<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.23 (Ruby 3.1.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-add-resolver-info-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.16.0 -->
  <front>
    <title abbrev="DNS Resolver Information">DNS Resolver Information</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-add-resolver-info-01"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Mohamed Boucadair">
      <organization>Orange</organization>
      <address>
        <postal>
          <city>Rennes</city>
          <code>35000</code>
          <country>France</country>
        </postal>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <date year="2023" month="February" day="22"/>
    <area>Internet</area>
    <workgroup>ADD</workgroup>
    <keyword>Transparency</keyword>
    <keyword>User Experience</keyword>
    <keyword>DNS server selection</keyword>
    <abstract>
      <t>This document specifies a method for DNS resolvers to publish
   information about themselves.  DNS clients can use the resolver
   information to identify the capabilities of DNS resolvers. How such an information is then used by DNS clients is out of the scope of the document.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Adaptive DNS Discovery Working Group mailing list (add@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/add/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/boucadair/add-resolver-information"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Historically, DNS stub resolvers communicated with recursive
   resolvers without needing to know anything about the features
   supported by these recursive resolvers.  As more and more recursive
   resolvers expose different features that may impact delivered DNS
   services, means to help stub resolvers to identify the capabilities of
   resolvers are valuable.  Typically, stub resolvers can discover
   and authenticate encrypted DNS servers provided by a local network,
   for example, using the techniques specified in <xref target="I-D.ietf-add-dnr"/> and
   <xref target="I-D.ietf-add-ddr"/>.  However, these stub resolvers need a mechanism to
   retrieve information from the discovered recursive resolvers about
   their capabilities.</t>
      <t>This document fills that void by specifying a method for stub
   resolvers to retrieve such information.  To that aim, a new resource record (RR) type
   is defined for stub resolvers to query the recursive resolvers.  The
   information that a resolver might want to expose is defined in
   <xref target="key-val"/>.</t>
      <t>Retrieved information can be used to feed the server selection
   procedure. However, that selection procedure is out of scope.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <t>This document makes use of the terms defined in <xref target="RFC8499"/>.</t>
      <t>'Encrypted DNS' refers to a DNS scheme where DNS exchanges are
   transported over an encrypted channel between a DNS client and server (e.g., DNS-
   over-HTTPS (DoH) <xref target="RFC8484"/>, DNS-over-TLS (DoT) <xref target="RFC7858"/>, or DNS-
   over-QUIC (DoQ) <xref target="RFC9250"/>).</t>
    </section>
    <section anchor="retrieving-resolver-information">
      <name>Retrieving Resolver Information</name>
      <t>A stub resolver that wants to retrieve the resolver information may
   use the RR type "RESINFO" defined in this document.</t>
      <t>The content of the RDATA in a response to RR type query is defined in
   <xref target="key-val"/>.  If the resolver understands the RESINFO RR type, the
   RRSet in the Answer section <bcp14>MUST</bcp14> have exactly one record.</t>
      <t>A DNS client can retrieve the resolver information using the RESINFO
   RR type and QNAME of the domain name that is used to authenticate the
   DNS server (referred to as ADN in <xref target="I-D.ietf-add-dnr"/>).</t>
      <t>If the special use domain name "resolver.arpa" defined in
   <xref target="I-D.ietf-add-ddr"/> is used to discover the encrypted DNS server, the
   client can retrieve the resolver information using the RESINFO RR
   type and QNAME of the designated resolver.</t>
    </section>
    <section anchor="format">
      <name>Format of the Resolver Information</name>
      <t>The resolver information uses the same format as DNS TXT records.
   The intention of using the same format as TXT records is to convey a
   small amount of useful information about a DNS resolver.  As a
   reminder, the format rules for TXT records are defined in
   Section 3.3.14 of the DNS specification <xref target="RFC1035"/> and further
   elaborated in Section 6.1 of the DNS-based Service Discovery (DNS-SD)
   <xref target="RFC6763"/>.  The recommendations to limit the TXT record size are
   discussed in Section 6.2 of <xref target="RFC6763"/>.</t>
      <t>Similar to DNS-SD, the RESINFO RR type uses "key/value" pairs to
   convey the resolver information.  Each "key/value" pair is encoded
   using the format rules defined in Section 6.3 of <xref target="RFC6763"/>.  Using
   standardized "key/value" syntax within the RESINFO RR type makes it
   easier for future keys to be defined.  If a DNS client sees unknown
   keys in a RESINFO RR type, it <bcp14>MUST</bcp14> silently ignore them.  The same
   rules for the keys as those defined in Section 6.4 of <xref target="RFC6763"/> <bcp14>MUST</bcp14>
   be followed for RESINFO.</t>
      <t>Keys <bcp14>MUST</bcp14> either be defined in the IANA registry (<xref target="key-reg"/>) or begin
   with the substring "temp-" for names defined for local use only.</t>
    </section>
    <section anchor="key-val">
      <name>Resolver Information Keys/Values</name>
      <t>The following resolver information keys are defined:</t>
      <dl>
        <dt>qnamemin:</dt>
        <dd>
          <t>If the DNS resolver supports QNAME minimisation <xref target="RFC9156"/>
 to improve DNS privacy, the key is present.  Note that, as per the
 rules for the keys defined in Section 6.4 of <xref target="RFC6763"/>, if there
 is no '=' in a key, then it is a boolean attribute, simply
 identified as being present, with no value.
</t>
          <t>This is an optional attribute.</t>
        </dd>
        <dt>exterr:</dt>
        <dd>
          <t>If the DNS resolver supports extended DNS errors (EDE)
 <xref target="RFC8914"/> to return additional information about the cause of DNS
 errors, the value of this key lists the possible extended DNS
 error codes that can be returned by this DNS resolver.  When
 multiple values are present, these values <bcp14>MUST</bcp14> be comma-separated.
</t>
          <t>This is an optional attribute.</t>
        </dd>
        <dt>infourl:</dt>
        <dd>
          <t>An URL that points to the generic unstructured resolver
 information (e.g., DoH APIs supported, possible HTTP status codes
 returned by the DoH server, how to report a problem) for
 troubleshooting purpose.
</t>
          <t>The server <bcp14>MUST</bcp14> support the content-type 'text/html'.  The DNS
 client <bcp14>MUST</bcp14> reject the URL if the scheme is not "https".  The URL
 <bcp14>SHOULD</bcp14> be treated only as diagnostic information for IT staff.  It
 is not intended for end user consumption as the URL can possibily
 provide misleading information.  A DNS client <bcp14>MAY</bcp14> choose to display
 the URL to the end user, if and only if the encrypted resolver has
 sufficient reputation, according to some local policy (e.g., user
 configuration, administrative configuration, or a built-in list of
 respectable resolvers).</t>
          <t>This is a an optional attribute.  For example, a DoT server may
 not want to host an HTTPS server.</t>
        </dd>
      </dl>
      <t>New keys can be defined as per the procedure defined in <xref target="key-reg"/>.</t>
      <t><xref target="ex-1"/> shows an example of a published resolver information record:</t>
      <figure anchor="ex-1">
        <name>An Example of Resolver Information Record</name>
        <artwork align="center"><![CDATA[
resolver.example.net. 7200 IN RESINFO qnamemin exterr=15,16,17
                      resinfourl=https://resolver.example.com/guide
]]></artwork>
      </figure>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Unless a DNS request to retrieve the resolver information is
   encrypted (e.g., sent over DoT or DoH), the response is susceptible to forgery.  The
   DNS resolver information can be retrieved before or after the encrypted
   connection is established to the DNS server by using local
   DNSSEC validation.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <ul empty="true">
        <li>
          <t>Note to the RFC Editor: Please update "[RFCXXXX]" occurences with the RFC number to be assigned to this document.</t>
        </li>
      </ul>
      <section anchor="resinfo-rr-type">
        <name>RESINFO RR Type</name>
        <t>This document requests IANA to register a new value from the
   "Resource Record (RR) TYPEs" subregistry of the "Domain Name System
   (DNS) Parameters" registry available at <xref target="RRTYPE"/>:</t>
        <artwork><![CDATA[
Type: RESINFO
Value: TBD
Meaning: Resolver Information as Key/Value Pairs
Reference: [RFCXXXX]
]]></artwork>
      </section>
      <section anchor="key-reg">
        <name>DNS Resolver Information Key Registration</name>
        <t>This document requests IANA to create a new sub-registry entitled "DNS
   Resolver Information Keys" under the "Domain Name System (DNS) Parameters" registry (<xref target="IANA-DNS"/>).  This new registry contains definitions of
   the keys that can be used to provide the resolver information.</t>
        <t>The registration procedure is Specification Required (Section 4.6 of
   <xref target="RFC8126"/>).</t>
        <t>The structure of the registry is as follows:</t>
        <dl>
          <dt>Name:</dt>
          <dd>
            <t>The key name.  The name <bcp14>MUST</bcp14> conform to the definition in
 <xref target="format"/> of this document.  The IANA registry <bcp14>MUST NOT</bcp14> register names that begin
 with "temp-", so these names can be used freely by any
 implementer.</t>
          </dd>
          <dt>Value Type:</dt>
          <dd>
            <t>The type of the value to be used in the key.</t>
          </dd>
          <dt>Description:</dt>
          <dd>
            <t>A description of the registered key.</t>
          </dd>
          <dt>Specification:</dt>
          <dd>
            <t>The reference specification for the registered
 element.</t>
          </dd>
        </dl>
        <t>The initial content of this registry is provided in <xref target="initial"/>.</t>
        <table anchor="initial">
          <name>Initial RESINFO Registry</name>
          <thead>
            <tr>
              <th align="center">Name</th>
              <th align="center">Value Type</th>
              <th align="left">Description</th>
              <th align="center">Specification</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="center">qnamemin</td>
              <td align="center">boolean</td>
              <td align="left">Indicates whether 'qnameminimization' is enabled or not</td>
              <td align="center">[RFCXXXX]</td>
            </tr>
            <tr>
              <td align="center">exterr</td>
              <td align="center">number</td>
              <td align="left">Lists the set of extended DNS errors</td>
              <td align="center">[RFCXXXX]</td>
            </tr>
            <tr>
              <td align="center">infourl</td>
              <td align="center">string</td>
              <td align="left">Provides an unstructured resolver information that is used for troubleshooting</td>
              <td align="center">[RFCXXXX]</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC1035">
          <front>
            <title>Domain names - implementation and specification</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris">
              <organization/>
            </author>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System.  It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1035"/>
          <seriesInfo name="DOI" value="10.17487/RFC1035"/>
        </reference>
        <reference anchor="RFC6763">
          <front>
            <title>DNS-Based Service Discovery</title>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire">
              <organization/>
            </author>
            <author fullname="M. Krochmal" initials="M." surname="Krochmal">
              <organization/>
            </author>
            <date month="February" year="2013"/>
            <abstract>
              <t>This document specifies how DNS resource records are named and structured to facilitate service discovery.  Given a type of service that a client is looking for, and a domain in which the client is looking for that service, this mechanism allows clients to discover a list of named instances of that desired service, using standard DNS queries. This mechanism is referred to as DNS-based Service Discovery, or DNS-SD.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6763"/>
          <seriesInfo name="DOI" value="10.17487/RFC6763"/>
        </reference>
        <reference anchor="RFC9156">
          <front>
            <title>DNS Query Name Minimisation to Improve Privacy</title>
            <author fullname="S. Bortzmeyer" initials="S." surname="Bortzmeyer">
              <organization/>
            </author>
            <author fullname="R. Dolmans" initials="R." surname="Dolmans">
              <organization/>
            </author>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <date month="November" year="2021"/>
            <abstract>
              <t>This document describes a technique called "QNAME minimisation" to improve DNS privacy, where the DNS resolver no longer always sends the full original QNAME and original QTYPE to the upstream name server. This document obsoletes RFC 7816.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9156"/>
          <seriesInfo name="DOI" value="10.17487/RFC9156"/>
        </reference>
        <reference anchor="RFC8914">
          <front>
            <title>Extended DNS Errors</title>
            <author fullname="W. Kumari" initials="W." surname="Kumari">
              <organization/>
            </author>
            <author fullname="E. Hunt" initials="E." surname="Hunt">
              <organization/>
            </author>
            <author fullname="R. Arends" initials="R." surname="Arends">
              <organization/>
            </author>
            <author fullname="W. Hardaker" initials="W." surname="Hardaker">
              <organization/>
            </author>
            <author fullname="D. Lawrence" initials="D." surname="Lawrence">
              <organization/>
            </author>
            <date month="October" year="2020"/>
            <abstract>
              <t>This document defines an extensible method to return additional information about the cause of DNS errors. Though created primarily to extend SERVFAIL to provide additional information about the cause of DNS and DNSSEC failures, the Extended DNS Errors option defined in this document allows all response types to contain extended error information. Extended DNS Error information does not change the processing of RCODEs.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8914"/>
          <seriesInfo name="DOI" value="10.17487/RFC8914"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton">
              <organization/>
            </author>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <author fullname="T. Narten" initials="T." surname="Narten">
              <organization/>
            </author>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters.  To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper.  For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed.  This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RRTYPE" target="https://www.iana.org/assignments/dns-parameters/dns-parameters.xhtml">
          <front>
            <title>Resource Record (RR) TYPEs</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA-DNS" target="http://www.iana.org/assignments/dns-parameters/dns-parameters.xhtml#dns-parameters-4">
          <front>
            <title>Domain Name System (DNS) Parameters</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="I-D.ietf-add-dnr">
          <front>
            <title>DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers (DNR)</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dan Wing" initials="D." surname="Wing">
              <organization>Citrix Systems, Inc.</organization>
            </author>
            <author fullname="Neil Cook" initials="N." surname="Cook">
              <organization>Open-Xchange</organization>
            </author>
            <author fullname="Tommy Jensen" initials="T." surname="Jensen">
              <organization>Microsoft</organization>
            </author>
            <date day="13" month="August" year="2022"/>
            <abstract>
              <t>   The document specifies new DHCP and IPv6 Router Advertisement options
   to discover encrypted DNS resolvers (e.g., DNS-over-HTTPS, DNS-over-
   TLS, DNS-over-QUIC).  Particularly, it allows a host to learn an
   authentication domain name together with a list of IP addresses and a
   set of service parameters to reach such encrypted DNS resolvers.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-add-dnr-13"/>
        </reference>
        <reference anchor="I-D.ietf-add-ddr">
          <front>
            <title>Discovery of Designated Resolvers</title>
            <author fullname="Tommy Pauly" initials="T." surname="Pauly">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Eric Kinnear" initials="E." surname="Kinnear">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Patrick McManus" initials="P." surname="McManus">
              <organization>Fastly</organization>
            </author>
            <author fullname="Tommy Jensen" initials="T." surname="Jensen">
              <organization>Microsoft</organization>
            </author>
            <date day="5" month="August" year="2022"/>
            <abstract>
              <t>   This document defines Discovery of Designated Resolvers (DDR), a
   mechanism for DNS clients to use DNS records to discover a resolver's
   encrypted DNS configuration.  An encrypted DNS resolver discovered in
   this manner is referred to as a "Designated Resolver".  This
   mechanism can be used to move from unencrypted DNS to encrypted DNS
   when only the IP address of a resolver is known.  This mechanism is
   designed to be limited to cases where unencrypted DNS resolvers and
   their designated resolvers are operated by the same entity or
   cooperating entities.  It can also be used to discover support for
   encrypted DNS protocols when the name of an encrypted DNS resolver is
   known.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-add-ddr-10"/>
        </reference>
        <reference anchor="RFC8499">
          <front>
            <title>DNS Terminology</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <author fullname="A. Sullivan" initials="A." surname="Sullivan">
              <organization/>
            </author>
            <author fullname="K. Fujiwara" initials="K." surname="Fujiwara">
              <organization/>
            </author>
            <date month="January" year="2019"/>
            <abstract>
              <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs.  The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has sometimes changed in the decades since the DNS was first defined.  This document gives current definitions for many of the terms used in the DNS in a single document.</t>
              <t>This document obsoletes RFC 7719 and updates RFC 2308.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="219"/>
          <seriesInfo name="RFC" value="8499"/>
          <seriesInfo name="DOI" value="10.17487/RFC8499"/>
        </reference>
        <reference anchor="RFC8484">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <author fullname="P. McManus" initials="P." surname="McManus">
              <organization/>
            </author>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS.  Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="RFC7858">
          <front>
            <title>Specification for DNS over Transport Layer Security (TLS)</title>
            <author fullname="Z. Hu" initials="Z." surname="Hu">
              <organization/>
            </author>
            <author fullname="L. Zhu" initials="L." surname="Zhu">
              <organization/>
            </author>
            <author fullname="J. Heidemann" initials="J." surname="Heidemann">
              <organization/>
            </author>
            <author fullname="A. Mankin" initials="A." surname="Mankin">
              <organization/>
            </author>
            <author fullname="D. Wessels" initials="D." surname="Wessels">
              <organization/>
            </author>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <date month="May" year="2016"/>
            <abstract>
              <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS.  Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626.  In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
              <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group.  It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7858"/>
          <seriesInfo name="DOI" value="10.17487/RFC7858"/>
        </reference>
        <reference anchor="RFC9250">
          <front>
            <title>DNS over Dedicated QUIC Connections</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema">
              <organization/>
            </author>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson">
              <organization/>
            </author>
            <author fullname="A. Mankin" initials="A." surname="Mankin">
              <organization/>
            </author>
            <date month="May" year="2022"/>
            <abstract>
              <t>This document describes the use of QUIC to provide transport confidentiality for DNS. The encryption provided by QUIC has similar properties to those provided by TLS, while QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides more efficient packet-loss recovery than UDP. DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC 7858, and latency characteristics similar to classic DNS over UDP. This specification describes the use of DoQ as a general-purpose transport for DNS and includes the use of DoQ for stub to recursive, recursive to authoritative, and zone transfer scenarios.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9250"/>
          <seriesInfo name="DOI" value="10.17487/RFC9250"/>
        </reference>
        <reference anchor="I-D.pp-add-resinfo">
          <front>
            <title>DNS Resolver Information Self-publication</title>
            <author fullname="Puneet Sood" initials="P." surname="Sood">
              <organization>Google</organization>
            </author>
            <author fullname="Paul E. Hoffman" initials="P. E." surname="Hoffman">
              <organization>ICANN</organization>
            </author>
            <date day="30" month="June" year="2020"/>
            <abstract>
              <t>   This document describes methods for DNS resolvers to self-publish
   information about themselves.  The information is returned as a JSON
   object.  The names in this object are defined in an IANA registry
   that allows for light-weight registration.  Applications and
   operating systems can use the methods defined here to get the
   information from resolvers in order to make choices about how to send
   future queries to those resolvers.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-pp-add-resinfo-02"/>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This specification leverages the work that has been documented in
   <xref target="I-D.pp-add-resinfo"/>.</t>
      <t>Thanks to Tommy Jensen, Vittorio Bertola, Vinny Parla, Chris Box, Ben
   Schwartz, Tony Finch, Daniel Kahn Gillmor, Eric Rescorla, Shashank
   Jain, Florian Obser, and Richard Baldry for the discussion and
   comments.</t>
      <t>Thanks to Mark Andrews, Joe Abley, Paul Wouters, Tim
   Wicinski, and Steffen Nurpmeso for the discussion on the RR
   formatting rules.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA6Va23IbOZJ9r6/A0g+yNkja8rXNWM8Obclr9diym6Knp2Ni
HsAqkMSqblOoksy2td+y37JfticzgbpQVE9PjF7EKgKJvOfJBCeTSVTbOjUz
NTq9uFQL44r02lTqPF8XVaZrW+SjSK9Wlbn+zSWxrs2mqHYz5eokipIiznUG
qkml1/XEmno90UkyqfzmicXmyeOTyDWrzDoHGvWuxPrzs+W7KG+ylalmUQKi
sygucmdy17iZqqvGRGDkaaQro8HQeV6bKjf1KLopqqtNVTQl3s5PT0fRldnh
XTKL1EQtK527EnvyeEfPXxz4P/tamsrilaFXJBrekmDOpCYmsaJIN/W2qIhG
pPC3btJU5Fraqsl0atyNrqCSJNnxgqLa6Nz+ykqZqYviymp+HxdNXpN2zvPE
vzKZtulMXRV5Utvqjxt6nMZFdvesj8UW/xP1pmhinWhbHTjqEyTcmOFZ7/Au
9u9sjRcLk+fG+UUJKD99/vjx4z43mRw1XYWj/lgwYWYsysXe1zBKZIP16Ump
xWL5y+ezGdPyDkWO0lSxwYcYhlAPF4tjRauEg1a1yksD5cwv5kJBVxtTz9S2
rks3e/To5uZmanWup1j2SMNdNnlm8to9SnI3gV3BM/xg/3H6dVtnaQSKRHgC
Cw/4Oy0gc64usFpd7lxtMvUQa47V55bCP8Xov8jng+HLybMomkwmSq9cXem4
JjHUcmudQmw1RFW50sR2bY1TWmHTtkgUbMKeHOLMqbpQZbNKrdsSAdvFLCgX
Ta3qrcng8NfGTRVvjVNLLKtY56pxhha05PZJgLhNsNqud7wu1qVe2dTWxFSx
HrIyVe+LG+WaeKtAuk8GQmE3H5eo1W7ABr4jNkGMDnBxUZrwEBQxFU1lNklS
E0UPYG8EQJE0PojB9Hvr6qKysU7T3VhivW5WPTXBv7Mmt5TGEnVj6y2+i5vK
wb1pf7eQviOGcmMSm29IBVc55NL5rt7Si1atam103VQScK4py6KqRT586Ux3
QF9Fau4QhJUBvUQ+3MOH+VoWIJLY9dpU5A3hNFDXtcr0TtmshOOoxKTYXeFo
yM28IM3Z2LgxvAZ5kUTYmrTcV8k/MO6QHeRWda3TRq9SAymWuzIoe1/RsH1i
YUfvTiQnRRgdRNpXSMjVrqyFXZ+SnSqr4hrcsPq0SgsQhwlqyvpjIkOOb77q
rEzNGH7ElgHPtYm3uf17A45DtCRwPfXt23+eT06nbV1K8ur2lnghWne+TPAl
hIL7GjAz9vbbE4wcggMx3iIvuwz6ExXVKDIwct/h11WRiQt7TWDrAXcQXyIq
WGurgQWmBxLC2qapt/91YVlXIvWOHbOfJIj5oQVh7pZXDtIew2TRQghrm41B
Kjc3vJcTfNVL8FTGOU2AL7O2uenOGx4Go1Q7n10OBcJya+6kG2agXYWI32xr
daMhOgj6iOgdbHMxJ6DABM4JI7LSFl7MZECcHHNlJAeB2prMySlnHxSAArwx
Ngmibdp3CjDXruqW9DIYZ68pZ6ilqTKbF2mx2UURRFXgURFecWr08cvlcjSW
/+riE39enP305XxxdkqfL9/PP3xoP0R+xeX7T18+nHafup1vP338eHZxKpvx
Vg1eRaOP81/wDQXi6NPn5fmni/mHEQVJPXAuinDoZUWejAJVwlnI4V2UGBdX
diWB9ebt5//735NnUPq/Ld69fXJy8gpxJQ8/nLx8hocbhLqcVuTpzj9C0btI
l6UBmgIVZA5ydlvrFFlKI3i3xU2OLFWR+v79r6SZv83Uf6zi8uTZH/wLEnjw
Muhs8JJ1dvfNnc2ixAOvDhzTanPwfk/TQ37nvwyeg957Lw/Ed6avkMioKPsK
CDtkfXen1EWafvbqVXD2o7N+Pj1C8Kx9AGpJsDEAgCEzwL70wnylBLYxnNM5
9zB4luJFuYqqd5ekaXFuUvhFfWNQw3WverOVffw8NNPNlEsvw1siNHm/XH6+
BOgq3h+3nP8AH5FlvGT5gRcsw4KXPzz/gRYIzulIwdJvaeFPYeGrJ88f394e
c7T5gKckeKh7YT3NhylKwplSyzAz9tHQIH2g4BKZgJgWC86EFH6X5xfvPo36
VhoEVkjkKLBogkhr3riL0/lyztFAJ5bUBRErgbLkz9/MdgBC6yHHTZ7A+jXs
4uQM4S4Q5UDkFLm4NLWwatQ8dzecASWzcaxtNZSBghvXiOEiDzVg6nXZ8wHK
q/9YfV3J9iwJFyIqudFPF/OPZx3yY+hO7ZEYyro2cQ/AhBen19w95ACo/Fqn
5qcX9wKCYxHHK5FLKWAHmbjPwCgINNVVqUd37HEATPT5DRCAzzgEflqj/GsK
hTY5mg8r1FCvwuC3lYbr1Dsm2LrkgehR3x7I59vWke9hyIjPOVKavCcDkKDL
vyy9AwHXeCKWg4F24vBOmr3dvZ3cRhQURdeopdxku4wqic6oIxYyBm31gS5I
D1oVgeFa8BHKdOKNEM6tGjT+DGv6x1OBHNr+0kfM0+nTKWqiVyJbVsBo7DXI
9fHk8dPnAkLR+1dYyfjYpOCwYsvA4QLFF9OTHrnJSpMzXQquV6feo3bcz04u
T4/FEemQFy9fPOXMIHaitsfkCbPB2kttZqV76URTzv5qQjUgd22c22fnCbEz
OIK94RLkUtR0UBZWxofSjvjGCInrEfUQZqRKbblIsduLQe/zdMhypgFX97eT
OyCcCjQNkpiDBw2M2MvKnTBP7wij1Bfazz5F2VNXCXSSDA51u7zWX7lB9Ilz
X0yp35YRvdHOQhByonVDjRshQOcRludKEvigojpDCCCnlpNdjDdxjbiTymFH
TtXOptiJNI0Ip4aSOn7vABRM7OWtQ9dbz4imYOUO85CGnu1riI8iUitScJoC
FQvw92yJO/yJKDNTxpKD92QNxYZGK7DzBg07ObCUMzwjG1PRX+EbFpx7dE4I
DU1IyLij2mTlZMTHUmYediDSMzJ4Au6U7HYwnxGTj/5MNnXIbaGatslNpKPz
DqY5UV6XCma88e/EDzIJT5FmoaL0c06YEDifmLEYseP6CeLVyfMXt7d+DkXd
eUZdsZApK3ut4904GJC8HxDdEcBQ6qKopVAymC6l2HhCB2z/+0wOD2MxqkAJ
R+aFOnp9JA4JUmOZ61gu0FqtiiI1qF66hsFWTQ0ndRAi3QUCMm6w3FfA1KRk
L8RYDA76HG3iTgEgE3GUiZI4hY1b8rLKfAVMrn6P5mllnvjiiz0FctDDs9Oz
Y3+Y72NenVAfI6iwqSBOklh/9MH5Giq2x+x+AENMMXUxF0sk6RySkPFSeL8U
S7S0zq5SM+CtT4Mnub7p9y2ssBVGTdbt17afYRNPImvS2pap50Ect9W4jDn8
Nxy1K8ODMj1xhiaVKEr/jCFIOU2VekvMc/Vl8UEYLwvrgTbJvDG5qWyMNIfA
bmJKjh0sCa7SU3RoLYr3av753HWztnGnPmo1KHXXjRONBe8f6MowkQC70HOK
lYka3BfRBlLZMQVLiMKqaPAO7WlRs7c2FQ0helppBwiSi4U18QqB+xMuDUc1
DPyI5sBHPjd3dvapnwlU5r8RkbyftGfDWJSbOA7AWo14bD7ydLDM0/H9K4xY
V4YRBXfgCLXEatQGB9A8HFPBvc6XpLb1mmpR3Q/0WhBa4tMrPlFyJX/MXZOV
EgKu5ZR8U6xh23j3Qz3kOoe8wOPUYWEfNBLomdFtFoW0QcAhZaoDpXCK96DA
DKeodtTgldVh7DYDbHXwB9esAcv4PNi9qZkTZM2YgJCf97oCupZyUhapjXfB
A+nIYLMiX9tNU4X9CeVzmuTThcn+t1AfkmNj03qCzEnB7+er7KCEFWuaq3bj
seO7YXdP4DGC7yajwBLFMnhk1qqPrBnGaCj61Lgrac5lqRx3YW6kPvg8E8pE
V1J6U6/BUKKt4ULo2zfzdXKCHEpjHU4ZnkFKgjrcV/QN1PdKAaWoq/+Dv6jN
a57ENDeoeC+fPH6szi9aUBTqry8Gr0+ej09ejE9eevn3/0DUJ6vX4QrqzjlI
hI82DdxX+Pg2Uw9IKrlden2E9HbWCXUQaMi92BGSLs+xJzoFQns9ig3N10ZA
HARRLmk4auudeou4wmniM471+CVH6nFt80Jj7vr3TSss+3sXCd6BHY8faDG5
Cc1YivfH40BGRhCWEqyLDXyNfJJGpUW1QbfRzWwH1fXAjLVqB7ArsyZISgGw
rvd7YA/+cw9BCM87CgTxDR/qvdYeKVxQPsemZ+Ty7C2VMCs9jsA+xpj7+vyD
R0lCFnVenaGsF9VMfUZyguBNSffRavRXfPcX/P1tpIoYxqEbZNfhUdopF9ge
zMs9YOB4OPl5QCC0A+5LGp7fnft50zphnA1M+JhGcTyIFwARLhVo/+j+y9cR
IeYWYPsmcnT3MpTI7N+Hjjpkrq81OjvyANTvb9/k/vf2NoTlkm/zwyyH0fRM
Ld+cRh8BAGGj2eGQQCoB/Bb0jXPRBEYLwxdcMfa3mpczSHv3/SKByOCLjc+5
PKYIWej3aDjmCun1C4VNWsEJoiLCE/41hFwn3NNEjGTcdp+Cf0u76HvCnTWN
oTy7cunilxB8AEWP1q108FI2WiDfR4Vh3hSK7r39dG+M01Pf4D7jcjC+WEB5
ljDaw9AtPJu+8KyE0f+TF+04jTFRAHbBAVuxLLee0mQ5aZ5IZx40hpsSSuce
3/AMjrERVVVIEUK404sfxzA7flZ12+LtNhqF3LD/DPcKXcRJY8mKbXtR5dtR
34AijxYePMvqvgXWlTHAInSNmbd9D5WJjNO+qEj8n2Ook5txoleXRLzkl8Z1
3TN0IxRO+VKG8UDA2yrp3g3VzveP7daBcXvnVyEQ96ZXoXXsaIX+RITqrM7m
ADwZDLphgr7x24teBg5+BwOH6LtEj1LfewrCQ09WPA1983v0fTbhv1n4cOdh
Mhk+4Vuc1UKG723f+p1/vkODZUcXJjzBOArr0K3Lj3GOZPJEuTGhykbg6nuX
u4glD0NYFF8r8OlD2/U5w8o51I+qAS3F1DxWoa/8KASfPosiGV4d7KTuXq2G
qTRbdK+z2TuWDibIE0zqUc+5f2xrmrfs0a38RmOl4ysqwfOYJlhQ0IZ/HwNS
ogaTvB6tderMqJelh+6W0nWr3vhhMgEnYX7LIwOTtwG9P4Ivy/ATNBI8YNHl
VudX3Hou0dnu1I+Gfm02Vn+2Nf1ipFBvTFUXqaY3eb6jdE0Pb7cVOHtTfB1j
gQx74+0NkNyvYxDCunc2j7doSlHtTKr+pLe5+i+bplmBpuSMuluUDVRmonUJ
1okLovIjUvpYvUtxNOz2acVNDHUwCxtvNQr5G50miJQQdH4cy7Uz94gpY53u
i/dRQ1PzPKnMjRurHwuj5rDvbgyJmlT9XDRUgsC85cr/M5qg3F1ZOfyyNus1
VHuB9hYJrTh0fOFnngv/cww4FjsOz5em0f8DOH8JW2ooAAA=

-->

</rfc>
