<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.34 (Ruby 3.0.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

<!ENTITY RFC9364 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9364.xml">
<!ENTITY RFC5011 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5011.xml">
<!ENTITY RFC8915 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8915.xml">
<!ENTITY RFC8145 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8145.xml">
<!ENTITY RFC7583 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7583.xml">
<!ENTITY RFC7646 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7646.xml">
<!ENTITY I-D.ietf-dnsop-ns-revalidation SYSTEM "https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-dnsop-ns-revalidation.xml">
<!ENTITY RFC4033 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4033.xml">
<!ENTITY RFC8247 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8247.xml">
<!ENTITY RFC8221 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8221.xml">
<!ENTITY RFC8624 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8624.xml">
<!ENTITY RFC8914 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8914.xml">
<!ENTITY RFC7858 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7858.xml">
<!ENTITY RFC8484 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8484.xml">
<!ENTITY RFC9250 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9250.xml">
<!ENTITY RFC9325 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9325.xml">
<!ENTITY I-D.ietf-add-ddr SYSTEM "https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-add-ddr.xml">
<!ENTITY I-D.ietf-add-dnr SYSTEM "https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-add-dnr.xml">
<!ENTITY RFC6781 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6781.xml">
<!ENTITY RFC7958 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7958.xml">
<!ENTITY I-D.ietf-dnsop-rfc5011-security-considerations SYSTEM "https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-dnsop-rfc5011-security-considerations.xml">
<!ENTITY RFC6975 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6975.xml">
<!ENTITY I-D.arkko-dns-confidential SYSTEM "https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.arkko-dns-confidential.xml">
<!ENTITY RFC9230 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9230.xml">
]>

<?rfc rfcedstyle="yes"?>
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc docmapping="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-dnsop-dnssec-validator-requirements-07" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="DNSSEC Resolver Operator Recommendations">Recommendations for DNSSEC Resolvers Operators</title>

    <author initials="D." surname="Migault" fullname="Daniel Migault">
      <organization>Ericsson</organization>
      <address>
        <postal>
          <street>8275 Trans Canada Route</street>
          <city>Saint Laurent, QC</city>
          <code>4S 0B6</code>
          <country>Canada</country>
        </postal>
        <email>daniel.migault@ericsson.com</email>
      </address>
    </author>
    <author initials="E." surname="Lewis" fullname="Edward Lewis">
      <organization>ICANN</organization>
      <address>
        <postal>
          <street></street>
          <city></city>
          <code></code>
          <country>USA</country>
        </postal>
        <email>edward.lewis@icann.org</email>
      </address>
    </author>
    <author initials="D." surname="York" fullname="Dan York">
      <organization>Internet Society</organization>
      <address>
        <postal>
          <street></street>
          <city></city>
          <code></code>
          <country>USA</country>
        </postal>
        <email>york@isoc.org</email>
      </address>
    </author>

    <date year="2023" month="November" day="13"/>

    
    <workgroup>dnsop</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 94?>

<t>The DNS Security Extensions (DNSSEC) defines a process for validating received
data and assert them authentic and complete as opposed to forged.</t>

<t>While DNSSEC comes with some complexity, at least for non expert, that complexity is mostly abstracted by the resolver.
As result, running a resolver with DNSSEC enabled only requires the operator to only follow a very limited set of recommendations.
This document provides such recommendations.</t>



    </abstract>



  </front>

  <middle>


<?line 103?>

<section anchor="sec-intro"><name>Introduction</name>

<t>A DNS resolver is a service that locates and returns information pertaining to a query issued by some other service, such as an application. By its nature, a DNS resolver is inquisitive, susceptible to misleading information it may receive.
To address this, DNS Security (DNSSEC) extensions <xref target="RFC9364"/> were defined to provide authenticity and integrity to responses, as well as to provide an authenticated notice for data that does not exist.</t>

<t>A DNS resolver operator is an organization or individual that runs a DNS resolver. The resolver may be for a small set of relying parties, for a large but bounded collection of customers, or it may be operated with no restriction on who or what may make use of it.
To enhance the value of the service, a DNS resolver operator implements various security controls, including the use of DNSSEC validation.</t>

<t>Operating DNSSEC validation involves making use of digital signatures generated by a DNSSEC signer.
Besides the simple cryptographic process of validating digital signatures there are a number of checks required due to the nature of the DNS protocol.
A well-written DNSSEC validating resolver will faithfully implement the DNSSEC processes needed, leaving an operator to manage a few items.</t>

<t>The items that an operator needs to attend to are:</t>

<t><list style="symbols">
  <t>Absolute time</t>
  <t>Trust anchors (positive and negative)</t>
  <t>Monitoring of the service, including abuse</t>
</list></t>

<t>This document will list recommended actions for DNSSEC validating resolver operators that will help achieve the goals of DNSSEC validation. First, the goals ought to be stated.</t>

<t>The primary goal of any operations endeavor is to provide a service within service level agreements intended to make relying parties happy with the performance of the service. For DNSSEC, this breaks into two parts, one of accurately achieving the protections offered by DNSSEC, the other, to avoid DNSSEC from accidentally being an impediment.</t>

<t>The recommendations will focus on preparation of the elements of a DNSSEC validating resolver, as described earlier in the diagram. In particular, there are recommendations related to service monitoring, time source, Trust Anchor Manager/Store, and DNS Resolver. The recommendations are categorized as at initialization, during runtime, and upon demand.</t>

</section>
<section anchor="sec-dnssec-val-desc"><name>Overall View of DNSSEC Validating Resolver</name>

<t>The purpose of a DNS resolver is to perform DNS resolutions on behalf of DNS client.
The DNS resolution of a specific FQDN (e.g. www.example.com) requires the resolver to interact (via DNS resolutions) with a chain of authoritative servers. 
However, a resolver also caches the responses it receives which limits the resolver sending duplicated requests and triggers resolutions only when necessary.</t>

<t>With DNSSEC enabled, the resolver is able to verify data origin authentication and data integrity, and so ensures the response returned by the resolver is trustworthy.</t>

<t><xref target="fig-dns-res"/> illustrates the case with the resolution of the FQDN www.example.com.
The DNS client sends a DNS request for the IP address of www.example.com to the resolver (1).
If the response is not in the cache of the resolver, then it proceeds to the resolution.
For simplicity, we suppose in our example that the resolver already knows the authoritative server of www.example.com. As a result, it only need to send a request to that authoritative server (2).
We also assume the DNS client has not explicitly requested the resolver to disable the DNSSEC validation. That DNS client may be DNSSEC aware or not, but the resolver performs the DNSSEC validation.
When the resolver sends the DNS request to the authoritative server of example.com (2), it indicates the support of DNSSEC. In that case, if the zone example.com is signed, the authoritative server includes the necessary sets for the resolver to cryptographically validate the response (3).
The resolver validates the response and returns the IP address to the client (4). Depending on the client's request, the server may indicate that the information is trustworthy or include the DNSSEC information so the client can re-validate the response.
If the resolver is unable to validate the information an error is returned to the client (4).</t>

<figure title="DNS resolution with DNSSEC validation" anchor="fig-dns-res"><artwork><![CDATA[
                             <--------- Internet ---------------->
                                                   Authoritative
           www.example.                            Server
+--------+ com AAAA?    +-----------+              +-------------+
| client | -------> (1) | resolver  |              | Root zone . |
|        | <------  (4) |           |              +-------------+
+--------+              | +-------+ |              +-------------+
                        | | cache | |              | zone .com   |
    ...                 | +-------+ | www.example. +-------------+
+--------+              | | DNSSEC| | com AAAA ?   +-------------+
| client |              | | Val.  | | ------> (2)  | zone        |
|        |              | +-------+ | <------ (3)  | example.com |
+--------+              +-----------+              +-------------+
]]></artwork></figure>

<t>To help orient this document, the following schematic is offered to show some of the interrelationships among the elements of a DNSSEC validating resolver, that is to say the entity that performs DNS resolution and performs signature
validation. This drawing is merely a cartoon summary, not an implementation guide.</t>

<figure title="DNSSEC Validating Resolver Description"><sourcecode type="aaasvg"><![CDATA[
  +--------------+  +------------+ +---------------+ +--------------+
  |              |  |            | |               | |              |
  |   Service    |  |    Time    | | Cryptographic | | Trust Anchor |
  |   Monitoring |  |    Source  | |   Module      | | Manager/Store|
  |              |  |            | |               | |              |
  +--------------+  +------------+ +---------------+ +--------------+
          |                |               |              ^    ^
          v                v               v              |    |
  +--------------+  +------------------------------+      |    |
  |              |  |                              |      |    |
  |              |  |                              |      |    |
->| DNS Resolver |->|   DNSSEC Validation Engine   |<-----+    |
-<|              |<-|                              |           |
  |              |  |                              |           |
  +--------------+  +------------------------------+           |
          ^               ^ |             ^                    |
          |               | v             |                    |
          |         +------------+ +---------------+           |
          |         |            | |               |           |
          +---------| DNS Caches | | DNS Messages  |<----------+
                    |            | |               |
                    +------------+ +---------------+
]]></sourcecode></figure>

<t>Across the top row are elements that an operator needs to address to properly run a DNSSEC Validating Resolver.</t>

<dl>
  <dt>Service Monitoring:</dt>
  <dd>
    <t>Enforces acceptable use policy and enables management of the service.
This is a generic module for all services, here featuring some DNS and DNSSEC specific concerns.</t>
  </dd>
  <dt>Time Source:</dt>
  <dd>
    <t>Provides the time.
DNS has always used relative time to manage the TTL of resource record sets in caches, DNSSEC introduced the need for absolute time to thwart replay attacks and to manage the lifetime of signatures.</t>
  </dd>
  <dt>Cryptographic Module:</dt>
  <dd>
    <t>implements the cryptography operations. Due to the nature of cryptography, the implementation of this module may evolve over time or at least be subject to technical refresh.</t>
  </dd>
  <dt>Trust Anchor Manager/Store:</dt>
  <dd>
    <t>a module (of code) implementing functions related to the trust anchors
used by the validator. This is essentially a database allowing access,
monitoring of, and changes to trust anchors.
The database of trust anchors used as the basis from which DNSSEC operates.
This module contains the foundation upon which DNSSEC evaluates received data sets.
The contents of this module are essential for proper operation.
For a general-purpose validator running on a public Internet, it may have a single entry, for the very top of the DNS name space (the root).
Management of this may be left to automated processes that are carefully designed to address vulnerabilities related to automated trust management.
For specific situations, the Trust Anchor Manager/Store will also manage local-policy supporting trust anchors as well. Careful operation of this module is crucial to the value of the DNSSEC validating resolver.
Note that the Trust Anchor Store MAY (but not necessarily) be updated via in-band signalling <xref target="RFC5011"/> in which case validated message result in updating the TA Store.</t>
  </dd>
  <dt>DNS Resolver:</dt>
  <dd>
    <t>The service interface offered to other services/applications/users.
This is the generic DNS resolution service, consulting the cache for hits, and seeking new answers for misses.</t>
  </dd>
  <dt>DNSSEC Validation Engine:</dt>
  <dd>
    <t>This implements the DNSSEC validation process.
The validation engine is assumed to faithfully implement the DNSSEC validation algorithm, relying on the information from the Time Source, Cryptographic Libraries, Trust Anchor Management/Store as well as what is held in the local cache or gained through messages.
A successful validation ensures the information is trustworthy.</t>
  </dd>
  <dt>DNS Caches:</dt>
  <dd>
    <t>Include positive and negative caches.
These are the ordinary caches used in DNS operations, including DNSSEC extended record types and management.</t>
  </dd>
  <dt>DNS Messages:</dt>
  <dd>
    <t>Existing DNS message passing.
This covers the proper implementation and operation of DNS and DNSSEC message exchanges.</t>
  </dd>
</dl>

</section>
<section anchor="time-recommendations"><name>Time Recommendations</name>

<t>As DNSSEC uses absolute time to temporally limit the validity of RRSIG resource records, a DNSSEC validator needs a reliable time source. If a validator can be fooled into believing that the time is a point well into the past, an incorrect RRSIG resource record may be replayed and used, or an old key whose private component has since been exposed may be able to forge a falsified answer.</t>

<t>The range of these recommendations include devices that do not have an embedded Real Time Clock. Such devices need to have their system clocks updated upon power up before starting the DNSSEC validator.</t>

<t>At initialization: a DNSSEC validator needs to be able to establish reliable time without relying on DNSSEC validation. The latter clause is needed as the initialization step is being carried out to start DNSSEC validation, it is not assumed to be up and running at this point. One way to interpret this is that a time source (Network Time Protocol) ought to be identified by a numerical IP address and not a fully qualified domain name (which would require a DNS lookup). An operator may set its own time as for example described in <xref target="TNL"/> or rely on an external Time provider. In any case the system time should be retrieved from an authenticated source using Network Security Time (NST) <xref target="RFC8915"/>. However NST is based on TLS and as such the verification of a signature which requires an appropriated time to be be set to ensure the certificate is valid. To get a system time that enables the establishment of a TLS session, the operator may rely primarily on manual configuration or an unauthenticated NTP service such as pool.ntp.org <xref target="NTPPool"/> or <xref target="TimeNL"/>. Once that system time is set, the system time should confirm the time over a trusted source, i.e. using NST.</t>

<t>During runtime: a DNSSEC validator operator ought to have controls in place to monitor the current time of a validator as well as monitor the number of validation failures that can be attributed to temporal violations. Updates to the current time ought to make use of secure environments, whether secure channels for NTP or as appropriate for the installation. Updates ought to be part of an automated process, running at appropriately frequent intervals -- see <xref target="TimeNL"/>.</t>

<t>Upon demand: a DNSSEC validator operator ought to be able to perform any of the runtime actions upon demand, for instance, to help diagnose a service failure.</t>

</section>
<section anchor="ta"><name>Trust Anchor Related Recommendations</name>

<t>The TA store implements a trust model. The default trust model consists in trusting a single TA which is the KSK of the root zone. It is the recommended trust model and the default trust model of most implementations.</t>

<t>While not generally recommended, alternative TAs MAY be considered, for example, when the secure delegation to these RRsets may not be validated for any reasons.
The trust model should at least ensure that any domain name in the DNS be covered by at least one TA.
As the number of top level domains is evolving overtime, it remains safe to keep the root zone as a security entry point in order to cover the full domain name space.
Upon considering TA, the resolver operator should carefully ensure that the TA meets all necessary operational criterias. This includes for example, having a bootstrapping mechanism, or having their signers committed to respect the <xref target="RFC5011"/> timing - at least when the operator relies on automatic updates (see below).</t>

<t>TAs are usually represented by a DNSKEY or DS RRset and are involved in the signature validation process to determine whether the validation is successful or not.</t>

<t>At initialization: The resolver operator needs to ensure the resolver can only be started with a TA store that matches the trust model and that is up-to-date.
The TA needs to be retrieved securely and checked upon starting the resolver.
For the default trust model, for example, <xref target="UNBOUND-ANCHOR"/> or <xref target="ta-fetcher"/> implements <xref target="RFC7958"/> and ensures the resolver is configured with the up-to-date TA of the root zone. Similarly, the up-to-date default trust model is very commonly implemented by the software release in which case the resolver operator may simply rely on software update.</t>

<t>During runtime: The resolver operator needs to ensure the TA is up-to-date. This is achieved by enabling TA to be updated automatically (via in-band or out-of-band mechanisms) as well as being able to check the status of the TA.
Checking the status of the TA is expected to be performed especially when a key roll over happens or any other event associated to the TAs.
TA updates are not expected to be handled manually as this introduces a potentially huge vector for configuration errors as well as potential misunderstanding of ongoing operations.
Instead, the resolver operator should rely on automated procedures such as, for example, Automated Updates to DNSSEC Trust Anchors" <xref target="RFC5011"/> <xref target="I-D.ietf-dnsop-rfc5011-security-considerations"/> or software updates.
As <xref target="RFC5011"/> is an in-band mechanism, the resolver operator is expected to understand these risks <xref section="8" sectionFormat="comma" target="RFC5011"/>. Software update or other mechanisms may also be used.</t>

<t>Upon demand: The resolver operator should be able to check the status of the TA within its resolvers whenever a health check is performed or when it is aware a TA roll over or any other operation affecting the TA is ongoing.
This includes the TA stored in the running resolver as well as potential configuration files.
The TA used by the resolver is expected to be retrieved using "Signaling Trust Anchor Knowledge in DNS Security Extensions (DNSSEC)" <xref target="RFC8145"/>, and may re-use similar software as those used at the initialisation to retrieve and check the expected value of the TA.
The TA health check should associate a status to the TA - as defined in Section 3 of <xref target="RFC7583"/> - to ease the TA monitoring and potential analysis.
When an unexpected (old) TA is found, the health check should evaluate if the mismatch resulted from an ongoing normal roll over, a potential emergency key roll over, failed roll over or any other envisioned cases.
In any case restarting the resolver is expected to address any situation that cannot be addressed otherwise, which reinforces the recommendation to rely on TA bootstrapping mechanisms.</t>

<t>Note also that <xref target="RFC8145"/> also enables to check how the TA roll over is performed. Such cooperation is expected to be useful and benefit the overall operation of the DNS system. The owner of the TA is able to check whether its key roll over is being performed appropriately, and if not, it may cancel it for further analysis.</t>

</section>
<section anchor="nta"><name>Negative Trust Anchors Related Recommendations</name>

<t>When the DNSSEC resolver is not able to validate signatures because a key or DS has been published with an error, the resolver operator may temporarily disable the signature check for that key until the time the error is addressed.
Negative Trust Anchor (NTA) represents the only permitted intervention in the resolving process for a resolver operator.</t>

<t>A signature validation failure is either an attack or a failure in the signing operation on the authoritative servers.
The resolver operator is expected to confirm this offline before introducing the NTA.
This is likely to happen via a human confirmation which is based on information collected during running time.
The qualification of the issue as well as getting a confirmation may require some minimal expertise.</t>

<t>The designation of NTA might be misleading, but NTA is not expected to be part of the trust model even though the NTA belongs to the TA store.</t>

<t>At initialization: Similarly to TA, the resolver operator is expected to automatically configure the resolver with the NTA.</t>

<t>Upon demand: the resolver operator is expected to automatically determine the used NTA and handle NTA as described in <xref target="RFC7646"/>.</t>

<t>At running time: The resolver operator should monitor the number of signature failures associated with each DNSKEY. These numbers are only hints and must not trigger automated insertion of NTA.</t>

</section>
<section anchor="cached-rrset-recommendations"><name>Cached RRset Recommendations</name>

<t>During runtime: A resolver operator is not expected to perform any operations over the cached RRset.
A common concern resolver operator has is the consistency between the cached RRset with those published by the DNS system.
Resolver operator should not implement or deploy any non standard mechanism of there own and limit themselves to enable standard options / feature provided by their implementation.
<xref target="I-D.ietf-dnsop-ns-revalidation"/> is one of these standard mechanisms, for example that improves the synchronization between the cache of the resolver and those published on the Internet.
Section 8.1 of <xref target="RFC4033"/> also mentions the ability by the resolver to set the upper bound of the TTL to the remaining signature validity period.
This value has usually a default value set by the resolver and the resolver operator may change that default value.</t>

<t>Upon demand: a resolver operator may have been informed that a rogue or unwilling DNSKEY has been published. In such a situation, the resolver operator should be able to remove the RRsets validated by the rogue DNSKEY - which may be done by flushing the full cache.</t>

</section>
<section anchor="cryptography-deprecation-recommendations"><name>Cryptography Deprecation Recommendations</name>

<t>As mentioned in <xref target="RFC8247"/> and <xref target="RFC8221"/> cryptography used one day is expected over time to be replaced by new and more robust cryptographic mechanisms.
In the case of DNSSEC signature protocols are likely to be updated over time.
In order to anticipate the sunset of one of the signature schemes, a DNSSEC validator may be willing to estimate the impact of deprecating one signature scheme.</t>

<t>Currently, interoperability and security are enforced via cryptographic recommendations <xref target="RFC8624"/> that are followed by both resolvers and authoritative servers.
The implementation of such guidance is ensured by the software vendors and the compliance of their releases.</t>

<t>At initialization: The resolver operator is expected to ensure recent software releases are used and that this release complies with the most recent cryptographic guidelines.</t>

<t>During runtime: a resolver operator may regularly request and monitor the signature scheme supported by an authoritative server.
In addition, when a validation fails because a deprecated algorithm is used, the resolver operator should return an "Unsupported DNSKEY Algorithm" as defined in <xref target="RFC8914"/> to the DNS client.</t>

<t>Note that one inconvenience to such a strategy is that it does not let one resolver operator take advantage of more recent cryptographic algorithms.
While currently not being widely used, a resolver operator may announce an authoritative server the supported signature schemes to the authoritative server <xref target="RFC6975"/> in the hope that future deployment of authoritative servers will be able to leverage it.</t>

</section>
<section anchor="invalid-reporting-recommendations"><name>Invalid Reporting Recommendations</name>

<t>A DNSSEC validator receiving a DNS response cannot make the difference between receiving an non-secure response versus an attack.
Dropping DNSSEC fields by misconfigured middle boxes, such as DS, RRRSIG is considered as an attack.
A DNSSEC validator is expected to perform secure DNS resolution and as such protects its stub client.
An invalid response may be the result of an attack or a misconfiguration, and the resolver operator may play an important role in sharing this information with the authoritative server or domain name owner.</t>

<t>At runtime: a resolver operator should monitor and report DNSSEC validation errors and inform the DNS client with "Extended DNS Errors" <xref target="RFC8914"/>.</t>

</section>
<section anchor="transport-recommendations"><name>Transport Recommendations</name>

<t>DNSSEC validation requires that the validator is able to reliably obtain necessary records, especially DNSKEY records. This should be done at initial configuration, and tested periodically.</t>

<t>This means the validator must ensure it is configured so that the UDP and TCP transports, and DNS resolver components, are compatible with the network paths that the majority of DNS queries traverse - which includes compatibility between DNS and transport parameters with the Maximum Transmission Unit (MTU).</t>

<t>In other words, make sure that:</t>

<t><list style="numbers">
  <t>DNS UDP bufsize (EDNS parameter) is set to a value compatible with network MTUs the queries and responses will encounter. If the validator advertises a bufsize &gt;&gt; MTU, responses with the IPv4 Don't Fragment (DF) bit set whose size R where MTU &lt; R &lt;= bufsize exceeds the MTU will be dropped by the router with MTU &lt; R.</t>
  <t>The validator's OS TCP configuration has its advertised Maximum Segment Size (MSS) set to a value compatible with network MTUs the queries and responses will encounter.</t>
</list></t>

<t><list style="symbols">
  <t>Having an advertised MSS set to a value &lt; MTU ensures that Path MTU Discovery is not required</t>
  <t>If PMTUD fails for any reason, or if the server responding does not maintain or use PMTUD, and advertised MSS &gt; MTU at any point in the path, TCP may encounter problems caused by IP fragmentation and reassembly.</t>
  <t>This is particularly relevant if there are any NAT type devices in the path, as those may not properly handle fragmentation and reassembly</t>
  <t>If all TCP segments are smaller than the path MTU, TCP will work reliably.</t>
</list></t>

<t>The avoidance of fragmentation in order to address known fragmentation-related security issues with DNS (leading to cache poisoning, for example) has resulted in the need to set the DF bit on UDP.
Validators will need to ensure their local environment can reliably get any critical DNSSEC records (notably DNSKEY) over UDP, or reliably get responses with TC=1 if overly large responses cannot be sent over UDP due to answers not fitting within the advertised bufsize payload.
Validators also need to ensure TCP works if it is needed, for the same situations.</t>

</section>
<section anchor="secure-transport-recommendations"><name>Secure Transport Recommendations</name>

<t>An operator should consider secure transport as a complementary element of its trust model. Such resolvers are usually designated as encrypted resolvers and their presence is usually discovered by the DNS client via a discovery mechanisms. That discovery mechanism may require the resolver to respond to specific DNS requests.</t>

<t>In many cases, anoperator enables DNSSEC to ensure the cached RRset have not been modified on-path and corresponds to those published by the owner of the zone. To ensure RRsets are protected against on-path modification from the resolver to the DNS client, the DRO may enable a secure transport such as DNS over TLS (DoT) <xref target="RFC7858"/>, DNS over HTTPS <xref target="RFC8484"/> (DoH) or DNS over QUIC (DoQ) <xref target="RFC9250"/>. The TLS termination may be supported by the running resolver software or via a TLS front end and TLS should follow its own TLS recommendations <xref target="RFC9325"/>.</t>

<t>When an operator sets a resolver over a secure transport, this resolver does not operates anymore on port 53 and an operator may wonder how DNS client will be able to discover that new service and more importantly if there are implications on its operations.
A DNS operator should consider how the DNS client will discover the encrypted resolver. In many cases, the DNS client are able to discover the encrypted resolver using <xref target="I-D.ietf-add-ddr"/> in which case, the resolver needs to be configured to respond to special requests. It is also possible to provision directly the DNS client with the encrypted resolver via specific mechanisms such as DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers <xref target="I-D.ietf-add-dnr"/> or 3GPP TS 24.008 mechanisms.</t>

</section>
<section anchor="clarification-over-the-dnssec-and-the-tls-trust-models"><name>Clarification over the DNSSEC and the TLS Trust Models</name>

<t>While the document is essentially focused on the security implemented by DNSSEC, it also mentions the combination of TLS and DNSSEC. DNSSEC is essentially a protocol focused on authenticating the DNS data, but is not addressing confidentiality of the data nor the privacy of the user requesting that data. TLS provides authentication and confidentiality of a communication.</t>

<t>As a result, TLS is necessary wherever privacy is needed. In the current model a DNS client is using TLS to protect the communication with the resolver. If that resolver is trusted and believed to host trustworthy RRsets - that is unmodified RRsets validated by the DNSSEC - the TLS communication enables the DNS client to trust the RRSets without performing a DNSSEC validation. If that resolver is expected to perform some operations agreed by the DNS client that may change the RRsets, DNSSEC cannot be performed by the DNS client and TLS is used to carried these trusted RRsets to the DNS client.
On the other hand, if the DNS client does not fully trust the resolver, than the DNS client must authenticate the received RRsets with DNSSEC. In that case, TLS is only providing privacy protection.</t>

<t>The trust in a DNS resolver depends on multiple factors, but one significant concern is the ability of the DRO to perform a man in the middle attack and change on the fly the RRsets without the stub client being aware of it. Confidential computing <xref target="I-D.arkko-dns-confidential"/> may be one way to address such attacks. Another concern, related to privacy, is the ability of a resolver to track a certain user and log every sites requested by the user. Confidential Computing <xref target="I-D.arkko-dns-confidential"/> or oblivious DNS <xref target="RFC9230"/> are means to address such issues.</t>

<t>A model where TLS would be used to protect the transactions between the DNS client and the authoritative server is unlikely in a near future for scalability reasons. A compromise to this model may consists in having the TLS communications between the resolvers and the authoritative servers. In such scenario, the privacy requirement might be questionable as the resolver aggregates the traffic of multiple DNS clients which may be considered to provide sufficient privacy. However, a model involving a communication composed of multiple TLS segments is only trusted if all involved nodes are trusted (DNS client, resolver, authoritative server). In practice, it is unlikely to have all these intermediary nodes trusted, in which case trust will rely on DNSSEC.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>There is no IANA consideration for this document.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>Security consideration of DNSSEC operations are described in <xref target="RFC6781"/>. However, most DNSSEC operations are performed by the owner of the zone as opposed to the operator of the resolver. Operators largely relies on the software vendor as well as automated procedure implemented by the software vendor as to limit potential manual intervention from the operator. This section emphases on operator related security considerations.</t>

<t>Regarding time inaccuracy, a RRSIG is only valid between the inception and expiration time. As a result, when the time is outside this period validation is disabled, and this could be used by an attacker to disable validation for example to poison the cache.</t>

<t>Trust anchors are the root of the trust in DNSSEC and potentially, an attacker being able to provide a rogue trust anchor is potentially able to hijack any RRset below that Trust Anchor. On the other hand, mishandling Trust Anchor is likely resulting in a validator unable to validate most of the traffic under the TA. The use of a common trust model shared by many operators and implemented by multiple vendors reduces these risks.</t>

<t>Negative trust anchors by definition disable validation, and as such must be handled very cautiously by the operator. This could be used by an attacker, for example, to disable validation and poison the resolver.</t>

<t>Using weak cryptography reduces the strength in the trust implemented by DNSSEC as it relied on cryptographic signatures. A weak cryptographic algorithm may be used by an attacker to forge a signature. However, there is little action the resolver operator can actually do, as the cryptographic algorithms to be used are defined by the owner of the zone or the RRSet.</t>

<t>The resolver operator is operating one part of the DNS system. While an operator operates independently, it is believed that communication between the different actors involved in the DNS system will enhance the global resiliency of the system. As a result, this document encourages the operators to provides some information to the stub client when a signature validation fails. It also encourages the operators to authorize third parties to request what trust anchor or more generally DNSKEY are being used, so concerned party may be able to contact the her if needed. This is expected, for example when a authoritative server is performing a key roll over to check the update has been performed properly before removing the old key. The same considerations for communications also holds between resolver operators as well as with software vendors.</t>

<t>As the software used for the DNSSEC validator is not immune to bugs <xref target="ENT"/> and may become vulnerable independently of how it is operated, it is recommended an operator relies on different vendors.</t>

</section>
<section anchor="acknowledgment"><name>Acknowledgment</name>

<t>The need to address DNSSEC issues on the resolver occurred during multiple discussions including among others Ted Lemon, Ralph Weber,
Normen Kowalewski, Mikael Abrahamsson, Jim Gettys, Paul Wouters, Joe Abley, Michael Richardson, Vladimír Čunát, James Gannon, Andrew McConachie, Peter Thomassen, Florian Obser, Brian Dickson and Christian Huitema.</t>

<t>We also appreciated the support of the DNSOP chairs Tim Wicinski, Suzanne Woolf and Benno Overeinder.</t>

</section>


  </middle>

  <back>


    <references title='Normative References'>

&RFC9364;
&RFC5011;
&RFC8915;
&RFC8145;
&RFC7583;
&RFC7646;
&I-D.ietf-dnsop-ns-revalidation;
&RFC4033;
&RFC8247;
&RFC8221;
&RFC8624;
&RFC8914;
&RFC7858;
&RFC8484;
&RFC9250;
&RFC9325;
&I-D.ietf-add-ddr;
&I-D.ietf-add-dnr;
&RFC6781;


    </references>

    <references title='Informative References'>

<reference anchor="UNBOUND-ANCHOR" target="https://nlnetlabs.nl/documentation/unbound/unbound-anchor/">
  <front>
    <title>unbound-anchor - Unbound anchor utility</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="ENT" target="https://indico.dns-oarc.net/event/25/contributions/403/attachments/378/647/AFNIC_OARC_Dallas.pdf">
  <front>
    <title>ENT was here !!!</title>
    <author initials="V." surname="Levigneron" fullname="Vincent Levigneron">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="ta-fetcher" target="https://github.com/iana-org/get-trust-anchor">
  <front>
    <title>DNSSEC Trust Anchor Fetcher</title>
    <author initials="J. S. K." surname="Davies" fullname="Jakob Schlyter, Kim Davies">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="TNL" target="https://www.sidnlabs.nl/en/news-and-blogs/timenl-comes-of-age">
  <front>
    <title>TimeNl comes of age</title>
    <author initials="M. D. C." surname="Hesselman" fullname="Marco Davis, Cristian Hesselman">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="TimeNL" target="https://time.nl/index_en.html">
  <front>
    <title>TimeNL Public NTP service</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="NTPPool" target="https://www.ntppool.org/en/use.html">
  <front>
    <title>The NTP Pool Project</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
&RFC7958;
&I-D.ietf-dnsop-rfc5011-security-considerations;
&RFC6975;
&I-D.arkko-dns-confidential;
&RFC9230;


    </references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

