<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-jaked-cared-01" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.1 -->
  <front>
    <title abbrev="CARED">Client Authentication Recommendations for Encrypted DNS</title>
    <seriesInfo name="Internet-Draft" value="draft-jaked-cared-01"/>
    <author fullname="Tommy Jensen">
      <organization>Microsoft</organization>
      <address>
        <email>tojens.ietf@gmail.com</email>
      </address>
    </author>
    <author fullname="Jessica Krynitsky">
      <organization>Microsoft</organization>
      <address>
        <email>jess.krynitsky@microsoft.com</email>
      </address>
    </author>
    <author fullname="Jeffrey Damick">
      <organization>Amazon</organization>
      <address>
        <email>jdamick@amazon.com</email>
      </address>
    </author>
    <author fullname="Matt Engskow">
      <organization>Amazon</organization>
      <address>
        <email>mengskow@amazon.com</email>
      </address>
    </author>
    <author fullname="Joe Abley">
      <organization>Cloudflare</organization>
      <address>
        <email>jabley@cloudflare.com</email>
      </address>
    </author>
    <date year="2025" month="April" day="14"/>
    <keyword>DNS</keyword>
    <keyword>encrypted DNS</keyword>
    <keyword>authentication</keyword>
    <keyword>client authentication</keyword>
    <keyword>mTLS</keyword>
    <abstract>
      <?line 42?>

<t>Some encrypted DNS clients require anonymity from their encrypted
DNS servers to prevent third parties from correlating client DNS
queries with other data for surveillance or data mining purposes.
However, there are cases where the client and server have a
pre-existing relationship and each wants to prove its identity to
the other.  For example, an encrypted DNS server may only wish to
accept queries from encrypted DNS clients that are managed by the
same enterprise, and an encrypted DNS client may need to confirm
the identity of the encrypted DNS server it is communicating with.
This requires mutual authentication.</t>
      <t>This document discusses the circumstances under which client
authentication is appropriate to use with encrypted DNS, the benefits
and limitations of doing so, and recommends authentication mechanisms
to be used when communicating with TLS-based encrypted DNS protocols.</t>
    </abstract>
  </front>
  <middle>
    <?line 60?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>There are times when a client needs to authenticate itself before
it can be authorised to use a DNS server. One example is when an
encrypted DNS server only accepts connections from pre-approved
clients, such as an encrypted DNS service provided by an enterprise
for its remote employees.  Encrypted DNS clients trying to connect
to such a server might experience refused connections if they did
not provide authentication that allows the enterprise's server to
authorise its use.</t>
      <t>This is different from general use of encrypted DNS by anonymous
clients to public DNS resolvers, where it is bad practice for the
client to provide any kind of identifying information to the server.
For example, Section 8.2 of <xref target="RFC8484"/> discourages use of HTTP
cookies with DNS-over-HTTPS (DoH). This ensures that clients provide
a minimal amount of identifiable or correlatable information to
servers that do not need to know anything about the client in order
to provide name resolution.</t>
      <t>Because of the significant difference in these scenarios, it is
important to define the situations in which interoperable encrypted
DNS clients can use client authentication without compromising the
privacy provided by encrypted DNS in the first place. Even then,
it is important to recognize what value client authentication
provides to encrypted DNS clients versus encrypted DNS servers in
the context of both connection management and DNS resolution utility.
This document discusses these topics and recommends best practice
for authentication.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>Encrypted DNS server: a recursive DNS resolver that implements one
or more encrypted DNS protocols, such as those defined in <xref target="RFC9499"/>
(DNS-over-TLS, DNS-over-HTTPS, DNS-over-QUIC).</t>
      <t>Protective DNS server: a policy-implementing, recursive DNS resolver
service that filters DNS queries to prevent resolution for known
malicious domains and/or IP addresses. Protective DNS servers support
DNS technologies including encrypted DNS protocol support (DoH/DoT)
and IPv6 resolution.</t>
      <t>Other terminology related to the DNS is used in this document as
defined in <xref target="RFC9499"/>.</t>
    </section>
    <section anchor="benefits-of-client-authentication-with-encrypted-dns">
      <name>Benefits of client authentication with encrypted DNS</name>
      <t>Strong identification of encrypted DNS clients by the encrypted DNS
server allows the DNS server to apply client-specific resolution
policies in a securely-verifiable way. Today, a common practice is
to establish client-specific resolution policies that are applied
on behalf of particular clients based on their observed IP address.
This is not only an insecure method that cannot account for clients
sending requests through middleboxes, but it can only be used when
expected IP addresses are known in advance. This is not practical
for enterprises with remote employees without introducing a dependency
on tunneling DNS traffic to a managed gateway or proxy whose IP
address is known. This in turn forces enterprises to choose between
running proxy or gateway infrastructure per client (or at least
per-client IP address mappings) or losing client identification.</t>
      <t>Strong identification of encrypted DNS clients by the encrypted DNS
server also brings identification up to the application layer, which
insulates the mechanism used for identity management from network
topology changes and allows the sense of client identity in the
server to persist despite client IP address changes.</t>
    </section>
    <section anchor="drawbacks-of-client-authentication-with-encrypted-dns">
      <name>Drawbacks of client authentication with encrypted DNS</name>
      <t>While there are benefits in using client authentication with encrypted
DNS in limited circumstances, authentication has drawbacks that
make it inappropriate in many other cases. For example, client
authentication is generally considered to be bad practice in uses
of encrypted DNS that are motivated by client anonyminity, since
it allows a full history of resolution requests to be associated
confidently with the identity of an individual client. This is
unacceptable practice.</t>
      <t>Public DNS servers generally implement allowlists and blocklists at the
IP layer as part of a layered defence against abuse; IP-layer access
control allows unwanted traffic to be discarded early and helps
mitigate unwanted server load. Public encrypted DNS servers with
the additional requirement to permit authenticated clients makes
it impossible to drop unwanted traffic early based on source IP
address, which increases the cost of mitigation and adds complexity
that may introduce additional attack vectors.</t>
    </section>
    <section anchor="when-to-use-client-authentication-with-encrypted-dns">
      <name>When to use client authentication with encrypted DNS</name>
      <t>Encrypted DNS servers that provide resolution using transport
protocols that incorporate TLS or dTLS such as DoH <xref target="RFC8484"/>,
DoT <xref target="RFC7858"/>, and DoQ <xref target="RFC9250"/> <bcp14>SHOULD NOT</bcp14> provide client
authentication except in the limited situations described in this
section.</t>
      <t>Encrypted DNS servers that use other transport protocols are not
in scope for this document.</t>
      <section anchor="when-servers-should-require-client-authentication">
        <name>When servers should require client authentication</name>
        <t>Encrypted DNS servers <bcp14>MUST NOT</bcp14> challenge clients for authentication
unless they need to restrict connections to a set of clients they
have a pre-existing relationship with as defined in {restrict-clients},
regardless of whether or not the requirements in {per-client}
apply. Encrypted DNS servers also <bcp14>MUST NOT</bcp14> challenge clients for
authentication when it knows its identity cannot be securely
verified. Examples of this include using self-signed certificates
or making itself discoverable using DDR's Discovery Using Resolver IP Addresses
mechanism described in <xref section="4" sectionFormat="of" target="RFC9462"/>.</t>
        <t>Encrypted DNS servers that meet the requirements in
{restrict-clients} <bcp14>MAY</bcp14> challenge clients to authenticate to avoid
achieving the same goal of identifying clients through other, less
secure means (such as IP address or data in the DNS query payload).</t>
      </section>
      <section anchor="restrict-clients">
        <name>Restricting connections to allowed clients</name>
        <t>An encrypted DNS server that provides resolution to a specific set
of clients and refuses service to all other clients <bcp14>MAY</bcp14> require
clients to authenticate.</t>
        <t>For example, an encrypted DNS server owned by an enterprise that
only allows connections from devices managed by that same enterprise
might require clients to authenticate.</t>
        <t>Note that this does not apply to scenarios where the owner of the encrypted DNS
server and the device using the encrypted DNS client, such as an ISP and its
customers. While this is a scenario where the ISP may wish to restrict access to
its encrypted DNS resolver to only its customers, client authentication of DNS
traffic is not necessary to achieve that.</t>
      </section>
      <section anchor="per-client">
        <name>Resolving names differently per client</name>
        <t>An encrypted DNS server that provides client-specific resolution
behaviour <bcp14>MAY</bcp14> require clients to authenticate in circumstances
where the appropriate policy for particular clients is
specified by the operator of the encrypted DNS server.</t>
        <t>For example, an encrypted DNS server that is configured to allow
some clients to resolve certain names while other clients are not
allowed needs to identify the client so that the resolution behaviour
for those names can be implemented accurately.</t>
        <t>Encrypted DNS servers <bcp14>SHOULD NOT</bcp14> attempt to authenticate clients
to identify the appropriate resolution policy to use when the
difference in resolution behavior between them is not imposed by
the operator of the server but instead is chosen by the client.</t>
        <t>For example, some public encrypted DNS services provide clients
with the option of blocking resolution requests for particular
categories of domain names, such as names associated with malware
distribution, adult content or advertisers, and makes servers with
particular resolution policies available on different IP addresses.
A client who wishes to opt-in to a server with a particular resolution
policy can do so by sending queries to the corresponding IP address,
and no client identification is required.</t>
      </section>
      <section anchor="when-clients-should-attempt-to-authenticate">
        <name>When clients should attempt to authenticate</name>
        <t>An encrypted DNS client <bcp14>MUST NOT</bcp14> offer authentication to any encrypted
DNS server unless it was specifically configured to expect that
server to require authentication, independent of the mechanism by
which the client chose or discovered the encrypted DNS server to
use. In other words, encrypted DNS client authentication <bcp14>MUST</bcp14> require
administrator action typical of enterprise managed devices rather than being
out of the box default behavior for an application or operating system.</t>
        <t>An encrypted DNS client <bcp14>MUST NOT</bcp14> offer authentication when the
server connection was established using <xref section="4" sectionFormat="of" target="RFC9462"/>, even if
the IP address of the original DNS server was specifically configured
for the encrypted DNS client as one that might require authentication.
This is because in that circumstance there is not a pre-existing
relationship with the encrypted DNS server (or else DDR bootstrapping
into encrypted DNS would not have been necessary).</t>
        <t>An encrypted DNS client <bcp14>MAY</bcp14> choose to present authentication to a
server that requests it, but is not required to do so; for example,
a client <bcp14>MAY</bcp14> choose instead not to use the server. If a client does
present an identity to a server, the identity <bcp14>SHOULD</bcp14> be unique to
that server, or unique to servers provided by the same provider when the client
has that information, to reduce the risk of a client's resolution history
on multiple colluding providers being correlated.</t>
      </section>
    </section>
    <section anchor="recommendations-for-authentication-mechanisms">
      <name>Recommendations for authentication mechanisms</name>
      <t>This section enumerates recommended considerations for selecting a client
authentication mechanism and recommends solutions to guide implementors who wish
to maximize chances of interoperability wherever other implementations hold the
same considerations.</t>
      <t>The following requirements were considered when formulating the
recommended authentication mechanism for encrypted DNS clients.
it is <bcp14>RECOMMENDED</bcp14> that authentication mechanisms:</t>
      <ol spacing="normal" type="1"><li>
          <t>be per-connection, not per-query, e.g. to
avoid unnecessary payload overheads</t>
        </li>
        <li>
          <t>use open, standard mechanisms where
possible, e.g. to avoid vendor lock-in and specialized cryptography</t>
        </li>
        <li>
          <t>be reusable across multiple encrypted DNS protocols, e.g.
to avoid protocol preference</t>
        </li>
        <li>
          <t>not require human user interaction to complete authentication</t>
        </li>
        <li>
          <t>be resistant to replay attacks</t>
        </li>
      </ol>
      <t>This document concludes that the best current mechanism available to recommend
for enabling interoperable encrypted DNS client authentication is
mTLS <xref target="RFC8705"/> for the following reasons:</t>
      <ol spacing="normal" type="1"><li>
          <t>mTLS identifies and authenticates clients, not users, per-connection</t>
        </li>
        <li>
          <t>mTLS is an existing standard and is often readily available for TLS clients</t>
        </li>
        <li>
          <t>X.509 certificates used for TLS client authentication allow a server to
include other attributes in an authentication decision, such as the client's
organization via PKI hieracrchy</t>
        </li>
        <li>
          <t>mTLS is reusable across multiple encrypted DNS protocols</t>
        </li>
        <li>
          <t>mTLS allows session resumption <xref target="RFC8446"/></t>
        </li>
        <li>
          <t>mTLS does not require user interaction or apaplication layer input
for authentication</t>
        </li>
      </ol>
      <t>Encrypted DNS clients and servers that support offering or requesting
client authentication <bcp14>SHOULD</bcp14> support at least the use of mTLS with TLS 1.3 in
addition to whatever other mechanism they wish to support. Client 
authentication using PKI certificates is <bcp14>RECOMMENDED</bcp14>, but pre-shared
keys <bcp14>MAY</bcp14> also be used to meet the requirements listed above for recommendable
practices, provided (EC)DHE key exchange is used to maintain
perfect forward secrecy <xref target="RFC8446"/>. Versions of TLS lower than 1.3 lack some
security features that new protocols (as of this writing) are taking for granted
or making recommended behavior. When TLS 1.3 is discouraged in favor of future
versions of TLS or its future replacement, that guidance supercedes this
paragraph.</t>
      <t>Encrypted DNS clients and servers <bcp14>SHOULD</bcp14> prefer long-lived connections
when using client authentication to minimize the cost over time of
doing repeated TLS handshakes and identity verification.</t>
      <section anchor="why-these-requirements-were-chosen">
        <name>Why these requirements were chosen</name>
        <section anchor="per-connection-scope">
          <name>Per-connection scope</name>
          <t>Any data added to each DNS message will have greater bandwidth and
processing costs than presenting authentication once per connection.
This is especially true in this case because the drawback of having
long-running encrypted DNS connections is the decreased privacy
through increased volume of directly correlatable queries. However,
this privacy threat does not apply to this situation because the
client's queries can already be correlated by the identity it
presents.  Therefore, per-connection bandwidth and data processing
overhead is expected to be much lower than per-query because there
is no incentive for clients and servers to not have long-running
encrypted DNS connections.</t>
          <t>This is not expected to create excessive cost for server operators
because supporting encrypted DNS without client authentication
already requires per-connection state management.</t>
        </section>
        <section anchor="reusable-open-standards">
          <name>Reusable open standards</name>
          <t>Reusing open standards ensures wide interoperability between vendors
that choose to implement client authentication in their encrypted
DNS stacks.</t>
        </section>
        <section anchor="reusable-across-protocols">
          <name>Reusable across protocols</name>
          <t>If a client authentication method for encrypted DNS were defined
or recommended that would only be usable by some TLS-encrypted DNS
protocols, it would encourage the development of a second or even
third solution later.</t>
        </section>
        <section anchor="does-not-require-human-interaction">
          <name>Does not require human interaction</name>
          <t>Humans using devices that use encrypted DNS, when given any kind
of prompt or login relating to establishing encrypted DNS connectivity,
are unlikely to understand what is happening and why. This will
inevitably lead to click-through behavior. Because the scope of
scenarios where client authentication for encrypted DNS is limited
to pre-existing relationships between the client and server, there
should be no need for at-run-time intervention by a human user.</t>
        </section>
        <section anchor="resistance-to-replay-attacks">
          <name>Resistance to replay attacks</name>
          <t>Today, there are some attempts to identify clients that involve use of client-
specific DoH templates or DoT hostnames, addition of magic strings to requests,
and other mechanisms to enable proprietary experiences. It is important that
recommendations for client authentication are restricted to mechanisms that
protect their secrets or keys from replay attacks or compromise by unprivileged
processes.</t>
        </section>
      </section>
      <section anchor="why-alternatives-are-not-recommended">
        <name>Why alternatives are not recommended</name>
        <section anchor="web-tokens">
          <name>Web tokens</name>
          <t>OAuth or JSON web tokens alone require HTTP to validate, so would
not be a solution for encrypted DNS protocols other than DoH.  Web
access tokens can be used as certificate-bound access tokens in
combination with mTLS if they are needed to prove identity with
another authorization server, as described in <xref target="RFC8705"/>.</t>
        </section>
        <section anchor="http-authentication">
          <name>HTTP authentication</name>
          <t>HTTP authentication as defined in <xref target="RFC9110"/> provides a basic
authentication scheme for the HTTP protocol. Unless it is used with
TLS, i.e. over HTTPS, the credentials are encoded but not encrypted
which is insecure. As TLS is already used by the encrypted DNS
protocols in this document's scope, it is simpler to handle client
authentication and authorization at the TLS layer.  Additionally,
mTLS is more broadly-adopted than HTTP authentication. HTTP
authentication would only be a viable option for DoH, and not
extensible to other encrypted DNS solutions.</t>
        </section>
        <section anchor="fido">
          <name>FIDO</name>
          <t>Web Authentication (WebAuthN) and the FIDO2 Client to Authenticator
Protocol (CTAP) use CBOR Object Signing and Encryption (COSE),
described in <xref target="RFC8812"/>. FIDO and WebAuthN are passkey solutions
designed to replace passwords for user authentication for online
services, and they are not typically used for general client
authentication. Passkeys are unique for each online service and
require user input for registration, and would require DNS servers
to support the WebAuthN protocol. Additionally, each sign-in requires
user input for local verification, using biometric, local PIN, or
a FIDO security key.</t>
        </section>
        <section anchor="designing-a-novel-solution">
          <name>Designing a novel solution</name>
          <t>Designing a novel solution is never recommended when there is an
existing standard that meets the requirements.  Doing so would make
the encrypted DNS solution more difficult and time-consuming to
adopt, and most likely would introduce vendor lock-in.</t>
        </section>
      </section>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <section anchor="avoiding-connectivity-deadlocks">
        <name>Avoiding connectivity deadlocks</name>
        <t>When deploying encrypted DNS Clients, careful consideration should be made how
certificate rollover and revocation will happen. If an encrypted DNS server only allows
connections from clients with valid certificates, and the client
is configured to only use the encrypted DNS server, then there will
be a deadlock when the certificate expires or is revoked such that
the client device will not have the connectivity needed to renew
or replace its certificate.</t>
        <t>Encrypted DNS servers that challenge clients for authentication
<bcp14>SHOULD</bcp14> have a separate resolution policy for clients that do not
have valid credentials that allows them to resolve the subset of
names needed to connect to the infrastructure needed to acquire
certificates.</t>
        <t>Alternatively, encrypted DNS clients that are configured to use
encrypted DNS servers that will require authentication <bcp14>MAY</bcp14> consider
configuring knowledge of certificate issuing infrastructure in
advance so that the DNS deadlock can be avoided without introducing
less secure DNS servers to their configuration (i.e.  hard coding
IP addresses and host names for certificate checking).</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document describes when and how encrypted DNS clients can
authenticate themselves to an encrypted DNS server. It does not
introduce any new security considerations beyond those of TLS and
mTLS. This document does not define recommendations for when and
how to use encrypted DNS client authentication for encrypted DNS
protocols that are not based on TLS or dTLS.</t>
      <section anchor="custom-deployments">
        <name>Custom Deployments</name>
        <t>This document was written to provide guidance to implementors interoperating
with third party implementations to maximize the chances of out-of-the-box
compatibility. There are certainly many ways of accomplishing client
authentication with encrypted DNS not listed as recommended practice here.
Implementors are encouraged to use the reasoning in this document explaining
its choice in recommendations, but not following this document's recommendations
does not imply any violation of protocol compliance for encrypted DNS protocols
or whatever authentication mechanism the implementor selects.</t>
      </section>
      <section anchor="use-of-dns-for-indicators-of-compromise">
        <name>Use of DNS for Indicators of Compromise</name>
        <t>DNS queries can sometimes act as a source of Indicators of Compromise
<xref target="RFC9424"/>, further placing value on strong client authentication when it is
appropriate as discussed in earlier sections.</t>
        <t>Deployers should weigh the recommendations and reasoning in this
document against their threat models to ensure their Protective DNS deployments
provide useful Indicators of Compromise in addition to the need for
interoperability.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC9499">
          <front>
            <title>DNS Terminology</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
              <t>This document updates RFC 2308 by clarifying the definitions of "forwarder" and "QNAME". It obsoletes RFC 8499 by adding multiple terms and clarifications. Comprehensive lists of changed and new definitions can be found in Appendices A and B.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="219"/>
          <seriesInfo name="RFC" value="9499"/>
          <seriesInfo name="DOI" value="10.17487/RFC9499"/>
        </reference>
        <reference anchor="RFC9424">
          <front>
            <title>Indicators of Compromise (IoCs) and Their Role in Attack Defence</title>
            <author fullname="K. Paine" initials="K." surname="Paine"/>
            <author fullname="O. Whitehouse" initials="O." surname="Whitehouse"/>
            <author fullname="J. Sellwood" initials="J." surname="Sellwood"/>
            <author fullname="A. Shaw" initials="A." surname="Shaw"/>
            <date month="August" year="2023"/>
            <abstract>
              <t>Cyber defenders frequently rely on Indicators of Compromise (IoCs) to identify, trace, and block malicious activity in networks or on endpoints. This document reviews the fundamentals, opportunities, operational limitations, and recommendations for IoC use. It highlights the need for IoCs to be detectable in implementations of Internet protocols, tools, and technologies -- both for the IoCs' initial discovery and their use in detection -- and provides a foundation for approaches to operational challenges in network security.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9424"/>
          <seriesInfo name="DOI" value="10.17487/RFC9424"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8484">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="RFC7858">
          <front>
            <title>Specification for DNS over Transport Layer Security (TLS)</title>
            <author fullname="Z. Hu" initials="Z." surname="Hu"/>
            <author fullname="L. Zhu" initials="L." surname="Zhu"/>
            <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="D. Wessels" initials="D." surname="Wessels"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
              <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7858"/>
          <seriesInfo name="DOI" value="10.17487/RFC7858"/>
        </reference>
        <reference anchor="RFC9250">
          <front>
            <title>DNS over Dedicated QUIC Connections</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>This document describes the use of QUIC to provide transport confidentiality for DNS. The encryption provided by QUIC has similar properties to those provided by TLS, while QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides more efficient packet-loss recovery than UDP. DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC 7858, and latency characteristics similar to classic DNS over UDP. This specification describes the use of DoQ as a general-purpose transport for DNS and includes the use of DoQ for stub to recursive, recursive to authoritative, and zone transfer scenarios.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9250"/>
          <seriesInfo name="DOI" value="10.17487/RFC9250"/>
        </reference>
        <reference anchor="RFC9462">
          <front>
            <title>Discovery of Designated Resolvers</title>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="E. Kinnear" initials="E." surname="Kinnear"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <author fullname="T. Jensen" initials="T." surname="Jensen"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document defines Discovery of Designated Resolvers (DDR), a set of mechanisms for DNS clients to use DNS records to discover a resolver's encrypted DNS configuration. An Encrypted DNS Resolver discovered in this manner is referred to as a "Designated Resolver". These mechanisms can be used to move from unencrypted DNS to encrypted DNS when only the IP address of a resolver is known. These mechanisms are designed to be limited to cases where Unencrypted DNS Resolvers and their Designated Resolvers are operated by the same entity or cooperating entities. It can also be used to discover support for encrypted DNS protocols when the name of an Encrypted DNS Resolver is known.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9462"/>
          <seriesInfo name="DOI" value="10.17487/RFC9462"/>
        </reference>
        <reference anchor="RFC8705">
          <front>
            <title>OAuth 2.0 Mutual-TLS Client Authentication and Certificate-Bound Access Tokens</title>
            <author fullname="B. Campbell" initials="B." surname="Campbell"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <author fullname="T. Lodderstedt" initials="T." surname="Lodderstedt"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document describes OAuth client authentication and certificate-bound access and refresh tokens using mutual Transport Layer Security (TLS) authentication with X.509 certificates. OAuth clients are provided a mechanism for authentication to the authorization server using mutual TLS, based on either self-signed certificates or public key infrastructure (PKI). OAuth authorization servers are provided a mechanism for binding access tokens to a client's mutual-TLS certificate, and OAuth protected resources are provided a method for ensuring that such an access token presented to it was issued to the client presenting the token.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8705"/>
          <seriesInfo name="DOI" value="10.17487/RFC8705"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9110">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="RFC8812">
          <front>
            <title>CBOR Object Signing and Encryption (COSE) and JSON Object Signing and Encryption (JOSE) Registrations for Web Authentication (WebAuthn) Algorithms</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="August" year="2020"/>
            <abstract>
              <t>The W3C Web Authentication (WebAuthn) specification and the FIDO Alliance FIDO2 Client to Authenticator Protocol (CTAP) specification use CBOR Object Signing and Encryption (COSE) algorithm identifiers. This specification registers the following algorithms (which are used by WebAuthn and CTAP implementations) in the IANA "COSE Algorithms" registry: RSASSA-PKCS1-v1_5 using SHA-256, SHA-384, SHA-512, and SHA-1; and Elliptic Curve Digital Signature Algorithm (ECDSA) using the secp256k1 curve and SHA-256. It registers the secp256k1 elliptic curve in the IANA "COSE Elliptic Curves" registry. Also, for use with JSON Object Signing and Encryption (JOSE), it registers the algorithm ECDSA using the secp256k1 curve and SHA-256 in the IANA "JSON Web Signature and Encryption Algorithms" registry and the secp256k1 elliptic curve in the IANA "JSON Web Key Elliptic Curve" registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8812"/>
          <seriesInfo name="DOI" value="10.17487/RFC8812"/>
        </reference>
      </references>
    </references>
    <?line 472?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors are grateful to the following individuals for their feedback on or
contributions to the text, with no implication of endorsement: Andrew S2,
Ben Schwartz, Erik Nygren, Jim Reid, Q Misell, Tim Wicinski, Tobias Fiebig,
Warren Kumari, Wes Hardaker.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
