<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.8 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-ietf-v6ops-prefer8781-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="Prefer RFC8781">Prefer use of RFC8781 for Discovery of IPv6 Prefix Used for IPv6 Address Synthesis</title>

    <author fullname="Nick Buraglio">
      <organization>Energy Sciences Network</organization>
      <address>
        <email>buraglio@forwardingplane.net</email>
      </address>
    </author>
    <author fullname="Tommy Jensen">
      <organization>Microsoft</organization>
      <address>
        <email>tojens.ietf@gmail.com</email>
      </address>
    </author>
    <author fullname="Jen Linkova">
      <organization>Google</organization>
      <address>
        <email>furry13@gmail.com</email>
      </address>
    </author>

    <date year="2025" month="January" day="13"/>

    <area>ops</area>
    <workgroup>v6ops</workgroup>
    <keyword>IPv6</keyword> <keyword>DNS64</keyword>

    <abstract>


<?line 55?>

<t>RFC7050 describes a method for detecting the presence of DNS64 and for learning the IPv6 prefix used for protocol translation (RFC7915). This methodology depends on the existence of a well-known IPv4-only fully qualified domain name "ipv4only.arpa.". Because newer methods exist that lack the requirement of a higher level protocol, instead using existing operations in the form of native router advertisements, discovery of the IPv6 prefix used for protocol translation using RFC7050 should be discouraged. RFC7050 <bcp14>MAY</bcp14> only be used if other methods (such as RFC8781]) can not be used.</t>



    </abstract>

    <note title="About This Document" removeInRFC="true">
      <t>
        The latest revision of this draft can be found at <eref target="https://github.com/buraglio/draft-nbtjjl-v6ops-prefer8781"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-v6ops-prefer8781/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        v6ops Working Group mailing list (<eref target="mailto:dnsop@ietf.org"/>),
        which is archived at <eref target="https://datatracker.ietf.org/wg/v6ops/about/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/dnsop/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/buraglio/draft-nbtjjl-dnsop-prefer8781"/>.</t>
    </note>


  </front>

  <middle>


<?line 59?>

<section anchor="introduction"><name>Introduction</name>

<t>The DNS-based mechanism defined in <xref target="RFC7050"></xref> was the very first mechanism available for nodes to discover the PREF64 information.
However since the publication of RFC7050, other methods have been developed to address some of <xref target="RFC7050"></xref> limitations.</t>

<t>For example, <xref target="RFC8781"></xref> describes a Neighbor Discovery option to be used in Router Advertisements (RAs) to communicate prefixes of Network Address and Protocol Translation from IPv6 clients to IPv4 servers (NAT64) to hosts. This approach has the advantage of using the same communication channel IPv6 clients use for discovery of other network configurations such as the network's default route. This means network administrators can secure this configuration along with other configurations which are required by IPv6 using a single approach such as RA Guard <xref target="RFC6105"></xref>.</t>

<t>Taking into account some fundamental flaws of the <xref target="RFC7050"></xref> mechanism, it is desirable to prefer <xref target="RFC8781"></xref> for all new deployments and for implementations to use consistent methods to obtain PREF64 information. RFC 7050 should be used only in cases where there is an inability to offer PREF64 information with a router advertisement, and as a fallback for legacy systems incapable of processing those RA options.</t>

</section>
<section anchor="conventions-and-definitions"><name>Conventions and Definitions</name>

<t>NAT64: a mechanism for translating IPv6 packets to IPv4 packets and vice versa.  The translation is done by translating the packet headers according to the IP/ICMP Translation Algorithm defined in <xref target="RFC7915"></xref>.</t>

<t>DNS64: a mechanism for synthesizing AAAA records from A records, defined in <xref target="RFC6147"></xref>.</t>

<t>Router Advertisement: A packet used by Neighbor Discovery <xref target="RFC4861"></xref> and StateLess Address AutoConfiguration (SLAAC, <xref target="RFC4862"></xref>) to advertise the presence of the routers, together with other IPv6 configuration information.</t>

<t>PREF64 (or NAT64 prefix): An IPv6 prefix used for IPv6 address synthesis and for network addresses and protocols translation from IPv6 clients to IPv4 servers, <xref target="RFC6146"></xref>.</t>

<t>CLAT: A customer-side translator (XLAT) that complies with <xref target="RFC6145"></xref>.</t>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
<section anchor="existing-issues-with-rfc-7050"><name>Existing issues with RFC 7050</name>

<t>DNS-based method of discovering the NAT64 prefix introduces some challenges, which make this approach less preferable than most recently developed alternatives (such as PREF64 RA option, <xref target="RFC8781"></xref>).
This section outlines the key issues, associated with <xref target="RFC7050"></xref>.</t>

<section anchor="dependency-on-network-provided-recursive-resolvers"><name>Dependency on Network-Provided Recursive Resolvers</name>

<t>Fundamentally, the presence of the NAT64 and the exact value of the prefix used for the translation are network-specific attributes.
Therefore, to discover the PREF64 the device needs to use the DNS resolvers provided by the network.
If the device is configured to use other recursive resolvers, its name resolution APIs and libraries are required to recognize 'ipv4only.arpa.' as a special name and give it special treatment.
This issue and remediation approach are discussed in <xref target="RFC8880"></xref>.
However, it has been observed that not all <xref target="RFC7050"></xref> implementations support <xref target="RFC8880"></xref> requirements for special treatment of 'ipv4only.arpa.'.
As a result, configuring such systems to use resolvers other than the one provided by the network might break the PREF64 discovery, leading to degraded user experience.</t>

</section>
<section anchor="network-stack-initialization-delay"><name>Network Stack Initialization Delay</name>

<t>When using SLAAC (<xref target="RFC4862"></xref>), an IPv6 host usually needs just one Router Advertisement (RA, <xref target="RFC4861"></xref>) packet to obtain all information required to complete the host's network configuration.
For an IPv6-only host, the PREF64 information is essential, especially if the host implements the customer-side translator (CLAT) (<xref target="RFC6877"></xref>).
The mechanism defined in <xref target="RFC7050"></xref> implies that the PREF64 information is not bundled with all other network configuration parameters provided by RAs, and can only be obtained after the host has configured the rest of its IPv6 stack.
Therefore, until the process described in Section 3 of <xref target="RFC7050"></xref> is completed, the CLAT process can not start, which negatively impacts IPv4-only applications which have already started.</t>

</section>
<section anchor="inflexibility"><name>Inflexibility</name>

<t>Section 3 of <xref target="RFC7050"></xref> requires that the node <bcp14>SHALL</bcp14> cache the replies received during the PREF64 discovery and <bcp14>SHOULD</bcp14> repeat the discovery process ten seconds before the TTL of the Well-Known Name's synthetic AAAA resource record expires.
As a result, once the PREF64 is discovered, it will be used until the TTL expired, or until the node disconnects from the network.
There is no mechanism for an operator to force the PREF64 rediscovery on the node without disconnecting the node from the network.
If the operator needs to change the PREF64 value used in the network, they need to proactively reduce the TTL value returned by the DNS64 server.
This method has two significant drawbacks:</t>

<t><list style="symbols">
  <t>Many networks utilize external DNS64 servers and therefore have no control over the TTL value.</t>
  <t>The PREF64 changes need to be planned and executed at least TTL seconds in advance. If the operator needs to notify nodes that a particular prefix must not be used (e.g. during a network outage or if the nodes learnt a rogue PREF64 as a result of an attack), it might not be possible without interrupting the network connectivity for the affected nodes.</t>
</list></t>

</section>
<section anchor="security-implications"><name>Security Implications</name>

<t>As discussed in Section 7 of <xref target="RFC7050"></xref>, the DNS-based PREF64 discovery is prone to DNS spoofing attacks.
In addition to creating a wider attack surface for IPv6 deployments, <xref target="RFC7050"></xref> has other security challenges worth noting to justify declaring it legacy.</t>

<section anchor="secure-channel-def"><name>Definition of secure channel</name>

<t><xref target="RFC7050"></xref> requires a node's communication channel with a DNS64 server to be a "secure channel" which it defines to mean "a communication channel a node has between itself and a DNS64 server protecting DNS protocol-related messages from interception and tampering." This need is redundant when another communication mechanism of IPv6-related configuration, specifically Router Advertisements, can already be defended against tampering by RA Guard <xref target="RFC6105"></xref>. Requiring nodes to implement two defense mechanisms when only one is necessary when <xref target="RFC8781"></xref> is used in place of <xref target="RFC7050"></xref> creates unnecessary risk.</t>

</section>
<section anchor="secure-channel-example-of-ipsec"><name>Secure channel example of IPsec</name>

<t>One of the two examples <xref target="RFC7050"></xref> defines to qualify a communication channel with a DNS64 server is the use of an "IPsec-based virtual private network (VPN) tunnel". As of the time of this writing, this is not supported as a practice by any common operating system DNS client. While they could, there have also since been multiple mechanisms defined for performing DNS-specific encryption such as those defined in <xref target="RFC9499"></xref> that would be more appropriately scoped to the applicable DNS traffic. These are also compatible with encrypted DNS advertisement by the network using Discovery of Network-designated Resolvers <xref target="RFC9463"></xref> that would ensure the clients know in advance that the DNS64 server supported the encryption mechanism.</t>

</section>
<section anchor="secure-channel-example-of-link-layer-encryption"><name>Secure channel example of link layer encryption</name>

<t>The other example given by <xref target="RFC7050"></xref> that would allow a communication channel with a DNS64 server to qualify as a "secure channel" is the use of a "link layer utilizing data encryption technologies". As of the time of this writing, most common link layer implementations use data encryption already with no extra effort needed on the part of network nodes. While this appears to be a trivial way to satisfy this requirement, it also renders the requirement meaningless since any node along the path can still read the higher-layer DNS traffic containing the translation prefix. This seems to be at odds with the definition of "secure channel" as explained in <xref section="2.2" sectionFormat="of" target="RFC7050"/>.</t>

</section>
</section>
</section>
<section anchor="recommendations-for-pref64-discovery"><name>Recommendations for PREF64 Discovery</name>

<section anchor="deployment-recommendations"><name>Deployment Recommendations</name>

<t>Operators deploying NAT64 networks <bcp14>SHOULD</bcp14> provide PREF64 information in Router Advertisements as per <xref target="RFC8781"></xref>.</t>

</section>
<section anchor="mobile-network-considerations"><name>Mobile network considerations</name>

<t>Use of <xref target="RFC8781"></xref> may not be currently practical for networks that have more complex network control signaling or rely on slower network component upgrade cycles, such as mobile networks. These environments are encouraged to incorporate <xref target="RFC8781"></xref> when made practical by infrastructure upgrades or software stack feature additions.</t>

</section>
<section anchor="clients-implementation-recommendations"><name>Clients Implementation Recommendations</name>

<t>Clients <bcp14>SHOULD</bcp14> obtain PREF64 information from Router Advertisements as per <xref target="RFC8781"></xref> instead of using <xref target="RFC7050"></xref> method.
In the absence of the PREF64 information in RAs, a client <bcp14>MAY</bcp14> choose to fall back to RFC7050.</t>

</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>Obtaining PREF64 information from Router Advertisements improves the overall security of an IPv6-only client as it mitigates all attack vectors related to spoofed or rogue DNS response, as discussed in Section 7 of <xref target="RFC7050"></xref>.
Security considerations related to obtaining PREF64 information from RAs are discussed in Section 7 of <xref target="RFC8781"></xref>.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>It is expected that there will be a long tail of both clients and networks still relying on <xref target="RFC7050"></xref> as a sole mechanism to discover PREF64 information.
Therefore IANA still need to maintain "ipv4only.arpa." as described in <xref target="RFC7050"></xref> and this document has no IANA actions.</t>

</section>


  </middle>

  <back>


    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC7050">
  <front>
    <title>Discovery of the IPv6 Prefix Used for IPv6 Address Synthesis</title>
    <author fullname="T. Savolainen" initials="T." surname="Savolainen"/>
    <author fullname="J. Korhonen" initials="J." surname="Korhonen"/>
    <author fullname="D. Wing" initials="D." surname="Wing"/>
    <date month="November" year="2013"/>
    <abstract>
      <t>This document describes a method for detecting the presence of DNS64 and for learning the IPv6 prefix used for protocol translation on an access network. The method depends on the existence of a well-known IPv4-only fully qualified domain name "ipv4only.arpa.". The information learned enables nodes to perform local IPv6 address synthesis and to potentially avoid NAT64 on dual-stack and multi-interface deployments.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7050"/>
  <seriesInfo name="DOI" value="10.17487/RFC7050"/>
</reference>

<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>

<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>




    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC4861">
  <front>
    <title>Neighbor Discovery for IP version 6 (IPv6)</title>
    <author fullname="T. Narten" initials="T." surname="Narten"/>
    <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
    <author fullname="W. Simpson" initials="W." surname="Simpson"/>
    <author fullname="H. Soliman" initials="H." surname="Soliman"/>
    <date month="September" year="2007"/>
    <abstract>
      <t>This document specifies the Neighbor Discovery protocol for IP Version 6. IPv6 nodes on the same link use Neighbor Discovery to discover each other's presence, to determine each other's link-layer addresses, to find routers, and to maintain reachability information about the paths to active neighbors. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4861"/>
  <seriesInfo name="DOI" value="10.17487/RFC4861"/>
</reference>

<reference anchor="RFC4862">
  <front>
    <title>IPv6 Stateless Address Autoconfiguration</title>
    <author fullname="S. Thomson" initials="S." surname="Thomson"/>
    <author fullname="T. Narten" initials="T." surname="Narten"/>
    <author fullname="T. Jinmei" initials="T." surname="Jinmei"/>
    <date month="September" year="2007"/>
    <abstract>
      <t>This document specifies the steps a host takes in deciding how to autoconfigure its interfaces in IP version 6. The autoconfiguration process includes generating a link-local address, generating global addresses via stateless address autoconfiguration, and the Duplicate Address Detection procedure to verify the uniqueness of the addresses on a link. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4862"/>
  <seriesInfo name="DOI" value="10.17487/RFC4862"/>
</reference>

<reference anchor="RFC6105">
  <front>
    <title>IPv6 Router Advertisement Guard</title>
    <author fullname="E. Levy-Abegnoli" initials="E." surname="Levy-Abegnoli"/>
    <author fullname="G. Van de Velde" initials="G." surname="Van de Velde"/>
    <author fullname="C. Popoviciu" initials="C." surname="Popoviciu"/>
    <author fullname="J. Mohacsi" initials="J." surname="Mohacsi"/>
    <date month="February" year="2011"/>
    <abstract>
      <t>Routed protocols are often susceptible to spoof attacks. The canonical solution for IPv6 is Secure Neighbor Discovery (SEND), a solution that is non-trivial to deploy. This document proposes a light-weight alternative and complement to SEND based on filtering in the layer-2 network fabric, using a variety of filtering criteria, including, for example, SEND status. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6105"/>
  <seriesInfo name="DOI" value="10.17487/RFC6105"/>
</reference>

<reference anchor="RFC6145">
  <front>
    <title>IP/ICMP Translation Algorithm</title>
    <author fullname="X. Li" initials="X." surname="Li"/>
    <author fullname="C. Bao" initials="C." surname="Bao"/>
    <author fullname="F. Baker" initials="F." surname="Baker"/>
    <date month="April" year="2011"/>
    <abstract>
      <t>This document describes the Stateless IP/ICMP Translation Algorithm (SIIT), which translates between IPv4 and IPv6 packet headers (including ICMP headers). This document obsoletes RFC 2765. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6145"/>
  <seriesInfo name="DOI" value="10.17487/RFC6145"/>
</reference>

<reference anchor="RFC6146">
  <front>
    <title>Stateful NAT64: Network Address and Protocol Translation from IPv6 Clients to IPv4 Servers</title>
    <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
    <author fullname="P. Matthews" initials="P." surname="Matthews"/>
    <author fullname="I. van Beijnum" initials="I." surname="van Beijnum"/>
    <date month="April" year="2011"/>
  </front>
  <seriesInfo name="RFC" value="6146"/>
  <seriesInfo name="DOI" value="10.17487/RFC6146"/>
</reference>

<reference anchor="RFC7915">
  <front>
    <title>IP/ICMP Translation Algorithm</title>
    <author fullname="C. Bao" initials="C." surname="Bao"/>
    <author fullname="X. Li" initials="X." surname="Li"/>
    <author fullname="F. Baker" initials="F." surname="Baker"/>
    <author fullname="T. Anderson" initials="T." surname="Anderson"/>
    <author fullname="F. Gont" initials="F." surname="Gont"/>
    <date month="June" year="2016"/>
    <abstract>
      <t>This document describes the Stateless IP/ICMP Translation Algorithm (SIIT), which translates between IPv4 and IPv6 packet headers (including ICMP headers). This document obsoletes RFC 6145.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7915"/>
  <seriesInfo name="DOI" value="10.17487/RFC7915"/>
</reference>

<reference anchor="RFC6147">
  <front>
    <title>DNS64: DNS Extensions for Network Address Translation from IPv6 Clients to IPv4 Servers</title>
    <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
    <author fullname="A. Sullivan" initials="A." surname="Sullivan"/>
    <author fullname="P. Matthews" initials="P." surname="Matthews"/>
    <author fullname="I. van Beijnum" initials="I." surname="van Beijnum"/>
    <date month="April" year="2011"/>
    <abstract>
      <t>DNS64 is a mechanism for synthesizing AAAA records from A records. DNS64 is used with an IPv6/IPv4 translator to enable client-server communication between an IPv6-only client and an IPv4-only server, without requiring any changes to either the IPv6 or the IPv4 node, for the class of applications that work through NATs. This document specifies DNS64, and provides suggestions on how it should be deployed in conjunction with IPv6/IPv4 translators. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6147"/>
  <seriesInfo name="DOI" value="10.17487/RFC6147"/>
</reference>

<reference anchor="RFC6877">
  <front>
    <title>464XLAT: Combination of Stateful and Stateless Translation</title>
    <author fullname="M. Mawatari" initials="M." surname="Mawatari"/>
    <author fullname="M. Kawashima" initials="M." surname="Kawashima"/>
    <author fullname="C. Byrne" initials="C." surname="Byrne"/>
    <date month="April" year="2013"/>
    <abstract>
      <t>This document describes an architecture (464XLAT) for providing limited IPv4 connectivity across an IPv6-only network by combining existing and well-known stateful protocol translation (as described in RFC 6146) in the core and stateless protocol translation (as described in RFC 6145) at the edge. 464XLAT is a simple and scalable technique to quickly deploy limited IPv4 access service to IPv6-only edge networks without encapsulation.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6877"/>
  <seriesInfo name="DOI" value="10.17487/RFC6877"/>
</reference>

<reference anchor="RFC8781">
  <front>
    <title>Discovering PREF64 in Router Advertisements</title>
    <author fullname="L. Colitti" initials="L." surname="Colitti"/>
    <author fullname="J. Linkova" initials="J." surname="Linkova"/>
    <date month="April" year="2020"/>
    <abstract>
      <t>This document specifies a Neighbor Discovery option to be used in Router Advertisements (RAs) to communicate prefixes of Network Address and Protocol Translation from IPv6 clients to IPv4 servers (NAT64) to hosts.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8781"/>
  <seriesInfo name="DOI" value="10.17487/RFC8781"/>
</reference>

<reference anchor="RFC8880">
  <front>
    <title>Special Use Domain Name 'ipv4only.arpa'</title>
    <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
    <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
    <date month="August" year="2020"/>
    <abstract>
      <t>NAT64 (Network Address and Protocol Translation from IPv6 Clients to IPv4 Servers) allows client devices using IPv6 to communicate with servers that have only IPv4 connectivity.</t>
      <t>The specification for how a client discovers its local network's NAT64 prefix (RFC 7050) defines the special name 'ipv4only.arpa' for this purpose. However, in its Domain Name Reservation Considerations section (Section 8.1), that specification (RFC 7050) indicates that the name actually has no particularly special properties that would require special handling.</t>
      <t>Consequently, despite the well-articulated special purpose of the name, 'ipv4only.arpa' was not recorded in the Special-Use Domain Names registry as a name with special properties.</t>
      <t>This document updates RFC 7050. It describes the special treatment required and formally declares the special properties of the name. It also adds similar declarations for the corresponding reverse mapping names.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8880"/>
  <seriesInfo name="DOI" value="10.17487/RFC8880"/>
</reference>

<reference anchor="RFC9463">
  <front>
    <title>DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers (DNR)</title>
    <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
    <author fullname="T. Reddy.K" initials="T." role="editor" surname="Reddy.K"/>
    <author fullname="D. Wing" initials="D." surname="Wing"/>
    <author fullname="N. Cook" initials="N." surname="Cook"/>
    <author fullname="T. Jensen" initials="T." surname="Jensen"/>
    <date month="November" year="2023"/>
    <abstract>
      <t>This document specifies new DHCP and IPv6 Router Advertisement options to discover encrypted DNS resolvers (e.g., DNS over HTTPS, DNS over TLS, and DNS over QUIC). Particularly, it allows a host to learn an Authentication Domain Name together with a list of IP addresses and a set of service parameters to reach such encrypted DNS resolvers.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9463"/>
  <seriesInfo name="DOI" value="10.17487/RFC9463"/>
</reference>

<reference anchor="RFC9499">
  <front>
    <title>DNS Terminology</title>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
    <date month="March" year="2024"/>
    <abstract>
      <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
      <t>This document updates RFC 2308 by clarifying the definitions of "forwarder" and "QNAME". It obsoletes RFC 8499 by adding multiple terms and clarifications. Comprehensive lists of changed and new definitions can be found in Appendices A and B.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="219"/>
  <seriesInfo name="RFC" value="9499"/>
  <seriesInfo name="DOI" value="10.17487/RFC9499"/>
</reference>




    </references>


<?line 179?>

<section numbered="false" anchor="acknowledgments"><name>Acknowledgments</name>

<t>The authors would like to than the following people for their valuable contributions: Lorenzo Colitti, Tom Costello, Charles Eckel, Nick Heatley, and Peter Schmitt.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

