<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc comments="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-dnsop-dns-error-reporting-07" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="DNS-ER">DNS Error Reporting</title>

    <author initials="R." surname="Arends" fullname="Roy Arends">
      <organization>ICANN</organization>
      <address>
        <email>roy.arends@icann.org</email>
      </address>
    </author>
    <author initials="M." surname="Larson" fullname="Matt Larson">
      <organization>ICANN</organization>
      <address>
        <email>matt.larson@icann.org</email>
      </address>
    </author>

    <date year="2023" month="November" day="17"/>

    
    <workgroup>dnsop</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>DNS error reporting is a lightweight reporting mechanism that provides the operator of an authoritative server with reports on DNS resource records that fail to resolve or validate. A domain owner or DNS hosting organization can use these reports to improve domain hosting. The reports are based on extended DNS errors as described in RFC 8914.</t>

<t>When a domain name fails to resolve or validate due to a misconfiguration or an attack, the operator of the authoritative server may be unaware of this. To mitigate this lack of feedback, this document describes a method for a validating resolver to automatically signal an error to a monitoring agent specified by the authoritative server. The error is encoded in the QNAME, thus the very act of sending the query is to report the error.</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>
<t>When an authoritative server serves a stale DNSSEC-signed zone, the cryptographic signatures over the resource record sets (RRsets) may have lapsed. A validating  resolver will fail to validate these resource records.</t>

<t>Similarly, when there is a mismatch between the Delegation Signer (DS) records at a parent zone and the key signing key at the child zone, a validating resolver will fail to authenticate records in the child zone.</t>

<t>These are two of several failure scenarios that may go unnoticed for some time by the operator of a zone.</t>

<t>Today, there is no direct relationship between operators of validating resolvers and authoritative servers. Outages are often noticed indirectly by end users, and reported via E-Mail or social media (if reported at all).</t>

<t>When records fail to validate, there is no facility to report this failure in an automated way. If there is any indication that an error or warning has happened, it may be buried in log files of the resolver or not logged at all.</t>

<t>This document describes a method that can be used by validating resolvers to report DNSSEC validation errors in an automated way.</t>

<t>It allows an authoritative server to announce a monitoring agent where validating resolvers can report issues if those resolvers are configured to do so.</t>

<t>The burden to report a failure falls on the validating resolver. It is important that the effort needed to report failure is low, with minimal impact to its main functions. To accomplish this goal, the DNS itself is utilized to report the error.</t>

</section>
<section anchor="requirements-notation"><name>Requirements Notation</name>
<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>

</section>
<section anchor="terminology"><name>Terminology</name>

<t>DNS Terminology used in this document is from BCP 219 <xref target="RFC8499"/>, with these additions:</t>

<dl>
  <dt>Reporting resolver:</dt>
  <dd>
    <t>In the context of this document, "reporting resolver" is used as a shorthand for a validating resolver that supports DNS error reporting.</t>
  </dd>
  <dt>Report query:</dt>
  <dd>
    <t>The DNS query used to report an error is called a report query. A report query is for a DNS TXT resource record type. The content of the error report is encoded in the QNAME of a DNS request to the monitoring agent.</t>
  </dd>
  <dt>Monitoring agent:</dt>
  <dd>
    <t>An authoritative server that receives and responds to report queries. This facility is indicated by a domain name, referred to as the agent domain.</t>
  </dd>
  <dt>Agent domain:</dt>
  <dd>
    <t>A domain name which is returned in the DNS Error Reporting EDNS0 option that indicates where DNS resolvers can send error reports.</t>
  </dd>
</dl>

</section>
<section anchor="overview"><name>Overview</name>

<t>An authoritative server indicates support for DNS error reporting by including an EDNS0 Report-Channel option with OPTION-CODE [TBD] and the agent domain in the response. The agent domain is a fully qualified, uncompressed domain name in DNS wire format. The authoritative server MUST NOT include this option in the response if the configured agent domain is empty, or is the null label (which would indicate the DNS root).</t>

<t>The authoritative server includes the EDNS0 Report-Channel option unsolicited. That is, the option is included in a response despite the EDNS0 Report-Channel option being absent in the request.</t>

<t>If the authoritative server has indicated support for DNS error reporting and there is an issue that can be reported via extended DNS errors, the reporting resolver encodes the error report in the QNAME of the report query. The reporting resolver builds this QNAME by concatenating the _er label, the QTYPE, the QNAME that resulted in failure, the extended error code (as described in <xref target="RFC8914"/>), the label "_er" again, and the agent domain. See the example in <xref target="example"/>. Note that a regular RCODE is not included because the RCODE is not relevant to the extended error code.</t>

<t>The resulting report query is sent as a standard DNS query for a TXT DNS resource record type by the reporting resolver.</t>

<t>The report query will ultimately arrive at the monitoring agent. A response is returned by the monitoring agent, which in turn can be cached by the reporting resolver. This caching is essential. It dampens the number of report queries sent by a reporting resolver for the same problem, that is, once per TTL. However, certain optimizations such as <xref target="RFC8020"/> and <xref target="RFC8198"/> may reduce the number of error report queries as well.</t>

<t>This document gives no guidance on the content of the TXT resource record RDATA for this record.</t>

<section anchor="managing-caching-optimizations"><name>Managing Caching Optimizations</name>

<t>The reporting resolver may utilize various caching optimizations that inhibit subsequent error reporting to the same monitoring agent.</t>

<t>If the monitoring agent were to respond with NXDOMAIN (name error), <xref target="RFC8020"/> says that any name at or below that domain should be considered unreachable, and negative caching would prohibit subsequent queries for anything at or below that domain for a period of time, depending on the negative TTL <xref target="RFC2308"/>.</t>

<t>Since the monitoring agent may not know the contents of all the zones for which it acts as a monitoring agent, the monitoring agent MUST NOT respond with NXDOMAIN for domains it is monitoring because that could inhibit subsequent queries. One method to avoid NXDOMAIN is to use a wildcard domain name <xref target="RFC4592"/> in the zone for the agent domain.</t>

<t>When the agent domain is signed, a resolver may use aggressive negative caching (described in <xref target="RFC8198"/>). This optimization makes use of NSEC and NSEC3 (without opt-out) records and allows the resolver to do the wildcard synthesis. When this happens, the resolver does not send subsequent queries because it will be able to synthesize a response from previously cached material.</t>

<t>A solution is to avoid DNSSEC for the agent domain. Signing the agent domain will incur an additional burden on the reporting resolver, as it has to validate the response. However, this response has no utility to the reporting resolver other than dampening the query load for error reports.</t>

<t>The agent domain SHOULD NOT be signed.</t>

</section>
<section anchor="example"><name>Example</name>
<t>A query for "broken.test.", type A, is sent by a reporting resolver.</t>

<t>The domain "test." is hosted on a set of authoritative servers. One of these authoritative servers serves a stale version of the "test." zone. This authoritative server has an agent domain configured: "a01.agent-domain.example.".</t>

<t>The authoritative server with the stale "test." zone receives the request for "broken.test". It returns a response that includes the EDNS0 Report-Channel option with the domain name "a01.agent-domain.example.".</t>

<t>The reporting resolver is unable to validate the "broken.test" RRSet for type 1 (an A record), due to an RRSIG record with an expired signature.</t>

<t>The reporting resolver constructs the QNAME "_er.1.broken.test.7._er.a01.agent-domain.example." and resolves it. This QNAME indicates extended DNS error 7 occurred while trying to validate "broken.test." type 1 record.</t>

<t>When this query is received at the monitoring agent (the operators of the authoritative server for a01.agent-domain.example), the agent can determine the "test." zone contained an expired signature record (extended error 7) for type A for the domain name "broken.test.". The monitoring agent can contact the operators of "test." to fix the issue.</t>

</section>
</section>
<section anchor="edns0-option-specification"><name>EDNS0 Option Specification</name>
<t>This method uses an EDNS0 <xref target="RFC6891"/> option to indicate the agent domain in DNS responses. The option is structured as follows:</t>

<figure><artwork><![CDATA[
                     1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 3 3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1                     
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|        OPTION-CODE = TBD      |       OPTION-LENGTH           |
+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
/                         AGENT DOMAIN                          /
+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
]]></artwork></figure>

<t>Field definition details:</t>

<dl>
  <dt>OPTION-CODE:</dt>
  <dd>
    <t>2 octets; an EDNS0 code that is used in an EDNS0 option to indicate support for error reporting.  The name for this EDNS0 option code is Report-Channel.</t>
  </dd>
  <dt>OPTION-LENGTH:</dt>
  <dd>
    <t>2-octets; contains the length of the AGENT DOMAIN field in octets.</t>
  </dd>
  <dt>AGENT DOMAIN:</dt>
  <dd>
    <t>A fully qualified domain name <xref target="RFC8499"/> in uncompressed DNS wire format.</t>
  </dd>
</dl>

</section>
<section anchor="dns-error-reporting-specification"><name>DNS error reporting specification</name>
<t>The various errors that a reporting resolver may encounter are listed in <xref target="RFC8914"/>. Note that not all listed errors may be supported by the reporting resolver. This document does not specify what is or is not an error.</t>

<t>The DNS class is not specified in the error report.</t>

<section anchor="reporting-resolver-specification"><name>Reporting Resolver Specification</name>
<t>The reporting resolver MUST NOT use DNS error reporting to report a failure in resolving the report query.</t>

<t>The EDNS0 Report-Channel option MUST NOT be included in queries.</t>

<t>The reporting resolver MUST NOT use DNS error reporting if the authoritative server returned an empty agent domain field in the EDNS0 Report-Channel option.</t>

<t>The reporting resolver SHOULD send error reports over TCP
<xref target="RFC7766"/> or SHOULD use DNS COOKIEs <xref target="RFC7873"/>.  This makes it hard to
falsify the source address.</t>

<section anchor="constructing-the-report-query"><name>Constructing the Report Query</name>

<t>The QNAME for the report query is constructed by concatenating the following elements:</t>

<t><list style="symbols">
  <t>A label containing the string "_er".</t>
  <t>The QTYPE that was used in the query that resulted in the extended DNS error, presented as a decimal value, in a single DNS label.</t>
  <t>The list of non-null labels representing the query name which is the subject of the DNS error report.</t>
  <t>The extended DNS error, presented as a decimal value, in a single DNS label.</t>
  <t>A label containing the string "_er".</t>
  <t>The agent domain. The agent domain as received in the EDNS0 Report-Channel option set by the authoritative server.</t>
</list></t>

<t>If the report query QNAME exceeds 255 octets, it MUST NOT be sent.</t>

<t>The "_er" labels allow the monitoring agent to differentiate between the agent domain and the faulty query name. When the specified agent domain is empty, or a null label (despite being not allowed in this specification), the report query will have "_er" as a top-level domain as a result and not the original query. The purpose of the first "_er" label is to indicate that a complete report query has been received, instead of a shorter report query due to query minimization.</t>

</section>
</section>
<section anchor="authoritative-server-specification"><name>Authoritative server specification</name>
<t>The authoritative server MUST NOT include more than one EDNS0 Report-Channel option in a response.</t>

<t>The authoritative server includes the EDNS0 Report-Channel option unsolicited in responses. There is no requirement that the EDNS0 Report-Channel option is present in queries.</t>

</section>
<section anchor="monitoring-agent-specification"><name>Monitoring agent specification</name>
<t>It is RECOMMENDED that the authoritative server for the agent domain replies with a positive response (i.e. not NODATA or NXDOMAIN) containing a TXT record.</t>

<t>The monitoring agent SHOULD respond to queries received over UDP that have no DNS COOKIE set with a response that has the truncation bit (TC bit) set to challenge the resolver to re-query over TCP.</t>

</section>
<section anchor="choosing-an-agent-domain"><name>Choosing an agent domain</name>
<t>It is RECOMMENDED that the agent domain be kept relatively short to allow for a longer QNAME in the report query.</t>

</section>
</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>
<t>IANA is requested to assign the following DNS EDNS0 option code registry:</t>

<figure><artwork><![CDATA[
      Value Name           Status   Reference
      ----- -------------- -------- ---------------
      TBD   Report-Channel Standard [this document]
]]></artwork></figure>

<t>IANA is requested to assign the following Underscored and Globally Scoped DNS Node Name registry:</t>

<figure><artwork><![CDATA[
      RR Type  _NODE NAME  Reference
      -----    ----------  ---------   
      TXT      _er         [this document]
]]></artwork></figure>

</section>
<section anchor="security-considerations"><name>Security considerations</name>
<t>Use of DNS error reporting may expose local configuration mistakes in the reporting resolver, such as stale DNSSEC trust anchors to the monitoring agent.</t>

<t>DNS error reporting SHOULD be done using DNS query name minimization <xref target="RFC9156"/> to improve privacy.</t>

<t>DNS error reporting is done without any authentication between the reporting resolver and the authoritative server of the agent domain.</t>

<t>Resolvers that send error reports SHOULD send these over TCP <xref target="RFC7766"/> or SHOULD use DNS COOKIEs <xref target="RFC7873"/>. This makes it hard to falsify the source address. The monitoring agent SHOULD respond to queries received over UDP that have no DNS COOKIE set with a response that has the truncation bit (TC bit) set to challenge the resolver to re-query over TCP.</t>

<t>Well known addresses of reporting resolvers can provide a higher level of confidence in the error reports, and potentially enable more automated processing of these reports.</t>

<t>Monitoring agents that receive error reports over UDP should consider that the source of the reports and the reports itself may be false.</t>

<t>The method described in this document will cause additional queries by the reporting resolver to authoritative servers in order to resolve the report query.</t>

<t>This method can be abused by intentionally deploying broken zones with agent domains that are delegated to victims.  This is particularly effective when DNS requests that trigger error messages are sent through
open resolvers <xref target="RFC8499"/> or widely distributed network monitoring systems that perform distributed queries from around the globe.</t>

<t>An adversary may create massive error report flooding to camouflage an attack.</t>

</section>
<section anchor="acknowledgements"><name>Acknowledgements</name>
<t>This document is based on an idea by Roy Arends and David Conrad. The authors would like to thank Peter van Dijk, Stephane Bortzmeyer, Shane Kerr, Vladimir Cunat, Paul Hoffman, Philip Homburg, Mark Andrews, Libor Peltan, Matthijs Mekking, Willem Toorop, Tom Carpay, Dick Franks, Ben Schwartz, Yaron Sheffer, Viktor Dukhovni, Wes Hardaker, James Gannon, Tim Wicinski, Warren Kumari, Gorry Fairhurst, Benno Overeinder and Petr Spacek for their contributions.</t>

</section>


  </middle>

  <back>



    <references title='Informative References'>



<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname='S. Bradner' initials='S.' surname='Bradner'/>
    <date month='March' year='1997'/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name='BCP' value='14'/>
  <seriesInfo name='RFC' value='2119'/>
  <seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>

<reference anchor='RFC8174' target='https://www.rfc-editor.org/info/rfc8174'>
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname='B. Leiba' initials='B.' surname='Leiba'/>
    <date month='May' year='2017'/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name='BCP' value='14'/>
  <seriesInfo name='RFC' value='8174'/>
  <seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>

<reference anchor='RFC8499' target='https://www.rfc-editor.org/info/rfc8499'>
  <front>
    <title>DNS Terminology</title>
    <author fullname='P. Hoffman' initials='P.' surname='Hoffman'/>
    <author fullname='A. Sullivan' initials='A.' surname='Sullivan'/>
    <author fullname='K. Fujiwara' initials='K.' surname='Fujiwara'/>
    <date month='January' year='2019'/>
    <abstract>
      <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has sometimes changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
      <t>This document obsoletes RFC 7719 and updates RFC 2308.</t>
    </abstract>
  </front>
  <seriesInfo name='BCP' value='219'/>
  <seriesInfo name='RFC' value='8499'/>
  <seriesInfo name='DOI' value='10.17487/RFC8499'/>
</reference>

<reference anchor='RFC8914' target='https://www.rfc-editor.org/info/rfc8914'>
  <front>
    <title>Extended DNS Errors</title>
    <author fullname='W. Kumari' initials='W.' surname='Kumari'/>
    <author fullname='E. Hunt' initials='E.' surname='Hunt'/>
    <author fullname='R. Arends' initials='R.' surname='Arends'/>
    <author fullname='W. Hardaker' initials='W.' surname='Hardaker'/>
    <author fullname='D. Lawrence' initials='D.' surname='Lawrence'/>
    <date month='October' year='2020'/>
    <abstract>
      <t>This document defines an extensible method to return additional information about the cause of DNS errors. Though created primarily to extend SERVFAIL to provide additional information about the cause of DNS and DNSSEC failures, the Extended DNS Errors option defined in this document allows all response types to contain extended error information. Extended DNS Error information does not change the processing of RCODEs.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8914'/>
  <seriesInfo name='DOI' value='10.17487/RFC8914'/>
</reference>

<reference anchor='RFC8020' target='https://www.rfc-editor.org/info/rfc8020'>
  <front>
    <title>NXDOMAIN: There Really Is Nothing Underneath</title>
    <author fullname='S. Bortzmeyer' initials='S.' surname='Bortzmeyer'/>
    <author fullname='S. Huque' initials='S.' surname='Huque'/>
    <date month='November' year='2016'/>
    <abstract>
      <t>This document states clearly that when a DNS resolver receives a response with a response code of NXDOMAIN, it means that the domain name which is thus denied AND ALL THE NAMES UNDER IT do not exist.</t>
      <t>This document clarifies RFC 1034 and modifies a portion of RFC 2308: it updates both of them.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8020'/>
  <seriesInfo name='DOI' value='10.17487/RFC8020'/>
</reference>

<reference anchor='RFC8198' target='https://www.rfc-editor.org/info/rfc8198'>
  <front>
    <title>Aggressive Use of DNSSEC-Validated Cache</title>
    <author fullname='K. Fujiwara' initials='K.' surname='Fujiwara'/>
    <author fullname='A. Kato' initials='A.' surname='Kato'/>
    <author fullname='W. Kumari' initials='W.' surname='Kumari'/>
    <date month='July' year='2017'/>
    <abstract>
      <t>The DNS relies upon caching to scale; however, the cache lookup generally requires an exact match. This document specifies the use of NSEC/NSEC3 resource records to allow DNSSEC-validating resolvers to generate negative answers within a range and positive answers from wildcards. This increases performance, decreases latency, decreases resource utilization on both authoritative and recursive servers, and increases privacy. Also, it may help increase resilience to certain DoS attacks in some circumstances.</t>
      <t>This document updates RFC 4035 by allowing validating resolvers to generate negative answers based upon NSEC/NSEC3 records and positive answers in the presence of wildcards.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8198'/>
  <seriesInfo name='DOI' value='10.17487/RFC8198'/>
</reference>

<reference anchor='RFC2308' target='https://www.rfc-editor.org/info/rfc2308'>
  <front>
    <title>Negative Caching of DNS Queries (DNS NCACHE)</title>
    <author fullname='M. Andrews' initials='M.' surname='Andrews'/>
    <date month='March' year='1998'/>
    <abstract>
      <t>RFC1034 provided a description of how to cache negative responses. It however had a fundamental flaw in that it did not allow a name server to hand out those cached responses to other resolvers, thereby greatly reducing the effect of the caching. This document addresses issues raise in the light of experience and replaces RFC1034 Section 4.3.4. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='2308'/>
  <seriesInfo name='DOI' value='10.17487/RFC2308'/>
</reference>

<reference anchor='RFC4592' target='https://www.rfc-editor.org/info/rfc4592'>
  <front>
    <title>The Role of Wildcards in the Domain Name System</title>
    <author fullname='E. Lewis' initials='E.' surname='Lewis'/>
    <date month='July' year='2006'/>
    <abstract>
      <t>This is an update to the wildcard definition of RFC 1034. The interaction with wildcards and CNAME is changed, an error condition is removed, and the words defining some concepts central to wildcards are changed. The overall goal is not to change wildcards, but to refine the definition of RFC 1034. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='4592'/>
  <seriesInfo name='DOI' value='10.17487/RFC4592'/>
</reference>

<reference anchor='RFC6891' target='https://www.rfc-editor.org/info/rfc6891'>
  <front>
    <title>Extension Mechanisms for DNS (EDNS(0))</title>
    <author fullname='J. Damas' initials='J.' surname='Damas'/>
    <author fullname='M. Graff' initials='M.' surname='Graff'/>
    <author fullname='P. Vixie' initials='P.' surname='Vixie'/>
    <date month='April' year='2013'/>
    <abstract>
      <t>The Domain Name System's wire protocol includes a number of fixed fields whose range has been or soon will be exhausted and does not allow requestors to advertise their capabilities to responders. This document describes backward-compatible mechanisms for allowing the protocol to grow.</t>
      <t>This document updates the Extension Mechanisms for DNS (EDNS(0)) specification (and obsoletes RFC 2671) based on feedback from deployment experience in several implementations. It also obsoletes RFC 2673 ("Binary Labels in the Domain Name System") and adds considerations on the use of extended labels in the DNS.</t>
    </abstract>
  </front>
  <seriesInfo name='STD' value='75'/>
  <seriesInfo name='RFC' value='6891'/>
  <seriesInfo name='DOI' value='10.17487/RFC6891'/>
</reference>

<reference anchor='RFC9156' target='https://www.rfc-editor.org/info/rfc9156'>
  <front>
    <title>DNS Query Name Minimisation to Improve Privacy</title>
    <author fullname='S. Bortzmeyer' initials='S.' surname='Bortzmeyer'/>
    <author fullname='R. Dolmans' initials='R.' surname='Dolmans'/>
    <author fullname='P. Hoffman' initials='P.' surname='Hoffman'/>
    <date month='November' year='2021'/>
    <abstract>
      <t>This document describes a technique called "QNAME minimisation" to improve DNS privacy, where the DNS resolver no longer always sends the full original QNAME and original QTYPE to the upstream name server. This document obsoletes RFC 7816.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='9156'/>
  <seriesInfo name='DOI' value='10.17487/RFC9156'/>
</reference>

<reference anchor='RFC7766' target='https://www.rfc-editor.org/info/rfc7766'>
  <front>
    <title>DNS Transport over TCP - Implementation Requirements</title>
    <author fullname='J. Dickinson' initials='J.' surname='Dickinson'/>
    <author fullname='S. Dickinson' initials='S.' surname='Dickinson'/>
    <author fullname='R. Bellis' initials='R.' surname='Bellis'/>
    <author fullname='A. Mankin' initials='A.' surname='Mankin'/>
    <author fullname='D. Wessels' initials='D.' surname='Wessels'/>
    <date month='March' year='2016'/>
    <abstract>
      <t>This document specifies the requirement for support of TCP as a transport protocol for DNS implementations and provides guidelines towards DNS-over-TCP performance on par with that of DNS-over-UDP. This document obsoletes RFC 5966 and therefore updates RFC 1035 and RFC 1123.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='7766'/>
  <seriesInfo name='DOI' value='10.17487/RFC7766'/>
</reference>

<reference anchor='RFC7873' target='https://www.rfc-editor.org/info/rfc7873'>
  <front>
    <title>Domain Name System (DNS) Cookies</title>
    <author fullname='D. Eastlake 3rd' initials='D.' surname='Eastlake 3rd'/>
    <author fullname='M. Andrews' initials='M.' surname='Andrews'/>
    <date month='May' year='2016'/>
    <abstract>
      <t>DNS Cookies are a lightweight DNS transaction security mechanism that provides limited protection to DNS servers and clients against a variety of increasingly common denial-of-service and amplification/ forgery or cache poisoning attacks by off-path attackers. DNS Cookies are tolerant of NAT, NAT-PT (Network Address Translation - Protocol Translation), and anycast and can be incrementally deployed. (Since DNS Cookies are only returned to the IP address from which they were originally received, they cannot be used to generally track Internet users.)</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='7873'/>
  <seriesInfo name='DOI' value='10.17487/RFC7873'/>
</reference>




    </references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

