<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.2 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-add-resolver-info-08" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.2 -->
  <front>
    <title abbrev="DNS Resolver Information">DNS Resolver Information</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-add-resolver-info-08"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Mohamed Boucadair">
      <organization>Orange</organization>
      <address>
        <postal>
          <city>Rennes</city>
          <code>35000</code>
          <country>France</country>
        </postal>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <date year="2023" month="November" day="24"/>
    <area>Internet</area>
    <workgroup>ADD</workgroup>
    <keyword>Transparency</keyword>
    <keyword>User Experience</keyword>
    <keyword>DNS server selection</keyword>
    <abstract>
      <?line 50?>

<t>This document specifies a method for DNS resolvers to publish
   information about themselves.  DNS clients can use the resolver
   information to identify the capabilities of DNS resolvers. How such an information is then used by DNS clients is out of the scope of the document.</t>
    </abstract>
  </front>
  <middle>
    <?line 56?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Historically, DNS stub resolvers communicated with upstream
   resolvers without needing to know anything about the features
   supported by these recursive resolvers.  As more and more recursive
   resolvers expose different features that may impact delivered DNS
   services, means to help stub resolvers to identify the capabilities of
   resolvers are valuable.  Typically, stub resolvers can discover
   and authenticate encrypted DNS resolvers provided by a local network,
   for example, using the Discovery of Network-designated Resolvers (DNR) <xref target="RFC9463"/> and the Discovery of Designated Resolvers (DDR)
   <xref target="RFC9462"/>.  However, these stub resolvers need a mechanism to
   retrieve information from the discovered recursive resolvers about
   their capabilities.</t>
      <t>This document fills that void by specifying a method for stub
   resolvers to retrieve such information.  To that aim, a new resource record (RR) type
   is defined for stub resolvers to query the recursive resolvers.  The
   information that a resolver might want to expose is defined in
   <xref target="key-val"/>.</t>
      <t>Retrieved information can be used to feed the server selection
   procedure. However, that selection procedure is out of the scope of this document.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document makes use of the terms defined in <xref target="RFC8499"/>. The following additional terms are used:</t>
      <dl>
        <dt>Encrypted DNS:</dt>
        <dd>
          <t>Refers to a DNS scheme where DNS exchanges are
 transported over an encrypted channel between a DNS client and server (e.g.,
 DNS over HTTPS (DoH) <xref target="RFC8484"/>, DNS over TLS (DoT) <xref target="RFC7858"/>, or
 DNS over QUIC (DoQ) <xref target="RFC9250"/>).</t>
        </dd>
        <dt>Encrypted DNS resolver:</dt>
        <dd>
          <t>Refers to a DNS resolver that supports any encrypted DNS scheme.</t>
        </dd>
      </dl>
    </section>
    <section anchor="retreive">
      <name>Retrieving Resolver Information</name>
      <t>A stub resolver that wants to retrieve the resolver information may
   use the RR type "RESINFO" defined in this document.</t>
      <t>The content of the RDATA in a response to a RESINFO RR type query is defined in
   <xref target="key-val"/>.  If the resolver understands the RESINFO RR type, the
   RRSet in the Answer section <bcp14>MUST</bcp14> have exactly one record.</t>
      <t>A DNS client can retrieve the resolver information using the RESINFO
   RR type and the QNAME of the domain name that is used to authenticate the
   DNS resolver (referred to as the Authentication Domain Name (ADN) in <xref target="RFC9463"/>).</t>
      <t>When clients use the Special-Use Domain Name "resolver.arpa" with DDR to discover a designated
   encrypted resolver based on an IP address (<xref section="4" sectionFormat="of" target="RFC9462"/>), they need to handle RESINFO responses specially.
   By using the DNS server's domain name from the DDR SVCB response to issue the RESINFO query,
   a client accepts the risk that a resolver supports DDR
   but does not support RESINFO. In this scenario, the resolver might pass the query upstream, and then the client can receive a positive RESINFO
   response either from a legitimate upstream DNS resolver or an attacker.</t>
      <t>While DNSSEC can be considered as a candidate mechanism
   to protect against the attack, it is important to note that the name was received over unencrypted
   DNS and that the RESINFO response can be both validly DNSSEC-signed and not signed by the name that the original DDR resolution intended.
   To reduce the scope of such an attack, clients wishing to retrieve resolver information from resolvers discovered when performing DDR
   discovery using resolver IP address (<xref section="4" sectionFormat="of" target="RFC9462"/>) <bcp14>MUST</bcp14> ensure during the TLS handshake that the TLS certificate presented by
   the resolver contains in its SubjectAltName (SAN) the domain name in the TargetName of the DDR SVCB response. If that succeeds, clients <bcp14>MAY</bcp14> choose to retrieve the resolver information using the RESINFO RR type and the QNAME set to the TargetName in the DDR SVCB response.</t>
    </section>
    <section anchor="format">
      <name>Format of the Resolver Information</name>
      <t>The resolver information uses the same format as DNS TXT records.
   The motivation for using the same format as TXT records is to convey a
   small amount of useful information about a DNS resolver.  As a
   reminder, the format rules for TXT records are defined in
   the base DNS specification (<xref section="3.3.14" sectionFormat="of" target="RFC1035"/>) and further
   elaborated in the DNS-based Service Discovery (DNS-SD) specification
   (<xref section="6.1" sectionFormat="of" target="RFC6763"/>). The recommendations to limit the TXT record size are
   discussed in <xref section="6.1" sectionFormat="of" target="RFC6763"/>.</t>
      <t>Similar to DNS-SD, the RESINFO RR type uses "key/value" pairs to
   convey the resolver information.  Each "key/value" pair is encoded
   using the format rules defined in <xref section="6.3" sectionFormat="of" target="RFC6763"/>.  Using
   standardized "key/value" syntax within the RESINFO RR type makes it
   easier for future keys to be defined.  If a DNS client sees unknown
   keys in a RESINFO RR type, it <bcp14>MUST</bcp14> silently ignore them.  The same
   rules for the keys as those defined in <xref section="6.4" sectionFormat="of" target="RFC6763"/> <bcp14>MUST</bcp14>
   be followed for RESINFO.</t>
      <t>Keys <bcp14>MUST</bcp14> either be defined in the IANA registry (<xref target="key-reg"/>) or begin
   with the substring "temp-" for names defined for local use only.</t>
    </section>
    <section anchor="key-val">
      <name>Resolver Information Keys/Values</name>
      <t>The following resolver information keys are defined:</t>
      <dl>
        <dt>qnamemin:</dt>
        <dd>
          <t>If the DNS resolver supports QNAME minimisation <xref target="RFC9156"/>
 to improve DNS privacy, the key is present.  Note that, as per the
 rules for the keys defined in <xref section="6.4" sectionFormat="of" target="RFC6763"/>, if there
 is no '=' in a key, then it is a boolean attribute, simply
 identified as being present, with no value.
</t>
          <t>This is an optional attribute.</t>
        </dd>
        <dt>exterr:</dt>
        <dd>
          <t>If the DNS resolver supports extended DNS errors (EDE) option
 <xref target="RFC8914"/> to return additional information about the cause of DNS
 errors, the value of this key lists the possible extended DNS
 error codes that can be returned by this DNS resolver.  When
 multiple values are present, these values <bcp14>MUST</bcp14> be comma-separated.
</t>
          <t>This is an optional attribute.</t>
        </dd>
        <dt>infourl:</dt>
        <dd>
          <t>An URL that points to the generic unstructured resolver
 information (e.g., DoH APIs supported, possible HTTP status codes
 returned by the DoH server, how to report a problem) for
 troubleshooting purposes.
</t>
          <t>The server <bcp14>MUST</bcp14> support the content-type 'text/html'.  The DNS
 client <bcp14>MUST</bcp14> reject the URL if the scheme is not "https".  The URL
 <bcp14>SHOULD</bcp14> be treated only as diagnostic information for IT staff.  It
 is not intended for end user consumption as the URL can possibily
 provide misleading information.  A DNS client <bcp14>MAY</bcp14> choose to display
 the URL to the end user, if and only if the encrypted resolver has
 sufficient reputation, according to some local policy (e.g., user
 configuration, administrative configuration, or a built-in list of
 respectable resolvers).</t>
          <t>This is an optional attribute.  For example, a DoT server may
 not want to host an HTTPS server.</t>
        </dd>
      </dl>
      <t>New keys can be defined as per the procedure defined in <xref target="key-reg"/>.</t>
      <t><xref target="ex-1"/> shows an example of a published resolver information record:</t>
      <figure anchor="ex-1">
        <name>An Example of Resolver Information Record</name>
        <artwork align="center"><![CDATA[
resolver.example.net. 7200 IN RESINFO qnamemin exterr=15,16,17
                      infourl=https://resolver.example.com/guide
]]></artwork>
      </figure>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>DNS clients communicating with DNS resolvers discovered using DNR <bcp14>MUST</bcp14> employ one of the following measures
to prevent DNS response forgery attacks:</t>
      <ol spacing="normal" type="1"><li>
          <t>Establish an authenticated secure connection to the DNS resolver.</t>
        </li>
        <li>
          <t>Implement local DNSSEC validation (<xref section="10" sectionFormat="of" target="RFC8499"/>) to verify the authenticity of the resolver information.</t>
        </li>
      </ol>
      <t>DNS clients communicating with DNS resolvers discovered using DDR's discovery using resolver IP addresses (
<xref section="4" sectionFormat="of" target="RFC9462"/>) <bcp14>MUST</bcp14> perform the validation described in <xref target="retreive"/> to limit the effectiveness of upstream
attacks (because then the attacker can only redirect the client to another server with a valid TLS certificate for the original
IP address but possibly with a different domain name).</t>
      <t>An encrypted resolver may return incorrect information in RESINFO. If the client cannot validate the attributes received from the resolver, which will be used for resolver selection or display to the end-user, the client should process those attributes only if the encrypted resolver has sufficient reputation according to local policy (e.g., user configuration, administrative configuration, or a built-in list of respectable resolvers). This approach limits the ability of a malicious encrypted resolver to cause harm.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <ul empty="true">
        <li>
          <t>Note to the RFC Editor: Please update "RFCXXXX" occurences with the RFC number to be assigned to this document.</t>
        </li>
      </ul>
      <section anchor="resinfo-rr-type">
        <name>RESINFO RR Type</name>
        <t>This document requests IANA to update this entry from the
   "Resource Record (RR) TYPEs" registry of the "Domain Name System
   (DNS) Parameters" registry group available at <xref target="RRTYPE"/>:</t>
        <artwork><![CDATA[
Type: RESINFO
Value: 261
Meaning: Resolver Information as Key/Value Pairs
Reference: RFCXXXX
]]></artwork>
      </section>
      <section anchor="key-reg">
        <name>DNS Resolver Information Key Registration</name>
        <t>This document requests IANA to create a new registry entitled "DNS
   Resolver Information Keys" under the "Domain Name System (DNS) Parameters" registry group (<xref target="IANA-DNS"/>).  This new registry contains definitions of
   the keys that can be used to provide the resolver information.</t>
        <t>The registration procedure is Specification Required (<xref section="4.6" sectionFormat="of" target="RFC8126"/>).</t>
        <t>The structure of the registry is as follows:</t>
        <dl>
          <dt>Name:</dt>
          <dd>
            <t>The key name.  The name <bcp14>MUST</bcp14> conform to the definition in
 <xref target="format"/> of this document.  The IANA registry <bcp14>MUST NOT</bcp14> register names that begin
 with "temp-", so these names can be used freely by any
 implementer.</t>
          </dd>
          <dt>Description:</dt>
          <dd>
            <t>A description of the registered key.</t>
          </dd>
          <dt>Specification:</dt>
          <dd>
            <t>The reference specification for the registered
 element.</t>
          </dd>
        </dl>
        <t>The initial content of this registry is provided in <xref target="initial"/>.</t>
        <table anchor="initial">
          <name>Initial RESINFO Registry</name>
          <thead>
            <tr>
              <th align="center">Name</th>
              <th align="left">Description</th>
              <th align="center">Specification</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="center">qnamemin</td>
              <td align="left">The presence of the key name indicates that QNAME minimization is enabled</td>
              <td align="center">RFCXXXX</td>
            </tr>
            <tr>
              <td align="center">exterr</td>
              <td align="left">Lists the set of supported extended DNS errors. It must be an INFO-CODE decimal value in the "Extended DNS Error Codes" registry.</td>
              <td align="center">RFCXXXX</td>
            </tr>
            <tr>
              <td align="center">infourl</td>
              <td align="left">Provides an URL that points to an unstructured resolver information that is used for troubleshooting</td>
              <td align="center">RFCXXXX</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9463">
          <front>
            <title>DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers (DNR)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="T. Reddy.K" initials="T." role="editor" surname="Reddy.K"/>
            <author fullname="D. Wing" initials="D." surname="Wing"/>
            <author fullname="N. Cook" initials="N." surname="Cook"/>
            <author fullname="T. Jensen" initials="T." surname="Jensen"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies new DHCP and IPv6 Router Advertisement options to discover encrypted DNS resolvers (e.g., DNS over HTTPS, DNS over TLS, and DNS over QUIC). Particularly, it allows a host to learn an Authentication Domain Name together with a list of IP addresses and a set of service parameters to reach such encrypted DNS resolvers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9463"/>
          <seriesInfo name="DOI" value="10.17487/RFC9463"/>
        </reference>
        <reference anchor="RFC9462">
          <front>
            <title>Discovery of Designated Resolvers</title>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="E. Kinnear" initials="E." surname="Kinnear"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <author fullname="T. Jensen" initials="T." surname="Jensen"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document defines Discovery of Designated Resolvers (DDR), a set of mechanisms for DNS clients to use DNS records to discover a resolver's encrypted DNS configuration. An Encrypted DNS Resolver discovered in this manner is referred to as a "Designated Resolver". These mechanisms can be used to move from unencrypted DNS to encrypted DNS when only the IP address of a resolver is known. These mechanisms are designed to be limited to cases where Unencrypted DNS Resolvers and their Designated Resolvers are operated by the same entity or cooperating entities. It can also be used to discover support for encrypted DNS protocols when the name of an Encrypted DNS Resolver is known.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9462"/>
          <seriesInfo name="DOI" value="10.17487/RFC9462"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC1035">
          <front>
            <title>Domain names - implementation and specification</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1035"/>
          <seriesInfo name="DOI" value="10.17487/RFC1035"/>
        </reference>
        <reference anchor="RFC6763">
          <front>
            <title>DNS-Based Service Discovery</title>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <author fullname="M. Krochmal" initials="M." surname="Krochmal"/>
            <date month="February" year="2013"/>
            <abstract>
              <t>This document specifies how DNS resource records are named and structured to facilitate service discovery. Given a type of service that a client is looking for, and a domain in which the client is looking for that service, this mechanism allows clients to discover a list of named instances of that desired service, using standard DNS queries. This mechanism is referred to as DNS-based Service Discovery, or DNS-SD.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6763"/>
          <seriesInfo name="DOI" value="10.17487/RFC6763"/>
        </reference>
        <reference anchor="RFC9156">
          <front>
            <title>DNS Query Name Minimisation to Improve Privacy</title>
            <author fullname="S. Bortzmeyer" initials="S." surname="Bortzmeyer"/>
            <author fullname="R. Dolmans" initials="R." surname="Dolmans"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="November" year="2021"/>
            <abstract>
              <t>This document describes a technique called "QNAME minimisation" to improve DNS privacy, where the DNS resolver no longer always sends the full original QNAME and original QTYPE to the upstream name server. This document obsoletes RFC 7816.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9156"/>
          <seriesInfo name="DOI" value="10.17487/RFC9156"/>
        </reference>
        <reference anchor="RFC8914">
          <front>
            <title>Extended DNS Errors</title>
            <author fullname="W. Kumari" initials="W." surname="Kumari"/>
            <author fullname="E. Hunt" initials="E." surname="Hunt"/>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="W. Hardaker" initials="W." surname="Hardaker"/>
            <author fullname="D. Lawrence" initials="D." surname="Lawrence"/>
            <date month="October" year="2020"/>
            <abstract>
              <t>This document defines an extensible method to return additional information about the cause of DNS errors. Though created primarily to extend SERVFAIL to provide additional information about the cause of DNS and DNSSEC failures, the Extended DNS Errors option defined in this document allows all response types to contain extended error information. Extended DNS Error information does not change the processing of RCODEs.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8914"/>
          <seriesInfo name="DOI" value="10.17487/RFC8914"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RRTYPE" target="https://www.iana.org/assignments/dns-parameters/dns-parameters.xhtml">
          <front>
            <title>Resource Record (RR) TYPEs</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="IANA-DNS" target="http://www.iana.org/assignments/dns-parameters/dns-parameters.xhtml#dns-parameters-4">
          <front>
            <title>Domain Name System (DNS) Parameters</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="RFC8499">
          <front>
            <title>DNS Terminology</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="A. Sullivan" initials="A." surname="Sullivan"/>
            <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
            <date month="January" year="2019"/>
            <abstract>
              <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has sometimes changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
              <t>This document obsoletes RFC 7719 and updates RFC 2308.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="219"/>
          <seriesInfo name="RFC" value="8499"/>
          <seriesInfo name="DOI" value="10.17487/RFC8499"/>
        </reference>
        <reference anchor="RFC8484">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="RFC7858">
          <front>
            <title>Specification for DNS over Transport Layer Security (TLS)</title>
            <author fullname="Z. Hu" initials="Z." surname="Hu"/>
            <author fullname="L. Zhu" initials="L." surname="Zhu"/>
            <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="D. Wessels" initials="D." surname="Wessels"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
              <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7858"/>
          <seriesInfo name="DOI" value="10.17487/RFC7858"/>
        </reference>
        <reference anchor="RFC9250">
          <front>
            <title>DNS over Dedicated QUIC Connections</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>This document describes the use of QUIC to provide transport confidentiality for DNS. The encryption provided by QUIC has similar properties to those provided by TLS, while QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides more efficient packet-loss recovery than UDP. DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC 7858, and latency characteristics similar to classic DNS over UDP. This specification describes the use of DoQ as a general-purpose transport for DNS and includes the use of DoQ for stub to recursive, recursive to authoritative, and zone transfer scenarios.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9250"/>
          <seriesInfo name="DOI" value="10.17487/RFC9250"/>
        </reference>
        <reference anchor="I-D.pp-add-resinfo">
          <front>
            <title>DNS Resolver Information Self-publication</title>
            <author fullname="Puneet Sood" initials="P." surname="Sood">
              <organization>Google</organization>
            </author>
            <author fullname="Paul E. Hoffman" initials="P. E." surname="Hoffman">
              <organization>ICANN</organization>
            </author>
            <date day="30" month="June" year="2020"/>
            <abstract>
              <t>   This document describes methods for DNS resolvers to self-publish
   information about themselves.  The information is returned as a JSON
   object.  The names in this object are defined in an IANA registry
   that allows for light-weight registration.  Applications and
   operating systems can use the methods defined here to get the
   information from resolvers in order to make choices about how to send
   future queries to those resolvers.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-pp-add-resinfo-02"/>
        </reference>
      </references>
    </references>
    <?line 281?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This specification leverages the work that has been documented in
   <xref target="I-D.pp-add-resinfo"/>.</t>
      <t>Thanks to Tommy Jensen, Vittorio Bertola, Vinny Parla, Chris Box, Ben
   Schwartz, Tony Finch, Daniel Kahn Gillmor, Eric Rescorla, Shashank
   Jain, Florian Obser, Richard Baldry, and Martin Thomson for the discussion and
   comments.</t>
      <t>Thanks to Mark Andrews, Joe Abley, Paul Wouters, Tim
   Wicinski, and Steffen Nurpmeso for the discussion on the RR
   formatting rules.</t>
      <t>Special thanks to Tommy Jensen for the careful and thoughtful Shepherd review.</t>
      <t>Thanks to Johan Stenstam for the dns-dir review and Ray Bellis for the RRTYPE allocation review.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
