/>
  <seriesInfo name="DOI" value="10.17487/RFC9364"/>
</reference>

<reference anchor="RFC4035">
  <front>
    <title>Protocol Modifications for the DNS Security Extensions</title>
    <author fullname="R. Arends" initials="R." surname="Arends"/>
    <author fullname="R. Austein" initials="R." surname="Austein"/>
    <author fullname="M. Larson" initials="M." surname="Larson"/>
    <author fullname="D. Massey" initials="D." surname="Massey"/>
    <author fullname="S. Rose" initials="S." surname="Rose"/>
    <date month="March" year="2005"/>
    <abstract>
      <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of new resource records and protocol modifications that add data origin authentication and data integrity to the DNS. This document describes the DNSSEC protocol modifications. This document defines the concept of a signed zone, along with the requirements for serving and resolving by using DNSSEC. These techniques allow a security-aware resolver to authenticate both DNS resource records and authoritative DNS error indications.</t>
      <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4035"/>
  <seriesInfo name="DOI" value="10.17487/RFC4035"/>
</reference>

<reference anchor="RFC2827">
  <front>
    <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
    <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
    <author fullname="D. Senie" initials="D." surname="Senie"/>
    <date month="May" year="2000"/>
    <abstract>
      <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="38"/>
  <seriesInfo name="RFC" value="2827"/>
  <seriesInfo name="DOI" value="10.17487/RFC2827"/>
</reference>




    </references>

</references>


<?line 195?>

<section numbered="false" anchor="acknowledgments"><name>Acknowledgments</name>

<t>We thank the researchers, reviewers, and engineers who contributed to the analysis and testing process.</t>

<t>The authors thank Mohamed Boucadair, Chris Box, Eliot Lear, Martine Sophie Lenders, Jim Reid, Michael Richardson and Hannes Tschofenig for their contributions, questions and comments.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

