<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.12 -->
<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-schwartz-add-ddr-forwarders-01" category="info" obsoletes="" updates="" submissionType="IETF" xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.10.0 -->
  <front>
    <title abbrev="DDR and Forwarders">Discovery of Designated Resolvers in the Presence of Legacy Forwarders</title>
    <seriesInfo name="Internet-Draft" value="draft-schwartz-add-ddr-forwarders-01"/>
    <author initials="B." surname="Schwartz" fullname="Benjamin Schwartz">
      <organization>Google LLC</organization>
      <address>
        <email>bemasc@google.com</email>
      </address>
    </author>
    <author initials="C." surname="Box" fullname="Chris Box">
      <organization>BT</organization>
      <address>
        <email>chris.box@bt.com</email>
      </address>
    </author>
    <date year="2021" month="October" day="22"/>
    <area>General</area>
    <workgroup>dprive</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This draft describes how the Discovery of Designated Resolvers (DDR) standard interacts with legacy DNS forwarders, including potential incompatibilities and relevant mitigations.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
      mailing list (add@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/add/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/bemasc/ddr-forwarders"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="conventions-and-definitions" numbered="true" toc="default">
      <name>Conventions and Definitions</name>
      <t>Private IP Address - Any IP address reserved for loopback <xref target="RFC1122" format="default"/>, link-local <xref target="RFC3927" format="default"/>, private <xref target="RFC1918" format="default"/>, local <xref target="RFC4193" format="default"/>, or Carrier-Grade NAT <xref target="RFC6598" format="default"/> use.</t>
      <t>Legacy DNS Forwarder - An apparent DNS resolver, known to the client only by a private IP address, that forwards the client's queries to an upstream resolver, and has not been updated with any knowledge of DDR.</t>
      <t>Cross-Forwarder Upgrade - Establishment of a direct, encrypted connection between the client and the upstream resolver.</t>
    </section>
    <section anchor="introduction" numbered="true" toc="default">
      <name>Introduction</name>
      <section anchor="background" numbered="true" toc="default">
        <name>Background</name>
        <t>The Discovery of Designated Resolvers specification <xref target="DDR" format="default"/> describes a mechanism for clients to learn about the encrypted protocols supported by a DNS server.  It also describes a conservative client validation policy that has strong security properties and is unlikely to create compatibility problems.</t>
        <t>On the topic of client validation of encrypted DNS transports, the DDR specification says:</t>
        <ul empty="true">
          <li>
            <t>If the IP address of a Designated Resolver differs from that of an Unencrypted Resolver, clients MUST validate that the IP address of the Unencrypted Resolver is covered by the SubjectAlternativeName of the Encrypted Resolver's TLS certificate</t>
          </li>
        </ul>
        <t>As TLS certificates cannot cover private IP addresses, this prevents clients that are behind a legacy DNS forwarder from connecting directly to the upstream resolver ("cross-forwarder upgrade").</t>
        <t>Recent estimates suggest that a large fraction, perhaps a majority, of residential internet users in the United States and Europe rely on local DNS forwarders that are not compatible with DDR.</t>
      </section>
      <section anchor="scope" numbered="true" toc="default">
        <name>Scope</name>
        <t>This informational document describes the interaction between DDR and legacy DNS forwarders.  It discusses possible client policies, problems that might arise, and relevant mitigations.</t>
        <t>DNS forwarders and resolvers that are implemented with awareness of DDR are out of scope, as they are not affected by this discussion (although see Security Considerations, <xref target="security-considerations" format="default"/>).</t>
        <t>IPv6-only networks whose default DNS server has a Global Unicast Address are out of scope, even if this server is actually a simple forwarder.  If the DNS server does not use a private IP address, it is not a "legacy DNS forwarder" under this draft's definition.</t>
      </section>
    </section>
    <section anchor="client-policy" numbered="true" toc="default">
      <name>Relaxed Validation client policy</name>
      <t>We define a "relaxed validation" client policy as a client behavior that removes the certificate validation requirement when the Unencrypted Resolver is identified by a private IP address, regardless of the Designated Resolver's IP address.  Instead, under this condition, the client connects using the Opportunistic Privacy Profile of encrypted DNS (<xref section="4.1" sectionFormat="comma" target="RFC7858" format="default"/>).</t>
      <t>The Opportunistic Privacy Profile is a broad category, including clients that "might or might not validate" the TLS certificate chain even though there is no authentication identity for the server.  This kind of validation can be valuable when combined with a reputation system or a user approval step (see <xref target="reputation" format="default"/> and <xref target="user-controls" format="default"/>).</t>
      <t>This client policy is otherwise identical to the one described in <xref section="4" sectionFormat="of" target="DDR" format="default"/>.</t>
    </section>
    <section anchor="naturally-compatible-behaviors" numbered="true" toc="default">
      <name>Naturally compatible behaviors</name>
      <t>The following system behaviors are naturally compatible with relaxed validation.</t>
      <section anchor="compatible-behaviors-in-the-local-network" numbered="true" toc="default">
        <name>Compatible behaviors in the local network</name>
        <section anchor="malware-and-threat-domain-filtering" numbered="true" toc="default">
          <name>Malware and threat domain filtering</name>
          <t>Certain DNS forwarders block access to domains associated with malware and other threats.  Such threats rely on frequently changing domains, so these forwarders necessarily maintain an actively curated list of domains to block.  To ensure that this service is not lost due to a cross-forwarder upgrade, the maintainers can simply add "resolver.arpa" to the list.</t>
          <t>This pattern has been deployed by Mozilla, with the domain "use-application-dns.net" <xref target="MOZILLA-CANARY" format="default"/>.</t>
        </section>
        <section anchor="service-category-restrictions" numbered="true" toc="default">
          <name>Service category restrictions</name>
          <t>Certain DNS forwarders may block access to domains based on the category of service provided by those domains, e.g. domains hosting services that are not appropriate for a work or school environment.  As in the previous section, this requires an actively curated list of domains, because the set of domains that offer a given type of service is constantly changing.  An actively managed blocking list can easily be revised to include "resolver.arpa".</t>
        </section>
        <section anchor="time-of-use-restrictions" numbered="true" toc="default">
          <name>Time of use restrictions</name>
          <t>Certain networks may impose restrictions on the time or duration of use by certain users.  This behavior is necessarily implemented below the DNS layer, because DNS-based blocking would be ineffective due to stub resolver caching, so it is not affected by changes in the DNS resolver.</t>
        </section>
      </section>
      <section anchor="upstream-resolver-services" numbered="true" toc="default">
        <name>Upstream resolver services</name>
        <t>The forwarder's upstream resolver might provide additional services, such as filtering.  These services are generally independent of cross-forwarder upgrade, and hence naturally compatible.</t>
        <t>In special cases where the upstream resolver requires cooperation from a legacy forwarder (e.g. for marking certain queries), one solution is for the upstream resolver to choose not to deploy DDR until all cooperating forwarders have been upgraded.  Alternatively, each legacy forwarder can block "resolver.arpa" as described above.</t>
      </section>
    </section>
    <section anchor="privacy-considerations" numbered="true" toc="default">
      <name>Privacy Considerations</name>
      <t>The conservative validation policy results in no encryption when a legacy DNS forwarder is present.  This leaves the user's query activity vulnerable to passive monitoring <xref target="RFC7258" format="default"/>, either on the local network or between the user and the upstream resolver.</t>
      <t>The relaxed validation policy allows the use of encrypted transport in these configurations, reducing exposure to a passive surveillance adversary.</t>
    </section>
    <section anchor="security-considerations" numbered="true" toc="default">
      <name>Security Considerations</name>
      <t>When the client uses the conservative validation policy described in <xref target="DDR" format="default"/>, and a DDR-enabled resolver is identified by a private IP address, the client can establish a secure DDR connection only in the absence of an active attacker.  An on-path attacker can impersonate the resolver and intercept all queries, by preventing the DDR upgrade or advertising their own DDR endpoint.</t>
      <t>These basic security properties also apply if the client uses the relaxed validation policy described in <xref target="client-policy" format="default"/>.  Nonetheless, there are some subtle but important differences in the security properties of these two policies.</t>
      <section anchor="transient-attackers" numbered="true" toc="default">
        <name>Transient attackers</name>
        <t>With the conservative validation policy, a transient on-path attacker can only intercept queries for the duration of their active presence on the network, because the client will only send queries to the original (private) server IP address.</t>
        <t>With the relaxed validation behavior, a transient on-path attacker could implant a long-lived DDR response in the client's cache, directing its queries to an attacker-controlled server on the public internet.  This would allow the attack to continue long after the attacker has left the network.</t>
        <t>Solving or mitigating this attack is of great importance for the user's security.</t>
        <section anchor="solution-dnr" numbered="true" toc="default">
          <name>Solution: DNR</name>
          <t>This attack does not apply if the client and network implement support for Discovery of Network-designated Resolvers, as that mechanism takes precedence over DDR (see <xref section="3.2" sectionFormat="of" target="DNR" format="default"/>).</t>
        </section>
        <section anchor="mitigation-frequent-refresh" numbered="true" toc="default">
          <name>Mitigation: Frequent refresh</name>
          <t>The client can choose to refresh the DDR record arbitrarily frequently, e.g. by limiting the TTL.  For example, by limiting the TTL to 5 minutes, a client could ensure that any attacker can continue to monitor queries for at most 5 minutes after they have left the local network.</t>
        </section>
        <section anchor="reputation" numbered="true" toc="default">
          <name>Mitigation: Resolver reputation</name>
          <t>A relaxed-validation client might choose to accept a potential cross-forwarder upgrade only if the designated encrypted resolver has sufficient reputation, according to some proprietary reputation scheme (e.g. a locally stored list of respectable resolvers).  This limits the ability of a DDR forgery attack to cause harm.</t>
          <t>Major DoH client implementations already include lists of known resolvers <xref target="CHROME-DOH" format="default"/><xref target="MICROSOFT-DOH" format="default"/><xref target="MOZILLA-TRR" format="default"/>.</t>
        </section>
      </section>
      <section anchor="forensic-logging" numbered="true" toc="default">
        <name>Forensic logging</name>
        <section anchor="network-layer-logging" numbered="true" toc="default">
          <name>Network-layer logging</name>
          <t>With the conservative validation policy, a random sample of IP packets is likely sufficient for manual retrospective detection of an active attack.</t>
          <t>With the relaxed validation policy, forensic logs must capture a specific packet (the attacker's DDR designation response) to enable retrospective detection.</t>
          <section anchor="mitigation-log-all-ddr-responses" numbered="true" toc="default">
            <name>Mitigation: Log all DDR responses</name>
            <t>Network-layer forensic logs that are not integrated with the resolver can enable detection of these attacks by logging all DDR responses, or more generally all DNS responses.  This makes retrospective attack detection straightforward, as the attacker's DDR response will indicate an unexpected server.</t>
          </section>
        </section>
        <section anchor="dns-layer-logging" numbered="true" toc="default">
          <name>DNS-layer logging</name>
          <t>DNS-layer forensic logging conducted by a legacy DNS forwarder would be lost in a cross-forwarder upgrade.</t>
          <section anchor="solution-respond-for-resolverarpa" numbered="true" toc="default">
            <name>Solution: Respond for resolver.arpa</name>
            <t>Forwarders that want to observe all queries from relaxed validation clients will have to synthesize their own response for resolver.arpa, either implementing DDR or disabling it.</t>
          </section>
        </section>
      </section>
    </section>
    <section anchor="compatibility-considerations" numbered="true" toc="default">
      <name>Compatibility Considerations</name>
      <t>Using DDR with legacy DNS forwarders also raises several potential concerns related to loss of existing network services.</t>
      <section anchor="split-horizon-namespaces" numbered="true" toc="default">
        <name>Split-horizon namespaces</name>
        <t>Some network resolvers contain additional names that are not resolvable in the global DNS.  If these local resolvers are also legacy DNS forwarders, a client that performs a cross-forwarder upgrade might lose access to these local names.</t>
        <section anchor="mitigation-nxdomain-fallback" numbered="true" toc="default">
          <name>Mitigation: NXDOMAIN Fallback</name>
          <t>In "NXDOMAIN Fallback", the client repeats a query to the unencrypted resolver if the encrypted resolver returns NXDOMAIN.  This allows the resolution of local names, provided they do not collide with globally resolvable names (as required by <xref target="RFC2826" format="default"/>).</t>
          <t>This is similar to the fallback behavior currently deployed in Mozilla Firefox <xref target="FIREFOX-FALLBACK" format="default"/>.</t>
          <t>NXDOMAIN Fallback results in slight changes to the security and privacy properties of encrypted DNS.  Queries for nonexistent names no longer have protection against a local passive adversary, and local names are revealed to the upstream resolver.</t>
          <t>NXDOMAIN Fallback is only applicable when a legacy DNS forwarder might be present, i.e. the unencrypted resolver has a private IP address, and the encrypted resolver has a different IP address.  In the other DDR configurations, any local names are expected to resolve similarly on both resolvers.</t>
        </section>
      </section>
      <section anchor="interposable-domains" numbered="true" toc="default">
        <name>Interposable domains</name>
        <t>An "interposable domain" is a domain whose owner deliberately allows resolvers to forge certain responses.  This arrangement is most common for search engines, which often support a configuration where resolvers forge a CNAME record to direct all clients to a child-appropriate instance of the search engine <xref target="DUCK-CNAME" format="default"/><xref target="BING-CNAME" format="default"/><xref target="GOOGLE-CNAME" format="default"/>.</t>
        <t>Future deployments of interposable domains can instruct administrators to enable or disable DDR when adding the forged record, but forged records in legacy DNS forwarders could be lost due to a cross-forwarder upgrade.</t>
        <section anchor="mitigation-exemption-list" numbered="true" toc="default">
          <name>Mitigation: Exemption list</name>
          <t>There are a small number of pre-existing interposable domains, largely of interest only to web browsers.  Clients can maintain a list of relevant interposable domains and resolve them only via the network's resolver.</t>
        </section>
      </section>
      <section anchor="caching" numbered="true" toc="default">
        <name>Caching</name>
        <t>Some legacy DNS forwarders also provide a shared cache for all network users.  Cross-forwarder upgrades will bypass this cache, resulting in slower DNS resolution.</t>
        <section anchor="mitigation-stub-caches" numbered="true" toc="default">
          <name>Mitigation: Stub caches</name>
          <t>Clients can compensate partially for any loss of shared caching by implementing local DNS caches.  This mitigation is already widely deployed in browsers and operating systems.</t>
        </section>
      </section>
      <section anchor="user-controls" numbered="true" toc="default">
        <name>General mitigation: User controls</name>
        <t>For these and other compatibility concerns, a possible mitigation is to provide users or administrators with the ability to control whether DDR is used with legacy forwarders.  For example, this control could be provided via a general preference, or via a notification upon discovering a new upstream resolver.</t>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>Informative References</name>
      <reference anchor="FIREFOX-FALLBACK" target="https://support.mozilla.org/en-US/kb/firefox-dns-over-https#w_about-our-rollout-of-dns-over-https">
        <front>
          <title>About our rollout of DNS over HTTPS</title>
          <author>
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="MOZILLA-CANARY" target="https://support.mozilla.org/en-US/kb/canary-domain-use-application-dnsnet">
        <front>
          <title>Canary domain - use-application-dns.net</title>
          <author>
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="DUCK-CNAME" target="https://help.duckduckgo.com/duckduckgo-help-pages/features/safe-search/">
        <front>
          <title>Force Safe Search at a Network Level</title>
          <author>
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="BING-CNAME" target="https://help.bing.microsoft.com/#apex/bing/en-us/10003/0">
        <front>
          <title>Block adult content with SafeSearch - Map at a network level</title>
          <author>
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="GOOGLE-CNAME" target="https://support.google.com/websearch/answer/186669?hl=en">
        <front>
          <title>Keep SafeSearch turned on for your school, workplace, or home network</title>
          <author>
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="MOZILLA-TRR" target="https://wiki.mozilla.org/Security/DOH-resolver-policy#Mozilla_Policy_Requirements_for_DNS_over_HTTPs_Partners">
        <front>
          <title>Mozilla Policy Requirements for DNS over HTTPs Partners</title>
          <author>
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="CHROME-DOH" target="https://docs.google.com/document/d/128i2YTV2C7T6Gr3I-81zlQ-_Lprnsp24qzy_20Z1Psw/edit">
        <front>
          <title>DoH providers: criteria, process for Chrome</title>
          <author>
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="MICROSOFT-DOH" target="https://docs.microsoft.com/en-us/windows-server/networking/dns/doh-client-support#determine-which-doh-servers-are-on-the-known-server-list">
        <front>
          <title>Determine which DoH servers are on the known server list</title>
          <author>
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="RFC1122">
        <front>
          <title>Requirements for Internet Hosts - Communication Layers</title>
          <author fullname="R. Braden" initials="R." role="editor" surname="Braden">
            <organization/>
          </author>
          <date month="October" year="1989"/>
          <abstract>
            <t>This RFC is an official specification for the Internet community.  It incorporates by reference, amends, corrects, and supplements the primary protocol standards documents relating to hosts.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="3"/>
        <seriesInfo name="RFC" value="1122"/>
        <seriesInfo name="DOI" value="10.17487/RFC1122"/>
      </reference>
      <reference anchor="RFC3927">
        <front>
          <title>Dynamic Configuration of IPv4 Link-Local Addresses</title>
          <author fullname="S. Cheshire" initials="S." surname="Cheshire">
            <organization/>
          </author>
          <author fullname="B. Aboba" initials="B." surname="Aboba">
            <organization/>
          </author>
          <author fullname="E. Guttman" initials="E." surname="Guttman">
            <organization/>
          </author>
          <date month="May" year="2005"/>
          <abstract>
            <t>To participate in wide-area IP networking, a host needs to be configured with IP addresses for its interfaces, either manually by the user or automatically from a source on the network such as a Dynamic Host Configuration Protocol (DHCP) server.  Unfortunately, such address configuration information may not always be available. It is therefore beneficial for a host to be able to depend on a useful subset of IP networking functions even when no address configuration is available.  This document describes how a host may automatically configure an interface with an IPv4 address within the 169.254/16 prefix that is valid for communication with other devices connected to the same physical (or logical) link.</t>
            <t>IPv4 Link-Local addresses are not suitable for communication with devices not directly connected to the same physical (or logical) link, and are only used where stable, routable addresses are not available (such as on ad hoc or isolated networks).  This document does not recommend that IPv4 Link-Local addresses and routable addresses be configured simultaneously on the same interface.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3927"/>
        <seriesInfo name="DOI" value="10.17487/RFC3927"/>
      </reference>
      <reference anchor="RFC1918">
        <front>
          <title>Address Allocation for Private Internets</title>
          <author fullname="Y. Rekhter" initials="Y." surname="Rekhter">
            <organization/>
          </author>
          <author fullname="B. Moskowitz" initials="B." surname="Moskowitz">
            <organization/>
          </author>
          <author fullname="D. Karrenberg" initials="D." surname="Karrenberg">
            <organization/>
          </author>
          <author fullname="G. J. de Groot" initials="G. J." surname="de Groot">
            <organization/>
          </author>
          <author fullname="E. Lear" initials="E." surname="Lear">
            <organization/>
          </author>
          <date month="February" year="1996"/>
          <abstract>
            <t>This document describes address allocation for private internets.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="5"/>
        <seriesInfo name="RFC" value="1918"/>
        <seriesInfo name="DOI" value="10.17487/RFC1918"/>
      </reference>
      <reference anchor="RFC4193">
        <front>
          <title>Unique Local IPv6 Unicast Addresses</title>
          <author fullname="R. Hinden" initials="R." surname="Hinden">
            <organization/>
          </author>
          <author fullname="B. Haberman" initials="B." surname="Haberman">
            <organization/>
          </author>
          <date month="October" year="2005"/>
          <abstract>
            <t>This document defines an IPv6 unicast address format that is globally unique and is intended for local communications, usually inside of a site. These addresses are not expected to be routable on the global Internet.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4193"/>
        <seriesInfo name="DOI" value="10.17487/RFC4193"/>
      </reference>
      <reference anchor="RFC6598">
        <front>
          <title>IANA-Reserved IPv4 Prefix for Shared Address Space</title>
          <author fullname="J. Weil" initials="J." surname="Weil">
            <organization/>
          </author>
          <author fullname="V. Kuarsingh" initials="V." surname="Kuarsingh">
            <organization/>
          </author>
          <author fullname="C. Donley" initials="C." surname="Donley">
            <organization/>
          </author>
          <author fullname="C. Liljenstolpe" initials="C." surname="Liljenstolpe">
            <organization/>
          </author>
          <author fullname="M. Azinger" initials="M." surname="Azinger">
            <organization/>
          </author>
          <date month="April" year="2012"/>
          <abstract>
            <t>This document requests the allocation of an IPv4 /10 address block to be used as Shared Address Space to accommodate the needs of Carrier- Grade NAT (CGN) devices.  It is anticipated that Service Providers will use this Shared Address Space to number the interfaces that connect CGN devices to Customer Premises Equipment (CPE).</t>
            <t>Shared Address Space is distinct from RFC 1918 private address space because it is intended for use on Service Provider networks. However, it may be used in a manner similar to RFC 1918 private address space on routing equipment that is able to do address translation across router interfaces when the addresses are identical on two different interfaces.  Details are provided in the text of this document.</t>
            <t>This document details the allocation of an additional special-use IPv4 address block and updates RFC 5735.  This memo documents an  Internet Best Current Practice.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="153"/>
        <seriesInfo name="RFC" value="6598"/>
        <seriesInfo name="DOI" value="10.17487/RFC6598"/>
      </reference>
      <reference anchor="DDR">
        <front>
          <title>Discovery of Designated Resolvers</title>
          <author fullname="Tommy Pauly">
            <organization>Apple Inc.</organization>
          </author>
          <author fullname="Eric Kinnear">
            <organization>Apple Inc.</organization>
          </author>
          <author fullname="Christopher A. Wood">
            <organization>Cloudflare</organization>
          </author>
          <author fullname="Patrick McManus">
            <organization>Fastly</organization>
          </author>
          <author fullname="Tommy Jensen">
            <organization>Microsoft</organization>
          </author>
          <date day="1" month="October" year="2021"/>
          <abstract>
            <t>   This document defines Discovery of Designated Resolvers (DDR), a
   mechanism for DNS clients to use DNS records to discover a resolver's
   encrypted DNS configuration.  This mechanism can be used to move from
   unencrypted DNS to encrypted DNS when only the IP address of a
   resolver is known.  This mechanism is designed to be limited to cases
   where unencrypted resolvers and their designated resolvers are
   operated by the same entity or cooperating entities.  It can also be
   used to discover support for encrypted DNS protocols when the name of
   an encrypted resolver is known.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-add-ddr-03"/>
      </reference>
      <reference anchor="RFC7858">
        <front>
          <title>Specification for DNS over Transport Layer Security (TLS)</title>
          <author fullname="Z. Hu" initials="Z." surname="Hu">
            <organization/>
          </author>
          <author fullname="L. Zhu" initials="L." surname="Zhu">
            <organization/>
          </author>
          <author fullname="J. Heidemann" initials="J." surname="Heidemann">
            <organization/>
          </author>
          <author fullname="A. Mankin" initials="A." surname="Mankin">
            <organization/>
          </author>
          <author fullname="D. Wessels" initials="D." surname="Wessels">
            <organization/>
          </author>
          <author fullname="P. Hoffman" initials="P." surname="Hoffman">
            <organization/>
          </author>
          <date month="May" year="2016"/>
          <abstract>
            <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS.  Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626.  In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
            <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group.  It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7858"/>
        <seriesInfo name="DOI" value="10.17487/RFC7858"/>
      </reference>
      <reference anchor="RFC7258">
        <front>
          <title>Pervasive Monitoring Is an Attack</title>
          <author fullname="S. Farrell" initials="S." surname="Farrell">
            <organization/>
          </author>
          <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
            <organization/>
          </author>
          <date month="May" year="2014"/>
          <abstract>
            <t>Pervasive monitoring is a technical attack that should be mitigated in the design of IETF protocols, where possible.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="188"/>
        <seriesInfo name="RFC" value="7258"/>
        <seriesInfo name="DOI" value="10.17487/RFC7258"/>
      </reference>
      <reference anchor="DNR">
        <front>
          <title>DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers (DNR)</title>
          <author fullname="Mohamed Boucadair">
            <organization>Orange</organization>
          </author>
          <author fullname="Tirumaleswar Reddy">
            <organization>McAfee, Inc.</organization>
          </author>
          <author fullname="Dan Wing">
            <organization>Citrix Systems, Inc.</organization>
          </author>
          <author fullname="Neil Cook">
            <organization>Open-Xchange</organization>
          </author>
          <author fullname="Tommy Jensen">
            <organization>Microsoft</organization>
          </author>
          <date day="17" month="May" year="2021"/>
          <abstract>
            <t>   The document specifies new DHCP and IPv6 Router Advertisement options
   to discover encrypted DNS servers (e.g., DNS-over-HTTPS, DNS-over-
   TLS, DNS-over-QUIC).  Particularly, it allows to learn an
   authentication domain name together with a list of IP addresses and a
   set of service parameters to reach such encrypted DNS servers.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-add-dnr-02"/>
      </reference>
      <reference anchor="RFC2826">
        <front>
          <title>IAB Technical Comment on the Unique DNS Root</title>
          <author>
            <organization>Internet Architecture Board</organization>
          </author>
          <date month="May" year="2000"/>
          <abstract>
            <t>This document discusses the existence of a globally unique public name space in the Internet called the DNS (Domain Name System).  This name space is a hierarchical name space derived from a single, globally unique root.  It is a technical constraint inherent in the design of the DNS.  One root must be supported by a set of coordinated root servers administered by a unique naming authority.  It is not technically feasible for there to be more than one root in the public DNS.  This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="2826"/>
        <seriesInfo name="DOI" value="10.17487/RFC2826"/>
      </reference>
    </references>
    <section numbered="false" anchor="acknowledgments" toc="default">
      <name>Acknowledgments</name>
      <t>Thanks to Anthony Lieuallen and Eric Orth for early reviews.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
