<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-lamps-caa-security-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.29.0 -->
  <front>
    <title abbrev="CAA Security Tag">CAA Security Tag for Cryptographically-Constrained Domain Validation</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-caa-security-01"/>
    <author fullname="Henry Birge-Lee">
      <organization>Princeton University</organization>
      <address>
        <email>birgelee@princeton.edu</email>
      </address>
    </author>
    <author fullname="Grace Cimaszewski">
      <organization>Princeton University</organization>
      <address>
        <email>gcimaszewski@princeton.edu</email>
      </address>
    </author>
    <author fullname="Cyrill E. Krähenbühl">
      <organization>Princeton University</organization>
      <address>
        <email>cyrill.k@princeton.edu</email>
      </address>
    </author>
    <author fullname="Liang Wang">
      <organization>Princeton University</organization>
      <address>
        <email>lw19@princeton.edu</email>
      </address>
    </author>
    <author fullname="Aaron Gable">
      <organization>ISRG</organization>
      <address>
        <email>aaron@letsencrypt.org</email>
      </address>
    </author>
    <author fullname="Prateek Mittal">
      <organization>Princeton University</organization>
      <address>
        <email>pmittal@princeton.edu</email>
      </address>
    </author>
    <date year="2025" month="June" day="20"/>
    <area>Security</area>
    <workgroup>Limited Additional Mechanisms for PKIX and SMIME</workgroup>
    <keyword>PKI</keyword>
    <keyword>CAA</keyword>
    <abstract>
      <?line 68?>

<t>Cryptographic domain validation procedures leverage authenticated communication channels to ensure resilience against attacks by both on-path and off-path network adversaries which attempt to tamper with communications between the Certification Authority (CA) and the network resources related to the domain contained in the certificate.
Domain owners can leverage "security" Property Tags specified in CAA records (defined in <xref target="RFC8659"/>) with the critical flag set, to ensure that CAs perform cryptographically-constrained domain validation during their issuance procedure, hence defending against global man-in-the-middle adversaries.
This document defines the syntax of the CAA security Property as well as acceptable means for cryptographically-constrained domain validation procedures.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://birgelee.github.io/draft-caa-security-tag/-ietf-lamps-caa-security.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-lamps-caa-security/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Limited Additional Mechanisms for PKIX and SMIME Working Group mailing list (<eref target="mailto:spasm@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/spasm/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/spasm/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/birgelee/draft-caa-security-tag"/>.</t>
    </note>
  </front>
  <middle>
    <?line 75?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>A CAA security Property Tag is compliant with <xref target="RFC8659"/> and puts restrictions on the circumstances under which a CA is allowed to sign a certificate for a given domain.
A security Property Tag on a domain implies that validation for this domain must be done in a manner that defends against network adversaries even if an adversary is capable of intercepting and/or modifying communication between the CA and the network resources related to the domain being validated.
Issuance of a certificate to a domain with a security Property Tag <bcp14>MUST</bcp14> follow one of the specified Cryptographically-constrained Domain Validation (CDV) methods outlined in this document or future extensions.
CDV methods <bcp14>MUST</bcp14> rely on protocols (like DNSSEC or DoH/DoT) that offer security properties even in the presence of man-in-the-middle adversaries that can intercept any communication occurring over the public Internet.</t>
      <t>Not all CDV methods are themselves compliant with the CA/Browser Forum's Baseline Requirements for the Issuance and Management of Publicly-Trusted TLS Server Certificates.
Hence, any CDV method that does not meet the CA/Browser Forum Baseline Requirements for TLS server certificate issuance must be used in conjunction with such a compliant domain validation method.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<section anchor="cryptographic-domain-validation">
        <name>Cryptographic Domain Validation</name>
        <t>The goal of cryptographically-constrained domain validation is to ensure that domain validation is based on communication channels that are authenticated through cryptographic operations.</t>
        <section anchor="threat-model">
          <name>Threat Model</name>
          <t>Cryptographic domain validation defends against a network adversary that can block, intercept, modify, and forge arbitrary network packets sent between a CA and the domain's network resources, but cannot forge cryptographic objects, such as signatures and encrypted data.
Cryptographic domain validation is based on DNS and thus assumes that a domain owner can securely mange their DNS records, i.e., communication between the domain owner and their DNS infrastructure is protected against network adversaries.
Similarly, communication between the entity generating the private key and requesting the certificate, e.g., the domain owner, and the webserver(s) where the private key and certificate are installed, is assumed to be protected against network adversaries.
Furthermore, it assumes that all CAs are benign and correctly follow all necessary validation procedures as described in the relevant standardization documents.</t>
          <t>Cryptographic domain validation can be used on domains that are contained in both domain validation certificates (where only the domain name in a certificate is validated) and extended or organization validated certificates (where information like organization identity as well as domain name is validated).
Cryptographic domain validation only hardens the security of the validation of domain names, not broader identities (e.g., organization names).
The use of cryptographically-constrained domain validation in an OV or EV certificate only improves the validation of the domain name(s) contained in the certificate (in the common name or subject-alternate names fields) and does not impact the validation of other forms of identity contained in the certificate.
Use of cryptographically-constrained domain validation in a DV certificate does not imply validation of any identity beyond the domain name(s) in the certificate.</t>
          <t>The defense involves the domain owner specifying a policy indicating their desire for cryptographically-constrained domain validation via DNS CAA records and securely communicating these records to all CAs.
Hence, a core aspect of cryptographically-constrained domain validation is 1) ensuring secure policy lookups, and 2) preventing downgrade attacks that convince a CA to issue a certificate using non-cryptographically-constrained domain validation.</t>
        </section>
        <section anchor="secure-policy-lookup">
          <name>Secure Policy Lookup</name>
          <t>The authenticity of the retrieved security CAA record <bcp14>SHOULD</bcp14> be protected to prevent an active network adversary from modifying its content.
Authenticity can either be ensured by signing the security CAA record or by retrieving the security CAA record via an authenticated channel.
Any security CAA record not protected by such a signature or authenticated channel may not benefit from the security properties outlined in this document. The term "authenticated DNS lookup" refers a DNS lookup that is authenticated using either a signed record or an authenticated channel.</t>
          <section anchor="signed-record">
            <name>Signed Record</name>
            <t>A security CAA record <bcp14>SHOULD</bcp14> be protected with a valid DNSSEC signature chain going back to the ICANN DNSSEC root, to prove the authenticity of the record and its content.</t>
          </section>
          <section anchor="authenticated-channel">
            <name>Authenticated Channel</name>
            <t>If it is not possible to have a DNSSEC signature chain back to the ICANN root, security CAA records <bcp14>SHOULD</bcp14> alternately be hosted on an authoritative DNS resolver that supports recursive-to-authoritative authenticated channels.
Authenticated channels between recursive and authoritative nameservers could be deployed as described in <xref target="RFC9539"/> and leverage DoT, DoQ, or DoH as protocols providing an authenticated channel.
Since secure policy lookup considers a more stringent threat model than the passive network adversary in <xref target="RFC9539"/>, the deployment <bcp14>MUST</bcp14> also implement defenses against active adversaries highlighted in <xref section="B" sectionFormat="of" target="RFC9539"/>.
One option to implement these defenses is by creating DNSSEC-protected SVCB DNS records at the authoritative nameserver.
These SVCB records provide a signaling mechanism for authoritative nameservers offering authenticated channel.
Furthermore, the authenticity of the TLS certificate public key used to establish the channel <bcp14>MUST</bcp14> be protected, e.g., by specifying the public key hash as an SVCB parameter.
This step is crucial to achieve our desired security properties, since it eliminates the circular dependency of requiring an authentic TLS certificate to secure the issuance of new TLS certificate.</t>
          </section>
        </section>
        <section anchor="downgrade-prevention">
          <name>Downgrade Prevention</name>
          <t>To ensure that the CAA security Property is immediately and incrementally deployable without requiring all publicly-trusted CAs to understand the property, the CAA record containing the property <bcp14>MUST</bcp14> set the critical flag.</t>
          <t>Serving security CAA records over authenticated DNS channels or using authenticated DNS records (i.e., DNSSEC) is critical to the effectiveness of the records because a security CAA record not protected by authenticated DNS may be suppressed by an adversary that can manipulate DNS responses.
This could potentially allow the adversary to downgrade validation to use a low-security method and undermine the security properties of the security Property Tag.</t>
          <t>If DNSSEC is used to authenticate the CAA record, a CA <bcp14>MUST</bcp14> only accept the non-existence of a security CAA record if its non-existence is proven by NSEC record as described in <xref target="RFC7129"/>.</t>
          <t>If authenticated channels are used to authenticate the CAA record, CAs <bcp14>MUST</bcp14> also require recursive-to-authoritative DoT or DoH communication (and not permit standard unencrypted DNS connections) for any DNS responses that do not have a valid DNSSEC signature chain to a trusted root.
This prevents downgrade attacks where an adversary attempts to interfere with the establishment of a DoT or DoH encrypted channel and cause a fallback to unencrypted DNS over UDP or TCP.</t>
        </section>
      </section>
    </section>
    <section anchor="caa-security-property">
      <name>CAA security Property</name>
      <t>The CAA security Property Tag <bcp14>MUST</bcp14> be "security" and the flags field of a CAA record containing the security Property <bcp14>MUST</bcp14> have the critical bit set.
In this document, we refer to a CAA record with these characteristics as a <strong>security CAA record</strong>.</t>
      <section anchor="syntax">
        <name>Syntax</name>
        <t>The CAA security Property Value has the following sub-syntax (specified in ABNF as per <xref target="RFC5234"/>).</t>
        <artwork><![CDATA[
security-value = *WSP [attribute-list] *WSP

attribute-list = (attribute *WSP ";" *WSP attribute-list) / attribute
attribute = attribute-name *WSP "=" *WSP attribute-value

attribute-name = (ALPHA / DIGIT) *( *("-") (ALPHA / DIGIT))
attribute-value = *(value-char / WSP) value-char *(value-char / WSP)
value-char = %x21-3A / %x3C-7E
]]></artwork>
        <t>Hence, the security Property Value can either be empty or entirely whitespace, or contain a list of semicolon-separated attribute name-value pairs.</t>
        <t>Similar to <xref target="RFC8659"/>, attribute names are specified in letter-digit-hyphen Label (LDH-Label) form while attribute values can contain whitespace and any printable character except semicolon.
Note that attribute values <bcp14>MUST</bcp14> contain at least one printable (non-whitespace) character.</t>
        <t>All attributes specified in an attribute-list <bcp14>MUST</bcp14> be unique.
An attribute-list <bcp14>MUST NOT</bcp14> have two attributes with the same name specified even if they contain different attribute values.</t>
      </section>
      <section anchor="well-known-attributes">
        <name>Well-known Attributes</name>
        <t>The attribute-list <bcp14>MAY</bcp14> contain the following attributes.</t>
        <t>The attribute values of the attributes specified in this document have the following sub-syntax (specified in ABNF as per <xref target="RFC5234"/>).</t>
        <artwork><![CDATA[
well-known-attribute-value = *WSP comma-sep-list *WSP

comma-sep-list = (list-item *WSP "," *WSP comma-sep-list) / list-item
list-item = 1*item-char
item-char = %x21-2B / %x2D-3A / %x3C-7E
]]></artwork>
        <ol spacing="normal" type="1"><li>
            <t><strong>methods:</strong> If specified, this attribute <bcp14>MUST</bcp14> have a non-empty comma-separated list of cryptographically-constrained domain validation methods that can be used to validate that particular domain.
A CA <bcp14>MUST</bcp14> use one of the methods specified in the methods attribute value to perform cryptographically-constrained domain validation.
If there is no method specified that the CA is capable of complying with, the CA <bcp14>MUST</bcp14> deny issuance.</t>
          </li>
          <li>
            <t><strong>options:</strong> If specified, this attribute <bcp14>MUST</bcp14> have a non-empty comma-separated list of options.
A CA <bcp14>SHOULD</bcp14> try to honor any option specified in this list.
If a CA does not understand an option or does not have that option implemented the, CA <bcp14>MAY</bcp14> proceed with issuance.</t>
          </li>
          <li>
            <t><strong>options-critical:</strong> If specified, this attribute <bcp14>MUST</bcp14> have a non-empty comma-separated list of options.
To proceed with issuance, a CA <bcp14>MUST</bcp14> understand and implement all options specified in the options-critical attribute value.</t>
          </li>
        </ol>
        <t>The attribute-list <bcp14>MAY</bcp14> contain additional attributes and a CA <bcp14>MAY</bcp14> proceed with issuance even if it does not understand these additional attributes.
Subsequent RFCs <bcp14>MAY</bcp14> standardize additional attributes.</t>
        <section anchor="permissible-methods">
          <name>Permissible Methods</name>
          <t>The following attributes <bcp14>MAY</bcp14> be specified in the methods attribute value.
Each method specifies particular aspects of certificate issuance that <bcp14>MUST</bcp14> be satisfied for a certificate to be issued using that method.
While some methods entail the use of CA/Browser Forum-compliant domain control validation methods, others do not entail CA/Browser Forum-compliant domain control validation and must be used in conjunction with a CA/Browser Forum-compliant domain control validation method to permit certificate issuance.</t>
          <ol spacing="normal" type="1"><li>
              <t><strong>secure-dns-record-change:</strong> This method involves an applicant showing control of a DNSSEC-protected DNS record or a record that was retrieved via a DoH or DoT tunnel to the relevant authoritative nameservers used in the DNS resolution.
This can be done via 1) the validation method "DNS Change" specified in the CA/Browser Forum's Baseline Requirements for the Issuance and Management of Publicly-Trusted TLS Server Certificates (Section 3.2.2.4.7) or 2) the "dns-01" method of the ACME RFC <xref target="RFC8555"/>.
For this method to be satisfied, the FQDN where the DNS change is demonstrated <bcp14>MUST</bcp14> be protected by DNSSEC or lookups to the relevant authoritative nameservers <bcp14>MUST</bcp14> be conducted over authenticated channels (e.g., DoH/DoT).</t>
            </li>
            <li>
              <t><strong>http-validation-over-tls:</strong> This method involves the completion of an HTTP domain validation challenge over an HTTPS session using TCP port 443 where the server authenticates with an existing publicly-trusted valid certificate covering the domain in question.
The certificate cannot be self-signed or expired.
This method <bcp14>MAY</bcp14> be directly satisfied while a CA is performing the "Agreed-Upon Change to Website v2" domain control validation method specified in the the CA/Browser Forum's Baseline Requirements for the Issuance and Management of Publicly-Trusted TLS Server Certificates (Section 3.2.2.4.18). The ACME "http-01" challenge specified in <xref target="RFC8555"/> does not permit the use of HTTPS or port 443 when a CA is contacting the domain in question.
A CA <bcp14>MAY</bcp14> still satisfy the <strong>http-validation-over-tls</strong> method even if it does not initiate connections to port 443 for HTTP challenges so long as either 1) the connection initiated to port 80 serves a redirect to the same domain name over HTTPS at port 443 and the connection to the domain at port 443 servers a valid, trusted certificate or 2) in addition to contacting the domain over port 80 the CA also contacts the domain over port 443 using HTTPS and the connection is established with a valid, trusted certificate and the same challenge value is observed.
Operators of security-critical domains <bcp14>MAY</bcp14> choose not to permit this method since, unlike other cryptographically-constrained domain validation methods specified in this document, its security relies on the non-existence of malicious certificates for a domain at time of the creation of the security Property Tag in the domain's policy.</t>
            </li>
            <li>
              <t><strong>known-account-specifier:</strong> For a CA to issue a certificate using this method 1) there <bcp14>MUST</bcp14> exist a unique identifier for a CA subscriber account that is communicated with the CA out-of-band, over authenticated DNS lookups, or in another manner that is robust against man-in-the-middle adversaries, and 2) the CA may only issue a certificate to an applicant that has authenticated itself to the CA as having access to that specified subscriber account.
A CA does not have permission to issue under this method unless both of these criteria are met.
Once these criteria have been met, the CA <bcp14>MUST</bcp14> additionally perform a validation method that is compliant with the Baseline Requirements for the Issuance and Management of Publicly-Trusted TLS Server Certificates.
Acceptable methods of communicating this account identifier include (but are not limited to):
1) the CAA ACME account URI extension, defined in <xref target="RFC8657"/>, if retrieved via an authenticated DNS lookup
2) a DNS TXT record at an underscore-prefixed subdomain of the domain being validated, if retrieved via an authenticated DNS lookup.
The syntax of presented in <eref target="https://datatracker.ietf.org/doc/draft-sheth-identifiers-dns/">draft-sheth-identifiers-dns-00</eref> <bcp14>MAY</bcp14> be used for this DNS record (e.g., "_accounturi-persist.example.com").</t>
            </li>
            <li>
              <t><strong>private-key-control:</strong> This method involves an applicant showing control of a private key that corresponds to a public key placed in a DNS record associated with the domain being validated.
The private key must be used to sign a message containing: a unique identifier for the CA, the domain name(s) in the certificate, a timestamp, and a hash of the public key in the certificate.
This message may be hashed and then have the signature generated over the hash of this message.
Obtaining such a signed message from a certificate applicant authorizes the CA specified in the message to sign a certificate for those domain names with the specified public key within 24h of the timestamp provided in the message.
The CA <bcp14>MUST</bcp14> retrieve the public key or a hash of the public key corresponding to the private key used for signing the message via an authenticated DNS lookup.
After private key control is established, the CA <bcp14>MUST</bcp14> additionally perform a validation method that is compliant with the Baseline Requirements for the Issuance and Management of Publicly-Trusted TLS Server Certificates.
The syntax of presented in <eref target="https://datatracker.ietf.org/doc/draft-sheth-identifiers-dns/">draft-sheth-identifiers-dns-00</eref> <bcp14>MAY</bcp14> be used to communicate the hash of a domain owner's public key (e.g., a DNS TXT record placed at "_pki-key-persist.example.com").</t>
            </li>
          </ol>
          <t>In the event that <strong>no methods attribute is specified in the attribute-list,</strong> all methods specified in this document are acceptable as well as cryptographically-constrained domain validation methods defined in future RFCs.
Future RFCs <bcp14>MAY</bcp14> specify additional methods for cryptographically-constrained domain validation so long as they satisfy the properties of cryptographically-constrained domain validation (i.e., robustness against global man-in-the-middle adversaries).</t>
        </section>
        <section anchor="permissible-options">
          <name>Permissible Options</name>
          <t>The following options <bcp14>MAY</bcp14> be used in the options or options-critical attribute values.</t>
          <ol spacing="normal" type="1"><li>
              <t><strong>authenticated-policy-retrieval:</strong> This option signifies to a CA that it <bcp14>MUST</bcp14> retrieve a domain's CAA security Property and any associated domain-owner identity (e.g., identifiers used for known-account-specifier and private-key-control) using authenticated DNS lookups or other authenticated channels.
If a CA finds this option in the options-critical attribute and the CAA security Property was not retrieved using authenticated DNS lookups, the CA <bcp14>MUST NOT</bcp14> issue a certificate for that domain.</t>
            </li>
          </ol>
          <t>Additionally, a CA <bcp14>MAY</bcp14> choose to honor its own non-standardized options that do not need to be supported by other CAs or the IETF.
These options <bcp14>MUST</bcp14> be prefixed with "ca-&lt;ca_name&gt;-" where ca_name is the name of the CA that initially developed the option.</t>
        </section>
      </section>
      <section anchor="co-existence-with-other-caa-properties">
        <name>Co-existence with other CAA Properties</name>
        <t>The behavior of a CA when encountering a CAA RRset that contains multiple CAA Properties, including a security Property, depends on the CAA Property Tags.</t>
        <section anchor="caa-security-property-1">
          <name>CAA security Property</name>
          <t>To minimize complexity and avoid the risk of unexpected behavior, a domain's entire cryptographically-constrained domain validation policy <bcp14>SHOULD</bcp14> be encoded into a single CAA security Property.
If a CAA RRset contains multiple security Properties, a CA <bcp14>MUST</bcp14> block issuance if the certificate request does not comply with all of the security Tags.
This ensures that if a new security Property Tag is specified, its security properties cannot be subverted by a stale security Property Tag.</t>
        </section>
        <section anchor="caa-issue-and-issuewild-property">
          <name>CAA issue and issuewild Property</name>
          <t>If a domain specifies both security Properties and a set of issue and issuewild Properties, the CA <bcp14>MUST</bcp14> adhere to all security Properties, as described above, and the CA <bcp14>MUST</bcp14> adhere to the set of issue and issuewild Properties as described in <xref target="RFC8659"/>.</t>
        </section>
        <section anchor="caa-iodef-property">
          <name>CAA iodef Property</name>
          <t>The usage of the iodef Property is analogous to <xref target="RFC8659"/>, i.e., it provides a CA the means of reporting certificate issue requests or cases of certificate issue for domains for which the Property appears in the Relevant RRset, when those requests or issuances violate the security policy of the Issuer or the FQDN holder.
The iodef Property can be used to inform a domain owner about a blocked issuance due to an overly restrictive security Property.</t>
        </section>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Many of the security considerations regarding security CAA records are inherited from those of CAA records. Security CAA records do not increase the attack surface of fraudulent validations. Even in the presence of a security CAA record, standard domain control validation must be satisfied.
Security CAA records reduce the attack surface of fraudulent validations by limiting which validation methods may be used and thus eliminating the risk posed by less-secure validation methods.
Particularly, domains without a security CAA record are often highly vulnerable to man-in-the-middle adversaries that can intercept communications from a CA to the victim's domain.
The security Property significantly reduces this attack surface.</t>
      <t>A DoS attack enabled by security CAA records is to target a domain already using a security CAA record and interfere with all of the permitted validation methods with the idea that the presence of the security CAA will prevent the domain from falling back on alternative validation methods.
This attack vector is mitigated by the diversity of different methods available to domain owners for validating domain ownership using security CAA records.
A domain owner may use an alternate method to satisfy the security CAA record.
In the event that a domain owner truly cannot satisfy any cryptographically-constrained domain validation method, the domain owner can still mitigate this attack by removing the security CAA record, obtaining a certificate, and then reinstating the security CAA record once the attack is over.
As with all CAA records, CAs should not cache stale CAA record lookups that block issuance and should instead recheck the CAA record set when a new issuance request is received.</t>
      <t>The CAA Security tag also permits CAs to retrieve DNS records via authenticated channels between recursive and authoritative DNS servers to provide authentication on domains that are not DNSSEC-signed.
Even when these channels are appropriately authenticated (e.g., using the methods discussed in <xref target="authenticated-channel"/>), retrieving DNS records over authenticated channels does not provide the same properties as DNSSEC.
Specifically, DNSSEC provides authenticated DNS responses whereas DNS over authenticated channels only provides authenticated transport of DNS responses.
Thus, while providing protection against network adversaries, DNS over authenticated channels does not provide protection against compromised authoritative DNS servers.
For example, if DNSSEC private keys are stored separately from the authoritative server, even a compromised authoritative server cannot forge authentic DNSSEC records.
DNS over authenticated channels also does not provide the same attestation properties as DNSSEC.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC5234">
        <front>
          <title>Augmented BNF for Syntax Specifications: ABNF</title>
          <author fullname="D. Crocker" initials="D." role="editor" surname="Crocker"/>
          <author fullname="P. Overell" initials="P." surname="Overell"/>
          <date month="January" year="2008"/>
          <abstract>
            <t>Internet technical specifications often need to define a formal syntax. Over the years, a modified version of Backus-Naur Form (BNF), called Augmented BNF (ABNF), has been popular among many Internet specifications. The current specification documents ABNF. It balances compactness and simplicity with reasonable representational power. The differences between standard BNF and ABNF involve naming rules, repetition, alternatives, order-independence, and value ranges. This specification also supplies additional rule definitions and encoding for a core lexical analyzer of the type common to several Internet specifications. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="68"/>
        <seriesInfo name="RFC" value="5234"/>
        <seriesInfo name="DOI" value="10.17487/RFC5234"/>
      </reference>
      <reference anchor="RFC7129">
        <front>
          <title>Authenticated Denial of Existence in the DNS</title>
          <author fullname="R. Gieben" initials="R." surname="Gieben"/>
          <author fullname="W. Mekking" initials="W." surname="Mekking"/>
          <date month="February" year="2014"/>
          <abstract>
            <t>Authenticated denial of existence allows a resolver to validate that a certain domain name does not exist. It is also used to signal that a domain name exists but does not have the specific resource record (RR) type you were asking for. When returning a negative DNS Security Extensions (DNSSEC) response, a name server usually includes up to two NSEC records. With NSEC version 3 (NSEC3), this amount is three.</t>
            <t>This document provides additional background commentary and some context for the NSEC and NSEC3 mechanisms used by DNSSEC to provide authenticated denial-of-existence responses.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7129"/>
        <seriesInfo name="DOI" value="10.17487/RFC7129"/>
      </reference>
      <reference anchor="RFC8555">
        <front>
          <title>Automatic Certificate Management Environment (ACME)</title>
          <author fullname="R. Barnes" initials="R." surname="Barnes"/>
          <author fullname="J. Hoffman-Andrews" initials="J." surname="Hoffman-Andrews"/>
          <author fullname="D. McCarney" initials="D." surname="McCarney"/>
          <author fullname="J. Kasten" initials="J." surname="Kasten"/>
          <date month="March" year="2019"/>
          <abstract>
            <t>Public Key Infrastructure using X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names. Thus, certification authorities (CAs) in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate. As of this writing, this verification is done through a collection of ad hoc mechanisms. This document describes a protocol that a CA and an applicant can use to automate the process of verification and certificate issuance. The protocol also provides facilities for other certificate management functions, such as certificate revocation.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8555"/>
        <seriesInfo name="DOI" value="10.17487/RFC8555"/>
      </reference>
      <reference anchor="RFC8657">
        <front>
          <title>Certification Authority Authorization (CAA) Record Extensions for Account URI and Automatic Certificate Management Environment (ACME) Method Binding</title>
          <author fullname="H. Landau" initials="H." surname="Landau"/>
          <date month="November" year="2019"/>
          <abstract>
            <t>The Certification Authority Authorization (CAA) DNS record allows a domain to communicate an issuance policy to Certification Authorities (CAs) but only allows a domain to define a policy with CA-level granularity. However, the CAA specification (RFC 8659) also provides facilities for an extension to admit a more granular, CA-specific policy. This specification defines two such parameters: one allowing specific accounts of a CA to be identified by URIs and one allowing specific methods of domain control validation as defined by the Automatic Certificate Management Environment (ACME) protocol to be required.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8657"/>
        <seriesInfo name="DOI" value="10.17487/RFC8657"/>
      </reference>
      <reference anchor="RFC8659">
        <front>
          <title>DNS Certification Authority Authorization (CAA) Resource Record</title>
          <author fullname="P. Hallam-Baker" initials="P." surname="Hallam-Baker"/>
          <author fullname="R. Stradling" initials="R." surname="Stradling"/>
          <author fullname="J. Hoffman-Andrews" initials="J." surname="Hoffman-Andrews"/>
          <date month="November" year="2019"/>
          <abstract>
            <t>The Certification Authority Authorization (CAA) DNS Resource Record allows a DNS domain name holder to specify one or more Certification Authorities (CAs) authorized to issue certificates for that domain name. CAA Resource Records allow a public CA to implement additional controls to reduce the risk of unintended certificate mis-issue. This document defines the syntax of the CAA record and rules for processing CAA records by CAs.</t>
            <t>This document obsoletes RFC 6844.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8659"/>
        <seriesInfo name="DOI" value="10.17487/RFC8659"/>
      </reference>
      <reference anchor="RFC9539">
        <front>
          <title>Unilateral Opportunistic Deployment of Encrypted Recursive-to-Authoritative DNS</title>
          <author fullname="D. K. Gillmor" initials="D. K." role="editor" surname="Gillmor"/>
          <author fullname="J. Salazar" initials="J." role="editor" surname="Salazar"/>
          <author fullname="P. Hoffman" initials="P." role="editor" surname="Hoffman"/>
          <date month="February" year="2024"/>
          <abstract>
            <t>This document sets out steps that DNS servers (recursive resolvers and authoritative servers) can take unilaterally (without any coordination with other peers) to defend DNS query privacy against a passive network monitor. The protections provided by the guidance in this document can be defeated by an active attacker, but they should be simpler and less risky to deploy than more powerful defenses.</t>
            <t>The goal of this document is to simplify and speed up deployment of opportunistic encrypted transport in the recursive-to-authoritative hop of the DNS ecosystem. Wider easy deployment of the underlying encrypted transport on an opportunistic basis may facilitate the future specification of stronger cryptographic protections against more-powerful attacks.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9539"/>
        <seriesInfo name="DOI" value="10.17487/RFC9539"/>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
    </references>
    <?line 302?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
