diff options
Diffstat (limited to 'doc/rfc/rfc9250.txt')
-rw-r--r-- | doc/rfc/rfc9250.txt | 1450 |
1 files changed, 1450 insertions, 0 deletions
diff --git a/doc/rfc/rfc9250.txt b/doc/rfc/rfc9250.txt new file mode 100644 index 0000000..1aed862 --- /dev/null +++ b/doc/rfc/rfc9250.txt @@ -0,0 +1,1450 @@ + + + + +Internet Engineering Task Force (IETF) C. Huitema +Request for Comments: 9250 Private Octopus Inc. +Category: Standards Track S. Dickinson +ISSN: 2070-1721 Sinodun IT + A. Mankin + Salesforce + May 2022 + + + DNS over Dedicated QUIC Connections + +Abstract + + This document describes the use of QUIC to provide transport + confidentiality for DNS. The encryption provided by QUIC has similar + properties to those provided by TLS, while QUIC transport eliminates + the head-of-line blocking issues inherent with TCP and provides more + efficient packet-loss recovery than UDP. DNS over QUIC (DoQ) has + privacy properties similar to DNS over TLS (DoT) specified in RFC + 7858, and latency characteristics similar to classic DNS over UDP. + This specification describes the use of DoQ as a general-purpose + transport for DNS and includes the use of DoQ for stub to recursive, + recursive to authoritative, and zone transfer scenarios. + +Status of This Memo + + This is an Internet Standards Track document. + + This document is a product of the Internet Engineering Task Force + (IETF). It represents the consensus of the IETF community. It has + received public review and has been approved for publication by the + Internet Engineering Steering Group (IESG). Further information on + Internet Standards is available in Section 2 of RFC 7841. + + Information about the current status of this document, any errata, + and how to provide feedback on it may be obtained at + https://www.rfc-editor.org/info/rfc9250. + +Copyright Notice + + Copyright (c) 2022 IETF Trust and the persons identified as the + document authors. All rights reserved. + + This document is subject to BCP 78 and the IETF Trust's Legal + Provisions Relating to IETF Documents + (https://trustee.ietf.org/license-info) in effect on the date of + publication of this document. Please review these documents + carefully, as they describe your rights and restrictions with respect + to this document. Code Components extracted from this document must + include Revised BSD License text as described in Section 4.e of the + Trust Legal Provisions and are provided without warranty as described + in the Revised BSD License. + +Table of Contents + + 1. Introduction + 2. Key Words + 3. Design Considerations + 3.1. Provide DNS Privacy + 3.2. Design for Minimum Latency + 3.3. Middlebox Considerations + 3.4. No Server-Initiated Transactions + 4. Specifications + 4.1. Connection Establishment + 4.1.1. Port Selection + 4.2. Stream Mapping and Usage + 4.2.1. DNS Message IDs + 4.3. DoQ Error Codes + 4.3.1. Transaction Cancellation + 4.3.2. Transaction Errors + 4.3.3. Protocol Errors + 4.3.4. Alternative Error Codes + 4.4. Connection Management + 4.5. Session Resumption and 0-RTT + 4.6. Message Sizes + 5. Implementation Requirements + 5.1. Authentication + 5.2. Fallback to Other Protocols on Connection Failure + 5.3. Address Validation + 5.4. Padding + 5.5. Connection Handling + 5.5.1. Connection Reuse + 5.5.2. Resource Management + 5.5.3. Using 0-RTT and Session Resumption + 5.5.4. Controlling Connection Migration for Privacy + 5.6. Processing Queries in Parallel + 5.7. Zone Transfer + 5.8. Flow Control Mechanisms + 6. Security Considerations + 7. Privacy Considerations + 7.1. Privacy Issues with 0-RTT data + 7.2. Privacy Issues with Session Resumption + 7.3. Privacy Issues with Address Validation Tokens + 7.4. Privacy Issues with Long Duration Sessions + 7.5. Traffic Analysis + 8. IANA Considerations + 8.1. Registration of a DoQ Identification String + 8.2. Reservation of a Dedicated Port + 8.3. Reservation of an Extended DNS Error Code: Too Early + 8.4. DNS-over-QUIC Error Codes Registry + 9. References + 9.1. Normative References + 9.2. Informative References + Appendix A. The NOTIFY Service + Acknowledgements + Authors' Addresses + +1. Introduction + + Domain Name System (DNS) concepts are specified in "Domain names - + concepts and facilities" [RFC1034]. The transmission of DNS queries + and responses over UDP and TCP is specified in "Domain names - + implementation and specification" [RFC1035]. + + This document presents a mapping of the DNS protocol over the QUIC + transport [RFC9000] [RFC9001]. DNS over QUIC is referred to here as + DoQ, in line with "DNS Terminology" [DNS-TERMS]. + + The goals of the DoQ mapping are: + + 1. Provide the same DNS privacy protection as DoT [RFC7858]. This + includes an option for the client to authenticate the server by + means of an authentication domain name as specified in "Usage + Profiles for DNS over TLS and DNS over DTLS" [RFC8310]. + + 2. Provide an improved level of source address validation for DNS + servers compared to classic DNS over UDP. + + 3. Provide a transport that does not impose path MTU limitations on + the size of DNS responses it can send. + + In order to achieve these goals, and to support ongoing work on + encryption of DNS, the scope of this document includes: + + * the "stub to recursive resolver" scenario (also called the "stub + to recursive" scenario in this document) + + * the "recursive resolver to authoritative nameserver" scenario + (also called the "recursive to authoritative" scenario in this + document), and + + * the "nameserver to nameserver" scenario (mainly used for zone + transfers (XFR) [RFC1995] [RFC5936]). + + In other words, this document specifies QUIC as a general-purpose + transport for DNS. + + The specific non-goals of this document are: + + 1. No attempt is made to evade potential blocking of DoQ traffic by + middleboxes. + + 2. No attempt to support server-initiated transactions, which are + used only in DNS Stateful Operations (DSO) [RFC8490]. + + Specifying the transmission of an application over QUIC requires + specifying how the application's messages are mapped to QUIC streams, + and generally how the application will use QUIC. This is done for + HTTP in "Hypertext Transfer Protocol Version 3 (HTTP/3)" [HTTP/3]. + The purpose of this document is to define the way DNS messages can be + transmitted over QUIC. + + DNS over HTTPS (DoH) [RFC8484] can be used with HTTP/3 to get some of + the benefits of QUIC. However, a lightweight direct mapping for DoQ + can be regarded as a more natural fit for both the recursive to + authoritative and zone transfer scenarios, which rarely involve + intermediaries. In these scenarios, the additional overhead of HTTP + is not offset by, for example, benefits of HTTP proxying and caching + behavior. + + In this document, Section 3 presents the reasoning that guided the + proposed design. Section 4 specifies the actual mapping of DoQ. + Section 5 presents guidelines on the implementation, usage, and + deployment of DoQ. + +2. Key Words + + The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", + "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and + "OPTIONAL" in this document are to be interpreted as described in + BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all + capitals, as shown here. + +3. Design Considerations + + This section and its subsections present the design guidelines that + were used for DoQ. While all other sections in this document are + normative, this section is informative in nature. + +3.1. Provide DNS Privacy + + DoT [RFC7858] defines how to mitigate some of the issues described in + "DNS Privacy Considerations" [RFC9076] by specifying how to transmit + DNS messages over TLS. The "Usage Profiles for DNS over TLS and DNS + over DTLS" [RFC8310] specify Strict and Opportunistic usage profiles + for DoT including how stub resolvers can authenticate recursive + resolvers. + + QUIC connection setup includes the negotiation of security parameters + using TLS, as specified in "Using TLS to Secure QUIC" [RFC9001], + enabling encryption of the QUIC transport. Transmitting DNS messages + over QUIC will provide essentially the same privacy protections as + DoT [RFC7858] including Strict and Opportunistic usage profiles + [RFC8310]. Further discussion on this is provided in Section 7. + +3.2. Design for Minimum Latency + + QUIC is specifically designed to reduce protocol-induced delays, with + features such as: + + 1. Support for 0-RTT data during session resumption. + + 2. Support for advanced packet-loss recovery procedures as specified + in "QUIC Loss Detection and Congestion Control" [RFC9002]. + + 3. Mitigation of head-of-line blocking by allowing parallel delivery + of data on multiple streams. + + This mapping of DNS to QUIC will take advantage of these features in + three ways: + + 1. Optional support for sending 0-RTT data during session resumption + (the security and privacy implications of this are discussed in + later sections). + + 2. Long-lived QUIC connections over which multiple DNS transactions + are performed, generating the sustained traffic required to + benefit from advanced recovery features. + + 3. Mapping of each DNS Query/Response transaction to a separate + stream, to mitigate head-of-line blocking. This enables servers + to respond to queries "out of order". It also enables clients to + process responses as soon as they arrive, without having to wait + for in-order delivery of responses previously posted by the + server. + + These considerations are reflected in the mapping of DNS traffic to + QUIC streams in Section 4.2. + +3.3. Middlebox Considerations + + Using QUIC might allow a protocol to disguise its purpose from + devices on the network path using encryption and traffic analysis + resistance techniques like padding, traffic pacing, and traffic + shaping. This specification does not include any measures that are + designed to avoid such classification; the padding mechanisms defined + in Section 5.4 are intended to obfuscate the specific records + contained in DNS queries and responses, but not the fact that this is + DNS traffic. Consequently, firewalls and other middleboxes might be + able to distinguish DoQ from other protocols that use QUIC, like + HTTP, and apply different treatment. + + The lack of measures in this specification to avoid protocol + classification is not an endorsement of such practices. + +3.4. No Server-Initiated Transactions + + As stated in Section 1, this document does not specify support for + server-initiated transactions within established DoQ connections. + That is, only the initiator of the DoQ connection may send queries + over the connection. + + DSO does support server-initiated transactions within existing + connections. However, DoQ as defined here does not meet the criteria + for an applicable transport for DSO because it does not guarantee in- + order delivery of messages; see Section 4.2 of [RFC8490]. + +4. Specifications + +4.1. Connection Establishment + + DoQ connections are established as described in the QUIC transport + specification [RFC9000]. During connection establishment, DoQ + support is indicated by selecting the Application-Layer Protocol + Negotiation (ALPN) token "doq" in the crypto handshake. + +4.1.1. Port Selection + + By default, a DNS server that supports DoQ MUST listen for and accept + QUIC connections on the dedicated UDP port 853 (Section 8), unless + there is a mutual agreement to use another port. + + By default, a DNS client desiring to use DoQ with a particular server + MUST establish a QUIC connection to UDP port 853 on the server, + unless there is a mutual agreement to use another port. + + DoQ connections MUST NOT use UDP port 53. This recommendation + against use of port 53 for DoQ is to avoid confusion between DoQ and + the use of DNS over UDP [RFC1035]. The risk of confusion exists even + if two parties agreed on port 53, as other parties without knowledge + of that agreement might still try to use that port. + + In the stub to recursive scenario, the use of port 443 as a mutually + agreed alternative port can be operationally beneficial, since port + 443 is used by many services using QUIC and HTTP-3 and is thus less + likely to be blocked than other ports. Several mechanisms for stubs + to discover recursives offering encrypted transports, including the + use of custom ports, are the subject of ongoing work. + +4.2. Stream Mapping and Usage + + The mapping of DNS traffic over QUIC streams takes advantage of the + QUIC stream features detailed in Section 2 of [RFC9000], the QUIC + transport specification. + + DNS query/response traffic [RFC1034] [RFC1035] follows a simple + pattern in which the client sends a query, and the server provides + one or more responses (multiple responses can occur in zone + transfers). + + The mapping specified here requires that the client select a separate + QUIC stream for each query. The server then uses the same stream to + provide all the response messages for that query. In order for + multiple responses to be parsed, a 2-octet length field is used in + exactly the same way as the 2-octet length field defined for DNS over + TCP [RFC1035]. The practical result of this is that the content of + each QUIC stream is exactly the same as the content of a TCP + connection that would manage exactly one query. + + All DNS messages (queries and responses) sent over DoQ connections + MUST be encoded as a 2-octet length field followed by the message + content as specified in [RFC1035]. + + The client MUST select the next available client-initiated + bidirectional stream for each subsequent query on a QUIC connection, + in conformance with the QUIC transport specification [RFC9000]. + Packet losses and other network events might cause queries to arrive + in a different order. Servers SHOULD process queries as they arrive, + as not doing so would cause unnecessary delays. + + The client MUST send the DNS query over the selected stream and MUST + indicate through the STREAM FIN mechanism that no further data will + be sent on that stream. + + The server MUST send the response(s) on the same stream and MUST + indicate, after the last response, through the STREAM FIN mechanism + that no further data will be sent on that stream. + + Therefore, a single DNS transaction consumes a single bidirectional + client-initiated stream. This means that the client's first query + occurs on QUIC stream 0, the second on 4, and so on (see Section 2.1 + of [RFC9000]). + + Servers MAY defer processing of a query until the STREAM FIN has been + indicated on the stream selected by the client. + + Servers and clients MAY monitor the number of "dangling" streams. + These are open streams where the following events have not occurred + after implementation-defined timeouts: + + * the expected queries or responses have not been received or, + + * the expected queries or responses have been received but not the + STREAM FIN + + Implementations MAY impose a limit on the number of such dangling + streams. If limits are encountered, implementations MAY close the + connection. + +4.2.1. DNS Message IDs + + When sending queries over a QUIC connection, the DNS Message ID MUST + be set to 0. The stream mapping for DoQ allows for unambiguous + correlation of queries and responses, so the Message ID field is not + required. + + This has implications for proxying DoQ messages to and from other + transports. For example, proxies may have to manage the fact that + DoQ can support a larger number of outstanding queries on a single + connection than, for example, DNS over TCP, because DoQ is not + limited by the Message ID space. This issue already exists for DoH, + where a Message ID of 0 is recommended. + + When forwarding a DNS message from DoQ over another transport, a DNS + Message ID MUST be generated according to the rules of the protocol + that is in use. When forwarding a DNS message from another transport + over DoQ, the Message ID MUST be set to 0. + +4.3. DoQ Error Codes + + The following error codes are defined for use when abruptly + terminating streams, for use as application protocol error codes when + aborting reading of streams, or for immediately closing connections: + + DOQ_NO_ERROR (0x0): No error. This is used when the connection or + stream needs to be closed, but there is no error to signal. + + DOQ_INTERNAL_ERROR (0x1): The DoQ implementation encountered an + internal error and is incapable of pursuing the transaction or the + connection. + + DOQ_PROTOCOL_ERROR (0x2): The DoQ implementation encountered a + protocol error and is forcibly aborting the connection. + + DOQ_REQUEST_CANCELLED (0x3): A DoQ client uses this to signal that + it wants to cancel an outstanding transaction. + + DOQ_EXCESSIVE_LOAD (0x4): A DoQ implementation uses this to signal + when closing a connection due to excessive load. + + DOQ_UNSPECIFIED_ERROR (0x5): A DoQ implementation uses this in the + absence of a more specific error code. + + DOQ_ERROR_RESERVED (0xd098ea5e): An alternative error code used for + tests. + + See Section 8.4 for details on registering new error codes. + +4.3.1. Transaction Cancellation + + In QUIC, sending STOP_SENDING requests that a peer cease transmission + on a stream. If a DoQ client wishes to cancel an outstanding + request, it MUST issue a QUIC STOP_SENDING, and it SHOULD use the + error code DOQ_REQUEST_CANCELLED. It MAY use a more specific error + code registered according to Section 8.4. The STOP_SENDING request + may be sent at any time but will have no effect if the server + response has already been sent, in which case the client will simply + discard the incoming response. The corresponding DNS transaction + MUST be abandoned. + + Servers that receive STOP_SENDING act in accordance with Section 3.5 + of [RFC9000]. Servers SHOULD NOT continue processing a DNS + transaction if they receive a STOP_SENDING. + + Servers MAY impose implementation limits on the total number or rate + of cancellation requests. If limits are encountered, servers MAY + close the connection. In this case, servers wanting to help client + debugging MAY use the error code DOQ_EXCESSIVE_LOAD. There is always + a trade-off between helping good faith clients debug issues and + allowing denial-of-service attackers to test server defenses; + depending on circumstances servers might very well choose to send + different error codes. + + Note that this mechanism provides a way for secondaries to cancel a + single zone transfer occurring on a given stream without having to + close the QUIC connection. + + Servers MUST NOT continue processing a DNS transaction if they + receive a RESET_STREAM request from the client before the client + indicates the STREAM FIN. The server MUST issue a RESET_STREAM to + indicate that the transaction is abandoned unless: + + * it has already done so for another reason or + + * it has already both sent the response and indicated the STREAM + FIN. + +4.3.2. Transaction Errors + + Servers normally complete transactions by sending a DNS response (or + responses) on the transaction's stream, including cases where the DNS + response indicates a DNS error. For example, a client SHOULD be + notified of a Server Failure (SERVFAIL, [RFC1035]) through a response + with the Response Code set to SERVFAIL. + + If a server is incapable of sending a DNS response due to an internal + error, it SHOULD issue a QUIC RESET_STREAM frame. The error code + SHOULD be set to DOQ_INTERNAL_ERROR. The corresponding DNS + transaction MUST be abandoned. Clients MAY limit the number of + unsolicited QUIC RESET_STREAM frames received on a connection before + choosing to close the connection. + + Note that this mechanism provides a way for primaries to abort a + single zone transfer occurring on a given stream without having to + close the QUIC connection. + +4.3.3. Protocol Errors + + Other error scenarios can occur due to malformed, incomplete, or + unexpected messages during a transaction. These include (but are not + limited to): + + * a client or server receives a message with a non-zero Message ID + + * a client or server receives a STREAM FIN before receiving all the + bytes for a message indicated in the 2-octet length field + + * a client receives a STREAM FIN before receiving all the expected + responses + + * a server receives more than one query on a stream + + * a client receives a different number of responses on a stream than + expected (e.g., multiple responses to a query for an A record) + + * a client receives a STOP_SENDING request + + * the client or server does not indicate the expected STREAM FIN + after sending requests or responses (see Section 4.2) + + * an implementation receives a message containing the edns-tcp- + keepalive EDNS(0) Option [RFC7828] (see Section 5.5.2) + + * a client or a server attempts to open a unidirectional QUIC stream + + * a server attempts to open a server-initiated bidirectional QUIC + stream + + * a server receives a "replayable" transaction in 0-RTT data (for + servers not willing to handle this case, see Section 4.5) + + If a peer encounters such an error condition, it is considered a + fatal error. It SHOULD forcibly abort the connection using QUIC's + CONNECTION_CLOSE mechanism and SHOULD use the DoQ error code + DOQ_PROTOCOL_ERROR. In some cases, it MAY instead silently abandon + the connection, which uses fewer of the local resources but makes + debugging at the offending node more difficult. + + It is noted that the restrictions on use of the above EDNS(0) option + has implications for proxying messages from TCP/DoT/DoH over DoQ. + +4.3.4. Alternative Error Codes + + This specification describes specific error codes in Sections 4.3.1, + 4.3.2, and 4.3.3. These error codes are meant to facilitate + investigation of failures and other incidents. New error codes may + be defined in future versions of DoQ or registered as specified in + Section 8.4. + + Because new error codes can be defined without negotiation, use of an + error code in an unexpected context or receipt of an unknown error + code MUST be treated as equivalent to DOQ_UNSPECIFIED_ERROR. + + Implementations MAY wish to test the support for the error code + extension mechanism by using error codes not listed in this document, + or they MAY use DOQ_ERROR_RESERVED. + +4.4. Connection Management + + Section 10 of [RFC9000], the QUIC transport specification, specifies + that connections can be closed in three ways: + + * idle timeout + + * immediate close + + * stateless reset + + Clients and servers implementing DoQ SHOULD negotiate use of the idle + timeout. Closing on idle timeout is done without any packet + exchange, which minimizes protocol overhead. Per Section 10.1 of + [RFC9000], the QUIC transport specification, the effective value of + the idle timeout is computed as the minimum of the values advertised + by the two endpoints. Practical considerations on setting the idle + timeout are discussed in Section 5.5.2. + + Clients SHOULD monitor the idle time incurred on their connection to + the server, defined by the time spent since the last packet from the + server has been received. When a client prepares to send a new DNS + query to the server, it SHOULD check whether the idle time is + sufficiently lower than the idle timer. If it is, the client SHOULD + send the DNS query over the existing connection. If not, the client + SHOULD establish a new connection and send the query over that + connection. + + Clients MAY discard their connections to the server before the idle + timeout expires. A client that has outstanding queries SHOULD close + the connection explicitly using QUIC's CONNECTION_CLOSE mechanism and + the DoQ error code DOQ_NO_ERROR. + + Clients and servers MAY close the connection for a variety of other + reasons, indicated using QUIC's CONNECTION_CLOSE. Client and servers + that send packets over a connection discarded by their peer might + receive a stateless reset indication. If a connection fails, all the + in-progress transactions on that connection MUST be abandoned. + +4.5. Session Resumption and 0-RTT + + A client MAY take advantage of the session resumption and 0-RTT + mechanisms supported by QUIC transport [RFC9000] and QUIC TLS + [RFC9001] if the server supports them. Clients SHOULD consider + potential privacy issues associated with session resumption before + deciding to use this mechanism and specifically evaluate the trade- + offs presented in the various sections of this document. The privacy + issues are detailed in Sections 7.1 and 7.2, and the implementation + considerations are discussed in Section 5.5.3. + + The 0-RTT mechanism MUST NOT be used to send DNS requests that are + not "replayable" transactions. In this specification, only + transactions that have an OPCODE of QUERY or NOTIFY are considered + replayable; therefore, other OPCODES MUST NOT be sent in 0-RTT data. + See Appendix A for a detailed discussion of why NOTIFY is included + here. + + Servers MAY support session resumption, and MAY do that with or + without supporting 0-RTT, using the mechanisms described in + Section 4.6.1 of [RFC9001]. Servers supporting 0-RTT MUST NOT + immediately process non-replayable transactions received in 0-RTT + data but instead MUST adopt one of the following behaviors: + + * Queue the offending transaction and only process it after the QUIC + handshake has been completed, as defined in Section 4.1.1 of + [RFC9001]. + + * Reply to the offending transaction with a response code REFUSED + and an Extended DNS Error Code (EDE) "Too Early" using the + extended RCODE mechanisms defined in [RFC6891] and the extended + DNS errors defined in [RFC8914]; see Section 8.3. + + * Close the connection with the error code DOQ_PROTOCOL_ERROR. + +4.6. Message Sizes + + DoQ queries and responses are sent on QUIC streams, which in theory + can carry up to 2^62 bytes. However, DNS messages are restricted in + practice to a maximum size of 65535 bytes. This maximum size is + enforced by the use of a 2-octet message length field in DNS over TCP + [RFC1035] and DoT [RFC7858], and by the definition of the + "application/dns-message" for DoH [RFC8484]. DoQ enforces the same + restriction. + + The Extension Mechanisms for DNS (EDNS(0)) [RFC6891] allow peers to + specify the UDP message size. This parameter is ignored by DoQ. DoQ + implementations always assume that the maximum message size is 65535 + bytes. + +5. Implementation Requirements + +5.1. Authentication + + For the stub to recursive scenario, the authentication requirements + are the same as described in DoT [RFC7858] and "Usage Profiles for + DNS over TLS and DNS over DTLS" [RFC8310]. [RFC8932] states that DNS + privacy services SHOULD provide credentials that clients can use to + authenticate the server. Given this, and to align with the + authentication model for DoH, DoQ stubs SHOULD use a Strict usage + profile. Client authentication for the encrypted stub to recursive + scenario is not described in any DNS RFC. + + For zone transfer, the authentication requirements are the same as + described in [RFC9103]. + + For the recursive to authoritative scenario, authentication + requirements are unspecified at the time of writing and are the + subject of ongoing work in the DPRIVE WG. + +5.2. Fallback to Other Protocols on Connection Failure + + If the establishment of the DoQ connection fails, clients MAY attempt + to fall back to DoT and then potentially cleartext, as specified in + DoT [RFC7858] and "Usage Profiles for DNS over TLS and DNS over DTLS" + [RFC8310], depending on their usage profile. + + DNS clients SHOULD remember server IP addresses that don't support + DoQ. Mobile clients might also remember the lack of DoQ support by + given IP addresses on a per-context basis (e.g., per network or + provisioning domain). + + Timeouts, connection refusals, and QUIC handshake failures are + indicators that a server does not support DoQ. Clients SHOULD NOT + attempt DoQ queries to a server that does not support DoQ for a + reasonable period (such as one hour per server). DNS clients + following an out-of-band key-pinned usage profile [RFC7858] MAY be + more aggressive about retrying after DoQ connection failures. + +5.3. Address Validation + + Section 8 of [RFC9000], the QUIC transport specification, defines + Address Validation procedures to avoid servers being used in address + amplification attacks. DoQ implementations MUST conform to this + specification, which limits the worst-case amplification to a factor + 3. + + DoQ implementations SHOULD consider configuring servers to use the + Address Validation using Retry Packets procedure defined in + Section 8.1.2 of [RFC9000], the QUIC transport specification. This + procedure imposes a 1-RTT delay for verifying the return routability + of the source address of a client, similar to the DNS Cookies + mechanism [RFC7873]. + + DoQ implementations that configure Address Validation using Retry + Packets SHOULD implement the Address Validation for Future + Connections procedure defined in Section 8.1.3 of [RFC9000], the QUIC + transport specification. This defines how servers can send NEW_TOKEN + frames to clients after the client address is validated in order to + avoid the 1-RTT penalty during subsequent connections by the client + from the same address. + +5.4. Padding + + Implementations MUST protect against the traffic analysis attacks + described in Section 7.5 by the judicious injection of padding. This + could be done either by padding individual DNS messages using the + EDNS(0) Padding Option [RFC7830] or by padding QUIC packets (see + Section 19.1 of [RFC9000]). + + In theory, padding at the QUIC packet level could result in better + performance for the equivalent protection, because the amount of + padding can take into account non-DNS frames such as acknowledgements + or flow control updates, and also because QUIC packets can carry + multiple DNS messages. However, applications can only control the + amount of padding in QUIC packets if the implementation of QUIC + exposes adequate APIs. This leads to the following recommendations: + + * If the implementation of QUIC exposes APIs to set a padding + policy, DoQ SHOULD use that API to align the packet length to a + small set of fixed sizes. + + * If padding at the QUIC packet level is not available or not used, + DoQ MUST ensure that all DNS queries and responses are padded to a + small set of fixed sizes, using the EDNS(0) padding extension as + specified in [RFC7830]. + + Implementations might choose not to use a QUIC API for padding if it + is significantly simpler to reuse existing DNS message padding logic + that is applied to other encrypted transports. + + In the absence of a standard policy for padding sizes, + implementations SHOULD follow the recommendations of the Experimental + status "Padding Policies for Extension Mechanisms for DNS (EDNS(0))" + [RFC8467]. While Experimental, these recommendations are referenced + because they are implemented and deployed for DoT and provide a way + for implementations to be fully compliant with this specification. + +5.5. Connection Handling + + "DNS Transport over TCP - Implementation Requirements" [RFC7766] + provides updated guidance on DNS over TCP, some of which is + applicable to DoQ. This section provides similar advice on + connection handling for DoQ. + +5.5.1. Connection Reuse + + Historic implementations of DNS clients are known to open and close + TCP connections for each DNS query. To amortize connection setup + costs, both clients and servers SHOULD support connection reuse by + sending multiple queries and responses over a single persistent QUIC + connection. + + In order to achieve performance on par with UDP, DNS clients SHOULD + send their queries concurrently over the QUIC streams on a QUIC + connection. That is, when a DNS client sends multiple queries to a + server over a QUIC connection, it SHOULD NOT wait for an outstanding + reply before sending the next query. + +5.5.2. Resource Management + + Proper management of established and idle connections is important to + the healthy operation of a DNS server. + + An implementation of DoQ SHOULD follow best practices similar to + those specified for DNS over TCP [RFC7766], in particular with regard + to: + + * Concurrent Connections (Section 6.2.2 of [RFC7766], updated by + Section 6.4 of [RFC9103]) + + * Security Considerations (Section 10 of [RFC7766]) + + Failure to do so may lead to resource exhaustion and denial of + service. + + Clients that want to maintain long duration DoQ connections SHOULD + use the idle timeout mechanisms defined in Section 10.1 of [RFC9000], + the QUIC transport specification. Clients and servers MUST NOT send + the edns-tcp-keepalive EDNS(0) Option [RFC7828] in any messages sent + on a DoQ connection (because it is specific to the use of TCP/TLS as + a transport). + + This document does not make specific recommendations for timeout + values on idle connections. Clients and servers should reuse and/or + close connections depending on the level of available resources. + Timeouts may be longer during periods of low activity and shorter + during periods of high activity. + +5.5.3. Using 0-RTT and Session Resumption + + Using 0-RTT for DoQ has many compelling advantages. Clients can + establish connections and send queries without incurring a connection + delay. Servers can thus negotiate low values of the connection + timers, which reduces the total number of connections that they need + to manage. They can do that because the clients that use 0-RTT will + not incur latency penalties if new connections are required for a + query. + + Session resumption and 0-RTT data transmission create privacy risks + detailed in Sections 7.1 and 7.2. The following recommendations are + meant to reduce the privacy risks while enjoying the performance + benefits of 0-RTT data, subject to the restrictions specified in + Section 4.5. + + Clients SHOULD use resumption tickets only once, as specified in + Appendix C.4 of [RFC8446]. By default, clients SHOULD NOT use + session resumption if the client's connectivity has changed. + + Clients could receive address validation tokens from the server using + the NEW_TOKEN mechanism; see Section 8 of [RFC9000]. The associated + tracking risks are mentioned in Section 7.3. Clients SHOULD only use + the address validation tokens when they are also using session + resumption thus avoiding additional tracking risks. + + Servers SHOULD issue session resumption tickets with a sufficiently + long lifetime (e.g., 6 hours), so that clients are not tempted to + either keep the connection alive or frequently poll the server to + renew session resumption tickets. Servers SHOULD implement the anti- + replay mechanisms specified in Section 8 of [RFC8446]. + +5.5.4. Controlling Connection Migration for Privacy + + DoQ implementations might consider using the connection migration + features defined in Section 9 of [RFC9000]. These features enable + connections to continue operating as the client's connectivity + changes. As detailed in Section 7.4, these features trade off + privacy for latency. By default, clients SHOULD be configured to + prioritize privacy and start new sessions if their connectivity + changes. + +5.6. Processing Queries in Parallel + + As specified in Section 7 of [RFC7766] "DNS Transport over TCP - + Implementation Requirements", resolvers are RECOMMENDED to support + the preparing of responses in parallel and sending them out of order. + In DoQ, they do that by sending responses on their specific stream as + soon as possible, without waiting for availability of responses for + previously opened streams. + +5.7. Zone Transfer + + [RFC9103] specifies zone transfer over TLS (XoT) and includes updates + to [RFC1995] (IXFR), [RFC5936] (AXFR), and [RFC7766]. Considerations + relating to the reuse of XoT connections described there apply + analogously to zone transfers performed using DoQ connections. One + reason for reiterating such specific guidance is the lack of + effective connection reuse in existing TCP/TLS zone transfer + implementations today. The following recommendations apply: + + * DoQ servers MUST be able to handle multiple concurrent IXFR + requests on a single QUIC connection. + + * DoQ servers MUST be able to handle multiple concurrent AXFR + requests on a single QUIC connection. + + * DoQ implementations SHOULD + + - use the same QUIC connection for both AXFR and IXFR requests to + the same primary + + - send those requests in parallel as soon as they are queued, + i.e., do not wait for a response before sending the next query + on the connection (this is analogous to pipelining requests on + a TCP/TLS connection) + + - send the response(s) for each request as soon as they are + available, i.e., response streams MAY be sent intermingled + +5.8. Flow Control Mechanisms + + Servers and clients manage flow control using the mechanisms defined + in Section 4 of [RFC9000]. These mechanisms allow clients and + servers to specify how many streams can be created, how much data can + be sent on a stream, and how much data can be sent on the union of + all streams. For DoQ, controlling how many streams are created + allows servers to control how many new requests the client can send + on a given connection. + + Flow control exists to protect endpoint resources. For servers, + global and per-stream flow control limits control how much data can + be sent by clients. The same mechanisms allow clients to control how + much data can be sent by servers. Values that are too small will + unnecessarily limit performance. Values that are too large might + expose endpoints to overload or memory exhaustion. Implementations + or deployments will need to adjust flow control limits to balance + these concerns. In particular, zone transfer implementations will + need to control these limits carefully to ensure both large and + concurrent zone transfers are well managed. + + Initial values of parameters control how many requests and how much + data can be sent by clients and servers at the beginning of the + connection. These values are specified in transport parameters + exchanged during the connection handshake. The parameter values + received in the initial connection also control how many requests and + how much data can be sent by clients using 0-RTT data in a resumed + connection. Using too small values of these initial parameters would + restrict the usefulness of allowing 0-RTT data. + +6. Security Considerations + + A Threat Analysis of the Domain Name System is found in [RFC3833]. + This analysis was written before the development of DoT, DoH, and + DoQ, and probably needs to be updated. + + The security considerations of DoQ should be comparable to those of + DoT [RFC7858]. DoT as specified in [RFC7858] only addresses the stub + to recursive scenario, but the considerations about person-in-the- + middle attacks, middleboxes, and caching of data from cleartext + connections also apply for DoQ to the resolver to authoritative + server scenario. As stated in Section 5.1, the authentication + requirements for securing zone transfer using DoQ are the same as + those for zone transfer over DoT; therefore, the general security + considerations are entirely analogous to those described in + [RFC9103]. + + DoQ relies on QUIC, which itself relies on TLS 1.3 and thus supports + by default the protections against downgrade attacks described in + [BCP195]. QUIC-specific issues and their mitigations are described + in Section 21 of [RFC9000]. + +7. Privacy Considerations + + The general considerations of encrypted transports provided in "DNS + Privacy Considerations" [RFC9076] apply to DoQ. The specific + considerations provided there do not differ between DoT and DoQ, and + they are not discussed further here. Similarly, "Recommendations for + DNS Privacy Service Operators" [RFC8932] (which covers operational, + policy, and security considerations for DNS privacy services) is also + applicable to DoQ services. + + QUIC incorporates the mechanisms of TLS 1.3 [RFC8446], and this + enables QUIC transmission of "0-RTT" data. This can provide + interesting latency gains, but it raises two concerns: + + 1. Adversaries could replay the 0-RTT data and infer its content + from the behavior of the receiving server. + + 2. The 0-RTT mechanism relies on TLS session resumption, which can + provide linkability between successive client sessions. + + These issues are developed in Sections 7.1 and 7.2. + +7.1. Privacy Issues with 0-RTT data + + The 0-RTT data can be replayed by adversaries. That data may trigger + queries by a recursive resolver to authoritative resolvers. + Adversaries may be able to pick a time at which the recursive + resolver outgoing traffic is observable and thus find out what name + was queried for in the 0-RTT data. + + This risk is in fact a subset of the general problem of observing the + behavior of the recursive resolver discussed in "DNS Privacy + Considerations" [RFC9076]. The attack is partially mitigated by + reducing the observability of this traffic. The mandatory replay + protection mechanisms in TLS 1.3 [RFC8446] limit but do not eliminate + the risk of replay. 0-RTT packets can only be replayed within a + narrow window, which is only wide enough to account for variations in + clock skew and network transmission. + + The recommendation for TLS 1.3 [RFC8446] is that the capability to + use 0-RTT data should be turned off by default and only enabled if + the user clearly understands the associated risks. In the case of + DoQ, allowing 0-RTT data provides significant performance gains, and + there is a concern that a recommendation to not use it would simply + be ignored. Instead, a set of practical recommendations is provided + in Sections 4.5 and 5.5.3. + + The specifications in Section 4.5 block the most obvious risks of + replay attacks, as they only allow for transactions that will not + change the long-term state of the server. + + The attacks described above apply to the stub resolver to recursive + resolver scenario, but similar attacks might be envisaged in the + recursive resolver to authoritative resolver scenario, and the same + mitigations apply. + +7.2. Privacy Issues with Session Resumption + + The QUIC session resumption mechanism reduces the cost of re- + establishing sessions and enables 0-RTT data. There is a linkability + issue associated with session resumption, if the same resumption + token is used several times. Attackers on path between client and + server could observe repeated usage of the token and use that to + track the client over time or over multiple locations. + + The session resumption mechanism allows servers to correlate the + resumed sessions with the initial sessions and thus to track the + client. This creates a virtual long duration session. The series of + queries in that session can be used by the server to identify the + client. Servers can most probably do that already if the client + address remains constant, but session resumption tickets also enable + tracking after changes of the client's address. + + The recommendations in Section 5.5.3 are designed to mitigate these + risks. Using session tickets only once mitigates the risk of + tracking by third parties. Refusing to resume a session if addresses + change mitigates the incremental risk of tracking by the server (but + the risk of tracking by IP address remains). + + The privacy trade-offs here may be context specific. Stub resolvers + will have a strong motivation to prefer privacy over latency since + they often change location. However, recursive resolvers that use a + small set of static IP addresses are more likely to prefer the + reduced latency provided by session resumption and may consider this + a valid reason to use resumption tickets even if the IP address + changed between sessions. + + Encrypted zone transfer ([RFC9103]) explicitly does not attempt to + hide the identity of the parties involved in the transfer; at the + same time, such transfers are not particularly latency sensitive. + This means that applications supporting zone transfers may decide to + apply the same protections as stub to recursive applications. + +7.3. Privacy Issues with Address Validation Tokens + + QUIC specifies address validation mechanisms in Section 8 of + [RFC9000]. Use of an address validation token allows QUIC servers to + avoid an extra RTT for new connections. Address validation tokens + are typically tied to an IP address. QUIC clients normally only use + these tokens when setting up a new connection from a previously used + address. However, clients are not always aware that they are using a + new address. This could be due to NAT, or because the client does + not have an API available to check if the IP address has changed + (which can be quite often for IPv6). There is a linkability risk if + clients mistakenly use address validation tokens after unknowingly + moving to a new location. + + The recommendations in Section 5.5.3 mitigates this risk by tying the + usage of the NEW_TOKEN to that of session resumption, though this + recommendation does not cover the case where the client is unaware of + the address change. + +7.4. Privacy Issues with Long Duration Sessions + + A potential alternative to session resumption is the use of long + duration sessions: if a session remains open for a long time, new + queries can be sent without incurring connection establishment + delays. It is worth pointing out that the two solutions have similar + privacy characteristics. Session resumption may allow servers to + keep track of the IP addresses of clients, but long duration sessions + have the same effect. + + In particular, a DoQ implementation might take advantage of the + connection migration features of QUIC to maintain a session even if + the client's connectivity changes, for example, if the client + migrates from a Wi-Fi connection to a cellular network connection and + then to another Wi-Fi connection. The server would be able to track + the client location by monitoring the succession of IP addresses used + by the long duration connection. + + The recommendation in Section 5.5.4 mitigates the privacy concerns + related to long duration sessions using multiple client addresses. + +7.5. Traffic Analysis + + Even though QUIC packets are encrypted, adversaries can gain + information from observing packet lengths, in both queries and + responses, as well as packet timing. Many DNS requests are emitted + by web browsers. Loading a specific web page may require resolving + dozens of DNS names. If an application adopts a simple mapping of + one query or response per packet, or "one QUIC STREAM frame per + packet", then the succession of packet lengths may provide enough + information to identify the requested site. + + Implementations SHOULD use the mechanisms defined in Section 5.4 to + mitigate this attack. + +8. IANA Considerations + +8.1. Registration of a DoQ Identification String + + This document creates a new registration for the identification of + DoQ in the "TLS Application-Layer Protocol Negotiation (ALPN) + Protocol IDs" registry [RFC7301]. + + The "doq" string identifies DoQ: + + Protocol: DoQ + + Identification Sequence: 0x64 0x6F 0x71 ("doq") + + Specification: This document + +8.2. Reservation of a Dedicated Port + + For both TCP and UDP, port 853 is currently reserved for "DNS query- + response protocol run over TLS/DTLS" [RFC7858]. + + However, the specification for DNS over DTLS (DoD) [RFC8094] is + experimental, limited to stub to resolver, and no implementations or + deployments currently exist to the authors' knowledge (even though + several years have passed since the specification was published). + + This specification additionally reserves the use of UDP port 853 for + DoQ. QUIC version 1 was designed to be able to coexist with other + protocols on the same port, including DTLS; see Section 17.2 of + [RFC9000]. This means that deployments that serve DoD and DoQ (QUIC + version 1) on the same port will be able to demultiplex the two due + to the second most significant bit in each UDP payload. Such + deployments ought to check the signatures of future versions or + extensions (e.g., [GREASING-QUIC]) of QUIC and DTLS before deploying + them to serve DNS on the same port. + + IANA has updated the following value in the "Service Name and + Transport Protocol Port Number Registry" in the System range. The + registry for that range requires IETF Review or IESG Approval + [RFC6335]. + + Service Name: domain-s + + Port Number: 853 + + Transport Protocol(s): UDP + + Assignee: IESG + + Contact: IETF Chair + + Description: DNS query-response protocol run over DTLS or QUIC + + Reference: [RFC7858][RFC8094] This document + + Additionally, IANA has updated the Description field for the + corresponding TCP port 853 allocation to be "DNS query-response + protocol run over TLS" and removed [RFC8094] from the TCP + allocation's Reference field for consistency and clarity. + +8.3. Reservation of an Extended DNS Error Code: Too Early + + IANA has registered the following value in the "Extended DNS Error + Codes" registry [RFC8914]: + + INFO-CODE: 26 + + Purpose: Too Early + + Reference: This document + +8.4. DNS-over-QUIC Error Codes Registry + + IANA has added a registry for "DNS-over-QUIC Error Codes" on the + "Domain Name System (DNS) Parameters" web page. + + The "DNS-over-QUIC Error Codes" registry governs a 62-bit space. + This space is split into three regions that are governed by different + policies: + + * Permanent registrations for values between 0x00 and 0x3f (in + hexadecimal; inclusive), which are assigned using Standards Action + or IESG Approval as defined in Sections 4.9 and 4.10 of [RFC8126] + + * Permanent registrations for values larger than 0x3f, which are + assigned using the Specification Required policy ([RFC8126]) + + * Provisional registrations for values larger than 0x3f, which + require Expert Review, as defined in Section 4.5 of [RFC8126]. + + Provisional reservations share the range of values larger than 0x3f + with some permanent registrations. This is by design to enable + conversion of provisional registrations into permanent registrations + without requiring changes in deployed systems. (This design is + aligned with the principles set in Section 22 of [RFC9000].) + + Registrations in this registry MUST include the following fields: + + Value: The assigned codepoint + + Status: "Permanent" or "Provisional" + + Contact: Contact details for the registrant + + In addition, permanent registrations MUST include: + + Error: A short mnemonic for the parameter + + Specification: A reference to a publicly available specification for + the value (optional for provisional registrations) + + Description: A brief description of the error code semantics, which + MAY be a summary if a specification reference is provided + + Provisional registrations of codepoints are intended to allow for + private use and experimentation with extensions to DoQ. However, + provisional registrations could be reclaimed and reassigned for other + purposes. In addition to the parameters listed above, provisional + registrations MUST include: + + Date: The date of last update to the registration + + A request to update the date on any provisional registration can be + made without review from the designated expert(s). + + The initial content of this registry is shown in Table 1 and all + entries share the following fields: + + Status: Permanent + + Contact: DPRIVE WG + + Specification: Section 4.3 + + +============+=======================+=============================+ + | Value | Error | Description | + +============+=======================+=============================+ + | 0x0 | DOQ_NO_ERROR | No error | + +------------+-----------------------+-----------------------------+ + | 0x1 | DOQ_INTERNAL_ERROR | Implementation error | + +------------+-----------------------+-----------------------------+ + | 0x2 | DOQ_PROTOCOL_ERROR | Generic protocol violation | + +------------+-----------------------+-----------------------------+ + | 0x3 | DOQ_REQUEST_CANCELLED | Request cancelled by client | + +------------+-----------------------+-----------------------------+ + | 0x4 | DOQ_EXCESSIVE_LOAD | Closing a connection for | + | | | excessive load | + +------------+-----------------------+-----------------------------+ + | 0x5 | DOQ_UNSPECIFIED_ERROR | No error reason specified | + +------------+-----------------------+-----------------------------+ + | 0xd098ea5e | DOQ_ERROR_RESERVED | Alternative error code used | + | | | for tests | + +------------+-----------------------+-----------------------------+ + + Table 1: Initial DNS-over-QUIC Error Codes Entries + +9. References + +9.1. Normative References + + [RFC1034] Mockapetris, P., "Domain names - concepts and facilities", + STD 13, RFC 1034, DOI 10.17487/RFC1034, November 1987, + <https://www.rfc-editor.org/info/rfc1034>. + + [RFC1035] Mockapetris, P., "Domain names - implementation and + specification", STD 13, RFC 1035, DOI 10.17487/RFC1035, + November 1987, <https://www.rfc-editor.org/info/rfc1035>. + + [RFC1995] Ohta, M., "Incremental Zone Transfer in DNS", RFC 1995, + DOI 10.17487/RFC1995, August 1996, + <https://www.rfc-editor.org/info/rfc1995>. + + [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate + Requirement Levels", BCP 14, RFC 2119, + DOI 10.17487/RFC2119, March 1997, + <https://www.rfc-editor.org/info/rfc2119>. + + [RFC5936] Lewis, E. and A. Hoenes, Ed., "DNS Zone Transfer Protocol + (AXFR)", RFC 5936, DOI 10.17487/RFC5936, June 2010, + <https://www.rfc-editor.org/info/rfc5936>. + + [RFC6891] Damas, J., Graff, M., and P. Vixie, "Extension Mechanisms + for DNS (EDNS(0))", STD 75, RFC 6891, + DOI 10.17487/RFC6891, April 2013, + <https://www.rfc-editor.org/info/rfc6891>. + + [RFC7301] Friedl, S., Popov, A., Langley, A., and E. Stephan, + "Transport Layer Security (TLS) Application-Layer Protocol + Negotiation Extension", RFC 7301, DOI 10.17487/RFC7301, + July 2014, <https://www.rfc-editor.org/info/rfc7301>. + + [RFC7766] Dickinson, J., Dickinson, S., Bellis, R., Mankin, A., and + D. Wessels, "DNS Transport over TCP - Implementation + Requirements", RFC 7766, DOI 10.17487/RFC7766, March 2016, + <https://www.rfc-editor.org/info/rfc7766>. + + [RFC7830] Mayrhofer, A., "The EDNS(0) Padding Option", RFC 7830, + DOI 10.17487/RFC7830, May 2016, + <https://www.rfc-editor.org/info/rfc7830>. + + [RFC7858] Hu, Z., Zhu, L., Heidemann, J., Mankin, A., Wessels, D., + and P. Hoffman, "Specification for DNS over Transport + Layer Security (TLS)", RFC 7858, DOI 10.17487/RFC7858, May + 2016, <https://www.rfc-editor.org/info/rfc7858>. + + [RFC8126] Cotton, M., Leiba, B., and T. Narten, "Guidelines for + Writing an IANA Considerations Section in RFCs", BCP 26, + RFC 8126, DOI 10.17487/RFC8126, June 2017, + <https://www.rfc-editor.org/info/rfc8126>. + + [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC + 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, + May 2017, <https://www.rfc-editor.org/info/rfc8174>. + + [RFC8310] Dickinson, S., Gillmor, D., and T. Reddy, "Usage Profiles + for DNS over TLS and DNS over DTLS", RFC 8310, + DOI 10.17487/RFC8310, March 2018, + <https://www.rfc-editor.org/info/rfc8310>. + + [RFC8446] Rescorla, E., "The Transport Layer Security (TLS) Protocol + Version 1.3", RFC 8446, DOI 10.17487/RFC8446, August 2018, + <https://www.rfc-editor.org/info/rfc8446>. + + [RFC8467] Mayrhofer, A., "Padding Policies for Extension Mechanisms + for DNS (EDNS(0))", RFC 8467, DOI 10.17487/RFC8467, + October 2018, <https://www.rfc-editor.org/info/rfc8467>. + + [RFC8914] Kumari, W., Hunt, E., Arends, R., Hardaker, W., and D. + Lawrence, "Extended DNS Errors", RFC 8914, + DOI 10.17487/RFC8914, October 2020, + <https://www.rfc-editor.org/info/rfc8914>. + + [RFC9000] Iyengar, J., Ed. and M. Thomson, Ed., "QUIC: A UDP-Based + Multiplexed and Secure Transport", RFC 9000, + DOI 10.17487/RFC9000, May 2021, + <https://www.rfc-editor.org/info/rfc9000>. + + [RFC9001] Thomson, M., Ed. and S. Turner, Ed., "Using TLS to Secure + QUIC", RFC 9001, DOI 10.17487/RFC9001, May 2021, + <https://www.rfc-editor.org/info/rfc9001>. + + [RFC9103] Toorop, W., Dickinson, S., Sahib, S., Aras, P., and A. + Mankin, "DNS Zone Transfer over TLS", RFC 9103, + DOI 10.17487/RFC9103, August 2021, + <https://www.rfc-editor.org/info/rfc9103>. + +9.2. Informative References + + [BCP195] Sheffer, Y., Holz, R., and P. Saint-Andre, + "Recommendations for Secure Use of Transport Layer + Security (TLS) and Datagram Transport Layer Security + (DTLS)", BCP 195, RFC 7525, May 2015. + + Moriarty, K. and S. Farrell, "Deprecating TLS 1.0 and TLS + 1.1", BCP 195, RFC 8996, March 2021. + + <https://www.rfc-editor.org/info/bcp195> + + [DNS-TERMS] + Hoffman, P. and K. Fujiwara, "DNS Terminology", Work in + Progress, Internet-Draft, draft-ietf-dnsop-rfc8499bis-03, + 28 September 2021, <https://datatracker.ietf.org/doc/html/ + draft-ietf-dnsop-rfc8499bis-03>. + + [DNS0RTT] Kahn Gillmor, D., "DNS + 0-RTT", Message to DNS-Privacy WG + mailing list, 6 April 2016, <https://www.ietf.org/mail- + archive/web/dns-privacy/current/msg01276.html>. + + [GREASING-QUIC] + Thomson, M., "Greasing the QUIC Bit", Work in Progress, + Internet-Draft, draft-ietf-quic-bit-grease-02, 10 November + 2021, <https://datatracker.ietf.org/doc/html/draft-ietf- + quic-bit-grease-02>. + + [HTTP/3] Bishop, M., Ed., "Hypertext Transfer Protocol Version 3 + (HTTP/3)", Work in Progress, Internet-Draft, draft-ietf- + quic-http-34, 2 February 2021, + <https://datatracker.ietf.org/doc/html/draft-ietf-quic- + http-34>. + + [RFC1996] Vixie, P., "A Mechanism for Prompt Notification of Zone + Changes (DNS NOTIFY)", RFC 1996, DOI 10.17487/RFC1996, + August 1996, <https://www.rfc-editor.org/info/rfc1996>. + + [RFC3833] Atkins, D. and R. Austein, "Threat Analysis of the Domain + Name System (DNS)", RFC 3833, DOI 10.17487/RFC3833, August + 2004, <https://www.rfc-editor.org/info/rfc3833>. + + [RFC6335] Cotton, M., Eggert, L., Touch, J., Westerlund, M., and S. + Cheshire, "Internet Assigned Numbers Authority (IANA) + Procedures for the Management of the Service Name and + Transport Protocol Port Number Registry", BCP 165, + RFC 6335, DOI 10.17487/RFC6335, August 2011, + <https://www.rfc-editor.org/info/rfc6335>. + + [RFC7828] Wouters, P., Abley, J., Dickinson, S., and R. Bellis, "The + edns-tcp-keepalive EDNS0 Option", RFC 7828, + DOI 10.17487/RFC7828, April 2016, + <https://www.rfc-editor.org/info/rfc7828>. + + [RFC7873] Eastlake 3rd, D. and M. Andrews, "Domain Name System (DNS) + Cookies", RFC 7873, DOI 10.17487/RFC7873, May 2016, + <https://www.rfc-editor.org/info/rfc7873>. + + [RFC8094] Reddy, T., Wing, D., and P. Patil, "DNS over Datagram + Transport Layer Security (DTLS)", RFC 8094, + DOI 10.17487/RFC8094, February 2017, + <https://www.rfc-editor.org/info/rfc8094>. + + [RFC8484] Hoffman, P. and P. McManus, "DNS Queries over HTTPS + (DoH)", RFC 8484, DOI 10.17487/RFC8484, October 2018, + <https://www.rfc-editor.org/info/rfc8484>. + + [RFC8490] Bellis, R., Cheshire, S., Dickinson, J., Dickinson, S., + Lemon, T., and T. Pusateri, "DNS Stateful Operations", + RFC 8490, DOI 10.17487/RFC8490, March 2019, + <https://www.rfc-editor.org/info/rfc8490>. + + [RFC8932] Dickinson, S., Overeinder, B., van Rijswijk-Deij, R., and + A. Mankin, "Recommendations for DNS Privacy Service + Operators", BCP 232, RFC 8932, DOI 10.17487/RFC8932, + October 2020, <https://www.rfc-editor.org/info/rfc8932>. + + [RFC9002] Iyengar, J., Ed. and I. Swett, Ed., "QUIC Loss Detection + and Congestion Control", RFC 9002, DOI 10.17487/RFC9002, + May 2021, <https://www.rfc-editor.org/info/rfc9002>. + + [RFC9076] Wicinski, T., Ed., "DNS Privacy Considerations", RFC 9076, + DOI 10.17487/RFC9076, July 2021, + <https://www.rfc-editor.org/info/rfc9076>. + +Appendix A. The NOTIFY Service + + This appendix discusses why it is considered acceptable to send + NOTIFY (see [RFC1996]) in 0-RTT data. + + Section 4.5 says "The 0-RTT mechanism MUST NOT be used to send DNS + requests that are not "replayable" transactions". This specification + supports sending a NOTIFY in 0-RTT data because although a NOTIFY + technically changes the state of the receiving server, the effect of + replaying NOTIFYs has negligible impact in practice. + + NOTIFY messages prompt a secondary to either send an SOA query or an + XFR request to the primary on the basis that a newer version of the + zone is available. It has long been recognized that NOTIFYs can be + forged and, in theory, used to cause a secondary to send repeated + unnecessary requests to the primary. For this reason, most + implementations have some form of throttling of the SOA/XFR queries + triggered by the receipt of one or more NOTIFYs. + + [RFC9103] describes the privacy risks associated with both NOTIFY and + SOA queries and does not include addressing those risks within the + scope of encrypting zone transfers. Given this, the privacy benefit + of using DoQ for NOTIFY is not clear, but for the same reason, + sending NOTIFY as 0-RTT data has no privacy risk above that of + sending it using cleartext DNS. + +Acknowledgements + + This document liberally borrows text from the HTTP/3 specification + [HTTP/3] edited by Mike Bishop and from the DoT specification + [RFC7858] authored by Zi Hu, Liang Zhu, John Heidemann, Allison + Mankin, Duane Wessels, and Paul Hoffman. + + The privacy issue with 0-RTT data and session resumption was analyzed + by Daniel Kahn Gillmor (DKG) in a message to the IETF DPRIVE Working + Group [DNS0RTT]. + + Thanks to Tony Finch for an extensive review of the initial draft + version of this document, and to Robert Evans for the discussion of + 0-RTT privacy issues. Early reviews by Paul Hoffman and Martin + Thomson and interoperability tests conducted by Stephane Bortzmeyer + helped improve the definition of the protocol. + + Thanks also to Martin Thomson and Martin Duke for their later reviews + focusing on the low-level QUIC details, which helped clarify several + aspects of DoQ. Thanks to Andrey Meshkov, Loganaden Velvindron, + Lucas Pardue, Matt Joras, Mirja Kuelewind, Brian Trammell, and + Phillip Hallam-Baker for their reviews and contributions. + +Authors' Addresses + + Christian Huitema + Private Octopus Inc. + 427 Golfcourse Rd + Friday Harbor, WA 98250 + United States of America + Email: huitema@huitema.net + + + Sara Dickinson + Sinodun IT + Oxford Science Park + Oxford + OX4 4GA + United Kingdom + Email: sara@sinodun.com + + + Allison Mankin + Salesforce + Email: allison.mankin@gmail.com |