<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-mishra-iotops-iot-dns-guidelines-01" category="bcp" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="IoT-DNS-Guidelines">IoT DNS Security and Privacy Guidelines</title>

    <author initials="A." surname="Mishra" fullname="Abhishek Mishra">
      <organization>Inria</organization>
      <address>
        <email>abhishek.mishra@inria.fr</email>
      </address>
    </author>
    <author initials="A." surname="Losty" fullname="Andrew Losty">
      <organization>UCL</organization>
      <address>
        <email>andrew.losty.23@ucl.ac.uk</email>
      </address>
    </author>
    <author initials="A. M." surname="Mandalari" fullname="Anna Maria Mandalari">
      <organization>UCL</organization>
      <address>
        <email>a.mandalari@ucl.ac.uk</email>
      </address>
    </author>
    <author initials="J." surname="Mozley" fullname="Jim Mozley">
      <organization>Infoblox</organization>
      <address>
        <email>jmozley@infoblox.com</email>
      </address>
    </author>
    <author initials="M." surname="Cunche" fullname="Mathieu Cunche">
      <organization>Inria</organization>
      <address>
        <email>mathieu.cunche@inria.fr</email>
      </address>
    </author>

    <date year="2025" month="October" day="14"/>

    <area>ops</area>
    <workgroup>iotops</workgroup>
    

    <abstract>


<?line 44?>

<t>This document outlines best current practices for Internet of Things (IoT) device providers regarding the implementation of DNS stub resolvers, with the aim of mitigating security threats, enhancing privacy, and resolving operational challenges. It also provides guidelines for network operators on mitigating the risks identified in this draft.</t>



    </abstract>

    <note title="About This Document" removeInRFC="true">
      <t>
        The latest revision of this draft can be found at <eref target="https://miishra.github.io/IoT-DNS-Guidelines/draft-mishra-iotops-iot-dns-guidelines-latest.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-mishra-iotops-iot-dns-guidelines/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/miishra/IoT-DNS-Guidelines"/>.</t>
    </note>


  </front>

  <middle>


<?line 48?>

<section anchor="introduction"><name>Introduction</name>

<t>Research into the DNS behavior of IoT devices shows widespread non-compliance with protocol standards, gaps in protocol support, and security vulnerabilities. This leads to unpredictable operational behavior and exposes devices to fingerprinting and denial-of-service attacks.</t>

<t>While the recommendations in this BCP may apply to all DNS stub resolver behavior, we treat IoT devices as a specific case where targeted recommendations are useful for the following reasons:</t>

<t><list style="symbols">
  <t>The recommendations address specific IoT-related security concerns not seen in the DNS behavior of general-purpose operating systems</t>
  <t>IoT devices have different resource characteristics from general-purpose devices, such as constrained power consumption, meaning incorrect software implementations can have an increased operational impact</t>
  <t>IoT devices do not typically have security agents installed on them</t>
  <t>There are many DNS RFCs, and this BCP can be used to identify those related to specific security issues observed through research into IoT devices, with the aim of making it easier to address these vulnerabilities</t>
  <t>IoT devices may be deployed at scale on dedicated networks, and these recommendations will be useful to network security teams in mitigating vulnerabilities, especially where device behavior cannot be changed</t>
  <t>Manufacturers may use standard software distributions aimed at IoT devices without considering DNS behavior. This BCP provides recommendations that can be used as part of the criteria to evaluate these distributions</t>
  <t>IoT devices typically perform the same set of DNS queries on start-up, which makes them both more vulnerable because of this predictable behavior and also more prone to fingerprinting</t>
</list></t>

<t>DNS terminology in this draft conforms to RFC 9499. In this context, Stub Resolver refers to the IoT device, and Resolver refers to the DNS server used by the IoT device.</t>

</section>
<section anchor="conventions-and-definitions"><name>Conventions and Definitions</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
<section anchor="recommendations-for-iot-device-stub-resolvers"><name>Recommendations for IoT Device Stub Resolvers</name>

<section anchor="encrypted-standards"><name>Compliance with Encrypted DNS Standards</name>

<t>The majority of IoT devices use unencrypted DNS over port 53, which means this traffic can be captured and is open to interception and manipulation.</t>

<t>IoT devices <bcp14>SHOULD</bcp14> support encrypted DNS protocols such as DNS over TLS (DoT) <xref target="RFC7858"/>, DNS over QUIC (DoQ) <xref target="RFC9250"/>, or DNS over HTTPS (DoH) <xref target="RFC8484"/> for enhanced privacy, security, and compatibility. To mitigate against fingerprinting IoT devices, DNS queries can be padded as detailed in <xref target="RFC7830"/> and <xref target="RFC8467"/>. Encrypted DNS protocols are not mandated for compliance with DNS standards, but the use of encrypted DNS may be mandated by some regulators and advised by competent authorities in deployment guidelines.</t>

</section>
<section anchor="configuring-resolvers"><name>Configuration of DNS servers used by IoT Stub Resolvers</name>

<t>IoT devices have been observed to fall back to hard-coded IP addresses for DNS resolvers or ignore addresses assigned to them via automated configuration methods such as DHCP Option 6.</t>

<t>DNS resolvers on devices <bcp14>MUST</bcp14> be configurable via network configuration protocols. Stub resolvers <bcp14>MUST NOT</bcp14> fall back to hard-coded resolvers.  This may result in an insecure communication channel, and the open resolvers used in these hard-coded configurations may be blocked by network policy, preventing the device from working.</t>

<t>Devices <bcp14>SHOULD</bcp14> use the following priority order for selecting a resolver. The first one that results in a discovered service should be selected.</t>

<t><list style="numbers" type="1">
  <t>Manual user configuration</t>
  <t>Device management software</t>
  <t>IPv6 Router Advertisement (RA) <xref target="RFC8106"/>, DHCPv6 <xref target="RFC8415"/> (if M=1 bit in RA), IPv4 DHCP <xref target="RFC2132"/>. When Encrypted resolver options are present <xref target="RFC9463"/>, then they <bcp14>SHOULD</bcp14> be used.</t>
</list></t>

<t>If the selected resolver is a plain IP address (e.g. from options 4 or 5) this implies unencrypted DNS. In such cases Discovery of Designated Resolvers <xref target="RFC9462"/> <bcp14>SHOULD</bcp14> be performed to upgrade to encrypted access, where available.</t>

</section>
<section anchor="source-port-and-transaction-id-randomization"><name>Source Port and Transaction ID Randomization</name>

<t>Some IoT devices have been observed to have insufficient or no randomization in the source ports of DNS queries or DNS transaction IDs. This leaves them vulnerable to spoofed responses. A combination of Source Port and Transaction ID is used, amongst other criteria, by the stub resolver when accepting a DNS response.</t>

<t>IoT devices <bcp14>MUST</bcp14> undergo adequate Source Port and Transaction ID randomization in their DNS queries as a mitigation against cache poisoning from spoofed responses. Having both of these values correctly randomized decreases the chances of a successful spoofed attack. Stub resolvers <bcp14>MUST</bcp14> follow the recommendations of <xref target="RFC5452"/> as described in Section 4.5 to ensure Source Port randomization and Transaction ID randomization as required by <xref target="RFC1035"/>.</t>

</section>
<section anchor="handling-of-ttl-values"><name>Handling of TTL Values</name>

<t>IoT devices have been observed making unexpectedly high numbers of DNS queries even when DNS record Time-To-Live values (TTLs) would mean this should be unnecessary. Devices have also been observed issuing DNS queries at fixed, highly predictable intervals for the same domain names, regardless of operational changes or TTL values.</t>

<t>Unnecessary queries may lead to a drain of power in resource-constrained IoT devices. Conversely, very high TTLs may impact device operations such as communicating with management servers, receiving software updates, or other changes, which may lead to security issues. Deterministic querying behavior increases the risk of device fingerprinting by adversaries who can profile query timing to identify specific device models or firmware versions.</t>

<t>The ideal operational scenario is for the owners of the authoritative zones used to manage the devices setting TTL values appropriately for the zones and specific records within them. Devices would then query these records only as needed.</t>

<t>IoT devices <bcp14>MUST</bcp14> cache DNS responses and <bcp14>SHOULD</bcp14> honour TTLs when caching. If for operational reasons this is not ideal, such as the case where a management server record could be cached for an extended period preventing failover or change, then minimum and maximum TTLs <bcp14>MAY</bcp14> be configurable on the device but <bcp14>MUST NOT</bcp14> not be hardcoded values. Where IoT stub resolvers cannot be configured with minimum and maximum TTL values, this can be mitigated by setting these on the network resolver.</t>

<t>If certain device operational requirements necessitate periodic revalidation of critical domains (e.g. management servers), these repeated queries <bcp14>SHOULD</bcp14> use non-deterministic inter-query timing to avoid fixed intervals.</t>

<t>In case of unsuccessful resolution, such as when the resolver is unavailable, IoT devices should implement exponential back-off strategies.</t>

</section>
<section anchor="support-of-edns0"><name>Support of EDNS(0)</name>

<t>Devices have been observed having limited support for EDNS(0), causing them to revert to TCP for queries over 512 bytes, affecting the device's efficiency. Other research findings include consuming additional processing resources and failing to maintain their network connectivity when responses to DNS requests exceed 512 bytes.</t>

<t>IoT devices <bcp14>MUST</bcp14> support EDNS(0) and send a supported UDP packet size via OPT 41 <xref target="RFC6891"/>. To avoid fragmentation of UDP packets, which may be dropped by intervening networks, the maximum packet size <bcp14>SHOULD</bcp14> be set to 1220 bytes as a default, although device configuration <bcp14>MAY</bcp14> allow this to be configurable. Although the networks to which IoT devices connect may support larger packet sizes than 1220 bytes, the nature of these devices in being deployed on many network types and DNS queries traversing networks controlled by different operators means it is operationally more effective to use this value. In addition, IoT devices <bcp14>MUST</bcp14> support using TCP for queries when a TC bit is returned from the resolver <xref target="RFC1035"/>.</t>

</section>
<section anchor="improve-device-behavior-in-response-to-resolution-problems"><name>Improve Device Behavior in Response to Resolution Problems</name>

<t>When resolving domain names, IoT devices may be unable to obtain an answer, and as a result, surges in the number of queries and retries have been observed, or an increase in queries using an alternate protocol (more aggressively querying via IPv6 rather than IPv4).</t>

<t>The use of serve-stale <xref target="RFC8767"/> by resolver software on the IoT device may mitigate the impact of failed resolution, such as when authoritative servers are unavailable. If the stub-resolver has this capability, device manufacturers should consider the benefits and any impact of using this. Network operators <bcp14>SHOULD</bcp14> configure DNS resolvers to use serve-stale for networks supporting IoT devices, especially where these networks are dedicated to this type of device, to limit any operational impact on IoT devices when resolution fails. Network operators <bcp14>MUST</bcp14> support IoT devices with dual-stack resolvers, rather than providing only IPv4 resolvers when devices are configured with both IPv4 and IPv6.</t>

</section>
<section anchor="use-of-dnssec"><name>Use of DNSSEC</name>

<t>IoT devices can be induced to contact an adversary server or make large volumes of DNS queries via spoofed responses to queries. It would be difficult for manufacturers to mitigate this by implementing checks of data received via DNS queries, such as validating IP addresses in the A/AAAA record RDATA. In addition any validation of this type does not address the problem of MiTM attacks that could be the attack vector.</t>

<t>Devices <bcp14>MAY</bcp14> improve security in their DNS stacks by utilizing DNSSEC validation <xref target="RFC9364"/>. Where the stub resolver is not capable of DNSSEC validation, but does support checking that queries are validated, the resolver used by the device as described in section &lt;&lt;configuring-resolvers&gt;&gt; <bcp14>MUST</bcp14> be configured to validate responses. Manufacturers should consider the type of network the device is likely to be deployed on, such as a home network vs. other types, in determining the likelihood of DNSSEC being available on the network and thus deciding if the device should rely on a validating resolver or making the device independently capable of validation.</t>

<t>Manufacturers <bcp14>MUST</bcp14> sign public zones used for device management and services to ensure queries can be validated to support any of their stub-resolvers or more generally resolvers that will use DNSSEC for validation. This will improve security regardless of whether devices can support checking that queries are validated.</t>

<t>IoT stub-resolvers may adopt one of two models for validation:
- Resolver validation - stub-resolvers using the Authenticated Data (AD) bit, which is suitable for constrained devices but requires explicit trust in the upstream resolver
- Full validation - local cryptographic checks, providing stronger assurance</t>

<t>Both models improve security over unvalidated queries, but manufacturers should weigh the security considerations, such as trust assumptions, against the operational feasibility when considering which approach to take.</t>

<section anchor="resolver-validation"><name>Resolver Validation</name>

<t>Where a manufacturer does utilize DNSSEC validation on the device the minimum implementation, from a device perspective, will be a validating resolver and the device supporting the AD bit. Relying solely on the AD bit assumes that the upstream resolver is trustworthy and uncompromised.</t>

<t>Manufacturers may implement a testing mechanism to determine if the network resolver supports DNSSEC so that it can utilize validation in a network that supports it, or fall back to unvalidated queries. Any test of the resolver will only validate that it supports DNSSEC, given that the resolver is performing the validation it must be explicitly trusted.</t>

<t>In order to check that a DNS query has been validated a stub-resolver <bcp14>MUST</bcp14> check the Authenticated Data (AD) bit <xref target="RFC4035"/> in responses to determine whether data was validated by the resolver it is using. When checking for the AD bit stub-resolvers <bcp14>MUST</bcp14> treat DNSSEC validation failures as fatal. Responses that fail validation <bcp14>MUST NOT</bcp14> be used for name resolution.</t>

</section>
<section anchor="full-validation"><name>Full Validation</name>

<t>Device stub-resolvers can perform validation themselves in cases where the network resolver does not validate queries or the device does not trust the network resolver to do so.</t>

<t>Considerations for device manufacturers in implementing full validation include:</t>

<t><list style="symbols">
  <t>Devices performing local validation gain end-to-end trust but at higher computational cost</t>
  <t>Devices should cache results including intermediate validation results to reduce repeated computation</t>
  <t>Devices will need to be shipped with a root trust anchor and have a mechanism to securely update this</t>
</list></t>

<t>To implement full local validation stub-resolvers <bcp14>MUST</bcp14> conform to <xref target="RFC4035"/> section 4.9. In practice it is likely to be easier for manufacturers to implement a minimum footprint validating recursive server on the device, configured to forward queries to a network resolver if necessary, rather than develop this capability in any stub resolver.</t>

</section>
</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>This BCP discusses security considerations for IoT devices in section Recommendations for IoT Device Stub Resolvers and mitigations that can be implemented on DNS resolvers. More general DNS security considerations in managing networks with IoT devices are detailed here.</t>

<t>Most IoT devices do not have specific security software agents installed on them, as is typically the case with general-purpose operating systems and supply chain vulnerabilities may mean that these devices are compromised before reaching the consumer. Network operators can use DNS resolvers to mitigate these risks.</t>

<t>Private network operators <bcp14>MAY</bcp14> block DNS traffic to any resolvers other than those managed by the operator, so that traffic is not bypassing any DNS security controls such as response policy zones or DNS traffic logging. This is more likely to be the case on enterprise or other private networks rather than service providers that don't want to limit customers using alternate resolvers.</t>

<t>Providers <bcp14>SHOULD</bcp14> alter resolver configuration to mitigate some of the security risks or operational issues identified in this BCP where it does not impact the operation of other types of DNS clients. For instance the use of serve-stale <xref target="RFC8767"/> is likely to benefit all stub resolvers on a network.</t>

<t>Where operators have networks dedicated to IoT devices, they <bcp14>MAY</bcp14> limit DNS resolution to only domain names used by those IoT devices to mitigate any impact in the event of a compromise to the device. Manufacturers <bcp14>SHOULD</bcp14> provide domain names used for communication to facilitate this and other security measures used to secure devices and identify those that are compromised. Manufacturer Usage Descriptions (MUDs) could provide details of domain names used in device operations that can then be added to DNS security controls.</t>

<t>DNS queries are most commonly carried over UDP and compromised devices have been used in DoS attacks by sending queries with forged source addresses, hence network operators <bcp14>MUST</bcp14> implement <xref target="RFC2827"/> network ingress filtering. Network operators should implement DNS Response Rate Limiting (RRL) on resolvers to mitigate high query volumes from devices causing DoS to the DNS infrastructure.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document has no IANA actions.</t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>

<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>




    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC7858">
  <front>
    <title>Specification for DNS over Transport Layer Security (TLS)</title>
    <author fullname="Z. Hu" initials="Z." surname="Hu"/>
    <author fullname="L. Zhu" initials="L." surname="Zhu"/>
    <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
    <author fullname="A. Mankin" initials="A." surname="Mankin"/>
    <author fullname="D. Wessels" initials="D." surname="Wessels"/>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <date month="May" year="2016"/>
    <abstract>
      <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
      <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7858"/>
  <seriesInfo name="DOI" value="10.17487/RFC7858"/>
</reference>

<reference anchor="RFC9250">
  <front>
    <title>DNS over Dedicated QUIC Connections</title>
    <author fullname="C. Huitema" initials="C." surname="Huitema"/>
    <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
    <author fullname="A. Mankin" initials="A." surname="Mankin"/>
    <date month="May" year="2022"/>
    <abstract>
      <t>This document describes the use of QUIC to provide transport confidentiality for DNS. The encryption provided by QUIC has similar properties to those provided by TLS, while QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides more efficient packet-loss recovery than UDP. DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC 7858, and latency characteristics similar to classic DNS over UDP. This specification describes the use of DoQ as a general-purpose transport for DNS and includes the use of DoQ for stub to recursive, recursive to authoritative, and zone transfer scenarios.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9250"/>
  <seriesInfo name="DOI" value="10.17487/RFC9250"/>
</reference>

<reference anchor="RFC8484">
  <front>
    <title>DNS Queries over HTTPS (DoH)</title>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <author fullname="P. McManus" initials="P." surname="McManus"/>
    <date month="October" year="2018"/>
    <abstract>
      <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8484"/>
  <seriesInfo name="DOI" value="10.17487/RFC8484"/>
</reference>

<reference anchor="RFC7830">
  <front>
    <title>The EDNS(0) Padding Option</title>
    <author fullname="A. Mayrhofer" initials="A." surname="Mayrhofer"/>
    <date month="May" year="2016"/>
    <abstract>
      <t>This document specifies the EDNS(0) "Padding" option, which allows DNS clients and servers to pad request and response messages by a variable number of octets.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7830"/>
  <seriesInfo name="DOI" value="10.17487/RFC7830"/>
</reference>

<reference anchor="RFC8467">
  <front>
    <title>Padding Policies for Extension Mechanisms for DNS (EDNS(0))</title>
    <author fullname="A. Mayrhofer" initials="A." surname="Mayrhofer"/>
    <date month="October" year="2018"/>
    <abstract>
      <t>RFC 7830 specifies the "Padding" option for Extension Mechanisms for DNS (EDNS(0)) but does not specify the actual padding length for specific applications. This memo lists the possible options ("padding policies"), discusses the implications of each option, and provides a recommended (experimental) option.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8467"/>
  <seriesInfo name="DOI" value="10.17487/RFC8467"/>
</reference>

<reference anchor="RFC8106">
  <front>
    <title>IPv6 Router Advertisement Options for DNS Configuration</title>
    <author fullname="J. Jeong" initials="J." surname="Jeong"/>
    <author fullname="S. Park" initials="S." surname="Park"/>
    <author fullname="L. Beloeil" initials="L." surname="Beloeil"/>
    <author fullname="S. Madanapalli" initials="S." surname="Madanapalli"/>
    <date month="March" year="2017"/>
    <abstract>
      <t>This document specifies IPv6 Router Advertisement (RA) options (called "DNS RA options") to allow IPv6 routers to advertise a list of DNS Recursive Server Addresses and a DNS Search List to IPv6 hosts.</t>
      <t>This document, which obsoletes RFC 6106, defines a higher default value of the lifetime of the DNS RA options to reduce the likelihood of expiry of the options on links with a relatively high rate of packet loss.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8106"/>
  <seriesInfo name="DOI" value="10.17487/RFC8106"/>
</reference>

<reference anchor="RFC8415">
  <front>
    <title>Dynamic Host Configuration Protocol for IPv6 (DHCPv6)</title>
    <author fullname="T. Mrugalski" initials="T." surname="Mrugalski"/>
    <author fullname="M. Siodelski" initials="M." surname="Siodelski"/>
    <author fullname="B. Volz" initials="B." surname="Volz"/>
    <author fullname="A. Yourtchenko" initials="A." surname="Yourtchenko"/>
    <author fullname="M. Richardson" initials="M." surname="Richardson"/>
    <author fullname="S. Jiang" initials="S." surname="Jiang"/>
    <author fullname="T. Lemon" initials="T." surname="Lemon"/>
    <author fullname="T. Winters" initials="T." surname="Winters"/>
    <date month="November" year="2018"/>
    <abstract>
      <t>This document describes the Dynamic Host Configuration Protocol for IPv6 (DHCPv6): an extensible mechanism for configuring nodes with network configuration parameters, IP addresses, and prefixes. Parameters can be provided statelessly, or in combination with stateful assignment of one or more IPv6 addresses and/or IPv6 prefixes. DHCPv6 can operate either in place of or in addition to stateless address autoconfiguration (SLAAC).</t>
      <t>This document updates the text from RFC 3315 (the original DHCPv6 specification) and incorporates prefix delegation (RFC 3633), stateless DHCPv6 (RFC 3736), an option to specify an upper bound for how long a client should wait before refreshing information (RFC 4242), a mechanism for throttling DHCPv6 clients when DHCPv6 service is not available (RFC 7083), and relay agent handling of unknown messages (RFC 7283). In addition, this document clarifies the interactions between models of operation (RFC 7550). As such, this document obsoletes RFC 3315, RFC 3633, RFC 3736, RFC 4242, RFC 7083, RFC 7283, and RFC 7550.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8415"/>
  <seriesInfo name="DOI" value="10.17487/RFC8415"/>
</reference>

<reference anchor="RFC2132">
  <front>
    <title>DHCP Options and BOOTP Vendor Extensions</title>
    <author fullname="S. Alexander" initials="S." surname="Alexander"/>
    <author fullname="R. Droms" initials="R." surname="Droms"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>This document specifies the current set of DHCP options. Future options will be specified in separate RFCs. The current list of valid options is also available in ftp://ftp.isi.edu/in-notes/iana/assignments. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2132"/>
  <seriesInfo name="DOI" value="10.17487/RFC2132"/>
</reference>

<reference anchor="RFC9463">
  <front>
    <title>DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers (DNR)</title>
    <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
    <author fullname="T. Reddy.K" initials="T." role="editor" surname="Reddy.K"/>
    <author fullname="D. Wing" initials="D." surname="Wing"/>
    <author fullname="N. Cook" initials="N." surname="Cook"/>
    <author fullname="T. Jensen" initials="T." surname="Jensen"/>
    <date month="November" year="2023"/>
    <abstract>
      <t>This document specifies new DHCP and IPv6 Router Advertisement options to discover encrypted DNS resolvers (e.g., DNS over HTTPS, DNS over TLS, and DNS over QUIC). Particularly, it allows a host to learn an Authentication Domain Name together with a list of IP addresses and a set of service parameters to reach such encrypted DNS resolvers.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9463"/>
  <seriesInfo name="DOI" value="10.17487/RFC9463"/>
</reference>

<reference anchor="RFC9462">
  <front>
    <title>Discovery of Designated Resolvers</title>
    <author fullname="T. Pauly" initials="T." surname="Pauly"/>
    <author fullname="E. Kinnear" initials="E." surname="Kinnear"/>
    <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
    <author fullname="P. McManus" initials="P." surname="McManus"/>
    <author fullname="T. Jensen" initials="T." surname="Jensen"/>
    <date month="November" year="2023"/>
    <abstract>
      <t>This document defines Discovery of Designated Resolvers (DDR), a set of mechanisms for DNS clients to use DNS records to discover a resolver's encrypted DNS configuration. An Encrypted DNS Resolver discovered in this manner is referred to as a "Designated Resolver". These mechanisms can be used to move from unencrypted DNS to encrypted DNS when only the IP address of a resolver is known. These mechanisms are designed to be limited to cases where Unencrypted DNS Resolvers and their Designated Resolvers are operated by the same entity or cooperating entities. It can also be used to discover support for encrypted DNS protocols when the name of an Encrypted DNS Resolver is known.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9462"/>
  <seriesInfo name="DOI" value="10.17487/RFC9462"/>
</reference>

<reference anchor="RFC5452">
  <front>
    <title>Measures for Making DNS More Resilient against Forged Answers</title>
    <author fullname="A. Hubert" initials="A." surname="Hubert"/>
    <author fullname="R. van Mook" initials="R." surname="van Mook"/>
    <date month="January" year="2009"/>
    <abstract>
      <t>The current Internet climate poses serious threats to the Domain Name System. In the interim period before the DNS protocol can be secured more fully, measures can already be taken to harden the DNS to make 'spoofing' a recursing nameserver many orders of magnitude harder.</t>
      <t>Even a cryptographically secured DNS benefits from having the ability to discard bogus responses quickly, as this potentially saves large amounts of computation.</t>
      <t>By describing certain behavior that has previously not been standardized, this document sets out how to make the DNS more resilient against accepting incorrect responses. This document updates RFC 2181. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5452"/>
  <seriesInfo name="DOI" value="10.17487/RFC5452"/>
</reference>

<reference anchor="RFC1035">
  <front>
    <title>Domain names - implementation and specification</title>
    <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
    <date month="November" year="1987"/>
    <abstract>
      <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="13"/>
  <seriesInfo name="RFC" value="1035"/>
  <seriesInfo name="DOI" value="10.17487/RFC1035"/>
</reference>

<reference anchor="RFC6891">
  <front>
    <title>Extension Mechanisms for DNS (EDNS(0))</title>
    <author fullname="J. Damas" initials="J." surname="Damas"/>
    <author fullname="M. Graff" initials="M." surname="Graff"/>
    <author fullname="P. Vixie" initials="P." surname="Vixie"/>
    <date month="April" year="2013"/>
    <abstract>
      <t>The Domain Name System's wire protocol includes a number of fixed fields whose range has been or soon will be exhausted and does not allow requestors to advertise their capabilities to responders. This document describes backward-compatible mechanisms for allowing the protocol to grow.</t>
      <t>This document updates the Extension Mechanisms for DNS (EDNS(0)) specification (and obsoletes RFC 2671) based on feedback from deployment experience in several implementations. It also obsoletes RFC 2673 ("Binary Labels in the Domain Name System") and adds considerations on the use of extended labels in the DNS.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="75"/>
  <seriesInfo name="RFC" value="6891"/>
  <seriesInfo name="DOI" value="10.17487/RFC6891"/>
</reference>

<reference anchor="RFC8767">
  <front>
    <title>Serving Stale Data to Improve DNS Resiliency</title>
    <author fullname="D. Lawrence" initials="D." surname="Lawrence"/>
    <author fullname="W. Kumari" initials="W." surname="Kumari"/>
    <author fullname="P. Sood" initials="P." surname="Sood"/>
    <date month="March" year="2020"/>
    <abstract>
      <t>This document defines a method (serve-stale) for recursive resolvers to use stale DNS data to avoid outages when authoritative nameservers cannot be reached to refresh expired data. One of the motivations for serve-stale is to make the DNS more resilient to DoS attacks and thereby make them less attractive as an attack vector. This document updates the definitions of TTL from RFCs 1034 and 1035 so that data can be kept in the cache beyond the TTL expiry; it also updates RFC 2181 by interpreting values with the high-order bit set as being positive, rather than 0, and suggests a cap of 7 days.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8767"/>
  <seriesInfo name="DOI" value="10.17487/RFC8767"/>
</reference>

<reference anchor="RFC9364">
  <front>
    <title>DNS Security Extensions (DNSSEC)</title>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <date month="February" year="2023"/>
    <abstract>
      <t>This document describes the DNS Security Extensions (commonly called "DNSSEC") that are specified in RFCs 4033, 4034, and 4035, as well as a handful of others. One purpose is to introduce all of the RFCs in one place so that the reader can understand the many aspects of DNSSEC. This document does not update any of those RFCs. A second purpose is to state that using DNSSEC for origin authentication of DNS data is the best current practice. A third purpose is to provide a single reference for other documents that want to refer to DNSSEC.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="237"/>
  <seriesInfo name="RFC" value="9364"/>
  <seriesInfo name="DOI" value="10.17487/RFC9364"/>
</reference>

<reference anchor="RFC4035">
  <front>
    <title>Protocol Modifications for the DNS Security Extensions</title>
    <author fullname="R. Arends" initials="R." surname="Arends"/>
    <author fullname="R. Austein" initials="R." surname="Austein"/>
    <author fullname="M. Larson" initials="M." surname="Larson"/>
    <author fullname="D. Massey" initials="D." surname="Massey"/>
    <author fullname="S. Rose" initials="S." surname="Rose"/>
    <date month="March" year="2005"/>
    <abstract>
      <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of new resource records and protocol modifications that add data origin authentication and data integrity to the DNS. This document describes the DNSSEC protocol modifications. This document defines the concept of a signed zone, along with the requirements for serving and resolving by using DNSSEC. These techniques allow a security-aware resolver to authenticate both DNS resource records and authoritative DNS error indications.</t>
      <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4035"/>
  <seriesInfo name="DOI" value="10.17487/RFC4035"/>
</reference>

<reference anchor="RFC2827">
  <front>
    <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
    <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
    <author fullname="D. Senie" initials="D." surname="Senie"/>
    <date month="May" year="2000"/>
    <abstract>
      <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="38"/>
  <seriesInfo name="RFC" value="2827"/>
  <seriesInfo name="DOI" value="10.17487/RFC2827"/>
</reference>




    </references>

</references>


<?line 195?>

<section numbered="false" anchor="acknowledgments"><name>Acknowledgments</name>

<t>We thank the researchers, reviewers, and engineers who contributed to the analysis and testing process.</t>

<t>The authors thank Mohamed Boucadair, Chris Box, Eliot Lear, Martine Sophie Lenders, Jim Reid, Michael Richardson and Hannes Tschofenig for their contributions, questions and comments.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

