<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" submissionType="IETF" docName="draft-liu-dnsop-protective-dns-01" category="std" ipr="trust200902" obsoletes="" updates="" xml:lang="en" symRefs="true" sortRefs="true" tocInclude="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.0 -->
  <!-- Generated by id2xml 1.5.2 on 2025-07-22T07:36:25Z -->
	<front>
    <title abbrev="Considerations for Protective DNS Server">Considerations for Protective DNS Server Operators</title>
    <seriesInfo name="Internet-Draft" value="draft-liu-dnsop-protective-dns-01"/>
    <author initials="H." surname="Duan" fullname="Haixin Duan">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <street>Beijing</street>
          <street>China</street>
        </postal>
      </address>
    </author>
    <author initials="M." surname="Liu" fullname="Mingxuan Liu">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <street>Beijing</street>
          <street>China</street>
        </postal>
      </address>
    </author>
    <author initials="B." surname="Liu" fullname="Baojun Liu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <street>Beijing</street>
          <street>China</street>
        </postal>
      </address>
    </author>
    <author initials="C." surname="Lu" fullname="Chaoyi Lu">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <street>Beijing</street>
          <street>China</street>
        </postal>
      </address>
    </author>
    <date year="2025" month="July" day="22"/>
    <abstract>
      <t>
   Protective DNS is a defense mechanism deployed on recursive resolvers
   to prevent users from accessing malicious domains.  For domain names
   in the blocklist, it rewrites DNS resolution responses to point to
   secure destinations (e.g., safe servers) to prevent users from
   accessing malicious entities.</t>
      <t>
   Owing to its effective defenses against common cyber attack
   behaviors—such as command-and-control (C2) communications of
   malware—Protective DNS deployment has surged via various initiatives.
   Not only have renowned DNS service providers adopted this defense,
   but some countries have also launched national-scale deployments.
   Meanwhile, studies analyzing Protective DNS have identified
   implementation diversity.</t>
      <t>
   Thus, this document aims to provide specific operational and security
   considerations for Protective DNS.  It is intended primarily for
   entities seeking to deploy Protective DNS for defensive purposes,
   offering deployment and security considerations.</t>
    </abstract>
    <note>
      <name>About This Document</name>
      <t>
   This note is to be removed before publishing as an RFC.</t>
      <t>
   The latest revision of this draft can be found at
   <eref target="https://MingxuanLiu.github.io/Protective-DNS-Draft/draft-ietf-dnsop-"/> protective-dns.html.  Status information for this document may be
   found at <eref target="https://datatracker.ietf.org/doc/draft-liu-dnsop-protective-"/> dns/.</t>
      <t>
   Source for this draft and an issue tracker can be found at
   <eref target="https://github.com/MingxuanLiu/Protective-DNS-Draft."/>
      </t>
    </note>
  </front>
  <middle>
    <section anchor="sect-1" numbered="true" toc="default">
      <name>Introduction</name>
      <t>
   Protective DNS (also termed as PDNS) is a lightweight defensive
   measure deployed at recursive resolvers to proactively rewrite DNS
   resolution responses for malicious domains, thereby preventing users
   from accessing malicious resources.  Specifically, when a client
   initiates a domain name resolution request, PDNS first performs a
   security check on the target domain—determining whether the domain
   poses a security risk by matching it against blocklists.  If the
   domain is identified as malicious, PDNS uses DNS rewriting technology
   to intercept the resolution request and return a secure response
   (e.g., a safe server address controlled by the PDNS service
   provider), blocking users from establishing connections with
   malicious resources.  For domains outside blocklists, PDNS will
   perform normal recursive queries and return authentic DNS responses.</t>
      <t>
   The defensive benefits offered by PDNS have spurred extensive
   deployment efforts.  Large DNS resolution service providers have
   increasingly deployed PDNS on their recursive servers.  Moreover,
   some countries or regions have initiated national-level
   infrastructure deployments of PDNS.  The UK's National Cyber Security
   Centre (NCSC), for instance, launched a PDNS service in 2017 to
   enhance cyber defenses, which has since been used by central
   government departments, local authorities, schools, and emergency
   services <xref target="UK-NCSC-PDNS" format="default"/>.  Notably, statistics from the UK NCSC
   indicate that approximately 7.2 million individual users utilized the
   system in 2023 <xref target="UK-NCSC-PDNS-Usage" format="default"/>.  In 2022, PDNS in UK processed
   810 billion DNS queries and blocked 11 billion queries involving
   420,000 domains, accounting for approximately 2% of all queries
   <xref target="UK-Defence" format="default"/>.</t>
      <t>
   As the deployment of PDNS continues to grow, efforts have been made
   to systematically analyze PDNS services, including deployment status,
   operational mechanism and security implications.  A recent work has
   revealed that 9% of open recursive resolvers exhibit PDNS behaviors
   <xref target="NDSS24" format="default"/>, and finds significant discrepancies among providers in
   terms of rewriting policies, blocklist selection and performance.
   Particularly, security risks such as implementation flaws, over-
   blocking, and dangling resources have been identified.</t>
      <t>
   This document is primarily intended for readers familiar with
   Protective DNS technology and somewhat aware of the potential impacts
   that deploying such technologies may entail.  Moreover, existing
   documents <xref target="USENIX24" format="default"/>, <xref target="SAC127" format="default"/> are recommended for legal
   considerations.  On this basis, this document focuses on discussing
   technical considerations at the deployment level.</t>
    </section>
    <section anchor="sect-2" numbered="true" toc="default">
      <name>Conventions and Definitions</name>
      <t>
   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
   "OPTIONAL" in this document are to be interpreted as described in
   BCP 14 <xref target="RFC2119" format="default"/> <xref target="RFC8174" format="default"/> when, and only when, they appear in all
   capitals, as shown here.</t>
    </section>
    <section anchor="sect-3" numbered="true" toc="default">
      <name>Background</name>
      <section anchor="sect-3.1" numbered="true" toc="default">
        <name>Overview of Protective DNS</name>
        <figure anchor="ure-the-workflow-of-protective-dns.">
          <name>The workflow of Protective DNS.</name>
          <artwork name="" type="" align="left" alt=""><![CDATA[
+------------------------+
|        Blocklist       |Not-in-Blocklist
|           | ^          |  Domain Query +---------------+
|       In- | |          |-------------->|               |
| Blocklist | |          |               | Authoritative |
|           v |          |<--------------|    Server     |
|        Resolver        |               |               |
+------------------------+               +---------------+
  Rewritten | ^ Domain
  Response  v | Query
+------------------------+
|         Client         |
+------------------------+
]]></artwork>
        </figure>
        <t>
   Figure 1 shows the workflow of Protective DNS (PDNS).  Protective DNS
   is deployed on a recursive resolver.  When the PDNS resolver receives
   a DNS query for a domain name, it first matches the domain against
   its maintained blocklist.  The resolver then makes a decision based
   on the blocklist lookup result.  If the domain is found in the
   blocklist, PDNS rewrites the DNS response to resolve the query to a
   "secure" result (e.g., special-purpose addresses), effectively
   preventing the client from accessing the corresponding malicious
   resource.  Conversely, if the domain is not in the blocklist, the
   resolver returns a normal response by querying authoritative servers
   or using local cache results to respond to the client <xref target="RFC1034" format="default"/>,
   <xref target="RFC1035" format="default"/>.  Thus, the two functional components that underpin the
   critical role of PDNS are the Blocklist and the Rewriting Policy.</t>
        <t>
   *Blocklist.* PDNS determines whether to rewrite the resolution result
   of a domain name based on its presence in the blocklist.  Blocklist
   sources include multiple aspects: commercial threat intelligence
   (TI), open-source TI, vendor-maintained domain blocklists, and user
   complaints.  The types of malicious domains included in blocklists
   vary by vendor definition, encompassing but not limited to: malware,
   botnet command-and-control (C2), phishing, fraud, and adult content.
   Additionally, PDNS deployments implement blocklist lookup in two
   primary forms:</t>
        <ol spacing="normal" type="1"><li>
            <t>Local Lookup: storing directly on the PDNS server, allowing
       direct queries against the local blocklist file.</t>
          </li>
          <li>
            <t>Remote Lookup: performing lookups via network interfaces (e.g.,
       DNSBL <xref target="RFC5782" format="default"/>).</t>
          </li>
        </ol>
        <t>
   *Rewriting Policy.* Upon retrieving blocklist matching results, the
   PDNS server rewrites resolution responses for domains in the
   blocklist. rewriting strategies exist in multiple forms.  Based on
   empirical analysis of leading Protective DNS vendors, this document
   summarizes five specific rewriting policies.</t>
        <t>
   1) Using the secure IP addresses in A record controlled by the
   provider:</t>
        <ul empty="true" spacing="normal">
          <li>
            <dl newline="false" spacing="normal" indent="28">
              <dt>malicious_domain.com</dt>
              <dd>
                <t>
	A    10    controled_IP;
                </t>
                <t/>
              </dd>
            </dl>
          </li>
        </ul>
        <t>
   2) Using IP addresses with special purposes, such as the reserved
   address like 0.0.0.0, link local address like 192.168.0.1, loopback
   addresses like 127.0.0.1, and so on:</t>
        <ul empty="true" spacing="normal">
          <li>
            <dl newline="false" spacing="normal" indent="28">
              <dt>malicious_domain.com</dt>
              <dd>
                <t>
	A    10    127.0.0.1;
                </t>
                <t/>
              </dd>
            </dl>
          </li>
        </ul>
        <t>
   3) Utilizing the CNAME record to rewrite the request to the domain
   name controlled by the provider:</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
    malicious_domain.com    CNAME    10    controled_domain.com;
]]></artwork>
        <t>
   4) Using an empty Answer field in the response to prevent users from
   accessing malicious resources:</t>
        <figure anchor="ure-format-of-empty-answer-fileld-in-protective-dns.">
          <name>Format of empty Answer fileld in Protective DNS.</name>
          <artwork name="" type="" align="left" alt=""><![CDATA[
  0  1  2  3  4  5  6  7  8  9  0  1  2  3  4  5
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|                 ID (two octets)               |
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|QR|   Opcode  |AA|TC|RD|RA|   Z    |   RCODE   |
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|                QDCOUNT (one octet)            |
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|                ANCOUNT (one octet)            |
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|                NSCOUNT (one octet)            |
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|                ARCOUNT (one octet)            |
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
;--------------- Question Section --------------;
|              malicious_domain.com             |
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|              QTYPE (two octets)               |
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|              QCLASS (two octets)              |
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
;-------------- Answer Section -----------------;
|  (empty, no resource records here)            |
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
]]></artwork>
        </figure>
        <t>
   5) Using special response codes for the reply, such as NXDomain,
   ServerFail, etc:</t>
        <figure anchor="ure-format-of-nxdomain-response-in-protective-dns.">
          <name>Format of NXDomain Response in Protective DNS.</name>
          <artwork name="" type="" align="left" alt=""><![CDATA[
  0  1  2  3  4  5  6  7  8  9  0  1  2  3  4  5
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|               ID (two octets)                 |
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|QR|   Opcode  |AA|TC|RD|RA|   Z    |   RCODE   |
|  |           |  |  |  |  |        | 0  0  1  0|
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|                QDCOUNT (one octet)            |
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|                ANCOUNT (one octet)            |
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|                NSCOUNT (one octet)            |
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|                ARCOUNT (one octet)            |
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
;--------------- Question Section --------------;
|               malicious_domain.com            |
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|              QTYPE (two octets)               |
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|              QCLASS (two octets)              |
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
;------------- Answer Section ------------------;
|empty (as NXDomain means no such domain exists)|
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
]]></artwork>
        </figure>
        <t>
   Additionally, primary implementations of the rewriting module
   include, but are not limited to:</t>
        <ol spacing="normal" type="1"><li>
            <t>DNS Response Policy Zones (RPZ) <xref target="I-D.ietf-dnsop-dns-rpz" format="default"/>: Implemented as zone files
       <xref target="RFC1034" format="default"/>, <xref target="RFC1035" format="default"/>, specifying both whether rewriting is
       required and providing domain-specific rewrite results.</t>
          </li>
          <li>
            <t>Domain Lists: This format consists of one domain per line,
       specifying only the rewrite requirement for each domain.</t>
          </li>
        </ol>
      </section>
      <section anchor="sect-3.2" numbered="true" toc="default">
        <name>Relationship between Other Technologies</name>
        <t>
   *Relation ship bewteen PDNS and DNS Blockling.* Protective DNS
   constitutes a subset of DNS Blocking (generally considered as
   synonymous with DNS Filtering <xref target="SAC127" format="default"/>), sharing the goal of security
   defense by leveraging known blocklists (e.g., domain blacklists) to
   prevent user exposure to malicious resources.  DNS Blocking is a
   broader security concept encompassing any rewriting operations of DNS
   resolution traffic to restrict access to specific domains.  Its
   applicability spans diverse scenarios and architectural layers,
   specifically including defense at any DNS resolution role (stub in
   client, recursive resolver, authoritative server) and other security
   use scenarios (e.g., spam filtering, gateway firewall protection).
   In contrast, PDNS represents a specific implementation of DNS
   Blocking, typically deployed on recursive resolvers.</t>
        <t>
   Several prior documents define specific techniques within DNS
   Blocking:</t>
        <ol spacing="normal" type="1"><li>
            <t>DNS Blacklist (DNSBL)<xref target="RFC5782" format="default"/>: DNSBL represents a DNS-based
       blacklist lookup technology, serving as a concrete implementation
       of blocklist lookup within the broader DNS Blocking paradigm
       (including PDNS).  First, it maintains blacklists of IP addresses
       or domain names associated with malicious activities.  Then, it
       utilizes DNS queries to determine whether to block related
       traffic.</t>
          </li>
          <li>
            <t>DNS Response Policy Zones (RPZ) <xref target="I-D.ietf-dnsop-dns-rpz" format="default"/>: Beyond remote blocklist
       querying (e.g., DNSBL), local deployment offers another blocklist
       deployment strategy.  RPZ achieves localized blocklist query via
       a zone file containing rewrite instructions for each malicious
       domain, often utilized in scenarios such as DNS Firewall.  RPZ
       supports multiple triggering mechanisms.  Among these, QNAME
       triggering is the primary mode adopted by PDNS.</t>
          </li>
        </ol>
        <t>
   *Relationship between PDNS and Censorship.* While censorship shares
   the objective with DNS blocking, i.e., preventing end users from
   accessing specific resources, its blocking strategies are far more
   diverse.  Domain blacklist-based blocking represents just one type of
   DNS-layer mitigation, alongside techniques such as DNS poisoning.
   Cross-layer mechanisms at network layers include TCP reset (e.g.,
   sending forged RST packets), IP blocking, HTTPS man-in-the-middle
   attacks, and Deep Packet Inspection (DPI) for payload analysis.</t>
        <t>
   *Relationship between PDNS and Other Domain Protection.* Defense
   mechanisms at the domain level are diverse, with protective actions
   occurring across various roles in the domain ecosystem.  During the
   initial domain registration process, registries and registrars can
   use domain seizure to remove malicious domains from registration
   data, thereby preventing their continued harm to users.  Registries
   and registrars can also employ sinkhole technology to redirect some
   malicious domains to domain black holes.  The Protective DNS defense
   mechanism addressed in this document is primarily deployed on
   recursive resolvers.</t>
      </section>
    </section>
    <section anchor="sect-4" numbered="true" toc="default">
      <name>Deployment Status</name>
      <t>
   Due to the significant protective efficacy of Protective DNS,
   existing academic efforts have evaluated its deployment status
   through measurement.  The results indicate a growing adoption trend
   of PDNS across large-scale DNS service providers, operational
   recursive resolvers in the wild, and national-level deployments.</t>
      <t>
   *National Deployment.* First, several countries and regions have even
   deployed national Protective DNS projects, including:</t>
      <ol spacing="normal" type="1"><li>
          <t>DNS4EU <xref target="DNS4EU" format="default"/>：Launched in January 2023 under the auspices of
       the European Union Agency for Cybersecurity (ENISA), this
       initiative serves as an alternative to prevailing public DNS
       resolution services.  It is designed to deliver protective,
       privacy-compliant, and resilient DNS capabilities, thereby
       enhancing the EU's digital sovereignty and security.  Any device
       connected to DNS4EU resolvers that attempts to access a malicious
       domain (e.g., hosting malware or related to phishing content) is
       immediately blocked, preventing potential harm.  Leveraging real-
       time threat monitoring and defense mechanisms, the project
       ensures that malicious domains identified in one EU jurisdiction
       are countered across multiple member states to contain their
       spread.  DNS4EU provides DNS security assurances to critical
       sectors including EU citizens, public institutions, government
       entities, and operators, while also supporting voluntary adoption
       or opt-out by EU residents.  Recently, DNS4EU has also opened
       public query interfaces accessible to the citizens of the
       European Union <xref target="DNS4EU-Public" format="default"/>.</t>
        </li>
        <li>
          <t>PDNS in UK <xref target="UK-Defence" format="default"/>：Supported by the UK's National Cyber
       Security Centre (NCSC), this initiative advises private
       enterprises and government agencies to adopt Protective DNS to
       safeguard their IT assets and network security.  By blocking
       access to known malicious domains, it significantly reduces the
       effectiveness of ransomware, phishing, botnet, and malware
       attacks.  According to NCSC statistics, in 2022, the project's
       PDNS service processed 810 billion DNS queries and blocked 11
       billion queries involving 420 thousand distinct domains
       <xref target="UK-Defence" format="default"/>.</t>
        </li>
        <li>
          <t>PDNS in US <xref target="US-Protect" format="default"/>：This initiative, launched by the
       Cybersecurity and Infrastructure Security Agency (CISA) in 2022,
       is designed to provide security safeguards for the United States'
       national critical infrastructure.  The project protects the
       federal government by blocking network traffic at the DNS
       resolution layer from reaching potentially malicious
       destinations, enhancing resilience against intrusions and
       attacks.  When Protective DNS detects a DNS request matching
       threat intelligence indicators, the service blocks, redirects, or
       sinkhole the query response to a secure endpoint, while sending
       alerts to the source agency and CISA.  The initiative mandates
       the use of this Protective DNS service by all Federal Civil
       Executive Branch (FCEB) agencies and offers limited availability
       to infrastructure participants in pilot programs.</t>
        </li>
      </ol>
      <t>
   *Public DNS Provider.* Existing work, by combining surveys of
   publicly available documentation from widely adopted DNS service
   providers with active testing, confirms that two-thirds of public DNS
   providers already offer Protective DNS services.  Notably, practices
   vary significantly across vendors, including differences in the types
   of malicious domains defended against and rewrite policies.  In terms
   of deployment strategies, the majority of vendors employ hybrid
   deployments, providing both Protective DNS and regular DNS resolution
   on a single resolver IP address, such as Comodo DNS and OpenDNS.  A
   smaller subset deploys Protective DNS and regular DNS resolution on
   separate resolver IPs, and in some cases, even different resolver
   servers from the same vendor may defend against distinct types of
   malicious domains.  For example, Cloudflare operates standard DNS
   services on 1.1.1.1, while PDNS servers on 1.1.1.2 and 1.1.1.3
   implement differentiated protection: 1) 1.1.1.2 focuses on malware
   defense; 2) 1.1.1.3 defends against both malware and adult content.</t>
      <t>
   *Open Resolver.* Furthermore, existing studies using active scanning
   of the IPv4 address space in 2023 confirm that approximately 9% of
   recursive resolvers have deployed Protective DNS capabilities,
   covering almost two-thirds of the world's countries.  By analyzing
   the types of malicious domains defended against, research has found
   that malware, botnet, phishing, and spam are the most common
   categories, with observable blocklist overlap across different
   recursive resolution services.  In terms of rewrite policies, using
   safe IP addresses and specialized IP addresses represents the most
   prevalent rewriting approach.</t>
    </section>
    <section anchor="sect-5" numbered="true" toc="default">
      <name>Operational Considerations</name>
      <t>
   Considering that deployment is the first step in using and even
   maintaining the security of Protective DNS, in this section, we
   propose a series of operational considerations that cover multiple
   aspects of deployment practice, including blocklist selection,
   rewriting strategy construction, performance impact assessment, and
   explanatory offering</t>
      <section anchor="sect-5.1" numbered="true" toc="default">
        <name>Operational Consideration 1: Blocklist Selection</name>
        <t>
   One of the necessary conditions for Protective DNS to achieve its
   defensive capability is to maintain a blocklist that includes a
   series of malicious domain names to be blocked.</t>
        <t>
   First, when collecting blocklists, PDNS providers should explicitly
   define the types of domains to be blocked based on the intended use
   case.  Common categories of malicious domains include but are not
   limited to, malware, botnet, phishing, spam, tracking, and adult
   content.  Providers should then identify appropriate blocklist
   sources aligned with these requirements, such as self-collected data
   derived from traffic analysis and user feedback; open-source threat
   intelligence feeds; and commercial threat intelligence services.
   Meanwhile, relying solely on limited blacklist sources may restrict
   the coverage of defensive capabilities.  Most importantly, regardless
   of the source, operators should verify the correctness of these
   malicious domains to avoid false positives that could impact access
   to not-in-blocklist domains.</t>
        <t>
   Second, PDNS operators should select an appropriate blocklist
   deployment approach based on operational context, including device
   resource constraints and network access patterns.  Remote querying
   approaches (e.g., using DNSBL) necessitate proactive consideration of
   potential privacy implications and the impacts of network
   instability.  Local deployments (e.g., RPZ-formated local zone file)
   necessitate a thorough assessment of local resource limitations.
   Specifically, the Blocklist scale deployed on Protective DNS should
   be carefully defined based on the system's processing capability.
   Blocklist size directly affects both the response efficiency of
   Protective DNS and hardware resource consumption (e.g., CPU, memory)
   on the hosting device.</t>
      </section>
      <section anchor="sect-5.2" numbered="true" toc="default">
        <name>Operational Consideration 2 - Rewriting Policy Construction</name>
        <t>
   Based on empirical analyses of popular Protective DNS providers, five
   primary rewriting approaches have been identified in practice, see
   the Section of Overview of Protective DNS.  Each rewriting strategy
   caters to specific security scenarios, requiring providers to select
   appropriate approaches based on their application requirements,
   specifically as follows:</t>
        <t>
   1) Secure IP addresses: Under this policy, the rewritten target
   address is a server controlled by the PDNS provider, enabling PDNS
   providers to monitor traffic.  Specifically, the controlled server
   acts as a "honeypot" managed by the provider, capturing DNS traffic
   of malicious domain names for further analysis of threat behaviors
   (e.g., malware communications).  However, this approach incurs
   operational overhead for PDNS providers, who need to actively monitor
   the status of these servers.  Additionally, this scenario
   necessitates consideration of privacy risks arising from traffic
   monitoring, such as the security concerns of user traffic collected
   for surveillance purposes.</t>
        <t>
   2) Specialized IP addresses: Due to the non-routable nature of these
   IP addresses on public networks, they are better suited for scenarios
   with strict privacy protection requirements, such as when users do
   not want any third parties to track their network behavior.  However,
   PDNS operators should consider potential risks when using these
   specialized IP addresses.  For example: a) 192.168.0.1 is typically
   used for local area network devices.  Such configurations may lead to
   unintended access to internal network devices if clients mistakenly
   connect to them; b) 127.0.0.1 is commonly used for local inter-
   process communication.  Redirecting to this address may cause clients
   to attempt to connect to local services, which could be exploited if
   vulnerabilities exist—such as through port scanning or service
   spoofing.  This is particularly risky when users mistake local
   services for external ones, potentially exposing sensitive
   information or enabling attacks.  Additionally, this approach lacks
   transparency for PDNS users, as they cannot obtain explicit
   explanations on resolution results (i.e., resolved IPs) similar to
   secure IP indicators.  However, rewriting information can be provided
   in DNS resolutions—for example, through explanations in extended
   fields (i.e., EDE <xref target="RFC8914" format="default"/>), with detailed content elaborated in
   Section of Operational Considerations 4.</t>
        <t>
   3) Secure CNAME: This strategy, similar to using controlled IP
   addresses, enables providers to dynamically monitor traffic.
   However, providers should remain vigilant against dangling resource
   record risks arising from improper management, details of which are
   discussed in Security Considerations.</t>
        <t>
   4) Empty Answer Section: This strategy represents a minimalist
   rewriting approach, simply returning an empty answer section.
   However, it undermines the transparency of PDNS services for users
   and may escalate to more aggressive implementations—such as refusing
   to return resolution responses— which entail denial-of-response risks
   detailed in the Security Considerations.</t>
        <t>
   5) Special Response Codes (Rcodes): This strategy is compatible with
   regular DNS error scenarios, which help prevent malware from
   detecting the defensive mechanisms of PDNS.  However, such practices
   may also undermine the transparency of Protective DNS services,
   making it difficult for users to understand the principles behind
   rewriting operations and to distinguish between defensive rewrites
   from PDNS and genuine failures.</t>
        <t>
   Second, PDNS operators should consider the impact of TTL
   configurations and appropriately configure the TTL values for
   rewritten records.  On one hand, an overly long TTL may lead to
   delayed updates of defense strategies for malicious domains.  On the
   other hand, a too-short TTL triggers frequent DNS queries, increasing
   PDNS server load and potentially degrading performance.</t>
      </section>
      <section anchor="sect-5.3" numbered="true" toc="default">
        <name>Operational Consideration 3 - Performance Impact</name>
        <t>
   As Protective DNS services introduce an additional query step on
   whether a domain is malicious during standard DNS resolution,
   operators should anticipate potential impacts on DNS resolution
   performance.  Specifically, factors such as blocklist deployment
   method (remote vs. local), scale, and domain matching techniques
   (e.g., hash matching) can affect performance.  Experimental results
   show that loading a blocklist into memory with five million malicious
   domains can still be maintained within 10-second response times, but
   exceeding this scale may result in loading times exceeding 10
   seconds.  Additionally, experimental studies on Public DNS Providers
   have found that 70% of blocked domains receive PDNS responses within
   0.2 seconds.  Meanwhile, for providers offering both PDNS and non-
   PDNS services, the response time difference typically does not exceed
   2 ms.  Therefore, when implementing PDNS, operational references from
   public PDNS provider experiments should be addressed—specifically,
   the impact of blocklist loading and domain matching on query latency.</t>
      </section>
      <section anchor="sect-5.4" numbered="true" toc="default">
        <name>Operational Consideration 4 - Offering Explanation</name>
        <t>
   Protective DNS operates as a complete black-box service for users.
   Regardless of the rewriting strategy employed, users only perceive
   the blocking effect—i.e., the inability to access a domain.  While
   providers can refine blocklist quality to minimize false positives,
   the inevitable presence of false positives significantly degrades
   user experience.  Users may encounter unexplained domain
   inaccessibility that is indistinguishable from prevalent DNS
   tampering (e.g., censorship, man-in-the-middle attacks).  Therefore,
   providing explanations for Protective DNS services can enhance user
   experience and alleviate privacy concerns.  Operators should
   anticipate that omitted explanations may lead users to misperceive
   service instability or even switch to competing DNS providers.</t>
        <t>
   This explanation of PDNS can be realized through multiple approaches.
   First, to indicate that blocking originates from Protective DNS,
   service providers may offer a dedicated landing page to explain their
   protective services, helping users confirm that the observed DNS
   rewriting originates from the provider’s Protective DNS.  Empirical
   analyses show some PDNS providers redirect DNS queries to a secure IP
   address hosting a page that notifies users of potential malicious
   website access.  However, using a provider-controlled IP introduces
   risks of dangling resource takeover, detailed in Security
   Consideration.  Second, the EDE (Extended DNS Error) <xref target="RFC8914" format="default"/>,
   <xref target="I-D.ietf-dnsop-structured-dns-error" format="default"/> protocol can be employed to specify in the
   extension fields that rewriting results from Protective DNS defense
   against malicious domains.  Existing work has shown that some PDNS
   implementations already utilize the EDE field for indication—for
   example, using "PROHIBITED", as illustrated in Figure 4.</t>
        <figure anchor="ure-example-of-ede-usage-in-protective-dns.">
          <name>Example of EDE usage in Protective DNS.</name>
          <artwork name="" type="" align="left" alt=""><![CDATA[
+-------------------------------+
|          DNS Header           |
|  (ID, Flags, QDCOUNT, etc.)   |
+-------------------------------+
|           DNS Question        |
|  (Domain, QTYPE, QCLASS)      |
+-------------------------------+
|           DNS Answer          |
|  (Resource Records)           |
+-------------------------------+
|         DNS Authority         |
|  (NS Records)                 |
+-------------------------------+
|          DNS Additional       |
|  (Additional Data)            |
+-------------------------------+
|       EDNS0 Pseudo-RR         |
|  (OPT Record)                 |
+-------------------------------+
|          EDE Option           |
| +---------------------------+ |
| |  Option Code: 15 (EDE)    | |
| +---------------------------+ |
| |  Option Length: xxx       | |
| +---------------------------+ |
| |  Info Code: 18            | |
| +---------------------------+ |
| |  Extra Text: "PROHIBITED" | |
| +---------------------------+ |
+-------------------------------+
]]></artwork>
        </figure>
        <t>
   Moreover, providing user appeal channels on explanation pages, such
   as an email address, could mitigate negative impacts of potential
   false positives.</t>
      </section>
    </section>
    <section anchor="sect-6" numbered="true" toc="default">
      <name>Security Considerations</name>
      <t>
   Furthermore, by integrating the operational considerations, we
   propose security considerations to enhance the security of Protective
   DNS on the basis of improving its practicality.  We outline specific
   considerations covering multiple dimensions.  For each factor, we
   provide specific recommended mitigations, including rewriting policy
   flaws, over-blocking, dangling resource risks, interaction with data
   integrity protection and fallbacks.</t>
      <section anchor="sect-6.1" numbered="true" toc="default">
        <name>Security Consideration 1 - Rewriting Policy Flaws</name>
        <t>
   To prevent flaws in the protection function or even bypassing,
   service providers should consider the following three aspects.</t>
        <t>
   *Redundant Rdata.* According to measurements of Protective DNS
   services, the configurations of Rdata in rewritten records by some
   providers have defects.  Specifically, along with the rewritten
   records, several PDNS providers may also include the original
   malicious records in the DNS response.  For local stub resolvers of
   users, the selection of the resolution result is uncontrollable, and
   users still have a high probability of accessing malicious resources.
   Therefore, Protective DNS providers should avoid such redundant
   configurations to ensure the completeness of the defense
   effectiveness.</t>
        <t>
   $ORIGIN malicious_domain.com malicious_domain.com A controled_IP;
   malicious_domain.com A original_malicious_IP;</t>
        <t>
   *Missing Record type.* While A records are the most common type of
   DNS resolution and are often the primary focus of defensive
   configuration by service providers—since they directly point users to
   malicious resources—empirical measurements have revealed that some
   Protective DNS providers fail to protect less common query types,
   such as TXT records.  In these cases, the provider may return
   original responses, potentially exposing users to hidden threats.
   This oversight could be exploited to bypass PDNS protections,
   particularly when malicious domains embed harmful instructions within
   less scrutinized record types.  Therefore, PDNS providers should
   proactively consider the potential impacts of missing record type
   configurations.</t>
        <t>
   $ORIGIN malicious_domain.com malicious_domain.com A controled_IP;
   malicious_domain.com CNAME controled_domain;</t>
        <t>
   *Policy Coverage.* In addition to the defensive configuration of the
   response results, Protective DNS providers should ensure that the
   defensive functions are effective in all functional scenario.
   Specifically, encrypted DNS should also have the same defensive
   effect as non-encrypted DNS, to prevent malicious domain names from
   bypassing the defense by merely using encrypted DNS.  Additionally,
   IPv6 scenarios should also be considered.</t>
      </section>
      <section anchor="sect-6.2" numbered="true" toc="default">
        <name>Security Consideration 2 - Dangling Resources</name>
        <t>
   Some Protective DNS providers use self-controlled domains or IPs as
   rewriting strategies.  However, mismanagement of these rewritten
   resources may lead to takeover risks from Dangling Resources,
   specifically:</t>
        <ol spacing="normal" type="1"><li>
            <t>If the rewritten IP is a cloud service IP, obsolete cloud IP
       addresses pose a takeover risk.</t>
          </li>
          <li>
            <t>If the rewritten CNAME domain expires, there is an expired domain
       takeover risk.</t>
          </li>
          <li>
            <t>If the rewritten CNAME domain belongs to a third-party service,
       subdomain takeover risks may arise.</t>
          </li>
        </ol>
        <t>
   Upon gaining control of vulnerable rewritten resources (e.g., those
   at risk of expiration), attackers can trigger DNS queries for
   malicious domains to the compromised Protective DNS server via
   phishing tactics.  They can then return modified malicious content to
   victims, enabling connections between victims and attacker servers.</t>
        <t>
   Therefore, Protective DNS service providers should exercise due
   diligence when using third-party network resources.  On one hand,
   they should consider the financial and management costs of regular
   maintenance of these resources.  On the other hand, they need to
   periodically verify the status of these third-party services to avoid
   dangling resource risks.</t>
      </section>
      <section anchor="sect-6.3" numbered="true" toc="default">
        <name>Security Consideration 3 - Over-Blocking</name>
        <t>
   Protective DNS rewriting should minimize the impact of over-blocking,
   as this introduces significant collateral damage in two primary
   aspects.</t>
        <t>
   *Blocklist Construction.* First, Protective DNS service providers
   should avoid errors in blocklists, as blocklist errors directly cause
   collateral damage to benign domain names.  Second, over-generalizing
   target domains for blocking in Protective DNS may also lead to
   collateral damage.  Using keywords as blocklist entries exacerbates
   the likelihood of false positives, causing unintended blocking of
   benign domains and degrading PDNS availability.  Employing wildcard
   domains in blocklists similarly introduces false positives.
   Meanwhile, blocking at the second-level domain (SLD) or top-level
   domain (TLD) levels can also trigger false positives—for example,
   cloud services often host user-specific services on subdomains, so
   blocking the apex domain of such a cloud service would impact
   numerous unrelated services.  Thus, blocking at the fully qualified
   domain names (FQDNs) could minimize collateral damage.  Finally,
   providers should promptly update blocklists to avoid false positives
   from delayed updates.</t>
        <t>
   $ORIGIN malicious_domain.com malicious_domain.com A controled_IP;
   (FQDN) "phishing" in domain A controled_IP; (Keyword)
   *.malicious_domain.com A controled_IP; (Wildcard Domain) *.com A
   controled_IP; (SLD/TLD Level Domain)</t>
        <t>
   *Blocking Policy.* The primary defense objective of Protective DNS is
   to prevent users from accessing any malicious resources, i.e.,
   intercepting as many malicious domains as possible.  However,
   empirical analysis has shown that some Protective DNS implementations
   exhibit over-blocking collateral damage from aggressive blocking.
   Measurements reveal that certain Protective DNS services apply
   extreme defensive strategies to queries for one or more malicious
   domains, temporarily blocking all domain resolution for the
   client—including legitimate domains.  This introduces denial-of-
   response (DoR) risks, as attackers can exploit this behavior to
   impose DoR attacks on arbitrary victims.  Specifically, sending a set
   of malicious domain queries with spoofed source IP addresses can
   force the victim’s client to lose all DNS resolution capabilities,
   effectively executing a denial-of-service attack.</t>
        <t>
   Therefore, PDNS service providers should exercise caution when
   implementing aggressive defensive strategies and consider the
   potential impact of such approaches in advance.  Meanwhile,
   Protective DNS providers should preconfigure defense mechanisms
   against potential denial-of-resolution (DoR) risks.  Specifically,
   when a client initiates a large volume of DNS queries exceeding a
   defined threshold for malicious domains to a Protective DNS server,
   providers should evaluate the impact of directly blocking all DNS
   query responses from the client for a period of time.  To effectively
   mitigate denial-of-response attacks, providers can send oversized DNS
   responses to enforce TCP fallback, thereby thwarting DoR attacks
   constructed via IP spoofing.</t>
        <t>
   Most critically, operators should strive to avoid controversial
   blocklist formats to minimize the impact of potential false
   positives.  First, PDNS should refrain from using keywords as
   Blocklist entries, as this exacerbates the likelihood of introducing
   false positives and undermines PDNS availability.  Second, PDNS
   providers should avoid using wildcard domains in Blocklists, as such
   practices may also lead to false positives.  To maximize the
   mitigation of false positives, mitigation at the minimum subdomain
   granularity (i.e., FQDN) may minimize collateral damage.</t>
      </section>
      <section anchor="sect-6.4" numbered="true" toc="default">
        <name>Security Consideration 4 - Interaction with data integrity protection</name>
        <t>
   For blocked domains, Protective DNS rewrites data in the DNS
   responses and breaks their data integrity by design.  Particularly,
   when domains are DNSSEC-signed, PDNS will not be able to return
   validated responses for blocked query names and MUST NOT set the AD
   bit when this occurs <xref target="RFC4035" format="default"/>.  For clients that have DO bit or CD
   bit set in DNS queries, meaning they wish to receive DNSSEC RRs in
   response messages <xref target="RFC4033" format="default"/>, PDNS will not be able to provide DNSSEC
   RRs when the query names are blocked, because no actual queries are
   sent to authoritative servers.  In such cases, error messages (e.g.,
   via EDE <xref target="RFC8914" format="default"/>) is recommended in responses for diagnosing
   purposes.</t>
      </section>
      <section anchor="sect-6.5" numbered="true" toc="default">
        <name>Security Consideration 5 - Fallback</name>
        <t>
   As Protective DNS introduces new components, such as blocklists,
   service providers should consider fault diagnosis for denial-of-
   service (DoS) failures in individual components and corresponding
   fallback mechanisms to ensure performance stability.  For example, in
   scenarios involving remote blocklist queries, providers should
   proactively diagnose the availability of remote blocklist interfaces
   on a regular basis.  If remote blocklist query services become
   unavailable due to network issues or other causes, and no fallback
   mechanism is in place, this may render the provider’s DNS query
   services inoperable.  Thus, providers should predefine fallback
   mechanisms—such as reverting to normal DNS resolution procedures.</t>
      </section>
    </section>
    <section anchor="sect-7" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <t>
   This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC1034" target="https://www.rfc-editor.org/info/rfc1034" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.1034.xml">
          <front>
            <title>Domain names - concepts and facilities</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised basic definition of The Domain Name System. It obsoletes RFC-882. This memo describes the domain style names and their used for host address look up and electronic mail forwarding. It discusses the clients and servers in the domain name system and the protocol used between them.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1034"/>
          <seriesInfo name="DOI" value="10.17487/RFC1034"/>
        </reference>
        <reference anchor="RFC1035" target="https://www.rfc-editor.org/info/rfc1035" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.1035.xml">
          <front>
            <title>Domain names - implementation and specification</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1035"/>
          <seriesInfo name="DOI" value="10.17487/RFC1035"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC4033" target="https://www.rfc-editor.org/info/rfc4033" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4033.xml">
          <front>
            <title>DNS Security Introduction and Requirements</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>The Domain Name System Security Extensions (DNSSEC) add data origin authentication and data integrity to the Domain Name System. This document introduces these extensions and describes their capabilities and limitations. This document also discusses the services that the DNS security extensions do and do not provide. Last, this document describes the interrelationships between the documents that collectively describe DNSSEC. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4033"/>
          <seriesInfo name="DOI" value="10.17487/RFC4033"/>
        </reference>
        <reference anchor="RFC4035" target="https://www.rfc-editor.org/info/rfc4035" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4035.xml">
          <front>
            <title>Protocol Modifications for the DNS Security Extensions</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of new resource records and protocol modifications that add data origin authentication and data integrity to the DNS. This document describes the DNSSEC protocol modifications. This document defines the concept of a signed zone, along with the requirements for serving and resolving by using DNSSEC. These techniques allow a security-aware resolver to authenticate both DNS resource records and authoritative DNS error indications.</t>
              <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4035"/>
          <seriesInfo name="DOI" value="10.17487/RFC4035"/>
        </reference>
        <reference anchor="RFC5782" target="https://www.rfc-editor.org/info/rfc5782" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5782.xml">
          <front>
            <title>DNS Blacklists and Whitelists</title>
            <author fullname="J. Levine" initials="J." surname="Levine"/>
            <date month="February" year="2010"/>
            <abstract>
              <t>The rise of spam and other anti-social behavior on the Internet has led to the creation of shared blacklists and whitelists of IP addresses or domains. The DNS has become the de-facto standard method of distributing these blacklists and whitelists. This memo documents the structure and usage of DNS-based blacklists and whitelists, and the protocol used to query them. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5782"/>
          <seriesInfo name="DOI" value="10.17487/RFC5782"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8914" target="https://www.rfc-editor.org/info/rfc8914" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8914.xml">
          <front>
            <title>Extended DNS Errors</title>
            <author fullname="W. Kumari" initials="W." surname="Kumari"/>
            <author fullname="E. Hunt" initials="E." surname="Hunt"/>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="W. Hardaker" initials="W." surname="Hardaker"/>
            <author fullname="D. Lawrence" initials="D." surname="Lawrence"/>
            <date month="October" year="2020"/>
            <abstract>
              <t>This document defines an extensible method to return additional information about the cause of DNS errors. Though created primarily to extend SERVFAIL to provide additional information about the cause of DNS and DNSSEC failures, the Extended DNS Errors option defined in this document allows all response types to contain extended error information. Extended DNS Error information does not change the processing of RCODEs.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8914"/>
          <seriesInfo name="DOI" value="10.17487/RFC8914"/>
        </reference>
        <reference anchor="I-D.ietf-dnsop-dns-rpz" target="https://datatracker.ietf.org/doc/html/draft-ietf-dnsop-dns-rpz-00" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-dnsop-dns-rpz.xml">
          <front>
            <title>DNS Response Policy Zones (RPZ)</title>
            <author fullname="Paul A. Vixie" initials="P. A." surname="Vixie">
              <organization>Farsight Security</organization>
            </author>
            <author fullname="Vernon Schryver" initials="V." surname="Schryver">
              <organization>Rhyolite Software</organization>
            </author>
            <date day="9" month="March" year="2017"/>
            <abstract>
              <t>This document describes a method for expressing DNS response policy inside a specially constructed DNS zone, and for recursive name servers to use such policy to return modified results to DNS clients. The modified DNS results can stop access to selected HTTP servers, redirect users to "walled gardens", block objectionable email, and otherwise defend against attack. These "DNS Firewalls" are widely used in fighting Internet crime and abuse.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dnsop-dns-rpz-00"/>
        </reference>
        <reference anchor="I-D.ietf-dnsop-structured-dns-error" target="https://datatracker.ietf.org/doc/html/draft-ietf-dnsop-structured-dns-error-15" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-dnsop-structured-dns-error.xml">
          <front>
            <title>Structured Error Data for Filtered DNS</title>
            <author fullname="Dan Wing" initials="D." surname="Wing">
              <organization>Citrix Systems, Inc.</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Neil Cook" initials="N." surname="Cook">
              <organization>Open-Xchange</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <date day="5" month="May" year="2025"/>
            <abstract>
              <t>DNS filtering is widely deployed for various reasons, including network security. However, filtered DNS responses lack structured information for end users to understand the reason for the filtering. Existing mechanisms to provide explanatory details to end users cause harm especially if the blocked DNS response is for HTTPS resources. This document updates RFC 8914 by signaling client support for structuring the EXTRA-TEXT field of the Extended DNS Error to provide details on the DNS filtering. Such details can be parsed by the client and displayed, logged, or used for other purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dnsop-structured-dns-error-15"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="Canada-Protect" target="https://www.cira.ca/en/canadian-shield/faq-public/">
          <front>
            <title>Canadian shield offers dns-based protection against malware and phishing attacks</title>
            <author>
	</author>
            <date month="July" year="2021"/>
          </front>
        </reference>
        <reference anchor="Cisco" target="https://umbrella.cisco.com/blog/dns-security-your-new-secret-weapon-in-your-fight-against-cybercrime">
          <front>
            <title>DNS Security – Your New Secret Weapon in The Fight Against Cybercrime</title>
            <author>
	</author>
            <date month="February" year="2024"/>
          </front>
        </reference>
        <reference anchor="DNS4EU" target="https://www.joindns4.eu/">
          <front>
            <title>DNS4EU</title>
            <author>
	</author>
            <date month="May" year="2025"/>
          </front>
        </reference>
        <reference anchor="DNS4EU-Public" target="https://www.joindns4.eu/for-public">
          <front>
            <title>DNS4EU for Public</title>
            <author>
	</author>
            <date year="2025"/>
          </front>
        </reference>
        <reference anchor="NDSS24" target="https://www.ndss-symposium.org/ndss-paper/understanding-the-implementation-and-security-implications-of-protective-dns-services/">
          <front>
            <title>Understanding the Implementation and Security Implications of Protective DNS Services</title>
            <author>
	</author>
            <date month="March" year="2024"/>
          </front>
        </reference>
        <reference anchor="SAC127" target="https://itp.cdn.icann.org/en/files/security-and-stability-advisory-committee-ssac-reports/sac127-dns-blocking-revisited-16-05-2025-en.pdf">
          <front>
            <title>SAC127 DNS Blocking Revisited</title>
            <author>
	</author>
            <date month="May" year="2025"/>
          </front>
        </reference>
        <reference anchor="UK-Defence" target="https://www.ncsc.gov.uk/files/ACD6-full-report.pdf">
          <front>
            <title>Active Cyber Defence</title>
            <author>
	</author>
            <date year="2022"/>
          </front>
        </reference>
        <reference anchor="UK-NCSC-PDNS" target="https://4thplatform.co.uk/2024/04/19/ncsc-announces-new-partnership-for-pdns-delivery-2-2/">
          <front>
            <title>NCSC announces new partnership for PDNS delivery</title>
            <author>
	</author>
            <date month="April" year="2024"/>
          </front>
        </reference>
        <reference anchor="UK-NCSC-PDNS-Usage" target="https://nominet.uk/dns-services/">
          <front>
            <title>Experts in Domain Name System (DNS) Services</title>
            <author>
	</author>
            <date year="2025"/>
          </front>
        </reference>
        <reference anchor="US-Protect" target="https://www.nsa">
          <front>
            <title>Protective domain name system services</title>
            <author>
	</author>
            <date month="May" year="2022"/>
          </front>
        </reference>
        <reference anchor="USENIX24" target="https://www.usenix.org/conference/usenixsecurity23/presentation/rodriguez">
          <front>
            <title>Two Sides of the Shield: Understanding Protective DNS adoption factors</title>
            <author>
	</author>
            <date month="August" year="2024"/>
          </front>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="acknowledgments" toc="default">
      <name>Acknowledgments</name>
      <t>
   TODO acknowledge.</t>
    </section>
  </back>
</rfc>
