<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-add-encrypted-dns-server-redirection-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.2 -->
  <front>
    <title abbrev="EDSR">Encrypted DNS Server Redirection</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-add-encrypted-dns-server-redirection-01"/>
    <author initials="J." surname="Todd" fullname="J. Todd">
      <organization>Quad9</organization>
      <address>
        <email>jtodd@quad9.net</email>
      </address>
    </author>
    <author initials="T." surname="Jensen" fullname="T. Jensen">
      <organization>Microsoft</organization>
      <address>
        <email>tojens.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="C." surname="Mosher" fullname="C. Mosher">
      <organization>Innate, Inc.</organization>
      <address>
        <email>cmosher@gmail.com</email>
      </address>
    </author>
    <date year="2024" month="October" day="21"/>
    <area>INT</area>
    <workgroup>add</workgroup>
    <keyword>encrypted DNS</keyword>
    <keyword>DoH</keyword>
    <keyword>DoT</keyword>
    <keyword>DoQ</keyword>
    <keyword>redirection</keyword>
    <abstract>
      <?line 47?>

<t>This document defines Encrypted DNS Server Redirection (EDSR),
a mechanism for encrypted DNS servers to redirect clients to
other encrypted DNS servers. This enables dynamic routing
to geo-located or otherwise more desirable encrypted DNS servers
without modifying DNS client endpoint configurations or the use 
of anycast by the DNS server.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://ietf-wg-add.github.io/EncDNSServerRedirect/draft-add-encrypted-dns-server-redirection.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-add-encrypted-dns-server-redirection/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        add Working Group mailing list (<eref target="mailto:add@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/add/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/add/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-wg-add/EncDNSServerRedirect"/>.</t>
    </note>
  </front>
  <middle>
    <?line 56?>

<section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Encrypted DNS Server Redirection (EDSR) is a protocol that allows an encrypted
DNS resolver whose configuration is well known to clients to redirect them to other,
more desirable resolvers without having to support anycast and without having to
configure clients with these other resolvers ahead of time. It uses a similar mechanism to the one
defined by <xref section="4" sectionFormat="of" target="RFC9462"/> to redirect an encrypted DNS client from one encrypted DNS
resolver to another encrypted DNS resolver. Where DDR uses a threat model that
presumes the initial DNS traffic could be unencrypted, EDSR only ever applies when the initial
DNS traffic is already encrypted.</t>
      <t>One example of what makes redirection to another resolver
desirable is geolocation. A DNS service may document one or a few well known resolver 
configurations even though it routes traffic to hundreds or thousands of resolvers
that are closer to the client, reducing latency and making DNS resolutions more
applicable to the client.</t>
    </section>
    <section anchor="dns-client-behavior">
      <name>DNS client behavior</name>
      <section anchor="discovering-redirections">
        <name>Discovering redirections</name>
        <t>When a DNS client first opens a connection to an encrypted DNS server, it <bcp14>MUST</bcp14>
use the Discovery Using Resolver Names mechanism defined in <xref section="5" sectionFormat="of" target="RFC9462"/> to
send a SVCB query for the name of the resolver to discover its encrypted DNS configuration.
The DNS client <bcp14>SHOULD</bcp14> open a connection to the server returned in the SVCB query using the
same domain name as the original server and one of the IP addresses returned in additional
A/AAAA records for the same
name. Once a connection has been successfully opened, as subsequently described by reaching
a suitable server at the end of the redirection chain, the client <bcp14>SHOULD</bcp14> close the first
connection.</t>
        <section anchor="use-of-delegated-credentials">
          <name>Use of Delegated Credentials</name>
          <t>If the DNS client's TLS dependency supports Delegated Credentials <xref target="RFC9345"/>, it <bcp14>SHOULD</bcp14>
present the "delegated_credential" TLS extension in its ClientHello as described in 
<xref section="4.1.1" sectionFormat="of" target="RFC9345"/> to maximize compatibility with EDSR-supporting servers. This
is because some server operators <bcp14>MAY</bcp14> redirect to servers controlled by other entities which
do not have access to its private key but which nevertheless have the ability to terminate
TLS connections for the server's name.</t>
        </section>
        <section anchor="redirection-after-discovery-using-resolver-ip-addresses">
          <name>Redirection after Discovery Using Resolver IP Addresses</name>
          <t>EDSR assumes that the original server
is identified by domain name from the client's perspective. Examples include when the client was configured
with the resolver through endpoint management or DNR discovery <xref target="RFC9463"/>. However, when the server was discovered using
DDR's Discovery Using Resolver IP Addresses <xref section="4" sectionFormat="of" target="RFC9462"/>, this is not the case. Due to the threat model
that mode of DDR operates under, where it has to
start from an unencrypted resolver, the identity of the server used for verification is its IP address.
The risks involved with using the domain name of resolvers discovered by Discovery Using Resolver IP
Addresses are further explored in the Security Considerations section <xref target="seccon"/>.</t>
          <t>When clients use EDSR with a resolver discovered using DDR's 
Discovery Using Resolver IP Addresses <xref section="4" sectionFormat="of" target="RFC9462"/>, the only difference
is that the destination server it was redirected to <bcp14>MUST</bcp14> be able to claim the IP address of the previous
server in its SAN field.</t>
          <t>This section applies to both the Verified and Opportunistic forms of DDR's Discovery Using
Resolver IP Addresses mechanism.</t>
        </section>
      </section>
      <section anchor="identifying-self-redirections">
        <name>Identifying self-redirections</name>
        <t>If the set of IP addresses that are valid for the server being redirected to include
the IP address of the current server, the client <bcp14>SHOULD</bcp14> ignore the redirection, treating
it the same as receiving no response or a NODATA response from the SVCB query.
However, clients receiving preferable encryption parameters as part of the SVCB response
<bcp14>MAY</bcp14> choose to reconnect to negotiate to upgrade to the preferred encryption method. When
doing so, the client <bcp14>SHOULD NOT</bcp14> immediately repeat EDSR as the redirection from the
server to itself has terminated the redirection chain.</t>
      </section>
      <section anchor="waiting-for-redirections">
        <name>Waiting for redirections</name>
        <t>The client does not need to wait for the results of the redirection discovery
query before sending other DNS queries on the connection, though they <bcp14>SHOULD</bcp14>
gracefully close the connection as soon as it has successfully established a
connection to the server it was redirected to and received or timed out the
outstanding queries on the original connection.</t>
        <t>See the Deployment Considerations section for reasons a client <bcp14>MAY</bcp14> choose to decline a
redirection.</t>
      </section>
      <section anchor="refreshing-redirections">
        <name>Refreshing redirections</name>
        <t>If a chain of redirections was followed, the effective TTL of the redirection is the
minimum of the TTLs encountered along the chain. If the effective TTL of the redirection
is considered to be too short for the client's performance (because it would require frequent
repetition of EDSR), clients <bcp14>MAY</bcp14> refuse to follow the redirection. Servers <bcp14>SHOULD NOT</bcp14> redirect
clients in a way that results in short effective TTLs.</t>
        <t>When the redirection TTL expires or connectivity to the server the client was redirected to fails,
the client <bcp14>MUST</bcp14> close the connection and return to using the servers it is currently configured to
use by its local configuration before using EDSR again. 
This allows the client to honor the intention of whatever configuration method was
used to provide it with a set of DNS servers to use.</t>
        <t>If the client DNS server remains the same, it <bcp14>SHOULD</bcp14> repeat the EDSR mechanism
before the effective TTLS expires so that if the same redirection is valid, it can avoid needing
to tear down the current connection by refreshing its effective TTL.</t>
      </section>
      <section anchor="multiple-redirections">
        <name>Multiple redirections</name>
        <t>When clients receive more than one valid SVCB response, they <bcp14>SHOULD</bcp14> prefer using
the redirections that match their configuration (such as supported IP address family or
desired encrypted DNS protocol) in ascending order of the SVCB priority. Once a successful
connection is made to a redirected destination, clients <bcp14>MUST</bcp14> discard results for other
servers. Entries returned for the same IP address <bcp14>MAY</bcp14> be retained for multi-protocol path
diversity to what is presumed to be the same server. Later unsuitability of all connections
to the server <bcp14>MUST</bcp14> result in restarting EDSR.</t>
        <t>Redirections are considered to be a one-to-one relationship (starting with one recursive
resolver and following its redirections should result in one replacement recursive resolver).
It is not expected that a stub resolver ends up using more recursive resolvers than it
was originally configured with when using EDSR.</t>
      </section>
      <section anchor="network-changes">
        <name>Network changes</name>
        <t>When a client device changes what network it is connected to, it <bcp14>SHOULD</bcp14> forget
pre-existing redirections and start EDSR over with the originally configured
resolvers. This ensures that a resolver which redirects clients based on their
source network can behave accordingly.</t>
        <t>Note that this is unrelated to what resolvers a client is originally configured with. 
For example, a client which is configured to always used the resolvers advertised by 
DHCP will likely start with different original resolvers when changing networks. How a 
client is configured with DNS resolvers is out of scope for this document. EDSR only 
provides a mechanism for clients to discover redirections from resolvers they were 
previously configured to use.</t>
      </section>
    </section>
    <section anchor="dns-server-behavior">
      <name>DNS server behavior</name>
      <t>DNS resolvers who want to redirect clients to other resolvers <bcp14>MUST</bcp14> respond to
SVCB <xref target="RFC9461"/> queries for their own domain names with records that
describe the configuration of the destination server.</t>
      <t>Guidance in <xref section="5" sectionFormat="of" target="RFC9460"/> to improve performance by
including additional A/AAAA records with the SVCB response <bcp14>SHOULD</bcp14> be followed.</t>
      <t>If the server knows it supports Discovery Using Resolver IP Addresses, or does not know for sure,
it <bcp14>MUST</bcp14> be prepared for clients to connect without an SNI because clients might have discovered the
server that way. Otherwise, if the server knows it does not support Discovery Using Resolver IP Addresses,
it <bcp14>MAY</bcp14> refuse connections without an SNI instead.</t>
      <t>The destination server <bcp14>MAY</bcp14> use Delegated Credentials <xref target="RFC9345"/> if the DNS client
advertises its support for Delegated Credentials as described in <xref section="4.1.1" sectionFormat="of" target="RFC9345"/>.
This is valid
so long as the delegated credential is valid for the same domain name used by the
referring server.</t>
      <t>Delegated Credentials are one approach for servers which need to redirect
clients to servers owned by other entities, as is the case with CDN contracts. Another
approach is using <xref target="RFC9115"/> to delegate Short-Term Automatically Renewed (STAR) certificates to the
servers that need to serve a name on behalf of a name's owner. This approach would not require protocol changes for
EDSR peers communicating with one another, unlike Delegated Credentials. Other trade-offs
between these approaches are beyond the scope of this document.</t>
      <section anchor="ensuring-compatibility">
        <name>Ensuring compatibility</name>
        <t>Redirections <bcp14>MUST</bcp14> only redirect to resolvers which support at least the same
protocol, address family, port, and TLS minimum versions as the referring resolver.
This ensures that redirections do not lead clients to resolvers that are not compatible
with the client. In addition, servers <bcp14>SHOULD</bcp14> avoid redirecting to servers which will also
redirect clients unless they are actively coordinating to ensure a positive
client experience. See the Deployment Considerations section for more details.</t>
      </section>
      <section anchor="dealing-with-persistent-clients">
        <name>Dealing with persistent clients</name>
        <t>Servers <bcp14>SHOULD</bcp14> be prepared for clients to not follow the redirection immediately
as connection failures, other technical issues, or even client policy affecting server
choice may lead to clients being unable to follow the redirection promptly or at all.
Servers who are redirecting due to being overloaded <bcp14>MAY</bcp14> respond as they normally would
to overwhelming traffic.</t>
      </section>
      <section anchor="redirection-to-servers-controlled-by-third-parties">
        <name>Redirection to servers controlled by third parties</name>
        <t>Server operators ought to consider using delegated credentials <xref target="RFC9345"/> when they
wish to redirect general clients to other servers operated by other entities. This
allows the server operator to avoid giving access to their domain's private key to
third parties but also ensure general clients have a secured, same-origin redirection
experience.</t>
      </section>
    </section>
    <section anchor="deployment-considerations">
      <name>Deployment Considerations</name>
      <section anchor="large-trees-of-redirections">
        <name>Large trees of redirections</name>
        <t>It is possible for DNS servers to redirect clients to DNS servers which also
redirect clients. Clients which are presented with long chains of redirections
<bcp14>MAY</bcp14> choose to stop following redirections to reduce connection thrashing. DNS
server operators <bcp14>SHOULD</bcp14> deploy redirection behavior mindfully to avoid long
chains of redirection.</t>
        <t>Servers <bcp14>SHOULD</bcp14> ensure their redirections do not create loops, where clients
are redirected to a server it already encountered earlier in the process.
Clients <bcp14>MAY</bcp14> stop following redirections when they detect this, but <bcp14>MAY</bcp14> also
take a simpler approach, following only a maximum number of redirections.</t>
      </section>
      <section anchor="redirection-ttls">
        <name>Redirection TTLs</name>
        <t>Servers <bcp14>SHOULD</bcp14> provide sufficiently long TTLs for clients to avoid the need to
constantly repeat EDSR queries. Server operators should be mindful of redirection
chains because unless they collaboratively control the TTLs of one another's
redirections, redirection chains will end up with greatly reduced effective TTLs
because the client will always use the lowest. When they do collaboratively control
the TTLs of one another's redirections, there is probably a way to do a
single-hop redirection instead.</t>
      </section>
      <section anchor="including-ip-addresses-in-edsr-responses">
        <name>Including IP addresses in EDSR responses</name>
        <t>If a recursive resolver does not include additional A/AAAA records per
<xref section="5" sectionFormat="of" target="RFC9460"/>, stub resolvers might end up failing
the redirection if the redirection destination name cannot be resolved. Additionally,
the recursive resolver <bcp14>SHOULD</bcp14> ensure records conntaining the same IP version as the
existing connection are returned (if the stub is currently connected over IPv4, one or
more A records <bcp14>SHOULD</bcp14> be included, and if the stub is currently connected over IPv6,
one or more AAAA records <bcp14>SHOULD</bcp14> be included).</t>
      </section>
      <section anchor="determining-suitability-of-destinations-for-a-given-client">
        <name>Determining suitability of destinations for a given client</name>
        <t>Because servers are required to ensure redirections are to servers that at least support
the same protocols as the current connection, server operators will often need to know
at run-time which of the potential redirection destinations are appropriate for the client
beyond whatever business logic requires the redirection in the first place. While out of
scope for protocol design, it is worth calling out that implementors need to consider
how they will handle this. A straightforward example would be a cache of the potential
redirection destinations that map to their capabilities, with consideration for how that
table is populated and updated (example: TLS 1.3 support is rolled out to server which
previously only served TLS 1.2). Any such out-of-band lookup would be much better than attempting
just-in-time checking with the potential destinations of their capabilities, which would
negatively impact the client experience when done during its redirection.</t>
        <t>Note that even if there is only one redirection candidate to choose from,
the server still needs to know when to not offer the redirection due to compatibility issues.</t>
      </section>
      <section anchor="comparison-to-discovery-using-resolver-names">
        <name>Comparison to Discovery Using Resolver Names</name>
        <t>Discovery Using Resolver Names as defined in <xref section="5" sectionFormat="of" target="RFC9345"/> describes
discovery of the encrypted DNS configuration for
a server using its domain name. The technical mechanism described there and EDSR are
the same in the context of on-wire behavior; they differ by how clients and servers
deploy them.</t>
        <t>For Discovery Using Resolver Names, servers are free to return whatever subset of 
valid configurations for the domain name provided by the client it wishes, such as
those it sees as valid for the client's apparent geolocation. In the case of EDSR,
servers are expected to only return configurations if it wants the client to be
redirected to another resolver. Servers implementing EDSR <bcp14>SHOULD</bcp14> only answer SVCB
queries for its own domain name in the EDSR context following its requirements.</t>
        <t>For Discovery Using Resolver Names, clients are querying for encrypted DNS
configurations available for a given server domain name. EDSR does not restrict
clients from issuing these queries whenever they want. However, clients ought
to consider that querying an encrypted DNS server for its own configuration that
supports EDSR (which is not inherently discoverable by the client) might only
return configuration it is ok with the client using to immediately reconnect.</t>
      </section>
    </section>
    <section anchor="seccon">
      <name>Security Considerations</name>
      <section anchor="trusting-the-redirected-connection">
        <name>Trusting the redirected connection</name>
        <t>EDSR does not provide novel authentication or security mechanisms. Redirection
is trusted by virtue of the server authentication via PKI through TLS <xref target="RFC5280"/>.
The DNS stub resolver implementing EDSR <bcp14>SHOULD</bcp14> use whatever policies it uses for
other TLS connections for encrypted DNS traffic to determine if a given TLS cert
chain is trustworthy before proceeding with EDSR.</t>
        <t>EDSR <bcp14>MUST NOT</bcp14> be used with encrypted DNS protocols that are not based on TLS.
This scenario will require future standards work.</t>
        <t>EDSR should not introduce any additional security considerations beyond use of
the original encrypted resolver prior to redirection. Because the original
connection was trusted, information sent over it about a new connection to use
should be as trusted. However, clients that wish to time bound vulnerabilities
to attackers who compromise the original resolver <bcp14>MAY</bcp14> choose to implement a
maximum TTL to honor on SVCB records that redirect to other servers.</t>
      </section>
      <section anchor="use-with-unencrypted-dns">
        <name>Use with unencrypted DNS</name>
        <t>EDSR <bcp14>MUST NOT</bcp14> be used to redirect unencrypted DNS traffic to any other resolver.
This use case is called "designation" and is covered by Discovery of Designated
Resolvers (DDR) as defined in <xref target="RFC9462"/>, specifically Section 4: "Discovery Using
Resolver IP Addresses". Not following that security guidance opens up a DNS client
to malicious redirection to an attacker-controlled DNS server. For more information,
see <xref section="7" sectionFormat="of" target="RFC9462"/>.</t>
        <t>EDSR also <bcp14>MUST NOT</bcp14> be used to redirect encrypted DNS traffic to a resolver that
advertises support for unencrypted DNS. This would reduce the security posture of
the client. Clients <bcp14>MUST NOT</bcp14> follow an encrypted DNS redirection and then send
unencrypted DNS traffic to the new resolver.</t>
      </section>
      <section anchor="use-with-ddr-discovery-from-ip-addresses">
        <name>Use with DDR discovery from IP addresses</name>
        <t>When a resolver is discovered using DDR's Discovery Using Resolver IP Addresses mechanism 
defined in <xref section="4" sectionFormat="of" target="RFC9462"/>, the server's identity used for
TLS purposes is its IP address, not its domain name. This means servers and clients
<bcp14>MUST</bcp14> use the original server's IP address, not the IP address of the previous server
in the event of redirection chains, in the SAN field of destination servers to
validate the redirection.</t>
        <t>The reason for this is due to an attack where the DDR SVCB query response is modified
by an active attacker to have a different domain name in its "dohpath" SVCB key. When
the client uses it to issue the EDSR query to the (valid) DDR-designated resolver, it
will innocently forward the query upstream and return the result. The result may even
be DNSSEC signed since it was issued by the valid owner of the attacker's domain name.
If this redirection is then followed and validated with the attacker's domain name, 
it will succeed and the client will have been maliciously redirected to use an attacker's
server at the low cost of a port 53 attack without breaking encryption or compromising
the encrypted DNS server DDR designated.</t>
        <t>There is no harm in using the name of the server for the EDSR query so long as the
validation of the destination server is performed using the original IP address and
not the name. This ensures EDSR clients can consistently use the domain name of a 
server for redirection discovery. Use of the DDR-defined SUDN "resolver.arpa" was
considered and rejected because this would conflate DDR configuration and EDSR
configuration by placing them in the same zone, using the same DNS record type.</t>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>A client <bcp14>MAY</bcp14> choose to not send other name queries until redirection is complete,
but there should be no privacy issue with sending queries to intermediate resolvers before
redirection takes place. This is because the intermediate resolvers are considered
to be appropriate destinations by the client even if the resolver wants to substitute
another resolver for reasons other than name resolution results such as latency
optimization or load balancing.</t>
    </section>
    <section anchor="data-flow-considerations">
      <name>Data Flow Considerations</name>
      <section anchor="data-scope">
        <name>Data Scope</name>
        <t>EDSR does not result in any additional data being shared by the end user, as the
DNS queries going to the new resolver were already going to go to the original
resolver.</t>
      </section>
      <section anchor="data-visibility">
        <name>Data Visibility</name>
        <t>EDSR results in a 1:1 replacement of DNS resolvers used (future queries sent to
the new resolver will not be sent to the original resolver anymore). This means the
number of servers which see any given query remain the same.</t>
        <t>This is only true if clients only use one redirected DNS server per original DNS
server. If the DNS server offers more than one redirection, and the client validates
and uses two or more of those redirections, then there will be greater data
visibility (more destinations). This is however entirely within the client's choice
following their own policy as a redundancy versus volume of exhausted data trade-off.</t>
        <t>EDSR requires the redirection to another server to also use encrypted DNS, so no
third-party will be introduced to the data flow unless the encryption is broken.</t>
      </section>
      <section anchor="data-centralization">
        <name>Data centralization</name>
        <t>EDSR can only increase data centralization if multiple resolver operators choose to
redirect DNS clients to the same, other DNS resolver. To prevent the reduction of
their resolution redundancy, DNS clients <bcp14>MAY</bcp14> choose to ignore redirections if they
find that they point to resolvers they are already configured to use, by a previous
redirection or some other configuration.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This draft has no IANA considerations.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC9462">
          <front>
            <title>Discovery of Designated Resolvers</title>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="E. Kinnear" initials="E." surname="Kinnear"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <author fullname="T. Jensen" initials="T." surname="Jensen"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document defines Discovery of Designated Resolvers (DDR), a set of mechanisms for DNS clients to use DNS records to discover a resolver's encrypted DNS configuration. An Encrypted DNS Resolver discovered in this manner is referred to as a "Designated Resolver". These mechanisms can be used to move from unencrypted DNS to encrypted DNS when only the IP address of a resolver is known. These mechanisms are designed to be limited to cases where Unencrypted DNS Resolvers and their Designated Resolvers are operated by the same entity or cooperating entities. It can also be used to discover support for encrypted DNS protocols when the name of an Encrypted DNS Resolver is known.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9462"/>
          <seriesInfo name="DOI" value="10.17487/RFC9462"/>
        </reference>
        <reference anchor="RFC9345">
          <front>
            <title>Delegated Credentials for TLS and DTLS</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="S. Iyengar" initials="S." surname="Iyengar"/>
            <author fullname="N. Sullivan" initials="N." surname="Sullivan"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>The organizational separation between operators of TLS and DTLS endpoints and the certification authority can create limitations. For example, the lifetime of certificates, how they may be used, and the algorithms they support are ultimately determined by the Certification Authority (CA). This document describes a mechanism to overcome some of these limitations by enabling operators to delegate their own credentials for use in TLS and DTLS without breaking compatibility with peers that do not support this specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9345"/>
          <seriesInfo name="DOI" value="10.17487/RFC9345"/>
        </reference>
        <reference anchor="RFC9461">
          <front>
            <title>Service Binding Mapping for DNS Servers</title>
            <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>The SVCB DNS resource record type expresses a bound collection of endpoint metadata, for use when establishing a connection to a named service. DNS itself can be such a service, when the server is identified by a domain name. This document provides the SVCB mapping for named DNS servers, allowing them to indicate support for encrypted transport protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9461"/>
          <seriesInfo name="DOI" value="10.17487/RFC9461"/>
        </reference>
        <reference anchor="RFC9460">
          <front>
            <title>Service Binding and Parameter Specification via the DNS (SVCB and HTTPS Resource Records)</title>
            <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
            <author fullname="M. Bishop" initials="M." surname="Bishop"/>
            <author fullname="E. Nygren" initials="E." surname="Nygren"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies the "SVCB" ("Service Binding") and "HTTPS" DNS resource record (RR) types to facilitate the lookup of information needed to make connections to network services, such as for HTTP origins. SVCB records allow a service to be provided from multiple alternative endpoints, each with associated parameters (such as transport protocol configuration), and are extensible to support future uses (such as keys for encrypting the TLS ClientHello). They also enable aliasing of apex domains, which is not possible with CNAME. The HTTPS RR is a variation of SVCB for use with HTTP (see RFC 9110, "HTTP Semantics"). By providing more information to the client before it attempts to establish a connection, these records offer potential benefits to both performance and privacy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9460"/>
          <seriesInfo name="DOI" value="10.17487/RFC9460"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9463">
          <front>
            <title>DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers (DNR)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="T. Reddy.K" initials="T." role="editor" surname="Reddy.K"/>
            <author fullname="D. Wing" initials="D." surname="Wing"/>
            <author fullname="N. Cook" initials="N." surname="Cook"/>
            <author fullname="T. Jensen" initials="T." surname="Jensen"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies new DHCP and IPv6 Router Advertisement options to discover encrypted DNS resolvers (e.g., DNS over HTTPS, DNS over TLS, and DNS over QUIC). Particularly, it allows a host to learn an Authentication Domain Name together with a list of IP addresses and a set of service parameters to reach such encrypted DNS resolvers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9463"/>
          <seriesInfo name="DOI" value="10.17487/RFC9463"/>
        </reference>
        <reference anchor="RFC9115">
          <front>
            <title>An Automatic Certificate Management Environment (ACME) Profile for Generating Delegated Certificates</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="D. López" initials="D." surname="López"/>
            <author fullname="A. Pastor Perales" initials="A." surname="Pastor Perales"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="September" year="2021"/>
            <abstract>
              <t>This document defines a profile of the Automatic Certificate Management Environment (ACME) protocol by which the holder of an identifier (e.g., a domain name) can allow a third party to obtain an X.509 certificate such that the certificate subject is the delegated identifier while the certified public key corresponds to a private key controlled by the third party. A primary use case is that of a Content Delivery Network (CDN), the third party, terminating TLS sessions on behalf of a content provider (the holder of a domain name). The presented mechanism allows the holder of the identifier to retain control over the delegation and revoke it at any time. Importantly, this mechanism does not require any modification to the deployed TLS clients and servers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9115"/>
          <seriesInfo name="DOI" value="10.17487/RFC9115"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
      </references>
    </references>
    <?line 438?>

<section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank the following individuals for their invaluable feedback
to this document: Ben Schwartz, Eric Orth, Erik Nygren, Manu Bretelle, Ralph Weber,
Ted Hardie, Tommy Pauly, Viktor Dukhovni, and Vittorio Bertola.</t>
    </section>
    <section anchor="previous-versions">
      <name>Previous versions</name>
      <t>This document describes only one mode of redirection. Previous
versions of this draft defined an additional mode of redirection that allowed servers to 
redirect to servers that presented a different domain name than the original server. While
the scenario's validity has some interest, there is no consensus in the WG for how it can 
be addressed in an acceptably secure fashion.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
