<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.5 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-add-resolver-info-11" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.19.4 -->
  <front>
    <title abbrev="DNS Resolver Information">DNS Resolver Information</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-add-resolver-info-11"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Mohamed Boucadair">
      <organization>Orange</organization>
      <address>
        <postal>
          <city>Rennes</city>
          <code>35000</code>
          <country>France</country>
        </postal>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <date year="2024" month="February" day="29"/>
    <area>Internet</area>
    <workgroup>ADD</workgroup>
    <keyword>Transparency</keyword>
    <keyword>User Experience</keyword>
    <keyword>DNS server selection</keyword>
    <abstract>
      <?line 50?>

<t>This document specifies a method for DNS resolvers to publish
   information about themselves.  DNS clients can use the resolver
   information to identify the capabilities of DNS resolvers. How such an information is then used by DNS clients is out of the scope of this document.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Adaptive DNS Discovery Working Group mailing list (add@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/add/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/boucadair/add-resolver-information"/>.</t>
    </note>
  </front>
  <middle>
    <?line 56?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Historically, DNS clients communicated with recursive resolvers without needing to know anything about the features
   supported by these resolvers. However, recent developments (e.g., Extended Error Reporting <xref target="RFC8914"/> or encrypted DNS) imply that earlier assumption no longer generally applies. Typically, DNS clients can discover and authenticate encrypted DNS resolvers provided by a local network (e.g., using the Discovery of Network-designated Resolvers (DNR) <xref target="RFC9463"/> and the Discovery of Designated Resolvers (DDR) <xref target="RFC9462"/>), however, these DNS clients can't retrieve
   information from the discovered recursive resolvers about their capabilities. Instead of depending on opportunistic approaches, DNS clients need a more reliable mechanism to discover the features that are supported by resolvers.</t>
      <t>This document fills that void by specifying a method for stub
   resolvers to retrieve such information.  To that aim, a new resource record (RR) type
   is defined for DNS clients to query the recursive resolvers.  The
   information that a resolver might want to expose is defined in
   <xref target="key-val"/>.</t>
      <t>Retrieved information can be used to feed the server selection
   procedure. However, that selection procedure is out of the scope of this document.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document makes use of the terms defined in <xref target="RFC8499"/>. The following additional terms are used:</t>
      <dl>
        <dt>Encrypted DNS:</dt>
        <dd>
          <t>Refers to a DNS scheme where DNS exchanges are
 transported over an encrypted channel between a DNS client and server (e.g.,
 DNS over HTTPS (DoH) <xref target="RFC8484"/>, DNS over TLS (DoT) <xref target="RFC7858"/>, or
 DNS over QUIC (DoQ) <xref target="RFC9250"/>).</t>
        </dd>
        <dt>Encrypted DNS resolver:</dt>
        <dd>
          <t>Refers to a DNS resolver that supports any encrypted DNS scheme.</t>
        </dd>
        <dt>Reputation:</dt>
        <dd>
          <t>"The estimation in which an identifiable actor is held, especially by the
 community or the Internet public generally" (<xref section="1" sectionFormat="of" target="RFC7070"/>.</t>
        </dd>
      </dl>
    </section>
    <section anchor="retreive">
      <name>Retrieving Resolver Information</name>
      <t>A DNS client that wants to retrieve the resolver information may
   use the RR type "RESINFO" defined in this document.</t>
      <t>The content of the RDATA in a response to a query for RESINFO RR QTYPE is defined in
   <xref target="key-val"/>.  If the resolver understands the RESINFO RR type, the
   RRSet in the Authority section <bcp14>MUST</bcp14> have exactly one record. RESINFO is a property of the resolver
   and is not subject to recursive resolution.</t>
      <t>A DNS client can retrieve the resolver information using the RESINFO
   RR type and the QNAME of the domain name that is used to authenticate the
   DNS resolver (referred to as the Authentication Domain Name (ADN) in DNR <xref target="RFC9463"/>).</t>
      <t>If the Special-Use Domain Name "resolver.arpa", defined in <xref target="RFC9462"/>, is used to
   discover an encrypted DNS resolver, the client can retrieve the resolver information
   using the RESINFO RR type and QNAME of "resolver.arpa". In this case, a client has to contend
   with the risk that a resolver does not support RESINFO. The resolver might
   pass the query upstream, and then the client can receive a positive RESINFO response either
   from a legitimate DNS resolver or an attacker. The DNS client <bcp14>MUST</bcp14> set the Recursion
   Desired (RD) bit of the query to 0 to ensure that the response is provided by the resolver.
   If the resolver does not support RESINFO, it will return an authoritative name error.</t>
    </section>
    <section anchor="format">
      <name>Format of the Resolver Information</name>
      <t>The resolver information record uses the same format as DNS TXT records.
   As a reminder, the format rules for TXT records are defined in
   the base DNS specification (<xref section="3.3.14" sectionFormat="of" target="RFC1035"/>) and further
   elaborated in the DNS-based Service Discovery (DNS-SD) specification
   (<xref section="6.1" sectionFormat="of" target="RFC6763"/>). The recommendations to limit the TXT record size are
   discussed in <xref section="6.1" sectionFormat="of" target="RFC6763"/>.</t>
      <t>Similar to DNS-SD, the RESINFO RR type uses "key/value" pairs to
   convey the resolver information.  Each "key/value" pair is encoded
   using the format rules defined in <xref section="6.3" sectionFormat="of" target="RFC6763"/>.  Using
   standardized "key/value" syntax within the RESINFO RR type makes it
   easier for future keys to be defined.  If a DNS client sees unknown
   keys in a RESINFO RR type, it <bcp14>MUST</bcp14> silently ignore them.  The same
   rules for the keys as those defined in <xref section="6.4" sectionFormat="of" target="RFC6763"/> <bcp14>MUST</bcp14>
   be followed for RESINFO.</t>
      <t>Keys <bcp14>MUST</bcp14> either be defined in the IANA registry (<xref target="key-reg"/>) or begin
   with the substring "temp-" for names defined for local use only.</t>
    </section>
    <section anchor="key-val">
      <name>Resolver Information Keys/Values</name>
      <t>The following resolver information keys are defined:</t>
      <dl>
        <dt>qnamemin:</dt>
        <dd>
          <t>If the DNS resolver supports QNAME minimisation <xref target="RFC9156"/>
 to improve DNS privacy, the key is present.  Note that, as per the
 rules for the keys defined in <xref section="6.4" sectionFormat="of" target="RFC6763"/>, if there
 is no '=' in a key, then it is a boolean attribute, simply
 identified as being present, with no value.
</t>
          <t>This is an optional attribute.</t>
        </dd>
        <dt>exterr:</dt>
        <dd>
          <t>If the DNS resolver supports extended DNS errors (EDE) option
 <xref target="RFC8914"/> to return additional information about the cause of DNS
 errors, the value of this key lists the possible extended DNS
 error codes that can be returned by this DNS resolver.  When
 multiple values are present, these values <bcp14>MUST</bcp14> be comma-separated.
</t>
          <t>This is an optional attribute.</t>
        </dd>
        <dt>infourl:</dt>
        <dd>
          <t>An URL that points to the generic unstructured resolver
 information (e.g., DoH APIs supported, possible HTTP status codes
 returned by the DoH server, or how to report a problem) for
 troubleshooting purposes. The server that exposes such information is called "resolver information server".
</t>
          <t>The resolver information server <bcp14>MUST</bcp14> support the content-type 'text/html'.  The DNS
 client <bcp14>MUST</bcp14> reject the URL if the scheme is not "https".  The URL
 <bcp14>SHOULD</bcp14> be treated only as diagnostic information for IT staff.  It
 is not intended for end user consumption as the URL can possibly
 provide misleading information. A DNS client <bcp14>MAY</bcp14> choose to display
 the URL to the end user, if and only if the encrypted resolver has
 sufficient reputation, according to some local policy (e.g., user
 configuration, administrative configuration, or a built-in list of
 respectable resolvers).</t>
          <t>This is an optional attribute.</t>
        </dd>
      </dl>
      <t>New keys can be defined as per the procedure defined in <xref target="key-reg"/>.</t>
    </section>
    <section anchor="an-example">
      <name>An Example</name>
      <t><xref target="ex-1"/> shows an example of a published resolver information record.</t>
      <figure anchor="ex-1">
        <name>An Example of Resolver Information Record</name>
        <artwork align="center"><![CDATA[
resolver.example.net. 7200 IN RESINFO qnamemin exterr=15,16,17
                      infourl=https://resolver.example.com/guide
]]></artwork>
      </figure>
      <t>As mentioned in <xref target="retreive"/>, a DNS client that discovers the ADN "resolver.example.net"
of its resolver using DNR will issue a query for RESINFO RR QTYPE for that ADN
and will learn that the resolver supports:</t>
      <ul spacing="normal">
        <li>
          <t>QNAME minimisation,</t>
        </li>
        <li>
          <t>Blocked (15), Censored (16), and Filtered (17) EDEs, and</t>
        </li>
        <li>
          <t>that more information can be retrieved from https://resolver.example.com/guide.</t>
        </li>
      </ul>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>DNS clients communicating with discovered DNS resolvers <bcp14>MUST</bcp14> use one of the following measures
to prevent DNS response forgery attacks:</t>
      <ol spacing="normal" type="1"><li>
          <t>Establish an authenticated secure connection to the DNS resolver.</t>
        </li>
        <li>
          <t>Implement local DNSSEC validation (<xref section="10" sectionFormat="of" target="RFC8499"/>) to verify the authenticity of the resolver information.</t>
        </li>
      </ol>
      <t>It is important to note that, of these two measures, only the first one can apply to queries for 'resolver.arpa'.</t>
      <t>An encrypted resolver may return incorrect information in RESINFO. If the client cannot validate the attributes received from the resolver, that will be used for resolver selection or displayed to the end-user, the client should process those attributes only if the encrypted resolver has sufficient reputation according to local policy (e.g., user configuration, administrative configuration, or a built-in list of reputable resolvers). This approach limits the ability of a malicious encrypted resolver to cause harm with false claims.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <ul empty="true">
        <li>
          <t>Note to the RFC Editor: Please update "RFCXXXX" occurrences with the RFC number to be assigned to this document.</t>
        </li>
      </ul>
      <section anchor="resinfo-rr-type">
        <name>RESINFO RR Type</name>
        <t>This document requests IANA to update this entry from the
   "Resource Record (RR) TYPEs" registry of the "Domain Name System
   (DNS) Parameters" registry group available at <xref target="RRTYPE"/>:</t>
        <artwork><![CDATA[
Type: RESINFO
Value: 261
Meaning: Resolver Information as Key/Value Pairs
Reference: RFCXXXX
]]></artwork>
      </section>
      <section anchor="key-reg">
        <name>DNS Resolver Information Key Registration</name>
        <t>This document requests IANA to create a new registry entitled "DNS
   Resolver Information Keys" under the "Domain Name System (DNS) Parameters" registry group (<xref target="IANA-DNS"/>).  This new registry contains definitions of
   the keys that can be used to provide the resolver information.</t>
        <t>The registration procedure is Specification Required (<xref section="4.6" sectionFormat="of" target="RFC8126"/>).</t>
        <t>The structure of the registry is as follows:</t>
        <dl>
          <dt>Name:</dt>
          <dd>
            <t>The key name.  The name <bcp14>MUST</bcp14> conform to the definition in
 <xref target="format"/> of this document.  The IANA registry <bcp14>MUST NOT</bcp14> register names that begin
 with "temp-", so these names can be used freely by any
 implementer.</t>
          </dd>
          <dt>Description:</dt>
          <dd>
            <t>A description of the registered key.</t>
          </dd>
          <dt>Specification:</dt>
          <dd>
            <t>The reference specification for the registered
 element.</t>
          </dd>
        </dl>
        <t>The initial content of this registry is provided in <xref target="initial"/>.</t>
        <table anchor="initial">
          <name>Initial RESINFO Registry</name>
          <thead>
            <tr>
              <th align="center">Name</th>
              <th align="left">Description</th>
              <th align="center">Specification</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="center">qnamemin</td>
              <td align="left">The presence of the key name indicates that QNAME minimization is enabled</td>
              <td align="center">RFCXXXX</td>
            </tr>
            <tr>
              <td align="center">exterr</td>
              <td align="left">Lists the set of supported extended DNS errors. It must be an INFO-CODE decimal value in the "Extended DNS Error Codes" registry.</td>
              <td align="center">RFCXXXX</td>
            </tr>
            <tr>
              <td align="center">infourl</td>
              <td align="left">Provides an URL that points to an unstructured resolver information that is used for troubleshooting</td>
              <td align="center">RFCXXXX</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8914">
          <front>
            <title>Extended DNS Errors</title>
            <author fullname="W. Kumari" initials="W." surname="Kumari"/>
            <author fullname="E. Hunt" initials="E." surname="Hunt"/>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="W. Hardaker" initials="W." surname="Hardaker"/>
            <author fullname="D. Lawrence" initials="D." surname="Lawrence"/>
            <date month="October" year="2020"/>
            <abstract>
              <t>This document defines an extensible method to return additional information about the cause of DNS errors. Though created primarily to extend SERVFAIL to provide additional information about the cause of DNS and DNSSEC failures, the Extended DNS Errors option defined in this document allows all response types to contain extended error information. Extended DNS Error information does not change the processing of RCODEs.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8914"/>
          <seriesInfo name="DOI" value="10.17487/RFC8914"/>
        </reference>
        <reference anchor="RFC9463">
          <front>
            <title>DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers (DNR)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="T. Reddy.K" initials="T." role="editor" surname="Reddy.K"/>
            <author fullname="D. Wing" initials="D." surname="Wing"/>
            <author fullname="N. Cook" initials="N." surname="Cook"/>
            <author fullname="T. Jensen" initials="T." surname="Jensen"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies new DHCP and IPv6 Router Advertisement options to discover encrypted DNS resolvers (e.g., DNS over HTTPS, DNS over TLS, and DNS over QUIC). Particularly, it allows a host to learn an Authentication Domain Name together with a list of IP addresses and a set of service parameters to reach such encrypted DNS resolvers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9463"/>
          <seriesInfo name="DOI" value="10.17487/RFC9463"/>
        </reference>
        <reference anchor="RFC9462">
          <front>
            <title>Discovery of Designated Resolvers</title>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="E. Kinnear" initials="E." surname="Kinnear"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <author fullname="T. Jensen" initials="T." surname="Jensen"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document defines Discovery of Designated Resolvers (DDR), a set of mechanisms for DNS clients to use DNS records to discover a resolver's encrypted DNS configuration. An Encrypted DNS Resolver discovered in this manner is referred to as a "Designated Resolver". These mechanisms can be used to move from unencrypted DNS to encrypted DNS when only the IP address of a resolver is known. These mechanisms are designed to be limited to cases where Unencrypted DNS Resolvers and their Designated Resolvers are operated by the same entity or cooperating entities. It can also be used to discover support for encrypted DNS protocols when the name of an Encrypted DNS Resolver is known.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9462"/>
          <seriesInfo name="DOI" value="10.17487/RFC9462"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC1035">
          <front>
            <title>Domain names - implementation and specification</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1035"/>
          <seriesInfo name="DOI" value="10.17487/RFC1035"/>
        </reference>
        <reference anchor="RFC6763">
          <front>
            <title>DNS-Based Service Discovery</title>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <author fullname="M. Krochmal" initials="M." surname="Krochmal"/>
            <date month="February" year="2013"/>
            <abstract>
              <t>This document specifies how DNS resource records are named and structured to facilitate service discovery. Given a type of service that a client is looking for, and a domain in which the client is looking for that service, this mechanism allows clients to discover a list of named instances of that desired service, using standard DNS queries. This mechanism is referred to as DNS-based Service Discovery, or DNS-SD.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6763"/>
          <seriesInfo name="DOI" value="10.17487/RFC6763"/>
        </reference>
        <reference anchor="RFC9156">
          <front>
            <title>DNS Query Name Minimisation to Improve Privacy</title>
            <author fullname="S. Bortzmeyer" initials="S." surname="Bortzmeyer"/>
            <author fullname="R. Dolmans" initials="R." surname="Dolmans"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="November" year="2021"/>
            <abstract>
              <t>This document describes a technique called "QNAME minimisation" to improve DNS privacy, where the DNS resolver no longer always sends the full original QNAME and original QTYPE to the upstream name server. This document obsoletes RFC 7816.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9156"/>
          <seriesInfo name="DOI" value="10.17487/RFC9156"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RRTYPE" target="https://www.iana.org/assignments/dns-parameters/dns-parameters.xhtml">
          <front>
            <title>Resource Record (RR) TYPEs</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="IANA-DNS" target="http://www.iana.org/assignments/dns-parameters/dns-parameters.xhtml#dns-parameters-4">
          <front>
            <title>Domain Name System (DNS) Parameters</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="RFC8499">
          <front>
            <title>DNS Terminology</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="A. Sullivan" initials="A." surname="Sullivan"/>
            <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
            <date month="January" year="2019"/>
            <abstract>
              <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has sometimes changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
              <t>This document obsoletes RFC 7719 and updates RFC 2308.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="219"/>
          <seriesInfo name="RFC" value="8499"/>
          <seriesInfo name="DOI" value="10.17487/RFC8499"/>
        </reference>
        <reference anchor="RFC8484">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="RFC7858">
          <front>
            <title>Specification for DNS over Transport Layer Security (TLS)</title>
            <author fullname="Z. Hu" initials="Z." surname="Hu"/>
            <author fullname="L. Zhu" initials="L." surname="Zhu"/>
            <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="D. Wessels" initials="D." surname="Wessels"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
              <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7858"/>
          <seriesInfo name="DOI" value="10.17487/RFC7858"/>
        </reference>
        <reference anchor="RFC9250">
          <front>
            <title>DNS over Dedicated QUIC Connections</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>This document describes the use of QUIC to provide transport confidentiality for DNS. The encryption provided by QUIC has similar properties to those provided by TLS, while QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides more efficient packet-loss recovery than UDP. DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC 7858, and latency characteristics similar to classic DNS over UDP. This specification describes the use of DoQ as a general-purpose transport for DNS and includes the use of DoQ for stub to recursive, recursive to authoritative, and zone transfer scenarios.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9250"/>
          <seriesInfo name="DOI" value="10.17487/RFC9250"/>
        </reference>
        <reference anchor="RFC7070">
          <front>
            <title>An Architecture for Reputation Reporting</title>
            <author fullname="N. Borenstein" initials="N." surname="Borenstein"/>
            <author fullname="M. Kucherawy" initials="M." surname="Kucherawy"/>
            <date month="November" year="2013"/>
            <abstract>
              <t>This document describes a general architecture for a reputation-based service, allowing one to request reputation-related data over the Internet, where "reputation" refers to predictions or expectations about an entity or an identifier such as a domain name. The document roughly follows the recommendations of RFC 4101 for describing a protocol model.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7070"/>
          <seriesInfo name="DOI" value="10.17487/RFC7070"/>
        </reference>
        <reference anchor="I-D.pp-add-resinfo">
          <front>
            <title>DNS Resolver Information Self-publication</title>
            <author fullname="Puneet Sood" initials="P." surname="Sood">
              <organization>Google</organization>
            </author>
            <author fullname="Paul E. Hoffman" initials="P. E." surname="Hoffman">
              <organization>ICANN</organization>
            </author>
            <date day="30" month="June" year="2020"/>
            <abstract>
              <t>   This document describes methods for DNS resolvers to self-publish
   information about themselves.  The information is returned as a JSON
   object.  The names in this object are defined in an IANA registry
   that allows for light-weight registration.  Applications and
   operating systems can use the methods defined here to get the
   information from resolvers in order to make choices about how to send
   future queries to those resolvers.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-pp-add-resinfo-02"/>
        </reference>
      </references>
    </references>
    <?line 277?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This specification leverages the work that has been documented in
   <xref target="I-D.pp-add-resinfo"/>.</t>
      <t>Thanks to Tommy Jensen, Vittorio Bertola, Vinny Parla, Chris Box, Ben
   Schwartz, Tony Finch, Daniel Kahn Gillmor, Eric Rescorla, Shashank
   Jain, Florian Obser, Richard Baldry, and Martin Thomson for the discussion and
   comments.</t>
      <t>Thanks to Mark Andrews, Joe Abley, Paul Wouters, and Tim
   Wicinski for the discussion on the RR formatting rules.</t>
      <t>Special thanks to Tommy Jensen for the careful and thoughtful Shepherd review.</t>
      <t>Thanks to Johan Stenstam and Jim Reid for the dns-dir reviews, Ray Bellis for the RRTYPE allocation review, and Arnt Gulbrandsen for the ART review.</t>
      <t>Thanks to Eric Vyncke for the AD review.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
