<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-lamps-caa-security-02" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.29.0 -->
  <front>
    <title abbrev="CAA Security Tag">CAA Security Tag for Cryptographically-Constrained Domain Validation</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-caa-security-02"/>
    <author fullname="Henry Birge-Lee">
      <organization>Princeton University</organization>
      <address>
        <email>birgelee@princeton.edu</email>
      </address>
    </author>
    <author fullname="Grace Cimaszewski">
      <organization>Princeton University</organization>
      <address>
        <email>gcimaszewski@princeton.edu</email>
      </address>
    </author>
    <author fullname="Cyrill E. Krähenbühl">
      <organization>Princeton University</organization>
      <address>
        <email>cyrill.k@princeton.edu</email>
      </address>
    </author>
    <author fullname="Liang Wang">
      <organization>Princeton University</organization>
      <address>
        <email>lw19@princeton.edu</email>
      </address>
    </author>
    <author fullname="Aaron Gable">
      <organization>ISRG</organization>
      <address>
        <email>aaron@letsencrypt.org</email>
      </address>
    </author>
    <author fullname="Prateek Mittal">
      <organization>Princeton University</organization>
      <address>
        <email>pmittal@princeton.edu</email>
      </address>
    </author>
    <date year="2025" month="June" day="20"/>
    <area>Security</area>
    <workgroup>Limited Additional Mechanisms for PKIX and SMIME</workgroup>
    <keyword>PKI</keyword>
    <keyword>CAA</keyword>
    <abstract>
      <?line 68?>

<t>Cryptographic domain validation procedures leverage authenticated communication channels to ensure resilience against attacks by both on-path and off-path network adversaries which attempt to tamper with communications between the Certification Authority (CA) and the network resources related to the domain contained in the certificate.
Domain owners can leverage "security" Property Tags specified in CAA records (defined in <xref target="RFC8659"/>) with the critical flag set, to ensure that CAs perform cryptographically-constrained domain validation during their issuance procedure, hence defending against global man-in-the-middle adversaries.
This document defines the syntax of the CAA security Property as well as acceptable means for cryptographically-constrained domain validation procedures.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://birgelee.github.io/draft-caa-security-tag/-ietf-lamps-caa-security.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-lamps-caa-security/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Limited Additional Mechanisms for PKIX and SMIME Working Group mailing list (<eref target="mailto:spasm@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/spasm/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/spasm/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/birgelee/draft-caa-security-tag"/>.</t>
    </note>
  </front>
  <middle>
    <?line 75?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>A CAA security Property Tag is compliant with <xref target="RFC8659"/> and puts restrictions on the circumstances under which a CA is allowed to sign a certificate for a given domain.
A security Property Tag on a domain implies that validation for this domain must be done in a manner that defends against network adversaries even if an adversary is capable of intercepting and/or modifying communication between the CA and the network resources related to the domain being validated.
Issuance of a certificate to a domain with a security Property Tag <bcp14>MUST</bcp14> follow one of the specified Cryptographically-constrained Domain Validation (CDV) methods outlined in this document or future extensions.
CDV methods <bcp14>MUST</bcp14> rely on protocols (like DNSSEC or DoH/DoT) that offer security properties even in the presence of man-in-the-middle adversaries that can intercept any communication occurring over the public Internet.</t>
      <t>Not all CDV methods are themselves compliant with the CA/Browser Forum's Baseline Requirements for the Issuance and Management of Publicly-Trusted TLS Server Certificates.
Hence, any CDV method that does not meet the CA/Browser Forum Baseline Requirements for TLS server certificate issuance must be used in conjunction with such a compliant domain validation method.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<section anchor="cryptographic-domain-validation">
        <name>Cryptographic Domain Validation</name>
        <t>The goal of cryptographically-constrained domain validation is to ensure that domain validation is based on communication channels that are authenticated through cryptographic operations.</t>
        <section anchor="threat-model">
          <name>Threat Model</name>
          <t>Cryptographic domain validation defends against a network adversary that can block, intercept, modify, and forge arbitrary network packets sent between a CA and the domain's network resources, but cannot forge cryptographic objects, such as signatures and encrypted data.
Cryptographic domain validation is based on DNS and thus assumes that a domain owner can securely mange their DNS records, i.e., communication between the domain owner and their DNS infrastructure is protected against network adversaries.
Similarly, communication between the entity generating the private key and requesting the certificate, e.g., the domain owner, and the webserver(s) where the private key and certificate are installed, is assumed to be protected against network adversaries.
Furthermore, it assumes that all CAs are benign and correctly follow all necessary validation procedures as described in the relevant standardization documents.</t>
          <t>Cryptographic domain validation can be used on domains that are contained in both domain validation certificates (where only the domain name in a certificate is validated) and extended or organization validated certificates (where information like organization identity as well as domain name is validated).
Cryptographic domain validation only hardens the security of the validation of domain names, not broader identities (e.g., organization names).
The use of cryptographically-constrained domain validation in an OV or EV certificate only improves the validation of the domain name(s) contained in the certificate (in the common name or subject-alternate names fields) and does not impact the validation of other forms of identity contained in the certificate.
Use of cryptographically-constrained domain validation in a DV certificate does not imply validation of any identity beyond the domain name(s) in the certificate.</t>
          <t>The defense involves the domain owner specifying a policy indicating their desire for cryptographically-constrained domain validation via DNS CAA records and securely communicating these records to all CAs.
Hence, a core aspect of cryptographically-constrained domain validation is 1) ensuring secure policy lookups, and 2) preventing downgrade attacks that convince a CA to issue a certificate using non-cryptographically-constrained domain validation.</t>
        </section>
        <section anchor="secure-policy-lookup">
          <name>Secure Policy Lookup</name>
          <t>The authenticity of the retrieved security CAA record <bcp14>SHOULD</bcp14> be protected to prevent an active network adversary from modifying its content.
Authenticity can either be ensured by signing the security CAA record or by retrieving the security CAA record via an authenticated channel.
Any security CAA record not protected by such a signature or authenticated channel may not benefit from the security properties outlined in this document. The term "authenticated DNS lookup" refers a DNS lookup that is authenticated using either a signed record or an authenticated channel.</t>
          <section anchor="signed-record">
            <name>Signed Record</name>
            <t>A security CAA record <bcp14>SHOULD</bcp14> be protected with a valid DNSSEC signature chain going back to the ICANN DNSSEC root, to prove the authenticity of the record and its content.</t>
          </section>
          <section anchor="authenticated-channel">
            <name>Authenticated Channel</name>
            <t>If it is not possible to have a DNSSEC signature chain back to the ICANN root, security CAA records <bcp14>SHOULD</bcp14> alternately be hosted on an authoritative DNS resolver that supports recursive-to-authoritative authenticated channels.
Authenticated channels between recursive and authoritative nameservers could be deployed as described in <xref target="RFC9539"/> and leverage DoT, DoQ, or DoH as protocols providing an authenticated channel.
Since secure policy lookup considers a more stringent threat model than the passive network adversary in <xref target="RFC9539"/>, the deployment <bcp14>MUST</bcp14> also implement defenses against active adversaries highlighted in <xref section="B" sectionFormat="of" target="RFC9539"/>.
One option to implement these defenses is by creating DNSSEC-protected SVCB DNS records at the authoritative nameserver.
These SVCB records provide a signaling mechanism for authoritative nameservers offering authenticated channel.
Furthermore, the authenticity of the TLS certificate public key used to establish the channel <bcp14>MUST</bcp14> be protected, e.g., by specifying the public key hash as an SVCB parameter.
This step is crucial to achieve our desired security properties, since it eliminates the circular dependency of requiring an authentic TLS certificate to secure the issuance of new TLS certificate.</t>
          </section>
        </section>
        <section anchor="downgrade-prevention">
          <name>Downgrade Prevention</name>
          <t>To ensure that the CAA security Property is immediately and incrementally deployable without requiring all publicly-trusted CAs to understand the property, the CAA record containing the property <bcp14>MUST</bcp14> set the critical flag.</t>
          <t>Serving security CAA records over authenticated DNS channels or using authenticated DNS records (i.e., DNSSEC) is critical to the effectiveness of the records because a security CAA record not protected by authenticated DNS may be suppressed by an adversary that can manipulate DNS responses.
This could potentially allow the adversary to downgrade validation to use a low-security method and undermine the security properties of the security Property Tag.</t>
          <t>If DNSSEC is used to authenticate the CAA record, a CA <bcp14>MUST</bcp14> only accept the non-existence of a security CAA record if its non-existence is proven by NSEC record as described in <xref target="RFC7129"/>.</t>
          <t>If authenticated channels are used to authenticate the CAA record, CAs <bcp14>MUST</bcp14> also require recursive-to-authoritative DoT or DoH communication (and not permit standard unencrypted DNS connections) for any DNS responses that do not have a valid DNSSEC signature chain to a trusted root.
This prevents downgrade attacks where an adversary attempts to interfere with the establishment of a DoT or DoH encrypted channel and cause a fallback to unencrypted DNS over UDP or TCP.</t>
        </section>
      </section>
    </section>
    <section anchor="caa-security-property">
      <name>CAA security Property</name>
      <t>The CAA security Property Tag <bcp14>MUST</bcp14> be "security" and the flags field of a CAA record containing the security Property <bcp14>MUST</bcp14> have the critical bit set.
In this document, we refer to a CAA record with these characteristics as a <strong>security CAA record</strong>.</t>
      <section anchor="syntax">
        <name>Syntax</name>
        <t>The CAA security Property Value has the following sub-syntax (specified in ABNF as per <xref target="RFC5234"/>).</t>
        <artwork><![CDATA[
security-value = *WSP [attribute-list] *WSP

attribute-list = (attribute *WSP ";" *WSP attribute-list) / attribute
attribute = attribute-name *WSP "=" *WSP attribute-value

attribute-name = (ALPHA / DIGIT) *( *("-") (ALPHA / DIGIT))
attribute-value = *(value-char / WSP) value-char *(value-char / WSP)
value-char = %x21-3A / %x3C-7E
]]></artwork>
        <t>Hence, the security Property Value can either be empty or entirely whitespace, or contain a list of semicolon-separated attribute name-value pairs.</t>
        <t>Similar to <xref target="RFC8659"/>, attribute names are specified in letter-digit-hyphen Label (LDH-Label) form while attribute values can contain whitespace and any printable character except semicolon.
Note that attribute values <bcp14>MUST</bcp14> contain at least one printable (non-whitespace) character.</t>
        <t>All attributes specified in an attribute-list <bcp14>MUST</bcp14> be unique.
An attribute-list <bcp14>MUST NOT</bcp14> have two attributes with the same name specified even if they contain different attribute values.</t>
      </section>
      <section anchor="well-known-attributes">
        <name>Well-known Attributes</name>
        <t>The attribute-list <bcp14>MAY</bcp14> contain the following attributes.</t>
        <t>The attribute values of the attributes specified in this document have the following sub-syntax (specified in ABNF as per <xref target="RFC5234"/>).</t>
        <artwork><![CDATA[
well-known-attribute-value = *WSP comma-sep-list *WSP

comma-sep-list = (list-item *WSP "," *WSP comma-sep-list) / list-item
list-item = 1*item-char
item-char = %x21-2B / %x2D-3A / %x3C-7E
]]></artwork>
        <ol spacing="normal" type="1"><li>
            <t><strong>methods:</strong> If specified, this attribute <bcp14>MUST</bcp14> have a non-empty comma-separated list of cryptographically-constrained domain validation methods that can be used to validate that particular domain.
A CA <bcp14>MUST</bcp14> use one of the methods specified in the methods attribute value to perform cryptographically-constrained domain validation.
If there is no method specified that the CA is capable of complying with, the CA <bcp14>MUST</bcp14> deny issuance.</t>
          </li>
          <li>
            <t><strong>options:</strong> If specified, this attribute <bcp14>MUST</bcp14> have a non-empty comma-separated list of options.
A CA <bcp14>SHOULD</bcp14> try to honor any option specified in this list.
If a CA does not understand an option or does not have that option implemented the, CA <bcp14>MAY</bcp14> proceed with issuance.</t>
          </li>
          <li>
            <t><strong>options-critical:</strong> If specified, this attribute <bcp14>MUST</bcp14> have a non-empty comma-separated list of options.
To proceed with issuance, a CA <bcp14>MUST</bcp14> understand and implement all options specified in the options-critical attribute value.</t>
          </li>
        </ol>
        <t>The attribute-list <bcp14>MAY</bcp14> contain additional attributes and a CA <bcp14>MAY</bcp14> proceed with issuance even if it does not understand these additional attributes.
Subsequent RFCs <bcp14>MAY</bcp14> standardize additional attributes.</t>
        <section anchor="permissible-methods">
          <name>Permissible Methods</name>
          <t>The following attributes <bcp14>MAY</bcp14> be specified in the methods attribute value.
Each method specifies particular aspects of certificate issuance that <bcp14>MUST</bcp14> be satisfied for a certificate to be issued using that method.
While some methods entail the use of CA/Browser Forum-compliant domain control validation methods, others do not entail CA/Browser Forum-compliant domain control validation and must be used in conjunction with a CA/Browser Forum-compliant domain control validation method to permit certificate issuance.</t>
          <ol spacing="normal" type="1"><li>
              <t><strong>secure-dns-record-change:</strong> This method involves an applicant showing control of a DNSSEC-protected DNS record or a record that was retrieved via a DoH or DoT tunnel to the relevant authoritative nameservers used in the DNS resolution.
This can be done via 1) the validation method "DNS Change" specified in the CA/Browser Forum's Baseline Requirements for the Issuance and Management of Publicly-Trusted TLS Server Certificates (Section 3.2.2.4.7) or 2) the "dns-01" method of the ACME RFC <xref target="RFC8555"/>.
For this method to be satisfied, the FQDN where the DNS change is demonstrated <bcp14>MUST</bcp14> be protected by DNSSEC or lookups to the relevant authoritative nameservers <bcp14>MUST</bcp14> be conducted over authenticated channels (e.g., DoH/DoT).</t>
            </li>
            <li>
              <t><strong>http-validation-over-tls:</strong> This method involves the completion of an HTTP domain validation challenge over an HTTPS session using TCP port 443 where the server authenticates with an existing publicly-trusted valid certificate covering the domain in question.
The certificate cannot be self-signed or expired.
This method <bcp14>MAY</bcp14> be directly satisfied while a CA is performing the "Agreed-Upon Change to Website v2" domain control validation method specified in the the CA/Browser Forum's Baseline Requirements for the Issuance and Management of Publicly-Trusted TLS Server Certificates (Section 3.2.2.4.18). The ACME "http-01" challenge specified in <xref target="RFC8555"/> does not permit the use of HTTPS or port 443 when a CA is contacting the domain in question.
A CA <bcp14>MAY</bcp14> still satisfy the <strong>http-validation-over-tls</strong> method even if it does not initiate connections to port 443 for HTTP challenges so long as either 1) the connection initiated to port 80 serves a redirect to the same domain name over HTTPS at port 443 and the connection to the domain at port 443 servers a valid, trusted certificate or 2) in addition to contacting the domain over port 80 the CA also contacts the domain over port 443 using HTTPS and the connection is established with a valid, trusted certificate and the same challenge value is observed.
Operators of security-critical domains <bcp14>MAY</bcp14> choose not to permit this method since, unlike other cryptographically-constrained domain validation methods specified in this document, its security relies on the non-existence of malicious certificates for a domain at time of the creation of the security Property Tag in the domain's policy.</t>
            </li>
            <li>
              <t><strong>known-account-specifier:</strong> For a CA to issue a certificate using this method 1) there <bcp14>MUST</bcp14> exist a unique identifier for a CA subscriber account that is communicated with the CA out-of-band, over authenticated DNS lookups, or in another manner that is robust against man-in-the-middle adversaries, and 2) the CA may only issue a certificate to an applicant that has authenticated itself to the CA as having access to that specified subscriber account.
A CA does not have permission to issue under this method unless both of these criteria are met.
Once these criteria have been met, the CA <bcp14>MUST</bcp14> additionally perform a validation method that is compliant with the Baseline Requirements for the Issuance and Management of Publicly-Trusted TLS Server Certificates.
Acceptable methods of communicating this account identifier include (but are not limited to):
1) the CAA ACME account URI extension, defined in <xref target="RFC8657"/>, if retrieved via an authenticated DNS lookup
2) a DNS TXT record at an underscore-prefixed subdomain of the domain being validated, if retrieved via an authenticated DNS lookup.
The syntax of presented in <eref target="https://datatracker.ietf.org/doc/draft-sheth-identifiers-dns/">draft-sheth-identifiers-dns-00</eref> <bcp14>MAY</bcp14> be used for this DNS record (e.g., "_accounturi-persist.example.com").</t>
            </li>
            <li>
              <t><strong>private-key-control:</strong> This method involves an applicant showing control of a private key that corresponds to a public key placed in a DNS record associated with the domain being validated.
The private key must be used to sign a message containing: a unique identifier for the CA, the domain name(s) in the certificate, a timestamp, and a hash of the public key in the certificate.
This message may be hashed and then have the signature generated over the hash of this message.
Obtaining such a signed message from a certificate applicant authorizes the CA specified in the message to sign a certificate for those domain names with the specified public key within 24h of the timestamp provided in the message.
The CA <bcp14>MUST</bcp14> retrieve the public key or a hash of the public key corresponding to the private key used for signing the message via an authenticated DNS lookup.
After private key control is established, the CA <bcp14>MUST</bcp14> additionally perform a validation method that is compliant with the Baseline Requirements for the Issuance and Management of Publicly-Trusted TLS Server Certificates.
The syntax of presented in <eref target="https://datatracker.ietf.org/doc/draft-sheth-identifiers-dns/">draft-sheth-identifiers-dns-00</eref> <bcp14>MAY</bcp14> be used to communicate the hash of a domain owner's public key (e.g., a DNS TXT record placed at "_pki-key-persist.example.com").</t>
            </li>
          </ol>
          <t>In the event that <strong>no methods attribute is specified in the attribute-list,</strong> all methods specified in this document are acceptable as well as cryptographically-constrained domain validation methods defined in future RFCs.
Future RFCs <bcp14>MAY</bcp14> specify additional methods for cryptographically-constrained domain validation so long as they satisfy the properties of cryptographically-constrained domain validation (i.e., robustness against global man-in-the-middle adversaries).</t>
        </section>
        <section anchor="permissible-options">
          <name>Permissible Options</name>
          <t>The following options <bcp14>MAY</bcp14> be used in the options or options-critical attribute values.</t>
          <ol spacing="normal" type="1"><li>
              <t><strong>authenticated-policy-retrieval:</strong> This option signifies to a CA that it <bcp14>MUST</bcp14> retrieve a domain's CAA security Property and any associated domain-owner identity (e.g., identifiers used for known-account-specifier and private-key-control) using authenticated DNS lookups or other authenticated channels.
If a CA finds this option in the options-critical attribute and the CAA security Property was not retrieved using authenticated DNS lookups, the CA <bcp14>MUST NOT</bcp14> issue a certificate for that domain.</t>
            </li>
          </ol>
          <t>Additionally, a CA <bcp14>MAY</bcp14> choose to honor its own non-standardized options that do not need to be supported by other CAs or the IETF.
These options <bcp14>MUST</bcp14> be prefixed with "ca-&lt;ca_name&gt;-" where ca_name is the name of the CA that initially developed the option.</t>
        </section>
      </section>
      <section anchor="co-existence-with-other-caa-properties">
        <name>Co-existence with other CAA Properties</name>
        <t>The behavior of a CA when encountering a CAA RRset that contains multiple CAA Properties, including a security Property, depends on the CAA Property Tags.</t>
        <section anchor="caa-security-property-1">
          <name>CAA security Property</name>
          <t>To minimize complexity and avoid the risk of unexpected behavior, a domain's entire cryptographically-constrained domain validation policy <bcp14>SHOULD</bcp14> be encoded into a single CAA security Property.
If a CAA RRset contains multiple security Properties, a CA <bcp14>MUST</bcp14> block issuance if the certificate request does not comply with all of the security Tags.
This ensures that if a new security Property Tag is specified, its security properties cannot be subverted by a stale security Property Tag.</t>
        </section>
        <section anchor="caa-issue-and-issuewild-property">
          <name>CAA issue and issuewild Property</name>
          <t>If a domain specifies both security Properties and a set of issue and issuewild Properties, the CA <bcp14>MUST</bcp14> adhere to all security Properties, as described above, and the CA <bcp14>MUST</bcp14> adhere to the set of issue and issuewild Properties as described in <xref target="RFC8659"/>.</t>
        </section>
        <section anchor="caa-iodef-property">
          <name>CAA iodef Property</name>
          <t>The usage of the iodef Property is analogous to <xref target="RFC8659"/>, i.e., it provides a CA the means of reporting certificate issue requests or cases of certificate issue for domains for which the Property appears in the Relevant RRset, when those requests or issuances violate the security policy of the Issuer or the FQDN holder.
The iodef Property can be used to inform a domain owner about a blocked issuance due to an overly restrictive security Property.</t>
        </section>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Many of the security considerations regarding security CAA records are inherited from those of CAA records. Security CAA records do not increase the attack surface of fraudulent validations. Even in the presence of a security CAA record, standard domain control validation must be satisfied.
Security CAA records reduce the attack surface of fraudulent validations by limiting which validation methods may be used and thus eliminating the risk posed by less-secure validation methods.
Particularly, domains without a security CAA record are often highly vulnerable to man-in-the-middle adversaries that can intercept communications from a CA to the victim's domain.
The security Property significantly reduces this attack surface.</t>
      <t>A DoS attack enabled by security CAA records is to target a domain already using a security CAA record and interfere with all of the permitted validation methods with the idea that the presence of the security CAA will prevent the domain from falling back on alternative validation methods.
This attack vector is mitigated by the diversity of different methods available to domain owners for validating domain ownership using security CAA records.
A domain owner may use an alternate method to satisfy the security CAA record.
In the event that a domain owner truly cannot satisfy any cryptographically-constrained domain validation method, the domain owner can still mitigate this attack by removing the security CAA record, obtaining a certificate, and then reinstating the security CAA record once the attack is over.
As with all CAA records, CAs should not cache stale CAA record lookups that block issuance and should instead recheck the CAA record set when a new issuance request is received.</t>
      <t>The CAA Security tag also permits CAs to retrieve DNS records via authenticated channels between recursive and authoritative DNS servers to provide authentication on domains that are not DNSSEC-signed.
Even when these channels are appropriately authenticated (e.g., using the methods discussed in <xref target="authenticated-channel"/>), retrieving DNS records over authenticated channels does not provide the same properties as DNSSEC.
Specifically, DNSSEC provides authenticated DNS responses whereas DNS over authenticated channels only provides authenticated transport of DNS responses.
Thus, while providing protection against network adversaries, DNS over authenticated channels does not provide protection against compromised authoritative DNS servers.
For example, if DNSSEC private keys are stored separately from the authoritative server, even a compromised authoritative server cannot forge authentic DNSSEC records.
DNS over authenticated channels also does not provide the same attestation properties as DNSSEC.
Finally, DNS over authenticated channels <bcp14>SHOULD NOT</bcp14> rely on web PKI authentication to avoid a circular dependency.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC5234">
        <front>
          <title>Augmented BNF for Syntax Specifications: ABNF</title>
          <author fullname="D. Crocker" initials="D." role="editor" surname="Crocker"/>
          <author fullname="P. Overell" initials="P." surname="Overell"/>
          <date month="January" year="2008"/>
          <abstract>
            <t>Internet technical specifications often need to define a formal syntax. Over the years, a modified version of Backus-Naur Form (BNF), called Augmented BNF (ABNF), has been popular among many Internet specifications. The current specification documents ABNF. It balances compactness and simplicity with reasonable representational power. The differences between standard BNF and ABNF involve naming rules, repetition, alternatives, order-independence, and value ranges. This specification also supplies additional rule definitions and encoding for a core lexical analyzer of the type common to several Internet specifications. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="68"/>
        <seriesInfo name="RFC" value="5234"/>
        <seriesInfo name="DOI" value="10.17487/RFC5234"/>
      </reference>
      <reference anchor="RFC7129">
        <front>
          <title>Authenticated Denial of Existence in the DNS</title>
          <author fullname="R. Gieben" initials="R." surname="Gieben"/>
          <author fullname="W. Mekking" initials="W." surname="Mekking"/>
          <date month="February" year="2014"/>
          <abstract>
            <t>Authenticated denial of existence allows a resolver to validate that a certain domain name does not exist. It is also used to signal that a domain name exists but does not have the specific resource record (RR) type you were asking for. When returning a negative DNS Security Extensions (DNSSEC) response, a name server usually includes up to two NSEC records. With NSEC version 3 (NSEC3), this amount is three.</t>
            <t>This document provides additional background commentary and some context for the NSEC and NSEC3 mechanisms used by DNSSEC to provide authenticated denial-of-existence responses.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7129"/>
        <seriesInfo name="DOI" value="10.17487/RFC7129"/>
      </reference>
      <reference anchor="RFC8555">
        <front>
          <title>Automatic Certificate Management Environment (ACME)</title>
          <author fullname="R. Barnes" initials="R." surname="Barnes"/>
          <author fullname="J. Hoffman-Andrews" initials="J." surname="Hoffman-Andrews"/>
          <author fullname="D. McCarney" initials="D." surname="McCarney"/>
          <author fullname="J. Kasten" initials="J." surname="Kasten"/>
          <date month="March" year="2019"/>
          <abstract>
            <t>Public Key Infrastructure using X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names. Thus, certification authorities (CAs) in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate. As of this writing, this verification is done through a collection of ad hoc mechanisms. This document describes a protocol that a CA and an applicant can use to automate the process of verification and certificate issuance. The protocol also provides facilities for other certificate management functions, such as certificate revocation.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8555"/>
        <seriesInfo name="DOI" value="10.17487/RFC8555"/>
      </reference>
      <reference anchor="RFC8657">
        <front>
          <title>Certification Authority Authorization (CAA) Record Extensions for Account URI and Automatic Certificate Management Environment (ACME) Method Binding</title>
          <author fullname="H. Landau" initials="H." surname="Landau"/>
          <date month="November" year="2019"/>
          <abstract>
            <t>The Certification Authority Authorization (CAA) DNS record allows a domain to communicate an issuance policy to Certification Authorities (CAs) but only allows a domain to define a policy with CA-level granularity. However, the CAA specification (RFC 8659) also provides facilities for an extension to admit a more granular, CA-specific policy. This specification defines two such parameters: one allowing specific accounts of a CA to be identified by URIs and one allowing specific methods of domain control validation as defined by the Automatic Certificate Management Environment (ACME) protocol to be required.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8657"/>
        <seriesInfo name="DOI" value="10.17487/RFC8657"/>
      </reference>
      <reference anchor="RFC8659">
        <front>
          <title>DNS Certification Authority Authorization (CAA) Resource Record</title>
          <author fullname="P. Hallam-Baker" initials="P." surname="Hallam-Baker"/>
          <author fullname="R. Stradling" initials="R." surname="Stradling"/>
          <author fullname="J. Hoffman-Andrews" initials="J." surname="Hoffman-Andrews"/>
          <date month="November" year="2019"/>
          <abstract>
            <t>The Certification Authority Authorization (CAA) DNS Resource Record allows a DNS domain name holder to specify one or more Certification Authorities (CAs) authorized to issue certificates for that domain name. CAA Resource Records allow a public CA to implement additional controls to reduce the risk of unintended certificate mis-issue. This document defines the syntax of the CAA record and rules for processing CAA records by CAs.</t>
            <t>This document obsoletes RFC 6844.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8659"/>
        <seriesInfo name="DOI" value="10.17487/RFC8659"/>
      </reference>
      <reference anchor="RFC9539">
        <front>
          <title>Unilateral Opportunistic Deployment of Encrypted Recursive-to-Authoritative DNS</title>
          <author fullname="D. K. Gillmor" initials="D. K." role="editor" surname="Gillmor"/>
          <author fullname="J. Salazar" initials="J." role="editor" surname="Salazar"/>
          <author fullname="P. Hoffman" initials="P." role="editor" surname="Hoffman"/>
          <date month="February" year="2024"/>
          <abstract>
            <t>This document sets out steps that DNS servers (recursive resolvers and authoritative servers) can take unilaterally (without any coordination with other peers) to defend DNS query privacy against a passive network monitor. The protections provided by the guidance in this document can be defeated by an active attacker, but they should be simpler and less risky to deploy than more powerful defenses.</t>
            <t>The goal of this document is to simplify and speed up deployment of opportunistic encrypted transport in the recursive-to-authoritative hop of the DNS ecosystem. Wider easy deployment of the underlying encrypted transport on an opportunistic basis may facilitate the future specification of stronger cryptographic protections against more-powerful attacks.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9539"/>
        <seriesInfo name="DOI" value="10.17487/RFC9539"/>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
    </references>
    <?line 303?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
