<?xml version="1.0" encoding="us-ascii"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.2.13 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc comments="yes"?>

<rfc ipr="trust200902" docName="draft-huitema-dprive-dnsoquic-00" category="std">

  <front>
    <title abbrev="DNS over Dedicated QUIC">Specification of DNS over Dedicated QUIC Connections</title>

    <author initials="C." surname="Huitema" fullname="Christian Huitema">
      <organization>Private Octopus Inc.</organization>
      <address>
        <postal>
          <street>427 Golfcourse Rd</street>
          <city>Friday Harbor</city>
          <code>WA 98250</code>
          <country>U.S.A</country>
        </postal>
        <email>huitema@huitema.net</email>
      </address>
    </author>
    <author initials="A." surname="Mankin" fullname="Allison Mankin">
      <organization>Salesforce</organization>
      <address>
        <email>amankin@salesforce.com</email>
      </address>
    </author>
    <author initials="S." surname="Dickinson" fullname="Sara Dickinson">
      <organization>Sinodun IT</organization>
      <address>
        <postal>
          <street>Oxford Science Park</street>
          <city>Oxford</city>
          <code>OX4 4GA</code>
          <country>U.K.</country>
        </postal>
        <email>sara@sinodun.com</email>
      </address>
    </author>

    <date year="2020" month="March" day="05"/>

    <area>Transport</area>
    
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document describes the use of QUIC to provide transport privacy for DNS.
The encryption provided by QUIC has similar properties to that provided by TLS,
while QUIC transport eliminates the head-of-line blocking issues inherent with
TCP and provides more efficient error corrections than UDP. DNS over QUIC
(DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC7858,
and performance characteristics similar to classic DNS over UDP.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>Domain Name System (DNS) concepts are specified in <xref target="RFC1034"/>.  This
document presents a mapping of the DNS protocol <xref target="RFC1035"/> over QUIC
transport <xref target="I-D.ietf-quic-transport"/> <xref target="I-D.ietf-quic-tls"/>. DNS over QUIC is
refered here as DoQ, in line with the terminology presented in
<xref target="I-D.ietf-dnsop-terminology-ter"/>. The
goals of the DoQ mapping are:</t>

<t><list style="numbers">
  <t>Provide the same DNS privacy protection as DNS over TLS (DoT)
<xref target="RFC7858"/>. This includes an option for the client to 
authenticate the server by means of an authentication domain
name <xref target="RFC8310"/>.</t>
  <t>Provide an improved level of source address validation for DNS
servers compared to classic DNS over UDP <xref target="RFC1035"/>.</t>
  <t>Provide a transport that is not constrained by path MTU limitations on the 
size of DNS responses it can send.</t>
  <t>Explore the potential performance gains of using QUIC as a DNS
transport, versus other solutions like DNS over UDP (DNS/UDP) <xref target="RFC1035"/> or
DoT <xref target="RFC7858"/>.</t>
</list></t>

<t>In order to achieve these goals, the focus of this document is limited
to the "stub to recursive resolver" scenario also addressed by <xref target="RFC7858"/>.
That is, the protocol described here works for queries and responses between
stub clients and recursive servers. The specific non-goals of this document are:</t>

<t><list style="numbers">
  <t>No attempt is made to support zone transfers <xref target="RFC5936"/>, as these
are not relevant to the stub to recursive resolver scenario.</t>
  <t>No attempt is made to evade potential blocking of DNS/QUIC
traffic by middleboxes.</t>
</list></t>

<t>Users interested in zone transfers should continue using TCP based
solutions and will also want to take note of work in progress to
encrypt zone transfers using DoT <xref target="I-D.ietf-dprive-xfr-over-tls"/>.
Users interested in evading middleboxes should
consider using solutions like DNS/HTTPS <xref target="RFC8484"/>.</t>

<t>Specifying the transmission of an application over QUIC requires
specifying how the application's messages are mapped to QUIC streams, and
generally how the application will use QUIC.  This is done for HTTP
in <xref target="I-D.ietf-quic-http"/>.  The purpose of this document is to define
the way DNS messages can be transmitted over QUIC.</t>

<t>In this document, <xref target="design-considerations"/> presents the reasoning that guided
the proposed design. <xref target="specifications"/> specifies the actual mapping of DoQ.
<xref target="implementation-requirements"/> presents guidelines on the implementation, usage
and deployment of DoQ.</t>

</section>
<section anchor="key-words" title="Key Words">

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in <xref target="RFC8174"/>.</t>

</section>
<section anchor="design-considerations" title="Design Considerations">

<t>This section and its subsection present the design guidelines that
were used for DoQ.  This section is
informative in nature.</t>

<section anchor="scope-is-limited-to-the-stub-to-resolver-scenario" title="Scope is Limited to the Stub to Resolver Scenario">

<t>Usage scenarios for the DNS protocol can be broadly classified in three
groups: stub to recursive resolver, recursive resolver to
authoritative server, and server to server.  This design focuses only on the 
"stub to recursive resolver" scenario following the approach taken in
<xref target="RFC7858"/> and <xref target="RFC8310"/>.</t>

<t>QUESTION: Should this document specify any aspects of configuration of
discoverability differently to DoT?</t>

<t>No attempt is made to address the recursive to authoritative scenarios.
Authoritative resolvers are discovered dynamically through NS records. It is
noted that at the time of writing work is ongoing in the DPRIVE working group to
attempt to address the analogous problem for DoT
<xref target="I-D.ietf-dprive-phase2-requirements"/>. In the absence of an agreed way for
authoritative to signal support for QUIC transport, recursive resolvers would
have to resort to some trial and error process. At this stage of QUIC
deployment, this would be mostly errors, and does not seem attractive. This
could change in the future.</t>

<t>The DNS protocol is also used for zone transfers. In the zone transfer scenario
<xref target="RFC5936"/>, the client emits a single AXFR query, and the server responds
with a series of AXFR responses. This creates a unique profile, in which a query
results in several responses. Supporting that profile would complicate the
mapping of DNS queries over QUIC streams. Zone transfers are not used in the
stub to recursive scenario that is the focus here, and seem to be currently well
served by using DNS over TCP. There is no attempt to support them in
this proposed mapping of DNS to QUIC.</t>

</section>
<section anchor="provide-dns-privacy" title="Provide DNS Privacy">

<t>DNS privacy considerations are described in <xref target="RFC7626"/>. <xref target="RFC7858"/> defines how
to mitigate some of these issues by transmitting DNS messages over TLS and TCP
and <xref target="RFC8310"/> specifies Strict and Opportunistic Usage Profiles for DoT
including how stub resolvers can authenticate recursive resolvers.</t>

<t>QUIC connection setup includes the negotiation of security parameters using TLS,
as specified in <xref target="I-D.ietf-quic-tls"/>, enabling encryption of the QUIC
transport. Transmitting DNS messages over QUIC will provide essentially the same
privacy protections as <xref target="RFC7858"/> and <xref target="RFC8310"/>. Further discussion on this
is provided in <xref target="privacy-considerations"/>.</t>

</section>
<section anchor="design-for-minimum-latency" title="Design for Minimum Latency">

<t>QUIC is specifically designed to reduce the delay between HTTP
queries and HTTP responses.  This is achieved through three main
components:</t>

<t><list style="numbers">
  <t>Support for 0-RTT data during session resumption.</t>
  <t>Support for advanced error recovery procedures as specified in
<xref target="I-D.ietf-quic-recovery"/>.</t>
  <t>Mitigation of head-of-line blocking by allowing parallel
delivery of data on multiple streams.</t>
</list></t>

<t>This mapping of DNS to QUIC will take advantage of these features in
three ways:</t>

<t><list style="numbers">
  <t>Optional support for sending 0-RTT data during session resumption
(the security and privacy implications of this are discussed 
in later sections).</t>
  <t>Long-lived QUIC connections over which multiple DNS transactions
are performed,
generating the sustained traffic required to benefit from
advanced recovery features.</t>
  <t>Fast resumption of QUIC connections to manage the disconnect-on-idle
feature of QUIC without incurring retransmission time-outs.</t>
  <t>Mapping of each DNS Query/Response transaction to a separate stream,
to mitigate head-of-line blocking.</t>
</list></t>

<t>These considerations will be reflected in the mapping of DNS traffic
to QUIC streams in <xref target="stream-mapping-and-usage"/>.</t>

</section>
<section anchor="no-specific-middlebox-bypass-mechanism" title="No Specific Middlebox Bypass Mechanism">

<t>The mapping of DNS over QUIC is defined for minimal overhead and
maximum performance. This means a different traffic profile than HTTP over 
QUIC. This difference can be
noted by firewalls and middleboxes.  There may be environments in
which HTTP/QUIC will be allowed, but DoQ will be
disallowed and blocked by these middle boxes.</t>

<t>It is recognized that this might be a problem, but there is currently no
indication on how widespread that problem might be. The problem might be
acute enough that the only realistic solution would
be to communicate with independent recursive resolvers using DNS/HTTPS,
or maybe DNS/HTTP/QUIC.  Or the problem might be rare enough and the
performance gains significant enough
that the appropriate solution would be to use DoQ most of the time,
and fall back to DNS/HTTPS some of the time. Measurements
and experimentation will inform that decision.</t>

<t>It may indeed turn out that the complexity and overhead concerns are
negligible compared to the potential advantages of DNS/HTTPS, such
as integration with web services or firewall traversal, and that DoQ
does not provide sufficient performance gains to justify a new protocol. We
will evaluate that once implementations are available and can be compared.</t>

</section>
</section>
<section anchor="specifications" title="Specifications">

<section anchor="connection-establishment" title="Connection Establishment">

<t>DoQ connections are established as described in
<xref target="I-D.ietf-quic-transport"/>.  During connection establishment, DoQ
support is indicated by selecting the ALPN token "dq" in the crypto
handshake.</t>

<section anchor="draft-version-identification" title="Draft Version Identification">

<t><spanx style="strong">RFC Editor's Note:</spanx> Please remove this section prior to
 publication of a final version of this document.</t>

<t>Only implementations of the final, published RFC can identify
themselves as "doq".  Until such an RFC exists, implementations MUST
NOT identify themselves using this string.</t>

<t>Implementations of draft versions of the protocol MUST add the string
"-" and the corresponding draft number to the identifier.  For
example, draft-huitema-dprive-dnsoquic-00 is identified using the
string "doq-h00".</t>

</section>
<section anchor="port-selection" title="Port Selection">

<t>By default, a DNS server that supports DoQ MUST listen for and
accept QUIC connections on the dedicated UDP port TBD (number to be
defined in <xref target="iana-considerations"/>, unless it has mutual
agreement with its clients to use a port other than TBD for DoQ.
In order to use a port other than TBD, both clients and
servers would need a configuration option in their software.</t>

<t>By default, a DNS client desiring to use DoQ with a
particular server MUST establish a QUIC connection to UDP port TBD on
the server, unless it has mutual agreement with its server to use a
port other than port TBD for DoQ.  Such another port MUST
NOT be port 53 or port 853.  This recommendation against use of port
53 for DoQ is to avoid confusion between DoQ and
DNS/UDP as specified in <xref target="RFC1035"/>.  Similarly, using port 853
would cause confusion between DoQ and DNS/DTLS as
specified in <xref target="RFC8094"/>.</t>

</section>
</section>
<section anchor="stream-mapping-and-usage" title="Stream Mapping and Usage">

<t>The mapping of DNS traffic over QUIC streams takes advantage of the
QUIC stream features detailed in Section 2 of <xref target="I-D.ietf-quic-transport"/>.</t>

<t>The stub to resolver DNS traffic follows a simple pattern in which
the client sends a query, and the server provides a response.  This design
specifies that for each subsequent query on a QUIC connection the client MUST 
select the next available client-initiated bidirectional stream, in
conformance with <xref target="I-D.ietf-quic-transport"/>.</t>

<t>The client MUST send the DNS query over the selected stream, and MUST
indicate through the STREAM FIN mechanism that no further data will
be sent on that stream.</t>

<t>The server MUST send the response on the same stream, and MUST
indicate through the STREAM FIN mechanism that no further
data will be sent on that stream.</t>

<t>Therefore, a single client initiated DNS transaction consumes a single stream.
This means that the client's first query occurs on QUIC stream 0, the second on 4,
and so on.</t>

<section anchor="server-initiated-transactions" title="Server Initiated Transactions">

<t>There are planned traffic patterns in which a server sends
unsolicited queries to a client, such as for example PUSH messages
defined in <xref target="I-D.ietf-dnssd-push"/>. 
These occur when a client subscribes to
changes for a particular DNS RRset or resource record type. When a 
PUSH server wishes to send such
updates it MUST select the next available server initiated
bidirectional stream, in
conformance with <xref target="I-D.ietf-quic-transport"/>.</t>

<t>The server MUST send the DNS query over the selected stream, and MUST indicate
through the STREAM FIN mechanism that no further data will be sent on
that stream.</t>

<t>The client MUST send the response on the same stream, and MUST
indicate through the STREAM FIN mechanism that no further
data will be sent on that stream.</t>

<t>Therefore a single server initiated DNS transaction consumes a single stream. 
This means that the 
servers's first query occurs on QUIC stream 1, the second on 5, and so on.</t>

</section>
<section anchor="stream-reset" title="Stream Reset">

<t>Stream transmission may be abandoned by either party, using the
stream "reset" facility.  A stream reset indicates that one party is
unwilling to continue processing the transaction associated with the
stream.  The corresponding transaction MUST be abandoned.  A Server
Failure (SERVFAIL, <xref target="RFC1035"/>) SHOULD be notified to the initiator of
the transaction.</t>

</section>
</section>
<section anchor="connection-management" title="Connection Management">

<t>Section 10 of the QUIC transport specifications <xref target="I-D.ietf-quic-transport"/>
specifies that connections can be closed in three ways:</t>

<t><list style="symbols">
  <t>idle timeout</t>
  <t>immediate close</t>
  <t>stateless reset</t>
</list></t>

<t>Clients and servers implementing DNS over QUIC SHOULD negotiate use of
the idle timeout. Closing on idle-timeout is done without any packet exchange,
which minimizes protocol overhead. This document does not recommend 
a specific value of the idle timer.</t>

<t>Clients SHOULD monitor the idle time incurred on their connection to
the server, defined by the time spend since the last packet from
the server has been received. When a client prepares to send a new DNS
query to the server, it will check whether the idle time is sufficient
lower than the idle timer. If it is, the client will send the DNS
query over the existing connection. If not, the client will establish
a new connection and send the query over that connection.</t>

<t>Clients MAY discard their connection to the server before the idle
timeout expires. If they do that, they SHOULD close the connection
explicitly, using QUIC's CONNECTION_CLOSE mechanisms, and indicating
the Application reason "No Error".</t>

<t>Clients and servers may close the connection for a variety of other
reasons, indicated using QUIC's CONNECTION_CLOSE. Client and servers
that send packets over a connection discarded by their peer MAY
receive a stateless reset indication. If a connection fails,
all queries in progress over the connection MUST be considered failed,
and aServer Failure (SERVFAIL, <xref target="RFC1035"/>) SHOULD be notified
to the initiator of the transaction.</t>

</section>
<section anchor="connection-resume-and-0-rtt" title="Connection Resume and 0-RTT">

<t>A stub resolver MAY take advantage of the connection resume
mechanisms supported by QUIC transport <xref target="I-D.ietf-quic-transport"/> and
QUIC TLS <xref target="I-D.ietf-quic-tls"/>.  Stub resolvers SHOULD consider
potential privacy issues associated with session resume before
deciding to use this mechanism.  These privacy issues are detailed in
<xref target="privacy-issues-with-session-resume"/>.</t>

<t>When resuming a session, a stub resolver MAY take advantage of the
0-RTT mechanism supported by QUIC.  The 0-RTT mechanism MUST NOT be
used to send data that is not "replayable" transactions.  For
example, a stub resolver MAY transmit a Query as 0-RTT, but MUST NOT
transmit an Update.</t>

</section>
</section>
<section anchor="implementation-requirements" title="Implementation Requirements">

<section anchor="authentication" title="Authentication">

<t>For the stub to recursive resolver scenario, the authentication
requirements are the same as described in <xref target="RFC7858"/> and
<xref target="RFC8310"/>.  There is no need to
authenticate the client's identity in either scenario.</t>

</section>
<section anchor="fall-back-to-other-protocols-on-connection-failure" title="Fall Back to Other Protocols on Connection Failure">

<t>If the establishment of the DoQ connection fails, clients
SHOULD attempt to fall back to DoT and then potentially clear 
text, as specified in <xref target="RFC7858"/> and 
<xref target="RFC8310"/>, depending on their privacy
profile.</t>

<t>DNS clients SHOULD remember server IP addresses that don't support
DoQ, including timeouts, connection refusals, and QUIC
handshake failures, and not request DoQ from them for a
reasonable period (such as one hour per server).  DNS clients
following an out-of-band key-pinned privacy profile (<xref target="RFC7858"/>) MAY
be more aggressive about retrying DoQ connection failures.</t>

</section>
<section anchor="address-validation" title="Address Validation">

<t>The QUIC transport specification defines Address Validation procedures
to avoid servers being used in address amplification attacks (see
section 8 of <xref target="I-D.ietf-quic-transport"/>). DoQ implementations
MUST conform to this specification, which limits the worst case
amplification to a factor 3.</t>

<t>DoQ implementations SHOULD consider configuring servers to use
the Address Validation using Retry Packets procedure defined in
section 8.1.2 of <xref target="I-D.ietf-quic-transport"/>). This procedure
imposes a 1-RTT delay for verifying the return routability of the
source address of a client, similar to the DNS Cookies mechanism
defined in <xref target="RFC7873"/>.</t>

<t>DoQ implementations that configure Address Validation using Retry
Packets SHOULD implement the Address Validation for Future Connections
procedure defined in section 8.1.3 of <xref target="I-D.ietf-quic-transport"/>).
This define how servers can send NEW TOKEN frames to clients after the
client address is validated, in order to avoid the 1-RTT penalty during
subsequent connections by the client from the same address.</t>

</section>
<section anchor="response-sizes" title="Response Sizes">

<t>DoQ does not suffer from the same limitations on the size of queries and
responses that as DNS/UDP <xref target="RFC1035"/> does. Queries and Responses are sent
on QUIC streams, which in theory can carry up to 2^62 bytes. However,
clients or servers MAY impose a limit on the maximum size of data that
they can accept over a given stream. This is controlled in QUIC by
the transport parameters:</t>

<t><list style="symbols">
  <t>initial_max_stream_data_bidi_local: when set by the client, specifies
the amount of data that servers can send on a "response" stream without
waiting for a MAX_STREAM_DATA frame.</t>
  <t>initial_max_stream_data_bidi_remote: when set by the server, specifies
the amount of data that clients can send on a "query" stream without
waiting for a MAX_STREAM_DATA frame.</t>
</list></t>

<t>Clients and servers SHOULD treat these parameters as the practical maximum
of queries and responses. If the EDNS parameters of a Query indicate a lower
message size, servers MUST comply with that indication.</t>

</section>
<section anchor="dns-message-ids" title="DNS Message IDs">

<t>When sending queries over a QUIC connection, the DNS Message ID MUST be set to
zero.</t>

</section>
<section anchor="padding" title="Padding">

<t>There are mechanisms specified for both padding individual DNS messages
<xref target="RFC7830"/>, <xref target="RFC8467"/> and padding within QUIC
packets (see Section 8.6 of <xref target="I-D.ietf-quic-transport"/>), which may contain
multiple frames.</t>

<t>Implementations SHOULD NOT use DNS options for
padding individual DNS messages, because QUIC transport
MAY transmit multiple STREAM frames containing separate DNS messages in
a single QUIC packet. Instead, implementations SHOULD use QUIC PADDING frames
to align the packet length to a small set of fixed sizes, aligned with
the recommendations of <xref target="RFC8467"/>.</t>

</section>
<section anchor="connection-handling" title="Connection Handling">

<t><xref target="RFC7766"/> provides updated
guidance on DNS/TCP much of which is applicable to DoQ. This 
section attempts to specify how those considerations apply to DoQ.</t>

<section anchor="connection-reuse" title="Connection Reuse">

<t>Historic implementations of DNS stub resolvers are known to open and
close TCP connections for each DNS query. To avoid excess QUIC
connections, each with a single query, clients SHOULD reuse a single
QUIC connection to the recursive resolver.</t>

<t>In order to achieve performance on par with UDP, DNS clients SHOULD
send their queries concurrently over the QUIC streams on a QUIC connection.
That is, when a DNS client 
sends multiple queries to a server over a QUIC connection, it SHOULD NOT wait
for an outstanding reply before sending the next query.</t>

</section>
<section anchor="connection-close" title="Connection Close">

<t>In order to amortize QUIC and TLS connection setup costs, clients and
servers SHOULD NOT immediately close a QUIC connection after each
response.  Instead, clients and servers SHOULD reuse existing
QUIC connections for subsequent queries as long as they have sufficient
resources.  In some cases, this means that clients and servers may
need to keep idle connections open for some amount of time.</t>

<t>Under normal operation DNS clients typically initiate connection
closing on idle connections; however, DNS servers can close the
connection if the idle timeout set by local policy is exceeded.
Also, connections can be closed by either end under unusual
conditions such as defending against an attack or system failure/
reboot.</t>

<t>Clients and servers that keep idle connections open MUST be robust to
termination of idle connection by either party.  As with current DNS
over TCP, DNS servers MAY close the connection at any time (perhaps
due to resource constraints).  As with current DNS/TCP, clients
MUST handle abrupt closes and be prepared to reestablish connections
and/or retry queries.</t>

</section>
<section anchor="idle-timeouts" title="Idle Timeouts">

<t>Proper management of established and idle connections is important to
the healthy operation of a DNS server.  An implementation of DoQ
SHOULD follow best practices for DNS/TCP, as described in
<xref target="RFC7766"/>.  Failure to do so may lead to resource exhaustion and
denial of service.</t>

<t>This document does not make specific recommendations for timeout
values on idle connections.  Clients and servers should reuse and/or
close connections depending on the level of available resources.
Timeouts may be longer during periods of low activity and shorter
during periods of high activity.  Current work in this area may also
assist DoT clients and servers in selecting useful timeout
values <xref target="RFC7828"/> <xref target="RFC8490"/> <xref target="TDNS"/>.</t>

<t>Clients that are willing to use QUIC's 0-RTT mechanism can reestablish
connections and send transactions on the new connection with minimal
delay overhead. These clients MAY chose low values of the idle timer,
but SHOULD NOT pick value lower than 20 seconds.</t>

<t>Per section 10.2 of QUIC transport specification, the effective value of
the idle timeout is  computed as the minimum of the values advertised by
the two endpoints.</t>

</section>
</section>
<section anchor="flow-control-mechanisms" title="Flow Control Mechanisms">

<t>Servers and Clients manage flow control as specified in QUIC.</t>

<t>Servers MAY use the "maximum stream ID" option of the QUIC
transport to limit the number of streams opened by the
client. This mechanism will effectively limit the number of 
DNS queries that a client can send.</t>

</section>
</section>
<section anchor="security-considerations" title="Security Considerations">

<t>The security considerations of DoQ should be comparable to
those of DoT <xref target="RFC7858"/>.</t>

</section>
<section anchor="privacy-considerations" title="Privacy Considerations">

<t>DoQ is specifically designed to protect the DNS traffic
between stub and resolver from observations by third parties, and
thus protect the privacy of queries from the stub.  However, the recursive
resolver has full visibility of the stub's traffic, and could be used
as an observation point, as discussed in <xref target="I-D.ietf-dprive-rfc7626-bis"/>. These considerations
do not differ between DoT and DoQ and are not discussed
further here.</t>

<t>QUIC incorporates the mechanisms of TLS 1.3 <xref target="RFC8446"/> and
this enables QUIC transmission of "Zero-RTT" data.  This can
provide interesting latency gains, but it raises two concerns:</t>

<t><list style="numbers">
  <t>Adversaries could replay the zero-RTT data and infer its content
from the behavior of the receiving server.</t>
  <t>The zero-RTT mechanism relies on TLS resume, which can provide
linkability between successive client sessions.</t>
</list></t>

<t>These issues are developed in <xref target="privacy-issues-with-zero-rtt-data"/> and 
<xref target="privacy-issues-with-session-resume"/>.</t>

<section anchor="privacy-issues-with-zero-rtt-data" title="Privacy Issues With Zero RTT data">

<t>The zero-RTT data can be replayed by adversaries.  That data may
triggers a query by a recursive resolver to an authoritative
resolvers.  Adversaries may be able to pick a time at which the
recursive resolver outgoing traffic is observable, and thus find out
what name was queried for in the 0-RTT data.</t>

<t>This risk is in fact a subset of the general problem of observing the
behavior of the recursive resolver discussed in  <xref target="RFC7626"/>. The
attack is partially mitigated by reducing the observability of this
traffic.  However, the risk is amplified for 0-RTT data, because the
attacker might replay it at chosen times, several times.</t>

<t>The recommendation in <xref target="RFC8446"/> is that the capability to
use 0-RTT data should be turned off by default, on only enabled if
the user clearly understands the associated risks.</t>

<t>QUESTION: Should 0-RTT only be used with Opportunistic profiles (i.e.
disabled by default for Strict only)?</t>

</section>
<section anchor="privacy-issues-with-session-resume" title="Privacy Issues With Session Resume">

<t>The QUIC session resume mechanism reduces the cost of reestablishing
sessions and enables zero-RTT data.  There is a linkability issue
associated with session resume, if the same resume token is used
several times, but this risk is mitigated by the mechanisms
incorporated in QUIC and in TLS 1.3.  With these mechanisms, clients
and servers can cooperate to avoid linkability by third parties.
However, the server will always be able to link the resumed session
to the initial session.  This creates a virtual long duration
session.  The series of queries in that session can be used by the
server to identify the client.</t>

<t>Enabling the server to link client sessions through session resume is
probably not a large additional risk if the client's connectivity did
not change between the sessions, since the two sessions can probably
be correlated by comparing the IP addresses.  On the other hand, if
the addresses did change, the client SHOULD consider whether the
linkability risk exceeds the privacy benefits.  This evaluation will
obviously depend on the level of trust between stub and recursive.</t>

</section>
<section anchor="traffic-analysis" title="Traffic Analysis">

<t>Even though QUIC packets are encrypted, adversaries can gain information from
observing packet lengths, in both queries and responses, as well as packet
timing. Many DNS requests are emitted by web browsers. Loading a specific
web page may require resolving dozen of DNS names. If an application
adopts a simple mapping of one query or response per packet, or "one 
QUIC STREAM frame per packet", then the succession of packet lengths may
provide enough information to identify the requested site.</t>

<t>Implementations SHOULD use the mechanisms defined in <xref target="padding"/> to
mitigate this attack.</t>

</section>
</section>
<section anchor="iana-considerations" title="IANA Considerations">

<section anchor="registration-of-doq-identification-string" title="Registration of DoQ Identification String">

<t>This document creates a new registration for the identification of
   DoQ in the "Application Layer Protocol Negotiation (ALPN)
   Protocol IDs" registry established in <xref target="RFC7301"/>.</t>

<t>The "doq" string identifies DoQ:</t>

<t>Protocol:  DoQ</t>

<t>Identification Sequence:  0x64 0x71 ("dq")</t>

<t>Specification:  This document</t>

</section>
<section anchor="reservation-of-dedicated-port" title="Reservation of Dedicated Port">

<t>IANA is required to add the following value to the "Service Name and
   Transport Protocol Port Number Registry" in the System Range.  The
   registry for that range requires IETF Review or IESG Approval
   {{?RFC6335], and such a review was requested using the early allocation
   process {{?RFC7120] for the well-known UDP port in this document. Since
   port 853 is reserved for 'DNS query-response protocol run over TLS' 
   consideration is requested for reserving port TBD for 'DNS query-response<vspace />
   protocol run over QUIC'.</t>

<figure><artwork><![CDATA[
   Service Name           domain-s
   Transport Protocol(s)  TCP/UDP
   Assignee               IESG
   Contact                IETF Chair
   Description            DNS query-response protocol run over QUIC
   Reference              This document
]]></artwork></figure>

<section anchor="port-number-784-for-experimentations" title="Port number 784 for experimentations">

<t><spanx style="strong">RFC Editor's Note:</spanx> Please remove this section prior to
 publication of a final version of this document.</t>

<t>Early experiments MAY use port 784. This port is marked in the IANA 
registry as unassigned.</t>

</section>
</section>
</section>
<section anchor="acknowledgements" title="Acknowledgements">

<t>This document liberally borrows text from <xref target="I-D.ietf-quic-http"/>
edited by Mike Bishop, and from <xref target="RFC7858"/> authored by Zi Hu, Liang
Zhu, John Heidemann, Allison Mankin, Duane Wessels, and Paul Hoffman.</t>

<t>The privacy issue with 0-RTT data and session resume were analyzed by
Daniel Kahn Gillmor (DKG) in a message to the IETF "DPRIV" working
group <xref target="DNS0RTT"/>.</t>

<t>Thanks to our wide cast of supporters.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference  anchor="RFC1034" target='https://www.rfc-editor.org/info/rfc1034'>
<front>
<title>Domain names - concepts and facilities</title>
<author initials='P.V.' surname='Mockapetris' fullname='P.V. Mockapetris'><organization /></author>
<date year='1987' month='November' />
<abstract><t>This RFC is the revised basic definition of The Domain Name System.  It obsoletes RFC-882.  This memo describes the domain style names and their used for host address look up and electronic mail forwarding.  It discusses the clients and servers in the domain name system and the protocol used between them.</t></abstract>
</front>
<seriesInfo name='STD' value='13'/>
<seriesInfo name='RFC' value='1034'/>
<seriesInfo name='DOI' value='10.17487/RFC1034'/>
</reference>



<reference  anchor="RFC1035" target='https://www.rfc-editor.org/info/rfc1035'>
<front>
<title>Domain names - implementation and specification</title>
<author initials='P.V.' surname='Mockapetris' fullname='P.V. Mockapetris'><organization /></author>
<date year='1987' month='November' />
<abstract><t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System.  It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t></abstract>
</front>
<seriesInfo name='STD' value='13'/>
<seriesInfo name='RFC' value='1035'/>
<seriesInfo name='DOI' value='10.17487/RFC1035'/>
</reference>



<reference anchor="I-D.ietf-quic-transport">
<front>
<title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>

<author initials='J' surname='Iyengar' fullname='Jana Iyengar'>
    <organization />
</author>

<author initials='M' surname='Thomson' fullname='Martin Thomson'>
    <organization />
</author>

<date month='February' day='21' year='2020' />

<abstract><t>This document defines the core of the QUIC transport protocol. Accompanying documents describe QUIC's loss detection and congestion control and the use of TLS for key negotiation.  Note to Readers  Discussion of this draft takes place on the QUIC working group mailing list (quic@ietf.org), which is archived at &lt;https://mailarchive.ietf.org/arch/search/?email_list=quic>.  Working Group information can be found at &lt;https://github.com/ quicwg>; source code and issues list for this draft can be found at &lt;https://github.com/quicwg/base-drafts/labels/-transport>.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-quic-transport-27' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-quic-transport-27.txt' />
</reference>



<reference anchor="I-D.ietf-quic-tls">
<front>
<title>Using TLS to Secure QUIC</title>

<author initials='M' surname='Thomson' fullname='Martin Thomson'>
    <organization />
</author>

<author initials='S' surname='Turner' fullname='Sean Turner'>
    <organization />
</author>

<date month='February' day='21' year='2020' />

<abstract><t>This document describes how Transport Layer Security (TLS) is used to secure QUIC.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-quic-tls-27' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-quic-tls-27.txt' />
</reference>



<reference anchor="I-D.ietf-dnsop-terminology-ter">
<front>
<title>Terminology for DNS Transports and Location</title>

<author initials='P' surname='Hoffman' fullname='Paul Hoffman'>
    <organization />
</author>

<date month='February' day='11' year='2020' />

<abstract><t>This document adds terms and abbreviations to "DNS Terminology" (RFC 8499) that relate to DNS running over various transports, as well as terms and abbreviations for DNS resolution at traditional and non- traditional locations.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-dnsop-terminology-ter-01' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-dnsop-terminology-ter-01.txt' />
</reference>



<reference  anchor="RFC8310" target='https://www.rfc-editor.org/info/rfc8310'>
<front>
<title>Usage Profiles for DNS over TLS and DNS over DTLS</title>
<author initials='S.' surname='Dickinson' fullname='S. Dickinson'><organization /></author>
<author initials='D.' surname='Gillmor' fullname='D. Gillmor'><organization /></author>
<author initials='T.' surname='Reddy' fullname='T. Reddy'><organization /></author>
<date year='2018' month='March' />
<abstract><t>This document discusses usage profiles, based on one or more authentication mechanisms, which can be used for DNS over Transport Layer Security (TLS) or Datagram TLS (DTLS).  These profiles can increase the privacy of DNS transactions compared to using only cleartext DNS.  This document also specifies new authentication mechanisms -- it describes several ways that a DNS client can use an authentication domain name to authenticate a (D)TLS connection to a DNS server.  Additionally, it defines (D)TLS protocol profiles for DNS clients and servers implementing DNS over (D)TLS.  This document updates RFC 7858.</t></abstract>
</front>
<seriesInfo name='RFC' value='8310'/>
<seriesInfo name='DOI' value='10.17487/RFC8310'/>
</reference>



<reference  anchor="RFC8174" target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author initials='B.' surname='Leiba' fullname='B. Leiba'><organization /></author>
<date year='2017' month='May' />
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>



<reference  anchor="RFC7873" target='https://www.rfc-editor.org/info/rfc7873'>
<front>
<title>Domain Name System (DNS) Cookies</title>
<author initials='D.' surname='Eastlake 3rd' fullname='D. Eastlake 3rd'><organization /></author>
<author initials='M.' surname='Andrews' fullname='M. Andrews'><organization /></author>
<date year='2016' month='May' />
<abstract><t>DNS Cookies are a lightweight DNS transaction security mechanism that provides limited protection to DNS servers and clients against a variety of increasingly common denial-of-service and amplification/ forgery or cache poisoning attacks by off-path attackers.  DNS Cookies are tolerant of NAT, NAT-PT (Network Address Translation - Protocol Translation), and anycast and can be incrementally deployed. (Since DNS Cookies are only returned to the IP address from which they were originally received, they cannot be used to generally track Internet users.)</t></abstract>
</front>
<seriesInfo name='RFC' value='7873'/>
<seriesInfo name='DOI' value='10.17487/RFC7873'/>
</reference>



<reference  anchor="RFC7301" target='https://www.rfc-editor.org/info/rfc7301'>
<front>
<title>Transport Layer Security (TLS) Application-Layer Protocol Negotiation Extension</title>
<author initials='S.' surname='Friedl' fullname='S. Friedl'><organization /></author>
<author initials='A.' surname='Popov' fullname='A. Popov'><organization /></author>
<author initials='A.' surname='Langley' fullname='A. Langley'><organization /></author>
<author initials='E.' surname='Stephan' fullname='E. Stephan'><organization /></author>
<date year='2014' month='July' />
<abstract><t>This document describes a Transport Layer Security (TLS) extension for application-layer protocol negotiation within the TLS handshake. For instances in which multiple application protocols are supported on the same TCP or UDP port, this extension allows the application layer to negotiate which protocol will be used within the TLS connection.</t></abstract>
</front>
<seriesInfo name='RFC' value='7301'/>
<seriesInfo name='DOI' value='10.17487/RFC7301'/>
</reference>




    </references>

    <references title='Informative References'>

<reference anchor="DNS0RTT" target="https://www.ietf.org/mail-archive/web/dns-privacy/current/msg01276.html">
  <front>
    <title>DNS + 0-RTT</title>
    <author initials="D." surname="Kahn Gillmor" fullname="Daniel Kahn Gillmor">
      <organization></organization>
    </author>
    <date year="2016" month="April" day="06"/>
  </front>
  <seriesInfo name="Message" value="to DNS-Privacy WG mailing list"/>
</reference>
<reference anchor="TDNS" target="http://dx.doi.org/10.1109/SP.2015.18">
  <front>
    <title>Connection-Oriented DNS to Improve Privacy and Security</title>
    <author initials="L." surname="Zhu" fullname="Liang Zhu">
      <organization></organization>
    </author>
    <author initials="Z." surname="Hu" fullname="Zi Hu">
      <organization></organization>
    </author>
    <author initials="J." surname="Heidemann" fullname="John Heidemann">
      <organization></organization>
    </author>
    <author initials="D." surname="Wessels" fullname="Duane Wessels">
      <organization></organization>
    </author>
    <author initials="A." surname="Mankin" fullname="Allison Mankin">
      <organization></organization>
    </author>
    <author initials="N." surname="Somaiya" fullname="Nikita Somaiya">
      <organization></organization>
    </author>
    <date year="2015" month="May" day="21"/>
  </front>
  <seriesInfo name="2015" value="IEEE Symposium on Security and Privacy (SP)"/>
  <seriesInfo name="DOI" value="10.1109/SP.2015.18"/>
</reference>




<reference  anchor="RFC7858" target='https://www.rfc-editor.org/info/rfc7858'>
<front>
<title>Specification for DNS over Transport Layer Security (TLS)</title>
<author initials='Z.' surname='Hu' fullname='Z. Hu'><organization /></author>
<author initials='L.' surname='Zhu' fullname='L. Zhu'><organization /></author>
<author initials='J.' surname='Heidemann' fullname='J. Heidemann'><organization /></author>
<author initials='A.' surname='Mankin' fullname='A. Mankin'><organization /></author>
<author initials='D.' surname='Wessels' fullname='D. Wessels'><organization /></author>
<author initials='P.' surname='Hoffman' fullname='P. Hoffman'><organization /></author>
<date year='2016' month='May' />
<abstract><t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS.  Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626.  In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t><t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group.  It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t></abstract>
</front>
<seriesInfo name='RFC' value='7858'/>
<seriesInfo name='DOI' value='10.17487/RFC7858'/>
</reference>



<reference  anchor="RFC5936" target='https://www.rfc-editor.org/info/rfc5936'>
<front>
<title>DNS Zone Transfer Protocol (AXFR)</title>
<author initials='E.' surname='Lewis' fullname='E. Lewis'><organization /></author>
<author initials='A.' surname='Hoenes' fullname='A. Hoenes' role='editor'><organization /></author>
<date year='2010' month='June' />
<abstract><t>The standard means within the Domain Name System protocol for maintaining coherence among a zone's authoritative name servers consists of three mechanisms.  Authoritative Transfer (AXFR) is one of the mechanisms and is defined in RFC 1034 and RFC 1035.</t><t>The definition of AXFR has proven insufficient in detail, thereby forcing implementations intended to be compliant to make assumptions, impeding interoperability.  Yet today we have a satisfactory set of implementations that do interoperate.  This document is a new definition of AXFR -- new in the sense that it records an accurate definition of an interoperable AXFR mechanism.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5936'/>
<seriesInfo name='DOI' value='10.17487/RFC5936'/>
</reference>



<reference anchor="I-D.ietf-dprive-xfr-over-tls">
<front>
<title>DNS Zone Transfer-over-TLS</title>

<author initials='H' surname='Zhang' fullname='Han Zhang'>
    <organization />
</author>

<author initials='P' surname='Aras' fullname='Pallavi Aras'>
    <organization />
</author>

<author initials='W' surname='Toorop' fullname='Willem Toorop'>
    <organization />
</author>

<author initials='S' surname='Dickinson' fullname='Sara Dickinson'>
    <organization />
</author>

<author initials='A' surname='Mankin' fullname='Allison Mankin'>
    <organization />
</author>

<date month='November' day='18' year='2019' />

<abstract><t>DNS zone transfers are transmitted in clear text, which gives attackers the opportunity to collect the content of a zone by eavesdropping on network connections.  The DNS Transaction Signature (TSIG) mechanism is specified to restrict direct zone transfer to authorized clients only, but it does not add confidentiality.  This document specifies use of DNS-over-TLS to prevent zone contents collection via passive monitoring of zone transfers.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-dprive-xfr-over-tls-00' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-dprive-xfr-over-tls-00.txt' />
</reference>



<reference  anchor="RFC8484" target='https://www.rfc-editor.org/info/rfc8484'>
<front>
<title>DNS Queries over HTTPS (DoH)</title>
<author initials='P.' surname='Hoffman' fullname='P. Hoffman'><organization /></author>
<author initials='P.' surname='McManus' fullname='P. McManus'><organization /></author>
<date year='2018' month='October' />
<abstract><t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS.  Each DNS query-response pair is mapped into an HTTP exchange.</t></abstract>
</front>
<seriesInfo name='RFC' value='8484'/>
<seriesInfo name='DOI' value='10.17487/RFC8484'/>
</reference>



<reference anchor="I-D.ietf-quic-http">
<front>
<title>Hypertext Transfer Protocol Version 3 (HTTP/3)</title>

<author initials='M' surname='Bishop' fullname='Mike Bishop'>
    <organization />
</author>

<date month='February' day='21' year='2020' />

<abstract><t>The QUIC transport protocol has several features that are desirable in a transport for HTTP, such as stream multiplexing, per-stream flow control, and low-latency connection establishment.  This document describes a mapping of HTTP semantics over QUIC.  This document also identifies HTTP/2 features that are subsumed by QUIC, and describes how HTTP/2 extensions can be ported to HTTP/3.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-quic-http-27' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-quic-http-27.txt' />
</reference>



<reference anchor="I-D.ietf-dprive-phase2-requirements">
<front>
<title>DNS Privacy Requirements for Exchanges between Recursive Resolvers and Authoritative Servers</title>

<author initials='J' surname='Livingood' fullname='Jason Livingood'>
    <organization />
</author>

<author initials='A' surname='Mayrhofer' fullname='Alexander Mayrhofer'>
    <organization />
</author>

<author initials='B' surname='Overeinder' fullname='Benno Overeinder'>
    <organization />
</author>

<date month='December' day='15' year='2019' />

<abstract><t>This document provides requirements for adding confidentiality to DNS exchanges between recursive resolvers and authoritative servers.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-dprive-phase2-requirements-00' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-dprive-phase2-requirements-00.txt' />
</reference>



<reference  anchor="RFC7626" target='https://www.rfc-editor.org/info/rfc7626'>
<front>
<title>DNS Privacy Considerations</title>
<author initials='S.' surname='Bortzmeyer' fullname='S. Bortzmeyer'><organization /></author>
<date year='2015' month='August' />
<abstract><t>This document describes the privacy issues associated with the use of the DNS by Internet users.  It is intended to be an analysis of the present situation and does not prescribe solutions.</t></abstract>
</front>
<seriesInfo name='RFC' value='7626'/>
<seriesInfo name='DOI' value='10.17487/RFC7626'/>
</reference>



<reference anchor="I-D.ietf-quic-recovery">
<front>
<title>QUIC Loss Detection and Congestion Control</title>

<author initials='J' surname='Iyengar' fullname='Jana Iyengar'>
    <organization />
</author>

<author initials='I' surname='Swett' fullname='Ian Swett'>
    <organization />
</author>

<date month='February' day='21' year='2020' />

<abstract><t>This document describes loss detection and congestion control mechanisms for QUIC.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-quic-recovery-26' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-quic-recovery-26.txt' />
</reference>



<reference  anchor="RFC8094" target='https://www.rfc-editor.org/info/rfc8094'>
<front>
<title>DNS over Datagram Transport Layer Security (DTLS)</title>
<author initials='T.' surname='Reddy' fullname='T. Reddy'><organization /></author>
<author initials='D.' surname='Wing' fullname='D. Wing'><organization /></author>
<author initials='P.' surname='Patil' fullname='P. Patil'><organization /></author>
<date year='2017' month='February' />
<abstract><t>DNS queries and responses are visible to network elements on the path between the DNS client and its server.  These queries and responses can contain privacy-sensitive information, which is valuable to protect.</t><t>This document proposes the use of Datagram Transport Layer Security (DTLS) for DNS, to protect against passive listeners and certain active attacks.  As latency is critical for DNS, this proposal also discusses mechanisms to reduce DTLS round trips and reduce the DTLS handshake size.  The proposed mechanism runs over port 853.</t></abstract>
</front>
<seriesInfo name='RFC' value='8094'/>
<seriesInfo name='DOI' value='10.17487/RFC8094'/>
</reference>



<reference anchor="I-D.ietf-dnssd-push">
<front>
<title>DNS Push Notifications</title>

<author initials='T' surname='Pusateri' fullname='Tom Pusateri'>
    <organization />
</author>

<author initials='S' surname='Cheshire' fullname='Stuart Cheshire'>
    <organization />
</author>

<date month='October' day='13' year='2019' />

<abstract><t>The Domain Name System (DNS) was designed to return matching records efficiently for queries for data that are relatively static.  When those records change frequently, DNS is still efficient at returning the updated results when polled, as long as the polling rate is not too high.  But there exists no mechanism for a client to be asynchronously notified when these changes occur.  This document defines a mechanism for a client to be notified of such changes to DNS records, called DNS Push Notifications.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-dnssd-push-25' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-dnssd-push-25.txt' />
</reference>



<reference  anchor="RFC7830" target='https://www.rfc-editor.org/info/rfc7830'>
<front>
<title>The EDNS(0) Padding Option</title>
<author initials='A.' surname='Mayrhofer' fullname='A. Mayrhofer'><organization /></author>
<date year='2016' month='May' />
<abstract><t>This document specifies the EDNS(0) &quot;Padding&quot; option, which allows DNS clients and servers to pad request and response messages by a variable number of octets.</t></abstract>
</front>
<seriesInfo name='RFC' value='7830'/>
<seriesInfo name='DOI' value='10.17487/RFC7830'/>
</reference>



<reference  anchor="RFC8467" target='https://www.rfc-editor.org/info/rfc8467'>
<front>
<title>Padding Policies for Extension Mechanisms for DNS (EDNS(0))</title>
<author initials='A.' surname='Mayrhofer' fullname='A. Mayrhofer'><organization /></author>
<date year='2018' month='October' />
<abstract><t>RFC 7830 specifies the &quot;Padding&quot; option for Extension Mechanisms for DNS (EDNS(0)) but does not specify the actual padding length for specific applications.  This memo lists the possible options (&quot;padding policies&quot;), discusses the implications of each option, and provides a recommended (experimental) option.</t></abstract>
</front>
<seriesInfo name='RFC' value='8467'/>
<seriesInfo name='DOI' value='10.17487/RFC8467'/>
</reference>



<reference  anchor="RFC7766" target='https://www.rfc-editor.org/info/rfc7766'>
<front>
<title>DNS Transport over TCP - Implementation Requirements</title>
<author initials='J.' surname='Dickinson' fullname='J. Dickinson'><organization /></author>
<author initials='S.' surname='Dickinson' fullname='S. Dickinson'><organization /></author>
<author initials='R.' surname='Bellis' fullname='R. Bellis'><organization /></author>
<author initials='A.' surname='Mankin' fullname='A. Mankin'><organization /></author>
<author initials='D.' surname='Wessels' fullname='D. Wessels'><organization /></author>
<date year='2016' month='March' />
<abstract><t>This document specifies the requirement for support of TCP as a transport protocol for DNS implementations and provides guidelines towards DNS-over-TCP performance on par with that of DNS-over-UDP. This document obsoletes RFC 5966 and therefore updates RFC 1035 and RFC 1123.</t></abstract>
</front>
<seriesInfo name='RFC' value='7766'/>
<seriesInfo name='DOI' value='10.17487/RFC7766'/>
</reference>



<reference  anchor="RFC7828" target='https://www.rfc-editor.org/info/rfc7828'>
<front>
<title>The edns-tcp-keepalive EDNS0 Option</title>
<author initials='P.' surname='Wouters' fullname='P. Wouters'><organization /></author>
<author initials='J.' surname='Abley' fullname='J. Abley'><organization /></author>
<author initials='S.' surname='Dickinson' fullname='S. Dickinson'><organization /></author>
<author initials='R.' surname='Bellis' fullname='R. Bellis'><organization /></author>
<date year='2016' month='April' />
<abstract><t>DNS messages between clients and servers may be received over either UDP or TCP.  UDP transport involves keeping less state on a busy server, but can cause truncation and retries over TCP.  Additionally, UDP can be exploited for reflection attacks.  Using TCP would reduce retransmits and amplification.  However, clients commonly use TCP only for retries and servers typically use idle timeouts on the order of seconds.</t><t>This document defines an EDNS0 option (&quot;edns-tcp-keepalive&quot;) that allows DNS servers to signal a variable idle timeout.  This signalling encourages the use of long-lived TCP connections by allowing the state associated with TCP transport to be managed effectively with minimal impact on the DNS transaction time.</t></abstract>
</front>
<seriesInfo name='RFC' value='7828'/>
<seriesInfo name='DOI' value='10.17487/RFC7828'/>
</reference>



<reference  anchor="RFC8490" target='https://www.rfc-editor.org/info/rfc8490'>
<front>
<title>DNS Stateful Operations</title>
<author initials='R.' surname='Bellis' fullname='R. Bellis'><organization /></author>
<author initials='S.' surname='Cheshire' fullname='S. Cheshire'><organization /></author>
<author initials='J.' surname='Dickinson' fullname='J. Dickinson'><organization /></author>
<author initials='S.' surname='Dickinson' fullname='S. Dickinson'><organization /></author>
<author initials='T.' surname='Lemon' fullname='T. Lemon'><organization /></author>
<author initials='T.' surname='Pusateri' fullname='T. Pusateri'><organization /></author>
<date year='2019' month='March' />
<abstract><t>This document defines a new DNS OPCODE for DNS Stateful Operations (DSO).  DSO messages communicate operations within persistent stateful sessions using Type Length Value (TLV) syntax.  Three TLVs are defined that manage session timeouts, termination, and encryption padding, and a framework is defined for extensions to enable new stateful operations.  This document updates RFC 1035 by adding a new DNS header OPCODE that has both different message semantics and a new result code.  This document updates RFC 7766 by redefining a session, providing new guidance on connection reuse, and providing a new mechanism for handling session idle timeouts.</t></abstract>
</front>
<seriesInfo name='RFC' value='8490'/>
<seriesInfo name='DOI' value='10.17487/RFC8490'/>
</reference>



<reference anchor="I-D.ietf-dprive-rfc7626-bis">
<front>
<title>DNS Privacy Considerations</title>

<author initials='S' surname='Bortzmeyer' fullname='Stephane Bortzmeyer'>
    <organization />
</author>

<author initials='S' surname='Dickinson' fullname='Sara Dickinson'>
    <organization />
</author>

<date month='January' day='16' year='2020' />

<abstract><t>This document describes the privacy issues associated with the use of the DNS by Internet users.  It is intended to be an analysis of the present situation and does not prescribe solutions.  This document obsoletes RFC 7626.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-dprive-rfc7626-bis-04' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-dprive-rfc7626-bis-04.txt' />
</reference>



<reference  anchor="RFC8446" target='https://www.rfc-editor.org/info/rfc8446'>
<front>
<title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
<author initials='E.' surname='Rescorla' fullname='E. Rescorla'><organization /></author>
<date year='2018' month='August' />
<abstract><t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t><t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t></abstract>
</front>
<seriesInfo name='RFC' value='8446'/>
<seriesInfo name='DOI' value='10.17487/RFC8446'/>
</reference>




    </references>




  </back>

<!-- ##markdown-source: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-->

</rfc>

