<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.13 (Ruby 3.1.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-schwartz-add-ddr-forwarders-02" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.13.0 -->
  <front>
    <title abbrev="DDR and Forwarders">Reputation Verified Selection of Upstream Encrypted Resolvers</title>
    <seriesInfo name="Internet-Draft" value="draft-schwartz-add-ddr-forwarders-02"/>
    <author initials="B." surname="Schwartz" fullname="Benjamin Schwartz">
      <organization>Google LLC</organization>
      <address>
        <email>bemasc@google.com</email>
      </address>
    </author>
    <author initials="C." surname="Box" fullname="Chris Box">
      <organization>BT</organization>
      <address>
        <email>chris.box@bt.com</email>
      </address>
    </author>
    <date year="2022" month="July" day="08"/>
    <area>General</area>
    <workgroup>add</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This draft describes an extension to the Discovery of Designated Resolvers (DDR) standard, enabling use of encrypted DNS in the presence of legacy DNS forwarders.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
      mailing list (add@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/add/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/bemasc/ddr-forwarders"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>The Discovery of Designated Resolvers specification <xref target="DDR"/> describes a mechanism for clients to learn about the encrypted protocols supported by a DNS server.  It also describes a client validation policy that has strong security properties.</t>
      <t>Recent estimates suggest that a large fraction, perhaps a majority, of residential internet users in the United States and Europe rely on local DNS forwarders that are not compatible with DDR. This is because they are accessed via a private IP address, which TLS certificates cannot normally prove ownership of. Many such devices also face significant hurdles in being upgraded to support encrypted DNS, so it is likely that a large installed base of legacy DNS forwarders, providing Do53 on a private IP address, will remain for some years.</t>
      <t>A client in such a network that wants to use the network's DNS resolver is forced to use Do53. It is therefore vulnerable to passive surveillance both on the local network, and between this network and the upstream provider, even if the upstream DNS resolver supports encrypted DNS.</t>
      <t>Many of these attacks can be mitigated by using the method described in this document. In a nutshell the process is as follows.</t>
      <ol spacing="normal" type="1"><li>The client begins DDR discovery, querying for _dns.resolver.arpa.</li>
        <li>The legacy DNS forwarder, since it does not understand DDR, forwards this query upstream.</li>
        <li>The upstream recursive resolver, which supports DDR, replies with details of how to access its encrypted DNS service.</li>
        <li>The client receives this response and performs Reputation Verified Selection (see <xref target="client-policy"/>).</li>
        <li>On successful completion, the client may commence using encrypted DNS towards the upstream resolver. This is known as Cross-Forwarder Upgrade.</li>
      </ol>
      <t>By this process, Do53 is replaced with encrypted DNS for most queries. The client may wish to continue to send locally-relevant queries (e.g. .local) towards the legacy DNS forwarder.</t>
      <section anchor="scope">
        <name>Scope</name>
        <t>This document describes the interaction between DDR and legacy DNS forwarders.</t>
        <t>DNS forwarders and resolvers that are implemented with awareness of DDR are out of scope, as they are not affected by this discussion (although see Security Considerations, <xref target="security-considerations"/>).</t>
        <t>IPv6-only networks whose default DNS server has a Global Unicast Address are out of scope, even if this server is actually a simple forwarder.  If the DNS server does not use a private IP address, it is not a "legacy DNS forwarder" under this draft's definition.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <t>Private IP Address - Any IP address reserved for loopback <xref target="RFC1122"/>, link-local <xref target="RFC3927"/>, private <xref target="RFC1918"/>, local <xref target="RFC4193"/>, or Carrier-Grade NAT <xref target="RFC6598"/> use.</t>
      <t>Legacy DNS Forwarder - An apparent DNS resolver, known to the client only by a private IP address, that forwards the client's queries to an upstream resolver, and has not been updated with any knowledge of DDR.</t>
      <t>Cross-Forwarder Upgrade - Establishment and use of a direct, encrypted connection between the client and the upstream resolver.</t>
    </section>
    <section anchor="client-policy">
      <name>Reputation Verified Selection (RVS)</name>
      <t>Reputation Verified Selection (RVS) is a method for validating whether connection using DDR is allowed.  Clients <bcp14>MAY</bcp14> use RVS when (a) the local DNS server is identified by a Private IP address and (b) the DDR SVCB resolution process does not produce any Encrypted DNS endpoints that have this IP address in their A or AAAA records.  RVS then proceeds as follows:</t>
      <ol spacing="normal" type="1"><li>The client connects to one of the indicated Encrypted DNS endpoints.</li>
        <li>The client receives a certificate, which it verifies to a suitable root of trust.</li>
        <li>
          <t>For each identity (e.g. SubjectAltName) in the certificate, the client constructs a Resolver Identity:  </t>
          <ul spacing="normal">
            <li>For DNS over TLS and DNS over QUIC, the Resolver Identity is an IP address or hostname and the port number used for the connection.</li>
            <li>For DNS over HTTPS, the Resolver Identity is a URI Template in absolute form, containing the port number used for the connection and path indicated by <tt>dohpath</tt>.</li>
          </ul>
        </li>
        <li>The client determines the reputation of each Resolver Identity derived from the certificate.</li>
        <li>The maximum (i.e. most favorable) reputation is the reputation of this connection.</li>
      </ol>
      <t>Successful validation then permits cross-forwarder upgrade.</t>
      <ul empty="true">
        <li>
          <t>OPEN QUESTION: Would it be better to use the SVCB TargetName to select a single Resolver Identity?  This would avoid the need to enumerate the certificate's names, but it would require the use of SNI (unlike standard DDR), and would not be compatible with all upstream encrypted resolvers.</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>OPEN QUESTION: Can we simplify the resolver identity to just a domain name?  This would make reputation systems easier, but it would not allow distinct reputation for different colocated resolution services, so reputation providers would have to be sure that no approved resolver has other interesting colocated services.</t>
        </li>
      </ul>
      <t>This process <bcp14>MUST</bcp14> be repeated whenever a new TLS session is established, but reputation scores for each resolver endpoint <bcp14>MAY</bcp14> be cached.</t>
      <t>For DNS over HTTPS, the <tt>:authority</tt> pseudo-header <bcp14>MUST</bcp14> reflect the Resolver Identity with the most favorable reputation, to ensure that the HTTP requests are well-formed and are directed to the intended service.  If the Resolver Identity is a wildcard, the reputation system <bcp14>MUST</bcp14> replace it with a valid hostname that matches the wildcard.</t>
      <t>Assessing reputation limits the ability of a DDR forgery attack to cause harm, as it will only allow an attacker to direct clients to a resolver they consider trustworthy. Major DoH client implementations already include lists of known or trusted resolvers <xref target="CHROME-DOH"/><xref target="MICROSOFT-DOH"/><xref target="MOZILLA-TRR"/>.</t>
      <t>Clients <bcp14>SHOULD</bcp14> start by checking the resolver endpoint with the numerically lowest SVCB SvcPriority.  Clients <bcp14>MAY</bcp14> wait until a DNS query triggers an Encrypted DNS connection attempt before performing this verification.</t>
      <t>If RVS encounters an error or rejects the server, the client <bcp14>MUST NOT</bcp14> send encrypted DNS queries to that server.  If RVS rejects all compatible ServiceMode records, the client <bcp14>MUST</bcp14> fall back to the unencrypted resolver (i.e. plaintext DNS on port 53).</t>
      <section anchor="reputation-systems">
        <name>Reputation systems</name>
        <t>Embedding a list of known trusted resolvers in a client is only one possible model for assessing the reputation of a resolver. In future a range of online reputation services might be available to be queried, each returning an answer according to their own specific criteria. These might involve answers on other properties such as jurisdiction, or certification by a particular body. It is out of scope for this document to define these query methods, other than to note that designers should be aware of bootstrapping problems. It is the client's decision as to how to combine these answers, possibly using additional metadata (e.g. location), to make a determination of reputation.</t>
      </section>
      <section anchor="using-resolvers-of-intermediate-reputation">
        <name>Using resolvers of intermediate reputation</name>
        <t>If the determined reputation is a binary "definitely trustworthy" or "definitely malicious", the client's recommended action is clear. However, intermediate trust levels are also possible (e.g. "probably safe", "newly launched"). In these cases there are some options clients can consider:</t>
        <ul spacing="normal">
          <li>The client can simply decline to the use the encrypted service. In this case, unless there is another option, the client will fall back to Do53.</li>
          <li>The client can ask the user about a specific domain names that appear in the certificate. These names might be recognizable to the user, e.g. as that of an ISP. It's also possible to present more details about why a Resolver Identity lacks some element of reputation.</li>
          <li>The client can use the encrypted service for a limited time, as a means of mitigating interception attacks.  For example, if the client limits the DDR response TTL to 5 minutes, this ensures that any attacker can continue to redirect queries for at most 5 minutes after they have left the local network.</li>
        </ul>
      </section>
    </section>
    <section anchor="management-of-local-blocking-functionality">
      <name>Management of local blocking functionality</name>
      <t>Certain local DNS forwarders block access to domains associated with malware and other threats. Others block based on the category of service provided by those domains, e.g. domains hosting services that are not appropriate for a work or school environment. In the short term to ensure this service is not lost due to a cross-forwarder upgrade, the maintainers can simply add "resolver.arpa" to their actively curated list of domains to block. This pattern has been deployed by Mozilla, with the domain "use-application-dns.net" <xref target="MOZILLA-CANARY"/>.</t>
      <t>In the long term, it is best for filtering DNS forwarders to implement support for encrypted DNS. The following subsections describe some ways to implement this.</t>
      <section anchor="local-implementation-with-dnr">
        <name>Local implementation with DNR</name>
        <t>The local forwarder can be upgraded to one that implements an encrypted DNS service discoverable through DNR. This requires a TLS certificate on the local device, proving ownership of the chosen Authentication Domain Name (ADN). Onward queries to the internet <bcp14>SHOULD</bcp14> also be protected with encryption.</t>
      </section>
      <section anchor="local-implementation-with-ddr">
        <name>Local implementation with DDR</name>
        <t>If the local forwarder can be upgraded to offer an encrypted DNS service, this can then be made discoverable through classic DDR. If the device has a private IP (as presumed for RVS), a self-signed certificate is sufficient as long as the client supports the Opportunistic Discovery mode of DDR. Onward queries to the internet <bcp14>SHOULD</bcp14> also be protected with encryption.</t>
      </section>
      <section anchor="move-upstream">
        <name>Move upstream</name>
        <t>The blocking functionality can be moved to the upstream resolver. Cross-forwarder upgrade then enables the service to continue, as long as the upstream resolver has sufficient reputation.</t>
      </section>
    </section>
    <section anchor="compatibility-issues-that-can-arise-from-cross-forwarder-upgrade">
      <name>Compatibility issues that can arise from cross-forwarder upgrade</name>
      <t>Legacy DNS forwarders sometimes provide various additional services that would be lost in the event of a cross-forwarder upgrade. For all of these, a possible general mitigation is to provide users or administrators with the ability to control whether DDR is used with legacy forwarders. For example, this control could be provided via a preference, or via a notification upon discovering a new upstream resolver. Specific mitigations are also described below.</t>
      <section anchor="split-horizon-namespaces">
        <name>Split-horizon namespaces</name>
        <t>Some local network resolvers contain additional names that are not resolvable in the global DNS. A simple cross-forwarder upgrade might lose access to these local names. Clients <bcp14>SHOULD</bcp14> be aware of well-known suffixes (e.g. .local, .home.arpa.) that require local resolution. Dynamic discovery of local prefixes would help this issue. To address any remaining ones, the following mitigation can be used.</t>
        <section anchor="mitigation-nxdomain-fallback">
          <name>Mitigation: NXDOMAIN Fallback</name>
          <t>In "NXDOMAIN Fallback", the client repeats a query to the unencrypted resolver if the encrypted resolver returns NXDOMAIN.  This allows the resolution of local names, provided they do not collide with globally resolvable names (as required by <xref target="RFC2826"/>).</t>
          <t>This is similar to the fallback behavior currently deployed in Mozilla Firefox <xref target="FIREFOX-FALLBACK"/>.</t>
          <t>NXDOMAIN Fallback results in slight changes to the security and privacy properties of encrypted DNS.  Queries for nonexistent names no longer have protection against a local passive adversary, and local names are revealed to the upstream resolver.</t>
          <t>NXDOMAIN Fallback is only applicable when a legacy DNS forwarder might be present, i.e. the unencrypted resolver has a private IP address, and the encrypted resolver has a different IP address.  In other DDR configurations, any local names are expected to resolve similarly on both resolvers.</t>
        </section>
      </section>
      <section anchor="interposable-domains">
        <name>Interposable domains</name>
        <t>An "interposable domain" is a domain whose owner deliberately allows resolvers to forge certain responses.  This arrangement is most common for search engines, which often support a configuration where resolvers forge a CNAME record to direct all clients to a child-appropriate instance of the search engine <xref target="DUCK-CNAME"/><xref target="BING-CNAME"/><xref target="GOOGLE-CNAME"/>.</t>
        <t>Future deployments of interposable domains can instruct administrators to enable or disable DDR when adding the forged record, but forged records in legacy DNS forwarders could be lost due to a cross-forwarder upgrade.</t>
        <section anchor="mitigation-exemption-list">
          <name>Mitigation: Exemption list</name>
          <t>There are a small number of pre-existing interposable domains, largely of interest only to web browsers.  Clients can maintain a list of relevant interposable domains and resolve them only via the network's resolver.</t>
        </section>
      </section>
      <section anchor="caching">
        <name>Caching</name>
        <t>Many legacy DNS forwarders also provide a shared cache for all network users. Cross-forwarder upgrades will bypass this cache, resulting in slower DNS resolution for some queries.</t>
        <section anchor="mitigation-stub-caches">
          <name>Mitigation: Stub caches</name>
          <t>Clients can compensate partially for any loss of shared caching by implementing local DNS caches.  This mitigation is already widely deployed in browsers and operating systems.</t>
        </section>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <section anchor="privacy-gains">
        <name>Privacy gains</name>
        <t>The conservative validation policy results in no encryption when a legacy DNS forwarder is present.  This leaves the user's query activity vulnerable to passive monitoring <xref target="RFC7258"/>, either on the local network or between the user and the upstream resolver.</t>
        <t>Reputation Verified Selection enables the use of encrypted transport in these configurations, reducing exposure to a passive surveillance adversary.</t>
      </section>
      <section anchor="privacy-losses">
        <name>Privacy losses</name>
        <t>In some legacy DNS forwarder implementations, the upstream resolver is not able to determine whether two queries were issued by the same client inside the network. It can only see aggregated queries being made by the forwarder. <xref target="DDR"/> to a non-local resolver requires individual encrypted DNS connections from each device, revealing which queries were made by the same client. RVS shares this property.</t>
        <section anchor="mitigation-open-multiple-connections">
          <name>Mitigation: Open multiple connections</name>
          <t>If the above issue is a concern, clients <bcp14>MAY</bcp14> open multiple connections to the designated encrypted resolver with separate local state (e.g. TLS session tickets), and distribute queries among them. This may reduce the upstream resolver's ability to link queries that came from a single client.</t>
        </section>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>When the client uses the conservative validation policy described in <xref target="DDR"/>, the client can establish a secure DDR connection only in the absence of an active attacker.  An on-path attacker can impersonate the resolver and intercept all queries, by preventing the DDR upgrade.</t>
      <t>This basic security analysis also applies if the client uses Reputation Verified Selection.  However, the detailed security properties differ, as discussed in this section.</t>
      <section anchor="redirection">
        <name>Redirection</name>
        <t>An on-path attacker might be located on the local network, or between the local network and the upstream resolver. In either case, the attacker can redirect the client to a resolver of the attacker's choice, <em>as long as that resolver meets the client's requirements for reputation</em>. Hence the reputation system is essential to the security of the user.</t>
        <t>Weaknesses in the reputation system could reopen this class of vulnerabilities.</t>
        <section anchor="possible-weakness-stale-reputation">
          <name>Possible weakness: Stale reputation</name>
          <t>If a previously-reputable resolver is compromised, users can be redirected to it while this reputation remains high.  Once an attack has been detected, it should be reported to relevant reputation services so that they can revise their assessment of this resolver.</t>
        </section>
        <section anchor="possible-weakness-inappropriate-reputation">
          <name>Possible weakness: Inappropriate reputation</name>
          <t>The reputation of a resolver might depend on aspects of the client's connection context, e.g. their geographic location.  For example, a local ISP's resolver could be reputable for clients in its service area, but suspicious for clients on distant continent.  Accordingly, very large reputation systems may need to customize their results based on the context.</t>
        </section>
      </section>
      <section anchor="forensic-logging">
        <name>Forensic logging</name>
        <section anchor="network-layer-logging">
          <name>Network-layer logging</name>
          <t>With the conservative validation policy, a random sample of IP packets is likely sufficient for manual retrospective detection of a DNS redirection attack.</t>
          <t>With Reputation Verified Selection, local forensic logs must capture a specific packet (the attacker's DDR designation response) to enable retrospective detection of a redirection attack.</t>
          <section anchor="additional-mitigation-log-all-ddr-responses">
            <name>Additional Mitigation: Log all DDR responses</name>
            <t>Redirection attacks are largely mitigated by RVS, but the loss of network-layer logging for such attacks can be mitigated by logging all DDR responses, or more generally all DNS responses.  This makes retrospective attack detection straightforward, as the attacker's DDR response will indicate an unexpected server.</t>
          </section>
        </section>
        <section anchor="dns-layer-logging">
          <name>DNS-layer logging</name>
          <t>DNS-layer forensic logging conducted by a legacy DNS forwarder would be lost in a cross-forwarder upgrade.</t>
          <section anchor="solution-plan-to-upgrade">
            <name>Solution: Plan to upgrade</name>
            <t>Forwarders that want to observe all queries from RVS clients should plan to implement DDR or DNR. In the short term it is possible for the forwarder to disable DDR by responding negatively to _dns.resolver.arpa, but this is not recommended long-term as it prevents confidentiality protection.</t>
          </section>
        </section>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="FIREFOX-FALLBACK" target="https://support.mozilla.org/en-US/kb/firefox-dns-over-https#w_about-our-rollout-of-dns-over-https">
          <front>
            <title>About our rollout of DNS over HTTPS</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="MOZILLA-CANARY" target="https://support.mozilla.org/en-US/kb/canary-domain-use-application-dnsnet">
          <front>
            <title>Canary domain - use-application-dns.net</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="DUCK-CNAME" target="https://help.duckduckgo.com/duckduckgo-help-pages/features/safe-search/">
          <front>
            <title>Force Safe Search at a Network Level</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="BING-CNAME" target="https://help.bing.microsoft.com/#apex/bing/en-us/10003/0">
          <front>
            <title>Block adult content with SafeSearch - Map at a network level</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="GOOGLE-CNAME" target="https://support.google.com/websearch/answer/186669?hl=en">
          <front>
            <title>Keep SafeSearch turned on for your school, workplace, or home network</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="MOZILLA-TRR" target="https://wiki.mozilla.org/Security/DOH-resolver-policy#Mozilla_Policy_Requirements_for_DNS_over_HTTPs_Partners">
          <front>
            <title>Mozilla Policy Requirements for DNS over HTTPs Partners</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="CHROME-DOH" target="https://docs.google.com/document/d/128i2YTV2C7T6Gr3I-81zlQ-_Lprnsp24qzy_20Z1Psw/edit">
          <front>
            <title>DoH providers: criteria, process for Chrome</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="MICROSOFT-DOH" target="https://docs.microsoft.com/en-us/windows-server/networking/dns/doh-client-support#determine-which-doh-servers-are-on-the-known-server-list">
          <front>
            <title>Determine which DoH servers are on the known server list</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="DDR">
          <front>
            <title>Discovery of Designated Resolvers</title>
            <author fullname="Tommy Pauly">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Eric Kinnear">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Christopher A. Wood">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Patrick McManus">
              <organization>Fastly</organization>
            </author>
            <author fullname="Tommy Jensen">
              <organization>Microsoft</organization>
            </author>
            <date day="5" month="July" year="2022"/>
            <abstract>
              <t>   This document defines Discovery of Designated Resolvers (DDR), a
   mechanism for DNS clients to use DNS records to discover a resolver's
   encrypted DNS configuration.  An encrypted resolver discovered in
   this manner is referred to as a "Designated Resolver".  This
   mechanism can be used to move from unencrypted DNS to encrypted DNS
   when only the IP address of a resolver is known.  This mechanism is
   designed to be limited to cases where unencrypted resolvers and their
   designated resolvers are operated by the same entity or cooperating
   entities.  It can also be used to discover support for encrypted DNS
   protocols when the name of an encrypted resolver is known.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-add-ddr-08"/>
        </reference>
        <reference anchor="RFC1122">
          <front>
            <title>Requirements for Internet Hosts - Communication Layers</title>
            <author fullname="R. Braden" initials="R." role="editor" surname="Braden">
              <organization/>
            </author>
            <date month="October" year="1989"/>
            <abstract>
              <t>This RFC is an official specification for the Internet community.  It incorporates by reference, amends, corrects, and supplements the primary protocol standards documents relating to hosts.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="3"/>
          <seriesInfo name="RFC" value="1122"/>
          <seriesInfo name="DOI" value="10.17487/RFC1122"/>
        </reference>
        <reference anchor="RFC3927">
          <front>
            <title>Dynamic Configuration of IPv4 Link-Local Addresses</title>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire">
              <organization/>
            </author>
            <author fullname="B. Aboba" initials="B." surname="Aboba">
              <organization/>
            </author>
            <author fullname="E. Guttman" initials="E." surname="Guttman">
              <organization/>
            </author>
            <date month="May" year="2005"/>
            <abstract>
              <t>To participate in wide-area IP networking, a host needs to be configured with IP addresses for its interfaces, either manually by the user or automatically from a source on the network such as a Dynamic Host Configuration Protocol (DHCP) server.  Unfortunately, such address configuration information may not always be available. It is therefore beneficial for a host to be able to depend on a useful subset of IP networking functions even when no address configuration is available.  This document describes how a host may automatically configure an interface with an IPv4 address within the 169.254/16 prefix that is valid for communication with other devices connected to the same physical (or logical) link.</t>
              <t>IPv4 Link-Local addresses are not suitable for communication with devices not directly connected to the same physical (or logical) link, and are only used where stable, routable addresses are not available (such as on ad hoc or isolated networks).  This document does not recommend that IPv4 Link-Local addresses and routable addresses be configured simultaneously on the same interface.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3927"/>
          <seriesInfo name="DOI" value="10.17487/RFC3927"/>
        </reference>
        <reference anchor="RFC1918">
          <front>
            <title>Address Allocation for Private Internets</title>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter">
              <organization/>
            </author>
            <author fullname="B. Moskowitz" initials="B." surname="Moskowitz">
              <organization/>
            </author>
            <author fullname="D. Karrenberg" initials="D." surname="Karrenberg">
              <organization/>
            </author>
            <author fullname="G. J. de Groot" initials="G. J." surname="de Groot">
              <organization/>
            </author>
            <author fullname="E. Lear" initials="E." surname="Lear">
              <organization/>
            </author>
            <date month="February" year="1996"/>
            <abstract>
              <t>This document describes address allocation for private internets.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="5"/>
          <seriesInfo name="RFC" value="1918"/>
          <seriesInfo name="DOI" value="10.17487/RFC1918"/>
        </reference>
        <reference anchor="RFC4193">
          <front>
            <title>Unique Local IPv6 Unicast Addresses</title>
            <author fullname="R. Hinden" initials="R." surname="Hinden">
              <organization/>
            </author>
            <author fullname="B. Haberman" initials="B." surname="Haberman">
              <organization/>
            </author>
            <date month="October" year="2005"/>
            <abstract>
              <t>This document defines an IPv6 unicast address format that is globally unique and is intended for local communications, usually inside of a site. These addresses are not expected to be routable on the global Internet.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4193"/>
          <seriesInfo name="DOI" value="10.17487/RFC4193"/>
        </reference>
        <reference anchor="RFC6598">
          <front>
            <title>IANA-Reserved IPv4 Prefix for Shared Address Space</title>
            <author fullname="J. Weil" initials="J." surname="Weil">
              <organization/>
            </author>
            <author fullname="V. Kuarsingh" initials="V." surname="Kuarsingh">
              <organization/>
            </author>
            <author fullname="C. Donley" initials="C." surname="Donley">
              <organization/>
            </author>
            <author fullname="C. Liljenstolpe" initials="C." surname="Liljenstolpe">
              <organization/>
            </author>
            <author fullname="M. Azinger" initials="M." surname="Azinger">
              <organization/>
            </author>
            <date month="April" year="2012"/>
            <abstract>
              <t>This document requests the allocation of an IPv4 /10 address block to be used as Shared Address Space to accommodate the needs of Carrier- Grade NAT (CGN) devices.  It is anticipated that Service Providers will use this Shared Address Space to number the interfaces that connect CGN devices to Customer Premises Equipment (CPE).</t>
              <t>Shared Address Space is distinct from RFC 1918 private address space because it is intended for use on Service Provider networks. However, it may be used in a manner similar to RFC 1918 private address space on routing equipment that is able to do address translation across router interfaces when the addresses are identical on two different interfaces.  Details are provided in the text of this document.</t>
              <t>This document details the allocation of an additional special-use IPv4 address block and updates RFC 5735.  This memo documents an  Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="153"/>
          <seriesInfo name="RFC" value="6598"/>
          <seriesInfo name="DOI" value="10.17487/RFC6598"/>
        </reference>
        <reference anchor="RFC2826">
          <front>
            <title>IAB Technical Comment on the Unique DNS Root</title>
            <author>
              <organization>Internet Architecture Board</organization>
            </author>
            <date month="May" year="2000"/>
            <abstract>
              <t>This document discusses the existence of a globally unique public name space in the Internet called the DNS (Domain Name System).  This name space is a hierarchical name space derived from a single, globally unique root.  It is a technical constraint inherent in the design of the DNS.  One root must be supported by a set of coordinated root servers administered by a unique naming authority.  It is not technically feasible for there to be more than one root in the public DNS.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2826"/>
          <seriesInfo name="DOI" value="10.17487/RFC2826"/>
        </reference>
        <reference anchor="RFC7258">
          <front>
            <title>Pervasive Monitoring Is an Attack</title>
            <author fullname="S. Farrell" initials="S." surname="Farrell">
              <organization/>
            </author>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
              <organization/>
            </author>
            <date month="May" year="2014"/>
            <abstract>
              <t>Pervasive monitoring is a technical attack that should be mitigated in the design of IETF protocols, where possible.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="188"/>
          <seriesInfo name="RFC" value="7258"/>
          <seriesInfo name="DOI" value="10.17487/RFC7258"/>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to Anthony Lieuallen and Eric Orth for early reviews of a previous draft.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
