<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.6.4 (Ruby 2.6.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-opsawg-mud-iot-dns-considerations-05" category="bcp" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.15.0 -->
  <front>
    <title abbrev="mud-iot-dns">Operational Considerations for use of DNS in IoT devices</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-mud-iot-dns-considerations-05"/>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <author initials="W." surname="Pan" fullname="Wei Pan">
      <organization>Huawei Technologies</organization>
      <address>
        <email>william.panwei@huawei.com</email>
      </address>
    </author>
    <date year="2022" month="October" day="07"/>
    <area>Operations</area>
    <workgroup>OPSAWG Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document details concerns about how Internet of Things devices use IP
addresses and DNS names.
The issue becomes acute as network operators begin deploying RFC8520 Manufacturer Usage Description (MUD) definitions to control device access.</t>
      <t>This document makes recommendations on when and how to use DNS names in MUD files.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-opsawg-mud-iot-dns-considerations/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        opsawg Working Group mailing list (<eref target="mailto:opsawg@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/opsawg/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/mcr/iot-mud-dns-considerations"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t><xref target="RFC8520"/> provides a standardized way to describe how a specific purpose device makes use of Internet resources.
Access Control Lists (ACLs) can be defined in an RFC8520 Manufacturer Usage Description (MUD) file that permit a device to access Internet resources by DNS name.</t>
      <t>Use of a DNS name rather than IP address in the ACL has many advantages: not only does the layer of indirection permit the mapping of name to IP address to be changed over time, it also generalizes automatically to IPv4 and IPv6 addresses, as well as permitting loading balancing of traffic by many different common ways, including multi-CDN deployments wherein load balancing can account for geography and load.</t>
      <t>At the MUD policy enforcement point -- the firewall -- there is a problem.
The firewall has only access to the layer-3 headers of the packet.
This includes the source and destination IP address, and if not encrypted by IPsec, the destination UDP or TCP port number present in the transport header.
The DNS name is not present!</t>
      <t>It has been suggested that one answer to this problem is to provide a forced intermediate for the TLS connections.
This could in theory be done for TLS 1.2 connections.
The MUD policy enforcement point could observe the Server Name  Identifier (SNI) <xref target="RFC6066"/>.
Some Enterprises do this already.
But, as this involves active termination of the TCP connection (a forced circuit proxy) in order to see enough of the traffic, it requires significant effort.
But, TLS 1.3 provides options to encrypt the SNI as the ESNI, which renders the practice useless in the end.</t>
      <t>So in order to implement these name based ACLs, there must be a mapping between the names in the ACLs and layer-3 IP addresses.
The first section of this document details a few strategies that are used.</t>
      <t>The second section of this document details how common manufacturer anti-patterns get in the way this mapping.</t>
      <t>The third section of this document details how current trends in DNS presolution such as public DNS servers, DNS over TLS (DoT), and DNS over HTTPS (DoH) cause problems for the strategies employed.   Poor interactions with content-distribution networks is a frequent pathology that can result.</t>
      <t>The fourth section of this document makes a series of recommendations ("best current practices") for manufacturers on how to use DNS, and IP addresses with specific purpose IoT devices.</t>
      <t>The Privacy Considerations section concerns itself with issues that DNS-over-TLS and DNS-over-HTTPS are frequently used to deal with.
How these concerns apply to IoT devices located within a residence or enterprise is a key concern.</t>
      <t>The Security Considerations section covers some of the negative outcomes should MUD/firewall managers and IoT manufacturers choose not to cooperate.</t>
    </section>
    <section anchor="Terminology">
      <name>Terminology</name>
      <t>Although this document is not an IETF Standards Track publication, it
adopts the conventions for normative language to provide clarity of
instructions to the implementer.
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="mapping">
      <name>Strategies to map names</name>
      <t>The most naive method is to try to map IP addresses to names using the in-addr.arpa (IPv4), and ipv6.arpa (IPv6) mappings.
This fails for a number of reasons:</t>
      <ol spacing="normal" type="1"><li>it can not be done fast enough,</li>
        <li>it reveals usage patterns of the devices,</li>
        <li>the mapping are often incomplete,</li>
        <li>even if the mapping is present, due to virtual hosting, it may not map back to the name used in the ACL.</li>
      </ol>
      <t>This is not a successful strategy, its use is NOT RECOMMENDED.</t>
      <t>XXX --- explain in detail how this can fail.</t>
      <t>XXX --- explain N:1 vs 1:1 for virtual hosting.</t>
      <t>The simplest successful strategy for translating names is for a MUD controller to take is to do a DNS lookup on the name (a forward lookup), and then use the resulting IP addresses to populate the physical ACLs.</t>
      <t>There are still a number of failures possible.</t>
      <t>The most important one is in the mapping of the names to IP addresses may be non-deterministic.
<xref target="RFC1794"/> describes the very common mechanism that returns DNS A (or reasonably AAAA) records in a permutted order.
This is known as Round Robin DNS, and it has been used for many decades.
The device is intended to use the first IP address that is returned, and each query returns addresses in a different ordering, splitting the load among many servers.</t>
      <t>This situation does not result in failures as long as all possible A/AAAA records are returned.
The MUD controller and the device get a matching set, and the ACLs that are setup cover all possibilities.</t>
      <t>There are a number of circumstances in which the list is not exhaustive.
The simplest is when the round robin does not return all addresses.
This is routinely done by geographical DNS load balancing system.
It can also happen if there are more addresses than will conveniently fit into a DNS reply.
The reply will be marked as truncated.
(If DNSSEC resolution will be done, then the entire RR must be retrieved over TCP (or using a larger EDNS(0) size) before being validated)</t>
      <t>However, in a geographical DNS load balancing system, different answers are given based upon the locality of the system asking.
There may also be further layers of round-robin indirection.</t>
      <t>Aside from the list of records being incomplete, the list may have changed between the time that the MUD controller did the lookup and the time that the IoT device does the lookup, and this change can result in a failure for the ACL to match.</t>
      <t>In order to compensate for this, the MUD controller SHOULD regularly do DNS lookups in order to get never have stale data.
These lookups need to be rate limited in order to avoid load.
It may be necessary to avoid local recursive DNS servers.
The MUD controller SHOULD incorporate its own recursive caching DNS server.
Properly designed recursive servers should cache data for many minutes to days, while the underlying DNS data can change at a higher frequency, providing different answers to different queries!</t>
      <t>A MUD controller that is aware of which recursive DNS server that the IoT device will use can instead query that server on a periodic basis.
Doing so provides three advantages:</t>
      <ol spacing="normal" type="1"><li>any geographic load balancing will base the decision on the geolocation of the recursive DNS server, and the recursive name server will provide the same answer to the MUD controller as to the IoT device.</li>
        <li>the resulting name to IP address mapping in the recursive name server will be cached, and will remain the same for the entire advertised Time-To-Live reported in the DNS query return.
This also allows the MUD controller to avoid doing unnecessary queries.</li>
        <li>if any addresses have been omitted in a round-robin DNS process, the cache will have the set of addresses that were returned.</li>
      </ol>
      <t>The solution of using the same caching recursive resolver as the target device is very simple when the MUD controllers is located in a residential CPE device.
The device is usually also the policy enforcement point for the ACLs, and a caching resolver is  typically located on the same device.
In addition the convenience, there is a shared fate advantage: as all three components are running on the same device, if the device is rebooted, clearing the cache, then all three components will  get restarted when the device is restarted.</t>
      <t>Where the solution is more complex is when the MUD controller is located elsewhere in an Enteprise, or remotely in a cloud such as when a Software Defines Network (SDN) is used to manage the ACLs.
The DNS servers for a particular device may not be known to the MUD controller, nor the MUD controller be even permitted to make recusive queries that server if it is known.
In this case, additional installation specific mechanisms are probably needed to get the right view of DNS.</t>
    </section>
    <section anchor="dns-and-ip-anti-patterns-for-iot-device-manufacturers">
      <name>DNS and IP Anti-Patterns for IoT device Manufacturers</name>
      <t>In many design fields, there are good patterns that should be emulated, and often there are patterns that should not be emulated.
The latter are called anti-patterns, as per <xref target="antipatterns"/>.</t>
      <t>This section describes a number of things with IoT manufacturers have been observed to do in the field, each of which presents difficulties for MUD enforcement points.</t>
      <section anchor="inprotocol">
        <name>Use of IP address literals in-protocol</name>
        <t>A common pattern for a number of devices is to look for firmware updates in a two step process.
An initial query is made (often over HTTPS, sometimes with a POST, but the method is immaterial) to a vendor system that knows whether or not an update is required.</t>
        <t>The current firmware model of the device is sometimes provided and then the authoritative server provides a determination if a new version is required, and if so, what version.
In simpler cases, an HTTPS end point is queried which provides the name and URL of the most recent firmware.</t>
        <t>The authoritative upgrade server then responds with a URL of a firmware blob that the device should download and install.
Best practice is that firmware is either signed internally (<xref target="I-D.ietf-suit-architecture"/>) so that it can be verified, or a hash of the blob is provided.</t>
        <t>An authoritative server might be tempted to provided an IP address literal inside the protocol: there are two arguments (anti-patterns) for doing this.</t>
        <t>One is that it eliminates problems to firmware updates that might be caused by lack of DNS, or incompatibilities with DNS.
For instance the bug that causes interoperability issues with some recursive servers would become unpatchable for devices that were forced to use that recursive resolver type.</t>
        <t>A second reason to avoid a DNS in the URL is when an inhouse content-distribution system is involved that involves on-demand instances being added (or removed) from a cloud computing architecture.</t>
        <t>But, there are many problems with use of IP address literals for the location of the firmware.</t>
        <t>The first is that the update service server must decide whether to provide an IPv4 or an IPv6 literal.
A DNS name can contain both kinds of addresses, and can also contain many different IP addresses of each kind.</t>
        <t>The second problem is that it forces the MUD file definition to contain the exact same IP address literals.
It must also contain an ACL for each address literal.
DNS provides a useful indirection method that naturally aggregates the addresses.</t>
        <t>A third problem involves the use of HTTPS.
IP address literals do not provide enough context for TLS ServerNameIndicator to be useful <xref target="RFC6066"/>.
This limits the firmware repository to be a single tenant on that IP address, and for IPv4 (at least), this is no longer a sustainable use of IP addresses.</t>
        <t>And with any non-determistic name or address that is returned,
the MUD controller is not challenged to validate the transaction, as
it can not see into the communication.</t>
        <t>Third-party content-distribution networks (CDN) tend to use DNS names in order to isolate the content-owner from changes to the distribution network.</t>
      </section>
      <section anchor="use-of-non-deterministic-dns-names-in-protocol">
        <name>Use of non-deterministic DNS names in-protocol</name>
        <t>A second pattern is for a control protocol to connect to a known HTTP end point.
This is easily described in MUD.
Within that control protocol references are made to additional content at other URLs.
The values of those URLs do not fit any easily described pattern and may point at arbitrary names.</t>
        <t>Those names are often within some third-party Content-Distribution-Network (CDN) system, or may be arbitrary names in a cloud-provider storage system such as Amazon S3 (such <xref target="AmazonS3"/>, or <xref target="Akamai"/>).</t>
        <t>Such names may be unpredictably chosen by the content provider, and not the content owner, and so impossible to insert into a MUD file.</t>
        <t>Even if the content provider chosen names are deterministic they may change at a rate much faster
than MUD files can be updated.</t>
        <t>This in particular may apply to the location where firmware updates may be retrieved.</t>
      </section>
      <section anchor="use-of-a-too-inclusive-dns-name">
        <name>Use of a too inclusive DNS name</name>
        <t>Some CDNs make all customer content at a single URL (such as s3.amazonaws.com).
This seems to be ideal from a MUD point of view: a completely predictable URL.</t>
        <t>The problem is that a compromised device could then connect to the contents of any bucket,
potentially attacking the data from other customers.</t>
        <t>Exactly what the risk is depends upon what the other customers are doing: it could be limited to simply causing a distributed denial of service attack resulting to high costs to those customers, or such an attack could potentially include writing content.</t>
        <t>Amazon has recognized the problems associated with this practice, and aims to change it to a virtual hosting model, as per <xref target="awss3virtualhosting"/>.</t>
        <t>The MUD ACLs provide only for permitting end points (hostnames and ports), but do not filter URLs (nor could filtering be enforced within HTTPS).</t>
      </section>
    </section>
    <section anchor="dns-privacy-and-outsourcing-versus-mud-controllers">
      <name>DNS privacy and outsourcing versus MUD controllers</name>
      <t><xref target="RFC7858"/> and <xref target="RFC8094"/> provide for DNS over TLS (DoT) and DNS over HTTPS (DoH).
<xref target="I-D.ietf-dnsop-terminology-ter"/> details the terms.
But, even with traditional DNS over Port-53 (Do53), it is possible to outsource DNS  queries to other public services, such as those operated by Google, CloudFlare, Verisign, etc.</t>
      <t>For some users and classes of device, revealing the DNS queries to those outside entities may consititute a privacy concern.
For other users the use of an insecure local resolver may constitute a privacy concern.</t>
      <t>A described above in <xref target="mapping"/> the MUD controller needs to have access to the same resolver(s) as the IoT device.</t>
    </section>
    <section anchor="recommendations-to-iot-device-manufacturer-on-mud-and-dns-usage">
      <name>Recommendations to IoT device manufacturer on MUD and DNS usage</name>
      <t>Inclusion of a MUD file with IoT devices is operationally quite simple.
It requires only a few small changes to the DHCP client code to express the
MUD URL.
It can even be done without code changes via the use of a QR code affixed to the packaging (see <xref target="I-D.richardson-mud-qrcode"/>.</t>
      <t>The difficult part is determining what to put into the MUD file itself.
There are currently tools that help with the definition and analysis of MUD files, see <xref target="mudmaker"/>.
The remaining difficulty is now the semantic contents of what is in the MUD file.
An IoT manufacturer must now spend some time reviewing what the network communications that their device does.</t>
      <t>This document has discussed a number of challenges that occur relating to how DNS requests are made and resolved, and it is the goal of this section to make recommendations on how to modify IoT systems to work well with MUD.</t>
      <section anchor="consistently-use-dns">
        <name>Consistently use DNS</name>
        <t>For the reasons explained in <xref target="inprotocol"/>, the most important recommendation is to avoid using IP address literals in any protocol.
Names should always be used.</t>
      </section>
      <section anchor="use-primary-dns-names-controlled-by-the-manufacturer">
        <name>Use primary DNS names controlled by the manufacturer</name>
        <t>The second recommendation is to allocate and use names within zones controlled by the manufacturer.
These names can be populated with an alias (see <xref target="RFC8499"/> section 2) that points to the production system.
Ideally, a different name is used for each logical function, allowing for different rules in the MUD file to be enabled and disabled.</t>
        <t>While it used to be costly to have a large number of aliases in a web server certificate, this is no longer the case.
Wildcard certificates are also commonly available which allowed for an infinite number of possible names.</t>
      </section>
      <section anchor="use-content-distribution-network-with-stable-names">
        <name>Use Content-Distribution Network with stable names</name>
        <t>When aliases point to a Content-Distribution Network (CDN), prefer to use stable names that point to appropriately load balanced targets.
CDNs that employ very low time-to-live (TTL) values for DNS make it harder for the MUD controller to get the same answer as the IoT Device.
A CDN that always returns the same set of A and AAAA records, but permutes them to provide the best one first provides a more reliable answer.</t>
      </section>
      <section anchor="do-not-use-geofenced-names">
        <name>Do not use geofenced names</name>
        <t>Due the problems with different answers from different DNS servers, described above, a strong recommendation is to avoid using such things.</t>
      </section>
      <section anchor="prefer-dns-servers-learnt-from-dhcproute-advertisements">
        <name>Prefer DNS servers learnt from DHCP/Route Advertisements</name>
        <t>IoT Devices should prefer doing DNS to the network provided DNS servers.
Whether this is restricted to Classic DNS (Do53) or also includes using DoT/DoH is a local decision, but a locally provided DoT server SHOULD be used, as recommended by <xref target="I-D.reddy-dprive-bootstrap-dns-server"/> and <xref target="I-D.peterson-doh-dhcp"/>.</t>
        <t>The ADD WG is currently only focusing on insecure discovery mechanisms
like DHCP/RA <xref target="I-D.btw-add-home"/> and DNS based discovery mechanisms ({?{I-D.pauly-add-deer}}). Secure discovery of network provided DoH/DoT resolver is possible using the mechanisms discussed in <xref target="I-D.reddy-add-enterprise"/> section-4.</t>
        <t>Use of public QuadX resolver instead of the provided DNS resolver, whether Do53, DoT or DoH is discouraged.
Should the network provide such a resolver for use, then there is no reason not to use it, as the network operator has clearly thought about this.</t>
        <t>Some manufacturers would like to have a fallback to using a public resolver to mitigate against local misconfiguration.
There are a number of reasons to avoid this, or at least do this very carefully.</t>
        <t>It is recommended that use of non-local resolvers is only done when the locally provided resolvers provide no answers to any queries at all, and do so repeatedly.
The use of the operator provided resolvers SHOULD be retried on a periodic basis, and once they answer, there should be no further attempts to contact public resolvers.</t>
        <t>Finally, the list of public resolvers that might be contacted MUST be listed in the MUD file as destinations that are to be permitted!
This should include the port numbers (53, 853 for DoT, 443 for DoH) that will be used as well.</t>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>The use of non-local DNS servers exposes the list of names resolved to a third parties, including passive eavesdroppers.</t>
      <t>The use of DoT and DoH eliminates the minimizes threat from passive eavesdropped, but still exposes the list to the operator of the DoT or DoH server.
There are additional methods, such as described by <xref target="I-D.pauly-dprive-oblivious-doh"/>.</t>
      <t>The use of unencrypted (Do53) requests to a local DNS server exposes the list to any internal passive eavesdroppers, and for some situations that may be significant, particularly if unencrypted WiFi is used.
Use of Encrypted DNS connection to a local DNS recursive resolver is a preferred choice, assuming that the trust anchor for the local DNS server can be obtained, such as via <xref target="I-D.reddy-dprive-bootstrap-dns-server"/>.</t>
      <t>IoT devices that reach out to the manufacturer at regular intervals to check for firmware updates are informing passive eavesdroppers of the existence of a specific manufacturer's device being present at the origin location.</t>
      <t>Identifying the IoT device type empowers the attacker to launch targeted attacks
to the IoT device (e.g., Attacker can advantage of the device vulnerability).</t>
      <t>While possession of a Large (Kitchen) Appliance at a residence may be uninteresting to most, possession of intimate personal devices (e.g., "sex toys") may be a cause for embarrassment.</t>
      <t>IoT device manufacturers are encouraged to find ways to anonymize their update queries.
For instance, contracting out the update notification service to a third party that deals with a large variety of devices would provide a level of defense against passive eavesdropping.
Other update mechanisms should be investigated, including use of DNSSEC signed TXT records with current version information.
This would permit DoT or DoH to convey the update notification in a private fashion.
This is particularly powerful if a local recursive DoT server is used, which then communicates using DoT over the Internet.</t>
      <t>The more complex case of section <xref target="inprotocol"/> postulates that the version number needs to be provided to an intelligent agent that can decided the correct route to do upgrades.
The current <xref target="I-D.ietf-suit-architecture"/> specification provides a wide variety of ways to accomplish the same thing without having to divulge the current version number.</t>
      <t>The use of a publically specified firmware update protocol would also enhance privacy of IoT devices.
In such a system the IoT device would never contact the manufacturer for version information or for firmware itself.
Instead, details of how to query and where to get the firmware would be provided as a MUD extension, and a Enterprise-wide mechanism would retrieve firmware, and then distribute it internally.
Aside from the bandwidth savings of downloading the firmware only once, this also makes the number of devices active confidential,  and provides some evidence about which devices have been upgraded and which ones might still be vulnerable.
(The unpatched devices might be lurking, powered off, lost in a closet)</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document deals with conflicting Security requirements:</t>
      <ol spacing="normal" type="1"><li>devices which an operator wants to manage using <xref target="RFC8520"/></li>
        <li>requirements for the devices to get access to network resources that  may be critical to their continued safe operation.</li>
      </ol>
      <t>This document takes the view that the two requirements do not need to be in conflict, but resolving the conflict requires some advance planning by all parties.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC7858" target="https://www.rfc-editor.org/info/rfc7858" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7858.xml">
          <front>
            <title>Specification for DNS over Transport Layer Security (TLS)</title>
            <author fullname="Z. Hu" initials="Z." surname="Hu"/>
            <author fullname="L. Zhu" initials="L." surname="Zhu"/>
            <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="D. Wessels" initials="D." surname="Wessels"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
              <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7858"/>
          <seriesInfo name="DOI" value="10.17487/RFC7858"/>
        </reference>
        <reference anchor="RFC8520" target="https://www.rfc-editor.org/info/rfc8520" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8520.xml">
          <front>
            <title>Manufacturer Usage Description Specification</title>
            <author fullname="E. Lear" initials="E." surname="Lear"/>
            <author fullname="R. Droms" initials="R." surname="Droms"/>
            <author fullname="D. Romascanu" initials="D." surname="Romascanu"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>This memo specifies a component-based architecture for Manufacturer Usage Descriptions (MUDs). The goal of MUD is to provide a means for end devices to signal to the network what sort of access and network functionality they require to properly function. The initial focus is on access control. Later work can delve into other aspects.</t>
              <t>This memo specifies two YANG modules, IPv4 and IPv6 DHCP options, a Link Layer Discovery Protocol (LLDP) TLV, a URL, an X.509 certificate extension, and a means to sign and verify the descriptions.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8520"/>
          <seriesInfo name="DOI" value="10.17487/RFC8520"/>
        </reference>
        <reference anchor="RFC1794" target="https://www.rfc-editor.org/info/rfc1794" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.1794.xml">
          <front>
            <title>DNS Support for Load Balancing</title>
            <author fullname="T. Brisco" initials="T." surname="Brisco"/>
            <date month="April" year="1995"/>
            <abstract>
              <t>This RFC is meant to first chronicle a foray into the IETF DNS Working Group, discuss other possible alternatives to provide/simulate load balancing support for DNS, and to provide an ultimate, flexible solution for providing DNS support for balancing loads of many types.  This memo provides information for the Internet community.  This memo does not specify an Internet standard of any kind.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1794"/>
          <seriesInfo name="DOI" value="10.17487/RFC1794"/>
        </reference>
        <reference anchor="AmazonS3" target="https://en.wikipedia.org/wiki/Amazon_S3">
          <front>
            <title>Amazon S3</title>
            <author>
              <organization/>
            </author>
            <date year="2019"/>
          </front>
        </reference>
        <reference anchor="Akamai" target="https://en.wikipedia.org/wiki/Akamai_Technologies">
          <front>
            <title>Akamai</title>
            <author>
              <organization/>
            </author>
            <date year="2019"/>
          </front>
        </reference>
        <reference anchor="RFC8499" target="https://www.rfc-editor.org/info/rfc8499" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8499.xml">
          <front>
            <title>DNS Terminology</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="A. Sullivan" initials="A." surname="Sullivan"/>
            <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
            <date month="January" year="2019"/>
            <abstract>
              <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has sometimes changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
              <t>This document obsoletes RFC 7719 and updates RFC 2308.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="219"/>
          <seriesInfo name="RFC" value="8499"/>
          <seriesInfo name="DOI" value="10.17487/RFC8499"/>
        </reference>
        <reference anchor="I-D.ietf-dnsop-terminology-ter" target="https://www.ietf.org/archive/id/draft-ietf-dnsop-terminology-ter-02.txt" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-dnsop-terminology-ter.xml">
          <front>
            <title>Terminology for DNS Transports and Location</title>
            <author fullname="Paul Hoffman">
              <organization>ICANN</organization>
            </author>
            <date day="3" month="August" year="2020"/>
            <abstract>
              <t>This document adds terms and abbreviations to "DNS Terminology" (RFC 8499) that relate to DNS running over various transports, as well as terms and abbreviations for DNS resolution at traditional and non- traditional locations.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dnsop-terminology-ter-02"/>
        </reference>
        <reference anchor="I-D.ietf-suit-architecture" target="https://www.ietf.org/archive/id/draft-ietf-suit-architecture-16.txt" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-suit-architecture.xml">
          <front>
            <title>A Firmware Update Architecture for Internet of Things</title>
            <author fullname="Brendan Moran">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Hannes Tschofenig">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="David Brown">
              <organization>Linaro</organization>
            </author>
            <author fullname="Milosch Meriac">
              <organization>Consultant</organization>
            </author>
            <date day="27" month="January" year="2021"/>
            <abstract>
              <t>Vulnerabilities in Internet of Things (IoT) devices have raised the need for a reliable and secure firmware update mechanism suitable for devices with resource constraints. Incorporating such an update mechanism is a fundamental requirement for fixing vulnerabilities, but it also enables other important capabilities such as updating configuration settings and adding new functionality. In addition to the definition of terminology and an architecture, this document provides the motivation for the standardization of a manifest format as a transport-agnostic means for describing and protecting firmware updates.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-suit-architecture-16"/>
        </reference>
        <reference anchor="I-D.reddy-dprive-bootstrap-dns-server" target="https://www.ietf.org/archive/id/draft-reddy-dprive-bootstrap-dns-server-08.txt" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.reddy-dprive-bootstrap-dns-server.xml">
          <front>
            <title>A Bootstrapping Procedure to Discover and Authenticate DNS-over-TLS and DNS-over-HTTPS Servers</title>
            <author fullname="Tirumaleswar Reddy">
              <organization>McAfee, Inc.</organization>
            </author>
            <author fullname="Dan Wing">
              <organization>Citrix Systems, Inc.</organization>
            </author>
            <author fullname="Michael C. Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Mohamed Boucadair">
              <organization>Orange</organization>
            </author>
            <date day="6" month="March" year="2020"/>
            <abstract>
              <t>This document specifies mechanisms to automatically bootstrap endpoints (e.g., hosts, Customer Equipment) to discover and authenticate DNS-over-TLS and DNS-over-HTTPS servers provided by a local network.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-reddy-dprive-bootstrap-dns-server-08"/>
        </reference>
        <reference anchor="I-D.peterson-doh-dhcp" target="https://www.ietf.org/archive/id/draft-peterson-doh-dhcp-01.txt" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.peterson-doh-dhcp.xml">
          <front>
            <title>DNS over HTTP resolver announcement Using DHCP or Router Advertisements</title>
            <author fullname="Thomas Peterson"/>
            <date day="21" month="October" year="2019"/>
            <abstract>
              <t>This specification describes a DHCP option and Router Advertisement (RA) extension to inform clients of the presence of a DNS over HTTP (DoH) service to be used for DNS queries.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-peterson-doh-dhcp-01"/>
        </reference>
        <reference anchor="RFC8094" target="https://www.rfc-editor.org/info/rfc8094" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8094.xml">
          <front>
            <title>DNS over Datagram Transport Layer Security (DTLS)</title>
            <author fullname="T. Reddy" initials="T." surname="Reddy"/>
            <author fullname="D. Wing" initials="D." surname="Wing"/>
            <author fullname="P. Patil" initials="P." surname="Patil"/>
            <date month="February" year="2017"/>
            <abstract>
              <t>DNS queries and responses are visible to network elements on the path between the DNS client and its server. These queries and responses can contain privacy-sensitive information, which is valuable to protect.</t>
              <t>This document proposes the use of Datagram Transport Layer Security (DTLS) for DNS, to protect against passive listeners and certain active attacks. As latency is critical for DNS, this proposal also discusses mechanisms to reduce DTLS round trips and reduce the DTLS handshake size. The proposed mechanism runs over port 853.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8094"/>
          <seriesInfo name="DOI" value="10.17487/RFC8094"/>
        </reference>
        <reference anchor="RFC6146" target="https://www.rfc-editor.org/info/rfc6146" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6146.xml">
          <front>
            <title>Stateful NAT64: Network Address and Protocol Translation from IPv6 Clients to IPv4 Servers</title>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <author fullname="P. Matthews" initials="P." surname="Matthews"/>
            <author fullname="I. van Beijnum" initials="I." surname="van Beijnum"/>
            <date month="April" year="2011"/>
          </front>
          <seriesInfo name="RFC" value="6146"/>
          <seriesInfo name="DOI" value="10.17487/RFC6146"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized.  This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="mudmaker" target="https://mudmaker.org">
          <front>
            <title>Mud Maker</title>
            <author>
              <organization/>
            </author>
            <date year="2019"/>
          </front>
        </reference>
        <reference anchor="I-D.richardson-mud-qrcode" target="https://www.ietf.org/archive/id/draft-richardson-mud-qrcode-07.txt" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.richardson-mud-qrcode.xml">
          <front>
            <title>On loading MUD URLs from QR codes</title>
            <author fullname="Michael Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Jacques Latour">
              <organization>CIRA Labs</organization>
            </author>
            <author fullname="Hassan Habibi Gharakheili">
              <organization>UNSW Sydney</organization>
            </author>
            <date day="21" month="March" year="2022"/>
            <abstract>
              <t>This informational document details a protocol to load MUD definitions for devices which have no integrated Manufacturer Usage Description (MUD) as described in RFC8520. This document is published to inform the Internet community of this mechanism to allow interoperability and to serve as a basis of other standards work if there is interest. // RFC-EDITOR-please-remove: This work is tracked at // https://github.com/mcr/mud-qrcode</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-richardson-mud-qrcode-07"/>
        </reference>
        <reference anchor="antipatterns" target="https://www.agilealliance.org/glossary/antipattern">
          <front>
            <title>AntiPattern</title>
            <author>
              <organization/>
            </author>
            <date year="2021" month="July" day="12"/>
          </front>
        </reference>
        <reference anchor="awss3virtualhosting" target="https://techmonitor.ai/techonology/cloud/aws-s3-path-deprecation">
          <front>
            <title>Down to the Wire: AWS Delays 'Path-Style' S3 Deprecation at Last Minute</title>
            <author>
              <organization/>
            </author>
            <date year="2021" month="July" day="12"/>
          </front>
        </reference>
        <reference anchor="RFC6066" target="https://www.rfc-editor.org/info/rfc6066" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6066.xml">
          <front>
            <title>Transport Layer Security (TLS) Extensions: Extension Definitions</title>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
            <date month="January" year="2011"/>
            <abstract>
              <t>This document provides specifications for existing TLS extensions.  It is a companion document for RFC 5246, "The Transport Layer Security (TLS) Protocol Version 1.2".  The extensions specified are server_name, max_fragment_length, client_certificate_url, trusted_ca_keys, truncated_hmac, and status_request. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6066"/>
          <seriesInfo name="DOI" value="10.17487/RFC6066"/>
        </reference>
        <reference anchor="I-D.btw-add-home" target="https://www.ietf.org/archive/id/draft-btw-add-home-12.txt" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.btw-add-home.xml">
          <front>
            <title>DHCP and Router Advertisement Options for Encrypted DNS Discovery</title>
            <author fullname="Mohamed Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Tirumaleswar Reddy">
              <organization>McAfee, Inc.</organization>
            </author>
            <author fullname="Dan Wing">
              <organization>Citrix Systems, Inc.</organization>
            </author>
            <author fullname="Neil Cook">
              <organization>Open-Xchange</organization>
            </author>
            <author fullname="Tommy Jensen">
              <organization>Microsoft</organization>
            </author>
            <date day="22" month="January" year="2021"/>
            <abstract>
              <t>The document specifies new DHCP and IPv6 Router Advertisement options to discover encrypted DNS servers (e.g., DNS-over-HTTPS, DNS-over- TLS, DNS-over-QUIC). Particularly, it allows to learn an authentication domain name together with a list of IP addresses and a port number to reach such encrypted DNS servers. The discovery of DNS-over-HTTPS URI Templates is also discussed.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-btw-add-home-12"/>
        </reference>
        <reference anchor="I-D.reddy-add-enterprise" target="https://www.ietf.org/archive/id/draft-reddy-add-enterprise-00.txt" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.reddy-add-enterprise.xml">
          <front>
            <title>DNS-over-HTTPS and DNS-over-TLS Server Deployment Considerations for Enterprise Networks</title>
            <author fullname="Tirumaleswar Reddy">
              <organization>McAfee, Inc.</organization>
            </author>
            <author fullname="Dan Wing">
              <organization>Citrix Systems, Inc.</organization>
            </author>
            <date day="23" month="June" year="2020"/>
            <abstract>
              <t>This document discusses DoH/DoT deployment considerations for Enterprise networks. It particularly sketches the required steps to use DNS-over-TLS (DoT) and/or DNS-over-HTTPS (DoH) server provided by the Enterprise network. One of the goals of the document is to assess to what extent existing tools can be used to provide such service.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-reddy-add-enterprise-00"/>
        </reference>
        <reference anchor="I-D.pauly-dprive-oblivious-doh" target="https://www.ietf.org/archive/id/draft-pauly-dprive-oblivious-doh-11.txt" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.pauly-dprive-oblivious-doh.xml">
          <front>
            <title>Oblivious DNS Over HTTPS</title>
            <author fullname="Eric Kinnear">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Patrick McManus">
              <organization>Fastly</organization>
            </author>
            <author fullname="Tommy Pauly">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Tanya Verma">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Christopher A. Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="17" month="February" year="2022"/>
            <abstract>
              <t>This document describes a protocol that allows clients to hide their IP addresses from DNS resolvers via proxying encrypted DNS over HTTPS (DoH) messages. This improves privacy of DNS operations by not allowing any one server entity to be aware of both the client IP address and the content of DNS queries and answers. This experimental protocol is developed outside the IETF and is published here to guide implementation, ensure interoperability among implementations, and enable wide-scale experimentation.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-pauly-dprive-oblivious-doh-11"/>
        </reference>
      </references>
    </references>
    <section anchor="appendices">
      <name>Appendices</name>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
