<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.17 (Ruby 3.3.1) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-rbw-add-encrypted-dns-forwarders-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.21.0 -->
  <front>
    <title abbrev="Encrypted DNS Forwarders on CPEs">Hosting Encrypted DNS Forwarders on CPEs</title>
    <seriesInfo name="Internet-Draft" value="draft-rbw-add-encrypted-dns-forwarders-00"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Mohamed Boucadair">
      <organization>Orange</organization>
      <address>
        <postal>
          <city>Rennes</city>
          <code>35000</code>
          <country>France</country>
        </postal>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <author initials="D." surname="Wing" fullname="Dan Wing">
      <organization abbrev="Cloud Software Group">Cloud Software Group Holdings, Inc.</organization>
      <address>
        <email>danwing@gmail.com</email>
      </address>
    </author>
    <date year="2024" month="June" day="25"/>
    <area>Internet</area>
    <workgroup>Adaptive DNS Discovery</workgroup>
    <keyword>DNS</keyword>
    <keyword>deployment</keyword>
    <keyword>Discovery</keyword>
    <abstract>
      <?line 72?>

<t>Typical connectivity service offerings based upon on Customer Premise Equipment (CPEs)
involve DNS forwarders on the CPE for various reasons (offer
local services, control the scope/content of information in DNS, ensure better
dependability for local service, provide control to users, etc.). Upgrading DNS to use
encrypted transports introduces deployment complications as to how to sustain current
offerings with local services. Solutions are needed to ease operating
DNS forwarders in CPEs while allowing to make use of encrypted DNS  capabilities.</t>
      <t>This document describes the problem and why some existing solutions can't be used for
these deployments. For example, Star certificates and name constraints extension suffer from
the problem of deploying a new feature to CAs, TLS clients, and servers.</t>
      <t>The document also discusses adaptations to some other existing techniques to accomodate LAN specifics.</t>
      <t>The scope of this document is encrypted DNS servers deployed on managed CPEs.</t>
      <t>The document does not focus on generic considerations related to deploying DNS proxies. The reader may
refer to <xref target="RFC5625"/> for such matters.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Adaptive DNS Discovery Working Group mailing list (add@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/add/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/boucadair/encrypted-dns-forwarders"/>.</t>
    </note>
  </front>
  <middle>
    <?line 93?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Customer Premises Equipment (CPEs, also called Home Routers) are a
   critical component of the home network, and their security is
   essential to protecting the devices and data that are connected to
   them.  For example, the prpl Foundation <xref target="prpl"/> has developed a number
   of initiatives to promote home router security and hardening.  The
   prplWrt project <xref target="prplwrt"/> is an initiative in prpl Foundation that
   aims to improve the security and performance of open-source router
   firmware, such as OpenWrt <xref target="openwrt"/>.  OpenWrt is an open-source
   operating system that is designed to run on a wide range of routers
   and embedded devices.  It now includes support for containerization
   technology such as Docker, making it possible to run containerized
   applications on a home router.  Further, DNS providers have optimized
   the encrypted DNS forwarder to run in a container in home routers.</t>
      <t>However, upgrading DNS to use encrypted transports (e.g., DNS over HTTPS (DoH) <xref target="RFC8484"/>, DNS over TLS (DoT) <xref target="RFC7858"/>,
   and DNS over QUIC (DoQ) <xref target="RFC9250"/>) introduces deployment complications as to how to sustain current
offerings with local services.</t>
      <t>This document describes the problem encountered to host encrypted DNS resolvers
   in managed CPEs. It also discusses limitations of existing solutions.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>This document makes use of the terms defined in <xref target="RFC9499"/>.</t>
      <t>The following additional terms are used:</t>
      <dl>
        <dt>DHCP:</dt>
        <dd>
          <t>refers to both DHCPv4 and DHCPv6.</t>
        </dd>
        <dt>Do53:</dt>
        <dd>
          <t>refers to unencrypted DNS.</t>
        </dd>
        <dt>DNR:</dt>
        <dd>
          <t>refers to the Discovery of Network-designated Resolvers
procedure defined in <xref target="RFC9463"/>.</t>
        </dd>
        <dt>DDR:</dt>
        <dd>
          <t>refers to the Discovery of Designated Resolvers procedure
defined in <xref target="RFC9462"/>.</t>
        </dd>
        <dt>Encrypted DNS:</dt>
        <dd>
          <t>refers to a scheme where DNS exchanges are
transported over an encrypted channel.  Examples of encrypted DNS
are DoH <xref target="RFC8484"/>, DoT <xref target="RFC7858"/>, and DoQ <xref target="RFC9250"/>.</t>
        </dd>
        <dt>Managed CPE:</dt>
        <dd>
          <t>refers to a CPE that is managed by an ISP or CPE vendor
or Security Service Provider.</t>
        </dd>
      </dl>
    </section>
    <section anchor="proxied-dns-in-local-networks">
      <name>Proxied DNS In Local Networks</name>
      <t><xref target="fig1"/> shows various network setups where the CPE embeds a caching
   encrypted DNS forwarder.</t>
      <figure anchor="fig1">
        <name>Proxied Encrypted DNS Sessions</name>
        <artwork><![CDATA[
   (a)

                         ,--,--,--.             ,--,--,--.
                      ,-'          `-.       ,-'   ISP    `-.
              Host---(      LAN      CPE----(    DNS Resolver)
                |     `-.          ,-'|      `-.          ,-'
                |        `--'--'--'   |       | `--'--'--'
                |                     |<=DNR=>|     |
                |<========DNR========>|       |     |
                |                     |             |
                |<=====Encrypted=====>|<=Encrypted=>|
                |         DNS         |     DNS     |

   (b)

                   ,--,--,--.             ,--,--,--.
                ,-'          `-.       ,-'   ISP    `-.      3rd Party
        Host---(      LAN      CPE----(                )--- DNS Resolver
          |     `-.          ,-'|      `-.          ,-'        |
          |        `--'--'--'   |       | `--'--'--'           |
          |                     |<=DNR=>|                      |
          |<========DNR========>|       |                      |
          |                     |                              |
          |<=====Encrypted=====>|<=========Encrypted DNS======>|
          |         DNS         |                              |
]]></artwork>
      </figure>
      <t>For all the cases shown in <xref target="fig1"/>, the CPE advertises itself as the
   default DNS server to the hosts it serves in the LAN.  The CPE relies
   upon DHCP or RA to advertise itself to internal hosts as the default
   encrypted DNS forwarder using DNR. When receiving a DNS request that a CPE cannot
   handle locally, the CPE forwards the request to an upstream encrypted
   DNS. The upstream encrypted DNS can be hosted by the ISP or provided
   by a third party.</t>
      <t>Such a forwarder presence is required for (but not limuted to):</t>
      <ul spacing="normal">
        <li>
          <t>IPv4 service continuity purposes (e.g., <xref section="3.1" sectionFormat="of" target="RFC8585"/>).</t>
        </li>
        <li>
          <t>Supporting advanced services within a local network such as:
          </t>
          <ul spacing="normal">
            <li>
              <t>malware filtering,</t>
            </li>
            <li>
              <t>parental control,</t>
            </li>
            <li>
              <t>Manufacturer Usage Description (MUD) <xref target="RFC8520"/> to only allow
 intended communications to and from an IoT device, and</t>
            </li>
            <li>
              <t>offer multicast DNS proxy service for the ".local" domain <xref target="RFC6762"/>.</t>
            </li>
          </ul>
        </li>
      </ul>
      <t>When the CPE behaves as a DNS forwarder, DNS communications can be decomposed into
   two legs to resolve queries:</t>
      <ul spacing="normal">
        <li>
          <t>The leg between an internal host and the CPE.</t>
        </li>
        <li>
          <t>The leg between the CPE and an upstream DNS resolver.</t>
        </li>
      </ul>
    </section>
    <section anchor="hosting-encrypted-dns-forwarder-in-local-networks">
      <name>Hosting Encrypted DNS Forwarder in Local Networks</name>
      <t>This section discusses some deployment challenges to host an
   encrypted DNS forwarder within a local network.</t>
      <section anchor="discovery-mechanisms-and-naming-constraints">
        <name>Discovery Mechanisms and Naming Constraints</name>
        <section anchor="discovery-of-designated-resolvers-ddr">
          <name>Discovery of Designated Resolvers (DDR)</name>
          <t>DDR requires proving possession of an IP address, as the DDR
   certificate contains the server's IPv4 and IPv6 addresses and is
   signed by a certificate authority.  DDR is constrained to public IP
   addresses because (WebPKI) certificate authorities will not sign
   special-purpose IP addresses <xref target="RFC6890"/>, most notably IPv4 private-use
   <xref target="RFC1918"/>, IPv4 shared address <xref target="RFC6598"/>, or IPv6 Unique-Local
   <xref target="RFC8190"/> address space.</t>
          <t>A tempting solution for enabling an encrypted DNS forwarder with DDR is to use the CPE's WAN
   IP address for DDR and prove possession of that IP address.  However,
   the CPE's WAN IPv4 address will not be a public IPv4 address if the
   CPE is behind another layer of NAT (either Carrier Grade NAT (CGN) or
   another on-premise NAT), reducing the success of this mechanism to
   CPE's WAN IPv6 address.</t>
          <t>Also, if the ISP renumbers the subscriber's
   network suddenly (rather than slow IPv6 renumbering described in
   <xref target="RFC4192"/>), encrypted DNS service will be delayed until that new
   certificate is acquired.</t>
        </section>
        <section anchor="discovery-of-network-designated-resolvers-dnr">
          <name>Discovery of Network-designated Resolvers (DNR)</name>
          <t>DNR requires proving possession of a domain name as the encrypted
   resolver's certificate contains the FQDN. For example, the entity (e.g., ISP or
   network administrator) managing the CPE would assign a unique FQDN to
   the CPE. There are two mechanisms for the CPE to obtain the
   certificate for the FQDN: using one of its WAN IP addresses or
   requesting its signed certificate from an Internet-facing server used
   for remote CPE management (e.g., the Auto Configuration Server (ACS)
   in the CPE WAN Management Protocol <xref target="TR-069"/>).</t>
          <t>If the CPE's WAN IP address is used, the CPE needs a public IPv4 or a global unicast IPv6
   address together with DNS A or AAAA records pointing to that CPE's
   WAN address to prove possession of the DNS name to obtain a (WebPKI)
   CA-signed certificate. That is, the CPE fulfills the DNS or HTTP
   challenge discussed in Automatic Certificate Management Environment (ACME) <xref target="RFC8555"/>.  However, a CPE's WAN address
   will not be a public IPv4 address if the CPE is behind another layer
   of NAT (either a CGN or another on-premise NAT), reducing the success
   of this mechanism to a CPE's WAN IPv6 address. If the ISP renumbers the subscriber's
   network, the DNS record will also need to expire and changed to
   reflect the new IP address.</t>
        </section>
      </section>
    </section>
    <section anchor="limitations-of-existing-solutions">
      <name>Limitations of Existing Solutions</name>
      <section anchor="certificate-issuance-issues">
        <name>Certificate Issuance Issues</name>
        <t>The following lists some limitations for certificate issuance:</t>
        <ul spacing="normal">
          <li>
            <t>In case of large scale of CPEs (e.g., millions of devices),
issuing certificate request for a large number of subdomains could
be treated as an attack by the certificate authorities to
overwhelm it.</t>
          </li>
          <li>
            <t>Dependency on the CA to issue a large number of certificates.</t>
          </li>
          <li>
            <t>If the CPE uses one of its WAN IP addresses to obtain the
certificate for the FQDN, the Internet-facing HTTP server or a DNS
authoritative server on the CPE to complete the HTTP or DNS
challenge can be subjected to DDoS attacks.</t>
          </li>
        </ul>
      </section>
      <section anchor="delegated-certificate-issuance">
        <name>Delegated Certificate Issuance</name>
        <t>Let's consider that the encrypted DNS forwarder is hosted on a CPE and provisioned by a
   service (e.g., ACS) in the operator's network. Also, let's assume that each CPE is assigned
   a unique FQDN (e.g., "cpe-12345.example.com" where 12345 is a unique
   number).</t>
        <ul empty="true">
          <li>
            <t>It is best to ensure that such an FQDN does not carry any
   Personally Identifiable Information (PII) or device identification
   details like the customer number or device's serial number.</t>
          </li>
        </ul>
        <t>The CPE generates a public and private key-pair, builds a certificate signing
   request (CSR), and sends the CSR to a service in the operator
   managing the CPE.  Upon receipt of the CSR, the operator's service
   can utilize certificate management protocols like ACME <xref target="RFC8555"/> to automate
   certificate management functions such as domain validation procedure,
   certificate issuance, and certificate revocation.</t>
        <t>The challenge with this technique is that the service will have to
   communicate with the CA to issue certificates for millions of CPEs.
   If an external CA is unable to issue a certificate in time or replace
   an expired certificate, the service would no longer be able to
   present a valid certificate to a CPE.  When the service requests
   certificate issuance for a large number of subdomains (e.g., millions
   of CPEs), it may be treated as an attacker by the CA to overwhelm it.
   Furthermore, the short-lived certificates (e.g., certificates that
   expire after 90 days) issued by the CA will have to be renewed
   frequently.  With short-lived certificates, there is a smaller time
   window to renew a certificate and, therefore, a higher risk that a CA
   outage will negatively affect the uptime of the encrypted DNS
   forwarders on CPEs (and the services offered via these CPEs).</t>
        <t>These challenges can be addressed by using protocols like
   ACME to automate the certificate renewal process, ensuring certificates
   are renewed well before expiration. Additionally, incorporating another
   CA as a backup can provide redundancy and further mitigate the risk of
   outages. By having a secondary CA, the service can switch to the backup
   CA in case the primary CA is unavailable, thus maintaining continuous
   service availability and reducing the risk of service disruption.</t>
        <t>It offers the additional advantage of improving the security of
   Browser and CPE interactions. This ensures that HTTPS access to
   the CPE is possible, allowing the device administrator to securely
   communicate with and manage the CPE.</t>
      </section>
      <section anchor="limitations-of-name-constraints-extension">
        <name>Limitations of Name Constraints Extension</name>
        <t>A service managing the CPEs could get a CA certificate with name
      constraints extension (<xref section="4.2.1.10" sectionFormat="of" target="RFC5280"/>) and the
      service would in-turn act as an ACME server to provision end-entity certificates on CPEs.</t>
        <ul spacing="normal">
          <li>
            <t>Con:
            </t>
            <ul spacing="normal">
              <li>
                <t>Name constraints extension is not yet supported by CAs,
     although <xref target="RFC5280"/> was standardized way back in 2008.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Pro:
            </t>
            <ul spacing="normal">
              <li>
                <t>Avoids changing TLS client and server (e.g., stunnel or openssl).</t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="limitations-of-star-certificates">
        <name>Limitations of Star certificates</name>
        <t><xref target="RFC9115"/> defines a profile of the ACME protocol for generating
      Delegated certificates.  It allows the CPEs to request from a
      service managing the CPEs, acting as a profiled ACME server, a
      certificate for a delegated identity, i.e., one belonging to the
      service.  The service then uses the ACME protocol (with the
      extensions described in <xref target="RFC8739"/>) to request issuance of a
      short-term, Automatically Renewed (STAR) certificate for the same
      delegated identity.  The generated short-term certificate is
      automatically renewed by the ACME CA, periodically fetched by
      the CPEs, and used to act as encrypted DNS forwarders.</t>
        <t>The service can end the delegation at any time by instructing the CA
      to stop the automatic renewal and letting the certificate expire
      shortly thereafter.  Star certificates requires support by CAs but
      does not require changes to the deployed TLS ecosystem.</t>
        <ul spacing="normal">
          <li>
            <t>Cons:
            </t>
            <ul spacing="normal">
              <li>
                <t>Star certificates require support by CAs.</t>
              </li>
              <li>
                <t>A primary use case of Star certificates is that of a
     Content Delivery Network (CDN), the third party, terminating
     TLS sessions on behalf of a content provider (the holder of a
     domain name).  The number of star certificates required for a
     CDN use case will be very much lower than the use case
     discussed in this draft.  It is yet to be seen if CAs will
     agree to support star certificates at a scale of millions of
     CPEs.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Pro:
            </t>
            <ul spacing="normal">
              <li>
                <t>Avoids changing TLS client and server.</t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>DNR-related security considerations are discussed in
   <xref section="7" sectionFormat="of" target="RFC9463"/>.  Likewise, DDR-related security considerations
   are discussed in <xref section="7" sectionFormat="of" target="RFC9462"/>.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9463">
          <front>
            <title>DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers (DNR)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="T. Reddy.K" initials="T." role="editor" surname="Reddy.K"/>
            <author fullname="D. Wing" initials="D." surname="Wing"/>
            <author fullname="N. Cook" initials="N." surname="Cook"/>
            <author fullname="T. Jensen" initials="T." surname="Jensen"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies new DHCP and IPv6 Router Advertisement options to discover encrypted DNS resolvers (e.g., DNS over HTTPS, DNS over TLS, and DNS over QUIC). Particularly, it allows a host to learn an Authentication Domain Name together with a list of IP addresses and a set of service parameters to reach such encrypted DNS resolvers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9463"/>
          <seriesInfo name="DOI" value="10.17487/RFC9463"/>
        </reference>
        <reference anchor="RFC9462">
          <front>
            <title>Discovery of Designated Resolvers</title>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="E. Kinnear" initials="E." surname="Kinnear"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <author fullname="T. Jensen" initials="T." surname="Jensen"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document defines Discovery of Designated Resolvers (DDR), a set of mechanisms for DNS clients to use DNS records to discover a resolver's encrypted DNS configuration. An Encrypted DNS Resolver discovered in this manner is referred to as a "Designated Resolver". These mechanisms can be used to move from unencrypted DNS to encrypted DNS when only the IP address of a resolver is known. These mechanisms are designed to be limited to cases where Unencrypted DNS Resolvers and their Designated Resolvers are operated by the same entity or cooperating entities. It can also be used to discover support for encrypted DNS protocols when the name of an Encrypted DNS Resolver is known.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9462"/>
          <seriesInfo name="DOI" value="10.17487/RFC9462"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC9115">
          <front>
            <title>An Automatic Certificate Management Environment (ACME) Profile for Generating Delegated Certificates</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="D. López" initials="D." surname="López"/>
            <author fullname="A. Pastor Perales" initials="A." surname="Pastor Perales"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="September" year="2021"/>
            <abstract>
              <t>This document defines a profile of the Automatic Certificate Management Environment (ACME) protocol by which the holder of an identifier (e.g., a domain name) can allow a third party to obtain an X.509 certificate such that the certificate subject is the delegated identifier while the certified public key corresponds to a private key controlled by the third party. A primary use case is that of a Content Delivery Network (CDN), the third party, terminating TLS sessions on behalf of a content provider (the holder of a domain name). The presented mechanism allows the holder of the identifier to retain control over the delegation and revoke it at any time. Importantly, this mechanism does not require any modification to the deployed TLS clients and servers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9115"/>
          <seriesInfo name="DOI" value="10.17487/RFC9115"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="openwrt" target="https://openwrt.org/">
          <front>
            <title>OpenWrt Project</title>
            <author>
              <organization>OpenWrt</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="prpl" target="https://prplfoundation.org/">
          <front>
            <title>Prpl Foundation</title>
            <author>
              <organization>Prpl Foundation</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="prplwrt" target="https://prplfoundation.org/project/prplwrt/">
          <front>
            <title>Prpl WRT</title>
            <author>
              <organization>Prpl Foundation</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="TR-069" target="https://www.broadband-forum.org/technical/download/TR-069.pdf">
          <front>
            <title>CPE WAN Management Protocol</title>
            <author>
              <organization>The Broadband Forum</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC5625">
          <front>
            <title>DNS Proxy Implementation Guidelines</title>
            <author fullname="R. Bellis" initials="R." surname="Bellis"/>
            <date month="August" year="2009"/>
            <abstract>
              <t>This document provides guidelines for the implementation of DNS proxies, as found in broadband gateways and other similar network devices. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="152"/>
          <seriesInfo name="RFC" value="5625"/>
          <seriesInfo name="DOI" value="10.17487/RFC5625"/>
        </reference>
        <reference anchor="RFC8484">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="RFC7858">
          <front>
            <title>Specification for DNS over Transport Layer Security (TLS)</title>
            <author fullname="Z. Hu" initials="Z." surname="Hu"/>
            <author fullname="L. Zhu" initials="L." surname="Zhu"/>
            <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="D. Wessels" initials="D." surname="Wessels"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
              <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7858"/>
          <seriesInfo name="DOI" value="10.17487/RFC7858"/>
        </reference>
        <reference anchor="RFC9250">
          <front>
            <title>DNS over Dedicated QUIC Connections</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>This document describes the use of QUIC to provide transport confidentiality for DNS. The encryption provided by QUIC has similar properties to those provided by TLS, while QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides more efficient packet-loss recovery than UDP. DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC 7858, and latency characteristics similar to classic DNS over UDP. This specification describes the use of DoQ as a general-purpose transport for DNS and includes the use of DoQ for stub to recursive, recursive to authoritative, and zone transfer scenarios.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9250"/>
          <seriesInfo name="DOI" value="10.17487/RFC9250"/>
        </reference>
        <reference anchor="RFC9499">
          <front>
            <title>DNS Terminology</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
              <t>This document updates RFC 2308 by clarifying the definitions of "forwarder" and "QNAME". It obsoletes RFC 8499 by adding multiple terms and clarifications. Comprehensive lists of changed and new definitions can be found in Appendices A and B.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="219"/>
          <seriesInfo name="RFC" value="9499"/>
          <seriesInfo name="DOI" value="10.17487/RFC9499"/>
        </reference>
        <reference anchor="RFC8585">
          <front>
            <title>Requirements for IPv6 Customer Edge Routers to Support IPv4-as-a-Service</title>
            <author fullname="J. Palet Martinez" initials="J." surname="Palet Martinez"/>
            <author fullname="H. M.-H. Liu" initials="H. M.-H." surname="Liu"/>
            <author fullname="M. Kawashima" initials="M." surname="Kawashima"/>
            <date month="May" year="2019"/>
            <abstract>
              <t>This document specifies the IPv4 service continuity requirements for IPv6 Customer Edge (CE) routers that are provided either by the service provider or by vendors who sell through the retail market.</t>
              <t>Specifically, this document extends the basic requirements for IPv6 CE routers as described in RFC 7084 to allow the provisioning of IPv6 transition services for the support of IPv4-as-a-Service (IPv4aaS) by means of new transition mechanisms. The document only covers IPv4aaS, i.e., transition technologies for delivering IPv4 in IPv6-only access networks. IPv4aaS is necessary because there aren't sufficient IPv4 addresses available for every possible customer/ device. However, devices or applications in the customer Local Area Networks (LANs) may be IPv4-only or IPv6-only and still need to communicate with IPv4-only services on the Internet.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8585"/>
          <seriesInfo name="DOI" value="10.17487/RFC8585"/>
        </reference>
        <reference anchor="RFC8520">
          <front>
            <title>Manufacturer Usage Description Specification</title>
            <author fullname="E. Lear" initials="E." surname="Lear"/>
            <author fullname="R. Droms" initials="R." surname="Droms"/>
            <author fullname="D. Romascanu" initials="D." surname="Romascanu"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>This memo specifies a component-based architecture for Manufacturer Usage Descriptions (MUDs). The goal of MUD is to provide a means for end devices to signal to the network what sort of access and network functionality they require to properly function. The initial focus is on access control. Later work can delve into other aspects.</t>
              <t>This memo specifies two YANG modules, IPv4 and IPv6 DHCP options, a Link Layer Discovery Protocol (LLDP) TLV, a URL, an X.509 certificate extension, and a means to sign and verify the descriptions.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8520"/>
          <seriesInfo name="DOI" value="10.17487/RFC8520"/>
        </reference>
        <reference anchor="RFC6762">
          <front>
            <title>Multicast DNS</title>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <author fullname="M. Krochmal" initials="M." surname="Krochmal"/>
            <date month="February" year="2013"/>
            <abstract>
              <t>As networked devices become smaller, more portable, and more ubiquitous, the ability to operate with less configured infrastructure is increasingly important. In particular, the ability to look up DNS resource record data types (including, but not limited to, host names) in the absence of a conventional managed DNS server is useful.</t>
              <t>Multicast DNS (mDNS) provides the ability to perform DNS-like operations on the local link in the absence of any conventional Unicast DNS server. In addition, Multicast DNS designates a portion of the DNS namespace to be free for local use, without the need to pay any annual fee, and without the need to set up delegations or otherwise configure a conventional DNS server to answer for those names.</t>
              <t>The primary benefits of Multicast DNS names are that (i) they require little or no administration or configuration to set them up, (ii) they work when no infrastructure is present, and (iii) they work during infrastructure failures.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6762"/>
          <seriesInfo name="DOI" value="10.17487/RFC6762"/>
        </reference>
        <reference anchor="RFC6890">
          <front>
            <title>Special-Purpose IP Address Registries</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="L. Vegoda" initials="L." surname="Vegoda"/>
            <author fullname="R. Bonica" initials="R." role="editor" surname="Bonica"/>
            <author fullname="B. Haberman" initials="B." surname="Haberman"/>
            <date month="April" year="2013"/>
            <abstract>
              <t>This memo reiterates the assignment of an IPv4 address block (192.0.0.0/24) to IANA. It also instructs IANA to restructure its IPv4 and IPv6 Special-Purpose Address Registries. Upon restructuring, the aforementioned registries will record all special-purpose address blocks, maintaining a common set of information regarding each address block.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="153"/>
          <seriesInfo name="RFC" value="6890"/>
          <seriesInfo name="DOI" value="10.17487/RFC6890"/>
        </reference>
        <reference anchor="RFC1918">
          <front>
            <title>Address Allocation for Private Internets</title>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <author fullname="B. Moskowitz" initials="B." surname="Moskowitz"/>
            <author fullname="D. Karrenberg" initials="D." surname="Karrenberg"/>
            <author fullname="G. J. de Groot" initials="G. J." surname="de Groot"/>
            <author fullname="E. Lear" initials="E." surname="Lear"/>
            <date month="February" year="1996"/>
            <abstract>
              <t>This document describes address allocation for private internets. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="5"/>
          <seriesInfo name="RFC" value="1918"/>
          <seriesInfo name="DOI" value="10.17487/RFC1918"/>
        </reference>
        <reference anchor="RFC6598">
          <front>
            <title>IANA-Reserved IPv4 Prefix for Shared Address Space</title>
            <author fullname="J. Weil" initials="J." surname="Weil"/>
            <author fullname="V. Kuarsingh" initials="V." surname="Kuarsingh"/>
            <author fullname="C. Donley" initials="C." surname="Donley"/>
            <author fullname="C. Liljenstolpe" initials="C." surname="Liljenstolpe"/>
            <author fullname="M. Azinger" initials="M." surname="Azinger"/>
            <date month="April" year="2012"/>
            <abstract>
              <t>This document requests the allocation of an IPv4 /10 address block to be used as Shared Address Space to accommodate the needs of Carrier- Grade NAT (CGN) devices. It is anticipated that Service Providers will use this Shared Address Space to number the interfaces that connect CGN devices to Customer Premises Equipment (CPE).</t>
              <t>Shared Address Space is distinct from RFC 1918 private address space because it is intended for use on Service Provider networks. However, it may be used in a manner similar to RFC 1918 private address space on routing equipment that is able to do address translation across router interfaces when the addresses are identical on two different interfaces. Details are provided in the text of this document.</t>
              <t>This document details the allocation of an additional special-use IPv4 address block and updates RFC 5735. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="153"/>
          <seriesInfo name="RFC" value="6598"/>
          <seriesInfo name="DOI" value="10.17487/RFC6598"/>
        </reference>
        <reference anchor="RFC8190">
          <front>
            <title>Updates to the Special-Purpose IP Address Registries</title>
            <author fullname="R. Bonica" initials="R." surname="Bonica"/>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Haberman" initials="B." surname="Haberman"/>
            <author fullname="L. Vegoda" initials="L." surname="Vegoda"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>This memo updates the IANA IPv4 and IPv6 Special-Purpose Address Registries to address issues raised by the definition of a "global" prefix. It also corrects several errors in registry entries to ensure the integrity of the IANA Special-Purpose Address Registries.</t>
              <t>This memo updates RFC 6890.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="153"/>
          <seriesInfo name="RFC" value="8190"/>
          <seriesInfo name="DOI" value="10.17487/RFC8190"/>
        </reference>
        <reference anchor="RFC4192">
          <front>
            <title>Procedures for Renumbering an IPv6 Network without a Flag Day</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="E. Lear" initials="E." surname="Lear"/>
            <author fullname="R. Droms" initials="R." surname="Droms"/>
            <date month="September" year="2005"/>
            <abstract>
              <t>This document describes a procedure that can be used to renumber a network from one prefix to another. It uses IPv6's intrinsic ability to assign multiple addresses to a network interface to provide continuity of network service through a "make-before-break" transition, as well as addresses naming and configuration management issues. It also uses other IPv6 features to minimize the effort and time required to complete the transition from the old prefix to the new prefix. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4192"/>
          <seriesInfo name="DOI" value="10.17487/RFC4192"/>
        </reference>
        <reference anchor="RFC8555">
          <front>
            <title>Automatic Certificate Management Environment (ACME)</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="J. Hoffman-Andrews" initials="J." surname="Hoffman-Andrews"/>
            <author fullname="D. McCarney" initials="D." surname="McCarney"/>
            <author fullname="J. Kasten" initials="J." surname="Kasten"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>Public Key Infrastructure using X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names. Thus, certification authorities (CAs) in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate. As of this writing, this verification is done through a collection of ad hoc mechanisms. This document describes a protocol that a CA and an applicant can use to automate the process of verification and certificate issuance. The protocol also provides facilities for other certificate management functions, such as certificate revocation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8555"/>
          <seriesInfo name="DOI" value="10.17487/RFC8555"/>
        </reference>
        <reference anchor="RFC8739">
          <front>
            <title>Support for Short-Term, Automatically Renewed (STAR) Certificates in the Automated Certificate Management Environment (ACME)</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="D. Lopez" initials="D." surname="Lopez"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="A. Pastor Perales" initials="A." surname="Pastor Perales"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="March" year="2020"/>
            <abstract>
              <t>Public key certificates need to be revoked when they are compromised, that is, when the associated private key is exposed to an unauthorized entity. However, the revocation process is often unreliable. An alternative to revocation is issuing a sequence of certificates, each with a short validity period, and terminating the sequence upon compromise. This memo proposes an Automated Certificate Management Environment (ACME) extension to enable the issuance of Short-Term, Automatically Renewed (STAR) X.509 certificates.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8739"/>
          <seriesInfo name="DOI" value="10.17487/RFC8739"/>
        </reference>
        <reference anchor="I-D.reddy-add-delegated-credentials">
          <front>
            <title>Delegated Credentials to Host Encrypted DNS Forwarders on CPEs</title>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Dan Wing" initials="D." surname="Wing">
              <organization>Citrix Systems, Inc.</organization>
            </author>
            <author fullname="Shashank Jain" initials="S." surname="Jain">
              <organization>McAfee</organization>
            </author>
            <date day="1" month="December" year="2023"/>
            <abstract>
              <t>   An encrypted DNS server is authenticated by a certificate signed by a
   Certificate Authority (CA).  However, for typical encrypted DNS
   server deployments on Customer Premise Equipment (CPEs), the
   signature cannot be obtained or requires excessive interactions with
   a Certificate Authority.

   This document explores the use of TLS delegated credentials for a DNS
   server deployed on a CPE.  This approach is meant to ease operating
   DNS forwarders in CPEs while allowing to make use of encrypted DNS
   capabilities.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-reddy-add-delegated-credentials-03"/>
        </reference>
      </references>
    </references>
    <?line 375?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This draft is triggered by the discussion that occured at IETF#119 (Brisbane)
about the need to frame the problem to be solved. Thanks to all the
participants to that discussion.</t>
      <dl>
        <dt>Acknowledgements from <xref target="I-D.reddy-add-delegated-credentials"/>:</dt>
        <dd>
          <t>Thanks to Neil Cook, Martin Thomson, Tommy Pauly, Benjamin Schwartz,
   and Michael Richardson for the discussion and comments.</t>
        </dd>
      </dl>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
