<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-ietf-iotops-iot-dns-guidelines-01" category="bcp" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="IoT-DNS-Guidelines">IoT DNS Security and Privacy Guidelines</title>

    <author initials="A." surname="Mishra" fullname="Abhishek Mishra">
      <organization>Inria</organization>
      <address>
        <email>abhishek.mishra@inria.fr</email>
      </address>
    </author>
    <author initials="A." surname="Losty" fullname="Andrew Losty">
      <organization>UCL</organization>
      <address>
        <email>andrew.losty.23@ucl.ac.uk</email>
      </address>
    </author>
    <author initials="A. M." surname="Mandalari" fullname="Anna Maria Mandalari">
      <organization>UCL</organization>
      <address>
        <email>a.mandalari@ucl.ac.uk</email>
      </address>
    </author>
    <author initials="J." surname="Mozley" fullname="Jim Mozley">
      <organization>Infoblox</organization>
      <address>
        <email>jmozley@infoblox.com</email>
      </address>
    </author>
    <author initials="M." surname="Cunche" fullname="Mathieu Cunche">
      <organization>Inria</organization>
      <address>
        <email>mathieu.cunche@inria.fr</email>
      </address>
    </author>

    <date year="2026" month="January" day="23"/>

    <area>ops</area>
    <workgroup>iotops</workgroup>
    

    <abstract>


<?line 51?>

<t>This document outlines best current practices for Internet of Things (IoT) device providers regarding the implementation of DNS stub resolvers, with the aim of mitigating security threats, enhancing privacy, and resolving operational challenges. It also provides guidelines for network operators on mitigating the risks identified in this draft as DNS resolution includes services outside of the stub-resolver, and for device providers' management zones.</t>



    </abstract>

    <note title="About This Document" removeInRFC="true">
      <t>
        The latest revision of this draft can be found at <eref target="https://miishra.github.io/IoT-DNS-Guidelines/draft-mishra-iotops-iot-dns-guidelines-latest.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-iotops-iot-dns-guidelines/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/miishra/IoT-DNS-Guidelines"/>.</t>
    </note>


  </front>

  <middle>


<?line 55?>

<section anchor="introduction"><name>Introduction</name>

<t>Research into the DNS behavior of IoT devices <xref target="UCLandInriaPaper"/> shows widespread non-compliance with protocol standards, gaps in protocol support, and security vulnerabilities. This leads to unpredictable operational behavior and exposes devices to fingerprinting and denial-of-service attacks.</t>

<t>While the recommendations in this BCP may apply to all DNS stub resolver behavior, we treat IoT devices as a specific case where targeted recommendations are useful for the following reasons:</t>

<t><list style="symbols">
  <t>The recommendations address specific IoT-related security concerns not seen in the DNS behavior of general-purpose operating systems</t>
  <t>IoT devices have different resource characteristics from general-purpose devices, such as constrained power consumption, meaning incorrect software implementations can have an increased operational impact</t>
  <t>IoT devices do not typically have security agents installed on them</t>
  <t>There are many DNS RFCs, and this BCP can be used to identify those related to specific security issues observed through research into IoT devices, with the aim of making it easier to address these vulnerabilities</t>
  <t>IoT devices may be deployed at scale on dedicated networks, and these recommendations will be useful to network security teams in mitigating vulnerabilities, especially where device behavior cannot be changed</t>
  <t>Manufacturers may use standard software distributions aimed at IoT devices without considering DNS behavior. This BCP provides recommendations that can be used as part of the criteria to evaluate these distributions</t>
  <t>IoT devices typically perform the same set of DNS queries on start-up, which makes them both more vulnerable because of this predictable behavior and also more prone to fingerprinting</t>
</list></t>

<t>DNS terminology in this draft conforms to RFC 9499. In this context, Stub Resolver refers to the IoT device, and Resolver refers to the DNS server used by the IoT device.</t>

<t>The BCP is primarily concerned with device-to-cloud communication <xref target="RFC7452"/>, but DNS may be used in other IoT device communication patterns. Hence recommendations would apply to any deployment type where DNS is used, but decisions on implementation may be proportionate to security risks and operational considerations. For example the implementation of {#configuring-resolvers} and <xref target="transaction-randomization"/> would be appropriate to any implementation, where as <xref target="encrypted-standards"/> may not be proportionate in industrial automation environments where devices do not encrypt other types of traffic <xref target="RFC9150"/>.</t>

</section>
<section anchor="conventions-and-definitions"><name>Conventions and Definitions</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
<section anchor="stub-resolvers"><name>Recommendations for IoT Device Stub Resolvers</name>

<section anchor="configuring-resolvers"><name>Configuration of DNS servers used by IoT Stub Resolvers</name>

<t>IoT devices have been observed to fall back to hard-coded IP addresses for DNS resolvers, such as well-known open resolvers, or ignore addresses assigned to them via automated configuration methods such as DHCP Option 6. This may result in an insecure communication channel, and the open resolvers used in these hard-coded configurations may be blocked by network policy, preventing the device from working.</t>

<t>DNS resolvers on devices <bcp14>MUST</bcp14> be configurable via network configuration protocols. Stub resolvers <bcp14>MUST NOT</bcp14> fall back to hard-coded resolvers.</t>

<t>Devices <bcp14>SHOULD</bcp14> use the following priority order for selecting a resolver. The first one that results in a discovered service should be selected.</t>

<t><list style="numbers" type="1">
  <t>Manual user configuration</t>
  <t>Device management software</t>
  <t>IPv6 Router Advertisement (RA) <xref target="RFC8106"/>, DHCPv6 <xref target="RFC8415"/> (if M=1 bit in RA), IPv4 DHCP <xref target="RFC2132"/>. When Encrypted resolver options are present in DHCP and IPv6 Router Advertisements <xref target="RFC9463"/>, then they <bcp14>SHOULD</bcp14> be used.</t>
</list></t>

<t>If the selected resolver is a plain IP address (e.g. from option 3) this implies unencrypted DNS. In such cases Discovery of Designated Resolvers <xref target="RFC9462"/> <bcp14>SHOULD</bcp14> be performed to upgrade to encrypted access, where available.</t>

</section>
<section anchor="transaction-randomization"><name>Source Port and Transaction ID Randomization</name>

<t>Some IoT devices have been observed to have insufficient or no randomization in the source ports of DNS queries or DNS transaction IDs. This leaves them vulnerable to spoofed responses. A combination of Source Port and Transaction ID is used, amongst other criteria, by the stub resolver when accepting a DNS response.</t>

<t>IoT devices <bcp14>MUST</bcp14> undergo adequate Source Port and Transaction ID randomization in their DNS queries as a mitigation against cache poisoning from spoofed responses. Having both of these values correctly randomized decreases the chances of a successful spoofed attack. Stub resolvers <bcp14>MUST</bcp14> follow the recommendations of <xref target="RFC5452"/> as described in Section 4.5 to ensure Source Port randomization and Transaction ID randomization as required by <xref target="RFC1035"/>.</t>

</section>
<section anchor="ttl-value-handling"><name>Handling of TTL Values</name>

<t>IoT devices have been observed making unexpectedly high numbers of DNS queries even when DNS record Time-To-Live values (TTLs) would mean this should be unnecessary. Devices have also been observed issuing DNS queries at fixed, highly predictable intervals for the same domain names, regardless of operational changes or TTL values.</t>

<t>Unnecessary queries may lead to a drain of power in resource-constrained IoT devices. Conversely, very high TTLs may impact device operations such as communicating with management servers, receiving software updates, or other changes, which may lead to security issues. Deterministic querying behavior increases the risk of device fingerprinting by adversaries who can profile query timing to identify specific device models or firmware versions.</t>

<t>The ideal operational scenario is for the owners of the authoritative zones used to manage the devices setting TTL values appropriately for the zones and specific records within them. Devices would then query these records only as needed.</t>

<t>IoT devices <bcp14>MUST</bcp14> cache DNS responses and <bcp14>SHOULD</bcp14> honour TTLs when caching. If for operational reasons this is not ideal, such as the case where a management server record could be cached for an extended period preventing failover or change, then minimum and maximum TTLs <bcp14>MAY</bcp14> be configurable on the device but <bcp14>MUST NOT</bcp14> not be hardcoded values. Where IoT stub resolvers cannot be configured with minimum and maximum TTL values, this can be mitigated by setting these on the network resolver.</t>

<t>If certain device operational requirements necessitate periodic revalidation of critical domains (e.g. management servers), these repeated queries <bcp14>SHOULD</bcp14> use non-deterministic inter-query timing to avoid fixed intervals.</t>

<t>In case of unsuccessful resolution, such as when the resolver is unavailable, IoT devices should implement exponential back-off strategies.</t>

</section>
<section anchor="support-of-edns0"><name>Support of EDNS(0)</name>

<t>Devices have been observed having limited support for EDNS(0), causing them to revert to TCP for queries over 512 bytes, affecting the device's efficiency. Other research findings include consuming additional processing resources and failing to maintain their network connectivity when responses to DNS requests exceed 512 bytes.</t>

<t>IoT devices <bcp14>MUST</bcp14> support EDNS(0) and send a supported UDP packet size via OPT 41 <xref target="RFC6891"/>. To avoid fragmentation of UDP packets, which may be dropped by intervening networks, the maximum packet size <bcp14>SHOULD</bcp14> be set to 1220 bytes as a default, although device configuration <bcp14>MAY</bcp14> allow this to be configurable. Although the networks to which IoT devices connect may support larger packet sizes than 1220 bytes, the nature of these devices in being deployed on many network types and DNS queries traversing networks controlled by different operators means it is operationally more effective to use this value. In addition, IoT devices <bcp14>MUST</bcp14> support using TCP for queries when a TC bit is returned from the resolver <xref target="RFC1035"/>.</t>

</section>
<section anchor="improve-device-behavior-in-response-to-resolution-problems"><name>Improve Device Behavior in Response to Resolution Problems</name>

<t>When resolving domain names, IoT devices may be unable to obtain an answer, and as a result, surges in the number of queries and retries have been observed, or an increase in queries using an alternate protocol (more aggressively querying via IPv6 rather than IPv4).</t>

<t>The use of serve-stale <xref target="RFC8767"/> by resolver software on the IoT device may mitigate the impact of failed resolution, such as when authoritative servers are unavailable. If the stub-resolver has this capability, device manufacturers should consider the benefits and any impact of using this.</t>

</section>
<section anchor="encrypted-standards"><name>Compliance with Encrypted DNS Standards</name>

<t>The majority of IoT devices use unencrypted DNS over port 53, which means this traffic can be captured and is open to interception and manipulation. Encrypted DNS protocols are not mandated for compliance with DNS standards, but the use of encrypted DNS may be mandated by some regulators and advised by competent authorities <xref target="ENISAGuidanceForNIS2"/> in deployment guidelines. Encrypted DNS support is widely deployed and it is possible for IoT devices to discover DNS resolver support for this as described in <xref target="configuring-resolvers"/>.</t>

<t>IoT devices <bcp14>SHOULD</bcp14> support encrypted DNS protocols such as DNS over TLS (DoT) <xref target="RFC7858"/>, DNS over QUIC (DoQ) <xref target="RFC9250"/>, or DNS over HTTPS (DoH) <xref target="RFC8484"/> for enhanced privacy, security, and compatibility. To mitigate against fingerprinting IoT devices, DNS queries can be padded as detailed in <xref target="RFC7830"/> and <xref target="RFC8467"/>.</t>

</section>
<section anchor="stub-resolver-dnssec"><name>Use of DNSSEC</name>

<t>IoT devices can be induced to contact an adversary server or make large volumes of DNS queries via spoofed responses to queries. It would be difficult for manufacturers to mitigate this by implementing checks of data received via DNS queries, such as validating IP addresses in the A/AAAA record RDATA. In addition, any validation of this type does not address the problem of MiTM attacks that could be the attack vector.</t>

<t>Devices <bcp14>MAY</bcp14> improve security in their DNS stacks by utilizing DNSSEC validation <xref target="RFC9364"/>. Where the stub resolver is not capable of DNSSEC validation, but does support checking that queries are validated, the resolver used by the device as described in <xref target="configuring-resolvers"/> <bcp14>MUST</bcp14> be configured to validate responses. Manufacturers should consider the type of network the device is likely to be deployed on, such as a home network vs. other types, in determining the likelihood of DNSSEC being available on the network and thus deciding if the device should rely on a validating resolver or making the device independently capable of validation.</t>

<t>Manufacturers <bcp14>MUST</bcp14> sign public zones used for device management and services to ensure queries can be validated to support any of their stub-resolvers or more generally resolvers that will use DNSSEC for validation. This will improve security regardless of whether devices can support checking that queries are validated.</t>

<t>IoT stub-resolvers may adopt one of two models for validation:
- Resolver validation - stub-resolvers using the Authenticated Data (AD) bit, which is suitable for constrained devices but requires explicit trust in the upstream resolver
- Full validation - local cryptographic checks, providing stronger assurance</t>

<t>Both models improve security over unvalidated queries, but manufacturers should weigh the security considerations, such as trust assumptions, against the operational feasibility when considering which approach to take.</t>

<section anchor="resolver-validation"><name>Resolver Validation</name>

<t>Where a manufacturer does utilize DNSSEC validation on the device the minimum implementation, from a device perspective, will be a validating resolver and the device supporting the AD bit. Relying solely on the AD bit assumes that the upstream resolver is trustworthy and uncompromised.</t>

<t>Manufacturers may implement a testing mechanism to determine if the network resolver supports DNSSEC so that it can utilize validation in a network that supports it, or fall back to unvalidated queries. Any test of the resolver will only validate that it supports DNSSEC, given that the resolver is performing the validation it must be explicitly trusted.</t>

<t>In order to check that a DNS query has been validated a stub-resolver <bcp14>MUST</bcp14> check the Authenticated Data (AD) bit <xref target="RFC4035"/> in responses to determine whether data was validated by the resolver it is using. When checking for the AD bit stub-resolvers <bcp14>MUST</bcp14> treat DNSSEC validation failures as fatal. Responses that fail validation <bcp14>MUST NOT</bcp14> be used for name resolution.</t>

</section>
<section anchor="full-validation"><name>Full Validation</name>

<t>Device stub-resolvers can perform validation themselves in cases where the network resolver does not validate queries or the device does not trust the network resolver to do so.</t>

<t>Considerations for device manufacturers in implementing full validation include:</t>

<t><list style="symbols">
  <t>Devices performing local validation gain end-to-end trust but at higher computational cost</t>
  <t>Devices should cache results including intermediate validation results to reduce repeated computation</t>
  <t>Devices will need to be shipped with a root trust anchor and have a mechanism to securely update this</t>
</list></t>

<t>To implement full local validation stub-resolvers <bcp14>MUST</bcp14> conform to <xref target="RFC4035"/> section 4.9. In practice it is likely to be easier for manufacturers to implement a minimum footprint validating recursive server on the device, configured to forward queries to a network resolver if necessary, rather than develop this capability in any stub resolver.</t>

</section>
</section>
</section>
<section anchor="recommendations-for-network-operators"><name>Recommendations for Network Operators</name>

<t>Most IoT devices do not have specific security software agents installed on them, as is typically the case with general-purpose operating systems, and supply chain vulnerabilities may mean that these devices are compromised before reaching the consumer. Network operators can use DNS resolvers to mitigate these risks.</t>

<t>As some aspects of DNS security rely on the stub-resolver, resolver, and authoritative server resolution process and record types (notably DNSSEC), it is also necessary for network operators to implement DNS in such a way as to support some of the recommendations in <xref target="stub-resolvers"/>.</t>

<section anchor="resolvers-supporting-dnssec"><name>Resolvers Supporting DNSSEC</name>

<t>As described in <xref target="stub-resolver-dnssec"/> resolvers should be configured to validate DNS responses using DNSSEC.</t>

</section>
<section anchor="blocking-malicious-traffic"><name>Blocking of Unmanaged or Malicious DNS Traffic</name>

<t>Private network operators may block DNS traffic to any resolvers other than those managed by the operator, so that traffic is not bypassing any DNS security controls such as response policy zones or DNS traffic logging. This is more likely to be the case on enterprise or other private networks rather than service providers that don't want to limit customers using alternate resolvers.</t>

<t>Where operators have networks dedicated to IoT devices, they <bcp14>MAY</bcp14> limit DNS resolution to only domain names used by those IoT devices to mitigate any impact in the event of a compromise to the device. Manufacturers <bcp14>SHOULD</bcp14> provide domain names used for communication to facilitate this and other security measures used to secure devices and identify those that are compromised. Manufacturer Usage Descriptions (MUDs) can provide details of domain names used in device operations that can then be added to DNS security controls.</t>

</section>
<section anchor="availability"><name>Availability</name>

<t>Providers <bcp14>SHOULD</bcp14> alter resolver configuration to mitigate some of the security risks or operational issues identified in this BCP where it does not impact the operation of other types of DNS clients.</t>

<t>Network operators <bcp14>SHOULD</bcp14> configure DNS resolvers to use serve-stale <xref target="RFC8767"/> for networks supporting IoT devices, especially where these networks are dedicated to this type of device, to limit any operational impact on IoT devices when resolution fails. Network operators <bcp14>MUST</bcp14> support IoT devices with dual-stack resolvers, rather than providing only IPv4 resolvers when devices are configured with both IPv4 and IPv6.</t>

<t>DNS queries are most commonly carried over UDP and compromised devices have been used in DoS attacks by sending queries with forged source addresses, hence network operators <bcp14>MUST</bcp14> implement <xref target="RFC2827"/> network ingress filtering. Network operators should implement DNS Response Rate Limiting (RRL) on resolvers to mitigate high query volumes from devices causing DoS to the DNS infrastructure.</t>

</section>
</section>
<section anchor="recommendations-for-manufacturer-authoritative-dns-zones"><name>Recommendations for Manufacturer Authoritative DNS Zones</name>

<section anchor="zone-signing"><name>Zone Signing</name>

<t>Zones supporting the management and data collection of devices <bcp14>MUST</bcp14> be DNSSEC signed in order to support the behavior described in <xref target="stub-resolver-dnssec"/> and <xref target="resolvers-supporting-dnssec"/>. The zones used for these purposes <bcp14>SHOULD</bcp14> be publicly listed for network operators to use in securing their networks as described in <xref target="blocking-malicious-traffic"/>.</t>

</section>
<section anchor="ttl-values"><name>TTL Values</name>

<t>As stated in <xref target="ttl-value-handling"/> manufacturers <bcp14>MUST</bcp14> consider setting TTL values for management zone records that are appropriate for device operations, considering a balance between devices performing excess queries, continuous operation in the event of resolvers being unreachable, and the potential for changes in RDATA such as management IP addresses.</t>

</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>This document does not include protocol changes so there are no specific security considerations in this draft related to new protocol implementations, rather the BCP focusses on security improvements by implementing existing protocols as in the sections above.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document has no IANA actions.</t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>
<reference anchor="RFC5452">
  <front>
    <title>Measures for Making DNS More Resilient against Forged Answers</title>
    <author fullname="A. Hubert" initials="A." surname="Hubert"/>
    <author fullname="R. van Mook" initials="R." surname="van Mook"/>
    <date month="January" year="2009"/>
    <abstract>
      <t>The current Internet climate poses serious threats to the Domain Name System. In the interim period before the DNS protocol can be secured more fully, measures can already be taken to harden the DNS to make 'spoofing' a recursing nameserver many orders of magnitude harder.</t>
      <t>Even a cryptographically secured DNS benefits from having the ability to discard bogus responses quickly, as this potentially saves large amounts of computation.</t>
      <t>By describing certain behavior that has previously not been standardized, this document sets out how to make the DNS more resilient against accepting incorrect responses. This document updates RFC 2181. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5452"/>
  <seriesInfo name="DOI" value="10.17487/RFC5452"/>
</reference>
<reference anchor="RFC1035">
  <front>
    <title>Domain names - implementation and specification</title>
    <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
    <date month="November" year="1987"/>
    <abstract>
      <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="13"/>
  <seriesInfo name="RFC" value="1035"/>
  <seriesInfo name="DOI" value="10.17487/RFC1035"/>
</reference>
<reference anchor="RFC6891">
  <front>
    <title>Extension Mechanisms for DNS (EDNS(0))</title>
    <author fullname="J. Damas" initials="J." surname="Damas"/>
    <author fullname="M. Graff" initials="M." surname="Graff"/>
    <author fullname="P. Vixie" initials="P." surname="Vixie"/>
    <date month="April" year="2013"/>
    <abstract>
      <t>The Domain Name System's wire protocol includes a number of fixed fields whose range has been or soon will be exhausted and does not allow requestors to advertise their capabilities to responders. This document describes backward-compatible mechanisms for allowing the protocol to grow.</t>
      <t>This document updates the Extension Mechanisms for DNS (EDNS(0)) specification (and obsoletes RFC 2671) based on feedback from deployment experience in several implementations. It also obsoletes RFC 2673 ("Binary Labels in the Domain Name System") and adds considerations on the use of extended labels in the DNS.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="75"/>
  <seriesInfo name="RFC" value="6891"/>
  <seriesInfo name="DOI" value="10.17487/RFC6891"/>
</reference>
<reference anchor="RFC2827">
  <front>
    <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
    <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
    <author fullname="D. Senie" initials="D." surname="Senie"/>
    <date month="May" year="2000"/>
    <abstract>
      <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="38"/>
  <seriesInfo name="RFC" value="2827"/>
  <seriesInfo name="DOI" value="10.17487/RFC2827"/>
</reference>



    </references>

    <references title='Informative References' anchor="sec-informative-references">

<reference anchor="UCLandInriaPaper" target="https://hal.science/hal-05110445/">
  <front>
    <title>Towards Operational and Security Best Practices for DNS in the Internet of Things</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="ENISAGuidanceForNIS2" target="https://www.enisa.europa.eu/publications/nis2-technical-implementation-guidance">
  <front>
    <title>NIS2 Technical Implementation Guidance</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>


<reference anchor="RFC7452">
  <front>
    <title>Architectural Considerations in Smart Object Networking</title>
    <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
    <author fullname="J. Arkko" initials="J." surname="Arkko"/>
    <author fullname="D. Thaler" initials="D." surname="Thaler"/>
    <author fullname="D. McPherson" initials="D." surname="McPherson"/>
    <date month="March" year="2015"/>
    <abstract>
      <t>The term "Internet of Things" (IoT) denotes a trend where a large number of embedded devices employ communication services offered by Internet protocols. Many of these devices, often called "smart objects", are not directly operated by humans but exist as components in buildings or vehicles, or are spread out in the environment. Following the theme "Everything that can be connected will be connected", engineers and researchers designing smart object networks need to decide how to achieve this in practice.</t>
      <t>This document offers guidance to engineers designing Internet- connected smart objects.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7452"/>
  <seriesInfo name="DOI" value="10.17487/RFC7452"/>
</reference>
<reference anchor="RFC9150">
  <front>
    <title>TLS 1.3 Authentication and Integrity-Only Cipher Suites</title>
    <author fullname="N. Cam-Winget" initials="N." surname="Cam-Winget"/>
    <author fullname="J. Visoky" initials="J." surname="Visoky"/>
    <date month="April" year="2022"/>
    <abstract>
      <t>This document defines the use of cipher suites for TLS 1.3 based on Hashed Message Authentication Code (HMAC). Using these cipher suites provides server and, optionally, mutual authentication and data authenticity, but not data confidentiality. Cipher suites with these properties are not of general applicability, but there are use cases, specifically in Internet of Things (IoT) and constrained environments, that do not require confidentiality of exchanged messages while still requiring integrity protection, server authentication, and optional client authentication. This document gives examples of such use cases, with the caveat that prior to using these integrity-only cipher suites, a threat model for the situation at hand is needed, and a threat analysis must be performed within that model to determine whether the use of integrity-only cipher suites is appropriate. The approach described in this document is not endorsed by the IETF and does not have IETF consensus, but it is presented here to enable interoperable implementation of a reduced-security mechanism that provides authentication and message integrity without supporting confidentiality.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9150"/>
  <seriesInfo name="DOI" value="10.17487/RFC9150"/>
</reference>
<reference anchor="RFC8106">
  <front>
    <title>IPv6 Router Advertisement Options for DNS Configuration</title>
    <author fullname="J. Jeong" initials="J." surname="Jeong"/>
    <author fullname="S. Park" initials="S." surname="Park"/>
    <author fullname="L. Beloeil" initials="L." surname="Beloeil"/>
    <author fullname="S. Madanapalli" initials="S." surname="Madanapalli"/>
    <date month="March" year="2017"/>
    <abstract>
      <t>This document specifies IPv6 Router Advertisement (RA) options (called "DNS RA options") to allow IPv6 routers to advertise a list of DNS Recursive Server Addresses and a DNS Search List to IPv6 hosts.</t>
      <t>This document, which obsoletes RFC 6106, defines a higher default value of the lifetime of the DNS RA options to reduce the likelihood of expiry of the options on links with a relatively high rate of packet loss.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8106"/>
  <seriesInfo name="DOI" value="10.17487/RFC8106"/>
</reference>
<reference anchor="RFC8415">
  <front>
    <title>Dynamic Host Configuration Protocol for IPv6 (DHCPv6)</title>
    <author fullname="T. Mrugalski" initials="T." surname="Mrugalski"/>
    <author fullname="M. Siodelski" initials="M." surname="Siodelski"/>
    <author fullname="B. Volz" initials="B." surname="Volz"/>
    <author fullname="A. Yourtchenko" initials="A." surname="Yourtchenko"/>
    <author fullname="M. Richardson" initials="M." surname="Richardson"/>
    <author fullname="S. Jiang" initials="S." surname="Jiang"/>
    <author fullname="T. Lemon" initials="T." surname="Lemon"/>
    <author fullname="T. Winters" initials="T." surname="Winters"/>
    <date month="November" year="2018"/>
    <abstract>
      <t>This document describes the Dynamic Host Configuration Protocol for IPv6 (DHCPv6): an extensible mechanism for configuring nodes with network configuration parameters, IP addresses, and prefixes. Parameters can be provided statelessly, or in combination with stateful assignment of one or more IPv6 addresses and/or IPv6 prefixes. DHCPv6 can operate either in place of or in addition to stateless address autoconfiguration (SLAAC).</t>
      <t>This document updates the text from RFC 3315 (the original DHCPv6 specification) and incorporates prefix delegation (RFC 3633), stateless DHCPv6 (RFC 3736), an option to specify an upper bound for how long a client should wait before refreshing information (RFC 4242), a mechanism for throttling DHCPv6 clients when DHCPv6 service is not available (RFC 7083), and relay agent handling of unknown messages (RFC 7283). In addition, this document clarifies the interactions between models of operation (RFC 7550). As such, this document obsoletes RFC 3315, RFC 3633, RFC 3736, RFC 4242, RFC 7083, RFC 7283, and RFC 7550.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8415"/>
  <seriesInfo name="DOI" value="10.17487/RFC8415"/>
</reference>
<reference anchor="RFC2132">
  <front>
    <title>DHCP Options and BOOTP Vendor Extensions</title>
    <author fullname="S. Alexander" initials="S." surname="Alexander"/>
    <author fullname="R. Droms" initials="R." surname="Droms"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>This document specifies the current set of DHCP options. Future options will be specified in separate RFCs. The current list of valid options is also available in ftp://ftp.isi.edu/in-notes/iana/assignments. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2132"/>
  <seriesInfo name="DOI" value="10.17487/RFC2132"/>
</reference>
<reference anchor="RFC9463">
  <front>
    <title>DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers (DNR)</title>
    <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
    <author fullname="T. Reddy.K" initials="T." role="editor" surname="Reddy.K"/>
    <author fullname="D. Wing" initials="D." surname="Wing"/>
    <author fullname="N. Cook" initials="N." surname="Cook"/>
    <author fullname="T. Jensen" initials="T." surname="Jensen"/>
    <date month="November" year="2023"/>
    <abstract>
      <t>This document specifies new DHCP and IPv6 Router Advertisement options to discover encrypted DNS resolvers (e.g., DNS over HTTPS, DNS over TLS, and DNS over QUIC). Particularly, it allows a host to learn an Authentication Domain Name together with a list of IP addresses and a set of service parameters to reach such encrypted DNS resolvers.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9463"/>
  <seriesInfo name="DOI" value="10.17487/RFC9463"/>
</reference>
<reference anchor="RFC9462">
  <front>
    <title>Discovery of Designated Resolvers</title>
    <author fullname="T. Pauly" initials="T." surname="Pauly"/>
    <author fullname="E. Kinnear" initials="E." surname="Kinnear"/>
    <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
    <author fullname="P. McManus" initials="P." surname="McManus"/>
    <author fullname="T. Jensen" initials="T." surname="Jensen"/>
    <date month="November" year="2023"/>
    <abstract>
      <t>This document defines Discovery of Designated Resolvers (DDR), a set of mechanisms for DNS clients to use DNS records to discover a resolver's encrypted DNS configuration. An Encrypted DNS Resolver discovered in this manner is referred to as a "Designated Resolver". These mechanisms can be used to move from unencrypted DNS to encrypted DNS when only the IP address of a resolver is known. These mechanisms are designed to be limited to cases where Unencrypted DNS Resolvers and their Designated Resolvers are operated by the same entity or cooperating entities. It can also be used to discover support for encrypted DNS protocols when the name of an Encrypted DNS Resolver is known.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9462"/>
  <seriesInfo name="DOI" value="10.17487/RFC9462"/>
</reference>
<reference anchor="RFC8767">
  <front>
    <title>Serving Stale Data to Improve DNS Resiliency</title>
    <author fullname="D. Lawrence" initials="D." surname="Lawrence"/>
    <author fullname="W. Kumari" initials="W." surname="Kumari"/>
    <author fullname="P. Sood" initials="P." surname="Sood"/>
    <date month="March" year="2020"/>
    <abstract>
      <t>This document defines a method (serve-stale) for recursive resolvers to use stale DNS data to avoid outages when authoritative nameservers cannot be reached to refresh expired data. One of the motivations for serve-stale is to make the DNS more resilient to DoS attacks and thereby make them less attractive as an attack vector. This document updates the definitions of TTL from RFCs 1034 and 1035 so that data can be kept in the cache beyond the TTL expiry; it also updates RFC 2181 by interpreting values with the high-order bit set as being positive, rather than 0, and suggests a cap of 7 days.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8767"/>
  <seriesInfo name="DOI" value="10.17487/RFC8767"/>
</reference>
<reference anchor="RFC7858">
  <front>
    <title>Specification for DNS over Transport Layer Security (TLS)</title>
    <author fullname="Z. Hu" initials="Z." surname="Hu"/>
    <author fullname="L. Zhu" initials="L." surname="Zhu"/>
    <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
    <author fullname="A. Mankin" initials="A." surname="Mankin"/>
    <author fullname="D. Wessels" initials="D." surname="Wessels"/>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <date month="May" year="2016"/>
    <abstract>
      <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
      <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7858"/>
  <seriesInfo name="DOI" value="10.17487/RFC7858"/>
</reference>
<reference anchor="RFC9250">
  <front>
    <title>DNS over Dedicated QUIC Connections</title>
    <author fullname="C. Huitema" initials="C." surname="Huitema"/>
    <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
    <author fullname="A. Mankin" initials="A." surname="Mankin"/>
    <date month="May" year="2022"/>
    <abstract>
      <t>This document describes the use of QUIC to provide transport confidentiality for DNS. The encryption provided by QUIC has similar properties to those provided by TLS, while QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides more efficient packet-loss recovery than UDP. DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC 7858, and latency characteristics similar to classic DNS over UDP. This specification describes the use of DoQ as a general-purpose transport for DNS and includes the use of DoQ for stub to recursive, recursive to authoritative, and zone transfer scenarios.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9250"/>
  <seriesInfo name="DOI" value="10.17487/RFC9250"/>
</reference>
<reference anchor="RFC8484">
  <front>
    <title>DNS Queries over HTTPS (DoH)</title>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <author fullname="P. McManus" initials="P." surname="McManus"/>
    <date month="October" year="2018"/>
    <abstract>
      <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8484"/>
  <seriesInfo name="DOI" value="10.17487/RFC8484"/>
</reference>
<reference anchor="RFC7830">
  <front>
    <title>The EDNS(0) Padding Option</title>
    <author fullname="A. Mayrhofer" initials="A." surname="Mayrhofer"/>
    <date month="May" year="2016"/>
    <abstract>
      <t>This document specifies the EDNS(0) "Padding" option, which allows DNS clients and servers to pad request and response messages by a variable number of octets.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7830"/>
  <seriesInfo name="DOI" value="10.17487/RFC7830"/>
</reference>
<reference anchor="RFC8467">
  <front>
    <title>Padding Policies for Extension Mechanisms for DNS (EDNS(0))</title>
    <author fullname="A. Mayrhofer" initials="A." surname="Mayrhofer"/>
    <date month="October" year="2018"/>
    <abstract>
      <t>RFC 7830 specifies the "Padding" option for Extension Mechanisms for DNS (EDNS(0)) but does not specify the actual padding length for specific applications. This memo lists the possible options ("padding policies"), discusses the implications of each option, and provides a recommended (experimental) option.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8467"/>
  <seriesInfo name="DOI" value="10.17487/RFC8467"/>
</reference>
<reference anchor="RFC9364">
  <front>
    <title>DNS Security Extensions (DNSSEC)</title>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <date month="February" year="2023"/>
    <abstract>
      <t>This document describes the DNS Security Extensions (commonly called "DNSSEC") that are specified in RFCs 4033, 4034, and 4035, as well as a handful of others. One purpose is to introduce all of the RFCs in one place so that the reader can understand the many aspects of DNSSEC. This document does not update any of those RFCs. A second purpose is to state that using DNSSEC for origin authentication of DNS data is the best current practice. A third purpose is to provide a single reference for other documents that want to refer to DNSSEC.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="237"/>
  <seriesInfo name="RFC" value="9364"/>
  <seriesInfo name="DOI" value="10.17487/RFC9364"/>
</reference>
<reference anchor="RFC4035">
  <front>
    <title>Protocol Modifications for the DNS Security Extensions</title>
    <author fullname="R. Arends" initials="R." surname="Arends"/>
    <author fullname="R. Austein" initials="R." surname="Austein"/>
    <author fullname="M. Larson" initials="M." surname="Larson"/>
    <author fullname="D. Massey" initials="D." surname="Massey"/>
    <author fullname="S. Rose" initials="S." surname="Rose"/>
    <date month="March" year="2005"/>
    <abstract>
      <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of new resource records and protocol modifications that add data origin authentication and data integrity to the DNS. This document describes the DNSSEC protocol modifications. This document defines the concept of a signed zone, along with the requirements for serving and resolving by using DNSSEC. These techniques allow a security-aware resolver to authenticate both DNS resource records and authoritative DNS error indications.</t>
      <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4035"/>
  <seriesInfo name="DOI" value="10.17487/RFC4035"/>
</reference>



    </references>

</references>


<?line 228?>

<section numbered="false" anchor="acknowledgments"><name>Acknowledgments</name>

<t>We thank the researchers, reviewers, and engineers who contributed to the analysis and testing process.</t>

<t>The authors thank Mohamed Boucadair, Chris Box, Eliot Lear, Martine Sophie Lenders, Jim Reid, Michael Richardson and Hannes Tschofenig for their contributions, questions and comments.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

