<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.1.7) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-johani-dnsop-transport-signaling-02" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="DNS Transport Signaling">Authoritative DNS Transport Signaling</title>

    <author initials="J." surname="Stenstam" fullname="Johan Stenstam">
      <organization>The Swedish Internet Foundation</organization>
      <address>
        <postal>
          <country>Sweden</country>
        </postal>
        <email>johan.stenstam@internetstiftelsen.se</email>
      </address>
    </author>
    <author initials="L." surname="Fernandez" fullname="Leon Fernandez">
      <organization>The Swedish Internet Foundation</organization>
      <address>
        <postal>
          <country>Sweden</country>
        </postal>
        <email>leon.fernandez@internetstiftelsen.se</email>
      </address>
    </author>
    <author initials="E." surname="Bergström" fullname="Erik Bergström">
      <organization>The Swedish Internet Foundation</organization>
      <address>
        <postal>
          <country>Sweden</country>
        </postal>
        <email>erik.bergstrom@internetstiftelsen.se</email>
      </address>
    </author>
    <author initials="P." surname="Homberg" fullname="Philip Homberg">
      <organization>NLnet Labs</organization>
      <address>
        <postal>
          <country>The Netherlands</country>
        </postal>
        <email>philip@nlnetlabs.nl</email>
      </address>
    </author>
    <author initials="S." surname="Dickinson" fullname="Sara Dickinson">
      <organization>Sinodun IT</organization>
      <address>
        <postal>
          <country>United Kingdom</country>
        </postal>
        <email>sara@sinodun.com</email>
      </address>
    </author>

    <date />

    <area>Internet</area>
    <workgroup>DNSOP Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 47?>

<t>This document proposes a mechanism for authoritative DNS servers to
signal their support for alternative transport protocols (e.g., DNS
over TLS (DoT), DNS over HTTPS (DoH) and DNS over QUIC (DoQ)). This
signaling may either be provided within the Additional section of
authoritative DNS responses or be the result of direct DNS queries.</t>

<t>The former, "opportunistic mode" is hint-based and aims to enable
resolvers to discover alternative transports efficiently and then
opportunistically upgrade connections to the authoritative, thereby
improving privacy, security, and performance for subsequent
interactions.  The mechanism is designed to not require any protocol
change or additional queries. It is safe, backward-compatible, and
effective even when DNSSEC validation of the hint is not possible or
desired.</t>

<t>In certain circumstances and with additional overhead it is also
possible to use direct queries to securely obtain authentication
information for the authoritative that can then be used to
authenticate an encrypted connection.</t>

<t>It is also possible to establish a "validated mode" where the
communication between the resolver and the authoritative server is
provably both secure and authentic. Validated mode may not always be
possible, depending on whether the resolver is able to DNSSEC validate
the signal or not. When Validated mode is possible it does provide a
stronger and more trustworthy connection.</t>

<t>This document proposes an improvement to the opportunistic (but blind)
testing of alternative transports suggested in RFC9539 by providing a
mechanism by which a responding authoritative server may signal what
alternative transports it supports.</t>

<t>TO BE REMOVED: This document is being collaborated on in Github at:
<eref target="https://github.com/johanix/draft-johani-dnsop-transport-signaling">https://github.com/johanix/draft-johani-dnsop-transport-signaling</eref>.
The most recent working version of the document, open issues, etc, should all be
available there.  The authors (gratefully) accept pull requests.</t>



    </abstract>



  </front>

  <middle>


<?line 86?>

<section anchor="introduction"><name>1. Introduction</name>

<t>The Domain Name System (DNS) primarily relies on UDP and TCP for
communication between resolvers and authoritative servers. While
these protocols are well-established, there is a growing interest in
leveraging modern transport protocols like DNS over TLS (DoT)
<xref target="RFC7858"/>, DNS over HTTPS (DoH) <xref target="RFC9461"/> and DNS over QUIC
(DoQ) <xref target="RFC9250"/> to enhance privacy, security, and performance.</t>

<t>Clients of authoritative servers (recursive resolvers) may employ
various policies (usage profiles) when attempting to connect to an
authoritative. Two policies are described for the stub to recursive
case in RFC8310, Strict and Opportunistic which are also applicable
here:</t>

<t><list style="symbols">
  <t>Strict mode relies on the client having securely discovered
authentication information (e.g. a name or SPKI) for the server and
then choosing to hard fail if an authenticated encrypted connection
cannot be established. This protects against active attack on the
resulting connection (however a denial-of-service attack is
possible).</t>
  <t>Opportunistic mode (<xref target="RFC7435"/>) starts with cleartext as a baseline
with upgrade to encrypted transport and authentication of the
connection when available. This is a best effort attempt to set up
an encrypted DNS transport connection. This can provide enhanced
privacy against a passive attacker. However an active attacker may
be able to force a downgrade to unencrypted DNS.</t>
</list></t>

<t>Opportunistic mode can proceed based on, for example, probing of server
capabilities (as in <xref target="RFC9539"/>) however a mechanism to signal such
capabilities has a number of advantages.</t>

<t>Existing efforts to signal service connection information, such as the
SVCB and HTTPS DNS records <xref target="RFC9460"/> <xref target="RFC9461"/>, primarily focus
on service discovery mechanisms where a client explicitly queries for
these records, often from a parent zone. While robust, this approach
can introduce additional latency and requires explicit configuration
at the parent zone level.</t>

<t>This document proposes a new hint-based "DNS Transport Signaling" (DTS)
mechanism. DTS, aka an "DTS Hint" allows an authoritative DNS nameserver
to directly convey its transport capabilities as a hint within the
Additional section of responses to queries where it identifies itself as
an authoritative nameserver for the requested zone. This direct, in-band
signaling provides a low-latency discovery path, even when a formal,
validated signal is not available.  Furthermore, this is achieved without
any changes to the DNS Protocol.</t>

<t>The information conveyed by this hint alone signals only the
capabilities of the authoritative nameserver serving the zone. It does
not, therefore, establish a full chain of trust directly to the zone
itself and should be considered as insecure. It should not be used as
a basis of a Strict policy, only to enable Opportunistic
transport. However, receiving such a signal enables resolvers to
immediately attempt to establish an opportunistically encrypted
connection to the resolver without further queries being required.</t>

<t>The focus of this document is the hint-based signaling of transport
capabilities, however Section 6.2 outlines in detail the specific
requirements for how DNSSEC signed authoritatives can provide, and
willing resolvers can directly query for, a set of records than can
securely provide authentication information for an authoritative
nameserver that a resolver could then use to implement a Strict usage
policy.</t>

<section anchor="confidentiality"><name>1.1. Confidentiality</name>

<t>The above text discusses discovery of transport signals and
authentication information in queries made by the recursive
resolver. Those queries may or may not occur over encrypted or
authenticated connections. Only when all the connections are
authenticated are all the queries protected from active
surveillance. If all the connections are opportunistically encrypted
then the queries are protected from passive surveillance. Otherwise
they may occur in cleartext, or a combination of circumstances may
exist.</t>

<t>Such queries leak the name of the zone that the resolver wishes to
ultimately query which in itself can be sensitive. During the early
stages of the incremental rollout of technologies such as recursive to
authoritative encrypted connections it is unlikely that fully
confidential discovery will be possible due to the nature of the DNS
hierarchy. However, if large TLDs and/or those hosted by large CDNs
support encrypted transports a significant number of queries from busy
resolvers to discovery information on TLD child zones (and below)
could be performed confidentially thereby greatly improving the
privacy over the current situation.</t>

</section>
<section anchor="prior-art"><name>1.2. Prior Art</name>

<t>An attempt at utilizing more modern, and in particular, more private
transports between resolvers and authoritative nameservers was
introduced in <xref target="RFC9539"/>. The idea there was to opportunistically
try to send the query to the authoritative nameserver over multiple
transports with no prior knowledge of whether a transport was
supported in the receiving end or not.</t>

<t>The drawback with that approach is that without any significant
deployment of authoritative support the resolver end will mostly spend
cycles and traffic on a wasted effort. For this reason their
deployment has been limited.</t>

<t>Furthermore, in Appendix B of <xref target="RFC9539"/> requirements for improving
the defense against an active attacker are listed. The first
requirement is:</t>

<t><list style="symbols">
  <t>A signaling mechanism that tells the recursive resolver that the
authoritative server intends to offer authenticated encryption.</t>
</list></t>

<t>This document aims to provide exactly such a mechanism while staying
within the current DNS protocol. Therefore the DNS transport signaling
provided will be hint-based, and as such fit well as an improvement
to <xref target="RFC9539"/>.</t>

</section>
<section anchor="rationale-for-using-the-additional-section"><name>1.3. Rationale for Using the Additional Section</name>

<t>See Appendix A for the rationale for using the Additional section for the transport signaling hint.</t>

</section>
</section>
<section anchor="terminology"><name>2. Terminology</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in BCP
14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all
capitals.</t>

<t><list style="symbols">
  <t><strong>Authoritative Nameserver (Auth Server):</strong> A DNS server that holds
 the authoritative zone data for a specific domain.</t>
  <t><strong>Recursive Nameserver (Resolver):</strong> A DNS server that processes
 user queries, performing iterative lookups to authoritative servers to
 resolve domain names.</t>
  <t><strong>DTS Hint:</strong> An SVCB record included in the Additional section of an authoritative DNS response, intended to signal the responding authoritative nameserver's transport capabilities.</t>
  <t><strong>SVCB Record:</strong> Service Binding record, as defined in <xref target="RFC9460"/>.</t>
</list></t>

</section>
<section anchor="modes-of-operation"><name>3. Modes of Operation</name>

<t>This document describes a mechanism of DNS transport signaling
intended to result in improved communication between the resolver and
the authoritative nameserver. This DNS transport signal is provided
via an SVCB record that describes the transport capabilities of the
authoritative server.</t>

<t>In the easiest case the resolver will be able to communicate securely
with the authoritative server using an encrypted channel (like DoQ or
DoT), but the resolver does not have the identity of the authoritative
server proven.  This is referred to as "opportunistic mode" and is
essentially equivalent to the communication used today over UDP/TCP
with the addition of privacy.</t>

<t>The second level of communication is when the resolver is able to
verify the identity of the authoritative server via validation of a
DNSSEC signature over the DNS transport signal (which is contained in
an SVCB record). This is referred to as "validated mode" and is
equivalent to the opportunistic mode plus knowledge that the DNS
transport signal provably describes the authoritative server that the
resolver is communicating with.</t>

<!--
The third level of communication is when the resolver is able to
verify both the identity of the authoritative server AND that this
server is an authoritative server for the zone that the DNS query is
about (the "child zone"). This is referred to as "strict mode". The
difference between strict mode and validated mode is that in the
latter case the NS RRset for the zone is either DNSSEC validated (and
shown to contain the authoritative nameserver) or the NS RRset for the
child zone has been received via a referral from a parent nameserver
using a strict mode connection.
-->

<t>In opportunistic mode, the authoritative server and the recursive
resolver make a best effort attempt to set up an encrypted DNS
transport connection.  This provides enhanced privacy against a
passive attacker. However an active attacker may be able to force a
downgrade to unencrypted DNS.</t>

<section anchor="description-of-problem-space"><name>3.1. Description of Problem Space</name>

<t>This section looks at the various configurations that need to be
supported.</t>

<t>For opportunistic mode to be possible, the authoritative server needs
to provide the recursive resolver with the DNS transport signaling
record even when the recursive resolver does not explicitly ask for it
(i.e. as a hint, in the Additional Section). For example by adding it
to the result of an A or AAAA query for a name server. The
recursive resolver accepts such a record and uses it to set up a
secure transport.</t>

<t>There are three zones that matter in this analysis: the parent zone,
the child zone, and the zone that contains the name server addresses
and transport signaling records.  Note that the name server addresses
may be located in the child zone.  And some of the three zones may be
served by the same name server.</t>

<t>The parent zone contains the delegation NS RRset for the child which
is not DNSSEC signed. Therefore it does not matter if the parent zone
is DNSSEC signed or not in terms of validating the child’s NS RRset.</t>

<t>For the child zone there are also two possibilities, the child zone is
DNSSEC secure or not.</t>

<t>For the nameserver transport signaling there are two possibilities:
either the zone that holds the nameserver information is DNSSEC secure
or it is DNSSEC insecure (i.e. the signaling needs to be learned
opportunistically and later possibly be validated by direct query to
the SVCB owner name).</t>

<section anchor="validated-transport-signaling-not-possible"><name>3.1.1. Validated Transport Signaling Not Possible</name>

<t>There are cases where validated transport signaling is unavailable.
One case is when the zone that holds the nameserver records is not
DNSSEC secure. In that case obtaining transport signaling in a
validated way is not possible without additional trust.</t>

<t>Another case is where the parent zone does not provide a path that
allows validating the child’s NS RRset and the child zone is not
DNSSEC secure.  In that case obtaining a list of the child's
nameservers in a validated way is impossible.</t>

</section>
<section anchor="validated-transport-signaling-possible"><name>3.1.2. Validated Transport Signaling Possible</name>

<t>The remaining cases can be analysed as follows.</t>

<!--
If the parent provides a path to validate the delegation, the resolver
can receive a trusted (delegation) NS RRset from the
parent. Otherwise, the resolver has to obtain the apex NS RRset from
the child and verify that the apex NS RRset is DNSSEC secure.
-->

<t>If the zone that holds the nameserver records is DNSSEC secure then it
is often sufficient if the nameserver adds DNS transport signaling along
with an A or AAAA response (including signatures).</t>

<t>If no signed signaling is received opportunistically then the resolver
SHOULD issue an explicit query for the SVCB RRset at the SVCB owner
name (_dns.{nameserver FQDN}) to obtain a validated signal or a secure
denial of existence.</t>

<!--
### 3.1.3. Summary Of Transport Signaling Possibilities

Yada, yada.
-->

</section>
</section>
<section anchor="behaviour-of-the-two-modes"><name>3.2. Behaviour of the Two Modes</name>

<section anchor="opportunistic-mode"><name>3.2.1. Opportunistic Mode</name>

<t>Opportunistic mode applies when the DTS Hint (the SVCB record) for the
authoritative nameserver is received opportunistically in the
Additional section as part of the response to a DNS query for
something else. The hint may or may not be DNSSEC-signed and may or
may not be successfully validated by the resolver.</t>

<section anchor="behavior"><name>Behavior:</name>

<t><list style="symbols">
  <t>If the SVCB record and its signatures are DNSSEC-validated,
the resolver MAY treat it equivalently to Validated mode for the
corresponding data.</t>
  <t>If the SVCB record is not validated (e.g., unsigned, or
validation fails), then:
  <list style="symbols">
      <t>The resolver MAY use only positive "alpn" entries to attempt a
transport upgrade (e.g., dot, doq).</t>
      <t>The resolver MUST ignore the negative transport signal "-do53", if
present.</t>
      <t>The resolver MUST ignore ipv4hint, ipv6hint, tlsa, and any other
parameters that affect addressing or authentication.</t>
      <t>The resolver MUST be prepared to immediately fall back to
traditional UDP/TCP (Do53) upon failure or timeout.</t>
    </list></t>
</list></t>

</section>
<section anchor="rationale"><name>Rationale:</name>

<t><list style="symbols">
  <t>Opportunistic mode enables low-latency discovery without requiring
changes at parent zones or prior configuration, while containing
risk by limiting use of unvalidated data to only positive upgrade
attempts.</t>
</list></t>

</section>
</section>
<section anchor="validated-mode"><name>3.2.2. Validated Mode</name>

<t>Validated mode applies when the resolver explicitly queries for the
SVCB RRset at the SVCB owner name for the nameserver (i.e.,
_dns.{nameserver FQDN}) and obtains a DNSSEC-signed response that is
successfully validated to the appropriate trust anchor.</t>

<section anchor="requirements-and-behavior"><name>Requirements and behavior:</name>

<t><list style="symbols">
  <t>The resolver MUST issue a direct query for the SVCB RRset at
_dns.{nameserver FQDN}.</t>
  <t>The resolver MUST successfully DNSSEC-validate the SVCB RRset and
its RRSIGs.</t>
  <t>When validated, the resolver MAY use all fields of the SVCB RDATA
for connection establishment and policy decisions, including:
  <list style="symbols">
      <t>alpn: positive transport signals (e.g., dot, doq) and the
negative transport signal "-do53" (if present).</t>
      <t>ipv4hint / ipv6hint: address hints for the authoritative
nameserver.</t>
      <t>tlsa: a new SVCB parameter defined by this document that conveys
the TLSA record to authenticate TLS/QUIC connections to the
authoritative nameserver.</t>
    </list></t>
  <t>If a validated SVCB contains the explicit negative transport signal
"-do53", the resolver SHOULD honor it. The "-do53" signal indicates
that legacy UDP/TCP is NOT supported by this authoritative
nameserver and the resolver SHOULD attempt only other advertised
transports (if any). If all transport alternatives fail in the
validated case the resolver SHOULD treat that server as unreachable
and prefer other authoritative servers for the zone.</t>
</list></t>

</section>
</section>
</section>
<section anchor="precedence-and-interaction"><name>3.3. Precedence and Interaction</name>

<t><list style="symbols">
  <t>Validated transport signals MUST take precedence over Opportunistic
transport signals.</t>
  <t>A validated Opportunistic transport signal is equivalent to a
Validated transport signal for policy and usage purposes.</t>
  <t>An Opportunistic (unvalidated) transport signal MUST NOT be used to
enforce negative transport policy ("-do53"), alter addressing
("ipv4hint/ipv6hint"), or bootstrap authentication material
("tlsa").</t>
</list></t>

</section>
<section anchor="caching-and-no-dts"><name>3.4. Caching and No-DTS</name>

<t><list style="symbols">
  <t>Resolvers MAY cache Validated-mode SVCB information according to its
TTL and MAY use the EDNS(0) No-DTS option to avoid redundant hints
when sufficient information is cached.</t>
  <t>In Opportunistic mode, resolvers MAY cache positive "alpn" results
subject to local policy (see Resolver Caching Strategies). When a
resolver has sufficient cached information, it SHOULD set No-DTS to
reduce response size and limit unnecessary hints.</t>
</list></t>

</section>
<section anchor="summary-of-permitted-use-by-mode"><name>3.5. Summary of Permitted Use by Mode</name>

<t><list style="symbols">
  <t>Opportunistic:
  <list style="symbols">
      <t>MAY use: alpn: "doq", "dot", "h2" and "h3" only.</t>
      <t>MUST NOT use: alpn: "-do53", ipv4hint, ipv6hint, tlsa, or any
parameter that affects addressing or authentication.</t>
      <t>MUST support fallback to do53 (i.e. UDP/TCP).</t>
    </list></t>
  <t>Validated:
  <list style="symbols">
      <t>MAY use: alpn: "doq", "dot", "h2", "h3", "-do53", ipv4hint,
ipv6hint, tlsa, and other defined parameters.</t>
    </list></t>
</list></t>

<t>Implementation note:
- Existing resolvers that do not understand the alpn="-do53" token or
  the new "tlsa" parameter will ignore them and remain
  interoperable. Clients implementing this specification MUST follow
  the above mode-dependent processing and precedence rules.</t>

</section>
</section>
<section anchor="the-opportunistic-signaling-mechanism"><name>4. The Opportunistic Signaling Mechanism</name>

<t>The core of this proposal is for an authoritative nameserver to
include a DNS transport signal in the form of an SVCB record in the
Additional section of its responses under specific conditions.</t>

<t>This consists of three parts. The first two are the behaviour of the
authoritative nameserver receiving the query and the behaviour of the
recursive nameserver receiving the response. The final part is a new
EDNS(0) option that defines an OPT-OUT capability.</t>

</section>
<section anchor="authoritative-nameserver-behaviour"><name>5. Authoritative Nameserver Behaviour</name>

<section anchor="trigger-conditions-for-including-the-dts-hint"><name>5.1. Trigger Conditions for Including the DTS Hint</name>

<t>An authoritative nameserver SHOULD include an DTS Hint when <em>all</em> of
the following conditions are met:</t>

<t><list style="numbers" type="1">
  <t><strong>Self-Identification:</strong> The responding authoritative own Fully
Qualified Domain Name (FQDN) (or one of its configured
aliases/identities) is found within the NS RRset for the queried
zone.</t>
  <t><strong>Transport Capability:</strong> The responding authoritative nameserver
supports one or more alternative transport protocols (e.g., DoT,
DoH, DoQ) and is configured to advertise these capabilities. Or the
nameserver does not (temporarily or permanently) support DNS over
legacy UDP/TCP transport and is configured to advertise this fact.</t>
  <t><strong>SVCB not present in Answer:</strong> If the SVCB record is present in
the Answer section (because it was explicitly queried for), then it
does not have to be included again in the Additional section,
regardless of whether the resolver has set the DTS Option or not.</t>
</list></t>

</section>
<section anchor="multiple-server-identities"><name>5.2. Multiple Server Identities</name>

<t>An authoritative nameserver may be known by multiple FQDNs (e.g.,
ns1.example.com, dns.customer.org, ns.cdnprovider.net). To facilitate
condition 1 ("Self-Identification"), authoritative server
implementations MAY include a configuration mechanism (e.g., an
identities list) where operators can list FQDNs by which the server is
known. This allows the server to correctly identify itself regardless
of the specific name used in the NS RRset.</t>

</section>
<section anchor="format-of-the-dns-transport-signal-svcb-record"><name>5.3. Format of the DNS Transport Signal SVCB Record</name>

<t>The DTS Hint MUST be an SVCB record with the following
characteristics:</t>

<t><list style="symbols">
  <t><strong>OWNER:</strong> The owner name of the SVCB record MUST be the label
"_dns" followed by the FQDN of the authoritative nameserver itself,
as identified in the NS RRset that triggered its inclusion (e.g.,
_dns.ns.dnsprovider.com.).</t>
  <t><strong>CLASS:</strong> IN (Internet).</t>
  <t><strong>TYPE:</strong> SVCB.</t>
  <t><strong>TTL:</strong> The TTL of the SVCB record SHOULD be chosen by the
 authoritative server operator. Choice of TTL is a local
 configuration decision, but unless the supported transports are
 subject to frequent change a value on the order of 24h or more is
 suggested.</t>
  <t><strong>SVCB_PRIORITY:</strong> 1. The specific priority value is not critical
 for this hint mechanism, but 1 indicates the highest priority for
 the service.</t>
  <t><strong>SVCB_TARGET:</strong> . (root). This indicates that the DNS transport
 capabilities described by the SVCB record refer to the owner name
 of the record.</t>
  <t><strong>SVCB_PARAMS:</strong> A set of Service Parameters indicating the
supported transport protocols. This document uses the "alpn"
parameter <xref target="RFC9460"/> for signaling DoT (alpn=dot) and DoQ
(alpn=doq).  It further defines the new alpn parameter token "-do53"
for signaling lack of support for UDP/TCP. Resolvers MUST treat
"-do53" as actionable only when the SVCB RRset has been
DNSSEC-validated (Validated mode).  <vspace blankLines='1'/>
The SVCB parameters "ipv4hint" and "ipv6hint" MAY be
included. Resolvers MUST use these address hints only when the SVCB
RRset has been successfully validated (Validated mode).  <vspace blankLines='1'/>
A new "tlsa" SVCB parameter contains the corresponding TLSA record
for the certificate used to secure a DoQ or DoT transport. Resolvers
MUST use "tlsa" only when the SVCB RRset has been successfully
validated (Validated mode).  <vspace blankLines='1'/>
If any other parameter is present in the SVCB parameter list it
 must be ignored by the resolver.</t>
</list></t>

<t><strong>Example 1:</strong></t>

<t>If ns.dnsprovider.net. responds to a query for www.example.com. (in
the unsigned zone example.com.) and ns.dnsprovider.net is listed in
the NS RRset for example.com., it may respond with a DNS message
that contains:
~~~
Header: ...</t>

<t>Answer:
www.example.com.   IN A 1.2.3.4</t>

<t>Authority:
example.com.       IN NS ns1.example.com.
example.com.       IN NS ns.dnsprovider.net.</t>

<t>Additional:
ns.dnsprovider.net. IN A 5.6.7.8
ns.dnsprovider.net. IN RRSIG A ...
_dns.ns.dnsprovider.net. IN SVCB 1 . "alpn=doq,dot,do53"
_dns.ns.dnsprovider.net. IN RRSIG SVCB ...
~~~</t>

<!--
### johani: broken example, to be fixed
**Example 2:**

If the signed zone example.com has two nameservers, ns1.example.com and
ns2.example.com, then a possible response from ns2.example.com may be:
~~~
Header: ...

Answer:
www.example.com.   IN A 1.2.3.4

Authority:

Additional:
ns2.example.com. IN A 5.6.7.8
ns2.example.com. IN SVCB 1 . "alpn=doq,dot,do53"
ns2.example.com. IN RRSIG SVCB ... 
ns1.example.com. IN SVCB 1 . "alpn=dot"
ns1.example.com. IN RRSIG SVCB ... 
~~~
This requires that "ns2.example.com." is a name that this
authoritative nameserver is aware of as one of its identities.
Furthermore, as the zone example.com is signed it is possible to
include the SVCB.

Note: the requirement for the SVCB record to be included only if it is
DNSSEC-signed has the consequence that the DTS transport signal cannot
be present for an unsigned zone using vanity names in the zone for its
nameservers.
-->
<t><strong>Example 2:</strong>
The resolver explicitly asks for the DNS transport signal for the
authoritative nameserver ns.dnsprovider.net. by querying
for "_dns.ns.dnsprovider.net. SVCB":
~~~
Header: ...</t>

<t>Answer:
_dns.ns.dnsprovider.net.  IN SVCB 1 . (alpn="doq,dot,-do53", tlsa="...")
_dns.ns.dnsprovider.net.  IN RRSIG SVCB ...</t>

<t>Additional:
~~~
Because the resolver uses Validated mode (by querying for the SVCB record at
_dns.{nameserver FQDN} and validating the response) all data in the received
SVCB record MAY be used. In this case that includes the negative transport
signal "-do53", which will effectively turn off UDP/TCP use by the resolver for
communicating with this particular authoritative nameserver.</t>

</section>
</section>
<section anchor="recursive-nameserver-behavior"><name>6. Recursive Nameserver Behavior</name>

<t>Recursive nameservers adopting this mechanism SHOULD implement the
following logic:</t>

<section anchor="when-sending-queries"><name>6.1. When Sending Queries</name>

<t><list style="numbers" type="1">
  <t><strong>OPT-OUT Possibility:</strong> If the resolver already thinks that it
knows the transport capabilities of the authoritative nameserver it
is about to send a query to it may opt out from DNS transport
signaling by including an EDNS(0) "No-DTS" option in the query.  <vspace blankLines='1'/>
It is important to be aware that using the No-DTS option
consistently will make the resolver blind to any changes in the
transport signals, which is clearly not acceptable. Hence any use
of "No-DTS" should be restricted to only be used within the TTL of
an already received and parsed DTS Hint.</t>
</list></t>

</section>
<section anchor="when-receiving-responses"><name>6.2. When Receiving Responses</name>

<t><list style="numbers" type="1">
  <t><strong>Opportunistic Parsing:</strong> When receiving an authoritative DNS
response, the resolver SHOULD parse the Additional section for SVCB
records.</t>
  <t><strong>Owner Check:</strong> If an SVCB record is found whose owner name
matches the "_dns" label followed by an authoritative nameserver
name for the zone to which the query belongs, the resolver MAY
consider this an DTS Hint.</t>
  <t><strong>DNSSEC Validation (Optional but Recommended):</strong>
  <list style="symbols">
      <t>The resolver SHOULD attempt to DNSSEC validate the DTS Hint. This
involves validating the SVCB record itself and its corresponding
RRSIG (if present) against the DNSSEC chain of trust for the zone
that owns the SVCB record (e.g., dnsprovider.com for
_dns.ns.dnsprovider.com).</t>
      <t>If validation succeeds: The DTS Hint is considered a <strong>trusted
signal</strong>. The resolver MAY then use all the transport signals
provided in the SVCB record when deciding on alternative transport
choices for subsequent queries to that specific authoritative
nameserver.</t>
      <t>If validation fails, or no RRSIG is present: The DTS Hint MUST be
treated as an <strong>unvalidated hint</strong>. The resolver MAY still
opportunistically attempt to use the signaled alternative
transports, but MUST be prepared for immediate fallback to
traditional transports (UDP/TCP) if the connection fails. This is
particularly relevant for scenarios like vanity names (e.g.,
ns.customer.com where customer.com is an unsigned zone, but the
underlying server ns.dnsprovider.com is capable).</t>
    </list></t>
  <t><strong>Prioritization:</strong>
* Any DNSSEC-validated SVCB record found via explicit query (e.g.,
_dns.ns.example.com for a queried domain) MUST take precedence over
any unvalidated DTS Hint.</t>
</list></t>

<t><list style="symbols">
  <t>The DTS Hint is a mechanism to <em>discover</em> capabilities
opportunistically, not to override trusted delegation or service
configuration.</t>
</list></t>

<t><list style="numbers" type="1">
  <t>Fallback: Resolvers MUST always be prepared to fall back to
traditional UDP/TCP transport if an attempt to use an alternative
transport based on an DTS Hint (especially an unvalidated one) fails
or times out.</t>
</list></t>

</section>
<section anchor="upgrading-the-dns-transport-signal"><name>6.3. Upgrading the DNS Transport Signal</name>

<t>If an unvalidated opportunistic transport signal has been received the
resolver may choose to upgrade that signal, either immediately or when
the transport signal is close to expiration from the resolver
cache. An upgraded transport signal allows the resolver to operate in
Validated mode, and then use all the information in the SVCB record
(including "-do53", ipv4hint/ipv6hint, and tlsa).</t>

</section>
<section anchor="authentication-of-the-authoritative-nameserver"><name>6.4. Authentication of the Authoritative Nameserver</name>

<t>Authentication of the authoritative nameserver is not an explicit
goal in opportunistic mode. The reason is that as an opportunistic
mechanism it will not always be possible to do such authentication.</t>

<t>However, even without strong authentication of the authoritative
server the proposed mechanism still provides benefits (privacy,
potential performance improvements) and for that reason cryptographic
verification of the server identity is not a requirement.</t>

<t>In validated mode authentication of the authoritative nameserver is done
by validation of the DNSSEC RRSIG over the SVCB record containing the DTS
Hint.</t>

<!--
As there will not always be a DNSSEC signature to validate that option
is opportunistic at best. Likewise, while it may sometimes be possible
to validate the server cert against a DNSSEC-signed TLSA record, it
will not always be an option.
-->

<t>Finally, validating the server cert against a list of well-known
public Certificate Authorities is possible, but there is no
standardized way to determine which CAs are appropriate for DNS server
certificates.</t>

</section>
<section anchor="resolver-caching-strategies"><name>6.5. Resolver Caching Strategies</name>

<t>Resolvers implementing the DNS DTS Hint mechanism have several options
for caching the transport signals received via DTS Hints.</t>

<t>A suggested primary strategy is to set the EDNS(0) No-DTS option when
no transport signaling information is needed. This may be because the
resolver already knows the authoritative nameserver's transport
capabilities from a previous response (with a TTL that has not
expired) or for some other reason.</t>

<t>The primary caching strategy SHOULD be "Standard DNS Cache", i.e.
treat the SVCB record like any other DNS record, caching it according
to its TTL. This is the simplest approach and will simply cause the
resolver to fall back to UDP for one query if the transport signal
data has expired.</t>

<t>For a more detailed analysis of possible caching logic, see
<xref target="RFC9539"/>, section 4.</t>

<t>Note that the resolver always has the option of not using the EDNS(0)
No-DTS option whenever the cache entry is getting close to expiry.</t>

<t>Given the variety of deployment scenarios and operational
requirements, this document does not mandate a specific caching
strategy. Implementers SHOULD choose a strategy that best fits their
operational needs, considering factors such as:</t>

<t><list style="symbols">
  <t>The importance of minimizing connection attempts</t>
  <t>The impact of failed connection attempts</t>
  <t>The computational cost of different caching strategies</t>
  <t>The memory requirements of maintaining cache state</t>
</list></t>

<t>The chosen strategy SHOULD be documented in the implementation's
configuration options to allow operators to make informed decisions
about its use.</t>

</section>
</section>
<section anchor="the-edns0-no-dts-option"><name>7. The EDNS(0) No-DTS Option</name>

<t>To provide a mechanism for resolvers to explicitly opt out of
receiving transport signals, this document defines a new EDNS(0)
option called "No-DTS". When included in a query, this option signals
to the authoritative server that the resolver does not want to receive
any transport signals in the response.</t>

<t>The typical use case is to set the EDNS(0) No-DTS option when the
resolver already has the transport information it needs.</t>

<t>The EDNS(0) No-DTS option is structured as follows:</t>

<figure><artwork><![CDATA[
                                              1   1   1   1   1   1
      0   1   2   3   4   5   6   7   8   9   0   1   2   3   4   5
    +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
 0: |                            OPTION-CODE                        |
    +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
 2: |                           OPTION-LENGTH                       |
    +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
]]></artwork></figure>

<t>Field definition details:</t>

<t>OPTION-CODE:
    2 octets / 16 bits (defined in <xref target="RFC6891"/>) contains the value TBD
    for No-DTS.</t>

<t>OPTION-LENGTH:
    2 octets / 16 bits (defined in <xref target="RFC6891"/>) contains
    the length of the payload in octets. For the No-DTS option, this
    value MUST be 0 as there is no payload.</t>

<t>When an authoritative server receives a query containing the EDNS(0)
No-DTS option, it SHOULD NOT include any DTS Hints in the response,
regardless of whether it would normally do so based on the conditions
described in Section 5.1.</t>

<t>This option provides a clean way for resolvers to opt out of receiving
transport signals, which may be useful in scenarios where:</t>

<t><list style="symbols">
  <t>The resolver has recently established transport preferences for a
particular authoritative server and that transport signal has not
expired.</t>
  <t>The resolver does not support or does not want to use alternative
transports</t>
  <t>The resolver wants to minimize response sizes</t>
  <t>The resolver is operating in an environment where transport signals
are not needed or desired</t>
</list></t>

<t>The No-DTS option is designed to be a simple, lightweight mechanism
that can be used to disable transport signaling without affecting the
normal operation of DNS resolution.</t>

</section>
<section anchor="comparison-with-deleg"><name>8. Comparison with DELEG</name>

<t>The idea to use an SVCB alpn parameter for transport signaling
originated with the work on DELEG <xref target="I-D.draft-ietf-deleg"/>.  The
current document uses the same data format, but as an opportunistic
addition to the Additional section rather than as integral part of a
changed delegation mechanism.</t>

<t>Both mechanisms have distinct use cases, and pros and cons. The major
advantage of the DELEG mechanism is that it cannot be spoofed or
filtered, as it is an integral part of an upcoming protocol change.</t>

<t>The opportunistic mechanism described here has the major advantage of
being available immediately without any changes to the DNS
protocol. Furthermore, as it is a signal directly from an
authoritative nameserver, a single DTS Hint may allow the recipient
recursive nameserver to upgrade the transport used for all the zones
served by that authoritative nameserver (which may be millions)
without the need to make any changes to the zones, nor to the parent
zones.</t>

<t>Given the current DNS landscape with a limited number of very large
providers of authoritative DNS service and a limited number of large
providers of recursive DNS service the opportunistic model described
here has the potential of enabling upgrading the transport for a
significant fraction of the DNS traffic with a limited amount of
effort.</t>

</section>
<section anchor="security-considerations"><name>9. Security Considerations</name>

<t><list style="symbols">
  <t><strong>Spoofing of Unvalidated Hints:</strong> An DTS Hint that cannot be DNSSEC
validated (e.g., for ns.example.com where example.com is unsigned) is
susceptible to spoofing by an on-path attacker. Such an attacker could
insert a fake SVCB record advertising a non-existing transport,
thereby denying connection over that transport. However, since the
hint is opportunistic and not required for DNS resolution, the
worst-case scenario is that the resolver attempts a connection that
fails and then falls back to traditional transports.  Security for the
actual DNS data remains unaffected. The cryptographic validation of
TLS/QUIC (via X.509 certificates) for DoT/DoQ would still protect the
integrity and privacy of the connection itself.</t>
  <t><strong>DNSSEC Validation:</strong> When a DTS Hint is signed by DNSSEC (e.g.,
the ns.dnsprovider.net SVCB record from a signed dnsprovider.net
zone), it provides a trusted signal. Resolvers SHOULD leverage DNSSEC
validation to distinguish between trusted and unvalidated hints.</t>
  <t><strong>No New Attack Vectors:</strong> This mechanism does not introduce new
attack vectors for DNS data itself, as it primarily concerns transport
discovery. It relies on the existing security properties of DoT, DoH
and DoQ for actual session security.</t>
  <t><strong>Safe Rollout:</strong> As existing recursive nameservers carefully avoid
data in the Additional section that they do not need, the DTS Hint
will be ignored by everyone except recursive nameservers that
understand the DTS Hint.</t>
  <t><strong>No-DTS enables a downgrade attack:</strong> If an attacker is able to
inject a No-DTS option to an outbound query then no transport signal
will be provided. However, this is a consequence of the opportunistic
nature of the DTS Hint and not worse than not being able to do
transport signaling at all.</t>
</list></t>

</section>
<section anchor="operational-considerations"><name>10. Operational Considerations</name>

<t><list style="symbols">
  <t><strong>Response Size:</strong> Including an SVCB record in the Additional
section will increase the size of UDP responses. Authoritative server
operators should consider the potential for UDP fragmentation or TCP
fallback if responses become excessively large, though a single SVCB
record is typically small. Recursive nameservers should usually set
the EDNS(0) No-DTS when they already have the transport signaling
information.</t>
  <t><strong>Server Configuration:</strong> Authoritative server implementations will
need configuration options to enable this feature and manage the
identities list.</t>
  <t><strong>Rollout Strategy:</strong> This mechanism supports a gradual rollout.
Authoritative servers can begin sending hints without requiring
changes from resolvers, and resolvers can begin processing hints
without requiring all authoritative servers to implement the feature.</t>
  <t><strong>Monitoring:</strong> As there is extremely limited data on effects of
alternative DNS transports for communication resolver to authoritative
nameserver it is strongly suggested that monitoring (of use, resource
consumption, etc) is considered.</t>
</list></t>

</section>
<section anchor="iana-considerations"><name>11. IANA Considerations</name>

<section anchor="no-dts-edns0-option"><name>11.1. No-DTS EDNS(0) Option</name>

<t>This document defines a new EDNS(0) option, entitled "No-DTS",
assigned a value of TBD in the "DNS EDNS0 Option Codes" registry.</t>

<figure><artwork><![CDATA[
   +-------+--------------------------+----------+----------------------+
   | Value | Name                     | Status   | Reference            |
   +-------+--------------------------+----------+----------------------+
   | TBD   | No-DTS                   | Standard | ( This document )    |
   +-------+--------------------------+----------+----------------------+
]]></artwork></figure>

<t><strong>Note to the RFC Editor</strong>: In this section, please replace
occurrences of "(This document)" with a proper reference.</t>

</section>
<section anchor="svcbhttps-parameter-tlsa"><name>11.2. SVCB/HTTPS Parameter: tlsa</name>

<t>This document requests registration of a new SVCB/HTTPS parameter in
the "SVCB and HTTPS Parameters" registry:</t>

<figure><artwork><![CDATA[
   +-------+--------+--------------------+----------------------+
   | Key   | Name   | Meaning            | Reference            |
   +-------+--------+--------------------+----------------------+
   | TBD   | tlsa   | Carries TLSA data  | ( This document )    |
   +-------+--------+--------------------+----------------------+
]]></artwork></figure>

<t>Presentation and wire format: The value carries one or more TLSA RRs
associated with the nameserver endpoint. Exact encoding and size
limits are defined by this document (TBD). Use of this parameter is
appropriate only when the containing SVCB RRset is DNSSEC-validated
(see Section 3).</t>

</section>
<section anchor="the-new-svcb-alpn-token-do53"><name>11.3. The New SVCB alpn Token "-do53"</name>

<t>This document updates the "alpn" SVCB parameter with one additional
token, "-do53", used to signal lack of support for UDP/TCP, i.e. a
negative transport capability. Note that at present support for
UDP/TCP is required for authoritative nameservers.</t>

<t>The "-do53" token has two use cases. The first is for temporary
service interruptions (i.e. a busy nameserver that only supports
UDP/TCP transport may signal alpn="-do53" prior to being offline for
maintenance). The second is for a future where a significant fraction
of authoritative DNS traffic has migrated to encrypted transports and
it may be reasonable to not support every transport at every
nameserver.</t>

<t>IANA is requested to add the "-do53" token to the list of defined
tokens for the "SVCB and HTTPS Parameters" registry entry for "alpn"
and reference this document. A new ALPN ID must be allocated for
"-do53".</t>

</section>
</section>
<section anchor="acknowledgements"><name>12. Acknowledgements</name>

<t><list style="symbols">
  <t>Many people have commented and contributed to this document in
different ways.  In no particular order and with a significant risk
of forgetting someone: The participants of the DELEG Working Group,
Peter Thomassen, Christian Elmerot, John Todd, Peter Koch, Willem
Toorop, Peter van Dijk.</t>
</list></t>

</section>
<section anchor="appendix-a-rationale-for-using-the-additional-section"><name>Appendix A. Rationale for Using the Additional Section</name>

<t><strong>Note to the RFC Editor</strong>: Please remove this entire section before
publication.</t>

<section anchor="a1-opportunistic-mode-via-the-additional-section"><name>A.1. Opportunistic Mode Via the Additional Section</name>

<t>When designing a mechanism that relies on sending new information in
DNS responses without changing the current DNS protocol, the
Additional section has the major advantage of being ignored by legacy
software. This property makes it possible to essentially deploy the
proposed mechanism immediately, as it will not cause problems with
existing DNS infrastructure.</t>

<t><list style="symbols">
  <t>Existing authoritative nameservers will not provide any DTS Hint in
the Additional section.</t>
  <t>Existing resolvers will actively ignore any DTS Hint in the
Additional section.</t>
</list></t>

<t>Only DNS nameservers (authoritative or recursive) that are aware of
the proposed mechanism will use it.</t>

<t>The downside is that it is not possible to strictly rely on anything
specific being present in the Additional section, as it may be
stripped off by a middle man or even by the sending nameserver
(eg. due to packet size constraints). For this reason it is not
possible to provide more than an opportunistic transport signal when
the signal is not explicitly queried for.</t>

<t>This is usually a major issue and the primary reason that data in the
Additional section is actively ignored by resolvers. In this
particular case, though, even an untrusted transport signal is better
than no signal at all. Furthermore, the only effect of a forged or
otherwise incorrect transport signal is a, typically failed,
connection attempt to an authoritative nameserver that does not
support the advertised transport. This will cause immediate fallback
to "Do53", i.e. traditional DNS over UDP/TCP and the non-availability
of the advertised transport will be remembered by the resolver (for
some suitable time).</t>

<t>Hence, using the Additional section for opportunistic transport<br />
signaling has vastly more benefits than drawbacks.</t>

</section>
<section anchor="a2-validated-mode-via-the-additional-section"><name>A.2. Validated Mode Via the Additional Section</name>

<t>If the transport signal is present in the Additional section, it may
or may not be possible to validate it (if it has a DNSSEC signature).</t>

<t>This is necessary to bee able to trust more sensitive signals. A
positive signal inserted by an on-path attacker (eg. claiming DoQ
support when this is false) would not be catastrophic. However, a
false negative alpn="-do53" signal (eg. claiming no Do53 support
while such support is present) would be potentially catastrophic. For
this reason (ability to trust more sensitive signals) the connection
between resolver and authoritative server must be in Validated Mode.</t>

</section>
</section>
<section anchor="appendix-b-svcb-alpn-negative-tokens"><name>Appendix B. SVCB ALPN Negative Tokens</name>

<t>This appendix defines a presentation-time extension to the SVCB "alpn"
parameter that allows an authoritative nameserver to signal explicit
non-support of a transport by prefixing an existing ALPN token with a
hyphen ("-"). For example, "-do53" indicates that legacy UDP/TCP
transport is not supported.</t>

<t>Processing rules:
- The "-do53" negative token is only actionable when the SVCB RRset is
  DNSSEC-validated (Validated mode). In these cases, resolvers SHOULD
  honor the "-do53" token when selecting transports.
- In Opportunistic (unvalidated) mode, resolvers MUST ignore the
  "-do53" negative token.</t>

<t>Examples:
- alpn="dot,doq"           -&gt; Indicates support for DoT and DoQ.
- alpn="-do53,dot"         -&gt; Indicates no Do53; use DoT (validated modes only).
- alpn="-do53,doq,dot"     -&gt; Indicates no Do53; prefer DoQ/DoT (validated modes only).</t>

<t>Interoperability considerations:
- Implementations that do not understand the alpn "-do53" negative
  token will ignore it per SVCB parameter processing and remain
  interoperable.
- This alpn token does not alter on-the-wire encoding for ALPN; it is
  a presentation-layer convention. IANA considerations for
  documentation of this convention are provided in Section 11.3.</t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC7858">
  <front>
    <title>Specification for DNS over Transport Layer Security (TLS)</title>
    <author fullname="Z. Hu" initials="Z." surname="Hu"/>
    <author fullname="L. Zhu" initials="L." surname="Zhu"/>
    <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
    <author fullname="A. Mankin" initials="A." surname="Mankin"/>
    <author fullname="D. Wessels" initials="D." surname="Wessels"/>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <date month="May" year="2016"/>
    <abstract>
      <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
      <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7858"/>
  <seriesInfo name="DOI" value="10.17487/RFC7858"/>
</reference>
<reference anchor="RFC9461">
  <front>
    <title>Service Binding Mapping for DNS Servers</title>
    <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
    <date month="November" year="2023"/>
    <abstract>
      <t>The SVCB DNS resource record type expresses a bound collection of endpoint metadata, for use when establishing a connection to a named service. DNS itself can be such a service, when the server is identified by a domain name. This document provides the SVCB mapping for named DNS servers, allowing them to indicate support for encrypted transport protocols.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9461"/>
  <seriesInfo name="DOI" value="10.17487/RFC9461"/>
</reference>
<reference anchor="RFC9250">
  <front>
    <title>DNS over Dedicated QUIC Connections</title>
    <author fullname="C. Huitema" initials="C." surname="Huitema"/>
    <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
    <author fullname="A. Mankin" initials="A." surname="Mankin"/>
    <date month="May" year="2022"/>
    <abstract>
      <t>This document describes the use of QUIC to provide transport confidentiality for DNS. The encryption provided by QUIC has similar properties to those provided by TLS, while QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides more efficient packet-loss recovery than UDP. DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC 7858, and latency characteristics similar to classic DNS over UDP. This specification describes the use of DoQ as a general-purpose transport for DNS and includes the use of DoQ for stub to recursive, recursive to authoritative, and zone transfer scenarios.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9250"/>
  <seriesInfo name="DOI" value="10.17487/RFC9250"/>
</reference>
<reference anchor="RFC7435">
  <front>
    <title>Opportunistic Security: Some Protection Most of the Time</title>
    <author fullname="V. Dukhovni" initials="V." surname="Dukhovni"/>
    <date month="December" year="2014"/>
    <abstract>
      <t>This document defines the concept "Opportunistic Security" in the context of communications protocols. Protocol designs based on Opportunistic Security use encryption even when authentication is not available, and use authentication when possible, thereby removing barriers to the widespread use of encryption on the Internet.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7435"/>
  <seriesInfo name="DOI" value="10.17487/RFC7435"/>
</reference>
<reference anchor="RFC9539">
  <front>
    <title>Unilateral Opportunistic Deployment of Encrypted Recursive-to-Authoritative DNS</title>
    <author fullname="D. K. Gillmor" initials="D. K." role="editor" surname="Gillmor"/>
    <author fullname="J. Salazar" initials="J." role="editor" surname="Salazar"/>
    <author fullname="P. Hoffman" initials="P." role="editor" surname="Hoffman"/>
    <date month="February" year="2024"/>
    <abstract>
      <t>This document sets out steps that DNS servers (recursive resolvers and authoritative servers) can take unilaterally (without any coordination with other peers) to defend DNS query privacy against a passive network monitor. The protections provided by the guidance in this document can be defeated by an active attacker, but they should be simpler and less risky to deploy than more powerful defenses.</t>
      <t>The goal of this document is to simplify and speed up deployment of opportunistic encrypted transport in the recursive-to-authoritative hop of the DNS ecosystem. Wider easy deployment of the underlying encrypted transport on an opportunistic basis may facilitate the future specification of stronger cryptographic protections against more-powerful attacks.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9539"/>
  <seriesInfo name="DOI" value="10.17487/RFC9539"/>
</reference>
<reference anchor="RFC9460">
  <front>
    <title>Service Binding and Parameter Specification via the DNS (SVCB and HTTPS Resource Records)</title>
    <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
    <author fullname="M. Bishop" initials="M." surname="Bishop"/>
    <author fullname="E. Nygren" initials="E." surname="Nygren"/>
    <date month="November" year="2023"/>
    <abstract>
      <t>This document specifies the "SVCB" ("Service Binding") and "HTTPS" DNS resource record (RR) types to facilitate the lookup of information needed to make connections to network services, such as for HTTP origins. SVCB records allow a service to be provided from multiple alternative endpoints, each with associated parameters (such as transport protocol configuration), and are extensible to support future uses (such as keys for encrypting the TLS ClientHello). They also enable aliasing of apex domains, which is not possible with CNAME. The HTTPS RR is a variation of SVCB for use with HTTP (see RFC 9110, "HTTP Semantics"). By providing more information to the client before it attempts to establish a connection, these records offer potential benefits to both performance and privacy.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9460"/>
  <seriesInfo name="DOI" value="10.17487/RFC9460"/>
</reference>
<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>
<reference anchor="RFC6891">
  <front>
    <title>Extension Mechanisms for DNS (EDNS(0))</title>
    <author fullname="J. Damas" initials="J." surname="Damas"/>
    <author fullname="M. Graff" initials="M." surname="Graff"/>
    <author fullname="P. Vixie" initials="P." surname="Vixie"/>
    <date month="April" year="2013"/>
    <abstract>
      <t>The Domain Name System's wire protocol includes a number of fixed fields whose range has been or soon will be exhausted and does not allow requestors to advertise their capabilities to responders. This document describes backward-compatible mechanisms for allowing the protocol to grow.</t>
      <t>This document updates the Extension Mechanisms for DNS (EDNS(0)) specification (and obsoletes RFC 2671) based on feedback from deployment experience in several implementations. It also obsoletes RFC 2673 ("Binary Labels in the Domain Name System") and adds considerations on the use of extended labels in the DNS.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="75"/>
  <seriesInfo name="RFC" value="6891"/>
  <seriesInfo name="DOI" value="10.17487/RFC6891"/>
</reference>



    </references>

    <references title='Informative References' anchor="sec-informative-references">




<reference anchor="I-D.draft-ietf-deleg">
   <front>
      <title>Extensible Delegation for DNS</title>
      <author fullname="Tim April" initials="T." surname="April">
         <organization>Google, LLC</organization>
      </author>
      <author fullname="Petr Špaček" initials="P." surname="Špaček">
         <organization>ISC</organization>
      </author>
      <author fullname="Ralf Weber" initials="R." surname="Weber">
         <organization>Akamai Technologies</organization>
      </author>
      <author fullname="David C Lawrence" initials="" surname="Lawrence">
         <organization>Salesforce</organization>
      </author>
      <date day="20" month="October" year="2025"/>
      <abstract>
	 <t>   This document proposes a new extensible method for the delegation of
   authority for a domain in the Domain Name System (DNS) using DELEG
   and DELEGI records.

   A delegation in the DNS enables efficient and distributed management
   of the DNS namespace.  The traditional DNS delegation is based on NS
   records which contain only hostnames of servers and no other
   parameters.  The new delegation records are extensible, can be
   secured with DNSSEC, and eliminate the problem of having two sources
   of truth for delegation information.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-deleg-05"/>
   
</reference>



    </references>

</references>


<?line 1033?>

<section anchor="change-history-to-be-removed-before-publication"><name>Change History (to be removed before publication)</name>

<ul empty="true"><li>
  <t>Initial public draft</t>
</li></ul>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

