<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-jaked-cared-00" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.2 -->
  <front>
    <title abbrev="CARED">Client Authentication Recommendations for Encrypted DNS</title>
    <seriesInfo name="Internet-Draft" value="draft-jaked-cared-00"/>
    <author fullname="Tommy Jensen">
      <organization>Microsoft</organization>
      <address>
        <email>tojens.ietf@gmail.com</email>
      </address>
    </author>
    <author fullname="Jessica Krynitsky">
      <organization>Microsoft</organization>
      <address>
        <email>jess.krynitsky@microsoft.com</email>
      </address>
    </author>
    <author fullname="Jeffrey Damick">
      <organization>Amazon</organization>
      <address>
        <email>jdamick@amazon.com</email>
      </address>
    </author>
    <author fullname="Matt Engskow">
      <organization>Amazon</organization>
      <address>
        <email>mengskow@amazon.com</email>
      </address>
    </author>
    <author fullname="Joe Abley">
      <organization>Cloudflare</organization>
      <address>
        <email>jabley@cloudflare.com</email>
      </address>
    </author>
    <date year="2024" month="October" day="20"/>
    <keyword>DNS</keyword>
    <keyword>encrypted DNS</keyword>
    <keyword>authentication</keyword>
    <keyword>client authentication</keyword>
    <keyword>mTLS</keyword>
    <abstract>
      <?line 50?>

<t>Some encrypted DNS clients require anonymity from their encrypted
DNS servers to prevent third parties from correlating client DNS
queries with other data for surveillance or data mining purposes.
However, there are cases where the client and server have a
pre-existing relationship and each wants to prove its identity to
the other.  For example, an encrypted DNS server may only wish to
accept queries from encrypted DNS clients that are managed by the
same enterprise, and an encrypted DNS client may need to confirm
the identity of the encrypted DNS server it is communicating with.
This requires mutual authentication.</t>
      <t>This document discusses the circumstances under which client
authentication is appropriate to use with encrypted DNS, the benefits
and limitations of doing so, and recommends authentication mechanisms
to be used when communicating with TLS-based encrypted DNS protocols.</t>
    </abstract>
  </front>
  <middle>
    <?line 68?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>There are times when a client needs to authenticate itself before
it can be authorised to use a DNS server. One example is when an
encrypted DNS server only accepts connections from pre-approved
clients, such as an encrypted DNS service provided by an enterprise
for its remote employees.  Encrypted DNS clients trying to connect
to such a server might experience refused connections if they did
not provide authentication that allows the enterprise's server to
authorise its use.</t>
      <t>This is different from general use of encrypted DNS by anonymous
clients to public DNS resolvers, where it is bad practice for the
client to provide any kind of identifying information to the server.
For example, Section 8.2 of <xref target="RFC8484"/> discourages use of HTTP
cookies with DNS-over-HTTPS (DoH). This ensures that clients provide
a minimal amount of identifiable or correlatable information to
servers that do not need to know anything about the client in order
to provide name resolution.</t>
      <t>Because of the significant difference in these scenarios, it is
important to define the situations in which interoperable encrypted
DNS clients can use client authentication without compromising the
privacy provided by encrypted DNS in the first place. Even then,
it is important to recognize what value client authentication
provides to encrypted DNS clients versus encrypted DNS servers in
the context of both connection management and DNS resolution utility.
This document discusses these topics and recommends best practice
for authentication.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>Encrypted DNS server: a recursive DNS resolver that implements one
or more encrypted DNS protocols, such as those defined in <xref target="RFC9499"/>
(DNS-over-TLS, DNS-over-HTTPS, DNS-over-QUIC).</t>
      <t>Protective DNS server: a policy-implementing, recursive DNS resolver
service that filters DNS queries to prevent resolution for known
malicious domains and/or IP addresses. Protective DNS servers support
DNS technologies including encrypted DNS protocol support (DoH/DoT)
and IPv6 resolution.</t>
      <t>Other terminology related to the DNS is used in this document as
defined in <xref target="RFC9499"/>.</t>
    </section>
    <section anchor="benefits-of-client-authentication-with-encrypted-dns">
      <name>Benefits of client authentication with encrypted DNS</name>
      <t>Strong identification of encrypted DNS clients by the encrypted DNS
server allows the DNS server to apply client-specific resolution
policies in a securely-verifiable way. Today, a common practice is
to establish client-specific resolution policies that are applied
on behalf of particular clients based on their observed IP address.
This is not only an insecure method that cannot account for clients
sending requests through middleboxes, but it can only be used when
expected IP addresses are known in advance. This is not practical
for enterprises with remote employees without introducing a dependency
on tunneling DNS traffic to a managed gateway or proxy whose IP
address is known. This in turn forces enterprises to choose between
running proxy or gateway infrastructure per client (or at least
per-client IP address mappings) or losing client identification.</t>
      <t>Strong identification of encrypted DNS clients by the encrypted DNS
server also brings identification up to the application layer, which
insulates the mechanism used for identity management from network
topology changes and allows the sense of client identity in the
server to persist despite client IP address changes.</t>
    </section>
    <section anchor="drawbacks-of-client-authentication-with-encrypted-dns">
      <name>Drawbacks of client authentication with encrypted DNS</name>
      <t>While there are benefits in using client authentication with encrypted
DNS in limited circumstances, authentication has drawbacks that
make it inappropriate in many other cases. For example, client
authentication is generally considered to be bad practice in uses
of encrypted DNS that are motivated by client anonyminity, since
it allows a full history of resolution requests to be associated
confidently with the identity of an individual client. This is
unacceptable practice.</t>
      <t>Public DNS servers generally implement allowlists and blocklists at the
IP layer as part of a layered defence against abuse; IP-layer access
control allows unwanted traffic to be discarded early and helps
mitigate unwanted server load. Public encrypted DNS servers with
the additional requirement to permit authenticated clients makes
it impossible to drop unwanted traffic early based on source IP
address, which increases the cost of mitigation and adds complexity
that may introduce additional attack vectors.</t>
    </section>
    <section anchor="when-to-use-client-authentication-with-encrypted-dns">
      <name>When to use client authentication with encrypted DNS</name>
      <t>Encrypted DNS servers that provide resolution using transport
protocols that incorporate TLS or dTLS such as DoH <xref target="RFC8484"/>,
DoT <xref target="RFC7858"/>, and DoQ <xref target="RFC9250"/> <bcp14>SHOULD NOT</bcp14> provide client
authentication except in the limited situations described in this
section.</t>
      <t>Encrypted DNS servers that use other transport protocols are not
in scope for this document.</t>
      <section anchor="when-servers-should-require-client-authentication">
        <name>When servers should require client authentication</name>
        <t>Encrypted DNS servers <bcp14>MUST NOT</bcp14> challenge clients for authentication
unless they need to restrict connections to a set of clients they
have a pre-existing relationship with as defined in {restrict-clients},
regardless of whether or not the requirements in {per-client}
apply. Encrypted DNS servers also <bcp14>MUST NOT</bcp14> challenge clients for
authentication when it knows its identity cannot be securely
verified. Examples of this include using self-signed certificates
or making itself discoverable using DDR's Discovery Using Resolver IP Addresses
mechanism described in <xref section="4" sectionFormat="of" target="RFC9462"/>.</t>
        <t>Encrypted DNS servers that meet the requirements in
{restrict-clients} <bcp14>MAY</bcp14> challenge clients to authenticate to avoid
achieving the same goal of identifying clients through other, less
secure means (such as IP address or data in the DNS query payload).</t>
      </section>
      <section anchor="restrict-clients">
        <name>Restricting connections to allowed clients</name>
        <t>An encrypted DNS server that provides resolution to a specific set
of clients and refuses service to all other clients <bcp14>MAY</bcp14> require
clients to authenticate.</t>
        <t>For example, an encrypted DNS server owned by an enterprise that
only allows connections from devices managed by that same enterprise
might require clients to authenticate.</t>
      </section>
      <section anchor="per-client">
        <name>Resolving names differently per client</name>
        <t>An encrypted DNS server that provides client-specific resolution
behaviour <bcp14>MAY</bcp14> require clients to authenticate in circumstances
where the appropriate policy for particular clients is
specified by the operator of the encrypted DNS server.</t>
        <t>For example, an encrypted DNS server that is configured to allow
some clients to resolve certain names while other clients are not
allowed needs to identify the client so that the resolution behaviour
for those names can be implemented accurately.</t>
        <t>Encrypted DNS servers <bcp14>SHOULD NOT</bcp14> attempt to authenticate clients
to identify the appropriate resolution policy to use when the
difference in resolution behavior between them is not imposed by
the operator of the server but instead is chosen by the client.</t>
        <t>For example, some public encrypted DNS services provide clients
with the option of blocking resolution requests for particular
categories of domain names, such as names associated with malware
distribution, adult content or advertisers, and makes servers with
particular resolution policies available on different IP addresses.
A client who wishes to opt-in to a server with a particular resolution
policy can do so by sending queries to the corresponding IP address,
and no client identification is required.</t>
      </section>
      <section anchor="when-clients-should-attempt-to-authenticate">
        <name>When clients should attempt to authenticate</name>
        <t>An encrypted DNS client <bcp14>MUST NOT</bcp14> offer authentication to any encrypted
DNS server unless it was specifically configured to expect that
server to require authentication, independent of the mechanism by
which the client chose or discovered the encrypted DNS server to
use.</t>
        <t>An encrypted DNS client <bcp14>MUST NOT</bcp14> offer authentication when the
server connection was established using <xref section="4" sectionFormat="of" target="RFC9462"/>, even if
the IP address of the original DNS server was specifically configured
for the encrypted DNS client as one that might require authentication.
This is because in that circumstance there is not a pre-existing
relationship with the encrypted DNS server (or else DDR bootstrapping
into encrypted DNS would not have been necessary).</t>
        <t>An encrypted DNS client <bcp14>MAY</bcp14> choose to present authentication to a
server that requests it, but is not required to do so; for example,
a client <bcp14>MAY</bcp14> choose instead not to use the server. If a client does
present an identity to a server, the identity <bcp14>SHOULD</bcp14> be unique to
that server, to reduce the risk of a client's resolution history
on multiple colluding servers being correlated.</t>
      </section>
    </section>
    <section anchor="recommendations">
      <name>Recommendations</name>
      <t>The following requirements were considered when formulating the
recommended authentication mechanism for encrypted DNS clients.
The authentication mechanism:</t>
      <ol spacing="normal" type="1"><li>
          <t><bcp14>SHOULD</bcp14> be per-connection, not per-query, e.g. to
avoid unnecessary payload overheads</t>
        </li>
        <li>
          <t><bcp14>SHOULD</bcp14> use open, standard mechanisms where
possible, e.g. to avoid vendor lock-in and specialized cryptography</t>
        </li>
        <li>
          <t><bcp14>SHOULD</bcp14> be reusable across multiple encrypted DNS protocols, e.g.
to avoid protocol preference</t>
        </li>
        <li>
          <t><bcp14>SHOULD NOT</bcp14> require human user interaction to complete authentication</t>
        </li>
      </ol>
      <t>This document concludes that the best mechanism for encrypted
DNS client authentication is mTLS <xref target="RFC8705"/> for the following
reasons:</t>
      <ol spacing="normal" type="1"><li>
          <t>mTLS identifies and authenticates clients, not users, per-connection</t>
        </li>
        <li>
          <t>mTLS is an existing standard and is often readily available for TLS clients</t>
        </li>
        <li>
          <t>X.509 certificates used for TLS client authentication allow a server to
include other attributes in an authentication decision, such as the client's
organization via PKI heiracrchy</t>
        </li>
        <li>
          <t>mTLS is reusable across multiple encrypted DNS protocols</t>
        </li>
        <li>
          <t>mTLS allows session resumption <xref target="RFC8446"/></t>
        </li>
        <li>
          <t>mTLS does not require user interaction or apaplication layer input
for authentication</t>
        </li>
      </ol>
      <t>Encrypted DNS clients and servers that support offering or requesting
client authentication <bcp14>MUST</bcp14> support at least the use of mTLS with TLS 1.3 in
addition to whatever other mechanism they wish to support. Client 
authentication using PKI certificates is <bcp14>RECOMMENDED</bcp14>, but pre-shared
keys <bcp14>MAY</bcp14> also be used, provided (EC)DHE key exchange is used to maintain
perfect forward secrecy <xref target="RFC8446"/>.</t>
      <t>Encrypted DNS clients and servers <bcp14>SHOULD</bcp14> prefer long-lived connections
when using client authentication to minimize the cost over time of
doing repeated TLS handshakes and identity verification.</t>
      <section anchor="why-these-requirements-were-chosen">
        <name>Why these requirements were chosen</name>
        <section anchor="per-connection-scope">
          <name>Per-connection scope</name>
          <t>Any data added to each DNS message will have greater bandwidth and
processing costs than presenting authentication once per connection.
This is especially true in this case because the drawback of having
long-running encrypted DNS connections is the decreased privacy
through increased volume of directly correlatable queries. However,
this privacy threat does not apply to this situation because the
client's queries can already be correlated by the identity it
presents.  Therefore, per-connection bandwidth and data processing
overhead is expected to be much lower than per-query because there
is no incentive for clients and servers to not have long-running
encrypted DNS connections.</t>
          <t>This is not expected to create excessive cost for server operators
because supporting encrypted DNS without client authentication
already requires per-connection state management.</t>
        </section>
        <section anchor="reusable-open-standards">
          <name>Reusable open standards</name>
          <t>Reusing open standards ensures wide interoperability between vendors
that choose to implement client authentication in their encrypted
DNS stacks.</t>
        </section>
        <section anchor="reusable-across-protocols">
          <name>Reusable across protocols</name>
          <t>If a client authentication method for encrypted DNS were defined
or recommended that would only be usable by some TLS-encrypted DNS
protocols, it would encourage the development of a second or even
third solution later.</t>
        </section>
        <section anchor="does-not-require-human-interaction">
          <name>Does not require human interaction</name>
          <t>Humans using devices that use encrypted DNS, when given any kind
of prompt or login relating to establishing encrypted DNS connectivity,
are unlikely to understand what is happening and why. This will
inevitably lead to click-through behavior. Because the scope of
scenarios where client authentication for encrypted DNS is limited
to pre-existing relationships between the client and server, there
should be no need for at-run-time intervention by a human user.</t>
        </section>
      </section>
      <section anchor="why-alternatives-are-not-recommended">
        <name>Why alternatives are not recommended</name>
        <section anchor="web-tokens">
          <name>Web tokens</name>
          <t>OAuth or JSON web tokens alone require HTTP to validate, so would
not be a solution for encrypted DNS protocols other than DoH.  Web
access tokens can be used as certificate-bound access tokens in
combination with mTLS if they are needed to prove identity with
another authorization server, as described in <xref target="RFC8705"/>.</t>
        </section>
        <section anchor="http-authentication">
          <name>HTTP authentication</name>
          <t>HTTP authentication as defined in <xref target="RFC9110"/> provides a basic
authentication scheme for the HTTP protocol. Unless it is used with
TLS, i.e. over HTTPS, the credentials are encoded but not encrypted
which is insecure. As TLS is already used by the encrypted DNS
protocols in this document's scope, it is simpler to handle client
authentication and authorization at the TLS layer.  Additionally,
mTLS is more broadly-adopted than HTTP authentication. HTTP
authentication would only be a viable option for DoH, and not
extensible to other encrypted DNS solutions.</t>
        </section>
        <section anchor="fido">
          <name>FIDO</name>
          <t>Web Authentication (WebAuthN) and the FIDO2 Client to Authenticator
Protocol (CTAP) use CBOR Object Signing and Encryption (COSE),
described in <xref target="RFC8812"/>. FIDO and WebAuthN are passkey solutions
designed to replace passwords for user authentication for online
services, and they are not typically used for general client
authentication. Passkeys are unique for each online service and
require user input for registration, and would require DNS servers
to support the WebAuthN protocol. Additionally, each sign-in requires
user input for local verification, using biometric, local PIN, or
a FIDO security key.</t>
        </section>
        <section anchor="designing-a-novel-solution">
          <name>Designing a novel solution</name>
          <t>Designing a novel solution is never recommended when there is an
existing standard that meets the requirements.  Doing so would make
the encrypted DNS solution more difficult and time-consuming to
adopt, and most likely would introduce vendor lock-in.</t>
        </section>
      </section>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <section anchor="avoiding-connectivity-deadlocks">
        <name>Avoiding connectivity deadlocks</name>
        <t>When deploying encrypted DNS Clients, careful consideration should be made how
certificate rollover and revocation will happen. If an encrypted DNS server only allows
connections from clients with valid certificates, and the client
is configured to only use the encrypted DNS server, then there will
be a deadlock when the certificate expires or is revoked such that
the client device will not have the connectivity needed to renew
or replace its certificate.</t>
        <t>Encrypted DNS servers that challenge clients for authentication
<bcp14>SHOULD</bcp14> have a separate resolution policy for clients that do not
have valid credentials that allows them to resolve the subset of
names needed to connect to the infrastructure needed to acquire
certificates.</t>
        <t>Alternatively, encrypted DNS clients that are configured to use
encrypted DNS servers that will require authentication <bcp14>MAY</bcp14> consider
configuring knowledge of certificate issuing infrastructure in
advance so that the DNS deadlock can be avoided without introducing
less secure DNS servers to their configuration (i.e.  hard coding
IP addresses and host names for certificate checking).</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document describes when and how encrypted DNS clients can
authenticate themselves to an encrypted DNS server. It does not
introduce any new security considerations beyond those of TLS and
mTLS. This document does not define recommendations for when and
how to use encrypted DNS client authentication for encrypted DNS
protocols that are not based on TLS or dTLS.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC9499">
          <front>
            <title>DNS Terminology</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
              <t>This document updates RFC 2308 by clarifying the definitions of "forwarder" and "QNAME". It obsoletes RFC 8499 by adding multiple terms and clarifications. Comprehensive lists of changed and new definitions can be found in Appendices A and B.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="219"/>
          <seriesInfo name="RFC" value="9499"/>
          <seriesInfo name="DOI" value="10.17487/RFC9499"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="EDSR-REDIRECTION" target="https://datatracker.ietf.org/doc/draft-ietf-add-encrypted-dns-server-redirection/">
          <front>
            <title>Encrypted DNS Server Redirection</title>
            <author initials="J." surname="Todd">
              <organization/>
            </author>
            <author initials="T." surname="Jensen">
              <organization/>
            </author>
            <author initials="C." surname="Mosher">
              <organization/>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="RFC8484">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="RFC7858">
          <front>
            <title>Specification for DNS over Transport Layer Security (TLS)</title>
            <author fullname="Z. Hu" initials="Z." surname="Hu"/>
            <author fullname="L. Zhu" initials="L." surname="Zhu"/>
            <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="D. Wessels" initials="D." surname="Wessels"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
              <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7858"/>
          <seriesInfo name="DOI" value="10.17487/RFC7858"/>
        </reference>
        <reference anchor="RFC9250">
          <front>
            <title>DNS over Dedicated QUIC Connections</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>This document describes the use of QUIC to provide transport confidentiality for DNS. The encryption provided by QUIC has similar properties to those provided by TLS, while QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides more efficient packet-loss recovery than UDP. DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC 7858, and latency characteristics similar to classic DNS over UDP. This specification describes the use of DoQ as a general-purpose transport for DNS and includes the use of DoQ for stub to recursive, recursive to authoritative, and zone transfer scenarios.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9250"/>
          <seriesInfo name="DOI" value="10.17487/RFC9250"/>
        </reference>
        <reference anchor="RFC9462">
          <front>
            <title>Discovery of Designated Resolvers</title>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="E. Kinnear" initials="E." surname="Kinnear"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <author fullname="T. Jensen" initials="T." surname="Jensen"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document defines Discovery of Designated Resolvers (DDR), a set of mechanisms for DNS clients to use DNS records to discover a resolver's encrypted DNS configuration. An Encrypted DNS Resolver discovered in this manner is referred to as a "Designated Resolver". These mechanisms can be used to move from unencrypted DNS to encrypted DNS when only the IP address of a resolver is known. These mechanisms are designed to be limited to cases where Unencrypted DNS Resolvers and their Designated Resolvers are operated by the same entity or cooperating entities. It can also be used to discover support for encrypted DNS protocols when the name of an Encrypted DNS Resolver is known.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9462"/>
          <seriesInfo name="DOI" value="10.17487/RFC9462"/>
        </reference>
        <reference anchor="RFC8705">
          <front>
            <title>OAuth 2.0 Mutual-TLS Client Authentication and Certificate-Bound Access Tokens</title>
            <author fullname="B. Campbell" initials="B." surname="Campbell"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <author fullname="T. Lodderstedt" initials="T." surname="Lodderstedt"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document describes OAuth client authentication and certificate-bound access and refresh tokens using mutual Transport Layer Security (TLS) authentication with X.509 certificates. OAuth clients are provided a mechanism for authentication to the authorization server using mutual TLS, based on either self-signed certificates or public key infrastructure (PKI). OAuth authorization servers are provided a mechanism for binding access tokens to a client's mutual-TLS certificate, and OAuth protected resources are provided a method for ensuring that such an access token presented to it was issued to the client presenting the token.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8705"/>
          <seriesInfo name="DOI" value="10.17487/RFC8705"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9110">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="RFC8812">
          <front>
            <title>CBOR Object Signing and Encryption (COSE) and JSON Object Signing and Encryption (JOSE) Registrations for Web Authentication (WebAuthn) Algorithms</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="August" year="2020"/>
            <abstract>
              <t>The W3C Web Authentication (WebAuthn) specification and the FIDO Alliance FIDO2 Client to Authenticator Protocol (CTAP) specification use CBOR Object Signing and Encryption (COSE) algorithm identifiers. This specification registers the following algorithms (which are used by WebAuthn and CTAP implementations) in the IANA "COSE Algorithms" registry: RSASSA-PKCS1-v1_5 using SHA-256, SHA-384, SHA-512, and SHA-1; and Elliptic Curve Digital Signature Algorithm (ECDSA) using the secp256k1 curve and SHA-256. It registers the secp256k1 elliptic curve in the IANA "COSE Elliptic Curves" registry. Also, for use with JSON Object Signing and Encryption (JOSE), it registers the algorithm ECDSA using the secp256k1 curve and SHA-256 in the IANA "JSON Web Signature and Encryption Algorithms" registry and the secp256k1 elliptic curve in the IANA "JSON Web Key Elliptic Curve" registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8812"/>
          <seriesInfo name="DOI" value="10.17487/RFC8812"/>
        </reference>
      </references>
    </references>
    <?line 429?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Many thanks to the following individuals for feedback and WG discussion
(without implication of endorsement): Ben Schwartz, Erik Nygren,
Jim Reid, Tobias Fiebig, Q Misell, Warren Kumari, Wes Hardaker.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
