<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-jt-add-dns-server-redirection-00" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.15.2 -->
  <front>
    <title abbrev="EDSR">Handling Encrypted DNS Server Redirection</title>
    <seriesInfo name="Internet-Draft" value="draft-jt-add-dns-server-redirection-00"/>
    <author initials="J." surname="Todd" fullname="J. Todd">
      <organization>Quad9</organization>
      <address>
        <email>jtodd@quad9.net</email>
      </address>
    </author>
    <author initials="T." surname="Jensen" fullname="T. Jensen">
      <organization>Microsoft</organization>
      <address>
        <email>tojens@microsoft.com</email>
      </address>
    </author>
    <date year="2022" month="November" day="08"/>
    <area>Internet</area>
    <workgroup>ADD</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document defines Encrypted DNS Server Redirection (EDSR),
a mechanism for encrypted DNS servers to redirect clients to
other encrypted DNS servers. This enables dynamic routing
to geo-located or otherwise more desirable encrypted DNS servers
without modifying DNS client endpoint configurations or the use 
of anycast by the DNS server.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://example.com/LATEST"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-jt-add-dns-server-redirection/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        WG Working Group mailing list (<eref target="mailto:add@ietf.org"/>),
        which is archived at <eref target="https://example.com/WG"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/add/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/johnhtodd/draft-DOH-redirect"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Encrypted DNS Server Redirection (EDSR) is a protocol that allows an encrypted
DNS resolver whose configuration is well known to clients to redirect them to other,
more desirable resolvers without having to support anycast and without having to
configure clients with these other resolvers ahead of time. It uses the mechanism
defined by DDR <xref target="I-D.ietf-add-ddr"/> to redirect an encrypted DNS client from one encrypted DNS
resolver to another encrypted DNS resolver. Where DDR uses a threat model that
presumes the initial DNS traffic is unencrypted, EDSR applies when the initial
DNS traffic is already encrypted.</t>
      <t>One example of what makes redirection to another resolver
desirable is geolocation. A DNS service may document one or a few well known resolver 
configurations even though it routes traffic to hundreds or thousands of resolvers
that are closer to the client, reducing latency and making DNS resolutions more
applicable to the client.</t>
    </section>
    <section anchor="dns-client-behavior">
      <name>DNS client behavior</name>
      <section anchor="discovering-redirections">
        <name>Discovering redirections</name>
        <t>When a DNS client first opens a connection to an encrypted DNS server, it <bcp14>MUST</bcp14>
send a SVCB query for _dns.resolver.arpa to discover its encrypted DNS configuration.
If the configuration returned differs from the current connection, the DNS client
<bcp14>SHOULD</bcp14> close the connection in favor of a connection to the one returned in the
SVCB query.</t>
        <t>The client does not need to wait for the results of the redirection discovery
query before sending other DNS queries on the connection, though they <bcp14>SHOULD</bcp14>
gracefully close the connection as soon as it has successfully established a
connection to the server it was redirected to and received or timed out the
outstanding queries on the original connection.</t>
        <t>See the considerations section for reasons a client <bcp14>MAY</bcp14> choose to decline a
redirection.</t>
      </section>
      <section anchor="prioritizing-redirections">
        <name>Prioritizing redirections</name>
        <t>When clients receive more than one valid SVCB response, they <bcp14>SHOULD</bcp14> prefer using
the redirections in ascending order of the SVCB priority.</t>
      </section>
      <section anchor="network-changes">
        <name>Network changes</name>
        <t>When a client device changes what network it is connected to, it <bcp14>SHOULD</bcp14> forget
pre-existing redirections and start EDSR over with the originally configured
resolvers. This ensures that a resolver which redirects clients based on their
source network can behave accordingly.</t>
        <t>Note that this is unrelated to what resolvers a client is originally configured with. 
For example, a client which is configured to always used the resolvers advertised by 
DHCP will likely start with different original resolvers when changing networks. How a 
client is configured with DNS resolvers is out of scope for this document. EDSR only 
provides a mechanism for clients to discover redirections from resolvers they were 
previously configured to use.</t>
      </section>
    </section>
    <section anchor="dns-server-behavior">
      <name>DNS server behavior</name>
      <t>DNS resolvers who want to redirect clients to other resolvers <bcp14>MUST</bcp14> respond to
SVCB <xref target="I-D.ietf-add-svcb-dns"/> queries for _dns.resolver.arpa. with records that
describe the configuration of the destination server. Servers <bcp14>SHOULD</bcp14> be prepared
for clients to not follow the redirection immediately as connection failures or
other issues may lead to clients being unable to follow the redirection. Servers
who are redirecting due to being overloaded <bcp14>MAY</bcp14> respond as they normally would
to overwhelming traffic.</t>
      <t>Guidance in <xref section="3" sectionFormat="of" target="I-D.ietf-add-ddr"/> <bcp14>SHOULD</bcp14> be followed by resolvers when
responding to these special queries for "resolver.arpa" to prevent unnecessary
additional requests by the client. See <xref section="5" sectionFormat="of" target="I-D.ietf-dnsop-svcb-https"/>
for more info.</t>
      <t>DNS resolvers who want to redirect clients to other resolvers <bcp14>MUST</bcp14> treat resolver.arpa 
as a locally served zone per <xref target="RFC6303"/>. In practice, this means that resolvers 
<bcp14>SHOULD</bcp14> respond to queries of any type other than SVCB for _dns.resolver.arpa with 
NODATA and queries of any type for any domain name under resolver.arpa with NODATA.</t>
      <t>Redirections <bcp14>MUST</bcp14> only redirect to resolvers which support at least the same
protocol, address family, and port as the referring resolver. This ensures that
redirections do not lead clients to resolvers that are not compatible with the
client.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="deployment-considerations">
      <name>Deployment Considerations</name>
      <section anchor="chained-redirections">
        <name>Chained redirections</name>
        <t>It is possible for DNS servers to redirect clients to DNS servers which also
redirect clients. Clients which are presented with long chains of redirections
<bcp14>MAY</bcp14> choose to stop following redirections to reduce connection thrashing. DNS
server operators <bcp14>SHOULD</bcp14> deploy redirection behavior mindfully to avoid long
chains of redirection.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <section anchor="trusting-the-redirected-connection">
        <name>Trusting the redirected connection</name>
        <t>EDSR does not provide novel authentication or security mechanisms. Redirection
is trusted by virtue of the server authentication via PKI through TLS <xref target="RFC5280"/>.
EDSR <bcp14>MUST NOT</bcp14> be used with encrypted DNS protocols that are not based on TLS.
This scenario will require future standards work.</t>
        <t>EDSR should not introduce any additional security considerations beyond use of
the original encrypted resolver prior to redirection. Because the original
connection was trusted, information sent over it about a new connection to use
should be as trusted. This is analogous to the use of 3xx codes in HTTP to
redirect HTTP clients to other servers. However, clients that wish to time bound 
vulnerabilities to attackers who compromise the original resolver <bcp14>MAY</bcp14> choose to 
implement a maximum TTL to honor on SVCB records that redirect to other servers.</t>
      </section>
      <section anchor="use-with-unencrypted-dns">
        <name>Use with unencrypted DNS</name>
        <t>EDSR <bcp14>MUST NOT</bcp14> be used to redirect unencrypted DNS traffic to any other resolver.
This use case is called designation and is covered by Discovery of Designated
Resolvers (DDR) as defined in <xref target="I-D.ietf-add-ddr"/>. Not following DDR opens up a DNS client
to malicious redirection to an attacker-controlled DNS server. For more information,
see <xref section="7" sectionFormat="of" target="I-D.ietf-add-ddr"/>.</t>
        <t>EDSR also <bcp14>MUST NOT</bcp14> be used to redirect encrypted DNS traffic to a resolver that
advertises support for unencrypted DNS. This would reduce the security posture of
the client. Clients <bcp14>MUST NOT</bcp14> follow an encrypted DNS redirection and then send
unencrypted DNS traffic to the new resolver.</t>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>A client <bcp14>MAY</bcp14> choose to not send other name queries until redirection is complete,
but there should be no issue with sending queries to intermediate resolvers before
redirection takes place. This is because the intermediate resolvers are considered
to be appropriate destinations by the client even if the resolver wants to substitute
another resolver for reasons other than name resolution results such as latency
optimization or load balancing.</t>
    </section>
    <section anchor="data-flow-considerations">
      <name>Data Flow Considerations</name>
      <section anchor="data-scope">
        <name>Data Scope</name>
        <t>EDSR does not result in any additional data being shared by the end user, as the
DNS queries going to the new resolver were already going to go to the original
resolver.</t>
      </section>
      <section anchor="data-visibility">
        <name>Data Visibility</name>
        <t>EDSR results in a 1:1 replacement of DNS resolvers used (future queries sent to
the new resolver will not be sent to the original resolver anymore). This means the
number of servers which see any given query remain the same.</t>
        <t>This is only true if clients only use one redirected DNS server per original DNS
server. If the DNS server offers more than one redirection, and the client validates
and uses two or more of those redirections, then there will be greater data
visibility (more destinations). This is however entirely within the client's choice
following their own policy as a redundancy versus volume of exhausted data trade-off.</t>
        <t>EDSR requires the redirection to another server to also use encrypted DNS, so no
third-party will be introduced to the data flow unless the encryption is broken.</t>
      </section>
      <section anchor="data-centralization">
        <name>Data centralization</name>
        <t>EDSR can only increase data centralization if multiple resolver operators choose to
redirect DNS clients to the same, other DNS resolver. To prevent the reduction of
their resolution redundancy, DNS clients <bcp14>MAY</bcp14> choose to ignore redirections if they
find that they point to resolvers they are already configured to use, by a previous
redirection or some other configuration.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="I-D.ietf-add-ddr" target="https://www.ietf.org/archive/id/draft-ietf-add-ddr-10.txt">
          <front>
            <title>Discovery of Designated Resolvers</title>
            <author fullname="Tommy Pauly" initials="T." surname="Pauly">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Eric Kinnear" initials="E." surname="Kinnear">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Patrick McManus" initials="P." surname="McManus">
              <organization>Fastly</organization>
            </author>
            <author fullname="Tommy Jensen" initials="T." surname="Jensen">
              <organization>Microsoft</organization>
            </author>
            <date day="5" month="August" year="2022"/>
            <abstract>
              <t>   This document defines Discovery of Designated Resolvers (DDR), a
   mechanism for DNS clients to use DNS records to discover a resolver's
   encrypted DNS configuration.  An encrypted DNS resolver discovered in
   this manner is referred to as a "Designated Resolver".  This
   mechanism can be used to move from unencrypted DNS to encrypted DNS
   when only the IP address of a resolver is known.  This mechanism is
   designed to be limited to cases where unencrypted DNS resolvers and
   their designated resolvers are operated by the same entity or
   cooperating entities.  It can also be used to discover support for
   encrypted DNS protocols when the name of an encrypted DNS resolver is
   known.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-add-ddr-10"/>
        </reference>
        <reference anchor="I-D.ietf-add-svcb-dns" target="https://www.ietf.org/archive/id/draft-ietf-add-svcb-dns-07.txt">
          <front>
            <title>Service Binding Mapping for DNS Servers</title>
            <author fullname="Benjamin M. Schwartz" initials="B. M." surname="Schwartz">
              <organization>Google LLC</organization>
            </author>
            <date day="11" month="August" year="2022"/>
            <abstract>
              <t>   The SVCB DNS resource record type expresses a bound collection of
   endpoint metadata, for use when establishing a connection to a named
   service.  DNS itself can be such a service, when the server is
   identified by a domain name.  This document provides the SVCB mapping
   for named DNS servers, allowing them to indicate support for
   encrypted transport protocols.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-add-svcb-dns-07"/>
        </reference>
        <reference anchor="I-D.ietf-dnsop-svcb-https" target="https://www.ietf.org/archive/id/draft-ietf-dnsop-svcb-https-11.txt">
          <front>
            <title>Service binding and parameter specification via the DNS (DNS SVCB and HTTPS RRs)</title>
            <author fullname="Benjamin M. Schwartz" initials="B. M." surname="Schwartz">
              <organization>Google</organization>
            </author>
            <author fullname="Mike Bishop" initials="M." surname="Bishop">
              <organization>Akamai Technologies</organization>
            </author>
            <author fullname="Erik Nygren" initials="E." surname="Nygren">
              <organization>Akamai Technologies</organization>
            </author>
            <date day="11" month="October" year="2022"/>
            <abstract>
              <t>   This document specifies the "SVCB" and "HTTPS" DNS resource record
   (RR) types to facilitate the lookup of information needed to make
   connections to network services, such as for HTTP origins.  SVCB
   records allow a service to be provided from multiple alternative
   endpoints, each with associated parameters (such as transport
   protocol configuration and keys for encrypting the TLS ClientHello).
   They also enable aliasing of apex domains, which is not possible with
   CNAME.  The HTTPS RR is a variation of SVCB for use with HTTP [HTTP].
   By providing more information to the client before it attempts to
   establish a connection, these records offer potential benefits to
   both performance and privacy.

   TO BE REMOVED: This document is being collaborated on in Github at:
   https://github.com/MikeBishop/dns-alt-svc
   (https://github.com/MikeBishop/dns-alt-svc).  The most recent working
   version of the document, open issues, etc. should all be available
   there.  The authors (gratefully) accept pull requests.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dnsop-svcb-https-11"/>
        </reference>
        <reference anchor="RFC6303" target="https://www.rfc-editor.org/info/rfc6303">
          <front>
            <title>Locally Served DNS Zones</title>
            <author fullname="M. Andrews" initials="M." surname="Andrews">
              <organization/>
            </author>
            <date month="July" year="2011"/>
            <abstract>
              <t>Experience with the Domain Name System (DNS) has shown that there are a number of DNS zones that all iterative resolvers and recursive nameservers should automatically serve, unless configured otherwise. RFC 4193 specifies that this should occur for D.F.IP6.ARPA.  This document extends the practice to cover the IN-ADDR.ARPA zones for RFC 1918 address space and other well-known zones with similar characteristics.  This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="163"/>
          <seriesInfo name="RFC" value="6303"/>
          <seriesInfo name="DOI" value="10.17487/RFC6303"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC5280" target="https://www.rfc-editor.org/info/rfc5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper">
              <organization/>
            </author>
            <author fullname="S. Santesson" initials="S." surname="Santesson">
              <organization/>
            </author>
            <author fullname="S. Farrell" initials="S." surname="Farrell">
              <organization/>
            </author>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen">
              <organization/>
            </author>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <author fullname="W. Polk" initials="W." surname="Polk">
              <organization/>
            </author>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
