<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.17 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-rbw-add-encrypted-dns-forwarders-01" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.22.0 -->
  <front>
    <title abbrev="Encrypted DNS Forwarders on CPEs">Hosting Encrypted DNS Forwarders on CPEs</title>
    <seriesInfo name="Internet-Draft" value="draft-rbw-add-encrypted-dns-forwarders-01"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Mohamed Boucadair">
      <organization>Orange</organization>
      <address>
        <postal>
          <city>Rennes</city>
          <code>35000</code>
          <country>France</country>
        </postal>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <author initials="D." surname="Wing" fullname="Dan Wing">
      <organization abbrev="Cloud Software Group">Cloud Software Group Holdings, Inc.</organization>
      <address>
        <email>danwing@gmail.com</email>
      </address>
    </author>
    <date year="2024" month="July" day="08"/>
    <area>Internet</area>
    <workgroup>Adaptive DNS Discovery</workgroup>
    <keyword>DNS</keyword>
    <keyword>deployment</keyword>
    <keyword>Discovery</keyword>
    <abstract>
      <?line 72?>

<t>Typical connectivity service offerings based upon on Customer Premise Equipment (CPEs)
involve DNS forwarders on the CPE for various reasons (offer
local services, control the scope/content of information in DNS, ensure better
dependability for local service, provide control to users, etc.). Upgrading DNS to use
encrypted transports introduces deployment complications as to how to sustain current
offerings with local services. Solutions are needed to ease operating
DNS forwarders in CPEs while allowing to make use of encrypted DNS  capabilities.</t>
      <t>This document describes the problem and why some existing solutions can't be used for
these deployments. For example, Star certificates and name constraints extension suffer from
the problem of deploying a new feature to CAs, TLS clients, and servers.</t>
      <t>The scope of this document is encrypted DNS servers deployed on managed CPEs.</t>
    </abstract>
  </front>
  <middle>
    <?line 88?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Customer Premises Equipment (CPEs, also called Home Routers) are a
   critical component of the home network, and their security is
   essential to protecting the devices and data that are connected to
   them.  For example, the prpl Foundation <xref target="prpl"/> has developed a number
   of initiatives to promote home router security and hardening.  The
   prplWrt project <xref target="prplwrt"/> is an initiative in prpl Foundation that
   aims to improve the security and performance of open-source router
   firmware, such as OpenWrt <xref target="openwrt"/>.  OpenWrt is an open-source
   operating system that is designed to run on a wide range of routers
   and embedded devices.  It now includes support for containerization
   technology such as Docker, making it possible to run containerized
   applications on a home router.  Further, DNS providers have optimized
   the encrypted DNS forwarder to run in a container in home routers.</t>
      <t>However, upgrading DNS to use encrypted transports (e.g., DNS over HTTPS (DoH) <xref target="RFC8484"/>, DNS over TLS (DoT) <xref target="RFC7858"/>,
   and DNS over QUIC (DoQ) <xref target="RFC9250"/>) introduces deployment complications as to how to sustain current
offerings with local services.</t>
      <t>This document describes the problem encountered to host encrypted DNS resolvers
   in managed CPEs. It also discusses limitations of existing solutions.</t>
      <t>The document does not focus on generic considerations related to deploying DNS proxies. The reader may
refer to <xref target="RFC5625"/> for such matters.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>This document makes use of the terms defined in <xref target="RFC9499"/>.</t>
      <t>The following additional terms are used:</t>
      <dl>
        <dt>DHCP:</dt>
        <dd>
          <t>refers to both DHCPv4 and DHCPv6.</t>
        </dd>
        <dt>Do53:</dt>
        <dd>
          <t>refers to unencrypted DNS.</t>
        </dd>
        <dt>DNR:</dt>
        <dd>
          <t>refers to the Discovery of Network-designated Resolvers
procedure defined in <xref target="RFC9463"/>.</t>
        </dd>
        <dt>DDR:</dt>
        <dd>
          <t>refers to the Discovery of Designated Resolvers procedure
defined in <xref target="RFC9462"/>.</t>
        </dd>
        <dt>Encrypted DNS:</dt>
        <dd>
          <t>refers to a scheme where DNS exchanges are
transported over an encrypted channel.  Examples of encrypted DNS
are DoH <xref target="RFC8484"/>, DoT <xref target="RFC7858"/>, and DoQ <xref target="RFC9250"/>.</t>
        </dd>
        <dt>Managed CPE:</dt>
        <dd>
          <t>refers to a CPE that is managed by an ISP or CPE vendor
or Security Service Provider.</t>
        </dd>
      </dl>
    </section>
    <section anchor="proxied-dns-in-local-networks">
      <name>Proxied DNS In Local Networks</name>
      <t><xref target="fig1"/> shows various network setups where the CPE embeds a caching
   encrypted DNS forwarder.</t>
      <figure anchor="fig1">
        <name>Proxied Encrypted DNS Sessions</name>
        <artwork><![CDATA[
   (a)

                         ,--,--,--.             ,--,--,--.
                      ,-'          `-.       ,-'   ISP    `-.
              Host---(      LAN      CPE----(    DNS Resolver)
                |     `-.          ,-'|      `-.          ,-'
                |        `--'--'--'   |       | `--'--'--'
                |                     |<=DNR=>|     |
                |<========DNR========>|       |     |
                |                     |             |
                |<=====Encrypted=====>|<=Encrypted=>|
                |         DNS         |     DNS     |

   (b)

                   ,--,--,--.             ,--,--,--.
                ,-'          `-.       ,-'   ISP    `-.      3rd Party
        Host---(      LAN      CPE----(                )--- DNS Resolver
          |     `-.          ,-'|      `-.          ,-'        |
          |        `--'--'--'   |       | `--'--'--'           |
          |                     |<=DNR=>|                      |
          |<========DNR========>|       |                      |
          |                     |                              |
          |<=====Encrypted=====>|<=========Encrypted DNS======>|
          |         DNS         |                              |
]]></artwork>
      </figure>
      <t>For all the cases shown in <xref target="fig1"/>, the CPE advertises itself as the
   default DNS server to the hosts it serves in the LAN.  The CPE relies
   upon DHCP or RA to advertise itself to internal hosts as the default
   encrypted DNS forwarder using DNR. When receiving a DNS request that a CPE cannot
   handle locally, the CPE forwards the request to an upstream encrypted
   DNS. The upstream encrypted DNS can be hosted by the ISP or provided
   by a third party.</t>
      <t>Such a forwarder presence is required for (but not limuted to):</t>
      <ul spacing="normal">
        <li>
          <t>IPv4 service continuity purposes (e.g., <xref section="3.1" sectionFormat="of" target="RFC8585"/>).</t>
        </li>
        <li>
          <t>Supporting advanced services within a local network such as:
          </t>
          <ul spacing="normal">
            <li>
              <t>malware filtering,</t>
            </li>
            <li>
              <t>parental control,</t>
            </li>
            <li>
              <t>Manufacturer Usage Description (MUD) <xref target="RFC8520"/> to only allow
 intended communications to and from an IoT device, and</t>
            </li>
            <li>
              <t>offer multicast DNS proxy service for the ".local" domain <xref target="RFC6762"/>.</t>
            </li>
          </ul>
        </li>
      </ul>
      <t>When the CPE behaves as a DNS forwarder, DNS communications can be decomposed into
   two legs to resolve queries:</t>
      <ul spacing="normal">
        <li>
          <t>The leg between an internal host and the CPE.</t>
        </li>
        <li>
          <t>The leg between the CPE and an upstream DNS resolver.</t>
        </li>
      </ul>
    </section>
    <section anchor="hosting-encrypted-dns-forwarder-in-local-networks">
      <name>Hosting Encrypted DNS Forwarder in Local Networks</name>
      <t>This section discusses some deployment challenges to host an
   encrypted DNS forwarder within a local network.</t>
      <section anchor="discovery-mechanisms-and-naming-constraints">
        <name>Discovery Mechanisms and Naming Constraints</name>
        <section anchor="discovery-of-designated-resolvers-ddr">
          <name>Discovery of Designated Resolvers (DDR)</name>
          <t>DDR requires proving possession of an IP address, as the DDR
   certificate contains the server's IPv4 and IPv6 addresses and is
   signed by a certificate authority.  DDR is constrained to public IP
   addresses because (WebPKI) certificate authorities will not sign
   special-purpose IP addresses <xref target="RFC6890"/>, most notably IPv4 private-use
   <xref target="RFC1918"/>, IPv4 shared address <xref target="RFC6598"/>, or IPv6 Unique-Local
   <xref target="RFC8190"/> address space.</t>
          <t>A tempting solution for enabling an encrypted DNS forwarder with DDR is to use the CPE's WAN
   IP address for DDR and prove possession of that IP address.  However,
   the CPE's WAN IPv4 address will not be a public IPv4 address if the
   CPE is behind another layer of NAT (either Carrier Grade NAT (CGN) or
   another on-premise NAT), reducing the success of this mechanism to
   CPE's WAN IPv6 address.</t>
          <t>Also, if the ISP renumbers the subscriber's
   network suddenly (rather than slow IPv6 renumbering described in
   <xref target="RFC4192"/>), encrypted DNS service will be delayed until that new
   certificate is acquired.</t>
        </section>
        <section anchor="discovery-of-network-designated-resolvers-dnr">
          <name>Discovery of Network-designated Resolvers (DNR)</name>
          <t>DNR requires proving possession of a domain name as the encrypted
   resolver's certificate contains the FQDN. For example, the entity (e.g., ISP or
   network administrator) managing the CPE would assign a unique FQDN to
   the CPE. There are two mechanisms for the CPE to obtain the
   certificate for the FQDN: using one of its WAN IP addresses or
   requesting its signed certificate from an Internet-facing server used
   for remote CPE management (e.g., the Auto Configuration Server (ACS)
   in the CPE WAN Management Protocol <xref target="TR-069"/>).</t>
          <t>If the CPE's WAN IP address is used, the CPE needs a public IPv4 or a global unicast IPv6
   address together with DNS A or AAAA records pointing to that CPE's
   WAN address to prove possession of the DNS name to obtain a (WebPKI)
   CA-signed certificate. That is, the CPE fulfills the DNS or HTTP
   challenge discussed in Automatic Certificate Management Environment (ACME) <xref target="RFC8555"/>.  However, a CPE's WAN address
   will not be a public IPv4 address if the CPE is behind another layer
   of NAT (either a CGN or another on-premise NAT), reducing the success
   of this mechanism to a CPE's WAN IPv6 address. If the ISP renumbers the subscriber's
   network, the DNS record will also need to expire and changed to
   reflect the new IP address.</t>
        </section>
      </section>
    </section>
    <section anchor="limitations-of-existing-solutions">
      <name>Limitations of Existing Solutions</name>
      <section anchor="certificate-issuance-issues">
        <name>Certificate Issuance Issues</name>
        <t>The following lists some limitations for certificate issuance:</t>
        <ul spacing="normal">
          <li>
            <t>In case of large scale of CPEs (e.g., millions of devices),
issuing certificate request for a large number of subdomains could
be treated as an attack by the certificate authorities to
overwhelm it.</t>
          </li>
          <li>
            <t>Dependency on the CA to issue a large number of certificates.</t>
          </li>
          <li>
            <t>If the CPE uses one of its WAN IP addresses to obtain the
certificate for the FQDN, the Internet-facing HTTP server or a DNS
authoritative server on the CPE to complete the HTTP or DNS
challenge can be subjected to DDoS attacks.</t>
          </li>
        </ul>
      </section>
      <section anchor="delegated-certificate-issuance">
        <name>Delegated Certificate Issuance</name>
        <t>Let's consider that the encrypted DNS forwarder is hosted on a CPE and provisioned by a
   service (e.g., ACS) in the operator's network. Also, let's assume that each CPE is assigned
   a unique FQDN (e.g., "cpe-12345.example.com" where 12345 is a unique
   number).</t>
        <ul empty="true">
          <li>
            <t>It is best to ensure that such an FQDN does not carry any
   Personally Identifiable Information (PII) or device identification
   details like the customer number or device's serial number.</t>
          </li>
        </ul>
        <t>The CPE generates a public and private key-pair, builds a certificate signing
   request (CSR), and sends the CSR to a service in the operator
   managing the CPE.  Upon receipt of the CSR, the operator's service
   can utilize certificate management protocols like ACME <xref target="RFC8555"/> to automate
   certificate management functions such as domain validation procedure,
   certificate issuance, and certificate revocation.</t>
        <t>The challenge with this technique is that the service will have to
   communicate with the CA to issue certificates for millions of CPEs.
   If an external CA is unable to issue a certificate in time or replace
   an expired certificate, the service would no longer be able to
   present a valid certificate to a CPE.  When the service requests
   certificate issuance for a large number of subdomains (e.g., millions
   of CPEs), it may be treated as an attacker by the CA to overwhelm it.
   Furthermore, the short-lived certificates (e.g., certificates that
   expire after 90 days) issued by the CA will have to be renewed
   frequently.  With short-lived certificates, there is a smaller time
   window to renew a certificate and, therefore, a higher risk that a CA
   outage will negatively affect the uptime of the encrypted DNS
   forwarders on CPEs (and the services offered via these CPEs).</t>
        <t>These challenges can be addressed by using protocols like
   ACME to automate the certificate renewal process, ensuring certificates
   are renewed well before expiration. Additionally, incorporating another
   CA as a backup can provide redundancy and further mitigate the risk of
   outages. By having a secondary CA, the service can switch to the backup
   CA in case the primary CA is unavailable, thus maintaining continuous
   service availability and reducing the risk of service disruption.</t>
        <t>It offers the additional advantage of improving the security of
   Browser and CPE interactions. This ensures that HTTPS access to
   the CPE is possible, allowing the device administrator to securely
   communicate with and manage the CPE.</t>
      </section>
      <section anchor="limitations-of-name-constraints-extension">
        <name>Limitations of Name Constraints Extension</name>
        <t>A service managing the CPEs could get a CA certificate with name
      constraints extension (<xref section="4.2.1.10" sectionFormat="of" target="RFC5280"/>) and the
      service would in-turn act as an ACME server to provision end-entity certificates on CPEs.</t>
        <ul spacing="normal">
          <li>
            <t>Con:
            </t>
            <ul spacing="normal">
              <li>
                <t>Name constraints extension is not yet supported by CAs,
     although <xref target="RFC5280"/> was standardized way back in 2008.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Pro:
            </t>
            <ul spacing="normal">
              <li>
                <t>Avoids changing TLS client and server (e.g., stunnel or openssl).</t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="limitations-of-star-certificates">
        <name>Limitations of Star certificates</name>
        <t><xref target="RFC9115"/> defines a profile of the ACME protocol for generating
      Delegated certificates.  It allows the CPEs to request from a
      service managing the CPEs, acting as a profiled ACME server, a
      certificate for a delegated identity, i.e., one belonging to the
      service.  The service then uses the ACME protocol (with the
      extensions described in <xref target="RFC8739"/>) to request issuance of a
      short-term, Automatically Renewed (STAR) certificate for the same
      delegated identity.  The generated short-term certificate is
      automatically renewed by the ACME CA, periodically fetched by
      the CPEs, and used to act as encrypted DNS forwarders.</t>
        <t>The service can end the delegation at any time by instructing the CA
      to stop the automatic renewal and letting the certificate expire
      shortly thereafter.  Star certificates requires support by CAs but
      does not require changes to the deployed TLS ecosystem.</t>
        <ul spacing="normal">
          <li>
            <t>Cons:
            </t>
            <ul spacing="normal">
              <li>
                <t>Star certificates require support by CAs.</t>
              </li>
              <li>
                <t>A primary use case of Star certificates is that of a
     Content Delivery Network (CDN), the third party, terminating
     TLS sessions on behalf of a content provider (the holder of a
     domain name).  The number of star certificates required for a
     CDN use case will be very much lower than the use case
     discussed in this draft.  It is yet to be seen if CAs will
     agree to support star certificates at a scale of millions of
     CPEs.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Pro:
            </t>
            <ul spacing="normal">
              <li>
                <t>Avoids changing TLS client and server.</t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>DNR-related security considerations are discussed in
   <xref section="7" sectionFormat="of" target="RFC9463"/>.  Likewise, DDR-related security considerations
   are discussed in <xref section="7" sectionFormat="of" target="RFC9462"/>.</t>
      <t>The communication between the CPE and endpoints is encrypted using mechanisms such as WPA2/3,
   and any communication with the DNS server co-located on the CPE is also protected.
   However, the client does not know whether the DNS server is co-located on the CPE or not.
   If the client uses clear text DNS (i.e., Do53), it will assume that the DNS messages are susceptible to
   pervasive monitoring. For instance, in an Enterprise deployment, multiple network devices
   could exist between an endpoint and the CPE;  hosting an encrypted DNS server on
   the CPE minimizes the impact of a breach, which is an essential zero trust principle. Furthermore,
   the client and user would be able to identify the entity hosting the encrypted DNS server
   using the ADN assigned to it.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9463">
          <front>
            <title>DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers (DNR)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="T. Reddy.K" initials="T." role="editor" surname="Reddy.K"/>
            <author fullname="D. Wing" initials="D." surname="Wing"/>
            <author fullname="N. Cook" initials="N." surname="Cook"/>
            <author fullname="T. Jensen" initials="T." surname="Jensen"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies new DHCP and IPv6 Router Advertisement options to discover encrypted DNS resolvers (e.g., DNS over HTTPS, DNS over TLS, and DNS over QUIC). Particularly, it allows a host to learn an Authentication Domain Name together with a list of IP addresses and a set of service parameters to reach such encrypted DNS resolvers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9463"/>
          <seriesInfo name="DOI" value="10.17487/RFC9463"/>
        </reference>
        <reference anchor="RFC9462">
          <front>
            <title>Discovery of Designated Resolvers</title>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="E. Kinnear" initials="E." surname="Kinnear"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <author fullname="T. Jensen" initials="T." surname="Jensen"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document defines Discovery of Designated Resolvers (DDR), a set of mechanisms for DNS clients to use DNS records to discover a resolver's encrypted DNS configuration. An Encrypted DNS Resolver discovered in this manner is referred to as a "Designated Resolver". These mechanisms can be used to move from unencrypted DNS to encrypted DNS when only the IP address of a resolver is known. These mechanisms are designed to be limited to cases where Unencrypted DNS Resolvers and their Designated Resolvers are operated by the same entity or cooperating entities. It can also be used to discover support for encrypted DNS protocols when the name of an Encrypted DNS Resolver is known.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9462"/>
          <seriesInfo name="DOI" value="10.17487/RFC9462"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC9115">
          <front>
            <title>An Automatic Certificate Management Environment (ACME) Profile for Generating Delegated Certificates</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="D. López" initials="D." surname="López"/>
            <author fullname="A. Pastor Perales" initials="A." surname="Pastor Perales"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="September" year="2021"/>
            <abstract>
              <t>This document defines a profile of the Automatic Certificate Management Environment (ACME) protocol by which the holder of an identifier (e.g., a domain name) can allow a third party to obtain an X.509 certificate such that the certificate subject is the delegated identifier while the certified public key corresponds to a private key controlled by the third party. A primary use case is that of a Content Delivery Network (CDN), the third party, terminating TLS sessions on behalf of a content provider (the holder of a domain name). The presented mechanism allows the holder of the identifier to retain control over the delegation and revoke it at any time. Importantly, this mechanism does not require any modification to the deployed TLS clients and servers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9115"/>
          <seriesInfo name="DOI" value="10.17487/RFC9115"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="openwrt" target="https://openwrt.org/">
          <front>
            <title>OpenWrt Project</title>
            <author>
              <organization>OpenWrt</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="prpl" target="https://prplfoundation.org/">
          <front>
            <title>Prpl Foundation</title>
            <author>
              <organization>Prpl Foundation</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="prplwrt" target="https://prplfoundation.org/project/prplwrt/">
          <front>
            <title>Prpl WRT</title>
            <author>
              <organization>Prpl Foundation</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="TR-069" target="https://www.broadband-forum.org/technical/download/TR-069.pdf">
          <front>
            <title>CPE WAN Management Protocol</title>
            <author>
              <organization>The Broadband Forum</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC8484">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="RFC7858">
          <front>
            <title>Specification for DNS over Transport Layer Security (TLS)</title>
            <author fullname="Z. Hu" initials="Z." surname="Hu"/>
            <author fullname="L. Zhu" initials="L." surname="Zhu"/>
            <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="D. Wessels" initials="D." surname="Wessels"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
              <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7858"/>
          <seriesInfo name="DOI" value="10.17487/RFC7858"/>
        </reference>
        <reference anchor="RFC9250">
          <front>
            <title>DNS over Dedicated QUIC Connections</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>This document describes the use of QUIC to provide transport confidentiality for DNS. The encryption provided by QUIC has similar properties to those provided by TLS, while QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides more efficient packet-loss recovery than UDP. DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC 7858, and latency characteristics similar to classic DNS over UDP. This specification describes the use of DoQ as a general-purpose transport for DNS and includes the use of DoQ for stub to recursive, recursive to authoritative, and zone transfer scenarios.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9250"/>
          <seriesInfo name="DOI" value="10.17487/RFC9250"/>
        </reference>
        <reference anchor="RFC5625">
          <front>
            <title>DNS Proxy Implementation Guidelines</title>
            <author fullname="R. Bellis" initials="R." surname="Bellis"/>
            <date month="August" year="2009"/>
            <abstract>
              <t>This document provides guidelines for the implementation of DNS proxies, as found in broadband gateways and other similar network devices. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="152"/>
          <seriesInfo name="RFC" value="5625"/>
          <seriesInfo name="DOI" value="10.17487/RFC5625"/>
        </reference>
        <reference anchor="RFC9499">
          <front>
            <title>DNS Terminology</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
              <t>This document updates RFC 2308 by clarifying the definitions of "forwarder" and "QNAME". It obsoletes RFC 8499 by adding multiple terms and clarifications. Comprehensive lists of changed and new definitions can be found in Appendices A and B.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="219"/>
          <seriesInfo name="RFC" value="9499"/>
          <seriesInfo name="DOI" value="10.17487/RFC9499"/>
        </reference>
        <reference anchor="RFC8585">
          <front>
            <title>Requirements for IPv6 Customer Edge Routers to Support IPv4-as-a-Service</title>
            <author fullname="J. Palet Martinez" initials="J." surname="Palet Martinez"/>
            <author fullname="H. M.-H. Liu" initials="H. M.-H." surname="Liu"/>
            <author fullname="M. Kawashima" initials="M." surname="Kawashima"/>
            <date month="May" year="2019"/>
            <abstract>
              <t>This document specifies the IPv4 service continuity requirements for IPv6 Customer Edge (CE) routers that are provided either by the service provider or by vendors who sell through the retail market.</t>
              <t>Specifically, this document extends the basic requirements for IPv6 CE routers as described in RFC 7084 to allow the provisioning of IPv6 transition services for the support of IPv4-as-a-Service (IPv4aaS) by means of new transition mechanisms. The document only covers IPv4aaS, i.e., transition technologies for delivering IPv4 in IPv6-only access networks. IPv4aaS is necessary because there aren't sufficient IPv4 addresses available for every possible customer/ device. However, devices or applications in the customer Local Area Networks (LANs) may be IPv4-only or IPv6-only and still need to communicate with IPv4-only services on the Internet.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8585"/>
          <seriesInfo name="DOI" value="10.17487/RFC8585"/>
        </reference>
        <reference anchor="RFC8520">
          <front>
            <title>Manufacturer Usage Description Specification</title>
            <author fullname="E. Lear" initials="E." surname="Lear"/>
            <author fullname="R. Droms" initials="R." surname="Droms"/>
            <author fullname="D. Romascanu" initials="D." surname="Romascanu"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>This memo specifies a component-based architecture for Manufacturer Usage Descriptions (MUDs). The goal of MUD is to provide a means for end devices to signal to the network what sort of access and network functionality they require to properly function. The initial focus is on access control. Later work can delve into other aspects.</t>
              <t>This memo specifies two YANG modules, IPv4 and IPv6 DHCP options, a Link Layer Discovery Protocol (LLDP) TLV, a URL, an X.509 certificate extension, and a means to sign and verify the descriptions.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8520"/>
          <seriesInfo name="DOI" value="10.17487/RFC8520"/>
        </reference>
        <reference anchor="RFC6762">
          <front>
            <title>Multicast DNS</title>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <author fullname="M. Krochmal" initials="M." surname="Krochmal"/>
            <date month="February" year="2013"/>
            <abstract>
              <t>As networked devices become smaller, more portable, and more ubiquitous, the ability to operate with less configured infrastructure is increasingly important. In particular, the ability to look up DNS resource record data types (including, but not limited to, host names) in the absence of a conventional managed DNS server is useful.</t>
              <t>Multicast DNS (mDNS) provides the ability to perform DNS-like operations on the local link in the absence of any conventional Unicast DNS server. In addition, Multicast DNS designates a portion of the DNS namespace to be free for local use, without the need to pay any annual fee, and without the need to set up delegations or otherwise configure a conventional DNS server to answer for those names.</t>
              <t>The primary benefits of Multicast DNS names are that (i) they require little or no administration or configuration to set them up, (ii) they work when no infrastructure is present, and (iii) they work during infrastructure failures.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6762"/>
          <seriesInfo name="DOI" value="10.17487/RFC6762"/>
        </reference>
        <reference anchor="RFC6890">
          <front>
            <title>Special-Purpose IP Address Registries</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="L. Vegoda" initials="L." surname="Vegoda"/>
            <author fullname="R. Bonica" initials="R." role="editor" surname="Bonica"/>
            <author fullname="B. Haberman" initials="B." surname="Haberman"/>
            <date month="April" year="2013"/>
            <abstract>
              <t>This memo reiterates the assignment of an IPv4 address block (192.0.0.0/24) to IANA. It also instructs IANA to restructure its IPv4 and IPv6 Special-Purpose Address Registries. Upon restructuring, the aforementioned registries will record all special-purpose address blocks, maintaining a common set of information regarding each address block.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="153"/>
          <seriesInfo name="RFC" value="6890"/>
          <seriesInfo name="DOI" value="10.17487/RFC6890"/>
        </reference>
        <reference anchor="RFC1918">
          <front>
            <title>Address Allocation for Private Internets</title>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <author fullname="B. Moskowitz" initials="B." surname="Moskowitz"/>
            <author fullname="D. Karrenberg" initials="D." surname="Karrenberg"/>
            <author fullname="G. J. de Groot" initials="G. J." surname="de Groot"/>
            <author fullname="E. Lear" initials="E." surname="Lear"/>
            <date month="February" year="1996"/>
            <abstract>
              <t>This document describes address allocation for private internets. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="5"/>
          <seriesInfo name="RFC" value="1918"/>
          <seriesInfo name="DOI" value="10.17487/RFC1918"/>
        </reference>
        <reference anchor="RFC6598">
          <front>
            <title>IANA-Reserved IPv4 Prefix for Shared Address Space</title>
            <author fullname="J. Weil" initials="J." surname="Weil"/>
            <author fullname="V. Kuarsingh" initials="V." surname="Kuarsingh"/>
            <author fullname="C. Donley" initials="C." surname="Donley"/>
            <author fullname="C. Liljenstolpe" initials="C." surname="Liljenstolpe"/>
            <author fullname="M. Azinger" initials="M." surname="Azinger"/>
            <date month="April" year="2012"/>
            <abstract>
              <t>This document requests the allocation of an IPv4 /10 address block to be used as Shared Address Space to accommodate the needs of Carrier- Grade NAT (CGN) devices. It is anticipated that Service Providers will use this Shared Address Space to number the interfaces that connect CGN devices to Customer Premises Equipment (CPE).</t>
              <t>Shared Address Space is distinct from RFC 1918 private address space because it is intended for use on Service Provider networks. However, it may be used in a manner similar to RFC 1918 private address space on routing equipment that is able to do address translation across router interfaces when the addresses are identical on two different interfaces. Details are provided in the text of this document.</t>
              <t>This document details the allocation of an additional special-use IPv4 address block and updates RFC 5735. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="153"/>
          <seriesInfo name="RFC" value="6598"/>
          <seriesInfo name="DOI" value="10.17487/RFC6598"/>
        </reference>
        <reference anchor="RFC8190">
          <front>
            <title>Updates to the Special-Purpose IP Address Registries</title>
            <author fullname="R. Bonica" initials="R." surname="Bonica"/>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Haberman" initials="B." surname="Haberman"/>
            <author fullname="L. Vegoda" initials="L." surname="Vegoda"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>This memo updates the IANA IPv4 and IPv6 Special-Purpose Address Registries to address issues raised by the definition of a "global" prefix. It also corrects several errors in registry entries to ensure the integrity of the IANA Special-Purpose Address Registries.</t>
              <t>This memo updates RFC 6890.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="153"/>
          <seriesInfo name="RFC" value="8190"/>
          <seriesInfo name="DOI" value="10.17487/RFC8190"/>
        </reference>
        <reference anchor="RFC4192">
          <front>
            <title>Procedures for Renumbering an IPv6 Network without a Flag Day</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="E. Lear" initials="E." surname="Lear"/>
            <author fullname="R. Droms" initials="R." surname="Droms"/>
            <date month="September" year="2005"/>
            <abstract>
              <t>This document describes a procedure that can be used to renumber a network from one prefix to another. It uses IPv6's intrinsic ability to assign multiple addresses to a network interface to provide continuity of network service through a "make-before-break" transition, as well as addresses naming and configuration management issues. It also uses other IPv6 features to minimize the effort and time required to complete the transition from the old prefix to the new prefix. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4192"/>
          <seriesInfo name="DOI" value="10.17487/RFC4192"/>
        </reference>
        <reference anchor="RFC8555">
          <front>
            <title>Automatic Certificate Management Environment (ACME)</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="J. Hoffman-Andrews" initials="J." surname="Hoffman-Andrews"/>
            <author fullname="D. McCarney" initials="D." surname="McCarney"/>
            <author fullname="J. Kasten" initials="J." surname="Kasten"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>Public Key Infrastructure using X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names. Thus, certification authorities (CAs) in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate. As of this writing, this verification is done through a collection of ad hoc mechanisms. This document describes a protocol that a CA and an applicant can use to automate the process of verification and certificate issuance. The protocol also provides facilities for other certificate management functions, such as certificate revocation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8555"/>
          <seriesInfo name="DOI" value="10.17487/RFC8555"/>
        </reference>
        <reference anchor="RFC8739">
          <front>
            <title>Support for Short-Term, Automatically Renewed (STAR) Certificates in the Automated Certificate Management Environment (ACME)</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="D. Lopez" initials="D." surname="Lopez"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="A. Pastor Perales" initials="A." surname="Pastor Perales"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="March" year="2020"/>
            <abstract>
              <t>Public key certificates need to be revoked when they are compromised, that is, when the associated private key is exposed to an unauthorized entity. However, the revocation process is often unreliable. An alternative to revocation is issuing a sequence of certificates, each with a short validity period, and terminating the sequence upon compromise. This memo proposes an Automated Certificate Management Environment (ACME) extension to enable the issuance of Short-Term, Automatically Renewed (STAR) X.509 certificates.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8739"/>
          <seriesInfo name="DOI" value="10.17487/RFC8739"/>
        </reference>
        <reference anchor="I-D.reddy-add-delegated-credentials">
          <front>
            <title>Delegated Credentials to Host Encrypted DNS Forwarders on CPEs</title>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Dan Wing" initials="D." surname="Wing">
              <organization>Citrix Systems, Inc.</organization>
            </author>
            <author fullname="Shashank Jain" initials="S." surname="Jain">
              <organization>McAfee</organization>
            </author>
            <date day="1" month="December" year="2023"/>
            <abstract>
              <t>   An encrypted DNS server is authenticated by a certificate signed by a
   Certificate Authority (CA).  However, for typical encrypted DNS
   server deployments on Customer Premise Equipment (CPEs), the
   signature cannot be obtained or requires excessive interactions with
   a Certificate Authority.

   This document explores the use of TLS delegated credentials for a DNS
   server deployed on a CPE.  This approach is meant to ease operating
   DNS forwarders in CPEs while allowing to make use of encrypted DNS
   capabilities.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-reddy-add-delegated-credentials-03"/>
        </reference>
      </references>
    </references>
    <?line 384?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This draft is triggered by the discussion that occured at IETF#119 (Brisbane)
about the need to frame the problem to be solved. Thanks to all the
participants to that discussion.</t>
      <dl>
        <dt>Acknowledgements from <xref target="I-D.reddy-add-delegated-credentials"/>:</dt>
        <dd>
          <t>Thanks to Neil Cook, Martin Thomson, Tommy Pauly, Benjamin Schwartz,
   and Michael Richardson for the discussion and comments.</t>
        </dd>
      </dl>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
