<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-add-encrypted-dns-server-redirection-02" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.1 -->
  <front>
    <title abbrev="EDSR">Encrypted DNS Server Redirection</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-add-encrypted-dns-server-redirection-02"/>
    <author initials="J." surname="Todd" fullname="J. Todd">
      <organization>Quad9</organization>
      <address>
        <email>jtodd@quad9.net</email>
      </address>
    </author>
    <author initials="T." surname="Jensen" fullname="T. Jensen">
      <organization>Microsoft</organization>
      <address>
        <email>tojens.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="C." surname="Mosher" fullname="C. Mosher">
      <organization>Innate, Inc.</organization>
      <address>
        <email>cmosher@gmail.com</email>
      </address>
    </author>
    <date year="2025" month="April" day="23"/>
    <area>INT</area>
    <workgroup>add</workgroup>
    <keyword>encrypted DNS</keyword>
    <keyword>DoH</keyword>
    <keyword>DoT</keyword>
    <keyword>DoQ</keyword>
    <keyword>redirection</keyword>
    <abstract>
      <?line 47?>

<t>This document defines Encrypted DNS Server Redirection (EDSR),
a mechanism for encrypted DNS servers to redirect clients to
other encrypted DNS servers. This enables dynamic routing
to geo-located or otherwise more desirable encrypted DNS servers
without modifying DNS client endpoint configurations or the use 
of anycast by the DNS server.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://ietf-wg-add.github.io/EncDNSServerRedirect/draft-add-encrypted-dns-server-redirection.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-add-encrypted-dns-server-redirection/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        add Working Group mailing list (<eref target="mailto:add@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/add/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/add/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-wg-add/EncDNSServerRedirect"/>.</t>
    </note>
  </front>
  <middle>
    <?line 56?>

<section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Encrypted DNS Server Redirection (EDSR) is a protocol that allows an encrypted
DNS resolver whose configuration is well known to clients to redirect them to other,
more desirable resolvers without having to support anycast and without having to
configure clients with these other resolvers ahead of time. It uses a similar mechanism to the one
defined by <xref section="4" sectionFormat="of" target="RFC9462"/> to redirect an encrypted DNS client from one encrypted DNS
resolver to another encrypted DNS resolver. Where DDR uses a threat model that
presumes the initial DNS traffic could be unencrypted, EDSR only ever applies when the initial
DNS traffic is already encrypted.</t>
      <t>One example of what makes redirection to another resolver
desirable is geolocation. A DNS service may document one or a few well known resolver 
configurations even though it routes traffic to hundreds or thousands of resolvers
that are closer to the client, reducing latency and making DNS resolutions more
applicable to the client.</t>
    </section>
    <section anchor="dns-client-behavior">
      <name>DNS client behavior</name>
      <section anchor="discovering-redirections">
        <name>Discovering redirections</name>
        <t>When a DNS client first opens a connection to an encrypted DNS server, it <bcp14>MUST</bcp14>
use the Discovery Using Resolver Names mechanism defined in <xref section="5" sectionFormat="of" target="RFC9462"/> to
send a SVCB query for the name of the resolver to discover its encrypted DNS configuration.
The DNS client <bcp14>SHOULD</bcp14> open a connection to the server returned in the SVCB query using the
same domain name as the original server and one of the IP addresses returned in additional
A/AAAA records for the same
name. Once a connection has been successfully opened, as subsequently described by reaching
a suitable server at the end of the redirection chain, the client <bcp14>SHOULD</bcp14> close the first
connection.</t>
        <section anchor="use-of-delegated-credentials">
          <name>Use of Delegated Credentials</name>
          <t>If the DNS client's TLS dependency supports Delegated Credentials <xref target="RFC9345"/>, it <bcp14>SHOULD</bcp14>
present the "delegated_credential" TLS extension in its ClientHello as described in 
<xref section="4.1.1" sectionFormat="of" target="RFC9345"/> to maximize compatibility with EDSR-supporting servers. This
is because some server operators <bcp14>MAY</bcp14> redirect to servers controlled by other entities which
do not have access to its private key but which nevertheless have the ability to terminate
TLS connections for the server's name.</t>
        </section>
        <section anchor="redirection-after-discovery-using-resolver-ip-addresses">
          <name>Redirection after Discovery Using Resolver IP Addresses</name>
          <t>EDSR assumes that the original server
is identified by domain name from the client's perspective. Examples include when the client was configured
with the resolver through endpoint management or DNR discovery <xref target="RFC9463"/>. However, when the server was discovered using
DDR's Discovery Using Resolver IP Addresses <xref section="4" sectionFormat="of" target="RFC9462"/>, this is not the case. Due to the threat model
that mode of DDR operates under, where it has to
start from an unencrypted resolver, the identity of the server used for verification is its IP address.
The risks involved with using the domain name of resolvers discovered by Discovery Using Resolver IP
Addresses are further explored in the Security Considerations section <xref target="seccon"/>.</t>
          <t>When clients use EDSR with a resolver discovered using DDR's 
Discovery Using Resolver IP Addresses <xref section="4" sectionFormat="of" target="RFC9462"/>, the only difference
is that the destination server it was redirected to <bcp14>MUST</bcp14> be able to claim the IP address of the previous
server in its SAN field.</t>
          <t>This section applies to both the Verified and Opportunistic forms of DDR's Discovery Using
Resolver IP Addresses mechanism.</t>
        </section>
      </section>
      <section anchor="identifying-self-redirections">
        <name>Identifying self-redirections</name>
        <t>If the set of IP addresses that are valid for the server being redirected to include
the IP address of the current server, the client <bcp14>SHOULD</bcp14> ignore the redirection, treating
it the same as receiving no response or a NODATA response from the SVCB query.
However, clients receiving preferable encryption parameters as part of the SVCB response
<bcp14>MAY</bcp14> choose to reconnect to negotiate to upgrade to the preferred encryption method. When
doing so, the client <bcp14>SHOULD NOT</bcp14> immediately repeat EDSR as the redirection from the
server to itself has terminated the redirection chain.</t>
      </section>
      <section anchor="waiting-for-redirections">
        <name>Waiting for redirections</name>
        <t>The client does not need to wait for the results of the redirection discovery
query before sending other DNS queries on the connection, though they <bcp14>SHOULD</bcp14>
gracefully close the connection as soon as it has successfully established a
connection to the server it was redirected to and received or timed out the
outstanding queries on the original connection.</t>
        <t>See the Deployment Considerations section for reasons a client <bcp14>MAY</bcp14> choose to decline a
redirection.</t>
      </section>
      <section anchor="refreshing-redirections">
        <name>Refreshing redirections</name>
        <t>If a chain of redirections was followed, the effective TTL of the redirection is the
minimum of the TTLs encountered along the chain. If the effective TTL of the redirection
is considered to be too short for the client's performance (because it would require frequent
repetition of EDSR), clients <bcp14>MAY</bcp14> refuse to follow the redirection. Servers <bcp14>SHOULD NOT</bcp14> redirect
clients in a way that results in short effective TTLs.</t>
        <t>When the redirection TTL expires or connectivity to the server the client was redirected to fails,
the client <bcp14>MUST</bcp14> close the connection and return to using the servers it is currently configured to
use by its local configuration before using EDSR again. 
This allows the client to honor the intention of whatever configuration method was
used to provide it with a set of DNS servers to use.</t>
        <t>If the client DNS server remains the same, it <bcp14>SHOULD</bcp14> repeat the EDSR mechanism
before the effective TTLS expires so that if the same redirection is valid, it can avoid needing
to tear down the current connection by refreshing its effective TTL.</t>
      </section>
      <section anchor="multiple-redirections">
        <name>Multiple redirections</name>
        <t>When clients receive more than one valid SVCB response, they <bcp14>SHOULD</bcp14> prefer using
the redirections that match their configuration (such as supported IP address family or
desired encrypted DNS protocol) in ascending order of the SVCB priority. Once a successful
connection is made to a redirected destination, clients <bcp14>MUST</bcp14> discard results for other
servers. Entries returned for the same IP address <bcp14>MAY</bcp14> be retained for multi-protocol path
diversity to what is presumed to be the same server. Later unsuitability of all connections
to the server <bcp14>MUST</bcp14> result in restarting EDSR.</t>
        <t>Redirections are considered to be a one-to-one relationship (starting with one recursive
resolver and following its redirections should result in one replacement recursive resolver).
It is not expected that a stub resolver ends up using more recursive resolvers than it
was originally configured with when using EDSR.</t>
      </section>
      <section anchor="network-changes">
        <name>Network changes</name>
        <t>When a client device changes what network it is connected to, it <bcp14>SHOULD</bcp14> forget
pre-existing redirections and start EDSR over with the originally configured
resolvers. This ensures that a resolver which redirects clients based on their
source network can behave accordingly.</t>
        <t>Note that this is unrelated to what resolvers a client is originally configured with. 
For example, a client which is configured to always used the resolvers advertised by 
DHCP will likely start with different original resolvers when changing networks. How a 
client is configured with DNS resolvers is out of scope for this document. EDSR only 
provides a mechanism for clients to discover redirections from resolvers they were 
previously configured to use.</t>
      </section>
    </section>
    <section anchor="dns-server-behavior">
      <name>DNS server behavior</name>
      <t>DNS resolvers who want to redirect clients to other resolvers <bcp14>MUST</bcp14> respond to
SVCB <xref target="RFC9461"/> queries for their own domain names with records that
describe the configuration of the destination server.</t>
      <t>Guidance in <xref section="5" sectionFormat="of" target="RFC9460"/> to improve performance by
including additional A/AAAA records with the SVCB response <bcp14>SHOULD</bcp14> be followed.</t>
      <t>If the server knows it supports Discovery Using Resolver IP Addresses, or does not know for sure,
it <bcp14>MUST</bcp14> be prepared for clients to connect without an SNI because clients might have discovered the
server that way. Otherwise, if the server knows it does not support Discovery Using Resolver IP Addresses,
it <bcp14>MAY</bcp14> refuse connections without an SNI instead.</t>
      <t>The destination server <bcp14>MAY</bcp14> use Delegated Credentials <xref target="RFC9345"/> if the DNS client
advertises its support for Delegated Credentials as described in <xref section="4.1.1" sectionFormat="of" target="RFC9345"/>.
This is valid
so long as the delegated credential is valid for the same domain name used by the
referring server.</t>
      <t>Delegated Credentials are one approach for servers which need to redirect
clients to servers owned by other entities, as is the case with CDN contracts. Another
approach is using <xref target="RFC9115"/> to delegate Short-Term Automatically Renewed (STAR) certificates to the
servers that need to serve a name on behalf of a name's owner. This approach would not require protocol changes for
EDSR peers communicating with one another, unlike Delegated Credentials. Other trade-offs
between these approaches are beyond the scope of this document.</t>
      <section anchor="ensuring-compatibility">
        <name>Ensuring compatibility</name>
        <t>Redirections <bcp14>MUST</bcp14> only redirect to resolvers which support at least the same
protocol, address family, port, and TLS minimum versions as the referring resolver.
This ensures that redirections do not lead clients to resolvers that are not compatible
with the client. In addition, servers <bcp14>SHOULD</bcp14> avoid redirecting to servers which will also
redirect clients unless they are actively coordinating to ensure a positive
client experience. See the Deployment Considerations section for more details.</t>
      </section>
      <section anchor="dealing-with-persistent-clients">
        <name>Dealing with persistent clients</name>
        <t>Servers <bcp14>SHOULD</bcp14> be prepared for clients to not follow the redirection immediately
as connection failures, other technical issues, or even client policy affecting server
choice may lead to clients being unable to follow the redirection promptly or at all.
Servers who are redirecting due to being overloaded <bcp14>MAY</bcp14> respond as they normally would
to overwhelming traffic.</t>
      </section>
      <section anchor="redirection-to-servers-controlled-by-third-parties">
        <name>Redirection to servers controlled by third parties</name>
        <t>Server operators ought to consider using delegated credentials <xref target="RFC9345"/> when they
wish to redirect general clients to other servers operated by other entities. This
allows the server operator to avoid giving access to their domain's private key to
third parties but also ensure general clients have a secured, same-origin redirection
experience.</t>
      </section>
    </section>
    <section anchor="deployment-considerations">
      <name>Deployment Considerations</name>
      <section anchor="large-trees-of-redirections">
        <name>Large trees of redirections</name>
        <t>It is possible for DNS servers to redirect clients to DNS servers which also
redirect clients. Clients which are presented with long chains of redirections
<bcp14>MAY</bcp14> choose to stop following redirections to reduce connection thrashing. DNS
server operators <bcp14>SHOULD</bcp14> deploy redirection behavior mindfully to avoid long
chains of redirection.</t>
        <t>Servers <bcp14>SHOULD</bcp14> ensure their redirections do not create loops, where clients
are redirected to a server it already encountered earlier in the process.
Clients <bcp14>MAY</bcp14> stop following redirections when they detect this, but <bcp14>MAY</bcp14> also
take a simpler approach, following only a maximum number of redirections.</t>
      </section>
      <section anchor="redirection-ttls">
        <name>Redirection TTLs</name>
        <t>Servers <bcp14>SHOULD</bcp14> provide sufficiently long TTLs for clients to avoid the need to
constantly repeat EDSR queries. Server operators should be mindful of redirection
chains because unless they collaboratively control the TTLs of one another's
redirections, redirection chains will end up with greatly reduced effective TTLs
because the client will always use the lowest. When they do collaboratively control
the TTLs of one another's redirections, there is probably a way to do a
single-hop redirection instead.</t>
      </section>
      <section anchor="including-ip-addresses-in-edsr-responses">
        <name>Including IP addresses in EDSR responses</name>
        <t>If a recursive resolver does not include additional A/AAAA records per
<xref section="5" sectionFormat="of" target="RFC9460"/>, stub resolvers might end up failing
the redirection if the redirection destination name cannot be resolved. Additionally,
the recursive resolver <bcp14>SHOULD</bcp14> ensure records conntaining the same IP version as the
existing connection are returned (if the stub is currently connected over IPv4, one or
more A records <bcp14>SHOULD</bcp14> be included, and if the stub is currently connected over IPv6,
one or more AAAA records <bcp14>SHOULD</bcp14> be included).</t>
      </section>
      <section anchor="determining-suitability-of-destinations-for-a-given-client">
        <name>Determining suitability of destinations for a given client</name>
        <t>Because servers are required to ensure redirections are to servers that at least support
the same protocols as the current connection, server operators will often need to know
at run-time which of the potential redirection destinations are appropriate for the client
beyond whatever business logic requires the redirection in the first place. While out of
scope for protocol design, it is worth calling out that implementors need to consider
how they will handle this. A straightforward example would be a cache of the potential
redirection destinations that map to their capabilities, with consideration for how that
table is populated and updated (example: TLS 1.3 support is rolled out to server which
previously only served TLS 1.2). Any such out-of-band lookup would be much better than attempting
just-in-time checking with the potential destinations of their capabilities, which would
negatively impact the client experience when done during its redirection.</t>
        <t>Note that even if there is only one redirection candidate to choose from,
the server still needs to know when to not offer the redirection due to compatibility issues.</t>
      </section>
      <section anchor="comparison-to-discovery-using-resolver-names">
        <name>Comparison to Discovery Using Resolver Names</name>
        <t>Discovery Using Resolver Names as defined in <xref section="5" sectionFormat="of" target="RFC9345"/> describes
discovery of the encrypted DNS configuration for
a server using its domain name. The technical mechanism described there and EDSR are
the same in the context of on-wire behavior; they differ by how clients and servers
deploy them.</t>
        <t>For Discovery Using Resolver Names, servers are free to return whatever subset of 
valid configurations for the domain name provided by the client it wishes, such as
those it sees as valid for the client's apparent geolocation. In the case of EDSR,
servers are expected to only return configurations if it wants the client to be
redirected to another resolver. Servers implementing EDSR <bcp14>SHOULD</bcp14> only answer SVCB
queries for its own domain name in the EDSR context following its requirements.</t>
        <t>For Discovery Using Resolver Names, clients are querying for encrypted DNS
configurations available for a given server domain name. EDSR does not restrict
clients from issuing these queries whenever they want. However, clients ought
to consider that querying an encrypted DNS server for its own configuration that
supports EDSR (which is not inherently discoverable by the client) might only
return configuration it is ok with the client using to immediately reconnect.</t>
      </section>
    </section>
    <section anchor="seccon">
      <name>Security Considerations</name>
      <section anchor="trusting-the-redirected-connection">
        <name>Trusting the redirected connection</name>
        <t>EDSR does not provide novel authentication or security mechanisms. Redirection
is trusted by virtue of the server authentication via PKI through TLS <xref target="RFC5280"/>.
The DNS stub resolver implementing EDSR <bcp14>SHOULD</bcp14> use whatever policies it uses for
other TLS connections for encrypted DNS traffic to determine if a given TLS cert
chain is trustworthy before proceeding with EDSR.</t>
        <t>EDSR <bcp14>MUST NOT</bcp14> be used with encrypted DNS protocols that are not based on TLS.
This scenario will require future standards work.</t>
        <t>EDSR should not introduce any additional security considerations beyond use of
the original encrypted resolver prior to redirection. Because the original
connection was trusted, information sent over it about a new connection to use
should be as trusted. However, clients that wish to time bound vulnerabilities
to attackers who compromise the original resolver <bcp14>MAY</bcp14> choose to implement a
maximum TTL to honor on SVCB records that redirect to other servers.</t>
      </section>
      <section anchor="use-with-unencrypted-dns">
        <name>Use with unencrypted DNS</name>
        <t>EDSR <bcp14>MUST NOT</bcp14> be used to redirect unencrypted DNS traffic to any other resolver.
This use case is called "designation" and is covered by Discovery of Designated
Resolvers (DDR) as defined in <xref target="RFC9462"/>, specifically Section 4: "Discovery Using
Resolver IP Addresses". Not following that security guidance opens up a DNS client
to malicious redirection to an attacker-controlled DNS server. For more information,
see <xref section="7" sectionFormat="of" target="RFC9462"/>.</t>
        <t>EDSR also <bcp14>MUST NOT</bcp14> be used to redirect encrypted DNS traffic to a resolver that
advertises support for unencrypted DNS. This would reduce the security posture of
the client. Clients <bcp14>MUST NOT</bcp14> follow an encrypted DNS redirection and then send
unencrypted DNS traffic to the new resolver.</t>
      </section>
      <section anchor="use-with-ddr-discovery-from-ip-addresses">
        <name>Use with DDR discovery from IP addresses</name>
        <t>When a resolver is discovered using DDR's Discovery Using Resolver IP Addresses mechanism 
defined in <xref section="4" sectionFormat="of" target="RFC9462"/>, the server's identity used for
TLS purposes is its IP address, not its domain name. This means servers and clients
<bcp14>MUST</bcp14> use the original server's IP address, not the IP address of the previous server
in the event of redirection chains, in the SAN field of destination servers to
validate the redirection.</t>
        <t>The reason for this is due to an attack where the DDR SVCB query response is modified
by an active attacker to have a different domain name in its "dohpath" SVCB key. When
the client uses it to issue the EDSR query to the (valid) DDR-designated resolver, it
will innocently forward the query upstream and return the result. The result may even
be DNSSEC signed since it was issued by the valid owner of the attacker's domain name.
If this redirection is then followed and validated with the attacker's domain name, 
it will succeed and the client will have been maliciously redirected to use an attacker's
server at the low cost of a port 53 attack without breaking encryption or compromising
the encrypted DNS server DDR designated.</t>
        <t>There is no harm in using the name of the server for the EDSR query so long as the
validation of the destination server is performed using the original IP address and
not the name. This ensures EDSR clients can consistently use the domain name of a 
server for redirection discovery. Use of the DDR-defined SUDN "resolver.arpa" was
considered and rejected because this would conflate DDR configuration and EDSR
configuration by placing them in the same zone, using the same DNS record type.</t>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>A client <bcp14>MAY</bcp14> choose to not send other name queries until redirection is complete,
but there should be no privacy issue with sending queries to intermediate resolvers before
redirection takes place. This is because the intermediate resolvers are considered
to be appropriate destinations by the client even if the resolver wants to substitute
another resolver for reasons other than name resolution results such as latency
optimization or load balancing.</t>
    </section>
    <section anchor="data-flow-considerations">
      <name>Data Flow Considerations</name>
      <section anchor="data-scope">
        <name>Data Scope</name>
        <t>EDSR does not result in any additional data being shared by the end user, as the
DNS queries going to the new resolver were already going to go to the original
resolver.</t>
      </section>
      <section anchor="data-visibility">
        <name>Data Visibility</name>
        <t>EDSR results in a 1:1 replacement of DNS resolvers used (future queries sent to
the new resolver will not be sent to the original resolver anymore). This means the
number of servers which see any given query remain the same.</t>
        <t>This is only true if clients only use one redirected DNS server per original DNS
server. If the DNS server offers more than one redirection, and the client validates
and uses two or more of those redirections, then there will be greater data
visibility (more destinations). This is however entirely within the client's choice
following their own policy as a redundancy versus volume of exhausted data trade-off.</t>
        <t>EDSR requires the redirection to another server to also use encrypted DNS, so no
third-party will be introduced to the data flow unless the encryption is broken.</t>
      </section>
      <section anchor="data-centralization">
        <name>Data centralization</name>
        <t>EDSR can only increase data centralization if multiple resolver operators choose to
redirect DNS clients to the same, other DNS resolver. To prevent the reduction of
their resolution redundancy, DNS clients <bcp14>MAY</bcp14> choose to ignore redirections if they
find that they point to resolvers they are already configured to use, by a previous
redirection or some other configuration.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This draft has no IANA considerations.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC9462">
          <front>
            <title>Discovery of Designated Resolvers</title>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="E. Kinnear" initials="E." surname="Kinnear"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <author fullname="T. Jensen" initials="T." surname="Jensen"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document defines Discovery of Designated Resolvers (DDR), a set of mechanisms for DNS clients to use DNS records to discover a resolver's encrypted DNS configuration. An Encrypted DNS Resolver discovered in this manner is referred to as a "Designated Resolver". These mechanisms can be used to move from unencrypted DNS to encrypted DNS when only the IP address of a resolver is known. These mechanisms are designed to be limited to cases where Unencrypted DNS Resolvers and their Designated Resolvers are operated by the same entity or cooperating entities. It can also be used to discover support for encrypted DNS protocols when the name of an Encrypted DNS Resolver is known.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9462"/>
          <seriesInfo name="DOI" value="10.17487/RFC9462"/>
        </reference>
        <reference anchor="RFC9345">
          <front>
            <title>Delegated Credentials for TLS and DTLS</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="S. Iyengar" initials="S." surname="Iyengar"/>
            <author fullname="N. Sullivan" initials="N." surname="Sullivan"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>The organizational separation between operators of TLS and DTLS endpoints and the certification authority can create limitations. For example, the lifetime of certificates, how they may be used, and the algorithms they support are ultimately determined by the Certification Authority (CA). This document describes a mechanism to overcome some of these limitations by enabling operators to delegate their own credentials for use in TLS and DTLS without breaking compatibility with peers that do not support this specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9345"/>
          <seriesInfo name="DOI" value="10.17487/RFC9345"/>
        </reference>
        <reference anchor="RFC9461">
          <front>
            <title>Service Binding Mapping for DNS Servers</title>
            <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>The SVCB DNS resource record type expresses a bound collection of endpoint metadata, for use when establishing a connection to a named service. DNS itself can be such a service, when the server is identified by a domain name. This document provides the SVCB mapping for named DNS servers, allowing them to indicate support for encrypted transport protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9461"/>
          <seriesInfo name="DOI" value="10.17487/RFC9461"/>
        </reference>
        <reference anchor="RFC9460">
          <front>
            <title>Service Binding and Parameter Specification via the DNS (SVCB and HTTPS Resource Records)</title>
            <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
            <author fullname="M. Bishop" initials="M." surname="Bishop"/>
            <author fullname="E. Nygren" initials="E." surname="Nygren"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies the "SVCB" ("Service Binding") and "HTTPS" DNS resource record (RR) types to facilitate the lookup of information needed to make connections to network services, such as for HTTP origins. SVCB records allow a service to be provided from multiple alternative endpoints, each with associated parameters (such as transport protocol configuration), and are extensible to support future uses (such as keys for encrypting the TLS ClientHello). They also enable aliasing of apex domains, which is not possible with CNAME. The HTTPS RR is a variation of SVCB for use with HTTP (see RFC 9110, "HTTP Semantics"). By providing more information to the client before it attempts to establish a connection, these records offer potential benefits to both performance and privacy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9460"/>
          <seriesInfo name="DOI" value="10.17487/RFC9460"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9463">
          <front>
            <title>DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers (DNR)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="T. Reddy.K" initials="T." role="editor" surname="Reddy.K"/>
            <author fullname="D. Wing" initials="D." surname="Wing"/>
            <author fullname="N. Cook" initials="N." surname="Cook"/>
            <author fullname="T. Jensen" initials="T." surname="Jensen"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies new DHCP and IPv6 Router Advertisement options to discover encrypted DNS resolvers (e.g., DNS over HTTPS, DNS over TLS, and DNS over QUIC). Particularly, it allows a host to learn an Authentication Domain Name together with a list of IP addresses and a set of service parameters to reach such encrypted DNS resolvers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9463"/>
          <seriesInfo name="DOI" value="10.17487/RFC9463"/>
        </reference>
        <reference anchor="RFC9115">
          <front>
            <title>An Automatic Certificate Management Environment (ACME) Profile for Generating Delegated Certificates</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="D. López" initials="D." surname="López"/>
            <author fullname="A. Pastor Perales" initials="A." surname="Pastor Perales"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="September" year="2021"/>
            <abstract>
              <t>This document defines a profile of the Automatic Certificate Management Environment (ACME) protocol by which the holder of an identifier (e.g., a domain name) can allow a third party to obtain an X.509 certificate such that the certificate subject is the delegated identifier while the certified public key corresponds to a private key controlled by the third party. A primary use case is that of a Content Delivery Network (CDN), the third party, terminating TLS sessions on behalf of a content provider (the holder of a domain name). The presented mechanism allows the holder of the identifier to retain control over the delegation and revoke it at any time. Importantly, this mechanism does not require any modification to the deployed TLS clients and servers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9115"/>
          <seriesInfo name="DOI" value="10.17487/RFC9115"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
      </references>
    </references>
    <?line 438?>

<section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank the following individuals for their invaluable feedback
to this document: Ben Schwartz, Eric Orth, Erik Nygren, Manu Bretelle, Med
Boucadair, Ralph Weber, Ted Hardie, Tommy Pauly, Viktor Dukhovni, and Vittorio Bertola.</t>
    </section>
    <section anchor="appendix">
      <name>Appendix</name>
      <t>This document describes only one mode of redirection. Previous
versions of this draft defined an additional mode of redirection that allowed servers to 
redirect to servers that presented a different domain name than the original server. While
the scenario's validity has some interest, there is no consensus in the WG for how it can 
be addressed in an acceptably secure fashion.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
