<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.3.10 -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-box-add-requirements-02" category="info" obsoletes="" updates="" submissionType="IETF" xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 2.47.0 -->
  <front>
    <title abbrev="ADDREQ">Requirements for Discovering Designated Resolvers</title>
    <seriesInfo name="Internet-Draft" value="draft-box-add-requirements-02"/>
    <author initials="C." surname="Box" fullname="Chris Box">
      <organization>BT</organization>
      <address>
        <postal>
          <street>2000 Park Avenue</street>
          <city>Bristol</city>
          <country>UK</country>
        </postal>
        <email>chris.box@bt.com</email>
      </address>
    </author>
    <author initials="T." surname="Pauly" fullname="Tommy Pauly">
      <organization>Apple</organization>
      <address>
        <postal>
          <street>One Apple Park Way</street>
          <city>Cupertino, California 95014</city>
          <country>United States of America</country>
        </postal>
        <email>tpauly@apple.com</email>
      </address>
    </author>
    <author initials="C.A." surname="Wood" fullname="Christopher A. Wood">
      <organization>Cloudflare</organization>
      <address>
        <postal>
          <street>101 Townsend St</street>
          <city>San Francisco</city>
          <country>United States of America</country>
        </postal>
        <email>caw@heapingbits.net</email>
      </address>
    </author>
    <author initials="T." surname="Reddy" fullname="Tirumaleswar Reddy">
      <organization>McAfee</organization>
      <address>
        <postal>
          <street>Embassy Golf Link Business Park</street>
          <city>Bangalore</city>
          <country>India</country>
        </postal>
        <email>TirumaleswarReddy_Konda@McAfee.com</email>
      </address>
    </author>
    <author initials="D." surname="Migault" fullname="Daniel Migault">
      <organization>Ericsson</organization>
      <address>
        <postal>
          <street>8275 Trans Canada Route</street>
          <city>Saint Laurent, QC</city>
          <country>Canada</country>
        </postal>
        <email>daniel.migault@ericsson.com</email>
      </address>
    </author>
    <date year="2021" month="January" day="24"/>
    <area>Internet</area>
    <workgroup>ADD</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>Adaptive DNS Discovery is chartered to define mechanisms that allow clients to discover and select encrypted DNS
resolvers. This document describes one common use case, namely that of clients that connect to a network but where they
cannot securely authenticate the identity of that network. In such cases the client would like to learn which
encrypted DNS resolvers are designated by that network or by the Do53 resolver offered by that network.
It lists requirements that any proposed discovery mechanisms should seek to address.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Source for this draft and an issue tracker can be found at
  <eref target="https://github.com/ietf-wg-add/draft-add-requirements"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" toc="default">
      <name>Introduction</name>
      <t>Several protocols for protecting DNS traffic with encrypted transports have been defined, such as DNS-over-TLS
(DoT) <xref target="RFC7858" format="default"/> and DNS-over-HTTPS (DoH) <xref target="RFC8484" format="default"/>. Encrypted DNS can provide many security and privacy
benefits for network clients.</t>
      <t>While it is possible for clients to statically configure encrypted DNS resolvers to use, dynamic discovery and
provisioning of encrypted resolvers can expand the usefulness and applicability of encrypted DNS to many more use cases.</t>
      <t>The Adaptive DNS Discovery (ADD) Working Group is chartered to define mechanisms that allow clients to automatically
discover and select encrypted DNS resolvers in a wide variety of network environments. This document describes one common
use case, namely that of clients that connect to a network but where they cannot securely authenticate
that network. Whether the network required credentials before the client was permitted to join is irrelevant; the client
still cannot be sure that it has connected to the network it was expecting.</t>
      <t>In such cases the client would like to learn which encrypted DNS resolvers are designated by that network, or by the Do53
resolver offered by that network. It lists requirements that any proposed discovery mechanisms should seek to address.
They can do this either by providing a solution, or by explicitly stating why it is not in scope.</t>
      <section anchor="requirements-language" numbered="true" toc="default">
        <name>Requirements language</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD",
"SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in BCP 14 <xref target="RFC2119" format="default"/> <xref target="RFC8174" format="default"/>
when, and only when, they appear in all capitals, as shown here.</t>
      </section>
    </section>
    <section anchor="terminology" numbered="true" toc="default">
      <name>Terminology</name>
      <t>This document makes use of the following terms.</t>
      <t>Encrypted DNS: DNS-over-HTTPS <xref target="RFC8484" format="default"/>, DNS-over-TLS <xref target="RFC7858" format="default"/>, or any other encrypted DNS technology that
the IETF may publish, such as DNS-over-QUIC <xref target="I-D.ietf-dprive-dnsoquic" format="default"/>.</t>
      <t>Do53: Unencrypted DNS over UDP port 53, or TCP port 53 <xref target="RFC1035" format="default"/>.</t>
      <t>Designated: See <xref target="designation" format="default"/>.</t>
      <t>Designator: The network or resolver that issued the designation.</t>
    </section>
    <section anchor="use-case-description" numbered="true" toc="default">
      <name>Use case description</name>
      <t>It is often the case that a client possesses no specific configuration for how to operate DNS, and at some point
joins a network that it cannot authenticate. It may have no prior knowledge of the network, or it may have connected
previously to a network that looked the same. In either case the usual behaviour, because of lack of specific
configuration, is to dynamically discover the network's designated Do53 resolver and use it. This long-standing practice
works in nearly all networks, but presents a number of privacy and security risks that were the motivation for the
development of encrypted DNS.</t>
      <t>The network's designated Do53 resolver may have a number of properties that differ from a generic resolver.
It may be able to answer names that are not known globally, it may exclude some names (for positive or negative
reasons), and it may provide address answers that have improved proximity. In this use case it is assumed that
the user who chose to join this network would also like to make use of these properties of the network's unencrypted resolver,
at least some of the time. However they would like to use an encrypted DNS protocol rather than Do53.</t>
      <t>Using an encrypted and authenticated resolver can provide several benefits that are not possible if only unencrypted DNS is used:</t>
      <ul spacing="normal">
        <li>Prevent other devices on the network from observing client DNS messages</li>
        <li>Authenticate that the DNS resolver is the correct one</li>
        <li>Verify that answers come from the selected DNS resolver</li>
      </ul>
      <t>To meet this case there should be a means by which the client can learn how to contact a set of encrypted DNS resolvers that
are designated by the network it has joined.</t>
      <section anchor="designation" numbered="true" toc="default">
        <name>Designation</name>
        <t>Designation is the process by which a local network or a resolver can point clients towards a particular set of resolvers.
This is not a new concept, as networks have been able to dynamically designate Do53 resolvers for decades (see <xref target="network" format="default"/>).
However here we extend the concept in two ways:</t>
        <ul spacing="normal">
          <li>To allow resolvers to designate other resolvers</li>
          <li>The inclusion of support for encrypted DNS</li>
        </ul>
        <t>The designated set could be empty, or it could list the contact details (such as DoH URI Template) of DNS resolvers that it recommends.
It is not required that there be any relationship between the resolvers in the set, simply that all of them are options that the
designator asserts are safe and appropriate for the client to use without user intervention.</t>
        <t>There are two possible sources of designation.</t>
        <ul spacing="normal">
          <li>The local network can designate one or more encrypted DNS resolvers (B, C, etc) in addition to any Do53 resolver (A) it may offer. This is known as network-identified.</li>
          <li>During communication with the (often unencrypted) resolver (A), this resolver can designate one or more encrypted DNS resolvers (B, C, etc). This is known as resolver-identified.</li>
        </ul>
        <t>Network-identified has the advantages that it derives from the same source of information as the network's Do53 announcement, and
removes the need to talk to the Do53 resolver at all. However it cannot be the sole mechanism, at least for several years, since
there is a large installed base of local network equipment that is difficult to upgrade with new features. Hence the second mechanism
should support being able to designate resolvers using only existing widely-deployed DNS features.</t>
      </section>
      <section anchor="local-addressing" numbered="true" toc="default">
        <name>Local addressing</name>
        <t>Many networks offer a Do53 resolver on an address that is not globally meaningful, e.g. <xref target="RFC1918" format="default"/>, link-local
or unique local addresses. To support the discovery of encrypted DNS in these environments, a means is needed for
the discovery process to work from a locally-addressed Do53 resolver to an encrypted DNS resolver that is accessible
either at the same (local) address, or at a different global address. Both options need to be supported.</t>
      </section>
      <section anchor="use-of-designation-information" numbered="true" toc="default">
        <name>Use of designation information</name>
        <t>After the client receives designation information, it must come to a decision on whether and when to use any of the
designated resolvers.</t>
        <t>In the case of resolver-identified designation, it would be advantageous for a solution to enable the client to
validate the source of the assertion in some way. For example it may be possible to verify that the designation
comes from an entity who already has full control of the client's Do53 queries. Network-identified designation should
not require this, unless the network-identified resolver in turn initiated a new resolver-identified designation.
It would be beneficial to extend such a verification process to defend against attackers that have only transient
control of such queries.</t>
        <t>Clients may also seek to validate the identity of the designated resolver, beyond what is required by the relevant
protocol. Authors of solution specifications should be aware that clients may impose arbitrary additional
requirements and heuristics as they see fit.</t>
      </section>
      <section anchor="network" numbered="true" toc="default">
        <name>Network-identified designated resolvers</name>
        <t>DNS servers are often provisioned by a network as part of DHCP options <xref target="RFC2132" format="default"/>,
IPv6 Router Advertisement (RA) options <xref target="RFC8106" format="default"/>, Point-to-Point Protocol (PPP) <xref target="RFC1877" format="default"/>, or
3GPP Protocol Configuration Options (TS24.008). Historically this is usually one or more Do53 resolver IP addresses,
to be used for traditional unencrypted DNS.</t>
        <t>A solution is required that enhances the set of information delivered to include details of one or more
designated encrypted DNS resolvers, or states that there are none. Such resolvers could be on the local network, somewhere
upstream, or on the public Internet.</t>
      </section>
      <section anchor="resolver-identified-designated-resolvers" numbered="true" toc="default">
        <name>Resolver-identified designated resolvers</name>
        <t>To support cases where the network is unable to identify an encrypted resolver, it should be possible to learn
the details of one or more designated encrypted DNS resolvers by communicating with the network's designated
Do53 resolver. This should involve an exchange that uses standard DNS messages that can be
handled, or forwarded, by existing deployed software.</t>
        <t>Each resolver in the set may be at a different network location, which leads to several subcases for the mapping from Do53
to a particular designated resolver.</t>
        <section anchor="local-to-local" numbered="true" toc="default">
          <name>Local to local</name>
          <t>If the local resolver has been upgraded to support encrypted DNS, the client may not initially be aware that its local resolver
supports it. Discovering this may require communication with the local resolver, or an upstream resolver, over Do53.
Clients that choose to use this local encrypted DNS gain the benefits of encryption while retaining the benefits
of a local caching resolver with knowledge of the local topology.</t>
          <t>Clients will be aware when the designated resolver has the same IP address as the Do53 (after looking up its name if required). They
can use this information in their decision-making as to the level of trust to place in the designated resolver.
In some networks it will not be possible to deploy encrypted DNS on the same IP address, e.g. because of the increased
resource requirements of encrypted DNS. Discovery solutions should work in the presence of a change to a different
local IP address.</t>
          <t>An additional benefit of using a local resolver occurs with IoT devices. A common usage pattern for such devices
is for it to "call home" to a service that resides on the public Internet, where that service is referenced through a
domain name. As discussed in Manufacturer Usage Description Specification <xref target="RFC8520" format="default"/>, because these devices
tend to require access to very few sites, all other access should be considered suspect. However, if the query
is not accessible for inspection, it becomes quite difficult for the infrastructure to suspect anything.</t>
        </section>
        <section anchor="local-to-upstream" numbered="true" toc="default">
          <name>Local to upstream</name>
          <t>It is frequently the case that Do53 resolvers announced by home networks are difficult to upgrade to support encrypted operation.
In such cases it is possible that the only option for encrypted operation is to refer to a separate globally-addressed
encrypted DNS resolver, somewhere upstream. Other networks may choose deploy their encrypted DNS resolver away from the
local network, for other reasons.</t>
          <t>The use of an upstream resolver can mean the loss of local knowledge, such as the ability to respond to queries for
locally-relevant names. Solutions should consider how to guide clients when to direct their queries to the local Do53.
For example this could be through pre-emptive communication ("if you ever need to query *.example.com, use your local Do53"),
or reactively ("I don't know the answer to that, but your local Do53 should know").</t>
        </section>
        <section anchor="public-to-public" numbered="true" toc="default">
          <name>Public to public</name>
          <t>In cases where the local network has designated a Do53 resolver on the public Internet, this resolver may designate its
own or another public encrypted DNS service. Since public IP addresses may appear in TLS certificates, solutions may
use this as one way to validate that the designated encrypted resolver is legitimately associated with the original Do53.</t>
        </section>
      </section>
      <section anchor="identification-over-an-encrypted-channel" numbered="true" toc="default">
        <name>Identification over an encrypted channel</name>
        <t>In cases where the designation is delivered over an authenticated and encrypted channel, such as when one encrypted DNS
resolver designates another, one form of attack is removed. Specifically, clients may be more confident that the received
designation was actually sent by the designator. Clients may take this into account when deciding whether to follow the
designation.</t>
      </section>
    </section>
    <section anchor="priv-sec" numbered="true" toc="default">
      <name>Privacy and security requirements</name>
      <t>Encrypted (and authenticated) DNS improves the privacy and security of DNS queries and answers in the presence of malicious
attackers. Such attackers are assumed to interfere with or otherwise impede DNS traffic and corresponding
discovery mechanisms. They may be on-path or off-path between the client and entities with which the client
communicates <xref target="RFC3552" format="default"/>. These attackers can inject, tamper, or otherwise interfere with traffic as needed.
Given these capabilities, an attacker may have a variety of goals, including, though not limited to:</t>
      <ul spacing="normal">
        <li>Monitor and profile clients by observing unencrypted DNS traffic</li>
        <li>Modify unencrypted DNS traffic to filter or augment the user experience</li>
        <li>Block encrypted DNS</li>
      </ul>
      <t>Given this type of attacker, resolver discovery mechanisms must be designed carefully to not worsen a client's security or
privacy posture. In particular, attackers under consideration must not be able to:</t>
      <ul spacing="normal">
        <li>Redirect secure DNS traffic to themselves when they would not otherwise handle DNS traffic.</li>
        <li>Override or interfere with the resolver preferences of a user or administrator.</li>
        <li>Cause clients to use a discovered resolver which has no designation from a client-known entity.</li>
      </ul>
      <t>When discovering DNS resolvers on a local network, clients have no mechanism to distinguish between cases 
where an active attacker with the above capabilities is interfering with discovery, and situations wherein 
the network has no encrypted resolver. Absent such a mechanism, an attacker can always succeed in these
goals. Therefore, in such circumstances, viable solutions for local DNS resolver discovery should consider 
weaker attackers, such as those with only passive eavesdropping capabilities. It is unknown whether such
relaxations represent a realistic attacker in practice. Thus, local discovery solutions designed around
this threat model may have limited value.</t>
    </section>
    <section anchor="requirements-summary" numbered="true" toc="default">
      <name>Statement of Requirements</name>
      <t>This section lists requirements that flow from the above sections.</t>
      <table align="center">
        <thead>
          <tr>
            <th align="left">Requirement</th>
            <th align="left">Description</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">R1.1</td>
            <td align="left">Discovery SHOULD provide a local network the ability to announce to clients a set of, or absence of, designated resolvers.</td>
          </tr>
          <tr>
            <td align="left">R1.2</td>
            <td align="left">Discovery SHOULD provide a resolver the ability to announce to clients a set of, or absence of, designated resolvers.</td>
          </tr>
          <tr>
            <td align="left">R1.3</td>
            <td align="left">Discovery SHOULD support all encrypted DNS protocols standardised by the IETF.</td>
          </tr>
          <tr>
            <td align="left">R2.1</td>
            <td align="left">Networks SHOULD be able to announce one or more designated encrypted DNS resolvers using existing mechanisms such as DHCPv4, DHCPv6, IPv6 Router Advertisement, and the Point-to-Point Protocol.</td>
          </tr>
          <tr>
            <td align="left">R2.2</td>
            <td align="left">The format for resolver designation SHOULD be specified such that provisioning mechanisms defined outside of the IETF can advertise encrypted DNS resolvers.</td>
          </tr>
          <tr>
            <td align="left">R2.3</td>
            <td align="left">This format SHOULD convey, at minimum, the information the client needs to make contact with each designated resolver.</td>
          </tr>
          <tr>
            <td align="left">R2.4</td>
            <td align="left">This format MAY convey additional resolver information.</td>
          </tr>
          <tr>
            <td align="left">R3.1</td>
            <td align="left">In resolver-identified designation (R1.2), the communication with the designator MAY be encrypted or not, depending on the capability of the resolver.</td>
          </tr>
          <tr>
            <td align="left">R3.2</td>
            <td align="left">In resolver-identified designation (R1.2), that resolver MAY be locally or globally reachable. Both options SHOULD be supported.</td>
          </tr>
          <tr>
            <td align="left">R4.1</td>
            <td align="left">If the local network resolver is a forwarder that does not offer encrypted DNS service, an upstream encrypted resolver SHOULD be retrievable via queries sent to that forwarder.</td>
          </tr>
          <tr>
            <td align="left">R4.2</td>
            <td align="left">Achieving requirement 4.1 SHOULD NOT require any changes to DNS forwarders hosted on non-upgradable legacy network devices.</td>
          </tr>
          <tr>
            <td align="left">R5.1</td>
            <td align="left">Discovery MUST NOT worsen a client's security or privacy posture.</td>
          </tr>
          <tr>
            <td align="left">R5.2</td>
            <td align="left">Threat modelling MUST assume that there is a passive eavesdropping attacker on the local network.</td>
          </tr>
          <tr>
            <td align="left">R5.3</td>
            <td align="left">Threat modelling MUST assume that an attacker can actively attack from outside the local network.</td>
          </tr>
          <tr>
            <td align="left">R5.4</td>
            <td align="left">Attackers MUST NOT be able to redirect encrypted DNS traffic to themselves when they would not otherwise handle DNS traffic.</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="security-considerations" numbered="true" toc="default">
      <name>Security Considerations</name>
      <t>See <xref target="priv-sec" format="default"/>.</t>
    </section>
    <section anchor="iana-considerations" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <seriesInfo name="DOI" value="10.17487/RFC2119"/>
            <seriesInfo name="RFC" value="2119"/>
            <seriesInfo name="BCP" value="14"/>
            <author initials="S." surname="Bradner" fullname="S. Bradner">
              <organization/>
            </author>
            <date year="1997" month="March"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <seriesInfo name="DOI" value="10.17487/RFC8174"/>
            <seriesInfo name="RFC" value="8174"/>
            <seriesInfo name="BCP" value="14"/>
            <author initials="B." surname="Leiba" fullname="B. Leiba">
              <organization/>
            </author>
            <date year="2017" month="May"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC7858" target="https://www.rfc-editor.org/info/rfc7858">
          <front>
            <title>Specification for DNS over Transport Layer Security (TLS)</title>
            <seriesInfo name="DOI" value="10.17487/RFC7858"/>
            <seriesInfo name="RFC" value="7858"/>
            <author initials="Z." surname="Hu" fullname="Z. Hu">
              <organization/>
            </author>
            <author initials="L." surname="Zhu" fullname="L. Zhu">
              <organization/>
            </author>
            <author initials="J." surname="Heidemann" fullname="J. Heidemann">
              <organization/>
            </author>
            <author initials="A." surname="Mankin" fullname="A. Mankin">
              <organization/>
            </author>
            <author initials="D." surname="Wessels" fullname="D. Wessels">
              <organization/>
            </author>
            <author initials="P." surname="Hoffman" fullname="P. Hoffman">
              <organization/>
            </author>
            <date year="2016" month="May"/>
            <abstract>
              <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS.  Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626.  In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
              <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group.  It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8484" target="https://www.rfc-editor.org/info/rfc8484">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <seriesInfo name="DOI" value="10.17487/RFC8484"/>
            <seriesInfo name="RFC" value="8484"/>
            <author initials="P." surname="Hoffman" fullname="P. Hoffman">
              <organization/>
            </author>
            <author initials="P." surname="McManus" fullname="P. McManus">
              <organization/>
            </author>
            <date year="2018" month="October"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS.  Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.ietf-dprive-dnsoquic" target="http://www.ietf.org/internet-drafts/draft-ietf-dprive-dnsoquic-01.txt">
          <front>
            <title>Specification of DNS over Dedicated QUIC Connections</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-dprive-dnsoquic-01"/>
            <author initials="C" surname="Huitema" fullname="Christian Huitema">
              <organization/>
            </author>
            <author initials="A" surname="Mankin" fullname="Allison Mankin">
              <organization/>
            </author>
            <author initials="S" surname="Dickinson" fullname="Sara Dickinson">
              <organization/>
            </author>
            <date month="October" day="20" year="2020"/>
            <abstract>
              <t>This document describes the use of QUIC to provide transport privacy for DNS.  The encryption provided by QUIC has similar properties to that provided by TLS, while QUIC transport eliminates the head-of- line blocking issues inherent with TCP and provides more efficient error corrections than UDP.  DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC7858, and latency characteristics similar to classic DNS over UDP.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC1035" target="https://www.rfc-editor.org/info/rfc1035">
          <front>
            <title>Domain names - implementation and specification</title>
            <seriesInfo name="DOI" value="10.17487/RFC1035"/>
            <seriesInfo name="RFC" value="1035"/>
            <seriesInfo name="STD" value="13"/>
            <author initials="P.V." surname="Mockapetris" fullname="P.V. Mockapetris">
              <organization/>
            </author>
            <date year="1987" month="November"/>
            <abstract>
              <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System.  It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC1918" target="https://www.rfc-editor.org/info/rfc1918">
          <front>
            <title>Address Allocation for Private Internets</title>
            <seriesInfo name="DOI" value="10.17487/RFC1918"/>
            <seriesInfo name="RFC" value="1918"/>
            <seriesInfo name="BCP" value="5"/>
            <author initials="Y." surname="Rekhter" fullname="Y. Rekhter">
              <organization/>
            </author>
            <author initials="B." surname="Moskowitz" fullname="B. Moskowitz">
              <organization/>
            </author>
            <author initials="D." surname="Karrenberg" fullname="D. Karrenberg">
              <organization/>
            </author>
            <author initials="G. J." surname="de Groot" fullname="G. J. de Groot">
              <organization/>
            </author>
            <author initials="E." surname="Lear" fullname="E. Lear">
              <organization/>
            </author>
            <date year="1996" month="February"/>
            <abstract>
              <t>This document describes address allocation for private internets.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC2132" target="https://www.rfc-editor.org/info/rfc2132">
          <front>
            <title>DHCP Options and BOOTP Vendor Extensions</title>
            <seriesInfo name="DOI" value="10.17487/RFC2132"/>
            <seriesInfo name="RFC" value="2132"/>
            <author initials="S." surname="Alexander" fullname="S. Alexander">
              <organization/>
            </author>
            <author initials="R." surname="Droms" fullname="R. Droms">
              <organization/>
            </author>
            <date year="1997" month="March"/>
            <abstract>
              <t>This document specifies the current set of DHCP options.  Future options will be specified in separate RFCs.  The current list of valid options is also available in ftp://ftp.isi.edu/in-notes/iana/assignments. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8106" target="https://www.rfc-editor.org/info/rfc8106">
          <front>
            <title>IPv6 Router Advertisement Options for DNS Configuration</title>
            <seriesInfo name="DOI" value="10.17487/RFC8106"/>
            <seriesInfo name="RFC" value="8106"/>
            <author initials="J." surname="Jeong" fullname="J. Jeong">
              <organization/>
            </author>
            <author initials="S." surname="Park" fullname="S. Park">
              <organization/>
            </author>
            <author initials="L." surname="Beloeil" fullname="L. Beloeil">
              <organization/>
            </author>
            <author initials="S." surname="Madanapalli" fullname="S. Madanapalli">
              <organization/>
            </author>
            <date year="2017" month="March"/>
            <abstract>
              <t>This document specifies IPv6 Router Advertisement (RA) options (called "DNS RA options") to allow IPv6 routers to advertise a list of DNS Recursive Server Addresses and a DNS Search List to IPv6 hosts.</t>
              <t>This document, which obsoletes RFC 6106, defines a higher default value of the lifetime of the DNS RA options to reduce the likelihood of expiry of the options on links with a relatively high rate of packet loss.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC1877" target="https://www.rfc-editor.org/info/rfc1877">
          <front>
            <title>PPP Internet Protocol Control Protocol Extensions for Name Server Addresses</title>
            <seriesInfo name="DOI" value="10.17487/RFC1877"/>
            <seriesInfo name="RFC" value="1877"/>
            <author initials="S." surname="Cobb" fullname="S. Cobb">
              <organization/>
            </author>
            <date year="1995" month="December"/>
            <abstract>
              <t>This document extends the NCP for establishing and configuring the Internet Protocol over PPP [2], defining the negotiation of primary and secondary Domain Name System (DNS) [3] and NetBIOS Name Server (NBNS) [4] addresses.  This memo provides information for the Internet community.  This memo does not specify an Internet standard of any kind.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8520" target="https://www.rfc-editor.org/info/rfc8520">
          <front>
            <title>Manufacturer Usage Description Specification</title>
            <seriesInfo name="DOI" value="10.17487/RFC8520"/>
            <seriesInfo name="RFC" value="8520"/>
            <author initials="E." surname="Lear" fullname="E. Lear">
              <organization/>
            </author>
            <author initials="R." surname="Droms" fullname="R. Droms">
              <organization/>
            </author>
            <author initials="D." surname="Romascanu" fullname="D. Romascanu">
              <organization/>
            </author>
            <date year="2019" month="March"/>
            <abstract>
              <t>This memo specifies a component-based architecture for Manufacturer Usage Descriptions (MUDs).  The goal of MUD is to provide a means for end devices to signal to the network what sort of access and network functionality they require to properly function.  The initial focus is on access control.  Later work can delve into other aspects.</t>
              <t>This memo specifies two YANG modules, IPv4 and IPv6 DHCP options, a Link Layer Discovery Protocol (LLDP) TLV, a URL, an X.509 certificate extension, and a means to sign and verify the descriptions.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC3552" target="https://www.rfc-editor.org/info/rfc3552">
          <front>
            <title>Guidelines for Writing RFC Text on Security Considerations</title>
            <seriesInfo name="DOI" value="10.17487/RFC3552"/>
            <seriesInfo name="RFC" value="3552"/>
            <seriesInfo name="BCP" value="72"/>
            <author initials="E." surname="Rescorla" fullname="E. Rescorla">
              <organization/>
            </author>
            <author initials="B." surname="Korver" fullname="B. Korver">
              <organization/>
            </author>
            <date year="2003" month="July"/>
            <abstract>
              <t>All RFCs are required to have a Security Considerations section. Historically, such sections have been relatively weak.  This document provides guidelines to RFC authors on how to write a good Security Considerations section.   This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="acknowledgments" toc="default">
      <name>Acknowledgments</name>
      <t>This document was started based on discussion during the ADD meeting of IETF108, subsequent meetings,
on the list, and with text from draft-pauly-add-requirements. In particular this document was informed by contributions
from Martin Thomson, Eric Rescorla, Tommy Jensen, Ben Schwartz, Paul Hoffman, Ralf Weber, Michael Richardson,
Mohamed Boucadair, Sanjay Mishra, Jim Reid, Neil Cook, Nic Leymann, Andrew Campling, Eric Orth, Ted Hardie,
Paul Vixie, Vittorio Bertola, and Vinny Parla.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
