<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-add-encrypted-dns-server-redirection-03" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="EDSR">Encrypted DNS Server Redirection</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-add-encrypted-dns-server-redirection-03"/>
    <author initials="J." surname="Todd" fullname="J. Todd">
      <organization>Quad9</organization>
      <address>
        <email>jtodd@quad9.net</email>
      </address>
    </author>
    <author initials="T." surname="Jensen" fullname="T. Jensen">
      <organization>Microsoft</organization>
      <address>
        <email>tojens@microsoft.com</email>
      </address>
    </author>
    <author initials="C." surname="Mosher" fullname="C. Mosher">
      <organization>Innate, Inc.</organization>
      <address>
        <email>cmosher@gmail.com</email>
      </address>
    </author>
    <date year="2025" month="November" day="04"/>
    <area>INT</area>
    <workgroup>add</workgroup>
    <keyword>encrypted DNS</keyword>
    <keyword>DoH</keyword>
    <keyword>DoT</keyword>
    <keyword>DoQ</keyword>
    <keyword>redirection</keyword>
    <abstract>
      <?line 47?>

<t>This document defines Encrypted DNS Server Redirection (EDSR),
a mechanism for encrypted DNS servers to redirect clients to
other encrypted DNS servers. This enables dynamic routing
to geo-located or otherwise more desirable encrypted DNS servers
without modifying DNS client endpoint configurations or the use 
of anycast by the DNS server.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://ietf-wg-add.github.io/EncDNSServerRedirect/draft-add-encrypted-dns-server-redirection.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-add-encrypted-dns-server-redirection/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        add Working Group mailing list (<eref target="mailto:add@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/add/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/add/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-wg-add/EncDNSServerRedirect"/>.</t>
    </note>
  </front>
  <middle>
    <?line 56?>

<section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Encrypted DNS Server Redirection (EDSR) is a protocol that allows an encrypted
DNS resolver whose configuration is well known to clients to redirect them to other,
more desirable resolvers without having to support anycast and without having to
configure clients with these other resolvers ahead of time. It uses a similar mechanism to the one
defined by <xref section="4" sectionFormat="of" target="RFC9462"/> to redirect an encrypted DNS client from one encrypted DNS
resolver to another encrypted DNS resolver. Where DDR uses a threat model that
presumes the initial DNS traffic could be unencrypted, EDSR only ever applies when the initial
DNS traffic is already encrypted.</t>
      <t>One example of what makes redirection to another resolver
desirable is geolocation. A DNS service may document one or a few well known resolver 
configurations even though it routes traffic to hundreds or thousands of resolvers
that are closer to the client, reducing latency and making DNS resolutions more
applicable to the client.</t>
    </section>
    <section anchor="dns-client-behavior">
      <name>DNS client behavior</name>
      <section anchor="discovering-redirections">
        <name>Discovering redirections</name>
        <t>When a DNS client first opens a connection to an encrypted DNS server, it <bcp14>MUST</bcp14>
use the Discovery Using Resolver Names mechanism defined in <xref section="5" sectionFormat="of" target="RFC9462"/> to
send a SVCB query for the name of the resolver to discover its encrypted DNS configuration.
The DNS client <bcp14>SHOULD</bcp14> open a connection to the server returned in the SVCB query using the
same domain name as the original server and one of the IP addresses returned in additional
A/AAAA records for the same
name. Once a connection has been successfully opened, as subsequently described by reaching
a suitable server at the end of the redirection chain, the client <bcp14>SHOULD</bcp14> close the first
connection.</t>
        <section anchor="use-of-delegated-credentials">
          <name>Use of Delegated Credentials</name>
          <t>If the DNS client's TLS dependency supports Delegated Credentials <xref target="RFC9345"/>, it <bcp14>SHOULD</bcp14>
present the "delegated_credential" TLS extension in its ClientHello as described in 
<xref section="4.1.1" sectionFormat="of" target="RFC9345"/> to maximize compatibility with EDSR-supporting servers. This
is because some server operators <bcp14>MAY</bcp14> redirect to servers controlled by other entities which
do not have access to its private key but which nevertheless have the ability to terminate
TLS connections for the server's name.</t>
        </section>
        <section anchor="redirection-after-discovery-using-resolver-ip-addresses">
          <name>Redirection after Discovery Using Resolver IP Addresses</name>
          <t>EDSR assumes that the original server
is identified by domain name from the client's perspective. Examples include when the client was configured
with the resolver through endpoint management or DNR discovery <xref target="RFC9463"/>. However, when the server was discovered using
DDR's Discovery Using Resolver IP Addresses <xref section="4" sectionFormat="of" target="RFC9462"/>, this is not the case. Due to the threat model
that mode of DDR operates under, where it has to
start from an unencrypted resolver, the identity of the server used for verification is its IP address.
The risks involved with using the domain name of resolvers discovered by Discovery Using Resolver IP
Addresses are further explored in the Security Considerations section <xref target="seccon"/>.</t>
          <t>When clients use EDSR with a resolver discovered using DDR's 
Discovery Using Resolver IP Addresses <xref section="4" sectionFormat="of" target="RFC9462"/>, the only difference
is that the destination server it was redirected to <bcp14>MUST</bcp14> be able to claim the IP address of the previous
server in its SAN field.</t>
          <t>This section applies to both the Verified and Opportunistic forms of DDR's Discovery Using
Resolver IP Addresses mechanism.</t>
        </section>
      </section>
      <section anchor="identifying-self-redirections">
        <name>Identifying self-redirections</name>
        <t>If the set of IP addresses that are valid for the server being redirected to include
the IP address of the current server, the client <bcp14>SHOULD</bcp14> ignore the redirection, treating
it the same as receiving no response or a NODATA response from the SVCB query.
However, clients receiving preferable encryption parameters as part of the SVCB response
<bcp14>MAY</bcp14> choose to reconnect to negotiate to upgrade to the preferred encryption method. When
doing so, the client <bcp14>SHOULD NOT</bcp14> immediately repeat EDSR as the redirection from the
server to itself has terminated the redirection chain.</t>
      </section>
      <section anchor="waiting-for-redirections">
        <name>Waiting for redirections</name>
        <t>The client does not need to wait for the results of the redirection discovery
query before sending other DNS queries on the connection, though they <bcp14>SHOULD</bcp14>
gracefully close the connection as soon as it has successfully established a
connection to the server it was redirected to and received or timed out the
outstanding queries on the original connection.</t>
        <t>See the Deployment Considerations section for reasons a client <bcp14>MAY</bcp14> choose to decline a
redirection.</t>
      </section>
      <section anchor="refreshing-redirections">
        <name>Refreshing redirections</name>
        <t>If a chain of redirections was followed, the effective TTL of the redirection is the
minimum of the TTLs encountered along the chain. If the effective TTL of the redirection
is considered to be too short for the client's performance (because it would require frequent
repetition of EDSR), clients <bcp14>MAY</bcp14> refuse to follow the redirection. Servers <bcp14>SHOULD NOT</bcp14> redirect
clients in a way that results in short effective TTLs.</t>
        <t>When the redirection TTL expires or connectivity to the server the client was redirected to fails,
the client <bcp14>MUST</bcp14> close the connection and return to using the servers it is currently configured to
use by its local configuration before using EDSR again. 
This allows the client to honor the intention of whatever configuration method was
used to provide it with a set of DNS servers to use.</t>
        <t>If the client DNS server remains the same, it <bcp14>SHOULD</bcp14> repeat the EDSR mechanism
before the effective TTLS expires so that if the same redirection is valid, it can avoid needing
to tear down the current connection by refreshing its effective TTL.</t>
      </section>
      <section anchor="multiple-redirections">
        <name>Multiple redirections</name>
        <t>When clients receive more than one valid SVCB response, they <bcp14>SHOULD</bcp14> prefer using
the redirections that match their configuration (such as supported IP address family or
desired encrypted DNS protocol) in ascending order of the SVCB priority. Once a successful
connection is made to a redirected destination, clients <bcp14>MUST</bcp14> discard results for other
servers. Entries returned for the same IP address <bcp14>MAY</bcp14> be retained for multi-protocol path
diversity to what is presumed to be the same server. Later unsuitability of all connections
to the server <bcp14>MUST</bcp14> result in restarting EDSR.</t>
        <t>Redirections are considered to be a one-to-one relationship (starting with one recursive
resolver and following its redirections should result in one replacement recursive resolver).
It is not expected that a stub resolver ends up using more recursive resolvers than it
was originally configured with when using EDSR.</t>
      </section>
      <section anchor="network-changes">
        <name>Network changes</name>
        <t>When a client device changes what network it is connected to, it <bcp14>SHOULD</bcp14> forget
pre-existing redirections and start EDSR over with the originally configured
resolvers. This ensures that a resolver which redirects clients based on their
source network can behave accordingly.</t>
        <t>Note that this is unrelated to what resolvers a client is originally configured with. 
For example, a client which is configured to always use the resolvers advertised by 
DHCP will likely start with different original resolvers when changing networks. How a 
client is configured with DNS resolvers is out of scope for this document. EDSR only 
provides a mechanism for clients to discover redirections from resolvers they were 
previously configured to use.</t>
      </section>
    </section>
    <section anchor="dns-server-behavior">
      <name>DNS server behavior</name>
      <t>DNS resolvers who want to redirect clients to other resolvers <bcp14>MUST</bcp14> respond to
SVCB <xref target="RFC9461"/> queries for their own domain names with records that
describe the configuration of the destination server.</t>
      <t>Guidance in <xref section="5" sectionFormat="of" target="RFC9460"/> to improve performance by
including additional A/AAAA records with the SVCB response <bcp14>SHOULD</bcp14> be followed.</t>
      <t>If the server knows it supports Discovery Using Resolver IP Addresses, or does not know for sure,
it <bcp14>MUST</bcp14> be prepared for clients to connect without an SNI because clients might have discovered the
server that way. Otherwise, if the server knows it does not support Discovery Using Resolver IP Addresses,
it <bcp14>MAY</bcp14> refuse connections without an SNI instead.</t>
      <t>The destination server <bcp14>MAY</bcp14> use Delegated Credentials <xref target="RFC9345"/> if the DNS client
advertises its support for Delegated Credentials as described in <xref section="4.1.1" sectionFormat="of" target="RFC9345"/>.
This is valid
so long as the delegated credential is valid for the same domain name used by the
referring server.</t>
      <t>Delegated Credentials are one approach for servers which need to redirect
clients to servers owned by other entities, as is the case with CDN contracts. Another
approach is using <xref target="RFC9115"/> to delegate Short-Term Automatically Renewed (STAR) certificates to the
servers that need to serve a name on behalf of a name's owner. This approach would not require protocol changes for
EDSR peers communicating with one another, unlike Delegated Credentials. Other trade-offs
between these approaches are beyond the scope of this document.</t>
      <section anchor="ensuring-compatibility">
        <name>Ensuring compatibility</name>
        <t>Redirections <bcp14>MUST</bcp14> only redirect to resolvers which support at least the same
protocol, address family, port, and TLS minimum versions as the referring resolver.
This ensures that redirections do not lead clients to resolvers that are not compatible
with the client. In addition, servers <bcp14>SHOULD</bcp14> avoid redirecting to servers which will also
redirect clients unless they are actively coordinating to ensure a positive
client experience. See the Deployment Considerations section for more details.</t>
      </section>
      <section anchor="dealing-with-persistent-clients">
        <name>Dealing with persistent clients</name>
        <t>Servers <bcp14>SHOULD</bcp14> be prepared for clients to not follow the redirection immediately
as connection failures, other technical issues, or even client policy affecting server
choice may lead to clients being unable to follow the redirection promptly or at all.
Servers who are redirecting due to being overloaded <bcp14>MAY</bcp14> respond as they normally would
to overwhelming traffic.</t>
      </section>
      <section anchor="redirection-to-servers-controlled-by-third-parties">
        <name>Redirection to servers controlled by third parties</name>
        <t>Server operators ought to consider using delegated credentials <xref target="RFC9345"/> when they
wish to redirect general clients to other servers operated by other entities. This
allows the server operator to avoid giving access to their domain's private key to
third parties but also ensure general clients have a secured, same-origin redirection
experience.</t>
      </section>
    </section>
    <section anchor="deployment-considerations">
      <name>Deployment Considerations</name>
      <section anchor="large-trees-of-redirections">
        <name>Large trees of redirections</name>
        <t>It is possible for DNS servers to redirect clients to DNS servers which also
redirect clients. Clients which are presented with long chains of redirections
<bcp14>MAY</bcp14> choose to stop following redirections to reduce connection thrashing. DNS
server operators <bcp14>SHOULD</bcp14> deploy redirection behavior mindfully to avoid long
chains of redirection.</t>
        <t>Servers <bcp14>SHOULD</bcp14> ensure their redirections do not create loops, where clients
are redirected to a server it already encountered earlier in the process.
Clients <bcp14>MAY</bcp14> stop following redirections when they detect this, but <bcp14>MAY</bcp14> also
take a simpler approach, following only a maximum number of redirections.</t>
      </section>
      <section anchor="redirection-ttls">
        <name>Redirection TTLs</name>
        <t>Servers <bcp14>SHOULD</bcp14> provide sufficiently long TTLs for clients to avoid the need to
constantly repeat EDSR queries. Server operators should be mindful of redirection
chains because unless they collaboratively control the TTLs of one another's
redirections, redirection chains will end up with greatly reduced effective TTLs
because the client will always use the lowest. When they do collaboratively control
the TTLs of one another's redirections, there is probably a way to do a
single-hop redirection instead.</t>
      </section>
      <section anchor="including-ip-addresses-in-edsr-responses">
        <name>Including IP addresses in EDSR responses</name>
        <t>If a recursive resolver does not include additional A/AAAA records per
<xref section="5" sectionFormat="of" target="RFC9460"/>, stub resolvers might end up failing
the redirection if the redirection destination name cannot be resolved. Additionally,
the recursive resolver <bcp14>SHOULD</bcp14> ensure records conntaining the same IP version as the
existing connection are returned (if the stub is currently connected over IPv4, one or
more A records <bcp14>SHOULD</bcp14> be included, and if the stub is currently connected over IPv6,
one or more AAAA records <bcp14>SHOULD</bcp14> be included).</t>
      </section>
      <section anchor="determining-suitability-of-destinations-for-a-given-client">
        <name>Determining suitability of destinations for a given client</name>
        <t>Because servers are required to ensure redirections are to servers that at least support
the same protocols as the current connection, server operators will often need to know
at run-time which of the potential redirection destinations are appropriate for the client
beyond whatever business logic requires the redirection in the first place. While out of
scope for protocol design, it is worth calling out that implementors need to consider
how they will handle this. A straightforward example would be a cache of the potential
redirection destinations that map to their capabilities, with consideration for how that
table is populated and updated (example: TLS 1.3 support is rolled out to server which
previously only served TLS 1.2). Any such out-of-band lookup would be much better than attempting
just-in-time checking with the potential destinations of their capabilities, which would
negatively impact the client experience when done during its redirection.</t>
        <t>Note that even if there is only one redirection candidate to choose from,
the server still needs to know when to not offer the redirection due to compatibility issues.</t>
      </section>
      <section anchor="comparison-to-discovery-using-resolver-names">
        <name>Comparison to Discovery Using Resolver Names</name>
        <t>Discovery Using Resolver Names as defined in <xref section="5" sectionFormat="of" target="RFC9462"/> describes
discovery of the encrypted DNS configuration for
a server using its domain name. The technical mechanism described there and EDSR are
the same in the context of on-wire behavior; they differ by how clients and servers
deploy them.</t>
        <t>For Discovery Using Resolver Names, servers are free to return whatever subset of 
valid configurations for the domain name provided by the client it wishes, such as
those it sees as valid for the client's apparent geolocation. In the case of EDSR,
servers are expected to only return configurations if it wants the client to be
redirected to another resolver. Servers implementing EDSR <bcp14>SHOULD</bcp14> only answer SVCB
queries for its own domain name in the EDSR context following its requirements.</t>
        <t>For Discovery Using Resolver Names, clients are querying for encrypted DNS
configurations available for a given server domain name. EDSR does not restrict
clients from issuing these queries whenever they want. However, clients ought
to consider that querying an encrypted DNS server for its own configuration that
supports EDSR (which is not inherently discoverable by the client) might only
return configuration it is ok with the client using to immediately reconnect.</t>
      </section>
    </section>
    <section anchor="seccon">
      <name>Security Considerations</name>
      <section anchor="trusting-the-redirected-connection">
        <name>Trusting the redirected connection</name>
        <t>EDSR does not provide novel authentication or security mechanisms. Redirection
is trusted by virtue of the server authentication via PKI through TLS <xref target="RFC5280"/>.
The DNS stub resolver implementing EDSR <bcp14>SHOULD</bcp14> use whatever policies it uses for
other TLS connections for encrypted DNS traffic to determine if a given TLS cert
chain is trustworthy before proceeding with EDSR.</t>
        <t>EDSR <bcp14>MUST NOT</bcp14> be used with encrypted DNS protocols that are not based on TLS.
This scenario will require future standards work.</t>
        <t>EDSR should not introduce any additional security considerations beyond use of
the original encrypted resolver prior to redirection. Because the original
connection was trusted, information sent over it about a new connection to use
should be as trusted. However, clients that wish to time bound vulnerabilities
to attackers who compromise the original resolver <bcp14>MAY</bcp14> choose to implement a
maximum TTL to honor on SVCB records that redirect to other servers.</t>
      </section>
      <section anchor="use-with-unencrypted-dns">
        <name>Use with unencrypted DNS</name>
        <t>EDSR <bcp14>MUST NOT</bcp14> be used to redirect unencrypted DNS traffic to any other resolver.
This use case is called "designation" and is covered by Discovery of Designated
Resolvers (DDR) as defined in <xref target="RFC9462"/>, specifically Section 4: "Discovery Using
Resolver IP Addresses". Not following that security guidance opens up a DNS client
to malicious redirection to an attacker-controlled DNS server. For more information,
see <xref section="7" sectionFormat="of" target="RFC9462"/>.</t>
        <t>EDSR also <bcp14>MUST NOT</bcp14> be used to redirect encrypted DNS traffic to a resolver that
advertises support for unencrypted DNS. This would reduce the security posture of
the client. Clients <bcp14>MUST NOT</bcp14> follow an encrypted DNS redirection and then send
unencrypted DNS traffic to the new resolver.</t>
      </section>
      <section anchor="use-with-ddr-discovery-from-ip-addresses">
        <name>Use with DDR discovery from IP addresses</name>
        <t>When a resolver is discovered using DDR's Discovery Using Resolver IP Addresses mechanism 
defined in <xref section="4" sectionFormat="of" target="RFC9462"/>, the server's identity used for
TLS purposes is its IP address, not its domain name. This means servers and clients
<bcp14>MUST</bcp14> use the original server's IP address, not the IP address of the previous server
in the event of redirection chains, in the SAN field of destination servers to
validate the redirection.</t>
        <t>The reason for this is due to an attack where the DDR SVCB query response is modified
by an active attacker to have a different domain name in its "dohpath" SVCB key. When
the client uses it to issue the EDSR query to the (valid) DDR-designated resolver, it
will innocently forward the query upstream and return the result. The result may even
be DNSSEC signed since it was issued by the valid owner of the attacker's domain name.
If this redirection is then followed and validated with the attacker's domain name, 
it will succeed and the client will have been maliciously redirected to use an attacker's
server at the low cost of a port 53 attack without breaking encryption or compromising
the encrypted DNS server DDR designated.</t>
        <t>There is no harm in using the name of the server for the EDSR query so long as the
validation of the destination server is performed using the original IP address and
not the name. This ensures EDSR clients can consistently use the domain name of a 
server for redirection discovery. Use of the DDR-defined SUDN "resolver.arpa" was
considered and rejected because this would conflate DDR configuration and EDSR
configuration by placing them in the same zone, using the same DNS record type.</t>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>A client <bcp14>MAY</bcp14> choose to not send other name queries until redirection is complete,
but there should be no privacy issue with sending queries to intermediate resolvers before
redirection takes place. This is because the intermediate resolvers are considered
to be appropriate destinations by the client even if the resolver wants to substitute
another resolver for reasons other than name resolution results such as latency
optimization or load balancing.</t>
    </section>
    <section anchor="data-flow-considerations">
      <name>Data Flow Considerations</name>
      <section anchor="data-scope">
        <name>Data Scope</name>
        <t>EDSR does not result in any additional data being shared by the end user, as the
DNS queries going to the new resolver were already going to go to the original
resolver.</t>
      </section>
      <section anchor="data-visibility">
        <name>Data Visibility</name>
        <t>EDSR results in a 1:1 replacement of DNS resolvers used (future queries sent to
the new resolver will not be sent to the original resolver anymore). This means the
number of servers which see any given query remain the same.</t>
        <t>This is only true if clients only use one redirected DNS server per original DNS
server. If the DNS server offers more than one redirection, and the client validates
and uses two or more of those redirections, then there will be greater data
visibility (more destinations). This is however entirely within the client's choice
following their own policy as a redundancy versus volume of exhausted data trade-off.</t>
        <t>EDSR requires the redirection to another server to also use encrypted DNS, so no
third-party will be introduced to the data flow unless the encryption is broken.</t>
      </section>
      <section anchor="data-centralization">
        <name>Data centralization</name>
        <t>EDSR can only increase data centralization if multiple resolver operators choose to
redirect DNS clients to the same, other DNS resolver. To prevent the reduction of
their resolution redundancy, DNS clients <bcp14>MAY</bcp14> choose to ignore redirections if they
find that they point to resolvers they are already configured to use, by a previous
redirection or some other configuration.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This draft has no IANA considerations.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC9462">
          <front>
            <title>Discovery of Designated Resolvers</title>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="E. Kinnear" initials="E." surname="Kinnear"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <author fullname="T. Jensen" initials="T." surname="Jensen"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document defines Discovery of Designated Resolvers (DDR), a set of mechanisms for DNS clients to use DNS records to discover a resolver's encrypted DNS configuration. An Encrypted DNS Resolver discovered in this manner is referred to as a "Designated Resolver". These mechanisms can be used to move from unencrypted DNS to encrypted DNS when only the IP address of a resolver is known. These mechanisms are designed to be limited to cases where Unencrypted DNS Resolvers and their Designated Resolvers are operated by the same entity or cooperating entities. It can also be used to discover support for encrypted DNS protocols when the name of an Encrypted DNS Resolver is known.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9462"/>
          <seriesInfo name="DOI" value="10.17487/RFC9462"/>
        </reference>
        <reference anchor="RFC9345">
          <front>
            <title>Delegated Credentials for TLS and DTLS</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="S. Iyengar" initials="S." surname="Iyengar"/>
            <author fullname="N. Sullivan" initials="N." surname="Sullivan"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>The organizational separation between operators of TLS and DTLS endpoints and the certification authority can create limitations. For example, the lifetime of certificates, how they may be used, and the algorithms they support are ultimately determined by the Certification Authority (CA). This document describes a mechanism to overcome some of these limitations by enabling operators to delegate their own credentials for use in TLS and DTLS without breaking compatibility with peers that do not support this specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9345"/>
          <seriesInfo name="DOI" value="10.17487/RFC9345"/>
        </reference>
        <reference anchor="RFC9461">
          <front>
            <title>Service Binding Mapping for DNS Servers</title>
            <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>The SVCB DNS resource record type expresses a bound collection of endpoint metadata, for use when establishing a connection to a named service. DNS itself can be such a service, when the server is identified by a domain name. This document provides the SVCB mapping for named DNS servers, allowing them to indicate support for encrypted transport protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9461"/>
          <seriesInfo name="DOI" value="10.17487/RFC9461"/>
        </reference>
        <reference anchor="RFC9460">
          <front>
            <title>Service Binding and Parameter Specification via the DNS (SVCB and HTTPS Resource Records)</title>
            <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
            <author fullname="M. Bishop" initials="M." surname="Bishop"/>
            <author fullname="E. Nygren" initials="E." surname="Nygren"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies the "SVCB" ("Service Binding") and "HTTPS" DNS resource record (RR) types to facilitate the lookup of information needed to make connections to network services, such as for HTTP origins. SVCB records allow a service to be provided from multiple alternative endpoints, each with associated parameters (such as transport protocol configuration), and are extensible to support future uses (such as keys for encrypting the TLS ClientHello). They also enable aliasing of apex domains, which is not possible with CNAME. The HTTPS RR is a variation of SVCB for use with HTTP (see RFC 9110, "HTTP Semantics"). By providing more information to the client before it attempts to establish a connection, these records offer potential benefits to both performance and privacy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9460"/>
          <seriesInfo name="DOI" value="10.17487/RFC9460"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9463">
          <front>
            <title>DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers (DNR)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="T. Reddy.K" initials="T." role="editor" surname="Reddy.K"/>
            <author fullname="D. Wing" initials="D." surname="Wing"/>
            <author fullname="N. Cook" initials="N." surname="Cook"/>
            <author fullname="T. Jensen" initials="T." surname="Jensen"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies new DHCP and IPv6 Router Advertisement options to discover encrypted DNS resolvers (e.g., DNS over HTTPS, DNS over TLS, and DNS over QUIC). Particularly, it allows a host to learn an Authentication Domain Name together with a list of IP addresses and a set of service parameters to reach such encrypted DNS resolvers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9463"/>
          <seriesInfo name="DOI" value="10.17487/RFC9463"/>
        </reference>
        <reference anchor="RFC9115">
          <front>
            <title>An Automatic Certificate Management Environment (ACME) Profile for Generating Delegated Certificates</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="D. López" initials="D." surname="López"/>
            <author fullname="A. Pastor Perales" initials="A." surname="Pastor Perales"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="September" year="2021"/>
            <abstract>
              <t>This document defines a profile of the Automatic Certificate Management Environment (ACME) protocol by which the holder of an identifier (e.g., a domain name) can allow a third party to obtain an X.509 certificate such that the certificate subject is the delegated identifier while the certified public key corresponds to a private key controlled by the third party. A primary use case is that of a Content Delivery Network (CDN), the third party, terminating TLS sessions on behalf of a content provider (the holder of a domain name). The presented mechanism allows the holder of the identifier to retain control over the delegation and revoke it at any time. Importantly, this mechanism does not require any modification to the deployed TLS clients and servers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9115"/>
          <seriesInfo name="DOI" value="10.17487/RFC9115"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
      </references>
    </references>
    <?line 438?>

<section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank the following individuals for their invaluable feedback
to this document: Andrew Campling, Ben Schwartz, Eric Orth, Erik Nygren, Manu Bretelle,
Ralph Weber, Ted Hardie, Tommy Pauly, Viktor Dukhovni, and Vittorio Bertola.</t>
    </section>
    <section anchor="appendix">
      <name>Appendix</name>
      <t>This document describes only one mode of redirection. Previous
versions of this draft defined an additional mode of redirection that allowed servers to 
redirect to servers that presented a different domain name than the original server. While
the scenario's validity has some interest, there is no consensus in the WG for how it can 
be addressed in an acceptably secure fashion.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
