<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.36 (Ruby 3.2.2) -->
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-dnsop-structured-dns-error-04" category="std" consensus="true" submissionType="IETF" updates="8914" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.4 -->
  <front>
    <title abbrev="Structured DNS Error">Structured Error Data for Filtered DNS</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-dnsop-structured-dns-error-04"/>
    <author fullname="Dan Wing">
      <organization abbrev="Citrix">Citrix Systems, Inc.</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>danwing@gmail.com</email>
      </address>
    </author>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Neil Cook">
      <organization>Open-Xchange</organization>
      <address>
        <postal>
          <country>United Kingdom</country>
        </postal>
        <email>neil.cook@noware.co.uk</email>
      </address>
    </author>
    <author fullname="Mohamed Boucadair">
      <organization>Orange</organization>
      <address>
        <postal>
          <street>Rennes</street>
          <code>35000</code>
          <country>France</country>
        </postal>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <date year="2023" month="July" day="05"/>
    <area>Internet</area>
    <workgroup>DNS Operations Working Group</workgroup>
    <keyword>Customer experience</keyword>
    <keyword>Informed decision</keyword>
    <keyword>transparency</keyword>
    <keyword>enriched feedback</keyword>
    <abstract>
      <?line 84?>

<t>DNS filtering is widely deployed for various reasons, including
network security. However, filtered DNS responses lack information
for end users to understand the reason for the filtering.
Existing mechanisms to provide explanatory details to end users cause harm
especially if the blocked DNS response is to an HTTPS server.</t>
      <t>This document updates RFC 8914 by signaling client support for structuring the EXTRA-TEXT field of
the Extended DNS Error to provide details on the DNS filtering. Such
details can be parsed by the client and displayed, logged, or used for
other purposes.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://ietf-wg-dnsop.github.io/draft-ietf-dnsop-structured-dns-error/draft-ietf-dnsop-structured-dns-error.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-dnsop-structured-dns-error/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        dnsop Working Group mailing list (<eref target="mailto:dnsop@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/dnsop/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/dnsop/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-wg-dnsop/draft-ietf-dnsop-structured-dns-error"/>.</t>
    </note>
  </front>
  <middle>
    <?line 97?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>DNS filters are deployed for a variety of reasons, e.g., endpoint
security, parental filtering, and filtering required by law
enforcement. Network-based security solutions such as firewalls and
Intrusion Prevention Systems (IPS) rely upon network traffic
inspection to implement perimeter-based security policies and operate
by filtering DNS responses. In a home network, DNS filtering is used for the
same reasons as above and additionally for parental control. Internet
Service Providers (ISPs) typically block access to some DNS domains due to a
requirement imposed by an external entity (e.g., law enforcement
agency) also performed using DNS-based content filtering.</t>
      <t>Users of DNS services that perform filtering may wish to receive more
explanatory information about such a filtering to resolve problems with the filter
-- for example to contact the administrator to allowlist a DNS domain that
was erroneously filtered or to understand the reason a particular
domain was filtered. With that information, a user can choose
another network, open a trouble ticket with the DNS administrator to
resolve erroneous filtering, log the information, or other uses.</t>
      <t>For the DNS filtering mechanisms described in <xref target="existing-techniques"/>, the DNS
server can return extended error codes Blocked, Filtered, or
Forged Answer defined in <xref section="4" sectionFormat="of" target="RFC8914"/>. However, these codes
only explain that filtering occurred but lack detail for the user to
diagnose erroneous filterings.</t>
      <t>No matter which type of response is generated (forged IP address(es),
NXDOMAIN or empty answer, even with an extended error code), the user
who triggered the DNS query has little chance to understand which
entity filtered the query, how to report a mistake in the filter, or
why the entity filtered it at all. This document describes a mechanism
to provide such detail.</t>
      <t>One of the other benefits of the approach described in this document is to eliminate the need to
"spoof" block pages for HTTPS resources. This is achieved since
clients implementing this approach would be able to display a
meaningful error message, and would not need to connect to such a
block page. This approach thus avoids the need to install a local root
certificate authority on those IT-managed devices.</t>
      <t>This document describes a format for computer-parsable data in the
EXTRA-TEXT field of <xref target="RFC8914"/>. It updates <xref section="2" sectionFormat="of" target="RFC8914"/> which
says the information in EXTRA-TEXT field is intended for human
consumption (not automated parsing).</t>
      <t>This document does not recommend DNS filtering but provides a
mechanism for better transparency to explain to the users why some DNS
queries are filtered.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document uses terms defined in DNS Terminology <xref target="RFC8499"/>.</t>
      <t>"Requestor" refers to the side that sends a request. "Responder"
refers to an authoritative, recursive resolver or other DNS component
that responds to questions.</t>
      <t>"Encrypted DNS" refers to any encrypted scheme to convey DNS messages,
for example, DNS-over-HTTPS <xref target="RFC8484"/>, DNS-over-TLS <xref target="RFC7858"/>, or
DNS-over-QUIC <xref target="RFC9250"/>.</t>
      <t>The document refers to an Extended DNS Error (EDE) using its purpose, not its
INFO-CODE as per Table 3 of <xref target="RFC8914"/>. "Forged Answer",
"Blocked", and "Filtered" are thus used to refer to "Forged Answer (4)",
"Blocked (15)", and "Filtered (17)".</t>
    </section>
    <section anchor="existing-techniques">
      <name>DNS Filtering Techniques and Their Limitations</name>
      <t>DNS responses can be filtered by sending a bogus (also called
"forged") A or AAAA response, NXDOMAIN error or empty answer. Also, clients can be informed that filtering has occured by sending an
Extended DNS Error code defined in <xref target="RFC8914"/>. Each of these
methods have advantages and disadvantages that are discussed below:</t>
      <ol spacing="normal" type="1"><li>
          <t>The DNS response is forged to provide a list of IP addresses that
points to an HTTP(S) server alerting the end user about the reason for
blocking access to the requested domain (e.g., malware). When an
HTTP(S) enabled domain name is blocked, the network security device
(e.g., Customer Premises Equipment (CPE) or firewall) presents a block page instead of the HTTP
response from the content provider hosting that domain. If an HTTP
enabled domain name is blocked, the network security device intercepts
the HTTP request and returns a block page over HTTP. If an HTTPS
enabled domain is blocked, the block page is also served over
HTTPS. In order to return a block page over HTTPS, man in the middle
(MITM) is enabled on endpoints by generating a local root certificate
and an accompanying (local) public/private key pair. The local root
certificate is installed on the endpoint while the network security
device stores a copy of the private key. During the TLS handshake,
the on-path network security device modifies the certificate provided by the
server and (re)signs it using the private key from the local root
certificate.  </t>
          <ul spacing="normal">
            <li>However, configuring the local root certificate on endpoints is
not a viable option in several deployments like home networks,
schools, Small Office/Home Office (SOHO), or Small/Medium
Enterprise (SME). In these cases, the typical behavior is that
the filtered DNS response points to a server that will display
the block page. If the client is using HTTPS (via a web browser or
another application) this results in a certificate validation
error which gives no information to the end-user about the reason
for the DNS filtering.</li>
            <li>Enterprise networks do not assume that all the connected devices
are managed by the IT team or Mobile Device Management (MDM)
devices, especially in the quite common Bring Your Own Device
(BYOD) scenario. In addition, the local root certificate cannot
be installed on IoT devices without a device management tool.</li>
            <li>An end user does not know why the connection was prevented and,
consequently, may repeatedly try to reach the domain but with no
success. Frustrated, the end user may switch to an alternate
network that offers no DNS filtering against malware and
phishing, potentially compromising both security and
privacy. Furthermore, certificate errors train users to click
through certificate errors, which is a bad security practice. To
eliminate the need for an end user to click through certificate
errors, an end user may manually install a local root certificate
on a host device. Doing so, however, is also a bad security
practice as it creates a security vulnerability that may be
exploited by a MITM attack. When a manually installed local root
certificate expires, the user has to (again) manually install the
new local root certificate.</li>
          </ul>
        </li>
        <li>The DNS response is forged to provide a NXDOMAIN response to cause
the DNS lookup to terminate in failure. In this case, an end user does
not know why the domain cannot be reached and may repeatedly try to
reach the domain but with no success. Frustrated, the end user may use
insecure connections to reach the domain, potentially compromising
both security and privacy.</li>
        <li>The extended error codes Blocked and Filtered defined in
<xref section="4" sectionFormat="of" target="RFC8914"/> can be returned by a DNS server to provide
additional information about the cause of a DNS error.</li>
        <li>These extended error codes do not suffer from the limitations
discussed in bullets (1) and (2), but the user still does not know the
exact reason nor he/she is aware of the exact entity blocking the
access to the domain. For example, a DNS server may block access to a
domain based on the content category such as "Malware" to protect the
endpoint from malicious software, "Phishing" to prevent the user from
revealing sensitive information to the attacker, etc. A user needs to
know the contact details of the IT/InfoSec team to raise a complaint.</li>
        <li>When a DNS resolver or forwarder forwards the received EDE option, the
EXTRA-TEXT field only conveys the source of the error (<xref section="3" sectionFormat="of" target="RFC8914"/>) and does not provide additional textual information about
the cause of the error.</li>
      </ol>
    </section>
    <section anchor="name-spec">
      <name>I-JSON in EXTRA-TEXT Field</name>
      <t>DNS servers that are compliant with this specification and have received an indication that the client also supports this specification as per <xref target="client-request"/> send I-JSON data in the EXTRA-TEXT field <xref target="RFC8914"/> using the Internet JSON (I-JSON)
message format <xref target="RFC7493"/>.</t>
      <ul empty="true">
        <li>
          <t>Note that <xref target="RFC7493"/> was based on <xref target="RFC7159"/>, but <xref target="RFC7159"/> was replaced by <xref target="RFC8259"/>.</t>
        </li>
      </ul>
      <t>This document defines the following JSON names:</t>
      <dl>
        <dt>c: (contact)</dt>
        <dd>
          <t>The contact details of the IT/InfoSec team to report mis-classified
DNS filtering. This field is structured as an array of contact URIs
(e.g., 'tel' <xref target="RFC3966"/>, 'sips' <xref target="RFC5630"/>, 'https' <xref target="RFC8615"/>). At least one contact URI <bcp14>MUST</bcp14> be
included. This field is mandatory.</t>
        </dd>
        <dt>j: (justification)</dt>
        <dd>
          <t>'UTF-8'-encoded <xref target="RFC5198"/> textual justification for this particular
DNS filtering. The field should be treated only as diagnostic
information for IT staff. This field is mandatory.</t>
        </dd>
        <dt>s: (suberror)</dt>
        <dd>
          <t>the suberror code for this particular DNS filtering. This field is optional.</t>
        </dd>
        <dt>o: (organization)</dt>
        <dd>
          <t>'UTF-8'-encoded human-friendly name of the organization that filtered this particular DNS query. This field is optional.</t>
        </dd>
      </dl>
      <t>New JSON names can be defined in the IANA registry introduced in <xref target="IANA-Names"/>. Such names <bcp14>MUST</bcp14>
consist only of lower-case ASCII characters, digits, and hyphens (that
is, Unicode characters U+0061 through 007A, U+0030 through U+0039, and
U+002D). Also, these names <bcp14>MUST</bcp14> be 63 characters or shorter and it is
<bcp14>RECOMMENDED</bcp14> they be as short as possible.</t>
      <t>The text in the "j" and "o" names can include international
characters. If the text is displayed in a language not known to the
end user, browser extensions to translate to user's native language
can be used.</t>
      <t>To reduce packet overhead the generated JSON <bcp14>SHOULD</bcp14> be as short as
possible: short domain names, concise text in the values for the "j"
and "o" names, and minified JSON (that is, without spaces or line
breaks between JSON elements).</t>
      <t>The JSON data can be parsed to display to the user, logged, or
otherwise used to assist the end-user or IT staff with troubleshooting
and diagnosing the cause of the DNS filtering.</t>
    </section>
    <section anchor="protocol-operation">
      <name>Protocol Operation</name>
      <section anchor="client-request">
        <name>Client Generating Request</name>
        <t>When generating a DNS query the client includes the EDE option (<xref section="2" sectionFormat="of" target="RFC8914"/>) in the OPT pseudo-RR <xref target="RFC6891"/> to
elicit the EDE option in the DNS response. It <bcp14>MUST</bcp14> use an
OPTION-LENGTH of 2, the INFO-CODE field set to "0"
(Other Error), and an empty EXTRA-TEXT field.  This signal indicates
that the client desires that the server responds in accordance with
the present specification.</t>
      </section>
      <section anchor="server-response">
        <name>Server Generating Response</name>
        <t>When the DNS server filters its DNS response to an A or AAAA record
query, the DNS response <bcp14>MAY</bcp14> contain an empty answer, NXDOMAIN, or (less
ideally) forged A or AAAA response, as desired by the DNS
server. In addition, if the query contained the OPT pseudo-RR the DNS
server <bcp14>MAY</bcp14> return more detail in the EXTRA-TEXT field as described in
<xref target="client-processing"/>.</t>
        <t>Servers may decide to return small TTL values in filtered DNS
responses (e.g., 2 seconds) to handle domain category and reputation
updates.</t>
        <t>Because the DNS client signals its EDE support (<xref target="client-request"/>)
and because EDE support is signaled via a non-cached OPT resource
record (<xref section="6.2.1" sectionFormat="of" target="RFC6891"/>) the EDE-aware DNS server can
tailor its filtered response to be most appropriate to that client's
EDE support.  If EDE support is signaled in the query as per <xref target="client-request"/>, the server <bcp14>MUST
NOT</bcp14> return the "Forged Answer" extended error code because the client
can take advantage of EDE's more sophisticated error reporting (e.g.,
"Filtered", "Blocked").  Continuing to send "Forged
Answer" even to an EDE-supporting client will cause the persistence of
the drawbacks described in <xref target="existing-techniques"/>.</t>
      </section>
      <section anchor="client-processing">
        <name>Client Processing Response</name>
        <t>On receipt of a DNS response with an EDE option from a
DNS responder, the following ordered actions are performed on the EXTRA-TEXT
field:</t>
        <ul spacing="normal">
          <li>Servers which don't support this specification might use plain text
in the EXTRA-TEXT field. Requestors <bcp14>SHOULD</bcp14> properly handle
both plaintext and JSON text in the EXTRA-TEXT field. The requestor verifies that
the field contains valid JSON. If not, the requestor <bcp14>MUST</bcp14> consider
the server does not support this specification and stop processing
rest of the actions defined in this section, but may instead choose
to treat EXTRA-TEXT as per <xref target="RFC8914"/>.</li>
          <li>The response <bcp14>MUST</bcp14> be received over an encrypted DNS channel. If not,
the requestor <bcp14>MUST</bcp14> discard data in the EXTRA-TEXT field.</li>
          <li>The DNS response <bcp14>MUST</bcp14> also contain an extended error code of
"Blocked by Upstream Server", "Blocked" or "Filtered" <xref target="RFC8914"/>, otherwise
the EXTRA-TEXT field is discarded.</li>
          <li>If either of the mandatory JSON names "c" and "j" are missing or
have empty values in the EXTRA-TEXT field, the entire JSON is
discarded.</li>
          <li>If a DNS client has enabled opportunistic privacy profile (<xref section="5" sectionFormat="of" target="RFC8310"/>) for DoT, the DNS client will either fall back to an
encrypted connection without authenticating the DNS server provided
by the local network or fall back to clear text DNS, and cannot
exchange encrypted DNS messages. Both of these fallback mechanisms
adversely impact security and privacy. If the DNS client has enabled
opportunistic privacy profile for DoT and the identity of the DNS server
cannot be verified but the connection is encrypted, the DNS client <bcp14>MUST</bcp14>
ignore the "c", "j", and "o" fields but <bcp14>MAY</bcp14> process the "s" field
and other parts of the response.</li>
          <li>Opportunistic discovery <xref target="I-D.ietf-add-ddr"/>, where only the IP address is
validated, the DNS client <bcp14>MUST</bcp14> ignore the "c", "j", and "o" fields
but <bcp14>MAY</bcp14> process the "s" field and other parts of the response.</li>
          <li>If a DNS client has enabled strict privacy profile (<xref section="5" sectionFormat="of" target="RFC8310"/>) for DoT, the DNS client requires an encrypted connection
and successful authentication of the DNS server. In doing so, this mitigates both
passive eavesdropping and client redirection (at the expense of
providing no DNS service if an encrypted, authenticated connection
is not available). If the DNS client has enabled strict privacy
profile for DoT, the DNS client <bcp14>MAY</bcp14> process the EXTRA-TEXT field of the
DNS response.</li>
          <li>When a forwarder receives an EDE option, whether or not (and how) to
pass along JSON information in the EXTRA-TEXT on to their client is
implementation dependent <xref target="RFC5625"/>. Implementations <bcp14>MAY</bcp14> choose to
not forward the JSON information, or they <bcp14>MAY</bcp14> choose to create a new
EDE option that conveys the information in the "c", "s", and "j"
fields encoded in the JSON object.</li>
          <li>The application that triggered the DNS request may have a local policy to override the contact information
 (e.g., redirect all complaint calls to a single contact point). In such a case, the content of the
 "c" attribute can be ignored.</li>
        </ul>
        <ul empty="true">
          <li>
            <t>Note that the strict and opportunistic privacy profiles as defined in <xref target="RFC8310"/> only apply to DoT; there has been
no such distinction made for DoH.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="new-sub-error-codes-definition">
      <name>New Sub-Error Codes Definition</name>
      <t>The document defines the following new IANA-registered Sub-Error codes.</t>
      <section anchor="policy-reserved">
        <name>Reserved</name>
        <ul spacing="normal">
          <li>Number: 0</li>
          <li>Meaning: Reserved. This sub-error code value <bcp14>MUST NOT</bcp14> be sent. If received, it has no meaning.</li>
          <li>Applicability: This code should never be used.</li>
          <li>Reference: This-Document</li>
          <li>Change Controller: IETF</li>
        </ul>
      </section>
      <section anchor="policy-network">
        <name>Network Operator Policy</name>
        <ul spacing="normal">
          <li>Number: 5</li>
          <li>Meaning: Network Operator Policy. The code indicates that the request was filtered according to policy determined by the operator of the local network.</li>
          <li>Applicability: Blocked</li>
          <li>Reference: This-Document</li>
          <li>Change Controller: IETF</li>
        </ul>
      </section>
      <section anchor="policy-dns">
        <name>DNS Operator Policy</name>
        <ul spacing="normal">
          <li>Number: 6</li>
          <li>Meaning: DNS Operator Policy. The code indicates that the request was filtered according to policy determined by the operator of the DNS server.</li>
          <li>Applicability: Blocked</li>
          <li>Reference:  This-Document</li>
          <li>Change Controller: IETF</li>
        </ul>
      </section>
    </section>
    <section anchor="extended-dns-error-code-tba1-blocked-by-upstream-dns-server">
      <name>Extended DNS Error Code TBA1 - Blocked by Upstream DNS Server</name>
      <t>The DNS server (e.g., a DNS forwarder) is unable to respond to the request
because the domain is on a blocklist due to an internal security policy
imposed by an upstream DNS server. This error code
is useful in deployments where a network-provided DNS forwarder
is configured to use an external resolver that filters malicious
domains. Typically, when the DNS forwarder receives a Blocked (15) error code from the upstream DNS server, it will replace it with "Blocked by Upstream DNS Server" (TBA1) before forwarding the reply to the DNS client.</t>
    </section>
    <section anchor="examples">
      <name>Examples</name>
      <t>An example showing the nameserver at 'ns.example.net' that filtered a
DNS "A" record query for 'example.org' is provided in <xref target="example-json"/>.</t>
      <figure anchor="example-json">
        <name>JSON Returned in EXTRA-TEXT Field of Extended DNS Error Response</name>
        <artwork><![CDATA[
{
  "c": [
    "tel:+358-555-1234567",
    "sips:bob@bobphone.example.com",
    "https://ticket.example.com?d=example.org&t=1650560748"
  ],
  "j": "malware present for 23 days",
  "s": 1,
  "o": "example.net Filtering Service"
}
]]></artwork>
      </figure>
      <t>In <xref target="example-json-minified"/> the same content is shown with minified JSON (no
whitespace, no blank lines) with <tt>'\'</tt> line wrapping per <xref target="RFC8792"/>.</t>
      <figure anchor="example-json-minified">
        <name>Minified Response</name>
        <artwork><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ===============

{"c":["tel:+358-555-1234567","sips:bob@bobphone.example.com","https\
://ticket.example.com?d=example.org&t=1650560748"],"j":"malware \
present for 23 days","s":1,"o":"example.net Filtering Service"}
]]></artwork>
      </figure>
    </section>
    <section anchor="security">
      <name>Security Considerations</name>
      <t>Security considerations in <xref section="6" sectionFormat="of" target="RFC8914"/> apply to this
document, except the guard against using EDE content to alter DNS protocol
processing. The guard is relaxed in the current specification as it mandates
encryption and recommends the use of an authenticated connection to the DNS
server, while <xref target="RFC8914"/> assumes that EDE information is unauthenticated
and sent over clear text.</t>
      <t>To minimize impact of active on-path attacks on the DNS channel, the
client validates the response as described in <xref target="client-processing"/>.</t>
      <t>A client might choose to display the information in the "c", "j", and
"o" fields if and only if the encrypted resolver has sufficient
reputation, according to some local policy (e.g. user configuration,
administrative configuration, or a built-in list of respectable
resolvers). This limits the ability of a malicious encrypted resolver
to cause harm. For example, an end user can use the details in the "c" field to contact an attacker
to solve the problem of being unable to reach a domain. The attacker can mislead the end user to
install malware or spyware to compromise the device security posture or mislead the end user to reveal
personal data.
If the client decides not to display all of the
information in the EXTRA-TEXT field, it can be logged for diagnostics
purpose and the client can only display the resolver hostname that
blocked the domain, error description for the EDE code and the
suberror description for the "s" field to the end-user.</t>
      <t>When displaying the free-form text of "j" and "o", the browser <bcp14>SHOULD
NOT</bcp14> make any of those elements into actionable (clickable) links and these
fields need to be rendered as text, not as HTML.</t>
      <t>An attacker might inject (or modify) the EDE EXTRA-TEXT field with a
DNS proxy or DNS forwarder that is unaware of EDE. Such a DNS proxy or
DNS forwarder will forward that attacker-controlled EDE option.  To
prevent such an attack, clients can be configured to process EDE from
explicitly configured DNS servers or utilize RESINFO
<xref target="I-D.ietf-add-resolver-info"/>.</t>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This document requests four IANA actions as described in the following subsections.</t>
      <ul empty="true">
        <li>
          <t>Note to the RFC Editor: Please replace RFCXXXX with the RFC number assigned to this document and "TBA1" with the value assigned by IANA.</t>
        </li>
      </ul>
      <section anchor="media-type-registration">
        <name>Media Type Registration</name>
        <t>This document requests IANA to register the
"application/json+structured-dns-error" media type in the "Media
Types" registry <xref target="IANA-MediaTypes"/>. This registration follows the
procedures specified in <xref target="RFC6838"/>:</t>
        <artwork><![CDATA[
   Type name: application

   Subtype name: json+structured-dns-error

   Required parameters: N/A

   Optional parameters: N/A

   Encoding considerations: as defined in Section 4 of RFCXXXX.

   Security considerations: See Section 10 of RFCXXXX.

   Interoperability considerations: N/A

   Published specification: RFCXXXX

   Applications that use this media type: Section 4 of RFCXXXX.

   Fragment identifier considerations: N/A

   Additional information: N/A

   Person & email address to contact for further information: IETF,
      iesg@ietf.org

   Intended usage: COMMON

   Restrictions on usage: none

   Author: See Authors' Addresses section.

   Change controller: IESG

   Provisional registration?  No
]]></artwork>
      </section>
      <section anchor="IANA-Names">
        <name>New Registry for JSON Names</name>
        <t>This document requests IANA to create a new registry, entitled "EXTRA-TEXT JSON Names"
under "Domain Name System (DNS) Parameters, Extended DNS Error Codes"
registry <xref target="IANA-DNS"/>. The registration request for a new JSON name must include the
following fields:</t>
        <dl>
          <dt>JSON Name:</dt>
          <dd>
            <t>Specifies the name of an attribute that is present in the JSON data enclosed in EXTRA-TEXT field. The name must follow the guidelines in <xref target="name-spec"/>.</t>
          </dd>
          <dt>Short description:</dt>
          <dd>
            <t>Includes a short description of the requested JSON name.</t>
          </dd>
          <dt>Mandatory (Y/N?):</dt>
          <dd>
            <t>Indicates whether this attribute is mandatory or optional.</t>
          </dd>
          <dt>Specification:</dt>
          <dd>
            <t>Provides a pointer to the reference document that specifies the attribute.</t>
          </dd>
        </dl>
        <t>The registry is initially populated with the following values:</t>
        <table anchor="reg-names">
          <name>Initial JSON Names Registry</name>
          <thead>
            <tr>
              <th align="center">JSON Name</th>
              <th align="left">Full JSON Name</th>
              <th align="left">Description</th>
              <th align="left">Mandatory</th>
              <th align="center">Specification</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="center">c</td>
              <td align="left">contact</td>
              <td align="left">The contact details of the IT/InfoSec team to report mis-classified DNS filtering</td>
              <td align="left">Y</td>
              <td align="center">
                <xref target="name-spec"/> of RFCXXXX</td>
            </tr>
            <tr>
              <td align="center">j</td>
              <td align="left">justification</td>
              <td align="left">UTF-8-encoded <xref target="RFC5198"/> textual justification for a particular DNS filtering</td>
              <td align="left">Y</td>
              <td align="center">
                <xref target="name-spec"/> of RFCXXXX</td>
            </tr>
            <tr>
              <td align="center">s</td>
              <td align="left">suberror</td>
              <td align="left">the suberror code for this particular DNS filtering</td>
              <td align="left">N</td>
              <td align="center">
                <xref target="name-spec"/> of RFCXXXX</td>
            </tr>
            <tr>
              <td align="center">o</td>
              <td align="left">organization</td>
              <td align="left">UTF-8-encoded human-friendly name of the organization that filtered this particular DNS query</td>
              <td align="left">N</td>
              <td align="center">
                <xref target="name-spec"/> of RFCXXXX</td>
            </tr>
          </tbody>
        </table>
        <t>New JSON names are registered via IETF Review (<xref section="4.8" sectionFormat="of" target="RFC8126"/>).</t>
      </section>
      <section anchor="new-registry-for-dns-suberror-codes">
        <name>New Registry for DNS SubError Codes</name>
        <t>This document requests IANA to create a new registry, entitled "SubError Codes"
under "Domain Name System (DNS) Parameters, Extended DNS Error Codes"
registry <xref target="IANA-DNS"/>. The registration request for a new suberror codes <bcp14>MUST</bcp14> include the
following fields:</t>
        <ul spacing="normal">
          <li>Number: Is the wire format suberror code (range 0-255).</li>
          <li>Meaning: Provides a short description of the sub-error.</li>
          <li>Applicability: Indicates which RFC8914 error codes apply to this sub-error code.</li>
          <li>Reference: Provides a pointer to an IETF-approved specification that registered
the code and/or an authoritative specification that describes the
meaning of this code.</li>
          <li>Change Controller: Indicates the person or entity, with contact information if appropriate.</li>
        </ul>
        <t>The SubError Code registry is initially be populated with the
following suberror codes:</t>
        <table anchor="reg">
          <name>Initial SubError Code Registry</name>
          <thead>
            <tr>
              <th align="center">Number</th>
              <th align="left">Meaning</th>
              <th align="left">RFC8914 error code applicability</th>
              <th align="left">Reference</th>
              <th align="center">Change Controller</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="center">0</td>
              <td align="left">Reserved</td>
              <td align="left">Not used</td>
              <td align="left">
                <xref target="policy-reserved"/> of this document</td>
              <td align="center">IETF</td>
            </tr>
            <tr>
              <td align="center">1</td>
              <td align="left">Malware</td>
              <td align="left">"Blocked", "Blocked by Upstream Server", "Filtered"</td>
              <td align="left">Section 5.5 of <xref target="RFC5901"/></td>
              <td align="center">IETF</td>
            </tr>
            <tr>
              <td align="center">2</td>
              <td align="left">Phishing</td>
              <td align="left">"Blocked", "Blocked by Upstream Server", "Filtered"</td>
              <td align="left">Section 5.5 of <xref target="RFC5901"/></td>
              <td align="center">IETF</td>
            </tr>
            <tr>
              <td align="center">3</td>
              <td align="left">Spam</td>
              <td align="left">"Blocked", "Blocked by Upstream Server", "Filtered"</td>
              <td align="left">Page 289 of <xref target="RFC4949"/></td>
              <td align="center">IETF</td>
            </tr>
            <tr>
              <td align="center">4</td>
              <td align="left">Spyware</td>
              <td align="left">"Blocked", "Blocked by Upstream Server", "Filtered"</td>
              <td align="left">Page 291 of <xref target="RFC4949"/></td>
              <td align="center">IETF</td>
            </tr>
            <tr>
              <td align="center">5</td>
              <td align="left">Network operator policy</td>
              <td align="left">"Blocked"</td>
              <td align="left">
                <xref target="policy-network"/> of this document</td>
              <td align="center">IETF</td>
            </tr>
            <tr>
              <td align="center">6</td>
              <td align="left">DNS operator policy</td>
              <td align="left">"Blocked"</td>
              <td align="left">
                <xref target="policy-dns"/> of this document</td>
              <td align="center">IETF</td>
            </tr>
          </tbody>
        </table>
        <t>New SubError Codes are registered via IETF Review (<xref section="4.8" sectionFormat="of" target="RFC8126"/>).</t>
      </section>
      <section anchor="new-extended-dns-error-code">
        <name>New Extended DNS Error Code</name>
        <t>IANA is requested to assign the following Extended DNS Error code from the "Domain Name System (DNS) Parameters, Extended DNS Error Codes"
registry <xref target="IANA-DNS"/>:</t>
        <table anchor="reg-ede">
          <name>New DNS Error Code</name>
          <thead>
            <tr>
              <th align="center">INFO-CODE</th>
              <th align="left">Purose</th>
              <th align="center">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="center">TBA1</td>
              <td align="left">Blocked by Upstream Server</td>
              <td align="center">RFCXXXX</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC8914">
          <front>
            <title>Extended DNS Errors</title>
            <author fullname="W. Kumari" initials="W." surname="Kumari"/>
            <author fullname="E. Hunt" initials="E." surname="Hunt"/>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="W. Hardaker" initials="W." surname="Hardaker"/>
            <author fullname="D. Lawrence" initials="D." surname="Lawrence"/>
            <date month="October" year="2020"/>
            <abstract>
              <t>This document defines an extensible method to return additional information about the cause of DNS errors.  Though created primarily to extend SERVFAIL to provide additional information about the cause of DNS and DNSSEC failures, the Extended DNS Errors option defined in this document allows all response types to contain extended error information.  Extended DNS Error information does not change the processing of RCODEs.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8914"/>
          <seriesInfo name="DOI" value="10.17487/RFC8914"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized.  This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC7493">
          <front>
            <title>The I-JSON Message Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="March" year="2015"/>
            <abstract>
              <t>I-JSON (short for "Internet JSON") is a restricted profile of JSON designed to maximize interoperability and increase confidence that software can process it successfully with predictable results.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7493"/>
          <seriesInfo name="DOI" value="10.17487/RFC7493"/>
        </reference>
        <reference anchor="RFC7159">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="March" year="2014"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7159"/>
          <seriesInfo name="DOI" value="10.17487/RFC7159"/>
        </reference>
        <reference anchor="RFC5198">
          <front>
            <title>Unicode Format for Network Interchange</title>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <author fullname="M. Padlipsky" initials="M." surname="Padlipsky"/>
            <date month="March" year="2008"/>
            <abstract>
              <t>The Internet today is in need of a standardized form for the transmission of internationalized "text" information, paralleling the specifications for the use of ASCII that date from the early days of the ARPANET.  This document specifies that format, using UTF-8 with normalization and specific line-ending sequences. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5198"/>
          <seriesInfo name="DOI" value="10.17487/RFC5198"/>
        </reference>
        <reference anchor="RFC6891">
          <front>
            <title>Extension Mechanisms for DNS (EDNS(0))</title>
            <author fullname="J. Damas" initials="J." surname="Damas"/>
            <author fullname="M. Graff" initials="M." surname="Graff"/>
            <author fullname="P. Vixie" initials="P." surname="Vixie"/>
            <date month="April" year="2013"/>
            <abstract>
              <t>The Domain Name System's wire protocol includes a number of fixed fields whose range has been or soon will be exhausted and does not allow requestors to advertise their capabilities to responders. This document describes backward-compatible mechanisms for allowing the protocol to grow.</t>
              <t>This document updates the Extension Mechanisms for DNS (EDNS(0)) specification (and obsoletes RFC 2671) based on feedback from deployment experience in several implementations. It also obsoletes RFC 2673 ("Binary Labels in the Domain Name System") and adds considerations on the use of extended labels in the DNS.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="75"/>
          <seriesInfo name="RFC" value="6891"/>
          <seriesInfo name="DOI" value="10.17487/RFC6891"/>
        </reference>
        <reference anchor="RFC8310">
          <front>
            <title>Usage Profiles for DNS over TLS and DNS over DTLS</title>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="D. Gillmor" initials="D." surname="Gillmor"/>
            <author fullname="T. Reddy" initials="T." surname="Reddy"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document discusses usage profiles, based on one or more authentication mechanisms, which can be used for DNS over Transport Layer Security (TLS) or Datagram TLS (DTLS).  These profiles can increase the privacy of DNS transactions compared to using only cleartext DNS.  This document also specifies new authentication mechanisms -- it describes several ways that a DNS client can use an authentication domain name to authenticate a (D)TLS connection to a DNS server.  Additionally, it defines (D)TLS protocol profiles for DNS clients and servers implementing DNS over (D)TLS.  This document updates RFC 7858.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8310"/>
          <seriesInfo name="DOI" value="10.17487/RFC8310"/>
        </reference>
        <reference anchor="RFC6838">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols.  This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="13"/>
          <seriesInfo name="RFC" value="6838"/>
          <seriesInfo name="DOI" value="10.17487/RFC6838"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC5901">
          <front>
            <title>Extensions to the IODEF-Document Class for Reporting Phishing</title>
            <author fullname="P. Cain" initials="P." surname="Cain"/>
            <author fullname="D. Jevans" initials="D." surname="Jevans"/>
            <date month="July" year="2010"/>
            <abstract>
              <t>This document extends the Incident Object Description Exchange Format (IODEF) defined in RFC 5070 to support the reporting of phishing events, which is a particular type of fraud.  These extensions are flexible enough to support information gleaned from activities throughout the entire electronic fraud cycle -- from receipt of the phishing lure to the disablement of the collection site.  Both simple reporting and complete forensic reporting are possible, as is consolidating multiple incidents. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5901"/>
          <seriesInfo name="DOI" value="10.17487/RFC5901"/>
        </reference>
        <reference anchor="RFC4949">
          <front>
            <title>Internet Security Glossary, Version 2</title>
            <author fullname="R. Shirey" initials="R." surname="Shirey"/>
            <date month="August" year="2007"/>
            <abstract>
              <t>This Glossary provides definitions, abbreviations, and explanations of terminology for information system security.  The 334 pages of entries offer recommendations to improve the comprehensibility of written material that is generated in the Internet Standards Process (RFC 2026).  The recommendations follow the principles that such writing should (a) use the same term or definition whenever the same concept is mentioned; (b) use terms in their plainest, dictionary sense; (c) use terms that are already well-established in open publications; and (d) avoid terms that either favor a particular vendor or favor a particular technology or mechanism over other, competing techniques that already exist or could be developed.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="FYI" value="36"/>
          <seriesInfo name="RFC" value="4949"/>
          <seriesInfo name="DOI" value="10.17487/RFC4949"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="IANA-MediaTypes" target="https://www.iana.org/assignments/media-types">
          <front>
            <title>Media Types</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="IANA-DNS" target="https://www.iana.org/assignments/dns-parameters/dns-parameters.xhtml#extended-dns-error-codes">
          <front>
            <title>Domain Name System (DNS) Parameters, Extended DNS Error Codes</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="RPZ" target="https://dnsrpz.info">
          <front>
            <title>Response Policy Zone</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="RFC8499">
          <front>
            <title>DNS Terminology</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="A. Sullivan" initials="A." surname="Sullivan"/>
            <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
            <date month="January" year="2019"/>
            <abstract>
              <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has sometimes changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
              <t>This document obsoletes RFC 7719 and updates RFC 2308.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="219"/>
          <seriesInfo name="RFC" value="8499"/>
          <seriesInfo name="DOI" value="10.17487/RFC8499"/>
        </reference>
        <reference anchor="RFC8484">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS.  Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="RFC7858">
          <front>
            <title>Specification for DNS over Transport Layer Security (TLS)</title>
            <author fullname="Z. Hu" initials="Z." surname="Hu"/>
            <author fullname="L. Zhu" initials="L." surname="Zhu"/>
            <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="D. Wessels" initials="D." surname="Wessels"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
              <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7858"/>
          <seriesInfo name="DOI" value="10.17487/RFC7858"/>
        </reference>
        <reference anchor="RFC9250">
          <front>
            <title>DNS over Dedicated QUIC Connections</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>This document describes the use of QUIC to provide transport confidentiality for DNS.  The encryption provided by QUIC has similar properties to those provided by TLS, while QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides more efficient packet-loss recovery than UDP.  DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC 7858, and latency characteristics similar to classic DNS over UDP.  This specification describes the use of DoQ as a general-purpose transport for DNS and includes the use of DoQ for stub to recursive, recursive to authoritative, and zone transfer scenarios.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9250"/>
          <seriesInfo name="DOI" value="10.17487/RFC9250"/>
        </reference>
        <reference anchor="RFC8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC3966">
          <front>
            <title>The tel URI for Telephone Numbers</title>
            <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
            <date month="December" year="2004"/>
            <abstract>
              <t>This document specifies the URI (Uniform Resource Identifier) scheme "tel".  The "tel" URI describes resources identified by telephone numbers.  This document obsoletes RFC 2806. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3966"/>
          <seriesInfo name="DOI" value="10.17487/RFC3966"/>
        </reference>
        <reference anchor="RFC5630">
          <front>
            <title>The Use of the SIPS URI Scheme in the Session Initiation Protocol (SIP)</title>
            <author fullname="F. Audet" initials="F." surname="Audet"/>
            <date month="October" year="2009"/>
            <abstract>
              <t>This document provides clarifications and guidelines concerning the use of the SIPS URI scheme in the Session Initiation Protocol (SIP).  It also makes normative changes to SIP. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5630"/>
          <seriesInfo name="DOI" value="10.17487/RFC5630"/>
        </reference>
        <reference anchor="RFC8615">
          <front>
            <title>Well-Known Uniform Resource Identifiers (URIs)</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <date month="May" year="2019"/>
            <abstract>
              <t>This memo defines a path prefix for "well-known locations", "/.well-known/", in selected Uniform Resource Identifier (URI) schemes.</t>
              <t>In doing so, it obsoletes RFC 5785 and updates the URI schemes defined in RFC 7230 to reserve that space. It also updates RFC 7595 to track URI schemes that support well-known URIs in their registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8615"/>
          <seriesInfo name="DOI" value="10.17487/RFC8615"/>
        </reference>
        <reference anchor="I-D.ietf-add-ddr">
          <front>
            <title>Discovery of Designated Resolvers</title>
            <author fullname="Tommy Pauly" initials="T." surname="Pauly">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Eric Kinnear" initials="E." surname="Kinnear">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Patrick McManus" initials="P." surname="McManus">
              <organization>Fastly</organization>
            </author>
            <author fullname="Tommy Jensen" initials="T." surname="Jensen">
              <organization>Microsoft</organization>
            </author>
            <date day="5" month="August" year="2022"/>
            <abstract>
              <t>   This document defines Discovery of Designated Resolvers (DDR), a
   mechanism for DNS clients to use DNS records to discover a resolver's
   encrypted DNS configuration.  An encrypted DNS resolver discovered in
   this manner is referred to as a "Designated Resolver".  This
   mechanism can be used to move from unencrypted DNS to encrypted DNS
   when only the IP address of a resolver is known.  This mechanism is
   designed to be limited to cases where unencrypted DNS resolvers and
   their designated resolvers are operated by the same entity or
   cooperating entities.  It can also be used to discover support for
   encrypted DNS protocols when the name of an encrypted DNS resolver is
   known.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-add-ddr-10"/>
        </reference>
        <reference anchor="RFC5625">
          <front>
            <title>DNS Proxy Implementation Guidelines</title>
            <author fullname="R. Bellis" initials="R." surname="Bellis"/>
            <date month="August" year="2009"/>
            <abstract>
              <t>This document provides guidelines for the implementation of DNS proxies, as found in broadband gateways and other similar network devices.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="152"/>
          <seriesInfo name="RFC" value="5625"/>
          <seriesInfo name="DOI" value="10.17487/RFC5625"/>
        </reference>
        <reference anchor="RFC8792">
          <front>
            <title>Handling Long Lines in Content of Internet-Drafts and RFCs</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="E. Auerswald" initials="E." surname="Auerswald"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <date month="June" year="2020"/>
            <abstract>
              <t>This document defines two strategies for handling long lines in width-bounded text content.  One strategy, called the "single backslash" strategy, is based on the historical use of a single backslash ('\') character to indicate where line-folding has occurred, with the continuation occurring with the first character that is not a space character (' ') on the next line.  The second strategy, called the "double backslash" strategy, extends the first strategy by adding a second backslash character to identify where the continuation begins and is thereby able to handle cases not supported by the first strategy.  Both strategies use a self-describing header enabling automated reconstitution of the original content.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8792"/>
          <seriesInfo name="DOI" value="10.17487/RFC8792"/>
        </reference>
        <reference anchor="I-D.ietf-add-resolver-info">
          <front>
            <title>DNS Resolver Information</title>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <date day="4" month="July" year="2023"/>
            <abstract>
              <t>   This document specifies a method for DNS resolvers to publish
   information about themselves.  DNS clients can use the resolver
   information to identify the capabilities of DNS resolvers.  How such
   an information is then used by DNS clients is out of the scope of the
   document.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-add-resolver-info-03"/>
        </reference>
      </references>
    </references>
    <?line 660?>

<section anchor="interoperation-with-rpz-servers">
      <name>Interoperation with RPZ Servers</name>
      <t>This appendix provides a non-normative guidance for operation with an Response Policy Zones (RPZ) server <xref target="RPZ"/> that
indicates filtering with a NXDOMAIN response with the Recursion
Available bit cleared (RA=0). This guidance is provided to ease interoperation with RPZ.</t>
      <t>When a DNS client supports this specification, it includes the
EDE option in its DNS query.</t>
      <t>If the server does not support this specification and is performing
RPZ filtering, the server ignores the EDE option in the DNS query and
replies with NXDOMAIN and RA=0. The DNS client can continue to accept
such responses.</t>
      <t>If the server does support this specification and is performing RPZ
filtering, the server can use the EDE option in the query to identify
an EDE-aware client and respond appropriately (that is, by generating
a response described in <xref target="server-response"/>) as NXDOMAIN and RA=0
are not necessary when generating a response to such a client.</t>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Thanks to Vittorio Bertola, Wes Hardaker, Ben Schwartz, Erid Orth,
Viktor Dukhovni, Warren Kumari, Paul Wouters, John Levine, and Bob
Harold for the comments.</t>
      <t>Thanks to Ralf Weber and Gianpaolo Scalone for sharing details about their implementation.</t>
      <t>Thanks Di Ma and Matt Brown for the DNS directorate reviews, and Joseph Salowey for the Security directorate review.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
