<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.6 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-jt-add-dns-server-redirection-03" category="std" consensus="true" xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.20.0 -->
  <front>
    <title abbrev="EDSR">Handling Encrypted DNS Server Redirection</title>
    <seriesInfo name="Internet-Draft" value="draft-jt-add-dns-server-redirection-03"/>
    <author initials="J." surname="Todd" fullname="J. Todd">
      <organization>Quad9</organization>
      <address>
        <email>jtodd@quad9.net</email>
      </address>
    </author>
    <author initials="T." surname="Jensen" fullname="T. Jensen">
      <organization>Microsoft</organization>
      <address>
        <email>tojens@microsoft.com</email>
      </address>
    </author>
    <author initials="C." surname="Mosher" fullname="C. Mosher">
      <organization>Innate, Inc.</organization>
      <address>
        <email>cmosher@gmail.com</email>
      </address>
    </author>
    <date year="2024" month="March" day="04"/>
    <area>Internet</area>
    <workgroup>ADD</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 44?>

<t>This document defines Encrypted DNS Server Redirection (EDSR),
a mechanism for encrypted DNS servers to redirect clients to
other encrypted DNS servers. This enables dynamic routing
to geo-located or otherwise more desirable encrypted DNS servers
without modifying DNS client endpoint configurations or the use 
of anycast by the DNS server.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://example.com/LATEST"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-jt-add-dns-server-redirection/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        WG Working Group mailing list (<eref target="mailto:add@ietf.org"/>),
        which is archived at <eref target="https://example.com/WG"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/add/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/johnhtodd/draft-DOH-redirect"/>.</t>
    </note>
  </front>
  <middle>
    <?line 53?>

<section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Encrypted DNS Server Redirection (EDSR) is a protocol that allows an encrypted
DNS resolver whose configuration is well known to clients to redirect them to other,
more desirable resolvers without having to support anycast and without having to
configure clients with these other resolvers ahead of time. It uses the mechanism
defined by DDR <xref target="I-D.ietf-add-ddr"/> to redirect an encrypted DNS client from one encrypted DNS
resolver to another encrypted DNS resolver. Where DDR uses a threat model that
presumes the initial DNS traffic is unencrypted, EDSR applies when the initial
DNS traffic is already encrypted.</t>
      <t>One example of what makes redirection to another resolver
desirable is geolocation. A DNS service may document one or a few well known resolver 
configurations even though it routes traffic to hundreds or thousands of resolvers
that are closer to the client, reducing latency and making DNS resolutions more
applicable to the client.</t>
      <t>This document describes only one mode of redirection - Strict Origin Redirection. Previous
versions of this draft defined an additional mode of redirection that allowed servers to 
redirect to servers that presented a different domain name than the original server. While
the scenario's validity has some interest, there is no consensus in the WG for how it can 
be addressed.</t>
    </section>
    <section anchor="dns-client-behavior">
      <name>DNS client behavior</name>
      <section anchor="discovering-redirections">
        <name>Discovering redirections</name>
        <t>When a DNS client first opens a connection to an encrypted DNS server, it <bcp14>MUST</bcp14>
send a SVCB query for the name of the resolver to discover its encrypted DNS configuration.
The DNS client <bcp14>SHOULD</bcp14> open a connection to the server returned in the SVCB query using the
TargetName and one of the IP addresses returned in additional A/AAAA records for the same
name. Once a connection has been successfully opened, as subsequently described by reaching
a suitable server at the end of the redirection chain, the client <bcp14>SHOULD</bcp14> close the first
connection. There are two methods defined to determine whether the redirection was suitable.</t>
        <section anchor="strict-origin-redirection">
          <name>Strict Origin Redirection</name>
          <t>The default method of redirection EDSR-compliant clients and servers <bcp14>MUST</bcp14> support is
Strict Origin Redirection. Using this method, if the returned SVCB record indicates a
server with a different domain name than the current encrypted DNS connection, the 
redirection <bcp14>MUST NOT</bcp14> be followed by the client. Clients <bcp14>MAY</bcp14> choose to treat this as an
upstream attack.</t>
          <t>The destination server <bcp14>MAY</bcp14> use delegated credentials <xref target="RFC9345"/>. This is valid
so long as the delegated credential is valid for the same domain name used by the
referring server. This is an encouraged practice for servers which need to redirect
clients to servers owned by other entities, as is the case with CDN contracts.</t>
        </section>
        <section anchor="redirection-away-from-ddr-discovered-servers">
          <name>Redirection away from DDR-discovered servers</name>
          <t>Strict Origin Redirection assumes that the original server
is identified by domain name from the client's perspective. Examples include when the client was configured
with the resolver through endpoint management or DNR discovery <xref target="RFC9463"/>. However, when server was discovered using
DDR <xref target="RFC9462"/>, this is not the case. Due to the threat model DDR operates under, where it has to
start from an unencrypted resolver, the identity of the server used for verification is its IP address.
The risks involved with using the domain name of a DDR-discovered resolver are further explored in the
Security Considerations section <xref target="seccon"/>.</t>
          <t>When clients use Strict Origin redirection discovery with a DDR discovered resolver, the only difference
is that the destination server it was redirected to <bcp14>MUST</bcp14> be able to claim the IP address of the previous
server in its SAN field. This is the equivalent of not changing origins in the DDR threat model.</t>
        </section>
      </section>
      <section anchor="identifying-self-redirections">
        <name>Identifying self-redirections</name>
        <t>If the set of IP addresses that are valid for the server being redirected to include
the IP address of the current server, the client <bcp14>SHOULD</bcp14> ignore the redirection, treating
it the same as receiving no response or a NODATA response from the SVCB query.
However, clients receiving preferable encryption parameters as part of the SVCB response
<bcp14>MAY</bcp14> choose to reconnect to negotiate to upgrade to the preferred encryption method. When
doing so, there is no need for the client to repeat EDSR as the redirection from the
server to itself has terminated the redirection chain.</t>
      </section>
      <section anchor="waiting-for-redirections">
        <name>Waiting for redirections</name>
        <t>The client does not need to wait for the results of the redirection discovery
query before sending other DNS queries on the connection, though they <bcp14>SHOULD</bcp14>
gracefully close the connection as soon as it has successfully established a
connection to the server it was redirected to and received or timed out the
outstanding queries on the original connection.</t>
        <t>See the considerations section for reasons a client <bcp14>MAY</bcp14> choose to decline a
redirection.</t>
      </section>
      <section anchor="refreshing-redirections">
        <name>Refreshing redirections</name>
        <t>EDSR allows a client to be redirected from an encrypted DNS resolver it was somehow
configured to use. When the redirection TTL expires, the client <bcp14>SHOULD</bcp14> return to
using its originally configured server unless it can refresh the redirection beforehand.
This allows the client to honor the intention of whatever configuration method was
used to instruct it to use the original encrypted DNS resolver.</t>
        <t>If a chain of redirections was followed, the effective TTL of the redirection is the
minimum of the TTLs encountered along the chain. Clients <bcp14>SHOULD</bcp14> however cap this value
to some minimum value at their discretion to avoid frequent redirection checking when
latency plus an incidentally low TTL along the chain results in near-zero effective TTLs.</t>
      </section>
      <section anchor="multiple-redirections">
        <name>Multiple redirections</name>
        <t>When clients receive more than one valid SVCB response, they <bcp14>SHOULD</bcp14> prefer using
the redirections that match their configuration (such as supported IP address family or
desired encrypted DNS protocol) in ascending order of the SVCB priority. Once a successful
connection is made to a redirected destination, clients <bcp14>MAY</bcp14> choose to discard other results
in favor of restarting EDSR with the originally configured resolver.</t>
        <t>Redirections are considered to be a one-to-one relationship (starting with one recursive
resolver and following its redirections should result in one replacement recursive resolver).
It is not expected that a stub resolver ends up using more recursive resolvers than it
was originally configured with when using EDSR.</t>
      </section>
      <section anchor="network-changes">
        <name>Network changes</name>
        <t>When a client device changes what network it is connected to, it <bcp14>SHOULD</bcp14> forget
pre-existing redirections and start EDSR over with the originally configured
resolvers. This ensures that a resolver which redirects clients based on their
source network can behave accordingly.</t>
        <t>Note that this is unrelated to what resolvers a client is originally configured with. 
For example, a client which is configured to always used the resolvers advertised by 
DHCP will likely start with different original resolvers when changing networks. How a 
client is configured with DNS resolvers is out of scope for this document. EDSR only 
provides a mechanism for clients to discover redirections from resolvers they were 
previously configured to use.</t>
      </section>
    </section>
    <section anchor="dns-server-behavior">
      <name>DNS server behavior</name>
      <t>DNS resolvers who want to redirect clients to other resolvers <bcp14>MUST</bcp14> respond to
SVCB <xref target="I-D.ietf-add-svcb-dns"/> queries for their own domain names with records that
describe the configuration of the destination server.</t>
      <t>Guidance in <xref section="5" sectionFormat="of" target="I-D.ietf-dnsop-svcb-https"/> to improve performance by
including additional A/AAAA records with the SVCB response <bcp14>SHOULD</bcp14> be followed.</t>
      <section anchor="ensuring-compatibility">
        <name>Ensuring compatibility</name>
        <t>Redirections <bcp14>MUST</bcp14> only redirect to resolvers which support at least the same
protocol, address family, port, and TLS minimum versions as the referring resolver.
This ensures that redirections do not lead clients to resolvers that are not compatible
with the client. In addition, servers <bcp14>SHOULD</bcp14> avoid redirecting to servers which will also
redirect clients unless they are actively coordinating to ensure a positive
client experience. See the Deployment Considerations section for more details.</t>
      </section>
      <section anchor="dealing-with-persistent-clients">
        <name>Dealing with persistent clients</name>
        <t>Servers <bcp14>SHOULD</bcp14> be prepared for clients to not follow the redirection immediately
as connection failures, other technical issues, or even client policy affecting server
choice may lead to clients being unable to follow the redirection promptly or at all.
Servers who are redirecting due to being overloaded <bcp14>MAY</bcp14> respond as they normally would
to overwhelming traffic.</t>
      </section>
      <section anchor="redirection-to-servers-controlled-by-third-parties">
        <name>Redirection to servers controlled by third parties</name>
        <t>Server operators ought to consider using delegated credentials <xref target="RFC9345"/> when they
wish to redirect general clients to other servers operated by other entities. This
allows the server operator to avoid giving access to their domain's private key to
third parties but also ensure general clients have a secured, same-origin redirection
experience.</t>
      </section>
    </section>
    <section anchor="deployment-considerations">
      <name>Deployment Considerations</name>
      <section anchor="large-trees-of-redirections">
        <name>Large trees of redirections</name>
        <t>It is possible for DNS servers to redirect clients to DNS servers which also
redirect clients. Clients which are presented with long chains of redirections
<bcp14>MAY</bcp14> choose to stop following redirections to reduce connection thrashing. DNS
server operators <bcp14>SHOULD</bcp14> deploy redirection behavior mindfully to avoid long
chains of redirection.</t>
        <t>Servers <bcp14>SHOULD</bcp14> ensure their redirections do not create loops, where clients
are redirected to a server it already encountered earlier in the process.
Clients <bcp14>MAY</bcp14> stop following redirections when they detect this, but <bcp14>MAY</bcp14> also
take a simpler approach, following only a maximum number of redirections.</t>
      </section>
      <section anchor="redirection-ttls">
        <name>Redirection TTLs</name>
        <t>Servers <bcp14>SHOULD</bcp14> provide sufficiently long TTLs for clients to avoid the need to
constantly repeat EDSR queries. Server operators should be mindful of redirection
chains because unless they collaboratively control the TTLs of one another's
redirections, redirection chains will end up with greatly reduced effective TTLs
because the client will always use the lowest.</t>
      </section>
      <section anchor="including-ip-addresses-in-edsr-responses">
        <name>Including IP addresses in EDSR responses</name>
        <t>If a recursive resolver does not include additional A/AAAA records per
<xref section="5" sectionFormat="of" target="RFC9460"/>, stub resolvers might end up failing
the redirection if the redirection destination name cannot be resolved. Additionally,
the recursive resolver <bcp14>SHOULD</bcp14> ensure records conntaining the same IP version as the
existing connection are returned (if the stub is currently connected over IPv4, one or
more A records <bcp14>SHOULD</bcp14> be included, and if the stub is currently connected over IPv6,
one or more AAAA records <bcp14>SHOULD</bcp14> be included).</t>
      </section>
    </section>
    <section anchor="seccon">
      <name>Security Considerations</name>
      <section anchor="trusting-the-redirected-connection">
        <name>Trusting the redirected connection</name>
        <t>EDSR does not provide novel authentication or security mechanisms. Redirection
is trusted by virtue of the server authentication via PKI through TLS <xref target="RFC5280"/>.
The DNS stub resolver implementing EDSR <bcp14>SHOULD</bcp14> use whatever policies it uses for
other TLS connections for encrypted DNS traffic to determine if a given TLS cert
chain is trustworthy before proceeding with EDSR.</t>
        <t>EDSR <bcp14>MUST NOT</bcp14> be used with encrypted DNS protocols that are not based on TLS.
This scenario will require future standards work.</t>
        <t>EDSR should not introduce any additional security considerations beyond use of
the original encrypted resolver prior to redirection. Because the original
connection was trusted, information sent over it about a new connection to use
should be as trusted. However, clients that wish to time bound vulnerabilities
to attackers who compromise the original resolver <bcp14>MAY</bcp14> choose to implement a
maximum TTL to honor on SVCB records that redirect to other servers.</t>
      </section>
      <section anchor="use-with-unencrypted-dns">
        <name>Use with unencrypted DNS</name>
        <t>EDSR <bcp14>MUST NOT</bcp14> be used to redirect unencrypted DNS traffic to any other resolver.
This use case is called "designation" and is covered by Discovery of Designated
Resolvers (DDR) as defined in <xref target="RFC9462"/>. Not following DDR opens up a DNS client
to malicious redirection to an attacker-controlled DNS server. For more information,
see <xref section="7" sectionFormat="of" target="RFC9462"/>.</t>
        <t>EDSR also <bcp14>MUST NOT</bcp14> be used to redirect encrypted DNS traffic to a resolver that
advertises support for unencrypted DNS. This would reduce the security posture of
the client. Clients <bcp14>MUST NOT</bcp14> follow an encrypted DNS redirection and then send
unencrypted DNS traffic to the new resolver.</t>
      </section>
      <section anchor="use-with-ddr-discovered-resolvers">
        <name>Use with DDR-discovered resolvers</name>
        <t>When a resolver is discovered using DDR <xref target="RFC9462"/>, the server's identity used for
TLS purposes is its IP address, not its domain name. This means servers and clients
<bcp14>MUST</bcp14> use the original server's IP address, not the IP address of the previous server
in the event of redirection chains, in the SAN field of destination servers to
validate the redirection.</t>
        <t>The reason for this is due to an attack where the DDR SVCB query response is modified
by an active attacker to have a different domain name in its "dohpath" SVCB key. When
the client uses it to issue the EDSR query to the (valid) DDR-designated resolver, it
will innocently forward the query upstream and return the result. The result may even
be DNSSEC signed since it was issued by the valid owner of the attacker's domain name.
If this redirection is then followed and validated with the attacker's domain name, 
it will succeed and the client will have been maliciously redirected to use an attacker's
server at the low cost of a port 53 attack without breaking encryption or compromising
the encrypted DNS server DDR designated.</t>
        <t>There is no harm in using the name of the server for the EDSR query so long as the
validation of the destination server is performed using the original IP address and
not the name. This ensures EDSR clients can consistently use the domain name of a 
server for redirection discovery. Use of the DDR-defined SUDN "resolver.arpa" was
considered and rejected because this would conflate DDR configuration and EDSR
configuration by placing them in the same zone, using the same DNS record type.</t>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>A client <bcp14>MAY</bcp14> choose to not send other name queries until redirection is complete,
but there should be no privacy issue with sending queries to intermediate resolvers before
redirection takes place. This is because the intermediate resolvers are considered
to be appropriate destinations by the client even if the resolver wants to substitute
another resolver for reasons other than name resolution results such as latency
optimization or load balancing.</t>
    </section>
    <section anchor="data-flow-considerations">
      <name>Data Flow Considerations</name>
      <section anchor="data-scope">
        <name>Data Scope</name>
        <t>EDSR does not result in any additional data being shared by the end user, as the
DNS queries going to the new resolver were already going to go to the original
resolver.</t>
      </section>
      <section anchor="data-visibility">
        <name>Data Visibility</name>
        <t>EDSR results in a 1:1 replacement of DNS resolvers used (future queries sent to
the new resolver will not be sent to the original resolver anymore). This means the
number of servers which see any given query remain the same.</t>
        <t>This is only true if clients only use one redirected DNS server per original DNS
server. If the DNS server offers more than one redirection, and the client validates
and uses two or more of those redirections, then there will be greater data
visibility (more destinations). This is however entirely within the client's choice
following their own policy as a redundancy versus volume of exhausted data trade-off.</t>
        <t>EDSR requires the redirection to another server to also use encrypted DNS, so no
third-party will be introduced to the data flow unless the encryption is broken.</t>
      </section>
      <section anchor="data-centralization">
        <name>Data centralization</name>
        <t>EDSR can only increase data centralization if multiple resolver operators choose to
redirect DNS clients to the same, other DNS resolver. To prevent the reduction of
their resolution redundancy, DNS clients <bcp14>MAY</bcp14> choose to ignore redirections if they
find that they point to resolvers they are already configured to use, by a previous
redirection or some other configuration.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This draft has no IANA considerations.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="I-D.ietf-add-ddr">
          <front>
            <title>Discovery of Designated Resolvers</title>
            <author fullname="Tommy Pauly" initials="T." surname="Pauly">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Eric Kinnear" initials="E." surname="Kinnear">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Patrick McManus" initials="P." surname="McManus">
              <organization>Fastly</organization>
            </author>
            <author fullname="Tommy Jensen" initials="T." surname="Jensen">
              <organization>Microsoft</organization>
            </author>
            <date day="5" month="August" year="2022"/>
            <abstract>
              <t>This document defines Discovery of Designated Resolvers (DDR), a set of mechanisms for DNS clients to use DNS records to discover a resolver's encrypted DNS configuration.  An Encrypted DNS Resolver discovered in this manner is referred to as a "Designated Resolver".  These mechanisms can be used to move from unencrypted DNS to encrypted DNS when only the IP address of a resolver is known.  These mechanisms are designed to be limited to cases where Unencrypted DNS Resolvers and their Designated Resolvers are operated by the same entity or cooperating entities.  It can also be used to discover support for encrypted DNS protocols when the name of an Encrypted DNS Resolver is known.
              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-add-ddr-10"/>
        </reference>
        <reference anchor="RFC9462">
          <front>
            <title>Discovery of Designated Resolvers</title>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="E. Kinnear" initials="E." surname="Kinnear"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <author fullname="T. Jensen" initials="T." surname="Jensen"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document defines Discovery of Designated Resolvers (DDR), a set of mechanisms for DNS clients to use DNS records to discover a resolver's encrypted DNS configuration. An Encrypted DNS Resolver discovered in this manner is referred to as a "Designated Resolver". These mechanisms can be used to move from unencrypted DNS to encrypted DNS when only the IP address of a resolver is known. These mechanisms are designed to be limited to cases where Unencrypted DNS Resolvers and their Designated Resolvers are operated by the same entity or cooperating entities. It can also be used to discover support for encrypted DNS protocols when the name of an Encrypted DNS Resolver is known.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9462"/>
          <seriesInfo name="DOI" value="10.17487/RFC9462"/>
        </reference>
        <reference anchor="I-D.ietf-add-svcb-dns">
          <front>
            <title>Service Binding Mapping for DNS Servers</title>
            <author fullname="Benjamin M. Schwartz" initials="B. M." surname="Schwartz">
              <organization>Meta Platforms, Inc.</organization>
            </author>
            <date day="26" month="June" year="2023"/>
            <abstract>
              <t>The SVCB DNS resource record type expresses a bound collection of endpoint metadata, for use when establishing a connection to a named service.  DNS itself can be such a service, when the server is identified by a domain name.  This document provides the SVCB mapping for named DNS servers, allowing them to indicate support for encrypted transport protocols.
              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-add-svcb-dns-09"/>
        </reference>
        <reference anchor="I-D.ietf-dnsop-svcb-https">
          <front>
            <title>Service Binding and Parameter Specification via the DNS (SVCB and HTTPS Resource Records)</title>
            <author fullname="Benjamin M. Schwartz" initials="B. M." surname="Schwartz">
              <organization>Google</organization>
            </author>
            <author fullname="Mike Bishop" initials="M." surname="Bishop">
              <organization>Akamai Technologies</organization>
            </author>
            <author fullname="Erik Nygren" initials="E." surname="Nygren">
              <organization>Akamai Technologies</organization>
            </author>
            <date day="11" month="March" year="2023"/>
            <abstract>
              <t>This document specifies the "SVCB" ("Service Binding") and "HTTPS" DNS resource record (RR) types to facilitate the lookup of information needed to make connections to network services, such as for HTTP origins.  SVCB records allow a service to be provided from multiple alternative endpoints, each with associated parameters (such as transport protocol configuration), and are extensible to support future uses (such as keys for encrypting the TLS ClientHello).  They also enable aliasing of apex domains, which is not possible with CNAME.  The HTTPS RR is a variation of SVCB for use with HTTP (see RFC 9110, "HTTP Semantics").  By providing more information to the client before it attempts to establish a connection, these records offer potential benefits to both performance and privacy.
              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dnsop-svcb-https-12"/>
        </reference>
        <reference anchor="RFC9460">
          <front>
            <title>Service Binding and Parameter Specification via the DNS (SVCB and HTTPS Resource Records)</title>
            <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
            <author fullname="M. Bishop" initials="M." surname="Bishop"/>
            <author fullname="E. Nygren" initials="E." surname="Nygren"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies the "SVCB" ("Service Binding") and "HTTPS" DNS resource record (RR) types to facilitate the lookup of information needed to make connections to network services, such as for HTTP origins. SVCB records allow a service to be provided from multiple alternative endpoints, each with associated parameters (such as transport protocol configuration), and are extensible to support future uses (such as keys for encrypting the TLS ClientHello). They also enable aliasing of apex domains, which is not possible with CNAME. The HTTPS RR is a variation of SVCB for use with HTTP (see RFC 9110, "HTTP Semantics"). By providing more information to the client before it attempts to establish a connection, these records offer potential benefits to both performance and privacy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9460"/>
          <seriesInfo name="DOI" value="10.17487/RFC9460"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9345">
          <front>
            <title>Delegated Credentials for TLS and DTLS</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="S. Iyengar" initials="S." surname="Iyengar"/>
            <author fullname="N. Sullivan" initials="N." surname="Sullivan"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>The organizational separation between operators of TLS and DTLS endpoints and the certification authority can create limitations. For example, the lifetime of certificates, how they may be used, and the algorithms they support are ultimately determined by the Certification Authority (CA). This document describes a mechanism to overcome some of these limitations by enabling operators to delegate their own credentials for use in TLS and DTLS without breaking compatibility with peers that do not support this specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9345"/>
          <seriesInfo name="DOI" value="10.17487/RFC9345"/>
        </reference>
        <reference anchor="RFC9463">
          <front>
            <title>DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers (DNR)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="T. Reddy.K" initials="T." role="editor" surname="Reddy.K"/>
            <author fullname="D. Wing" initials="D." surname="Wing"/>
            <author fullname="N. Cook" initials="N." surname="Cook"/>
            <author fullname="T. Jensen" initials="T." surname="Jensen"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies new DHCP and IPv6 Router Advertisement options to discover encrypted DNS resolvers (e.g., DNS over HTTPS, DNS over TLS, and DNS over QUIC). Particularly, it allows a host to learn an Authentication Domain Name together with a list of IP addresses and a set of service parameters to reach such encrypted DNS resolvers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9463"/>
          <seriesInfo name="DOI" value="10.17487/RFC9463"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
      </references>
    </references>
    <?line 370?>

<section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank the following individuals for their invaluable feedback
to this document: Ben Schwartz, Eric Orth, Erik Nygren, Ralph Weber, Ted Hardie, Tommy
Pauly, Viktor Dukhovni, and Vittorio Bertola.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
