<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.23 (Ruby 3.3.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-sst-dnsop-probe-name-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.27.0 -->
  <front>
    <title abbrev="DNS Probe Name">Standardized Query Name for DNS Resolver Reachability Probes</title>
    <seriesInfo name="Internet-Draft" value="draft-sst-dnsop-probe-name-00"/>
    <author fullname="Benjamin M. Schwartz">
      <organization>Meta Platforms, Inc.</organization>
      <address>
        <email>ietf@bemasc.net</email>
      </address>
    </author>
    <author fullname="Puneet Sood">
      <organization>Google</organization>
      <address>
        <email>puneets@google.com</email>
      </address>
    </author>
    <author fullname="John Todd">
      <organization>Quad9</organization>
      <address>
        <email>jtodd@quad9.net</email>
      </address>
    </author>
    <date year="2025" month="February" day="20"/>
    <area/>
    <workgroup>Domain Name System Operations</workgroup>
    <abstract>
      <?line 37?>

<t>This specification standardizes DNS names that should be used for checking connectivity to a DNS server.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-sst-dnsop-probe-name/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/bemasc/probe-name"/>.</t>
    </note>
  </front>
  <middle>
    <?line 42?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>In the Domain Name System (DNS, <xref target="RFC1034"/>), clients normally send queries to a recursive resolver in order to receive the resolution results.  However, some clients also send queries merely to check that a response is received at all.  We call these queries "DNS probes".  DNS probes are used for many reasons:</t>
      <ul spacing="normal">
        <li>
          <t>To determine if the network is working at all.</t>
        </li>
        <li>
          <t>To detect if a particular address family is connected to the global internet.</t>
        </li>
        <li>
          <t>To check that the client is able to reach the resolver's IP address.</t>
        </li>
        <li>
          <t>To assess the reliability and performance of the network path between the client and the resolver.</t>
        </li>
        <li>
          <t>To establish which transport protocols (e.g., UDP, TCP, TLS <xref target="RFC7858"/>, QUIC <xref target="RFC9250"/>) are available.</t>
        </li>
        <li>
          <t>To confirm that the DNS resolver itself is operational.</t>
        </li>
      </ul>
      <t>When sending a DNS query, the client must choose a QNAME.  Popular QNAME values for probes include:</t>
      <ul spacing="normal">
        <li>
          <t>Names owned by the entity performing the probe.</t>
        </li>
        <li>
          <t>Names used by prominent, high-reliability internet services.</t>
        </li>
        <li>
          <t>Names operated at the direction of prominent internet organizations such as the IETF (e.g., "example.com", <xref target="RFC2606"/>).</t>
        </li>
        <li>
          <t>Names that form an essential part of the internet infrastructure.</t>
        </li>
      </ul>
      <t>These choices are pragmatic, but they also present a number of downsides for the client:</t>
      <ul spacing="normal">
        <li>
          <t>The response could be delayed if the selected name is not in cache.</t>
        </li>
        <li>
          <t>The probe will return unneeded RDATA, wasting bandwidth.</t>
        </li>
        <li>
          <t>Depending on the success criteria, the probe could report a spurious failure
          </t>
          <ul spacing="normal">
            <li>
              <t>if the selected name is removed, or experiences an outage.</t>
            </li>
            <li>
              <t>if the resolver experiences an interruption on its outbound link.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>A distinctive QNAME could enable unwanted fingerprinting of the client by the resolver or a network adversary.</t>
        </li>
      </ul>
      <t>These popular types of QNAME also present some downsides for the resolver operator:</t>
      <ul spacing="normal">
        <li>
          <t>The probe may cause the resolver to do more work than necessary, especially when the selected name is not in cache.</t>
        </li>
        <li>
          <t>The operator cannot distinguish probe queries from ordinary queries, limiting their understanding of how their service is being used.</t>
        </li>
      </ul>
      <t>This specification registers a Special-Use Domain Name for DNS probing to avoid these downsides.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="client-requirements">
      <name>Client Requirements</name>
      <t>Clients <bcp14>SHOULD</bcp14> set the QNAME on probe queries to "probe.resolver.arpa.".</t>
      <t>Clients <bcp14>SHOULD</bcp14> set the QTYPE to A or AAAA.  Clients that use other QTYPEs are at a higher risk of implementation fingerprinting due to the distinctive QTYPE.</t>
      <t>Clients <bcp14>SHOULD NOT</bcp14> set the "DNSSEC OK" flag.  Setting this bit causes more work for the resolver, but does not provide any benefit to the client.</t>
      <t>Clients <bcp14>SHOULD</bcp14> avoid any stub caching, as this would cause probe results to be out of date.</t>
      <t>Clients <bcp14>MAY</bcp14> set the "Recursion Desired" flag to either value.  Setting this flag to 0 reduces load on resolvers that do not implement this specification.</t>
      <section anchor="using-getaddrinfo">
        <name>Using <tt>getaddrinfo</tt></name>
        <t>Clients <bcp14>MAY</bcp14> perform probe queries using a high-level DNS query interface such as <tt>getaddrinfo</tt> (<xref section="6.1" sectionFormat="comma" target="RFC3493"/>).  Note that implementations of <tt>getaddrinfo</tt> and similar interfaces often employ a stub cache, resulting in probe results that may not be fresh.  These implementations typically retry queries across several servers until one responds successfully, so the result may not be attributable to a specific resolver and cannot be used to assess the network's latency or packet loss rate.</t>
        <t>Clients that use <tt>getaddrinfo</tt> for probes <bcp14>SHOULD</bcp14> call it with the following input parameters:</t>
        <ul spacing="normal">
          <li>
            <t>nodename = "probe.resolver.arpa."</t>
          </li>
          <li>
            <t>servname = null</t>
          </li>
          <li>
            <t>hints = null or all zeros except for .ai_family</t>
          </li>
        </ul>
        <t>Clients <bcp14>SHOULD</bcp14> interpret the <tt>getaddrinfo</tt> return value as follows:</t>
        <ul spacing="normal">
          <li>
            <t>EAI_NONAME: The probe has succeeded.</t>
          </li>
          <li>
            <t>EAI_AGAIN: The probe has failed.</t>
          </li>
          <li>
            <t>0: The resolver is misconfigured (returning addresses where there should be none).</t>
          </li>
          <li>
            <t>Any other error: The client system is misconfigured.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="server-requirements">
      <name>Server Requirements</name>
      <t>Upon receiving a query with a QNAME of "probe.resolver.arpa.", DNS servers <bcp14>MUST</bcp14> return a valid NXDOMAIN response from the "resolver.arpa." locally-served zone <xref target="RFC9462"/>.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>If a resolver operator applies rate limits to queries, it <bcp14>SHOULD NOT</bcp14> exclude "probe.resolver.arpa" from such limits.  Queries for this name could still be used as part of a high query rate attack.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="special-use-domain-name-proberesolverarpa">
        <name>Special Use Domain Name "probe.resolver.arpa"</name>
        <t>This document calls for the addition of "probe.resolver.arpa" to the Special-Use Domain Names (SUDN) registry established by <xref target="RFC6761"/>.</t>
      </section>
      <section anchor="domain-name-reservation-considerations">
        <name>Domain Name Reservation Considerations</name>
        <t>In accordance with <xref section="5" sectionFormat="of" target="RFC6761"/>, the answers to the following questions are provided for this document:</t>
        <t>1) Are human users expected to recognize these names as special and use them
differently? In what way?</t>
        <t>No.  This name is principally intended to be useful to resolver operators, and should never be seen by ordinary users.</t>
        <t>2) Are writers of application software expected to make their software
recognize these names as special and treat them differently? In what way?</t>
        <t>Yes.  Writers of DNS resolver monitoring software are expected to categorize queries for this name as distinct from ordinary user-generated queries.</t>
        <t>3) Are writers of name resolution APIs and libraries expected to make their
software recognize these names as special and treat them differently? If so, how?</t>
        <t>No.  Stub resolvers process this name in the ordinary fashion.</t>
        <t>4) Are developers of caching domain name servers expected to make their
implementations recognize these names as special and treat them differently?
If so, how?</t>
        <t>No.  This name is subject to ordinary caching logic.</t>
        <t>5) Are developers of authoritative domain name servers expected to make their
implementations recognize these names as special and treat them differently?
If so, how?</t>
        <t>No.  Queries for this name are not intended to reach authoritative domain name servers.</t>
        <t>6) Does this reserved Special-Use Domain Name have any potential impact on
DNS server operators? If they try to configure their authoritative DNS server
as authoritative for this reserved name, will compliant name server software
reject it as invalid? Do DNS server operators need to know about that and
understand why? Even if the name server software doesn't prevent them from
using this reserved name, are there other ways that it may not work as expected,
of which the DNS server operator should be aware?</t>
        <t>This name has no special impact on DNS server operators beyond those already implied by the status of "resolver.arpa." as a Locally Served Zone.</t>
        <t>7) How should DNS Registries/Registrars treat requests to register this reserved
domain name? Should such requests be denied? Should such requests be allowed,
but only to a specially-designated entity?</t>
        <t>This name is inside an existing Locally Served Zone ("resolver.arpa."), so the question of registration requests is moot.</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC1034">
          <front>
            <title>Domain names - concepts and facilities</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised basic definition of The Domain Name System. It obsoletes RFC-882. This memo describes the domain style names and their used for host address look up and electronic mail forwarding. It discusses the clients and servers in the domain name system and the protocol used between them.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1034"/>
          <seriesInfo name="DOI" value="10.17487/RFC1034"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC6761">
          <front>
            <title>Special-Use Domain Names</title>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <author fullname="M. Krochmal" initials="M." surname="Krochmal"/>
            <date month="February" year="2013"/>
            <abstract>
              <t>This document describes what it means to say that a Domain Name (DNS name) is reserved for special use, when reserving such a name is appropriate, and the procedure for doing so. It establishes an IANA registry for such domain names, and seeds it with entries for some of the already established special domain names.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6761"/>
          <seriesInfo name="DOI" value="10.17487/RFC6761"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC7858">
          <front>
            <title>Specification for DNS over Transport Layer Security (TLS)</title>
            <author fullname="Z. Hu" initials="Z." surname="Hu"/>
            <author fullname="L. Zhu" initials="L." surname="Zhu"/>
            <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="D. Wessels" initials="D." surname="Wessels"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
              <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7858"/>
          <seriesInfo name="DOI" value="10.17487/RFC7858"/>
        </reference>
        <reference anchor="RFC9250">
          <front>
            <title>DNS over Dedicated QUIC Connections</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>This document describes the use of QUIC to provide transport confidentiality for DNS. The encryption provided by QUIC has similar properties to those provided by TLS, while QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides more efficient packet-loss recovery than UDP. DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC 7858, and latency characteristics similar to classic DNS over UDP. This specification describes the use of DoQ as a general-purpose transport for DNS and includes the use of DoQ for stub to recursive, recursive to authoritative, and zone transfer scenarios.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9250"/>
          <seriesInfo name="DOI" value="10.17487/RFC9250"/>
        </reference>
        <reference anchor="RFC2606">
          <front>
            <title>Reserved Top Level DNS Names</title>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
            <author fullname="A. Panitz" initials="A." surname="Panitz"/>
            <date month="June" year="1999"/>
            <abstract>
              <t>To reduce the likelihood of conflict and confusion, a few top level domain names are reserved for use in private testing, as examples in documentation, and the like. In addition, a few second level domain names reserved for use as examples are documented. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="32"/>
          <seriesInfo name="RFC" value="2606"/>
          <seriesInfo name="DOI" value="10.17487/RFC2606"/>
        </reference>
        <reference anchor="RFC3493">
          <front>
            <title>Basic Socket Interface Extensions for IPv6</title>
            <author fullname="R. Gilligan" initials="R." surname="Gilligan"/>
            <author fullname="S. Thomson" initials="S." surname="Thomson"/>
            <author fullname="J. Bound" initials="J." surname="Bound"/>
            <author fullname="J. McCann" initials="J." surname="McCann"/>
            <author fullname="W. Stevens" initials="W." surname="Stevens"/>
            <date month="February" year="2003"/>
            <abstract>
              <t>The de facto standard Application Program Interface (API) for TCP/IP applications is the "sockets" interface. Although this API was developed for Unix in the early 1980s it has also been implemented on a wide variety of non-Unix systems. TCP/IP applications written using the sockets API have in the past enjoyed a high degree of portability and we would like the same portability with IPv6 applications. But changes are required to the sockets API to support IPv6 and this memo describes these changes. These include a new socket address structure to carry IPv6 addresses, new address conversion functions, and some new socket options. These extensions are designed to provide access to the basic IPv6 features required by TCP and UDP applications, including multicasting, while introducing a minimum of change into the system and providing complete compatibility for existing IPv4 applications. Additional extensions for advanced IPv6 features (raw sockets and access to the IPv6 extension headers) are defined in another document. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3493"/>
          <seriesInfo name="DOI" value="10.17487/RFC3493"/>
        </reference>
        <reference anchor="RFC9462">
          <front>
            <title>Discovery of Designated Resolvers</title>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="E. Kinnear" initials="E." surname="Kinnear"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <author fullname="T. Jensen" initials="T." surname="Jensen"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document defines Discovery of Designated Resolvers (DDR), a set of mechanisms for DNS clients to use DNS records to discover a resolver's encrypted DNS configuration. An Encrypted DNS Resolver discovered in this manner is referred to as a "Designated Resolver". These mechanisms can be used to move from unencrypted DNS to encrypted DNS when only the IP address of a resolver is known. These mechanisms are designed to be limited to cases where Unencrypted DNS Resolvers and their Designated Resolvers are operated by the same entity or cooperating entities. It can also be used to discover support for encrypted DNS protocols when the name of an Encrypted DNS Resolver is known.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9462"/>
          <seriesInfo name="DOI" value="10.17487/RFC9462"/>
        </reference>
      </references>
    </references>
    <?line 190?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
