<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.2 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-add-resolver-info-07" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.2 -->
  <front>
    <title abbrev="DNS Resolver Information">DNS Resolver Information</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-add-resolver-info-07"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Mohamed Boucadair">
      <organization>Orange</organization>
      <address>
        <postal>
          <city>Rennes</city>
          <code>35000</code>
          <country>France</country>
        </postal>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <date year="2023" month="November" day="05"/>
    <area>Internet</area>
    <workgroup>ADD</workgroup>
    <keyword>Transparency</keyword>
    <keyword>User Experience</keyword>
    <keyword>DNS server selection</keyword>
    <abstract>
      <?line 50?>

<t>This document specifies a method for DNS resolvers to publish
   information about themselves.  DNS clients can use the resolver
   information to identify the capabilities of DNS resolvers. How such an information is then used by DNS clients is out of the scope of the document.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Adaptive DNS Discovery Working Group mailing list (add@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/add/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/boucadair/add-resolver-information"/>.</t>
    </note>
  </front>
  <middle>
    <?line 56?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Historically, DNS stub resolvers communicated with upstream
   resolvers without needing to know anything about the features
   supported by these recursive resolvers.  As more and more recursive
   resolvers expose different features that may impact delivered DNS
   services, means to help stub resolvers to identify the capabilities of
   resolvers are valuable.  Typically, stub resolvers can discover
   and authenticate encrypted DNS resolvers provided by a local network,
   for example, using the Discovery of Network-designated Resolvers (DNR) <xref target="I-D.ietf-add-dnr"/> and the Discovery of Designated Resolvers (DDR)
   <xref target="I-D.ietf-add-ddr"/>.  However, these stub resolvers need a mechanism to
   retrieve information from the discovered recursive resolvers about
   their capabilities.</t>
      <t>This document fills that void by specifying a method for stub
   resolvers to retrieve such information.  To that aim, a new resource record (RR) type
   is defined for stub resolvers to query the recursive resolvers.  The
   information that a resolver might want to expose is defined in
   <xref target="key-val"/>.</t>
      <t>Retrieved information can be used to feed the server selection
   procedure. However, that selection procedure is out of the scope of this document.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document makes use of the terms defined in <xref target="RFC8499"/>. The following additional terms are used:</t>
      <dl>
        <dt>Encrypted DNS:</dt>
        <dd>
          <t>Refers to a DNS scheme where DNS exchanges are
 transported over an encrypted channel between a DNS client and server (e.g.,
 DNS over HTTPS (DoH) <xref target="RFC8484"/>, DNS over TLS (DoT) <xref target="RFC7858"/>, or
 DNS over QUIC (DoQ) <xref target="RFC9250"/>).</t>
        </dd>
        <dt>Encrypted DNS resolver:</dt>
        <dd>
          <t>Refers to a DNS resolver that supports any encrypted DNS scheme.</t>
        </dd>
      </dl>
    </section>
    <section anchor="retreive">
      <name>Retrieving Resolver Information</name>
      <t>A stub resolver that wants to retrieve the resolver information may
   use the RR type "RESINFO" defined in this document.</t>
      <t>The content of the RDATA in a response to a RESINFO RR type query is defined in
   <xref target="key-val"/>.  If the resolver understands the RESINFO RR type, the
   RRSet in the Answer section <bcp14>MUST</bcp14> have exactly one record.</t>
      <t>A DNS client can retrieve the resolver information using the RESINFO
   RR type and the QNAME of the domain name that is used to authenticate the
   DNS resolver (referred to as the Authentication Domain Name (ADN) in <xref target="I-D.ietf-add-dnr"/>).</t>
      <t>If the Special-Use Domain Name "resolver.arpa", defined in
   <xref target="I-D.ietf-add-ddr"/>, is used to discover an encrypted DNS resolver, the
   client can retrieve the resolver information using the RESINFO RR
   type and QNAME of "resolver.arpa".  If a resolver supports DDR
   but does not support RESINFO, the client can receive a positive RESINFO
   response from a legitimate upstream DNS resolver or an attacker. While DNSSEC can be considered as a candidate mechanism
   to protect against the attack, it is important to note that DNSSEC protection is not possible with
   "resolver.arpa" due to the lack of uniqueness. To prevent such an attack,
   resolvers supporting DDR <bcp14>MUST</bcp14> convey the "sig" attribute as defined in <xref target="key-val"/>. DNS clients
   using DDR for encrypted resolver discovery querying for a RESINFO RR <bcp14>MUST</bcp14> validate the signature
   in the "sig" attribute for data origin authentication using the public key
   in the certificate, including ensuring that the certificate contains
   the IP address that DDR uses for validation as per <xref section="4.2" sectionFormat="of" target="I-D.ietf-add-ddr"/>.
   If the signature validation fails, the DNS client <bcp14>MUST</bcp14> reject the RESINFO RR.</t>
    </section>
    <section anchor="format">
      <name>Format of the Resolver Information</name>
      <t>The resolver information uses the same format as DNS TXT records.
   The motivation for using the same format as TXT records is to convey a
   small amount of useful information about a DNS resolver.  As a
   reminder, the format rules for TXT records are defined in
   the base DNS specification (<xref section="3.3.14" sectionFormat="of" target="RFC1035"/>) and further
   elaborated in the DNS-based Service Discovery (DNS-SD) specification
   (<xref section="6.1" sectionFormat="of" target="RFC6763"/>). The recommendations to limit the TXT record size are
   discussed in <xref section="6.1" sectionFormat="of" target="RFC6763"/>.</t>
      <t>Similar to DNS-SD, the RESINFO RR type uses "key/value" pairs to
   convey the resolver information.  Each "key/value" pair is encoded
   using the format rules defined in <xref section="6.3" sectionFormat="of" target="RFC6763"/>.  Using
   standardized "key/value" syntax within the RESINFO RR type makes it
   easier for future keys to be defined.  If a DNS client sees unknown
   keys in a RESINFO RR type, it <bcp14>MUST</bcp14> silently ignore them.  The same
   rules for the keys as those defined in <xref section="6.4" sectionFormat="of" target="RFC6763"/> <bcp14>MUST</bcp14>
   be followed for RESINFO.</t>
      <t>Keys <bcp14>MUST</bcp14> either be defined in the IANA registry (<xref target="key-reg"/>) or begin
   with the substring "temp-" for names defined for local use only.</t>
    </section>
    <section anchor="key-val">
      <name>Resolver Information Keys/Values</name>
      <t>The following resolver information keys are defined:</t>
      <dl>
        <dt>qnamemin:</dt>
        <dd>
          <t>If the DNS resolver supports QNAME minimisation <xref target="RFC9156"/>
 to improve DNS privacy, the key is present.  Note that, as per the
 rules for the keys defined in <xref section="6.4" sectionFormat="of" target="RFC6763"/>, if there
 is no '=' in a key, then it is a boolean attribute, simply
 identified as being present, with no value.
</t>
          <t>This is an optional attribute.</t>
        </dd>
        <dt>exterr:</dt>
        <dd>
          <t>If the DNS resolver supports extended DNS errors (EDE) option
 <xref target="RFC8914"/> to return additional information about the cause of DNS
 errors, the value of this key lists the possible extended DNS
 error codes that can be returned by this DNS resolver.  When
 multiple values are present, these values <bcp14>MUST</bcp14> be comma-separated.
</t>
          <t>This is an optional attribute.</t>
        </dd>
        <dt>infourl:</dt>
        <dd>
          <t>An URL that points to the generic unstructured resolver
 information (e.g., DoH APIs supported, possible HTTP status codes
 returned by the DoH server, how to report a problem) for
 troubleshooting purposes.
</t>
          <t>The server <bcp14>MUST</bcp14> support the content-type 'text/html'.  The DNS
 client <bcp14>MUST</bcp14> reject the URL if the scheme is not "https".  The URL
 <bcp14>SHOULD</bcp14> be treated only as diagnostic information for IT staff.  It
 is not intended for end user consumption as the URL can possibily
 provide misleading information.  A DNS client <bcp14>MAY</bcp14> choose to display
 the URL to the end user, if and only if the encrypted resolver has
 sufficient reputation, according to some local policy (e.g., user
 configuration, administrative configuration, or a built-in list of
 respectable resolvers).</t>
          <t>This is an optional attribute.  For example, a DoT server may
 not want to host an HTTPS server.</t>
        </dd>
        <dt>sig:</dt>
        <dd>
          <t>It contains the signature of the RESINFO RR excluding the "sig"  <br/>
attribute.  The signature is generated by the encrypted DNS
resolver using all of the attributes in the RESINFO RR except the "sig"    attribute.
The signature algorithm <bcp14>MUST</bcp14> be compatible with the public key in the DNS resolver's
end-entity certificate.  As a      reminder, the server's end-entity certificate's
public key will be compatible with the selected authentication algorithm from
the        client's "signature_algorithms" TLS extension (<xref section="4.4.2.2" sectionFormat="of" target="RFC8446"/>).
</t>
          <t>This is an optional attribute.</t>
        </dd>
      </dl>
      <t>New keys can be defined as per the procedure defined in <xref target="key-reg"/>.</t>
      <t><xref target="ex-1"/> shows an example of a published resolver information record:</t>
      <figure anchor="ex-1">
        <name>An Example of Resolver Information Record</name>
        <artwork align="center"><![CDATA[
resolver.example.net. 7200 IN RESINFO qnamemin exterr=15,16,17
                      infourl=https://resolver.example.com/guide
]]></artwork>
      </figure>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>To prevent DNS response forgery attacks, DNS clients using DNR <bcp14>MUST</bcp14> employ one of the following measures:</t>
      <ol spacing="normal" type="1"><li>
          <t>Establish an authenticated secure connection to the DNS resolver.</t>
        </li>
        <li>
          <t>Implement local DNSSEC validation (<xref section="10" sectionFormat="of" target="RFC8499"/>) to verify the authenticity of the resolver information.</t>
        </li>
      </ol>
      <t>In order to prevent DNS response forgery attacks, DNS clients using DDR <bcp14>MUST</bcp14> perform the validation explained in <xref target="retreive"/> for data origin authentication of RESINFO RR.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <ul empty="true">
        <li>
          <t>Note to the RFC Editor: Please update "RFCXXXX" occurences with the RFC number to be assigned to this document.</t>
        </li>
      </ul>
      <section anchor="resinfo-rr-type">
        <name>RESINFO RR Type</name>
        <t>This document requests IANA to update this entry from the
   "Resource Record (RR) TYPEs" registry of the "Domain Name System
   (DNS) Parameters" registry group available at <xref target="RRTYPE"/>:</t>
        <artwork><![CDATA[
Type: RESINFO
Value: 261
Meaning: Resolver Information as Key/Value Pairs
Reference: RFCXXXX
]]></artwork>
      </section>
      <section anchor="key-reg">
        <name>DNS Resolver Information Key Registration</name>
        <t>This document requests IANA to create a new registry entitled "DNS
   Resolver Information Keys" under the "Domain Name System (DNS) Parameters" registry group (<xref target="IANA-DNS"/>).  This new registry contains definitions of
   the keys that can be used to provide the resolver information.</t>
        <t>The registration procedure is Specification Required (<xref section="4.6" sectionFormat="of" target="RFC8126"/>).</t>
        <t>The structure of the registry is as follows:</t>
        <dl>
          <dt>Name:</dt>
          <dd>
            <t>The key name.  The name <bcp14>MUST</bcp14> conform to the definition in
 <xref target="format"/> of this document.  The IANA registry <bcp14>MUST NOT</bcp14> register names that begin
 with "temp-", so these names can be used freely by any
 implementer.</t>
          </dd>
          <dt>Value Type:</dt>
          <dd>
            <t>The type of the value to be used in the key.</t>
          </dd>
          <dt>Description:</dt>
          <dd>
            <t>A description of the registered key.</t>
          </dd>
          <dt>Specification:</dt>
          <dd>
            <t>The reference specification for the registered
 element.</t>
          </dd>
        </dl>
        <t>The initial content of this registry is provided in <xref target="initial"/>.</t>
        <table anchor="initial">
          <name>Initial RESINFO Registry</name>
          <thead>
            <tr>
              <th align="center">Name</th>
              <th align="center">Value Type</th>
              <th align="left">Description</th>
              <th align="center">Specification</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="center">qnamemin</td>
              <td align="center">None</td>
              <td align="left">The presence of the key name indicates that QNAME minimization is enabled</td>
              <td align="center">RFCXXXX</td>
            </tr>
            <tr>
              <td align="center">exterr</td>
              <td align="center">16-bit unsigned integer</td>
              <td align="left">Lists the set of supported extended DNS errors. It must be an INFO-CODE decimal value in the "Extended DNS Error Codes" registry.</td>
              <td align="center">RFCXXXX</td>
            </tr>
            <tr>
              <td align="center">infourl</td>
              <td align="center">string</td>
              <td align="left">Provides an URL that points to an unstructured resolver information that is used for troubleshooting</td>
              <td align="center">RFCXXXX</td>
            </tr>
            <tr>
              <td align="center">sig</td>
              <td align="center">binary</td>
              <td align="left">Includes a signature of RESINFO RR for data origin authentication</td>
              <td align="center">RFCXXXX</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.ietf-add-dnr">
          <front>
            <title>DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers (DNR)</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dan Wing" initials="D." surname="Wing">
              <organization>Citrix Systems, Inc.</organization>
            </author>
            <author fullname="Neil Cook" initials="N." surname="Cook">
              <organization>Open-Xchange</organization>
            </author>
            <author fullname="Tommy Jensen" initials="T." surname="Jensen">
              <organization>Microsoft</organization>
            </author>
            <date day="27" month="April" year="2023"/>
            <abstract>
              <t>   The document specifies new DHCP and IPv6 Router Advertisement options
   to discover encrypted DNS resolvers (e.g., DNS-over-HTTPS, DNS-over-
   TLS, DNS-over-QUIC).  Particularly, it allows a host to learn an
   authentication domain name together with a list of IP addresses and a
   set of service parameters to reach such encrypted DNS resolvers.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-add-dnr-16"/>
        </reference>
        <reference anchor="I-D.ietf-add-ddr">
          <front>
            <title>Discovery of Designated Resolvers</title>
            <author fullname="Tommy Pauly" initials="T." surname="Pauly">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Eric Kinnear" initials="E." surname="Kinnear">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Patrick McManus" initials="P." surname="McManus">
              <organization>Fastly</organization>
            </author>
            <author fullname="Tommy Jensen" initials="T." surname="Jensen">
              <organization>Microsoft</organization>
            </author>
            <date day="5" month="August" year="2022"/>
            <abstract>
              <t>   This document defines Discovery of Designated Resolvers (DDR), a
   mechanism for DNS clients to use DNS records to discover a resolver's
   encrypted DNS configuration.  An encrypted DNS resolver discovered in
   this manner is referred to as a "Designated Resolver".  This
   mechanism can be used to move from unencrypted DNS to encrypted DNS
   when only the IP address of a resolver is known.  This mechanism is
   designed to be limited to cases where unencrypted DNS resolvers and
   their designated resolvers are operated by the same entity or
   cooperating entities.  It can also be used to discover support for
   encrypted DNS protocols when the name of an encrypted DNS resolver is
   known.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-add-ddr-10"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC1035">
          <front>
            <title>Domain names - implementation and specification</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1035"/>
          <seriesInfo name="DOI" value="10.17487/RFC1035"/>
        </reference>
        <reference anchor="RFC6763">
          <front>
            <title>DNS-Based Service Discovery</title>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <author fullname="M. Krochmal" initials="M." surname="Krochmal"/>
            <date month="February" year="2013"/>
            <abstract>
              <t>This document specifies how DNS resource records are named and structured to facilitate service discovery. Given a type of service that a client is looking for, and a domain in which the client is looking for that service, this mechanism allows clients to discover a list of named instances of that desired service, using standard DNS queries. This mechanism is referred to as DNS-based Service Discovery, or DNS-SD.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6763"/>
          <seriesInfo name="DOI" value="10.17487/RFC6763"/>
        </reference>
        <reference anchor="RFC9156">
          <front>
            <title>DNS Query Name Minimisation to Improve Privacy</title>
            <author fullname="S. Bortzmeyer" initials="S." surname="Bortzmeyer"/>
            <author fullname="R. Dolmans" initials="R." surname="Dolmans"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="November" year="2021"/>
            <abstract>
              <t>This document describes a technique called "QNAME minimisation" to improve DNS privacy, where the DNS resolver no longer always sends the full original QNAME and original QTYPE to the upstream name server. This document obsoletes RFC 7816.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9156"/>
          <seriesInfo name="DOI" value="10.17487/RFC9156"/>
        </reference>
        <reference anchor="RFC8914">
          <front>
            <title>Extended DNS Errors</title>
            <author fullname="W. Kumari" initials="W." surname="Kumari"/>
            <author fullname="E. Hunt" initials="E." surname="Hunt"/>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="W. Hardaker" initials="W." surname="Hardaker"/>
            <author fullname="D. Lawrence" initials="D." surname="Lawrence"/>
            <date month="October" year="2020"/>
            <abstract>
              <t>This document defines an extensible method to return additional information about the cause of DNS errors. Though created primarily to extend SERVFAIL to provide additional information about the cause of DNS and DNSSEC failures, the Extended DNS Errors option defined in this document allows all response types to contain extended error information. Extended DNS Error information does not change the processing of RCODEs.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8914"/>
          <seriesInfo name="DOI" value="10.17487/RFC8914"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RRTYPE" target="https://www.iana.org/assignments/dns-parameters/dns-parameters.xhtml">
          <front>
            <title>Resource Record (RR) TYPEs</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="IANA-DNS" target="http://www.iana.org/assignments/dns-parameters/dns-parameters.xhtml#dns-parameters-4">
          <front>
            <title>Domain Name System (DNS) Parameters</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="RFC8499">
          <front>
            <title>DNS Terminology</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="A. Sullivan" initials="A." surname="Sullivan"/>
            <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
            <date month="January" year="2019"/>
            <abstract>
              <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has sometimes changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
              <t>This document obsoletes RFC 7719 and updates RFC 2308.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="219"/>
          <seriesInfo name="RFC" value="8499"/>
          <seriesInfo name="DOI" value="10.17487/RFC8499"/>
        </reference>
        <reference anchor="RFC8484">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="RFC7858">
          <front>
            <title>Specification for DNS over Transport Layer Security (TLS)</title>
            <author fullname="Z. Hu" initials="Z." surname="Hu"/>
            <author fullname="L. Zhu" initials="L." surname="Zhu"/>
            <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="D. Wessels" initials="D." surname="Wessels"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
              <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7858"/>
          <seriesInfo name="DOI" value="10.17487/RFC7858"/>
        </reference>
        <reference anchor="RFC9250">
          <front>
            <title>DNS over Dedicated QUIC Connections</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>This document describes the use of QUIC to provide transport confidentiality for DNS. The encryption provided by QUIC has similar properties to those provided by TLS, while QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides more efficient packet-loss recovery than UDP. DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC 7858, and latency characteristics similar to classic DNS over UDP. This specification describes the use of DoQ as a general-purpose transport for DNS and includes the use of DoQ for stub to recursive, recursive to authoritative, and zone transfer scenarios.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9250"/>
          <seriesInfo name="DOI" value="10.17487/RFC9250"/>
        </reference>
        <reference anchor="I-D.pp-add-resinfo">
          <front>
            <title>DNS Resolver Information Self-publication</title>
            <author fullname="Puneet Sood" initials="P." surname="Sood">
              <organization>Google</organization>
            </author>
            <author fullname="Paul E. Hoffman" initials="P. E." surname="Hoffman">
              <organization>ICANN</organization>
            </author>
            <date day="30" month="June" year="2020"/>
            <abstract>
              <t>   This document describes methods for DNS resolvers to self-publish
   information about themselves.  The information is returned as a JSON
   object.  The names in this object are defined in an IANA registry
   that allows for light-weight registration.  Applications and
   operating systems can use the methods defined here to get the
   information from resolvers in order to make choices about how to send
   future queries to those resolvers.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-pp-add-resinfo-02"/>
        </reference>
      </references>
    </references>
    <?line 291?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This specification leverages the work that has been documented in
   <xref target="I-D.pp-add-resinfo"/>.</t>
      <t>Thanks to Tommy Jensen, Vittorio Bertola, Vinny Parla, Chris Box, Ben
   Schwartz, Tony Finch, Daniel Kahn Gillmor, Eric Rescorla, Shashank
   Jain, Florian Obser, Richard Baldry, and Martin Thomson for the discussion and
   comments.</t>
      <t>Thanks to Mark Andrews, Joe Abley, Paul Wouters, Tim
   Wicinski, and Steffen Nurpmeso for the discussion on the RR
   formatting rules.</t>
      <t>Thanks to Tommy Jensen for the Shepherd review.</t>
      <t>Thanks to Johan Stenstam for the dns-dir review and Ray Bellis for the RRTYPE allocation review.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
