<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.22 (Ruby 3.1.3) -->
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-dnsop-structured-dns-error-00" category="std" consensus="true" submissionType="IETF" updates="8914" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.16.0 -->
  <front>
    <title abbrev="Structured DNS Error">Structured Error Data for Filtered DNS</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-dnsop-structured-dns-error-00"/>
    <author fullname="Dan Wing">
      <organization abbrev="Citrix">Citrix Systems, Inc.</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>dwing-ietf@fuggles.com</email>
      </address>
    </author>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Neil Cook">
      <organization>Open-Xchange</organization>
      <address>
        <postal>
          <country>United Kingdom</country>
        </postal>
        <email>neil.cook@noware.co.uk</email>
      </address>
    </author>
    <author fullname="Mohamed Boucadair">
      <organization>Orange</organization>
      <address>
        <postal>
          <street>Rennes</street>
          <code>35000</code>
          <country>France</country>
        </postal>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <date year="2023" month="February" day="13"/>
    <area>Internet</area>
    <workgroup>DNS Operations Working Group</workgroup>
    <keyword>Customer experience</keyword>
    <keyword>Informed decision</keyword>
    <keyword>transparency</keyword>
    <keyword>enriched feedback</keyword>
    <abstract>
      <t>DNS filtering is widely deployed for network security, but filtered
DNS responses lack information for the end user to understand the
reason for the filtering. Existing mechanisms to provide detail to end
users cause harm especially if the blocked DNS response is to an HTTPS
website.</t>
      <t>This document updates RFC 8914 by structuring the EXTRA-TEXT field of
the Extended DNS Error to provide details on the DNS filtering. Such
details can be parsed by the client and displayed, logged, or used for
other purposes. Other than that, this document does not change any
thing written in RFC 8914.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://ietf-wg-dnsop.github.io/draft-ietf-dnsop-structured-dns-error/draft-ietf-dnsop-structured-dns-error.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-dnsop-structured-dns-error/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        dnsop Working Group mailing list (<eref target="mailto:dnsop@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/dnsop/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/dnsop/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-wg-dnsop/draft-ietf-dnsop-structured-dns-error"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>DNS filters are deployed for a variety of reasons including endpoint
security, parental filtering, and filtering required by law
enforcement. Network-based security solutions such as firewalls and
Intrusion Prevention Systems (IPS) rely upon network traffic
inspection to implement perimeter-based security policies and operate
by filtering DNS responses. In a home, DNS filtering is used for the
same reasons as above and additionally for parental control. Internet
Service Providers typically block access to some DNS domains due to a
requirement imposed by an external entity (e.g., law enforcement
agency) also performed using DNS-based content filtering.</t>
      <t>Users of DNS services which perform filtering may wish to receive more
information about such filtering to resolve problems with the filter
-- for example to contact the administrator to allowlist a domain that
was erroneously filtered or to understand the reason a particular
domain was filtered. With that information, the user can choose
another network, open a trouble ticket with the DNS administrator to
resolve erroneous filtering, log the information, or other uses.</t>
      <t>For the DNS filtering mechanisms described in <xref target="existing-techniques"/> the DNS
server can return extended error codes Blocked, Censored, Filtered, or
Forged Answer defined in Section 4 of <xref target="RFC8914"/>. However, these codes
only explain that filtering occurred but lack detail for the user to
diagnose erroneous filtering.</t>
      <t>No matter which type of response is generated (forged IP address(es),
NXDOMAIN or empty answer, even with an extended error code), the user
who triggered the DNS query has little chance to understand which
entity filtered the query, how to report a mistake in the filter, or
why the entity filtered it at all. This document describes a mechanism
to provide such detail.</t>
      <t>One of the other benefits of this approach is to eliminate the need to
"spoof" block pages for HTTPS resources. This is achieved since
clients implementing this approach would be able to display a
meaningful error message, and would not need to connect to such a
block page. This approach thus avoids the need to install a local root
certificate authority on those IT-managed devices.</t>
      <t>This document describes a format for computer-parsable data in the
EXTRA-TEXT field of <xref target="RFC8914"/>. It updates Section 2 of <xref target="RFC8914"/> which
says the information in EXTRA-TEXT field is intended for human
consumption (not automated parsing).</t>
      <t>This document does not recommend DNS filtering but provides a
mechanism for better transparency to explain to the users why some DNS
queries are filtered.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <t>This document uses terms defined in DNS Terminology <xref target="RFC8499"/>.</t>
      <t>"Requestor" refers to the side that sends a request. "Responder"
refers to an authoritative, recursive resolver or other DNS component
that responds to questions. Other terminology is used here as defined
in the RFCs cited by this document.</t>
      <t>"Encrypted DNS" refers to any encrypted scheme to convey DNS messages,
for example, DNS-over-HTTPS <xref target="RFC8484"/>, DNS-over-TLS <xref target="RFC7858"/>, or
DNS-over-QUIC <xref target="RFC9250"/>.</t>
      <t>The document refers to an extended DNS error using its purpose, not its
INFO-CODE as per Table 3 of <xref target="RFC8914"/>. "Forged Answer",
"Blocked", "Censored", and "Filtered" are thus used to refer to "Forged Answer (4)",
"Blocked (15)", "Censored (16)", and "Filtered (17)".</t>
    </section>
    <section anchor="existing-techniques">
      <name>DNS Filtering Techniques and Their Limitations</name>
      <t>Today, DNS responses can be filtered by sending a bogus (also called
"forged") A or AAAA response, NXDOMAIN error or empty answer, or an
extended DNS error (EDE) code defined in <xref target="RFC8914"/>. Each of these
methods have advantages and disadvantages that are discussed below:</t>
      <ol spacing="normal" type="1"><li>
          <t>The DNS response is forged to provide a list of IP addresses that
points to an HTTP(S) server alerting the end user about the reason for
blocking access to the requested domain (e.g., malware). When an
HTTP(S) enabled domain name is blocked, the network security device
(e.g., CPE, firewall) presents a block page instead of the HTTP
response from the content provider hosting that domain. If an HTTP
enabled domain name is blocked, the network security device intercepts
the HTTP request and returns a block page over HTTP. If an HTTPS
enabled domain is blocked, the block page is also served over
HTTPS. In order to return a block page over HTTPS, man in the middle
(MITM) is enabled on endpoints by generating a local root certificate
and an accompanying (local) public/private key pair. The local root
certificate is installed on the endpoint while the network security
device(s) stores a copy of the private key. During the TLS handshake,
the network security device modifies the certificate provided by the
server and (re)signs it using the private key from the local root
certificate.  </t>
          <ul spacing="normal">
            <li>However, configuring the local root certificate on endpoints is
not a viable option in several deployments like home networks,
schools, Small Office/Home Office (SOHO), and Small/ Medium
Enterprise (SME). In these cases, the typical behavior is that
the filtered DNS response points to a server that will display
the block page. If the client is using HTTPS (via web browser or
another application) this results in a certificate validation
error which gives no information to the end-user about the reason
for the DNS filtering. Browsers will display errors such as "The
security certificate presented by this website was not issued by
a trusted certificate authority" (Internet Explorer/Edge"), "The
site's security certificate is not trusted" (Chrome), "This
Connection is Untrusted" (Firefox), "Safari can't verify the
identity of the website ..." (Safari on MacOS). Applications might
display even more cryptic error messages.</li>
            <li>Enterprise networks do not assume that all the connected devices
are managed by the IT team or Mobile Device Management (MDM)
devices, especially in the quite common Bring Your Own Device
(BYOD) scenario. In addition, the local root certificate cannot
be installed on IoT devices without a device management tool.</li>
            <li>An end user does not know why the connection was prevented and,
consequently, may repeatedly try to reach the domain but with no
success. Frustrated, the end user may switch to an alternate
network that offers no DNS filtering against malware and
phishing, potentially compromising both security and
privacy. Furthermore, certificate errors train users to click
through certificate errors, which is a bad security practice. To
eliminate the need for an end user to click through certificate
errors, an end user may manually install a local root certificate
on a host device. Doing so, however, is also a bad security
practice as it creates a security vulnerability that may be
exploited by a MITM attack. When a manually installed local root
certificate expires, the user has to (again) manually install the
new local root certificate.</li>
          </ul>
        </li>
        <li>The DNS response is forged to provide a NXDOMAIN response to cause
the DNS lookup to terminate in failure. In this case, an end user does
not know why the domain cannot be reached and may repeatedly try to
reach the domain but with no success. Frustrated, the end user may use
insecure connections to reach the domain, potentially compromising
both security and privacy.</li>
        <li>The extended error codes Blocked, Censored, and Filtered defined in
Section 4 of <xref target="RFC8914"/> can be returned by a DNS server to provide
additional information about the cause of an DNS error. If the
extended error code "Forged Answer" defined in Section 4.5 of
<xref target="RFC8914"/> is returned by the DNS server, the client can identify the
DNS response is forged together with the reason for HTTPS certificate
error.</li>
        <li>These extended error codes do not suffer from the limitations
discussed in bullets (1) and (2), but the user still does not know the
exact reason nor he/she is aware of the exact entity blocking the
access to the domain. For example, a DNS server may block access to a
domain based on the content category such as "Malware" to protect the
endpoint from malicious software, "Phishing" to prevent the user from
revealing sensitive information to the attacker, etc. A user needs to
know the contact details of the IT/InfoSec team to raise a complaint.</li>
        <li>When a resolver or forwarder forwards the received EDE option, the
EXTRA-TEXT field only conveys the source of the error (Section 3 of
<xref target="RFC8914"/>) and does not provide additional textual information about
the cause of the error.</li>
      </ol>
    </section>
    <section anchor="i-json-in-extra-text-field">
      <name>I-JSON in EXTRA-TEXT field</name>
      <t>Servers that are compliant with this specification send I-JSON data in
the EXTRA-TEXT field <xref target="RFC8914"/> using the Internet JSON (I-JSON)
message format <xref target="RFC7493"/>.</t>
      <ul empty="true">
        <li>
          <t>Note that <xref target="RFC7493"/> was based on <xref target="RFC7159"/>, but <xref target="RFC7159"/> was replaced by <xref target="RFC8259"/>.</t>
        </li>
      </ul>
      <t>This document defines the following JSON names:</t>
      <dl>
        <dt>c: (contact)</dt>
        <dd>
          <t>The contact details of the IT/InfoSec team to report mis-classified
DNS filtering. This field is structured as an array of contact URIs
(e.g., tel, sips, https). At least one contact URI <bcp14>MUST</bcp14> be
included. This field is mandatory.</t>
        </dd>
        <dt>j: (justification)</dt>
        <dd>
          <t>UTF-8-encoded <xref target="RFC5198"/> textual justification for this particular
DNS filtering. The field should be treated only as diagnostic
information for IT staff. This field is mandatory.</t>
        </dd>
        <dt>s: (suberror)</dt>
        <dd>
          <t>the suberror code for this particular DNS filtering. This field is optional.</t>
        </dd>
        <dt>o: (organization)</dt>
        <dd>
          <t>UTF-8-encoded human-friendly name of the organization that filtered this particular DNS query. This field is optional.</t>
        </dd>
      </dl>
      <t>New JSON names can be defined in the IANA
"application/json+structured-dns-error" registry (<xref target="IANA"/>). Such names <bcp14>MUST</bcp14>
consist only of lower-case ASCII characters, digits, and hyphens (that
is, Unicode characters U+0061 through 007A, U+0030 through U+0039, and
U+002D). Also, these names <bcp14>MUST</bcp14> be 63 characters or shorter and it is
<bcp14>RECOMMENDED</bcp14> they be as short as possible.</t>
      <t>The text in the "j" and "o" names can include international
characters. If the text is displayed in a language not known to the
end user, browser extensions to translate to user's native language
can be used. For example, "Google Translate" extension
<xref target="Chrome-Translate"/> provided by Google on Chrome can be used to
translate the text.</t>
      <t>To reduce packet overhead the generated JSON <bcp14>SHOULD</bcp14> be as short as
possible: short domain names, concise text in the values for the "j"
and "o" names, and minified JSON (that is, without spaces or line
breaks between JSON elements).</t>
      <t>The JSON data can be parsed to display to the user, logged, or
otherwise used to assist the end-user or IT staff with troubleshooting
and diagnosing the cause of the DNS filtering.</t>
    </section>
    <section anchor="protocol-operation">
      <name>Protocol Operation</name>
      <section anchor="client-request">
        <name>Client Generating Request</name>
        <t>When generating a DNS query, the client includes the Extended DNS
Error option Section 2 of <xref target="RFC8914"/> in the OPT pseudo-RR <xref target="RFC6891"/> to
elicit the Extended DNS Error option in the DNS response.</t>
      </section>
      <section anchor="server-response">
        <name>Server Generating Response</name>
        <t>When the DNS server filters its DNS response to an A or AAAA record
query, the DNS response <bcp14>MAY</bcp14> contain an empty answer, NXDOMAIN, or (less
ideally) forged A or AAAA response, as desired by the DNS
server. In addition, if the query contained the OPT pseudo-RR the DNS
server <bcp14>MAY</bcp14> return more detail in the EXTRA-TEXT field as described in
<xref target="client-processing"/>.</t>
        <t>Servers may decide to return small TTL values in filtered DNS
responses (e.g., 2 seconds) to handle domain category and reputation
updates.</t>
        <t>Because the DNS client signals its EDE support (<xref target="client-request"/>)
and because EDE support is signaled via a non-cached OPT resource
record (Section 6.2.1 of <xref target="RFC6891"/>) the EDE-aware DNS server can
tailor its filtered response to be most appropriate to that client's
EDE support.  If EDE support is signaled in the query the server <bcp14>MUST
NOT</bcp14> return the "Forged Answer" extended error code because the client
can take advantage of EDE's more sophisticated error reporting (e.g.,
"Censored", "Filtered", "Blocked").  Continuing to send "Forged
Answer" even to an EDE-supporting client will cause the persistence of
the drawbacks described in <xref target="existing-techniques"/>.</t>
      </section>
      <section anchor="client-processing">
        <name>Client Processing Response</name>
        <t>On receipt of a DNS response with an Extended DNS Error option, the
following actions are performed if the EXTRA-TEXT field contains valid
JSON:</t>
        <ul spacing="normal">
          <li>The response <bcp14>MUST</bcp14> be received over an encrypted DNS channel. If not,
the requestor <bcp14>MUST</bcp14> discard data in the EXTRA-TEXT field.</li>
          <li>The response <bcp14>MUST</bcp14> be received from a DNS server which advertised EDE
support via a trusted channel, e.g., RESINFO
<xref target="I-D.reddy-add-resolver-info"/>.</li>
          <li>Servers which don't support this specification might use plain text
in the EXTRA-TEXT field so that requestors <bcp14>SHOULD</bcp14> properly handle
both plaintext and JSON text in the EXTRA-TEXT field.</li>
          <li>The DNS response <bcp14>MUST</bcp14> also contain an extended error code of
"Censored", "Blocked", "Filtered" or "Forged Answer" <xref target="RFC8914"/>, otherwise
the EXTRA-TEXT field is discarded.</li>
          <li>If either of the mandatory JSON names "c" and "j" are missing or
have empty values in the EXTRA-TEXT field, the entire JSON is
discarded.</li>
          <li>The JSON name "s" <bcp14>MUST NOT</bcp14> be present with the extended error code
"Censored".</li>
          <li>If a DNS client has enabled opportunistic privacy profile (Section 5
of <xref target="RFC8310"/>) for DoT, the DNS client will either fallback to an
encrypted connection without authenticating the DNS server provided
by the local network or fallback to clear text DNS, and cannot
exchange encrypted DNS messages. Both of these fallback mechanisms
adversely impacts security and privacy. If the DNS client has
enabled opportunistic privacy profile for DoT, the DNS client <bcp14>MUST</bcp14>
ignore the EXTRA-TEXT field of the EDE responses, but <bcp14>SHOULD</bcp14> process
other parts of the response.</li>
          <li>If a DNS client has enabled strict privacy profile (Section 5 of
<xref target="RFC8310"/>) for DoT, the DNS client requires an encrypted connection
and successful authentication of the DNS server; this mitigates both
passive eavesdropping and client redirection (at the expense of
providing no DNS service if an encrypted, authenticated connection
is not available). If the DNS client has enabled strict privacy
profile for DoT, the client <bcp14>MAY</bcp14> process the EXTRA-TEXT field of the
DNS response. Note that the strict and opportunistic privacy
profiles as defined in <xref target="RFC8310"/> only apply to DoT; there has been
no such distinction made for DoH.</li>
          <li>If the DNS client determines that the encrypted DNS server does not
offer DNS filtering service, it <bcp14>MUST</bcp14> discard the EXTRA-TEXT field of
the EDE response. For example, the DNS client can learn whether the
encrypted DNS resolver performs DNS-based content filtering or not
by retrieving resolver information using the method defined in
<xref target="I-D.reddy-add-resolver-info"/>.</li>
          <li>When a forwarder receives an EDE option, whether or not (and how) to
pass along JSON information in the EXTRA-TEXT on to their client is
implementation dependent <xref target="RFC5625"/>. Implementations <bcp14>MAY</bcp14> choose to
not forward the JSON information, or they <bcp14>MAY</bcp14> choose to create a new
EDE option that conveys the information in the "c", "s" and "j"
fields encoded in the JSON object.</li>
        </ul>
      </section>
    </section>
    <section anchor="interoperation-with-rpz-servers">
      <name>Interoperation with RPZ Servers</name>
      <t>This section discusses operation with an RPZ server <xref target="RPZ"/> that
indicates filtering with a NXDOMAIN response with the Recursion
Available bit cleared (RA=0).</t>
      <t>When the DNS client supports this specification but the server does
not, the server will continue replying when a query is RPZ filtered
with NXDOMAIN and RA=0. An DNS client upgraded to support this
specification can continue to accept responses with NXDOMAIN and RA=0
from the RPZ server that does not support this specification.</t>
      <t>When the DNS client supports this specification and the server
supports this specification, the client learns of the server's support
via <xref target="I-D.reddy-add-resolver-info"/> and the client includes the EDE OPT
pseudo-RR in the query. This allows the server to differentiate
EDE-aware clients from EDE-unaware clients and respond appropriately.</t>
    </section>
    <section anchor="new-sub-error-codes-definition">
      <name>New Sub-Error Codes Definition</name>
      <t>The document defines the following new IANA-registered Sub-Error codes.</t>
      <section anchor="policy-reserved">
        <name>Reserved</name>
        <ul spacing="normal">
          <li>Number: 0</li>
          <li>Meaning: Reserved. This sub-error code value <bcp14>MUST NOT</bcp14> be sent. If received, it has no meaning.</li>
          <li>Applicability: This code should never be used</li>
          <li>Reference: This-Document</li>
          <li>Change Controller: IETF</li>
        </ul>
      </section>
      <section anchor="policy-network">
        <name>Network Operator Policy</name>
        <ul spacing="normal">
          <li>Number: 5</li>
          <li>Meaning: Network Operator Policy. The code indicates that the request was filtered according to policy determined by the operator of the local network.</li>
          <li>Applicability: Blocked, Forged</li>
          <li>Reference: This-Document</li>
          <li>Change Controller: IETF</li>
        </ul>
      </section>
      <section anchor="policy-dns">
        <name>DNS Operator Policy</name>
        <ul spacing="normal">
          <li>Number: 6</li>
          <li>Meaning: DNS Operator Policy. The code indicates that the request was filtered according to policy determined by the operator of the DNS server.</li>
          <li>Applicability: Blocked, Forged</li>
          <li>Reference:  This-Document</li>
          <li>Change Controller: IETF</li>
        </ul>
      </section>
    </section>
    <section anchor="examples">
      <name>Examples</name>
      <t>An example showing the nameserver at 'ns.example.net' that filtered a
DNS "A" record query for 'example.org' is shown in <xref target="example-json"/>.</t>
      <figure anchor="example-json">
        <name>JSON returned in EXTRA-TEXT field of Extended DNS Error response</name>
        <artwork><![CDATA[
{
  "c": [
    "tel:+358-555-1234567",
    "sips:bob@bobphone.example.com",
    "https://ticket.example.com?d=example.org&t=1650560748"
  ],
  "j": "malware present for 23 days",
  "s": 1,
  "o": "example.net Filtering Service"
}
]]></artwork>
      </figure>
      <t>In <xref target="example-json-minified"/> the same content is shown with minified JSON (no
whitespace, no blank lines) with '\' line wrapping per <xref target="RFC8792"/>.</t>
      <figure anchor="example-json-minified">
        <name>Minified response</name>
        <artwork><![CDATA[
 ============== NOTE: '\' line wrapping per RFC 8792 ===============

  {"c":["tel:+358-555-1234567","sips:bob@bobphone.example.com", \
  "https://ticket.example.com?d=example.org&t=1650560748"],"s":1, \
  "j":"malware present for 23 days","o":"example.net Filtering \
  Service"}
]]></artwork>
      </figure>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Security considerations in Section 6 of <xref target="RFC8914"/> apply to this
document.</t>
      <t>To minimize impact of active on-path attacks on the DNS channel, the
client validates the response as described in <xref target="client-processing"/>.</t>
      <t>A client might choose to display the information in the "c", "j" and
"o" fields if and only if the encrypted resolver has sufficient
reputation, according to some local policy (e.g. user configuration,
administrative configuration, or a built-in list of respectable
resolvers). This limits the ability of a malicious encrypted resolver
to cause harm. If the client decides not to display the all of the
information in the EXTRA-TEXT field, it can be logged for diagnostics
purpose and the client can only display the resolver hostname that
blocked the domain, error description for the EDE code and the
suberror description for the "s'" field to the end-user.</t>
      <t>When displaying the free-form text of "c" and "o", the browser <bcp14>SHOULD
NOT</bcp14> make any of those elements into actionable (clickable) links.</t>
      <t>An attacker might inject (or modify) the EDE EXTRA-TEXT field with an
DNS proxy or DNS forwarder that is unaware of EDE. Such a DNS proxy or
DNS forwarder will forward that attacker-controlled EDE option. To
prevent such an attack, clients supporting this document <bcp14>MUST</bcp14> discard
the EDE option if their DNS server does not signal EDE support via
RESINFO <xref target="I-D.reddy-add-resolver-info"/>. As recommended in
<xref target="I-D.reddy-add-resolver-info"/>, RESINFO should be retrieved over an
encrypted DNS channel or integrity protected with DNSSEC.</t>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This document requests two IANA actions as described in the following subsections.</t>
      <section anchor="new-structured-dns-error-media-type">
        <name>New structured-dns-error Media Type</name>
        <t>This document requests IANA to register the
"application/json+structured-dns-error" media type in the "Media
Types" registry <xref target="IANA-MediaTypes"/>. This registration follows the
procedures specified in <xref target="RFC6838"/>:</t>
        <artwork><![CDATA[
   Type name: application

   Subtype name: json+structured-dns-error

   Required parameters: N/A

   Optional parameters: N/A

   Encoding considerations: as defined in Section NN of [RFCXXXX].

   Security considerations: See Section NNN of [RFCXXXX].

   Interoperability considerations: N/A

   Published specification: [RFCXXXX]

   Applications that use this media type: Section NNNN of [RFCXXXX].

   Fragment identifier considerations: N/A

   Additional information: N/A

   Person & email address to contact for further information: IETF,
      iesg@ietf.org

   Intended usage: COMMON

   Restrictions on usage: none

   Author: See Authors' Addresses section.

   Change controller: IESG

   Provisional registration?  No
]]></artwork>
      </section>
      <section anchor="new-registry-for-suberror-codes">
        <name>New Registry for SubError Codes</name>
        <t>This document requests IANA to create a new registry, entitled "SubError Codes"
under "Domain Name System (DNS) Parameters, Extended DNS Error Codes"
registry <xref target="IANA-DNS"/>. The registration request for a new suberror codes <bcp14>MUST</bcp14> include the
following fields:</t>
        <ul spacing="normal">
          <li>Number: Wire format suberror code (range 0-255)</li>
          <li>Meaning: A short description of the sub-error</li>
          <li>Applicability: Indicates which RFC8914 error codes apply to this sub-error code</li>
          <li>Reference: A pointer to IETF-approved specification that registered
the code and/or an authoritative specification that describes the
meaning of this code</li>
          <li>Change Controller: Person or entity, with contact information if appropriate.</li>
        </ul>
        <t>The SubError Code registry shall initially be populated with the
following suberror codes:</t>
        <table anchor="reg">
          <name>Initial SubError Code Rregistry</name>
          <thead>
            <tr>
              <th align="center">Number</th>
              <th align="left">Meaning</th>
              <th align="left">RFC8914 error code applicability</th>
              <th align="left">Reference</th>
              <th align="center">Change Controller</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="center">0</td>
              <td align="left">Reserved</td>
              <td align="left">Not used</td>
              <td align="left">
                <xref target="policy-reserved"/> of this document</td>
              <td align="center">IETF</td>
            </tr>
            <tr>
              <td align="center">1</td>
              <td align="left">Malware</td>
              <td align="left">"Forged Answer", "Blocked", "Censored", "Filtered"</td>
              <td align="left">Section 5.5 of <xref target="RFC5901"/></td>
              <td align="center">IETF</td>
            </tr>
            <tr>
              <td align="center">2</td>
              <td align="left">Phishing</td>
              <td align="left">"Forged Answer", "Blocked", "Censored", "Filtered"</td>
              <td align="left">Section 5.5 of <xref target="RFC5901"/></td>
              <td align="center">IETF</td>
            </tr>
            <tr>
              <td align="center">3</td>
              <td align="left">Spam</td>
              <td align="left">"Forged Answer", "Blocked", "Censored", "Filtered"</td>
              <td align="left">Page 289 of <xref target="RFC4949"/></td>
              <td align="center">IETF</td>
            </tr>
            <tr>
              <td align="center">4</td>
              <td align="left">Spyware</td>
              <td align="left">"Forged Answer", "Blocked", "Censored", "Filtered"</td>
              <td align="left">Page 291 of <xref target="RFC4949"/></td>
              <td align="center">IETF</td>
            </tr>
            <tr>
              <td align="center">5</td>
              <td align="left">Network operator policy</td>
              <td align="left">"Forged Answer", "Blocked"</td>
              <td align="left">
                <xref target="policy-network"/> of this document</td>
              <td align="center">IETF</td>
            </tr>
            <tr>
              <td align="center">6</td>
              <td align="left">DNS operator policy</td>
              <td align="left">"Forged Answer", "Blocked"</td>
              <td align="left">
                <xref target="policy-dns"/> of this document</td>
              <td align="center">IETF</td>
            </tr>
          </tbody>
        </table>
        <t>New entries in this registry are subject to an Expert Review
registration policy <xref target="RFC8126"/>. The designated expert <bcp14>MUST</bcp14> ensure that
the Reference is stable and publicly available, and that it specifies
the suberror code and a short description. The reference may be
an individual Internet-Draft, or a document from any other source
with similar assurances of stability and availability.</t>
        <t>Review requests are evaluated on the advice of one or more
designated experts. Criteria that should be applied by the designated
experts include determining whether the proposed registration
duplicates existing entries and whether the registration description
is sufficiently detailed and fits the purpose of this registry.
The designated experts will either approve or deny the registration
request, communicating this decision to IANA. Denials should
include an explanation and, if applicable, suggestions as to how
to make the request successful.</t>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC8914">
          <front>
            <title>Extended DNS Errors</title>
            <author fullname="W. Kumari" initials="W." surname="Kumari">
              <organization/>
            </author>
            <author fullname="E. Hunt" initials="E." surname="Hunt">
              <organization/>
            </author>
            <author fullname="R. Arends" initials="R." surname="Arends">
              <organization/>
            </author>
            <author fullname="W. Hardaker" initials="W." surname="Hardaker">
              <organization/>
            </author>
            <author fullname="D. Lawrence" initials="D." surname="Lawrence">
              <organization/>
            </author>
            <date month="October" year="2020"/>
            <abstract>
              <t>This document defines an extensible method to return additional information about the cause of DNS errors. Though created primarily to extend SERVFAIL to provide additional information about the cause of DNS and DNSSEC failures, the Extended DNS Errors option defined in this document allows all response types to contain extended error information. Extended DNS Error information does not change the processing of RCODEs.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8914"/>
          <seriesInfo name="DOI" value="10.17487/RFC8914"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC7493">
          <front>
            <title>The I-JSON Message Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray">
              <organization/>
            </author>
            <date month="March" year="2015"/>
            <abstract>
              <t>I-JSON (short for "Internet JSON") is a restricted profile of JSON designed to maximize interoperability and increase confidence that software can process it successfully with predictable results.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7493"/>
          <seriesInfo name="DOI" value="10.17487/RFC7493"/>
        </reference>
        <reference anchor="RFC7159">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray">
              <organization/>
            </author>
            <date month="March" year="2014"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format.  It was derived from the ECMAScript Programming Language Standard.  JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7159"/>
          <seriesInfo name="DOI" value="10.17487/RFC7159"/>
        </reference>
        <reference anchor="RFC5198">
          <front>
            <title>Unicode Format for Network Interchange</title>
            <author fullname="J. Klensin" initials="J." surname="Klensin">
              <organization/>
            </author>
            <author fullname="M. Padlipsky" initials="M." surname="Padlipsky">
              <organization/>
            </author>
            <date month="March" year="2008"/>
            <abstract>
              <t>The Internet today is in need of a standardized form for the transmission of internationalized "text" information, paralleling the specifications for the use of ASCII that date from the early days of the ARPANET.  This document specifies that format, using UTF-8 with normalization and specific line-ending sequences.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5198"/>
          <seriesInfo name="DOI" value="10.17487/RFC5198"/>
        </reference>
        <reference anchor="RFC6891">
          <front>
            <title>Extension Mechanisms for DNS (EDNS(0))</title>
            <author fullname="J. Damas" initials="J." surname="Damas">
              <organization/>
            </author>
            <author fullname="M. Graff" initials="M." surname="Graff">
              <organization/>
            </author>
            <author fullname="P. Vixie" initials="P." surname="Vixie">
              <organization/>
            </author>
            <date month="April" year="2013"/>
            <abstract>
              <t>The Domain Name System's wire protocol includes a number of fixed fields whose range has been or soon will be exhausted and does not allow requestors to advertise their capabilities to responders.  This document describes backward-compatible mechanisms for allowing the protocol to grow.</t>
              <t>This document updates the Extension Mechanisms for DNS (EDNS(0)) specification (and obsoletes RFC 2671) based on feedback from deployment experience in several implementations.  It also obsoletes RFC 2673 ("Binary Labels in the Domain Name System") and adds considerations on the use of extended labels in the DNS.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="75"/>
          <seriesInfo name="RFC" value="6891"/>
          <seriesInfo name="DOI" value="10.17487/RFC6891"/>
        </reference>
        <reference anchor="RFC8310">
          <front>
            <title>Usage Profiles for DNS over TLS and DNS over DTLS</title>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson">
              <organization/>
            </author>
            <author fullname="D. Gillmor" initials="D." surname="Gillmor">
              <organization/>
            </author>
            <author fullname="T. Reddy" initials="T." surname="Reddy">
              <organization/>
            </author>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document discusses usage profiles, based on one or more authentication mechanisms, which can be used for DNS over Transport Layer Security (TLS) or Datagram TLS (DTLS).  These profiles can increase the privacy of DNS transactions compared to using only cleartext DNS.  This document also specifies new authentication mechanisms -- it describes several ways that a DNS client can use an authentication domain name to authenticate a (D)TLS connection to a DNS server.  Additionally, it defines (D)TLS protocol profiles for DNS clients and servers implementing DNS over (D)TLS.  This document updates RFC 7858.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8310"/>
          <seriesInfo name="DOI" value="10.17487/RFC8310"/>
        </reference>
        <reference anchor="RFC6838">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <author fullname="N. Freed" initials="N." surname="Freed">
              <organization/>
            </author>
            <author fullname="J. Klensin" initials="J." surname="Klensin">
              <organization/>
            </author>
            <author fullname="T. Hansen" initials="T." surname="Hansen">
              <organization/>
            </author>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols.  This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="13"/>
          <seriesInfo name="RFC" value="6838"/>
          <seriesInfo name="DOI" value="10.17487/RFC6838"/>
        </reference>
        <reference anchor="RFC5901">
          <front>
            <title>Extensions to the IODEF-Document Class for Reporting Phishing</title>
            <author fullname="P. Cain" initials="P." surname="Cain">
              <organization/>
            </author>
            <author fullname="D. Jevans" initials="D." surname="Jevans">
              <organization/>
            </author>
            <date month="July" year="2010"/>
            <abstract>
              <t>This document extends the Incident Object Description Exchange Format (IODEF) defined in RFC 5070 to support the reporting of phishing events, which is a particular type of fraud.  These extensions are flexible enough to support information gleaned from activities throughout the entire electronic fraud cycle -- from receipt of the phishing lure to the disablement of the collection site.  Both simple reporting and complete forensic reporting are possible, as is consolidating multiple incidents.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5901"/>
          <seriesInfo name="DOI" value="10.17487/RFC5901"/>
        </reference>
        <reference anchor="RFC4949">
          <front>
            <title>Internet Security Glossary, Version 2</title>
            <author fullname="R. Shirey" initials="R." surname="Shirey">
              <organization/>
            </author>
            <date month="August" year="2007"/>
            <abstract>
              <t>This Glossary provides definitions, abbreviations, and explanations of terminology for information system security. The 334 pages of entries offer recommendations to improve the comprehensibility of written material that is generated in the Internet Standards Process (RFC 2026). The recommendations follow the principles that such writing should (a) use the same term or definition whenever the same concept is mentioned; (b) use terms in their plainest, dictionary sense; (c) use terms that are already well-established in open publications; and (d) avoid terms that either favor a particular vendor or favor a particular technology or mechanism over other, competing techniques that already exist or could be developed.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="FYI" value="36"/>
          <seriesInfo name="RFC" value="4949"/>
          <seriesInfo name="DOI" value="10.17487/RFC4949"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton">
              <organization/>
            </author>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <author fullname="T. Narten" initials="T." surname="Narten">
              <organization/>
            </author>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters.  To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper.  For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed.  This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="IANA-MediaTypes" target="https://www.iana.org/assignments/media-types">
          <front>
            <title>Media Types</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="IANA-DNS" target="https://www.iana.org/assignments/dns-parameters/dns-parameters.xhtml#extended-dns-error-codes">
          <front>
            <title>Domain Name System (DNS) Parameters, Extended DNS Error Codes</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="RPZ" target="https://dnsrpz.info">
          <front>
            <title>Response Policy Zone</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="Chrome-Translate" target="https://support.google.com/chrome/answer/173424">
          <front>
            <title>Change Chrome languages &amp; translate webpages</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="RFC8499">
          <front>
            <title>DNS Terminology</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <author fullname="A. Sullivan" initials="A." surname="Sullivan">
              <organization/>
            </author>
            <author fullname="K. Fujiwara" initials="K." surname="Fujiwara">
              <organization/>
            </author>
            <date month="January" year="2019"/>
            <abstract>
              <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs.  The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has sometimes changed in the decades since the DNS was first defined.  This document gives current definitions for many of the terms used in the DNS in a single document.</t>
              <t>This document obsoletes RFC 7719 and updates RFC 2308.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="219"/>
          <seriesInfo name="RFC" value="8499"/>
          <seriesInfo name="DOI" value="10.17487/RFC8499"/>
        </reference>
        <reference anchor="RFC8484">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <author fullname="P. McManus" initials="P." surname="McManus">
              <organization/>
            </author>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS.  Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="RFC7858">
          <front>
            <title>Specification for DNS over Transport Layer Security (TLS)</title>
            <author fullname="Z. Hu" initials="Z." surname="Hu">
              <organization/>
            </author>
            <author fullname="L. Zhu" initials="L." surname="Zhu">
              <organization/>
            </author>
            <author fullname="J. Heidemann" initials="J." surname="Heidemann">
              <organization/>
            </author>
            <author fullname="A. Mankin" initials="A." surname="Mankin">
              <organization/>
            </author>
            <author fullname="D. Wessels" initials="D." surname="Wessels">
              <organization/>
            </author>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <date month="May" year="2016"/>
            <abstract>
              <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS.  Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626.  In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
              <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group.  It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7858"/>
          <seriesInfo name="DOI" value="10.17487/RFC7858"/>
        </reference>
        <reference anchor="RFC9250">
          <front>
            <title>DNS over Dedicated QUIC Connections</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema">
              <organization/>
            </author>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson">
              <organization/>
            </author>
            <author fullname="A. Mankin" initials="A." surname="Mankin">
              <organization/>
            </author>
            <date month="May" year="2022"/>
            <abstract>
              <t>This document describes the use of QUIC to provide transport confidentiality for DNS. The encryption provided by QUIC has similar properties to those provided by TLS, while QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides more efficient packet-loss recovery than UDP. DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC 7858, and latency characteristics similar to classic DNS over UDP. This specification describes the use of DoQ as a general-purpose transport for DNS and includes the use of DoQ for stub to recursive, recursive to authoritative, and zone transfer scenarios.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9250"/>
          <seriesInfo name="DOI" value="10.17487/RFC9250"/>
        </reference>
        <reference anchor="RFC8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray">
              <organization/>
            </author>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format.  It was derived from the ECMAScript Programming Language Standard.  JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="I-D.reddy-add-resolver-info">
          <front>
            <title>DNS Resolver Information</title>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <date day="31" month="August" year="2022"/>
            <abstract>
              <t>   This document specifies a method for DNS resolvers to publish
   information about themselves.  DNS clients can use the resolver
   information to identify the capabilities of DNS resolvers.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-reddy-add-resolver-info-06"/>
        </reference>
        <reference anchor="RFC5625">
          <front>
            <title>DNS Proxy Implementation Guidelines</title>
            <author fullname="R. Bellis" initials="R." surname="Bellis">
              <organization/>
            </author>
            <date month="August" year="2009"/>
            <abstract>
              <t>This document provides guidelines for the implementation of DNS proxies, as found in broadband gateways and other similar network devices.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="152"/>
          <seriesInfo name="RFC" value="5625"/>
          <seriesInfo name="DOI" value="10.17487/RFC5625"/>
        </reference>
        <reference anchor="RFC8792">
          <front>
            <title>Handling Long Lines in Content of Internet-Drafts and RFCs</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen">
              <organization/>
            </author>
            <author fullname="E. Auerswald" initials="E." surname="Auerswald">
              <organization/>
            </author>
            <author fullname="A. Farrel" initials="A." surname="Farrel">
              <organization/>
            </author>
            <author fullname="Q. Wu" initials="Q." surname="Wu">
              <organization/>
            </author>
            <date month="June" year="2020"/>
            <abstract>
              <t>This document defines two strategies for handling long lines in width-bounded text content.  One strategy, called the "single backslash" strategy, is based on the historical use of a single backslash ('\') character to indicate where line-folding has occurred, with the continuation occurring with the first character that is not a space character (' ') on the next line.  The second strategy, called the "double backslash" strategy, extends the first strategy by adding a second backslash character to identify where the continuation begins and is thereby able to handle cases not supported by the first strategy.  Both strategies use a self-describing header enabling automated reconstitution of the original content.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8792"/>
          <seriesInfo name="DOI" value="10.17487/RFC8792"/>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Thanks to Vittorio Bertola, Wes Hardaker, Ben Schwartz, Erid Orth,
Viktor Dukhovni, Warren Kumari, Paul Wouters, John Levine, and Bob
Harold for the comments.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
