<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-dnsop-structured-dns-error-15" category="std" consensus="true" submissionType="IETF" updates="8914" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.1 -->
  <front>
    <title abbrev="Structured DNS Error">Structured Error Data for Filtered DNS</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-dnsop-structured-dns-error-15"/>
    <author fullname="Dan Wing">
      <organization abbrev="Citrix">Citrix Systems, Inc.</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>danwing@gmail.com</email>
      </address>
    </author>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Neil Cook">
      <organization>Open-Xchange</organization>
      <address>
        <postal>
          <country>United Kingdom</country>
        </postal>
        <email>neil.cook@noware.co.uk</email>
      </address>
    </author>
    <author fullname="Mohamed Boucadair">
      <organization>Orange</organization>
      <address>
        <postal>
          <street>Rennes</street>
          <code>35000</code>
          <country>France</country>
        </postal>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <date year="2025" month="May" day="05"/>
    <area>Internet</area>
    <workgroup>DNS Operations Working Group</workgroup>
    <keyword>Customer experience</keyword>
    <keyword>Informed decision</keyword>
    <keyword>transparency</keyword>
    <keyword>enriched feedback</keyword>
    <abstract>
      <?line 86?>

<t>DNS filtering is widely deployed for various reasons, including
network security. However, filtered DNS responses lack structured information
for end users to understand the reason for the filtering.
Existing mechanisms to provide explanatory details to end users cause harm
especially if the blocked DNS response is for HTTPS resources.</t>
      <t>This document updates RFC 8914 by signaling client support for structuring the EXTRA-TEXT field of
the Extended DNS Error to provide details on the DNS filtering. Such
details can be parsed by the client and displayed, logged, or used for
other purposes.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://ietf-wg-dnsop.github.io/draft-ietf-dnsop-structured-dns-error/draft-ietf-dnsop-structured-dns-error.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-dnsop-structured-dns-error/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        dnsop Working Group mailing list (<eref target="mailto:dnsop@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/dnsop/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/dnsop/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-wg-dnsop/draft-ietf-dnsop-structured-dns-error"/>.</t>
    </note>
  </front>
  <middle>
    <?line 99?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>DNS filters are deployed for a variety of reasons, e.g., endpoint
security, parental filtering, and filtering required by law
enforcement. Network-based security solutions such as firewalls and
Intrusion Prevention Systems (IPS) rely upon network traffic
inspection to implement perimeter-based security policies and operate
by filtering DNS responses. In a home network, DNS filtering is used for the
same reasons as above and additionally for parental control. Internet
Service Providers (ISPs) typically block access to some DNS domains due to a
requirement imposed by an external entity (e.g., law enforcement
agency) also performed using DNS-based content filtering.</t>
      <t>End-users or network administrators leveraging DNS services that perform filtering may wish to receive more
explanatory information about such a filtering to resolve problems with the filter
-- for example to contact the DNS service administrator to allowlist a DNS domain that
was erroneously filtered or to understand the reason a particular
domain was filtered. With that information, they can choose
to use another network, open a trouble ticket with the DNS service administrator to
resolve erroneous filtering, log the information, etc.</t>
      <t>For the DNS filtering mechanisms described in <xref target="existing-techniques"/>, the DNS
server can return extended error codes Blocked, Filtered, Censored, or
Forged Answer defined in <xref section="4" sectionFormat="of" target="RFC8914"/>. However, these codes
only explain that filtering occurred but lack detail for the user to
diagnose erroneous filterings.</t>
      <t>No matter which type of response is generated (forged IP address(es),
NXDOMAIN or empty answer, even with an extended error code), the user
who triggered the DNS query has little chance to understand which
entity filtered the query, how to report a mistake in the filter, or
why the entity filtered it at all. This document describes a mechanism
to provide such detail.</t>
      <t>One of the other benefits of the approach described in this document is to eliminate the need to
"spoof" block pages for HTTPS resources. This is achieved since
clients implementing this approach would be able to display a
meaningful error message, and would not need to connect to such a
block page. This approach thus avoids the need to install a local root
certificate authority on those IT-managed devices.</t>
      <t>This document describes a format for computer-parsable data in the
EXTRA-TEXT field of <xref target="RFC8914"/>. It updates <xref section="2" sectionFormat="of" target="RFC8914"/> which
says the information in EXTRA-TEXT field is intended for human
consumption (not automated parsing).</t>
      <t>This document does not recommend DNS filtering but provides a
mechanism for better transparency to explain to the users why some DNS
queries are filtered.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document uses terms defined in DNS Terminology <xref target="RFC9499"/>.</t>
      <t>"Requestor" refers to the side that sends a request. "Responder"
refers to an authoritative, recursive resolver, or other DNS component
that responds to questions.</t>
      <t>"Encrypted DNS" refers to any encrypted scheme to convey DNS messages,
for example, DNS-over-HTTPS <xref target="RFC8484"/>, DNS-over-TLS <xref target="RFC7858"/>, or
DNS-over-QUIC <xref target="RFC9250"/>.</t>
      <t>The document refers to an Extended DNS Error (EDE) using its purpose, not its
INFO-CODE as per Table 3 of <xref target="RFC8914"/>. "Forged Answer",
"Blocked", "Censored", and "Filtered" are thus used to refer to "Forged Answer (4)",
"Blocked (15)", "Censored (16)",and "Filtered (17)".</t>
      <t>The term "DNS server" refers to a DNS recursive resolver or
a DNS forwarder that generates DNS structured error responses.</t>
    </section>
    <section anchor="existing-techniques">
      <name>DNS Filtering Techniques and Their Limitations</name>
      <t>DNS responses can be filtered by sending, e.g., a bogus (also called
"forged") response, NXDOMAIN error, or empty answer. Also, clients can be informed that filtering has occured by sending an
Extended DNS Error code defined in <xref target="RFC8914"/>. Each of these
methods have advantages and disadvantages that are discussed below:</t>
      <ol spacing="normal" type="1"><li>
          <t>The DNS response is forged to provide a list of IP addresses that
points to an HTTP(S) server alerting the end user about the reason for
blocking access to the requested domain (e.g., malware). If the authority component
of an HTTP(S) URL is blocked, the network security device
(e.g., Customer Premises Equipment (CPE) or firewall) presents a block page instead of the HTTP
response from the content provider hosting that domain. If the authority component
of an HTTP URL is blocked, the network security device intercepts
the HTTP request and returns a block page over HTTP. If the authority component
of an HTTPS URL is blocked, the network security device serves the block page over HTTPS.
In order to return a block page over HTTPS, the network security device uses a locally
generated root certificate and corresponding key pair. The local root certificate is
installed on the endpoint while the network security device stores a copy of the private key.
During the TLS handshake, the on-path network security device modifies the certificate
provided by the server and (re)signs it using the private key from the local root
certificate.  </t>
          <ul spacing="normal">
            <li>
              <t>However, in deployments where DNSSEC is used, this approach becomes ineffective because DNSSEC
ensures the integrity and authenticity of DNS responses, preventing forged DNS
responses from being accepted.</t>
            </li>
            <li>
              <t>The HTTPS server hosted on the network security device will have access to the client's IP address and the
hostname being requested. This information will be sensitive, as it will expose the user's identity and the
domain name that a user attempted to access.</t>
            </li>
            <li>
              <t>Configuring a local root certificate on endpoints is
not a viable option in several deployments like home networks,
schools, Small Office/Home Office (SOHO), or Small/Medium
Enterprise (SME). In these cases, the typical behavior is that
the filtered DNS response points to a server that will display
the block page. If the client is using HTTPS (via a web browser or
another application) this results in a certificate validation
error which gives no information to the end-user about the reason
for the DNS filtering.</t>
            </li>
            <li>
              <t>Enterprise networks do not always assume that all the connected devices
are managed by the IT team or Mobile Device Management (MDM)
devices, especially in the quite common Bring Your Own Device
(BYOD) scenario. In addition, the local root certificate cannot
be installed on IoT devices without a device management tool.</t>
            </li>
            <li>
              <t>An end user does not know why the connection was prevented and,
consequently, may repeatedly try to reach the domain but with no
success. Frustrated, the end user may switch to an alternate
network that offers no DNS filtering against malware and
phishing, potentially compromising both security and
privacy. Furthermore, certificate errors train users to click
through certificate errors, which is a bad security practice. To
eliminate the need for an end user to click through certificate
errors, an end user may manually install a local root certificate
on a host device. Doing so, however, is also a bad security
practice as it creates a security vulnerability that may be
exploited by a MITM attack. When a manually installed local root
certificate expires, the user has to (again) manually install the
new local root certificate.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>The DNS response is forged to provide an NXDOMAIN answer, causing the DNS lookup to fail. This approach is incompatible with DNSSEC when the client performs validation, as the forged response will fail DNSSEC checks. However, in deployments where the client relies on the DNS server to perform DNSSEC validation, a filtering DNS server can forge an NXDOMAIN response for a valid domain, and the client will trust it. This undermines the integrity guarantees of DNSSEC, as the client has no way to distinguish between a genuine and a forged response. Further, the end user may not understand why a domain cannot be reached and may repeatedly attempt access without success. Frustrated, the user may resort to using insecure methods to reach the domain, potentially compromising both security and privacy.</t>
        </li>
        <li>
          <t>The extended error codes Blocked and Filtered defined in
<xref section="4" sectionFormat="of" target="RFC8914"/> can be returned by a DNS server to provide
additional information about the cause of a DNS error.
These extended error codes do not suffer from the limitations
discussed in bullets (1) and (2), but the user still does not know the
exact reason nor is aware of the exact entity blocking the
access to the domain. For example, a DNS server may block access to a
domain based on the content category such as "Malware" to protect the
endpoint from malicious software, "Phishing" to prevent the user from
revealing sensitive information to the attacker, etc. A user may need to
know the contact details of the IT/InfoSec team to raise a complaint.</t>
        </li>
      </ol>
    </section>
    <section anchor="name-spec">
      <name>I-JSON in EXTRA-TEXT Field</name>
      <t>DNS servers that are compliant with this specification and have received an indication that the client also supports this specification as per <xref target="client-request"/> send data in the EXTRA-TEXT field <xref target="RFC8914"/> encoded using the Internet JSON (I-JSON)
message format <xref target="RFC7493"/>.</t>
      <ul empty="true">
        <li>
          <t>Note that <xref target="RFC7493"/> was based on <xref target="RFC7159"/>, but <xref target="RFC7159"/> was replaced by <xref target="RFC8259"/>.</t>
        </li>
      </ul>
      <t>This document defines the following JSON names:</t>
      <dl>
        <dt>c: (contact)</dt>
        <dd>
          <t>The contact details of the IT/InfoSec team to report mis-classified
DNS filtering. This information is important for transparency and also to ease unblocking a legitimate domain name that got blocked due to wrong classification.</t>
        </dd>
        <dt/>
        <dd>
          <t>This field is structured as an array of contact URIs that <bcp14>MUST</bcp14> use 'tel' <xref target="RFC3966"/> or 'sips' <xref target="RFC5630"/> or  'mailto' <xref target="RFC3966"/> schemes. At least one contact URI <bcp14>MUST</bcp14> be included.</t>
        </dd>
        <dt/>
        <dd>
          <t>New contact URI schemes may be added to the IANA registry following the instructions in <xref target="IANA-Contact"/>.</t>
        </dd>
        <dt/>
        <dd>
          <t>This field is mandatory.</t>
        </dd>
        <dt>j: (justification)</dt>
        <dd>
          <t>'UTF-8'-encoded <xref target="RFC5198"/> textual justification for this particular
DNS filtering. The field should be treated only as diagnostic
information for IT staff.</t>
        </dd>
        <dt/>
        <dd>
          <t>Whether the information provided in the "j" name is meaningful or considered as garbage data
(including empty values) is local to each IT teams. Returning garbage data
would indicate that a DNS server is misbehaving. Note also that the provided
justification is useful for cross-validation with another DNS server.</t>
        </dd>
        <dt/>
        <dd>
          <t>This field is mandatory.</t>
        </dd>
        <dt>s: (sub-error)</dt>
        <dd>
          <t>An integer representing the sub-error code for this particular DNS filtering case.</t>
        </dd>
        <dt/>
        <dd>
          <t>The integer values are defined in the IANA-managed registry for DNS Sub-Error Codes in <xref target="IANA-SubError"/>.</t>
        </dd>
        <dt/>
        <dd>
          <t>This field is optional.</t>
        </dd>
        <dt>o: (organization)</dt>
        <dd>
          <t>'UTF-8'-encoded human-friendly name of the organization that filtered this particular DNS query.</t>
        </dd>
        <dt/>
        <dd>
          <t>This field is optional.</t>
        </dd>
        <dt>l: (language)</dt>
        <dd>
          <t>The "l" field indicates the language used for the JSON-encoded "j" and "o" fields.  The value of this field <bcp14>MUST</bcp14> conform to the
language tag syntax specified in <xref section="2.1" sectionFormat="of" target="RFC5646"/>.</t>
        </dd>
        <dt/>
        <dd>
          <t>This field is optional but <bcp14>RECOMMENDED</bcp14> to aid in localization.</t>
        </dd>
      </dl>
      <t>New JSON names can be defined in the IANA registry introduced in <xref target="IANA-Names"/>. Such names <bcp14>MUST</bcp14>
consist only of lower-case ASCII characters, digits, and hyphen-minus (that
is, Unicode characters U+0061 through 007A, U+0030 through U+0039, and
U+002D). Also, these names <bcp14>MUST</bcp14> be 63 characters or shorter and it is
<bcp14>RECOMMENDED</bcp14> they be as short as possible.</t>
      <t>The text in the "j" and "o" names can include international
characters. The text will be in natural language, chosen by the DNS administrator
to match its expected audience.</t>
      <t>If the client supports diagnostic interfaces, it <bcp14>MAY</bcp14> use the "l" field to identify
the language of the "j" text and optionally translate it for IT administrators.</t>
      <t>The "o" field <bcp14>MAY</bcp14> be displayed to end users, subject to the conditions described in <xref target="security"/>.
If the text is in a language not understood by the end-user, the "l" field can be used
to identify the language and support translation into the end-user's preferred language.</t>
      <t>To reduce DNS message size the generated JSON <bcp14>SHOULD</bcp14> be as short as
possible: short domain names, concise text in the values for the "j"
and "o" names, and minified JSON (that is, without spaces or line
breaks between JSON elements).</t>
      <t>The JSON data can be parsed to display to the user, logged, or
otherwise used to assist the end-user or IT staff with troubleshooting
and diagnosing the cause of the DNS filtering.</t>
      <t>The sub-error codes provide a structured way to communicate more detailed and precise communication of the cause of an error (e.g., distinguishing between malware-related blocking and phishing-related blocking under the general blocked error).</t>
      <ul empty="true">
        <li>
          <t>An alternate design for conveying the sub-error would be to define new EDE codes for these errors. However, such design is suboptimal because it requires replicating an error code for each EDE code to which the sub-error applies (e.g., "Malware" sub-error in <xref target="reg"/> would consume three EDE codes).</t>
        </li>
      </ul>
    </section>
    <section anchor="protocol-operation">
      <name>Protocol Operation</name>
      <section anchor="client-request">
        <name>Client Generating Request</name>
        <t>When generating a DNS query the client includes the EDE option (<xref section="2" sectionFormat="of" target="RFC8914"/>) in the OPT pseudo-RR <xref target="RFC6891"/> to
elicit the EDE option in the DNS response. It <bcp14>MUST</bcp14> use an
OPTION-LENGTH of 2, the INFO-CODE field set to "0"
(Other Error), and an empty EXTRA-TEXT field.  This signal indicates
that the client desires that the server responds in accordance with
the present specification.</t>
      </section>
      <section anchor="server-response">
        <name>Server Generating Response</name>
        <t>When the DNS server filters its DNS response to a
query (e.g., A or AAAA resource record query), the DNS response <bcp14>MAY</bcp14> contain an empty answer, NXDOMAIN, or (less
ideally) forged response, as desired by the DNS
server. In addition, if the query contained the OPT pseudo-RR the DNS
server <bcp14>MAY</bcp14> return more detail in the EXTRA-TEXT field as described in
<xref target="client-processing"/>.</t>
        <t>Servers <bcp14>MAY</bcp14> decide to return small TTL values in filtered DNS
responses (e.g., 10 seconds) to handle domain category and reputation
updates. Short TTLs allow for quick adaptation to dynamic changes in domain filtering decisions,
but can result in increased query traffic. In cases where updates are less frequent,
TTL values of 30 to 60 seconds <bcp14>MAY</bcp14> provide a better balance, reducing server load while
still ensuring reasonable flexibility for updates.</t>
        <t>Because the DNS client signals its EDE support (<xref target="client-request"/>)
and because EDE support is signaled via a non-cached OPT resource
record (<xref section="6.2.1" sectionFormat="of" target="RFC6891"/>) the EDE-aware DNS server can
tailor its filtered response to be most appropriate to that client's
EDE support.  If EDE support is signaled in the query as per <xref target="client-request"/>, the server <bcp14>MUST
NOT</bcp14> return the "Forged Answer" extended error code because the client
can take advantage of EDE's more sophisticated error reporting (e.g.,
"Filtered", "Blocked").  Continuing to send "Forged
Answer" even to an EDE-supporting client will cause the persistence of
the drawbacks described in <xref target="existing-techniques"/>.</t>
        <t>When the "Censored" extended error code is included in the DNS response,
the "c", "j", "o", and "l" fields may be conveyed in the EXTRA-TEXT field.
The sub-error codes defined in this specification are not applicable to
the "Censored" extended error code and <bcp14>MUST NOT</bcp14> be used in conjunction with it.</t>
      </section>
      <section anchor="client-processing">
        <name>Client Processing Response</name>
        <t>On receipt of a DNS response with an EDE option from a
DNS responder, the following ordered actions are performed on the EXTRA-TEXT
field:</t>
        <ol spacing="normal" type="1"><li>
            <t>Servers which don't support this specification might use plain text
in the EXTRA-TEXT field. Requestors <bcp14>SHOULD</bcp14> properly handle
both plaintext and JSON text in the EXTRA-TEXT field. The requestor verifies that
the field contains valid JSON. If not, the requestor <bcp14>MUST</bcp14> consider
the server does not support this specification and stop processing
rest of the actions defined in this section, but may instead choose
to treat EXTRA-TEXT as per <xref target="RFC8914"/>.</t>
          </li>
          <li>
            <t>The response <bcp14>MUST</bcp14> be received over an encrypted DNS channel. If not,
the requestor <bcp14>MUST</bcp14> discard data in the EXTRA-TEXT field.</t>
          </li>
          <li>
            <t>The DNS response <bcp14>MUST</bcp14> also contain an extended error code of
"Blocked by Upstream Server", "Blocked" or "Filtered" <xref target="RFC8914"/>, otherwise
the EXTRA-TEXT field is discarded.</t>
          </li>
          <li>
            <t>If either of the mandatory JSON names "c" and "j" are missing or
have empty values in the EXTRA-TEXT field, the entire JSON is
discarded.</t>
          </li>
          <li>
            <t>If the "c" field contains any contact URIs that use a scheme not registered
in the <xref target="IANA-Contact"/> registry, only those URIs <bcp14>MUST</bcp14> be discarded. Contact
URIs using registered schemes can be processed.</t>
          </li>
          <li>
            <t>If a DNS client has enabled opportunistic privacy profile (<xref section="5" sectionFormat="of" target="RFC8310"/>) for DoT, the DNS client will either fall back to an
encrypted connection without authenticating the DNS server provided
by the local network or fall back to clear text DNS, and cannot
exchange encrypted DNS messages. Both of these fallback mechanisms
adversely impact security and privacy. If the DNS client has enabled
opportunistic privacy profile for DoT and the identity of the DNS server
cannot be verified but the connection is encrypted, the DNS client <bcp14>MUST</bcp14>
ignore the "c", "j", and "o" fields but <bcp14>MAY</bcp14> process the "s" field
and other parts of the response.</t>
          </li>
          <li>
            <t>Opportunistic discovery <xref target="RFC9462"/>, where only the IP address is
validated, the DNS client <bcp14>MUST</bcp14> ignore the "c", "j", and "o" fields
but <bcp14>MAY</bcp14> process the "s" field and other parts of the response.</t>
          </li>
          <li>
            <t>If a DNS client has enabled strict privacy profile (<xref section="5" sectionFormat="of" target="RFC8310"/>) for DoT, the DNS client
requires an encrypted connection
  and successful authentication of the DNS server. In doing so, this mitigates both
  passive eavesdropping and client redirection (at the expense of
  providing no DNS service if an encrypted, authenticated connection
  is not available). If the DNS client has enabled strict privacy
  profile for DoT, the DNS client <bcp14>MAY</bcp14> process the EXTRA-TEXT field of the
  DNS response.</t>
          </li>
          <li>
            <t>The DNS client <bcp14>MUST</bcp14> ignore any other JSON names that it does not support.</t>
          </li>
        </ol>
        <ul empty="true">
          <li>
            <t>Note that the strict and opportunistic privacy profiles as defined in <xref target="RFC8310"/> only apply to DoT; there has been
no such distinction made for DoH.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="deployment-considerations">
      <name>Deployment Considerations</name>
      <t>When a forwarder receives an EDE option, whether or not (and how) to pass along JSON information in the
EXTRA-TEXT field to its client is implementation-dependent <xref target="RFC5625"/>. Implementations <bcp14>MAY</bcp14> choose not to
forward the JSON information, or they <bcp14>MAY</bcp14> choose to create a new EDE option that conveys the information in the
"c", "s", and "j" fields encoded in the JSON object.</t>
      <t>The application that triggered the DNS request may have a local policy to override the contact information (e.g.,
redirect all complaint calls to a single contact point). In such cases, the content of the "c" attribute <bcp14>MAY</bcp14> be
ignored.</t>
    </section>
    <section anchor="new-sub-error-codes-definition">
      <name>New Sub-Error Codes Definition</name>
      <t>The document defines the following new IANA-registered Sub-Error codes.</t>
      <section anchor="policy-reserved">
        <name>Reserved</name>
        <ul spacing="normal">
          <li>
            <t>Number: 0</t>
          </li>
          <li>
            <t>Meaning: Reserved. This sub-error code value <bcp14>MUST NOT</bcp14> be sent. If received, it has no meaning.</t>
          </li>
          <li>
            <t>Applicability: This code should never be used.</t>
          </li>
          <li>
            <t>Reference: This-Document</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
        </ul>
      </section>
      <section anchor="policy-network">
        <name>Network Operator Policy</name>
        <ul spacing="normal">
          <li>
            <t>Number: 5</t>
          </li>
          <li>
            <t>Meaning: Network Operator Policy. The code indicates that the request was filtered according to a policy imposed by the operator of the local network (where local network is a relative term, e.g., it may refer to a Local Area Network or to the network of the ISP selected by the user).</t>
          </li>
          <li>
            <t>Applicability: Blocked</t>
          </li>
          <li>
            <t>Reference: This-Document</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
        </ul>
      </section>
      <section anchor="policy-dns">
        <name>DNS Operator Policy</name>
        <ul spacing="normal">
          <li>
            <t>Number: 6</t>
          </li>
          <li>
            <t>Meaning: DNS Operator Policy. The code indicates that the request was filtered according to policy determined by the operator of the DNS server. This is different from the "Network Operator Policy" code when a third-party DNS resolver is used.</t>
          </li>
          <li>
            <t>Applicability: Blocked</t>
          </li>
          <li>
            <t>Reference:  This-Document</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="new-extended-dns-errors">
      <name>New Extended DNS Errors</name>
      <t>This document defines an addition to the EDE codes defined in <xref target="RFC8914"/>.</t>
      <section anchor="extended-dns-error-code-tba1-blocked-by-upstream-dns-server">
        <name>Extended DNS Error Code TBA1 - Blocked by Upstream DNS Server</name>
        <t>The DNS server (e.g., a DNS forwarder) is unable to respond to the request
because the domain is on a blocklist due to an internal security policy
imposed by an upstream DNS server. This error code
is useful in deployments where a network-provided DNS forwarder
is configured to use an external resolver that filters malicious
domains. Typically, when the DNS forwarder receives a Blocked (15) error code from the upstream DNS server, it will replace it with "Blocked by Upstream DNS Server" (TBA1) before forwarding the reply to the DNS client. Additionally, the EXTRA-TEXT field is forwarded to the DNS client.</t>
      </section>
    </section>
    <section anchor="examples">
      <name>Examples</name>
      <t>An example showing the nameserver at 'ns.example.net' that filtered a
DNS "A" record query for 'example.org' is provided in <xref target="example-json"/>.</t>
      <figure anchor="example-json">
        <name>JSON Returned in EXTRA-TEXT Field of Extended DNS Error Response</name>
        <artwork><![CDATA[
{
  "c": [
    "tel:+358-555-1234567",
    "sips:bob@bobphone.example.com"
  ],
  "j": "malware present for 23 days",
  "s": 1,
  "o": "example.net Filtering Service",
  "l": "en"
}
]]></artwork>
      </figure>
      <t>In <xref target="example-json-minified"/> the same content is shown with minified JSON (no
whitespace, no blank lines) with <tt>'\'</tt> line wrapping per <xref target="RFC8792"/>.</t>
      <figure anchor="example-json-minified">
        <name>Minified Response</name>
        <artwork><![CDATA[
{ "c":["tel:+358-555-1234567","sips:bob@bobphone.example.com"],\
"j":"malware present for 23 days",\
"s":1,\
"o":"example.net Filtering Service",\
"l":"en" }
]]></artwork>
      </figure>
    </section>
    <section anchor="security">
      <name>Security Considerations</name>
      <section anchor="authentication-and-confidentiality">
        <name>Authentication and Confidentiality</name>
        <t>Security considerations in <xref section="6" sectionFormat="of" target="RFC8914"/> apply to this
document, except the guard against using EDE content to alter DNS protocol
processing. The guard is relaxed in the current specification as it mandates
encryption and recommends the use of an authenticated connection to the DNS
server, while <xref target="RFC8914"/> assumes that EDE information is unauthenticated
and sent over clear text.</t>
        <t>To minimize impact of active on-path attacks on the DNS channel, the
client validates the response as described in <xref target="client-processing"/>.</t>
      </section>
      <section anchor="restrictions-on-display-of-c-and-o-fields">
        <name>Restrictions on Display of "c" and "o" Fields</name>
        <t>A client might choose to display the information in the "c" field
to the end-user if and only if the encrypted resolver has sufficient
reputation, according to some local policy (e.g., user configuration,
administrative configuration, or a built-in list of respectable
resolvers). This limits the ability of a malicious encrypted resolver
to cause harm. For example, an end user can use the details in the "c" field to contact an attacker
to solve the problem of being unable to reach a domain. The attacker can mislead the end user to
install malware or spyware to compromise the device security posture or mislead the end user to reveal
personal data.
If the client decides not to display all of the
information in the EXTRA-TEXT field, it can be logged for diagnostics
purpose and the client can only display the resolver hostname that
blocked the domain, error description for the EDE code and the
sub-error description for the "s" field to the end-user.</t>
        <t>When displaying the free-form text of "o", the browser <bcp14>MUST
NOT</bcp14> make any of those elements into actionable (clickable) links and these
fields need to be rendered as text, not as HTML. The contact details of "c" can be made
into clickable links to provide a convenient way for users to initiate, e.g., voice calls. The client might
choose to display the contact details only when the identity of the DNS server is verified.</t>
        <t>Further, clients <bcp14>MUST NOT</bcp14> display the value of the <tt>"o"</tt> field to the end-user unless one of the following
conditions is met:</t>
        <ul spacing="normal">
          <li>
            <t>The value matches a registered organization name listed in the <xref target="IANA-Enterprise"/> OR</t>
          </li>
          <li>
            <t>The value consists solely of an organization name and does not contain any additional free-form
content such as instructions, URLs, or messaging intended to influence the end-user behavior.</t>
          </li>
        </ul>
      </section>
      <section anchor="security-risks-from-legacy-dns-forwarders">
        <name>Security Risks from Legacy DNS Forwarders</name>
        <t>An attacker might inject (or modify) the EDE EXTRA-TEXT field with a
DNS proxy or DNS forwarder that is unaware of EDE. Such a DNS proxy or
DNS forwarder will forward that attacker-controlled EDE option.  To
prevent such an attack, clients can be configured to process EDE from
explicitly configured DNS servers or utilize RESINFO
<xref target="RFC9606"/>.</t>
      </section>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This document requests four IANA actions as described in the following subsections.</t>
      <ul empty="true">
        <li>
          <t>Note to the RFC Editor: Please replace RFCXXXX with the RFC number assigned to this document and "TBA1" with the value assigned by IANA.</t>
        </li>
      </ul>
      <section anchor="IANA-Names">
        <name>New Registry for JSON Names</name>
        <t>This document requests IANA to create a new registry, entitled "EXTRA-TEXT JSON Names"
under "Domain Name System (DNS) Parameters, Extended DNS Error Codes"
registry <xref target="IANA-DNS"/>. The registration request for a new JSON name must include the
following fields:</t>
        <dl>
          <dt>JSON Name:</dt>
          <dd>
            <t>Specifies the name of an attribute that is present in the JSON data enclosed in EXTRA-TEXT field. The name must follow the guidelines in <xref target="name-spec"/>.</t>
          </dd>
          <dt>Field Meaning:</dt>
          <dd>
            <t>Provides a brief, human-readable label summarizing the purpose of the JSON attribute.</t>
          </dd>
          <dt>Short description:</dt>
          <dd>
            <t>Includes a short description of the requested JSON name.</t>
          </dd>
          <dt>Mandatory (Y/N?):</dt>
          <dd>
            <t>Indicates whether this attribute is mandatory or optional.</t>
          </dd>
          <dt>Specification:</dt>
          <dd>
            <t>Provides a pointer to the reference document that specifies the attribute.</t>
          </dd>
        </dl>
        <t>The registry is initially populated with the following values:</t>
        <table anchor="reg-names">
          <name>Initial JSON Names Registry</name>
          <thead>
            <tr>
              <th align="center">JSON Name</th>
              <th align="left">Field Meaning</th>
              <th align="left">Description</th>
              <th align="left">Mandatory</th>
              <th align="center">Specification</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="center">c</td>
              <td align="left">contact</td>
              <td align="left">The contact details of the IT/InfoSec team to report mis-classified DNS filtering</td>
              <td align="left">Y</td>
              <td align="center">
                <xref target="name-spec"/> of RFCXXXX</td>
            </tr>
            <tr>
              <td align="center">j</td>
              <td align="left">justification</td>
              <td align="left">UTF-8-encoded <xref target="RFC5198"/> textual justification for a particular DNS filtering</td>
              <td align="left">Y</td>
              <td align="center">
                <xref target="name-spec"/> of RFCXXXX</td>
            </tr>
            <tr>
              <td align="center">s</td>
              <td align="left">sub-error</td>
              <td align="left">Integer representing the sub-error code for this DNS filtering case</td>
              <td align="left">N</td>
              <td align="center">
                <xref target="name-spec"/> of RFCXXXX</td>
            </tr>
            <tr>
              <td align="center">o</td>
              <td align="left">organization</td>
              <td align="left">UTF-8-encoded human-friendly name of the organization that filtered this particular DNS query</td>
              <td align="left">N</td>
              <td align="center">
                <xref target="name-spec"/> of RFCXXXX</td>
            </tr>
            <tr>
              <td align="center">l</td>
              <td align="left">language</td>
              <td align="left">Indicates the language of the "j" and "o" fields as defined in <xref target="RFC5646"/></td>
              <td align="left">N</td>
              <td align="center">
                <xref target="name-spec"/> of RFCXXXX</td>
            </tr>
          </tbody>
        </table>
        <t>New JSON names are registered via IETF Review (<xref section="4.8" sectionFormat="of" target="RFC8126"/>).</t>
      </section>
      <section anchor="IANA-Contact">
        <name>New Registry for Contact URI Scheme</name>
        <t>This document requests IANA to create a new registry, entitled "Contact URI Schemes"
under "Domain Name System (DNS) Parameters, Extended DNS Error Codes"
registry <xref target="IANA-DNS"/>. The registration request for a new Contact URI scheme has to include the
following fields:</t>
        <ul spacing="normal">
          <li>
            <t>Name: URI scheme name.</t>
          </li>
          <li>
            <t>Meaning: Provides a short description of the scheme.</t>
          </li>
          <li>
            <t>Reference: Provides a pointer to an IETF-approved specification that defines
the URI scheme.</t>
          </li>
        </ul>
        <t>The Contact URI scheme registry is initially be populated with the
following schemes:</t>
        <table>
          <thead>
            <tr>
              <th align="center">Name</th>
              <th align="left">Meaning</th>
              <th align="center">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="center">sips</td>
              <td align="left">SIP Call</td>
              <td align="center">
                <xref target="RFC5630"/></td>
            </tr>
            <tr>
              <td align="center">tel</td>
              <td align="left">Telephone Number</td>
              <td align="center">
                <xref target="RFC3966"/></td>
            </tr>
            <tr>
              <td align="center">mailto</td>
              <td align="left">Internet mail</td>
              <td align="center">
                <xref target="RFC6068"/></td>
            </tr>
          </tbody>
        </table>
        <t>The registration procedure for adding new Contact URI schemes to the "Contact URI Schemes" registry is "IETF
Review" as defined in <xref section="4.8" sectionFormat="of" target="RFC8126"/>.</t>
      </section>
      <section anchor="IANA-SubError">
        <name>New Registry for DNS Sub-Error Codes</name>
        <t>This document requests IANA to create a new registry, entitled "Sub-Error Codes"
under "Domain Name System (DNS) Parameters, Extended DNS Error Codes"
registry <xref target="IANA-DNS"/>. The registration request for a new sub-error codes <bcp14>MUST</bcp14> include the
following fields:</t>
        <ul spacing="normal">
          <li>
            <t>Number: Is the wire format sub-error code (range 0-255).</t>
          </li>
          <li>
            <t>Meaning: Provides a short description of the sub-error.</t>
          </li>
          <li>
            <t>Applicability: Indicates which Extended DNS Error (EDE) Codes apply to this sub-error code.</t>
          </li>
          <li>
            <t>Reference: Provides a pointer to an IETF-approved specification that registered
the code and/or an authoritative specification that describes the
meaning of this code.</t>
          </li>
        </ul>
        <t>The Sub-Error Code registry is initially be populated with the
following values:</t>
        <table anchor="reg">
          <name>Initial Sub-Error Code Registry</name>
          <thead>
            <tr>
              <th align="center">Number</th>
              <th align="left">Meaning</th>
              <th align="left">EDE Codes Applicability</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="center">0</td>
              <td align="left">Reserved</td>
              <td align="left">Not used</td>
              <td align="left">
                <xref target="policy-reserved"/> of this document</td>
            </tr>
            <tr>
              <td align="center">1</td>
              <td align="left">Malware</td>
              <td align="left">"Blocked", "Blocked by Upstream Server", "Filtered"</td>
              <td align="left">Section 5.5 of <xref target="RFC5901"/></td>
            </tr>
            <tr>
              <td align="center">2</td>
              <td align="left">Phishing</td>
              <td align="left">"Blocked", "Blocked by Upstream Server", "Filtered"</td>
              <td align="left">Section 5.5 of <xref target="RFC5901"/></td>
            </tr>
            <tr>
              <td align="center">3</td>
              <td align="left">Spam</td>
              <td align="left">"Blocked", "Blocked by Upstream Server", "Filtered"</td>
              <td align="left">Page 289 of <xref target="RFC4949"/></td>
            </tr>
            <tr>
              <td align="center">4</td>
              <td align="left">Spyware</td>
              <td align="left">"Blocked", "Blocked by Upstream Server", "Filtered"</td>
              <td align="left">Page 291 of <xref target="RFC4949"/></td>
            </tr>
            <tr>
              <td align="center">5</td>
              <td align="left">Network operator policy</td>
              <td align="left">"Blocked"</td>
              <td align="left">
                <xref target="policy-network"/> of this document</td>
            </tr>
            <tr>
              <td align="center">6</td>
              <td align="left">DNS operator policy</td>
              <td align="left">"Blocked"</td>
              <td align="left">
                <xref target="policy-dns"/> of this document</td>
            </tr>
          </tbody>
        </table>
        <t>The registration procedure to add New Sub-Error Codes are registered via IETF Review as defined in <xref section="4.8" sectionFormat="of" target="RFC8126"/>.</t>
      </section>
      <section anchor="new-extended-dns-error-code">
        <name>New Extended DNS Error Code</name>
        <t>IANA is requested to assign the following Extended DNS Error code from the "Domain Name System (DNS) Parameters, Extended DNS Error Codes"
registry <xref target="IANA-DNS"/>:</t>
        <table anchor="reg-ede">
          <name>New DNS Error Code</name>
          <thead>
            <tr>
              <th align="center">INFO-CODE</th>
              <th align="left">Purose</th>
              <th align="center">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="center">TBA1</td>
              <td align="left">Blocked by Upstream Server</td>
              <td align="center">RFCXXXX</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8914">
          <front>
            <title>Extended DNS Errors</title>
            <author fullname="W. Kumari" initials="W." surname="Kumari"/>
            <author fullname="E. Hunt" initials="E." surname="Hunt"/>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="W. Hardaker" initials="W." surname="Hardaker"/>
            <author fullname="D. Lawrence" initials="D." surname="Lawrence"/>
            <date month="October" year="2020"/>
            <abstract>
              <t>This document defines an extensible method to return additional information about the cause of DNS errors. Though created primarily to extend SERVFAIL to provide additional information about the cause of DNS and DNSSEC failures, the Extended DNS Errors option defined in this document allows all response types to contain extended error information. Extended DNS Error information does not change the processing of RCODEs.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8914"/>
          <seriesInfo name="DOI" value="10.17487/RFC8914"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC7493">
          <front>
            <title>The I-JSON Message Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="March" year="2015"/>
            <abstract>
              <t>I-JSON (short for "Internet JSON") is a restricted profile of JSON designed to maximize interoperability and increase confidence that software can process it successfully with predictable results.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7493"/>
          <seriesInfo name="DOI" value="10.17487/RFC7493"/>
        </reference>
        <reference anchor="RFC7159">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="March" year="2014"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7159"/>
          <seriesInfo name="DOI" value="10.17487/RFC7159"/>
        </reference>
        <reference anchor="RFC3966">
          <front>
            <title>The tel URI for Telephone Numbers</title>
            <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
            <date month="December" year="2004"/>
            <abstract>
              <t>This document specifies the URI (Uniform Resource Identifier) scheme "tel". The "tel" URI describes resources identified by telephone numbers. This document obsoletes RFC 2806. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3966"/>
          <seriesInfo name="DOI" value="10.17487/RFC3966"/>
        </reference>
        <reference anchor="RFC5630">
          <front>
            <title>The Use of the SIPS URI Scheme in the Session Initiation Protocol (SIP)</title>
            <author fullname="F. Audet" initials="F." surname="Audet"/>
            <date month="October" year="2009"/>
            <abstract>
              <t>This document provides clarifications and guidelines concerning the use of the SIPS URI scheme in the Session Initiation Protocol (SIP). It also makes normative changes to SIP. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5630"/>
          <seriesInfo name="DOI" value="10.17487/RFC5630"/>
        </reference>
        <reference anchor="RFC5198">
          <front>
            <title>Unicode Format for Network Interchange</title>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <author fullname="M. Padlipsky" initials="M." surname="Padlipsky"/>
            <date month="March" year="2008"/>
            <abstract>
              <t>The Internet today is in need of a standardized form for the transmission of internationalized "text" information, paralleling the specifications for the use of ASCII that date from the early days of the ARPANET. This document specifies that format, using UTF-8 with normalization and specific line-ending sequences. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5198"/>
          <seriesInfo name="DOI" value="10.17487/RFC5198"/>
        </reference>
        <reference anchor="RFC5646">
          <front>
            <title>Tags for Identifying Languages</title>
            <author fullname="A. Phillips" initials="A." role="editor" surname="Phillips"/>
            <author fullname="M. Davis" initials="M." role="editor" surname="Davis"/>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the structure, content, construction, and semantics of language tags for use in cases where it is desirable to indicate the language used in an information object. It also describes how to register values for use in language tags and the creation of user-defined extensions for private interchange. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="47"/>
          <seriesInfo name="RFC" value="5646"/>
          <seriesInfo name="DOI" value="10.17487/RFC5646"/>
        </reference>
        <reference anchor="RFC6891">
          <front>
            <title>Extension Mechanisms for DNS (EDNS(0))</title>
            <author fullname="J. Damas" initials="J." surname="Damas"/>
            <author fullname="M. Graff" initials="M." surname="Graff"/>
            <author fullname="P. Vixie" initials="P." surname="Vixie"/>
            <date month="April" year="2013"/>
            <abstract>
              <t>The Domain Name System's wire protocol includes a number of fixed fields whose range has been or soon will be exhausted and does not allow requestors to advertise their capabilities to responders. This document describes backward-compatible mechanisms for allowing the protocol to grow.</t>
              <t>This document updates the Extension Mechanisms for DNS (EDNS(0)) specification (and obsoletes RFC 2671) based on feedback from deployment experience in several implementations. It also obsoletes RFC 2673 ("Binary Labels in the Domain Name System") and adds considerations on the use of extended labels in the DNS.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="75"/>
          <seriesInfo name="RFC" value="6891"/>
          <seriesInfo name="DOI" value="10.17487/RFC6891"/>
        </reference>
        <reference anchor="RFC8310">
          <front>
            <title>Usage Profiles for DNS over TLS and DNS over DTLS</title>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="D. Gillmor" initials="D." surname="Gillmor"/>
            <author fullname="T. Reddy" initials="T." surname="Reddy"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document discusses usage profiles, based on one or more authentication mechanisms, which can be used for DNS over Transport Layer Security (TLS) or Datagram TLS (DTLS). These profiles can increase the privacy of DNS transactions compared to using only cleartext DNS. This document also specifies new authentication mechanisms -- it describes several ways that a DNS client can use an authentication domain name to authenticate a (D)TLS connection to a DNS server. Additionally, it defines (D)TLS protocol profiles for DNS clients and servers implementing DNS over (D)TLS. This document updates RFC 7858.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8310"/>
          <seriesInfo name="DOI" value="10.17487/RFC8310"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC6068">
          <front>
            <title>The 'mailto' URI Scheme</title>
            <author fullname="M. Duerst" initials="M." surname="Duerst"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <author fullname="J. Zawinski" initials="J." surname="Zawinski"/>
            <date month="October" year="2010"/>
            <abstract>
              <t>This document defines the format of Uniform Resource Identifiers (URIs) to identify resources that are reached using Internet mail. It adds better internationalization and compatibility with Internationalized Resource Identifiers (IRIs; RFC 3987) to the previous syntax of 'mailto' URIs (RFC 2368). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6068"/>
          <seriesInfo name="DOI" value="10.17487/RFC6068"/>
        </reference>
        <reference anchor="RFC5901">
          <front>
            <title>Extensions to the IODEF-Document Class for Reporting Phishing</title>
            <author fullname="P. Cain" initials="P." surname="Cain"/>
            <author fullname="D. Jevans" initials="D." surname="Jevans"/>
            <date month="July" year="2010"/>
            <abstract>
              <t>This document extends the Incident Object Description Exchange Format (IODEF) defined in RFC 5070 to support the reporting of phishing events, which is a particular type of fraud. These extensions are flexible enough to support information gleaned from activities throughout the entire electronic fraud cycle -- from receipt of the phishing lure to the disablement of the collection site. Both simple reporting and complete forensic reporting are possible, as is consolidating multiple incidents. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5901"/>
          <seriesInfo name="DOI" value="10.17487/RFC5901"/>
        </reference>
        <reference anchor="RFC4949">
          <front>
            <title>Internet Security Glossary, Version 2</title>
            <author fullname="R. Shirey" initials="R." surname="Shirey"/>
            <date month="August" year="2007"/>
            <abstract>
              <t>This Glossary provides definitions, abbreviations, and explanations of terminology for information system security. The 334 pages of entries offer recommendations to improve the comprehensibility of written material that is generated in the Internet Standards Process (RFC 2026). The recommendations follow the principles that such writing should (a) use the same term or definition whenever the same concept is mentioned; (b) use terms in their plainest, dictionary sense; (c) use terms that are already well-established in open publications; and (d) avoid terms that either favor a particular vendor or favor a particular technology or mechanism over other, competing techniques that already exist or could be developed. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="FYI" value="36"/>
          <seriesInfo name="RFC" value="4949"/>
          <seriesInfo name="DOI" value="10.17487/RFC4949"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="IANA-DNS" target="https://www.iana.org/assignments/dns-parameters/dns-parameters.xhtml#extended-dns-error-codes">
          <front>
            <title>Domain Name System (DNS) Parameters, Extended DNS Error Codes</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="RPZ" target="https://dnsrpz.info">
          <front>
            <title>Response Policy Zone</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="Impl-1" target="https://datatracker.ietf.org/meeting/116/materials/slides-116-dnsop-dns-errors-implementation-proposal-slides-116-dnsop-update-on-dns-errors-implementation-00">
          <front>
            <title>Use of DNS Errors To improve Browsing User Experience With network based malware protection</title>
            <author>
              <organization/>
            </author>
            <date year="2023" month="March"/>
          </front>
        </reference>
        <reference anchor="IANA-Enterprise" target="https://www.iana.org/assignments/enterprise-numbers/">
          <front>
            <title>Private Enterprise Numbers (PENs)</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="RFC9499">
          <front>
            <title>DNS Terminology</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
              <t>This document updates RFC 2308 by clarifying the definitions of "forwarder" and "QNAME". It obsoletes RFC 8499 by adding multiple terms and clarifications. Comprehensive lists of changed and new definitions can be found in Appendices A and B.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="219"/>
          <seriesInfo name="RFC" value="9499"/>
          <seriesInfo name="DOI" value="10.17487/RFC9499"/>
        </reference>
        <reference anchor="RFC8484">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="RFC7858">
          <front>
            <title>Specification for DNS over Transport Layer Security (TLS)</title>
            <author fullname="Z. Hu" initials="Z." surname="Hu"/>
            <author fullname="L. Zhu" initials="L." surname="Zhu"/>
            <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="D. Wessels" initials="D." surname="Wessels"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
              <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7858"/>
          <seriesInfo name="DOI" value="10.17487/RFC7858"/>
        </reference>
        <reference anchor="RFC9250">
          <front>
            <title>DNS over Dedicated QUIC Connections</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>This document describes the use of QUIC to provide transport confidentiality for DNS. The encryption provided by QUIC has similar properties to those provided by TLS, while QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides more efficient packet-loss recovery than UDP. DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC 7858, and latency characteristics similar to classic DNS over UDP. This specification describes the use of DoQ as a general-purpose transport for DNS and includes the use of DoQ for stub to recursive, recursive to authoritative, and zone transfer scenarios.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9250"/>
          <seriesInfo name="DOI" value="10.17487/RFC9250"/>
        </reference>
        <reference anchor="RFC8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC9462">
          <front>
            <title>Discovery of Designated Resolvers</title>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="E. Kinnear" initials="E." surname="Kinnear"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <author fullname="T. Jensen" initials="T." surname="Jensen"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document defines Discovery of Designated Resolvers (DDR), a set of mechanisms for DNS clients to use DNS records to discover a resolver's encrypted DNS configuration. An Encrypted DNS Resolver discovered in this manner is referred to as a "Designated Resolver". These mechanisms can be used to move from unencrypted DNS to encrypted DNS when only the IP address of a resolver is known. These mechanisms are designed to be limited to cases where Unencrypted DNS Resolvers and their Designated Resolvers are operated by the same entity or cooperating entities. It can also be used to discover support for encrypted DNS protocols when the name of an Encrypted DNS Resolver is known.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9462"/>
          <seriesInfo name="DOI" value="10.17487/RFC9462"/>
        </reference>
        <reference anchor="RFC5625">
          <front>
            <title>DNS Proxy Implementation Guidelines</title>
            <author fullname="R. Bellis" initials="R." surname="Bellis"/>
            <date month="August" year="2009"/>
            <abstract>
              <t>This document provides guidelines for the implementation of DNS proxies, as found in broadband gateways and other similar network devices. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="152"/>
          <seriesInfo name="RFC" value="5625"/>
          <seriesInfo name="DOI" value="10.17487/RFC5625"/>
        </reference>
        <reference anchor="RFC8792">
          <front>
            <title>Handling Long Lines in Content of Internet-Drafts and RFCs</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="E. Auerswald" initials="E." surname="Auerswald"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <date month="June" year="2020"/>
            <abstract>
              <t>This document defines two strategies for handling long lines in width-bounded text content. One strategy, called the "single backslash" strategy, is based on the historical use of a single backslash ('\') character to indicate where line-folding has occurred, with the continuation occurring with the first character that is not a space character (' ') on the next line. The second strategy, called the "double backslash" strategy, extends the first strategy by adding a second backslash character to identify where the continuation begins and is thereby able to handle cases not supported by the first strategy. Both strategies use a self-describing header enabling automated reconstitution of the original content.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8792"/>
          <seriesInfo name="DOI" value="10.17487/RFC8792"/>
        </reference>
        <reference anchor="RFC9606">
          <front>
            <title>DNS Resolver Information</title>
            <author fullname="T. Reddy.K" initials="T." surname="Reddy.K"/>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <date month="June" year="2024"/>
            <abstract>
              <t>This document specifies a method for DNS resolvers to publish information about themselves. DNS clients can use the resolver information to identify the capabilities of DNS resolvers. How DNS clients use such information is beyond the scope of this document.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9606"/>
          <seriesInfo name="DOI" value="10.17487/RFC9606"/>
        </reference>
      </references>
    </references>
    <?line 706?>

<section anchor="interoperation-with-rpz-servers">
      <name>Interoperation with RPZ Servers</name>
      <t>This appendix provides a non-normative guidance for operation with an Response Policy Zones (RPZ) server <xref target="RPZ"/> that
indicates filtering with a NXDOMAIN response with the Recursion
Available bit cleared (RA=0). This guidance is provided to ease interoperation with RPZ.</t>
      <t>When a DNS client supports this specification, it includes the
EDE option in its DNS query.</t>
      <t>If the server does not support this specification and is performing
RPZ filtering, the server ignores the EDE option in the DNS query and
replies with NXDOMAIN and RA=0. The DNS client can continue to accept
such responses.</t>
      <t>If the server does support this specification and is performing RPZ
filtering, the server can use the EDE option in the query to identify
an EDE-aware client and respond appropriately (that is, by generating
a response described in <xref target="server-response"/>) as NXDOMAIN and RA=0
are not necessary when generating a response to such a client.</t>
    </section>
    <section anchor="implementation-status">
      <name>Implementation Status</name>
      <ul empty="true">
        <li>
          <t>Note to the RFC Editor: please remove this appendix prior publication.</t>
        </li>
      </ul>
      <t>At IETF#116, Gianpaolo Scalone (Vodafone) and Ralf Weber (Akamai) presented an implementation of this specification. More details can be found at <xref target="Impl-1"/>.</t>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Thanks to Vittorio Bertola, Wes Hardaker, Ben Schwartz, Erid Orth,
Viktor Dukhovni, Warren Kumari, Paul Wouters, John Levine, Bob
Harold, Mukund Sivaraman, Stephane Bortzmeyer, Gianpaolo Angelo Scalone, Mark Nottingham, Stephane Bortzmeyer, and Daniel Migault for the comments.</t>
      <t>Thanks to Ralf Weber and Gianpaolo Scalone for sharing details about their implementation.</t>
      <t>Thanks Di Ma and Matt Brown for the DNS directorate reviews, and Joseph Salowey for the Security directorate review.</t>
      <t>Thanks Paul Kyzivat for the Art review.</t>
      <t>Thanks to Éric Vyncke for the AD review.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
