<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 3.1.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-lenders-dns-cns-00" category="bcp" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.15.1 -->
  <front>
    <title abbrev="DNS in Constrained Networks">Guidance on DNS Message Composition in Constrained Networks</title>
    <seriesInfo name="Internet-Draft" value="draft-lenders-dns-cns-00"/>
    <author fullname="Martine Sophie Lenders">
      <organization abbrev="FU Berlin">Freie Universität Berlin</organization>
      <address>
        <email>m.lenders@fu-berlin.de</email>
      </address>
    </author>
    <author fullname="Thomas C. Schmidt">
      <organization>HAW Hamburg</organization>
      <address>
        <email>t.schmidt@haw-hamburg.de</email>
      </address>
    </author>
    <author fullname="Matthias Wählisch">
      <organization abbrev="FU Berlin">Freie Universität Berlin</organization>
      <address>
        <email>m.waehlisch@fu-berlin.de</email>
      </address>
    </author>
    <date year="2022" month="October" day="24"/>
    <area>Applications</area>
    <workgroup>TBD</workgroup>
    <keyword>Internet-Draft</keyword>
    <keyword>CBOR</keyword>
    <keyword>DNS</keyword>
    <abstract>
      <t>This document provides guidance on the composition of DNS messages in
constrained networks, where the link layer may restrict payload sizes
significantly and batteries challenge power consumption.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://anr-bmbf-pivot.github.io/draft-lenders-dns-cns/draft-lenders-dns-cns.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-lenders-dns-cns/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        TBD Working Group mailing list (<eref target="mailto:TBD@example.com"/>),
        which is archived at <eref target="nicfs.nic.ddn.mil:~/namedroppers/*.Z"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/anr-bmbf-pivot/draft-lenders-dns-cns"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Many IoT scenarios rely on constrained nodes <xref target="RFC7228"/> and need the Domain
Name System (DNS).  Constrained nodes <xref target="RFC7228"/>, however, challenge DNS
resolution for two reasons. First, IoT networks, such as IEEE 802.15.4 and
LoRaWAN, often limit the payload of the data link layer significantly in
terms of size, which prevents common (larger) DNS responses.  Second,
constrained nodes are often battery powered and follow a strict duty cycle,
which would benefit from minimal number of DNS messages to reduce
unnecessary device wake-ups.  Adoption layers such as 6LoWPAN <xref target="RFC4944"/>
and SCHC <xref target="RFC8724"/> provide fragmentation and compression to overcome the
problem, but do not help in principle. Fragmentation requires more buffer
space to account for lost fragments in lossy networks, and compression
introduces additional processing overhead.</t>
      <t>This document provides best common practices on DNS behavior, to reduce
fragmentation and power consumption in constrained networks when IoT nodes
resolve names.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>A "DNS server" is a server that provides DNS information to a querying DNS
client.  For the purpose of this document, server and client may
communicate based on any DNS transport, not just DNS over UDP <xref target="RFC1035"/>, but
also DNS over TLS <xref target="RFC7858"/>, DNS over HTTPS <xref target="RFC8484"/>, or DNS over CoAP
<xref target="I-D.ietf-core-dns-over-coap"/>.</t>
      <t>The terms "constrained node" and "constrained network" are used as defined in <xref target="RFC7228"/>.</t>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="sec_node-considerations">
      <name>Constrained Resolver Considerations</name>
      <t>Nodes within a constrained network that implement DNS are assumed to be
stub resolvers <xref target="RFC8499"/>.  This means they only query information from a
recursive DNS resolver and they <bcp14>MUST NOT</bcp14> distribute any DNS information
received from an upstream DNS server.</t>
    </section>
    <section anchor="dns-server-consideration">
      <name>DNS Server Consideration</name>
      <t>A DNS server that is aware that the querying node is a node within a
constrained network <bcp14>SHOULD</bcp14> resolve a CNAME or PTR record until the resource
record type originally requested by the node is reached.
This reduces the number of message exchanges within a constrained network.</t>
      <t>The DNS server <bcp14>SHOULD</bcp14> send compact answers, i.e., omit additional or
authority sections in a DNS reply. Additional and authority sections should
only be included if they help a DNS client to reduce queries.
One such example is DNS-SD <xref target="RFC6763"/>, where the answer does not only need
to include an SRV record but also TXT and A/AAAA records to make decent use
of the reply.</t>
      <t>TBD: Provide more specific example use case? Should the list be almost
complete?</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>In the case when DNS clients act as DNS servers, resolving CNAME and PTR
records at the upstream DNS server may lead to incorrect DNS information
forwarded by the client.  As such, this document prohibits the distribution
of such information in <xref target="sec_node-considerations"/></t>
      <t>TODO more security</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC1035">
          <front>
            <title>Domain names - implementation and specification</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris">
              <organization/>
            </author>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System.  It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1035"/>
          <seriesInfo name="DOI" value="10.17487/RFC1035"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC4944">
          <front>
            <title>Transmission of IPv6 Packets over IEEE 802.15.4 Networks</title>
            <author fullname="G. Montenegro" initials="G." surname="Montenegro">
              <organization/>
            </author>
            <author fullname="N. Kushalnagar" initials="N." surname="Kushalnagar">
              <organization/>
            </author>
            <author fullname="J. Hui" initials="J." surname="Hui">
              <organization/>
            </author>
            <author fullname="D. Culler" initials="D." surname="Culler">
              <organization/>
            </author>
            <date month="September" year="2007"/>
            <abstract>
              <t>This document describes the frame format for transmission of IPv6 packets and the method of forming IPv6 link-local addresses and statelessly autoconfigured addresses on IEEE 802.15.4 networks. Additional specifications include a simple header compression scheme using shared context and provisions for packet delivery in IEEE 802.15.4 meshes.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4944"/>
          <seriesInfo name="DOI" value="10.17487/RFC4944"/>
        </reference>
        <reference anchor="RFC7228">
          <front>
            <title>Terminology for Constrained-Node Networks</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <author fullname="M. Ersue" initials="M." surname="Ersue">
              <organization/>
            </author>
            <author fullname="A. Keranen" initials="A." surname="Keranen">
              <organization/>
            </author>
            <date month="May" year="2014"/>
            <abstract>
              <t>The Internet Protocol Suite is increasingly used on small devices with severe constraints on power, memory, and processing resources, creating constrained-node networks.  This document provides a number of basic terms that have been useful in the standardization work for constrained-node networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7228"/>
          <seriesInfo name="DOI" value="10.17487/RFC7228"/>
        </reference>
        <reference anchor="RFC7858">
          <front>
            <title>Specification for DNS over Transport Layer Security (TLS)</title>
            <author fullname="Z. Hu" initials="Z." surname="Hu">
              <organization/>
            </author>
            <author fullname="L. Zhu" initials="L." surname="Zhu">
              <organization/>
            </author>
            <author fullname="J. Heidemann" initials="J." surname="Heidemann">
              <organization/>
            </author>
            <author fullname="A. Mankin" initials="A." surname="Mankin">
              <organization/>
            </author>
            <author fullname="D. Wessels" initials="D." surname="Wessels">
              <organization/>
            </author>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <date month="May" year="2016"/>
            <abstract>
              <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS.  Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626.  In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
              <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group.  It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7858"/>
          <seriesInfo name="DOI" value="10.17487/RFC7858"/>
        </reference>
        <reference anchor="RFC8484">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <author fullname="P. McManus" initials="P." surname="McManus">
              <organization/>
            </author>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS.  Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="RFC8724">
          <front>
            <title>SCHC: Generic Framework for Static Context Header Compression and Fragmentation</title>
            <author fullname="A. Minaburo" initials="A." surname="Minaburo">
              <organization/>
            </author>
            <author fullname="L. Toutain" initials="L." surname="Toutain">
              <organization/>
            </author>
            <author fullname="C. Gomez" initials="C." surname="Gomez">
              <organization/>
            </author>
            <author fullname="D. Barthel" initials="D." surname="Barthel">
              <organization/>
            </author>
            <author fullname="JC. Zuniga" initials="JC." surname="Zuniga">
              <organization/>
            </author>
            <date month="April" year="2020"/>
            <abstract>
              <t>This document defines the Static Context Header Compression and fragmentation (SCHC) framework, which provides both a header compression mechanism and an optional fragmentation mechanism. SCHC has been designed with Low-Power Wide Area Networks (LPWANs) in mind.</t>
              <t>SCHC compression is based on a common static context stored both in the LPWAN device and in the network infrastructure side. This document defines a generic header compression mechanism and its application to compress IPv6/UDP headers.</t>
              <t>This document also specifies an optional fragmentation and reassembly mechanism. It can be used to support the IPv6 MTU requirement over the LPWAN technologies. Fragmentation is needed for IPv6 datagrams that, after SCHC compression or when such compression was not possible, still exceed the Layer 2 maximum payload size.</t>
              <t>The SCHC header compression and fragmentation mechanisms are independent of the specific LPWAN technology over which they are used. This document defines generic functionalities and offers flexibility with regard to parameter settings and mechanism choices. This document standardizes the exchange over the LPWAN between two SCHC entities. Settings and choices specific to a technology or a product are expected to be grouped into profiles, which are specified in other documents. Data models for the context and profiles are out of scope.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8724"/>
          <seriesInfo name="DOI" value="10.17487/RFC8724"/>
        </reference>
        <reference anchor="RFC8499">
          <front>
            <title>DNS Terminology</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <author fullname="A. Sullivan" initials="A." surname="Sullivan">
              <organization/>
            </author>
            <author fullname="K. Fujiwara" initials="K." surname="Fujiwara">
              <organization/>
            </author>
            <date month="January" year="2019"/>
            <abstract>
              <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs.  The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has sometimes changed in the decades since the DNS was first defined.  This document gives current definitions for many of the terms used in the DNS in a single document.</t>
              <t>This document obsoletes RFC 7719 and updates RFC 2308.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="219"/>
          <seriesInfo name="RFC" value="8499"/>
          <seriesInfo name="DOI" value="10.17487/RFC8499"/>
        </reference>
        <reference anchor="RFC6763">
          <front>
            <title>DNS-Based Service Discovery</title>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire">
              <organization/>
            </author>
            <author fullname="M. Krochmal" initials="M." surname="Krochmal">
              <organization/>
            </author>
            <date month="February" year="2013"/>
            <abstract>
              <t>This document specifies how DNS resource records are named and structured to facilitate service discovery.  Given a type of service that a client is looking for, and a domain in which the client is looking for that service, this mechanism allows clients to discover a list of named instances of that desired service, using standard DNS queries. This mechanism is referred to as DNS-based Service Discovery, or DNS-SD.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6763"/>
          <seriesInfo name="DOI" value="10.17487/RFC6763"/>
        </reference>
        <reference anchor="I-D.ietf-core-dns-over-coap">
          <front>
            <title>DNS over CoAP (DoC)</title>
            <author fullname="Martine Sophie Lenders" initials="M. S." surname="Lenders">
              <organization>Freie Universität Berlin</organization>
            </author>
            <author fullname="Christian Amsüss" initials="C." surname="Amsüss">
         </author>
            <author fullname="Cenk Gündoğan" initials="C." surname="Gündoğan">
              <organization>HAW Hamburg</organization>
            </author>
            <author fullname="Thomas C. Schmidt" initials="T. C." surname="Schmidt">
              <organization>HAW Hamburg</organization>
            </author>
            <author fullname="Matthias Wählisch" initials="M." surname="Wählisch">
              <organization>Freie Universität Berlin</organization>
            </author>
            <date day="5" month="September" year="2022"/>
            <abstract>
              <t>   This document defines a protocol for sending DNS messages over the
   Constrained Application Protocol (CoAP).  These CoAP messages are
   protected by DTLS-Secured CoAP (CoAPS) or Object Security for
   Constrained RESTful Environments (OSCORE) to provide encrypted DNS
   message exchange for constrained devices in the Internet of Things
   (IoT).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-dns-over-coap-00"/>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
      <ul spacing="normal">
        <li>Carsten Bormann</li>
        <li>Ben Schwartz</li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
