<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" 
submissionType="IETF" 
category="info" 
ipr="trust200902" 
obsoletes="" 
updates="" 
xml:lang="en" 
docName="draft-liu-add-dnssd-edns-01"
symRefs="true" 
sortRefs="false" 
version="3">


<front>
<title abbrev="EDNS-SD">Multicast DNS-Based Service Discovery for Encrypted DNS Services</title>
<author initials="D." surname="Liu" fullname="Dongjie Liu">
<organization>Jinan University</organization> <address> <email>dongjieliu8917@gmail.com</email> </address> 
</author>

 <author initials="Z." surname="Yan" fullname="Zhiwei Yan"> 
<organization>CNNIC</organization> <address> <email>yanzhiwei@cnnic.cn</email> </address> 
</author>

<author initials="G." surname="Geng" fullname="Guanggang Geng">
<organization>Jinan University</organization> <address>	<email>guanggang.geng@gmail.com</email> </address>
</author>

<author initials="G." surname="Zeng" fullname="G. Zeng">
<organization>Jinan University</organization> <address>	
<email>zeng.guoqiang5@gmail.com</email> </address>	</author>

<date day="1" month="November" year="2025"/>
<area>Internet Area</area> 
<workgroup>ADD Working Group</workgroup>

<abstract>
<t>
This document defines a multicast DNS (mDNS) and DNS-Based Service Discovery (DNS-SD) mechanism for discovering encrypted DNS services in local networks. It specifies new service types (_dot, _doh, _doq) and associated TXT record parameters to enable zero-configuration discovery of DNS over TLS (DoT), DNS over HTTPS (DoH), and DNS over QUIC (DoQ) resolvers. This extension addresses critical privacy gaps in local networks while maintaining backward compatibility with RFC 6763.
</t>
</abstract>
</front>

<middle>

<!-- Introduction -->
<section title="Introduction">
  <section title="The Local Network Privacy Challenge">
  <t>While encrypted DNS protocols such as DNS over TLS (DoT)<xref target="RFC7858"/>, DNS over HTTPS (DoH)<xref target="RFC8484"/>, and DNS over QUIC (DoQ)<xref target="RFC9250"/> have gained widespread adoption for public Internet resolution, local network environments often remain vulnerable to surveillance and manipulation of DNS traffic. Many devices and applications in home, enterprise, and industrial networks still rely on plaintext DNS, exposing sensitive metadata such as device activities, service dependencies, and user behavior patterns. Traditional discovery mechanisms (e.g., DHCP, Router Advertisements) lack the flexibility to negotiate fine-grained encrypted DNS configurations and fail in infrastructure-less environments where centralized servers are unavailable.
  </t>
  </section>
  <section title="mDNS/DNS-SD as a Solution for Privacy-Aware Discovery">
  <t>Multicast DNS (mDNS, <xref target="RFC6762"/>) and DNS-Based Service Discovery (DNS-SD, <xref target="RFC6763"/>) provide an ideal foundation for encrypted DNS service discovery due to their:</t>

    <t>Zero-configuration operation: Devices autonomously advertise and discover services without requiring a central server.</t>

    <t>Topology independence: Functions in isolated networks (e.g., home labs, industrial control systems) even without Internet connectivity.</t>

    <t>Real-time updates: Service availability changes propagate within seconds, unlike DHCP's lease-based delays.</t>

    <t>Rich parameter negotiation: TXT records allow flexible exchange of protocol details (ports, ALPN preferences, certificate fingerprints).</t>
  
  </section>
  <section title="Key Use Cases">
    <t>This specification enables:</t>
    <t>IoT and Smart Home Privacy: Devices (e.g., cameras, voice assistants) automatically discover and use encrypted DNS without manual configuration.</t>
    <t>Enterprise Network Segmentation: Departments can advertise isolated DNS services (e.g., _dot.finance.corp.local) with policy enforcement.</t>
    <t>Offline and Air-Gapped Networks: Secure DNS resolution in environments where Internet access is restricted but internal name resolution is still required (e.g., industrial control systems, military networks).</t>
    
  </section>
  <section title="Relationship to Existing Standards">
  <t>While <xref target="RFC9463"/> provides DHCP/RA-based encrypted DNS discovery, this mDNS-based approach offers complementary advantages:</t>
    <table>
    <name>Relationship to Existing Standards</name>
    <thead>
      <tr><th align="left">Capability</th><th align="left">DHCP/RA</th><th align="left">mDNS/DNS-SD (This Spec)</th></tr>
    </thead>
    <tbody>
      <tr><td>Infrastructure</td><td>Requires DHCP server/router</td><td>Works without infrastructure</td></tr>
      <tr><td>Update Latency</td><td>Minutes-hours (lease time)</td><td>Seconds (event-driven)</td></tr>
      <tr><td>Parameter Flexibility</td><td>Limited by option space</td><td>Rich TXT key-value pairs</td></tr>
      <tr><td>Use Cases</td><td>Managed networks</td><td>Ad-hoc/IoT/dynamic networks</td></tr>
    </tbody>
  </table>
  <t>This document defines new DNS-SD service types (_dot._tcp, _doh._tcp, _doq._udp) and standardized TXT record parameters to enable seamless discovery of encrypted DNS services while maintaining backward compatibility with <xref target="RFC6763"/>.</t>
  </section>
</section>

<!-- Terminology and Requirements -->
<section title="Terminology and Requirements">
   <!-- 2.1 -->
   <section title="Requirements Language">
   <t>Key words: "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", "OPTIONAL" per BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/></t>
   </section>
    <!-- 2.2 -->
    <section title="Defined Terms">
   <ul spacing="normal">
   <li>EDNS: Encrypted DNS (DoT, DoH, DoQ collectively)</li>
   <li>ADN: Authentication Domain Name (FQDN for certificate validation)</li>
   <li>Service Instance: Unique identifier for an EDNS resolver (e.g., Finance DoT._dot._tcp.local)</li> 
   </ul>
   </section>
</section>

<!-- 3. Service Type Definitions -->
<section title="Service Type Definitions">
    <!-- 3.1 Encrypted DNS Service Types-->
    <section title="Encrypted DNS Service Types">
      <table>
        <name>Encrypted DNS Service Types</name>
        <thead>
          <tr><th align="left">Service Type</th><th align="left">Protocol</th><th align="left">Transport</th><th align="left">IANA Assignment</th></tr>
        </thead>
        <tbody>
          <tr><td>_dot._tcp</td><td>DoT</td><td>TCP</td><td>REQUIRED</td></tr>
          <tr><td>_doh._tcp</td><td>DoH</td><td>TCP</td><td>REQUIRED</td></tr>
          <tr><td>_doq._udp</td><td>DoQ</td><td>UDP</td><td>REQUIRED</td></tr>
        </tbody>
      </table>
    </section>
    <!-- 3.2. Service Instance Name Format -->
    <section title="Service Instance Name Format">
    <t>&lt;Instance&gt;.&lt;Service&gt;.&lt;Domain&gt;</t>
    <ul spacing="normal">
    <li>Instance: Human-readable identifier (e.g., CorpDNS, HomeGateway)</li>
    <li>Service: One of _dot._tcp, _doh._tcp, _doq._udp</li>
    <li>Domain: local (default) or custom domain</li>
    </ul>
    <t>Example: SecurityDoH._doh._tcp.local</t>
    </section>

</section>


<!-- 4. DNS Resource Records -->
<section title="DNS Resource Records">
    
    <!--  4.1. PTR Records (Service Discovery) -->
    <section title="PTR Records (Service Discovery)">
       <artwork name="" type="" align="left" alt="">
       <![CDATA[
        ; Service enumeration
        _services._dns-sd._udp.local. PTR _dot._tcp.local
        _services._dns-sd._udp.local. PTR _doh._tcp.local
        _services._dns-sd._udp.local. PTR _doq._udp.local
        ]]>
       </artwork>
    </section>
    <!-- 4.2. SRV Records (Service Location) -->
    <section title="SRV Records (Service Location)">
     <t><![CDATA[ <Instance>.<Service>.<Domain> [Class] [TTL] SRV <Priority> <Weight> <Port> <Target>]]></t>
     <ul >
      <li>Target: Hostname offering the service (A/AAAA must resolve)</li>
     </ul>
     <t>Example:</t>
     <t>HomeDoT._dot._tcp.local. 120 IN SRV 0 5 853 router.home.local.</t>
    </section>

    <!--  4.3. TXT Records (Service Parameters) -->
    <section title="TXT Records (Service Parameters)">
      <t>Defined Keys:</t>
    
      <table>
        <name>TXT Records (Service Parameters)</name>
        <thead><tr><th>Key</th><th>Format</th><th>Description</th><th>Example</th></tr></thead>
        <tbody>
        <tr><td>path</td><td>String</td><td>DoH URI path (required for DoH)</td><td>path=/dns-query</td></tr>
        <tr><td>alpn</td><td>Comma-list</td><td>Supported ALPN protocols</td><td>alpn=h2,h3</td></tr>
        <tr><td>pri</td><td>Number</td><td>Selection priority (0-65535)</td><td>pri=10</td></tr>
        <tr><td>fp_sha256</td><td>Hex string</td><td>Certificate SHA-256 fingerprint</td><td>fp_sha256=9F86D0...</td></tr>
        <tr><td>domain</td><td>FQDN</td><td>ADN for certificate validation</td><td>domain=dns.corp.example</td></tr>
        </tbody>
      </table>
      <t>Full Example:</t>
      <t>HomeDoH._doh._tcp.local. 120 IN TXT "path=/dns" "alpn=h2" "domain=dns.home.net" "fp_sha256=9F86D081884C7D659A2FEAA0C55AD015A3BF4F1B2B0B822CD15D6C15B0F00A08"</t>
    </section>
</section>

<!-- 5. Discovery Process -->
<section title="Discovery Process">

  <!-- 5.1. Service Advertisement -->
  <section title="Service Advertisement">
    <ol >
    <li>EDNS resolver sends mDNS broadcast:</li>
    </ol>
    <figure anchor="fig_EDNS" title="EDNS resolver sends mDNS broadcast">
    <artwork align="left">
    <![CDATA[ 
   +--------------+                       +------------------+
   | EDNS Resolver|                       |      Network     |
   +--------------+                       +------------------+
           | PTR _services._dns-sd._udp -> _doh._tcp  |
           |----------------------------------------->|
           | SRV HomeDoH._doh._tcp      -> router:443 |
           |----------------------------------------->|
           | TXT path=/dns alpn=h2                    |
           |----------------------------------------->|
    ]]>
    </artwork>
    </figure>
  </section>
  <!-- 5.2. Client Discovery -->
  <section title="Client Discovery">
    <ol>
    <li><t>Client queries for service types:</t>
        <artwork type="ascii-art" > 
        <![CDATA[
       ; Query available EDNS services
       _services._dns-sd._udp.local. IN PTR
        ]]> 
        </artwork>
    </li>    
      
    <li><t>Query specific instances:</t>
    <artwork type="ascii-art">
      <![CDATA[
       ; Query DoH instances
       _doh._tcp.local. IN PTR
        ]]> 
        </artwork>
    </li>
    
        
    <li><t>Resolve selected service:</t>
     
      <artwork type="ascii-art"> 
      <![CDATA[
        HomeDoH._doh._tcp.local. IN SRV
        HomeDoH._doh._tcp.local. IN TXT
        router.home.local. IN A
        router.home.local. IN AAAA
        ]]>
        </artwork>
    </li>
    </ol>
  </section>

</section>

<!-- 6. Security Considerations -->
<section title="Security Considerations">
    <!-- 6.1. Spoofing Countermeasures -->
    <section title="Spoofing Countermeasures">
    <ul>
    <li>mDNS Response Validation: Clients MUST verify source IP matches query target</li>
    <li>Rate Limiting: Implement mDNS response rate limiting <xref target="RFC6762" section="11"/></li>
    <li>TLS Enforcement: Clients MUST validate server certificates against ADN or fingerprint</li>
    </ul>
    </section>
    <!-- 6.2. Certificate Validation Models -->
    <section title="Certificate Validation Models">
        
         <table>
          <name>Certificate Validation Models</name>
          <thead><tr><th>Trust Model</th><th>Verification Method</th><th>Use Case</th></tr></thead>
          <tbody>
          <tr><td>Public PKI</td><td>ADN (domain= key) + CA validation</td><td>General-purpose networks</td></tr>
          <tr><td>Fingerprint Pinning</td><td>fp_sha256 exact match</td><td>High-security/IoT devices</td></tr>
          <tr><td>Private PKI</td><td>ADN + custom trust anchors</td><td>Enterprise networks</td></tr>
          </tbody>
         </table>
    </section>
    <!--  6.3. Privacy Implications -->
    <section title="Privacy Implications">
      <ul>
      <li>Metadata Leakage: mDNS queries reveal client interest in encrypted DNS</li>
      <li>Mitigation: Clients SHOULD use service type enumeration (_services._dns-sd) before specific queries</li>
      </ul>
    </section>
</section>

<!-- 7. IANA Considerations -->
<section title="IANA Considerations" anchor="iana-considerations">
  <section title="New DNS-SD Service Types" anchor="iana-service-types">
    <t>
      This document requests IANA to register the following service types
      in the "DNS-SD Service Type Bindings" registry located at
      &lt;https://www.iana.org/assignments/dns-sd/dns-sd.xhtml#service-types&gt;.
    </t>
    
    <table anchor="service-types-table">
      <name>New DNS-SD Service Types</name>
      <thead>
        <tr>
          <th align="left">Service Name</th>
          <th align="left">Transport Protocol</th>
          <th align="left">Reference</th>
          <th align="left">Assignment Policy</th>
        </tr>
      </thead>
      <tbody>
        <tr>
          <td align="left">_dot</td>
          <td align="left">tcp</td>
          <td align="left">RFC-TBD</td>
          <td align="left">Standard</td>
        </tr>
        <tr>
          <td align="left">_doh</td>
          <td align="left">tcp</td>
          <td align="left">RFC-TBD</td>
          <td align="left">Standard</td>
        </tr>
        <tr>
          <td align="left">_doq</td>
          <td align="left">udp</td>
          <td align="left">RFC-TBD</td>
          <td align="left">Standard</td>
        </tr>
      </tbody>
    </table>

    <t>
      The registration templates for these service types are as follows:
    </t>

    <t>Service Name: _dot</t>
    <t>Transport Protocol(s): tcp</t>
    <t>Assignee: IESG &lt;iesg@ietf.org&gt;</t>
    <t>Contact: IESG &lt;iesg@ietf.org&gt;</t>
    <t>Description: DNS over TLS (DoT) Resolver Service Discovery</t>
    <t>Reference: RFC-TBD</t>
    <t>Assignment Notes: This service type is used for discovering encrypted DNS services as defined in RFC-TBD.</t>
    
    <t>Service Name: _doh</t>
    <t>Transport Protocol(s): tcp</t>
    <t>Assignee: IESG &lt;iesg@ietf.org&gt;</t>
    <t>Contact: IESG &lt;iesg@ietf.org&gt;</t>
    <t>Description: DNS over HTTPS (DoH) Resolver Service Discovery</t>
    <t>Reference: RFC-TBD</t>
    <t>Assignment Notes: This service type is used for discovering encrypted DNS services as defined in RFC-TBD.</t>
    
    <t>Service Name: _doq</t>
    <t>Transport Protocol(s): udp</t>
    <t>Assignee: IESG &lt;iesg@ietf.org&gt;</t>
    <t>Contact: IESG &lt;iesg@ietf.org&gt;</t>
    <t>Description: DNS over QUIC (DoQ) Resolver Service Discovery</t>
    <t>Reference: RFC-TBD</t>
    <t>Assignment Notes: This service type is used for discovering encrypted DNS services as defined in RFC-TBD.</t>
  </section>

  <section title="TXT Record Key Registry" anchor="iana-txt-keys">
    <t>
      This document requests IANA to create a new registry titled
      "EDNS-SD TXT Record Keys" under the "DNS-Based Service Discovery (DNS-SD) Parameters"
      registry.
    </t>
    <t>
      The registration policy for this registry is "Expert Review" as defined in
      <xref target="RFC8126"/>.
    </t>
    <t>
      The initial contents of this registry are as follows:
    </t>
    
    <table anchor="txt-keys-table">
      <name>TXT Record Key Registry</name>
      <thead>
        <tr>
          <th align="left">Key</th>
          <th align="left">Meaning</th>
          <th align="left">Reference</th>
        </tr>
      </thead>
      <tbody>
        <tr>
          <td align="left">path</td>
          <td align="left">HTTP URI path (for DoH)</td>
          <td align="left">RFC-TBD</td>
        </tr>
        <tr>
          <td align="left">alpn</td>
          <td align="left">Supported ALPN protocols</td>
          <td align="left">RFC-TBD</td>
        </tr>
        <tr>
          <td align="left">pri</td>
          <td align="left">Service selection priority</td>
          <td align="left">RFC-TBD</td>
        </tr>
        <tr>
          <td align="left">fp_sha256</td>
          <td align="left">Certificate SHA-256 fingerprint</td>
          <td align="left">RFC-TBD</td>
        </tr>
        <tr>
          <td align="left">domain</td>
          <td align="left">Authentication Domain Name (ADN)</td>
          <td align="left">RFC-TBD</td>
        </tr>
      </tbody>
    </table>
    
    <t>
      New assignments in this registry require Expert Review as defined in
      <xref target="RFC8126"/>. The expert should consider whether the proposed
      key is well-defined, does not duplicate existing functionality, and is
      relevant to encrypted DNS service discovery.
    </t>
  </section>
</section>

<!--  8. Examples -->
<section title="Examples">
    <!-- 8.1. Full DoT Service Advertisement -->
  <section title="Full DoT Service Advertisement">
     <artwork name="" type="" align="left" alt="">
       <![CDATA[
       ; Service type announcement
       _services._dns-sd._udp.local. PTR _dot._tcp.local
        ]]></artwork>
    <artwork name="" type="" align="left" alt="">
  <![CDATA[
; Service instance
HomeDoT._dot._tcp.local. SRV 0 5 853 router.home.local.
HomeDoT._dot._tcp.local. TXT "domain=dns.home.net" "fp_sha256=9F86D08188..."
router.home.local. A 192.168.1.1
router.home.local. AAAA fd12:3456::1
    ]]>
    </artwork>  
  </section>
  
  <!-- 8.2. DoH Service with Custom Path -->
  <section title="DoH Service with Custom Path">
    <artwork name="" type="" align="left" alt="">
   <![CDATA[
OfficeDoH._doh._tcp.local. SRV 0 10 443 dnsgateway.corp.local.
OfficeDoH._doh._tcp.local. TXT "path=/internal/dns" "alpn=h2,h3" "pri=5"
      ]]>
        </artwork>  
  </section>
  <!--8.3. Client Discovery Sequence  -->
  <section title="Client Discovery Sequence">
    <figure anchor="fig_Client" title="Client Discovery Sequence">
    <artwork>
    <![CDATA[ 
   +--------+     +----------+    +------------+    +---------+
   | Client |     | mDNS     |    | EDNS       |    | Router  |
   |        |     | Responder|    | Resolver   |    |         |
   +--------+     +----------+    +------------+    +---------+
       | PTR Query      |                |                |
       |--------------->|                |                |
       | PTR Response   |                |                |
       |<---------------|                |                |
       | SRV/TXT Query                   |                |
       |-------------------------------->|                |
       | SRV/TXT Response                |                |
       |<--------------------------------|                |
       | TLS Handshake(validate certificate)              |
       |------------------------------------------------->|
       | DoT Session Established                          |
       |<-------------------------------------------------|
    ]]>
    </artwork>
    </figure>
  </section>
</section>

</middle>


<back>

<references title="References">

  <references title="Normative References">
    <reference anchor="RFC8126" target="https://www.rfc-editor.org/info/rfc8126">
    <front>
      <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
      <author initials="M." surname="Cotton" fullname="M. Cotton">
        <organization />
      </author>
      <author initials="B." surname="Leiba" fullname="B. Leiba">
        <organization />
      </author>
      <author initials="T." surname="Narten" fullname="T. Narten">
        <organization />
      </author>
      <date year="2017" month="June" />
      <abstract>
        <t>This document provides guidelines to authors of Internet-Drafts on how to write an IANA Considerations section.</t>
      </abstract>
    </front>
    <seriesInfo name="BCP" value="26" />
    <seriesInfo name="RFC" value="8126" />
    <seriesInfo name="DOI" value="10.17487/RFC8126" />
  </reference>

  <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
  <front>
  <title>Key words for use in RFCs to Indicate Requirement Levels</title>
  <author fullname="S. Bradner" initials="S." surname="Bradner"/>
  <date month="March" year="1997"/>
  <abstract>
  <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
  </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
  </reference>
  <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
  <front>
  <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
  <author fullname="B. Leiba" initials="B." surname="Leiba"/>
  <date month="May" year="2017"/>
  <abstract>
  <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
  </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
  </reference>
  <reference anchor="RFC6762" target="https://www.rfc-editor.org/info/rfc6762">
  <front>
  <title>Multicast DNS</title>
  <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
  <author fullname="M. Krochmal" initials="M." surname="Krochmal"/>
  <date month="February" year="2013"/>
  <abstract>
  <t>As networked devices become smaller, more portable, and more ubiquitous, the ability to operate with less configured infrastructure is increasingly important. In particular, the ability to look up DNS resource record data types (including, but not limited to, host names) in the absence of a conventional managed DNS server is useful.</t>
  <t>Multicast DNS (mDNS) provides the ability to perform DNS-like operations on the local link in the absence of any conventional Unicast DNS server. In addition, Multicast DNS designates a portion of the DNS namespace to be free for local use, without the need to pay any annual fee, and without the need to set up delegations or otherwise configure a conventional DNS server to answer for those names.</t>
  <t>The primary benefits of Multicast DNS names are that (i) they require little or no administration or configuration to set them up, (ii) they work when no infrastructure is present, and (iii) they work during infrastructure failures.</t>
  </abstract>
  </front>
  <seriesInfo name="RFC" value="6762"/>
  <seriesInfo name="DOI" value="10.17487/RFC6762"/>
  </reference>
  <reference anchor="RFC6763" target="https://www.rfc-editor.org/info/rfc6763">
  <front>
  <title>DNS-Based Service Discovery</title>
  <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
  <author fullname="M. Krochmal" initials="M." surname="Krochmal"/>
  <date month="February" year="2013"/>
  <abstract>
  <t>This document specifies how DNS resource records are named and structured to facilitate service discovery. Given a type of service that a client is looking for, and a domain in which the client is looking for that service, this mechanism allows clients to discover a list of named instances of that desired service, using standard DNS queries. This mechanism is referred to as DNS-based Service Discovery, or DNS-SD.</t>
  </abstract>
  </front>
  <seriesInfo name="RFC" value="6763"/>
  <seriesInfo name="DOI" value="10.17487/RFC6763"/>
  </reference>
  <reference anchor="RFC7858" target="https://www.rfc-editor.org/info/rfc7858">
  <front>
  <title>Specification for DNS over Transport Layer Security (TLS)</title>
  <author fullname="Z. Hu" initials="Z." surname="Hu"/>
  <author fullname="L. Zhu" initials="L." surname="Zhu"/>
  <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
  <author fullname="A. Mankin" initials="A." surname="Mankin"/>
  <author fullname="D. Wessels" initials="D." surname="Wessels"/>
  <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
  <date month="May" year="2016"/>
  <abstract>
  <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
  <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
  </abstract>
  </front>
  <seriesInfo name="RFC" value="7858"/>
  <seriesInfo name="DOI" value="10.17487/RFC7858"/>
  </reference>
  <reference anchor="RFC8484" target="https://www.rfc-editor.org/info/rfc8484">
  <front>
  <title>DNS Queries over HTTPS (DoH)</title>
  <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
  <author fullname="P. McManus" initials="P." surname="McManus"/>
  <date month="October" year="2018"/>
  <abstract>
  <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
  </abstract>
  </front>
  <seriesInfo name="RFC" value="8484"/>
  <seriesInfo name="DOI" value="10.17487/RFC8484"/>
  </reference>
  <reference anchor="RFC9250" target="https://www.rfc-editor.org/info/rfc9250">
  <front>
  <title>DNS over Dedicated QUIC Connections</title>
  <author fullname="C. Huitema" initials="C." surname="Huitema"/>
  <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
  <author fullname="A. Mankin" initials="A." surname="Mankin"/>
  <date month="May" year="2022"/>
  <abstract>
  <t>This document describes the use of QUIC to provide transport confidentiality for DNS. The encryption provided by QUIC has similar properties to those provided by TLS, while QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides more efficient packet-loss recovery than UDP. DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC 7858, and latency characteristics similar to classic DNS over UDP. This specification describes the use of DoQ as a general-purpose transport for DNS and includes the use of DoQ for stub to recursive, recursive to authoritative, and zone transfer scenarios.</t>
  </abstract>
  </front>
  <seriesInfo name="RFC" value="9250"/>
  <seriesInfo name="DOI" value="10.17487/RFC9250"/>
  </reference>
  </references>

  <references title="Informative References">
  <reference anchor="RFC9463" target="https://www.rfc-editor.org/info/rfc9463">
  <front>
  <title>DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers (DNR)</title>
  <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
  <author fullname="T. Reddy.K" initials="T." role="editor" surname="Reddy.K"/>
  <author fullname="D. Wing" initials="D." surname="Wing"/>
  <author fullname="N. Cook" initials="N." surname="Cook"/>
  <author fullname="T. Jensen" initials="T." surname="Jensen"/>
  <date month="November" year="2023"/>
  <abstract>
  <t>This document specifies new DHCP and IPv6 Router Advertisement options to discover encrypted DNS resolvers (e.g., DNS over HTTPS, DNS over TLS, and DNS over QUIC). Particularly, it allows a host to learn an Authentication Domain Name together with a list of IP addresses and a set of service parameters to reach such encrypted DNS resolvers.</t>
  </abstract>
  </front>
  <seriesInfo name="RFC" value="9463"/>
  <seriesInfo name="DOI" value="10.17487/RFC9463"/>
  </reference>
  <reference anchor="RFC9460" target="https://www.rfc-editor.org/info/rfc9460">
  <front>
  <title>Service Binding and Parameter Specification via the DNS (SVCB and HTTPS Resource Records)</title>
  <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
  <author fullname="M. Bishop" initials="M." surname="Bishop"/>
  <author fullname="E. Nygren" initials="E." surname="Nygren"/>
  <date month="November" year="2023"/>
  <abstract>
  <t>This document specifies the "SVCB" ("Service Binding") and "HTTPS" DNS resource record (RR) types to facilitate the lookup of information needed to make connections to network services, such as for HTTP origins. SVCB records allow a service to be provided from multiple alternative endpoints, each with associated parameters (such as transport protocol configuration), and are extensible to support future uses (such as keys for encrypting the TLS ClientHello). They also enable aliasing of apex domains, which is not possible with CNAME. The HTTPS RR is a variation of SVCB for use with HTTP (see RFC 9110, "HTTP Semantics"). By providing more information to the client before it attempts to establish a connection, these records offer potential benefits to both performance and privacy.</t>
  </abstract>
  </front>
  <seriesInfo name="RFC" value="9460"/>
  <seriesInfo name="DOI" value="10.17487/RFC9460"/>
  </reference>
  <reference anchor="IOT-DNS">
          <front>
            <title>IoT Device DNS Privacy Report</title>
            <author>
              <organization>ISOC</organization>
            </author>
            <date year="2023"/>
          </front>
        </reference>
  </references>

 <references title="Other References">
    <reference anchor="RFC-TBD">
    <front>
      <title>Multicast DNS-Based Service Discovery for Encrypted DNS Services (EDNS-SD)</title>
      <author initials="D." surname="Liu" fullname="D. Liu">
        <organization>Jinan University</organization>
      </author>
      <author initials="Z." surname="Yan" fullname="Z. Yan">
        <organization>CNNIC</organization>
      </author>
      <author initials="G." surname="Geng" fullname="G. Geng">
        <organization>Jinan University</organization>
      </author>
      <author initials="G." surname="Zeng" fullname="G. Zeng">
        <organization>Jinan University</organization>
      </author>
      <date year="2025" />
      <abstract>
        <t>This document defines a multicast DNS (mDNS) and DNS-Based Service Discovery (DNS-SD) mechanism for discovering encrypted DNS services in local networks.</t>
      </abstract>
    </front>
    <seriesInfo name="RFC" value="TBD" />
  </reference>
</references>


</references>

<section numbered="false" title="acknowledgements" toc="default">
  <t>This work is supported by the National Key Research and Development Program of China&nbsp;(No.&nbsp;2023YFB3105700).</t>
</section>

</back>
</rfc>

