<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.18 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-add-encrypted-dns-server-redirection-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.22.0 -->
  <front>
    <title abbrev="EDSR">Encrypted DNS Server Redirection</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-add-encrypted-dns-server-redirection-00"/>
    <author initials="J." surname="Todd" fullname="J. Todd">
      <organization>Quad9</organization>
      <address>
        <email>jtodd@quad9.net</email>
      </address>
    </author>
    <author initials="T." surname="Jensen" fullname="T. Jensen">
      <organization>Microsoft</organization>
      <address>
        <email>tojens@microsoft.com</email>
      </address>
    </author>
    <author initials="C." surname="Mosher" fullname="C. Mosher">
      <organization>Innate, Inc.</organization>
      <address>
        <email>cmosher@gmail.com</email>
      </address>
    </author>
    <date year="2024" month="July" day="24"/>
    <area>INT</area>
    <workgroup>add</workgroup>
    <keyword>encrypted DNS</keyword>
    <keyword>DoH</keyword>
    <keyword>DoT</keyword>
    <keyword>DoQ</keyword>
    <keyword>redirection</keyword>
    <abstract>
      <?line 47?>

<t>This document defines Encrypted DNS Server Redirection (EDSR),
a mechanism for encrypted DNS servers to redirect clients to
other encrypted DNS servers. This enables dynamic routing
to geo-located or otherwise more desirable encrypted DNS servers
without modifying DNS client endpoint configurations or the use 
of anycast by the DNS server.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://ietf-wg-add.github.io/EncDNSServerRedirect/draft-add-encrypted-dns-server-redirection.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-add-encrypted-dns-server-redirection/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        add Working Group mailing list (<eref target="mailto:add@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/add/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/add/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-wg-add/EncDNSServerRedirect"/>.</t>
    </note>
  </front>
  <middle>
    <?line 56?>

<section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Encrypted DNS Server Redirection (EDSR) is a protocol that allows an encrypted
DNS resolver whose configuration is well known to clients to redirect them to other,
more desirable resolvers without having to support anycast and without having to
configure clients with these other resolvers ahead of time. It uses a similar mechanism to the one
defined by <xref section="4" sectionFormat="of" target="RFC9462"/> to redirect an encrypted DNS client from one encrypted DNS
resolver to another encrypted DNS resolver. Where DDR uses a threat model that
presumes the initial DNS traffic could be unencrypted, EDSR only ever applies when the initial
DNS traffic is already encrypted.</t>
      <t>One example of what makes redirection to another resolver
desirable is geolocation. A DNS service may document one or a few well known resolver 
configurations even though it routes traffic to hundreds or thousands of resolvers
that are closer to the client, reducing latency and making DNS resolutions more
applicable to the client.</t>
      <t>This document describes only one mode of redirection - Strict Origin Redirection. Previous
versions of this draft defined an additional mode of redirection that allowed servers to 
redirect to servers that presented a different domain name than the original server. While
the scenario's validity has some interest, there is no consensus in the WG for how it can 
be addressed.</t>
    </section>
    <section anchor="dns-client-behavior">
      <name>DNS client behavior</name>
      <section anchor="discovering-redirections">
        <name>Discovering redirections</name>
        <t>When a DNS client first opens a connection to an encrypted DNS server, it <bcp14>MUST</bcp14>
use the Discovery Using Resolver Names mechanism defined in <xref section="5" sectionFormat="of" target="RFC9462"/> to
send a SVCB query for the name of the resolver to discover its encrypted DNS configuration.
The DNS client <bcp14>SHOULD</bcp14> open a connection to the server returned in the SVCB query using the
same domain name as the original server and one of the IP addresses returned in additional
A/AAAA records for the same
name. Once a connection has been successfully opened, as subsequently described by reaching
a suitable server at the end of the redirection chain, the client <bcp14>SHOULD</bcp14> close the first
connection.</t>
        <section anchor="use-of-delegated-credentials">
          <name>Use of Delegated Credentials</name>
          <t>If the DNS client's TLS dependency supports Delegated Credentials <xref target="RFC9345"/>, it <bcp14>SHOULD</bcp14>
present the "delegated_credential" TLS extension in its ClientHello as described in 
<xref section="4.1.1" sectionFormat="of" target="RFC9345"/> to maximize compatibility with EDSR-supporting servers. This
is because some server operators <bcp14>MAY</bcp14> redirect to servers controlled by other entities which
do not have access to its private key but which nevertheless have the ability to terminate
TLS connections for the server's name.</t>
        </section>
        <section anchor="redirection-after-discovery-using-resolver-ip-addresses">
          <name>Redirection after Discovery Using Resolver IP Addresses</name>
          <t>EDSR assumes that the original server
is identified by domain name from the client's perspective. Examples include when the client was configured
with the resolver through endpoint management or DNR discovery <xref target="RFC9463"/>. However, when the server was discovered using
DDR's Discovery Using Resolver IP Addresses <xref section="4" sectionFormat="of" target="RFC9462"/>, this is not the case. Due to the threat model
that mode of DDR operates under, where it has to
start from an unencrypted resolver, the identity of the server used for verification is its IP address.
The risks involved with using the domain name of resolvers discovered by Discovery Using Resolver IP
Addresses are further explored in the Security Considerations section <xref target="seccon"/>.</t>
          <t>When clients use EDSR with a resolver discovered using DDR's 
Discovery Using Resolver IP Addresses <xref section="4" sectionFormat="of" target="RFC9462"/>, the only difference
is that the destination server it was redirected to <bcp14>MUST</bcp14> be able to claim the IP address of the previous
server in its SAN field.</t>
          <t>This section applies to both the Verified and Opportunistic forms of DDR's Discovery Using
Resolver IP Addresses mechanism.</t>
        </section>
      </section>
      <section anchor="identifying-self-redirections">
        <name>Identifying self-redirections</name>
        <t>If the set of IP addresses that are valid for the server being redirected to include
the IP address of the current server, the client <bcp14>SHOULD</bcp14> ignore the redirection, treating
it the same as receiving no response or a NODATA response from the SVCB query.
However, clients receiving preferable encryption parameters as part of the SVCB response
<bcp14>MAY</bcp14> choose to reconnect to negotiate to upgrade to the preferred encryption method. When
doing so, the client <bcp14>SHOULD NOT</bcp14> immediately repeat EDSR as the redirection from the
server to itself has terminated the redirection chain.</t>
      </section>
      <section anchor="waiting-for-redirections">
        <name>Waiting for redirections</name>
        <t>The client does not need to wait for the results of the redirection discovery
query before sending other DNS queries on the connection, though they <bcp14>SHOULD</bcp14>
gracefully close the connection as soon as it has successfully established a
connection to the server it was redirected to and received or timed out the
outstanding queries on the original connection.</t>
        <t>See the Deployment Considerations section for reasons a client <bcp14>MAY</bcp14> choose to decline a
redirection.</t>
      </section>
      <section anchor="refreshing-redirections">
        <name>Refreshing redirections</name>
        <t>If a chain of redirections was followed, the effective TTL of the redirection is the
minimum of the TTLs encountered along the chain. If the effective TTL of the redirection
is considered to be too short for the client's performance (because it would require frequent
repetition of EDSR), clients <bcp14>MAY</bcp14> refuse to follow the redirection. Servers <bcp14>SHOULD NOT</bcp14> redirect
clients in a way that results in short effective TTLs.</t>
        <t>When the redirection TTL expires or connectivity to the server the client was redirected to fails,
the client <bcp14>MUST</bcp14> close the connection and return to using the servers it is currently configured to
use by its local configuration before using EDSR again. 
This allows the client to honor the intention of whatever configuration method was
used to provide it with a set of DNS servers to use.</t>
        <t>If the client DNS server remains the same, it <bcp14>SHOULD</bcp14> repeat the EDSR mechanism
before the effective TTLS expires so that if the same redirection is valid, it can avoid needing
to tear down the current connection by refreshing its effective TTL.</t>
      </section>
      <section anchor="multiple-redirections">
        <name>Multiple redirections</name>
        <t>When clients receive more than one valid SVCB response, they <bcp14>SHOULD</bcp14> prefer using
the redirections that match their configuration (such as supported IP address family or
desired encrypted DNS protocol) in ascending order of the SVCB priority. Once a successful
connection is made to a redirected destination, clients <bcp14>MUST</bcp14> discard results for other
servers. Entries returned for the same IP address <bcp14>MAY</bcp14> be retained for multi-protocol path
diversity to what is presumed to be the same server. Later unsuitability of all connections
to the server <bcp14>MUST</bcp14> result in restarting EDSR.</t>
        <t>Redirections are considered to be a one-to-one relationship (starting with one recursive
resolver and following its redirections should result in one replacement recursive resolver).
It is not expected that a stub resolver ends up using more recursive resolvers than it
was originally configured with when using EDSR.</t>
      </section>
      <section anchor="network-changes">
        <name>Network changes</name>
        <t>When a client device changes what network it is connected to, it <bcp14>SHOULD</bcp14> forget
pre-existing redirections and start EDSR over with the originally configured
resolvers. This ensures that a resolver which redirects clients based on their
source network can behave accordingly.</t>
        <t>Note that this is unrelated to what resolvers a client is originally configured with. 
For example, a client which is configured to always used the resolvers advertised by 
DHCP will likely start with different original resolvers when changing networks. How a 
client is configured with DNS resolvers is out of scope for this document. EDSR only 
provides a mechanism for clients to discover redirections from resolvers they were 
previously configured to use.</t>
      </section>
    </section>
    <section anchor="dns-server-behavior">
      <name>DNS server behavior</name>
      <t>DNS resolvers who want to redirect clients to other resolvers <bcp14>MUST</bcp14> respond to
SVCB <xref target="RFC9461"/> queries for their own domain names with records that
describe the configuration of the destination server.</t>
      <t>Guidance in <xref section="5" sectionFormat="of" target="RFC9460"/> to improve performance by
including additional A/AAAA records with the SVCB response <bcp14>SHOULD</bcp14> be followed.</t>
      <t>If the server knows it supports Discovery Using Resolver IP Addresses, or does not know for sure,
it <bcp14>MUST</bcp14> be prepared for clients to connect without an SNI because clients might have discovered the
server that way. Otherwise, if the server knows it does not support Discovery Using Resolver IP Addresses,
it <bcp14>MAY</bcp14> refuse connections without an SNI instead.</t>
      <t>The destination server <bcp14>MAY</bcp14> use Delegated Credentials <xref target="RFC9345"/> if the DNS client
advertises its support for Delegated Credentials as described in <xref section="4.1.1" sectionFormat="of" target="RFC9345"/>.
This is valid
so long as the delegated credential is valid for the same domain name used by the
referring server. This is an encouraged practice for servers which need to redirect
clients to servers owned by other entities, as is the case with CDN contracts.</t>
      <section anchor="ensuring-compatibility">
        <name>Ensuring compatibility</name>
        <t>Redirections <bcp14>MUST</bcp14> only redirect to resolvers which support at least the same
protocol, address family, port, and TLS minimum versions as the referring resolver.
This ensures that redirections do not lead clients to resolvers that are not compatible
with the client. In addition, servers <bcp14>SHOULD</bcp14> avoid redirecting to servers which will also
redirect clients unless they are actively coordinating to ensure a positive
client experience. See the Deployment Considerations section for more details.</t>
      </section>
      <section anchor="dealing-with-persistent-clients">
        <name>Dealing with persistent clients</name>
        <t>Servers <bcp14>SHOULD</bcp14> be prepared for clients to not follow the redirection immediately
as connection failures, other technical issues, or even client policy affecting server
choice may lead to clients being unable to follow the redirection promptly or at all.
Servers who are redirecting due to being overloaded <bcp14>MAY</bcp14> respond as they normally would
to overwhelming traffic.</t>
      </section>
      <section anchor="redirection-to-servers-controlled-by-third-parties">
        <name>Redirection to servers controlled by third parties</name>
        <t>Server operators ought to consider using delegated credentials <xref target="RFC9345"/> when they
wish to redirect general clients to other servers operated by other entities. This
allows the server operator to avoid giving access to their domain's private key to
third parties but also ensure general clients have a secured, same-origin redirection
experience.</t>
      </section>
    </section>
    <section anchor="deployment-considerations">
      <name>Deployment Considerations</name>
      <section anchor="large-trees-of-redirections">
        <name>Large trees of redirections</name>
        <t>It is possible for DNS servers to redirect clients to DNS servers which also
redirect clients. Clients which are presented with long chains of redirections
<bcp14>MAY</bcp14> choose to stop following redirections to reduce connection thrashing. DNS
server operators <bcp14>SHOULD</bcp14> deploy redirection behavior mindfully to avoid long
chains of redirection.</t>
        <t>Servers <bcp14>SHOULD</bcp14> ensure their redirections do not create loops, where clients
are redirected to a server it already encountered earlier in the process.
Clients <bcp14>MAY</bcp14> stop following redirections when they detect this, but <bcp14>MAY</bcp14> also
take a simpler approach, following only a maximum number of redirections.</t>
      </section>
      <section anchor="redirection-ttls">
        <name>Redirection TTLs</name>
        <t>Servers <bcp14>SHOULD</bcp14> provide sufficiently long TTLs for clients to avoid the need to
constantly repeat EDSR queries. Server operators should be mindful of redirection
chains because unless they collaboratively control the TTLs of one another's
redirections, redirection chains will end up with greatly reduced effective TTLs
because the client will always use the lowest.</t>
      </section>
      <section anchor="including-ip-addresses-in-edsr-responses">
        <name>Including IP addresses in EDSR responses</name>
        <t>If a recursive resolver does not include additional A/AAAA records per
<xref section="5" sectionFormat="of" target="RFC9460"/>, stub resolvers might end up failing
the redirection if the redirection destination name cannot be resolved. Additionally,
the recursive resolver <bcp14>SHOULD</bcp14> ensure records conntaining the same IP version as the
existing connection are returned (if the stub is currently connected over IPv4, one or
more A records <bcp14>SHOULD</bcp14> be included, and if the stub is currently connected over IPv6,
one or more AAAA records <bcp14>SHOULD</bcp14> be included).</t>
      </section>
      <section anchor="comparison-to-discovery-using-resolver-names">
        <name>Comparison to Discovery Using Resolver Names</name>
        <t>Discovery Using Resolver Names as defined in <xref section="5" sectionFormat="of" target="RFC9345"/> describes
discovery of the encrypted DNS configuration for
a server using its domain name. The technical mechanism described there and EDSR are
the same in the context of on-wire behavior; they differ by how clients and servers
deploy them.</t>
        <t>For Discovery Using Resolver Names, servers are free to return whatever subset of 
valid configurations for the domain name provided by the client it wishes, such as
those it sees as valid for the client's apparent geolocation. In the case of EDSR,
servers are expected to only return configurations if it wants the client to be
redirected to another resolver. Servers implementing EDSR <bcp14>SHOULD</bcp14> only answer SVCB
queries for its own domain name in the EDSR context following its requirements.</t>
        <t>For Discovery Using Resolver Names, clients are querying for encrypted DNS
configurations available for a given server domain name. EDSR does not restrict
clients from issuing these queries whenever they want. However, clients ought
to consider that querying an encrypted DNS server for its own configuration that
supports EDSR (which is not inherently discoverable by the client) might only
return configuration it is ok with the client using to immediately reconnect.</t>
      </section>
    </section>
    <section anchor="seccon">
      <name>Security Considerations</name>
      <section anchor="trusting-the-redirected-connection">
        <name>Trusting the redirected connection</name>
        <t>EDSR does not provide novel authentication or security mechanisms. Redirection
is trusted by virtue of the server authentication via PKI through TLS <xref target="RFC5280"/>.
The DNS stub resolver implementing EDSR <bcp14>SHOULD</bcp14> use whatever policies it uses for
other TLS connections for encrypted DNS traffic to determine if a given TLS cert
chain is trustworthy before proceeding with EDSR.</t>
        <t>EDSR <bcp14>MUST NOT</bcp14> be used with encrypted DNS protocols that are not based on TLS.
This scenario will require future standards work.</t>
        <t>EDSR should not introduce any additional security considerations beyond use of
the original encrypted resolver prior to redirection. Because the original
connection was trusted, information sent over it about a new connection to use
should be as trusted. However, clients that wish to time bound vulnerabilities
to attackers who compromise the original resolver <bcp14>MAY</bcp14> choose to implement a
maximum TTL to honor on SVCB records that redirect to other servers.</t>
      </section>
      <section anchor="use-with-unencrypted-dns">
        <name>Use with unencrypted DNS</name>
        <t>EDSR <bcp14>MUST NOT</bcp14> be used to redirect unencrypted DNS traffic to any other resolver.
This use case is called "designation" and is covered by Discovery of Designated
Resolvers (DDR) as defined in <xref target="RFC9462"/>, specifically Section 4: "Discovery Using
Resolver IP Addresses". Not following that security guidance opens up a DNS client
to malicious redirection to an attacker-controlled DNS server. For more information,
see <xref section="7" sectionFormat="of" target="RFC9462"/>.</t>
        <t>EDSR also <bcp14>MUST NOT</bcp14> be used to redirect encrypted DNS traffic to a resolver that
advertises support for unencrypted DNS. This would reduce the security posture of
the client. Clients <bcp14>MUST NOT</bcp14> follow an encrypted DNS redirection and then send
unencrypted DNS traffic to the new resolver.</t>
      </section>
      <section anchor="use-with-ddr-discovery-from-ip-addresses">
        <name>Use with DDR discovery from IP addresses</name>
        <t>When a resolver is discovered using DDR's Discovery Using Resolver IP Addresses mechanism 
defined in <xref section="4" sectionFormat="of" target="RFC9462"/>, the server's identity used for
TLS purposes is its IP address, not its domain name. This means servers and clients
<bcp14>MUST</bcp14> use the original server's IP address, not the IP address of the previous server
in the event of redirection chains, in the SAN field of destination servers to
validate the redirection.</t>
        <t>The reason for this is due to an attack where the DDR SVCB query response is modified
by an active attacker to have a different domain name in its "dohpath" SVCB key. When
the client uses it to issue the EDSR query to the (valid) DDR-designated resolver, it
will innocently forward the query upstream and return the result. The result may even
be DNSSEC signed since it was issued by the valid owner of the attacker's domain name.
If this redirection is then followed and validated with the attacker's domain name, 
it will succeed and the client will have been maliciously redirected to use an attacker's
server at the low cost of a port 53 attack without breaking encryption or compromising
the encrypted DNS server DDR designated.</t>
        <t>There is no harm in using the name of the server for the EDSR query so long as the
validation of the destination server is performed using the original IP address and
not the name. This ensures EDSR clients can consistently use the domain name of a 
server for redirection discovery. Use of the DDR-defined SUDN "resolver.arpa" was
considered and rejected because this would conflate DDR configuration and EDSR
configuration by placing them in the same zone, using the same DNS record type.</t>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>A client <bcp14>MAY</bcp14> choose to not send other name queries until redirection is complete,
but there should be no privacy issue with sending queries to intermediate resolvers before
redirection takes place. This is because the intermediate resolvers are considered
to be appropriate destinations by the client even if the resolver wants to substitute
another resolver for reasons other than name resolution results such as latency
optimization or load balancing.</t>
    </section>
    <section anchor="data-flow-considerations">
      <name>Data Flow Considerations</name>
      <section anchor="data-scope">
        <name>Data Scope</name>
        <t>EDSR does not result in any additional data being shared by the end user, as the
DNS queries going to the new resolver were already going to go to the original
resolver.</t>
      </section>
      <section anchor="data-visibility">
        <name>Data Visibility</name>
        <t>EDSR results in a 1:1 replacement of DNS resolvers used (future queries sent to
the new resolver will not be sent to the original resolver anymore). This means the
number of servers which see any given query remain the same.</t>
        <t>This is only true if clients only use one redirected DNS server per original DNS
server. If the DNS server offers more than one redirection, and the client validates
and uses two or more of those redirections, then there will be greater data
visibility (more destinations). This is however entirely within the client's choice
following their own policy as a redundancy versus volume of exhausted data trade-off.</t>
        <t>EDSR requires the redirection to another server to also use encrypted DNS, so no
third-party will be introduced to the data flow unless the encryption is broken.</t>
      </section>
      <section anchor="data-centralization">
        <name>Data centralization</name>
        <t>EDSR can only increase data centralization if multiple resolver operators choose to
redirect DNS clients to the same, other DNS resolver. To prevent the reduction of
their resolution redundancy, DNS clients <bcp14>MAY</bcp14> choose to ignore redirections if they
find that they point to resolvers they are already configured to use, by a previous
redirection or some other configuration.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This draft has no IANA considerations.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC9462">
          <front>
            <title>Discovery of Designated Resolvers</title>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="E. Kinnear" initials="E." surname="Kinnear"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <author fullname="T. Jensen" initials="T." surname="Jensen"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document defines Discovery of Designated Resolvers (DDR), a set of mechanisms for DNS clients to use DNS records to discover a resolver's encrypted DNS configuration. An Encrypted DNS Resolver discovered in this manner is referred to as a "Designated Resolver". These mechanisms can be used to move from unencrypted DNS to encrypted DNS when only the IP address of a resolver is known. These mechanisms are designed to be limited to cases where Unencrypted DNS Resolvers and their Designated Resolvers are operated by the same entity or cooperating entities. It can also be used to discover support for encrypted DNS protocols when the name of an Encrypted DNS Resolver is known.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9462"/>
          <seriesInfo name="DOI" value="10.17487/RFC9462"/>
        </reference>
        <reference anchor="RFC9345">
          <front>
            <title>Delegated Credentials for TLS and DTLS</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="S. Iyengar" initials="S." surname="Iyengar"/>
            <author fullname="N. Sullivan" initials="N." surname="Sullivan"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>The organizational separation between operators of TLS and DTLS endpoints and the certification authority can create limitations. For example, the lifetime of certificates, how they may be used, and the algorithms they support are ultimately determined by the Certification Authority (CA). This document describes a mechanism to overcome some of these limitations by enabling operators to delegate their own credentials for use in TLS and DTLS without breaking compatibility with peers that do not support this specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9345"/>
          <seriesInfo name="DOI" value="10.17487/RFC9345"/>
        </reference>
        <reference anchor="RFC9461">
          <front>
            <title>Service Binding Mapping for DNS Servers</title>
            <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>The SVCB DNS resource record type expresses a bound collection of endpoint metadata, for use when establishing a connection to a named service. DNS itself can be such a service, when the server is identified by a domain name. This document provides the SVCB mapping for named DNS servers, allowing them to indicate support for encrypted transport protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9461"/>
          <seriesInfo name="DOI" value="10.17487/RFC9461"/>
        </reference>
        <reference anchor="RFC9460">
          <front>
            <title>Service Binding and Parameter Specification via the DNS (SVCB and HTTPS Resource Records)</title>
            <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
            <author fullname="M. Bishop" initials="M." surname="Bishop"/>
            <author fullname="E. Nygren" initials="E." surname="Nygren"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies the "SVCB" ("Service Binding") and "HTTPS" DNS resource record (RR) types to facilitate the lookup of information needed to make connections to network services, such as for HTTP origins. SVCB records allow a service to be provided from multiple alternative endpoints, each with associated parameters (such as transport protocol configuration), and are extensible to support future uses (such as keys for encrypting the TLS ClientHello). They also enable aliasing of apex domains, which is not possible with CNAME. The HTTPS RR is a variation of SVCB for use with HTTP (see RFC 9110, "HTTP Semantics"). By providing more information to the client before it attempts to establish a connection, these records offer potential benefits to both performance and privacy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9460"/>
          <seriesInfo name="DOI" value="10.17487/RFC9460"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9463">
          <front>
            <title>DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers (DNR)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="T. Reddy.K" initials="T." role="editor" surname="Reddy.K"/>
            <author fullname="D. Wing" initials="D." surname="Wing"/>
            <author fullname="N. Cook" initials="N." surname="Cook"/>
            <author fullname="T. Jensen" initials="T." surname="Jensen"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies new DHCP and IPv6 Router Advertisement options to discover encrypted DNS resolvers (e.g., DNS over HTTPS, DNS over TLS, and DNS over QUIC). Particularly, it allows a host to learn an Authentication Domain Name together with a list of IP addresses and a set of service parameters to reach such encrypted DNS resolvers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9463"/>
          <seriesInfo name="DOI" value="10.17487/RFC9463"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
      </references>
    </references>
    <?line 419?>

<section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank the following individuals for their invaluable feedback
to this document: Ben Schwartz, Eric Orth, Erik Nygren, Manu Bretelle, Ralph Weber,
Ted Hardie, Tommy Pauly, Viktor Dukhovni, and Vittorio Bertola.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
