summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc9567.txt
diff options
context:
space:
mode:
Diffstat (limited to 'doc/rfc/rfc9567.txt')
-rw-r--r--doc/rfc/rfc9567.txt549
1 files changed, 549 insertions, 0 deletions
diff --git a/doc/rfc/rfc9567.txt b/doc/rfc/rfc9567.txt
new file mode 100644
index 0000000..85dd252
--- /dev/null
+++ b/doc/rfc/rfc9567.txt
@@ -0,0 +1,549 @@
+
+
+
+
+Internet Engineering Task Force (IETF) R. Arends
+Request for Comments: 9567 M. Larson
+Category: Standards Track ICANN
+ISSN: 2070-1721 April 2024
+
+
+ DNS Error Reporting
+
+Abstract
+
+ DNS error reporting is a lightweight reporting mechanism that
+ provides the operator of an authoritative server with reports on DNS
+ resource records that fail to resolve or validate. A domain owner or
+ DNS hosting organization can use these reports to improve domain
+ hosting. The reports are based on extended DNS errors as described
+ in RFC 8914.
+
+ When a domain name fails to resolve or validate due to a
+ misconfiguration or an attack, the operator of the authoritative
+ server may be unaware of this. To mitigate this lack of feedback,
+ this document describes a method for a validating resolver to
+ automatically signal an error to a monitoring agent specified by the
+ authoritative server. The error is encoded in the QNAME; thus, the
+ very act of sending the query is to report the error.
+
+Status of This Memo
+
+ This is an Internet Standards Track document.
+
+ This document is a product of the Internet Engineering Task Force
+ (IETF). It represents the consensus of the IETF community. It has
+ received public review and has been approved for publication by the
+ Internet Engineering Steering Group (IESG). Further information on
+ Internet Standards is available in Section 2 of RFC 7841.
+
+ Information about the current status of this document, any errata,
+ and how to provide feedback on it may be obtained at
+ https://www.rfc-editor.org/info/rfc9567.
+
+Copyright Notice
+
+ Copyright (c) 2024 IETF Trust and the persons identified as the
+ document authors. All rights reserved.
+
+ This document is subject to BCP 78 and the IETF Trust's Legal
+ Provisions Relating to IETF Documents
+ (https://trustee.ietf.org/license-info) in effect on the date of
+ publication of this document. Please review these documents
+ carefully, as they describe your rights and restrictions with respect
+ to this document. Code Components extracted from this document must
+ include Revised BSD License text as described in Section 4.e of the
+ Trust Legal Provisions and are provided without warranty as described
+ in the Revised BSD License.
+
+Table of Contents
+
+ 1. Introduction
+ 2. Requirements Notation
+ 3. Terminology
+ 4. Overview
+ 4.1. Example
+ 5. EDNS0 Option Specification
+ 6. DNS Error Reporting Specification
+ 6.1. Reporting Resolver Specification
+ 6.1.1. Constructing the Report Query
+ 6.2. Authoritative Server Specification
+ 6.3. Monitoring Agent Specification
+ 7. IANA Considerations
+ 8. Operational Considerations
+ 8.1. Choosing an Agent Domain
+ 8.2. Managing Caching Optimizations
+ 9. Security Considerations
+ 10. References
+ 10.1. Normative References
+ 10.2. Informative References
+ Acknowledgements
+ Authors' Addresses
+
+1. Introduction
+
+ When an authoritative server serves a stale DNSSEC-signed zone, the
+ cryptographic signatures over the resource record sets (RRsets) may
+ have lapsed. A validating resolver will fail to validate these
+ resource records.
+
+ Similarly, when there is a mismatch between the Delegation Signer
+ (DS) records at a parent zone and the key signing key at the child
+ zone, a validating resolver will fail to authenticate records in the
+ child zone.
+
+ These are two of several failure scenarios that may go unnoticed for
+ some time by the operator of a zone.
+
+ Today, there is no direct relationship between operators of
+ validating resolvers and authoritative servers. Outages are often
+ noticed indirectly by end users and reported via email or social
+ media (if reported at all).
+
+ When records fail to validate, there is no facility to report this
+ failure in an automated way. If there is any indication that an
+ error or warning has happened, it may be buried in log files of the
+ resolver or not logged at all.
+
+ This document describes a method that can be used by validating
+ resolvers to report DNSSEC validation errors in an automated way.
+
+ It allows an authoritative server to announce a monitoring agent to
+ which validating resolvers can report issues if those resolvers are
+ configured to do so.
+
+ The burden to report a failure falls on the validating resolver. It
+ is important that the effort needed to report failure is low, with
+ minimal impact to its main functions. To accomplish this goal, the
+ DNS itself is utilized to report the error.
+
+2. Requirements Notation
+
+ The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
+ "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
+ "OPTIONAL" in this document are to be interpreted as described in
+ BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all
+ capitals, as shown here.
+
+3. Terminology
+
+ This document uses DNS terminology defined in BCP 219 [RFC9499].
+ This document also defines and uses the following terms:
+
+ Reporting resolver: A validating resolver that supports DNS error
+ reporting.
+
+ Report query: The DNS query used to report an error. A report query
+ is for a DNS TXT resource record type. The content of the error
+ report is encoded in the QNAME of a DNS request to the monitoring
+ agent.
+
+ Monitoring agent: An authoritative server that receives and responds
+ to report queries. This facility is indicated by a domain name,
+ referred to as the "agent domain".
+
+ Agent domain: A domain name that is returned in the EDNS0 Report-
+ Channel option and indicates where DNS resolvers can send error
+ reports.
+
+4. Overview
+
+ An authoritative server indicates support for DNS error reporting by
+ including an EDNS0 Report-Channel option with OPTION-CODE 18 and the
+ agent domain in the response. The agent domain is a fully qualified,
+ uncompressed domain name in DNS wire format. The authoritative
+ server MUST NOT include this option in the response if the configured
+ agent domain is empty or is the null label (which would indicate the
+ DNS root).
+
+ The authoritative server includes the EDNS0 Report-Channel option
+ unsolicited. That is, the option is included in a response despite
+ the EDNS0 Report-Channel option being absent in the request.
+
+ If the authoritative server has indicated support for DNS error
+ reporting and there is an issue that can be reported via extended DNS
+ errors, the reporting resolver encodes the error report in the QNAME
+ of the report query. The reporting resolver builds this QNAME by
+ concatenating the "_er" label, the QTYPE, the QNAME that resulted in
+ failure, the extended DNS error code (as described in [RFC8914]), the
+ label "_er" again, and the agent domain. See the example in
+ Section 4.1 and the specification in Section 6.1.1. Note that a
+ regular RCODE is not included because the RCODE is not relevant to
+ the extended DNS error code.
+
+ The resulting report query is sent as a standard DNS query for a TXT
+ DNS resource record type by the reporting resolver.
+
+ The report query will ultimately arrive at the monitoring agent. A
+ response is returned by the monitoring agent, which in turn can be
+ cached by the reporting resolver. This caching is essential. It
+ dampens the number of report queries sent by a reporting resolver for
+ the same problem (that is, with caching, one report query per TTL is
+ sent). However, certain optimizations, such as those described in
+ [RFC8020] and [RFC8198], may reduce the number of error report
+ queries as well.
+
+ This document gives no guidance on the content of the RDATA in the
+ TXT resource record.
+
+4.1. Example
+
+ A query for "broken.test.", type A, is sent by a reporting resolver.
+
+ The domain "test." is hosted on a set of authoritative servers. One
+ of these authoritative servers serves a stale version of the "test."
+ zone. This authoritative server has an agent domain configured as
+ "a01.agent-domain.example.".
+
+ The authoritative server with the stale "test." zone receives the
+ request for "broken.test.". It returns a response that includes the
+ EDNS0 Report-Channel option with the domain name "a01.agent-
+ domain.example.".
+
+ The reporting resolver is unable to validate the "broken.test."
+ RRset for type A (an RR type with value 1), due to an RRSIG record
+ with an expired signature.
+
+ The reporting resolver constructs the QNAME
+ "_er.1.broken.test.7._er.a01.agent-domain.example." and resolves it.
+ This QNAME indicates extended DNS error 7 occurred while trying to
+ validate "broken.test." for a type A (an RR type with value 1)
+ record.
+
+ When this query is received at the monitoring agent (the operators of
+ the authoritative server for "a01.agent-domain.example."), the agent
+ can determine the "test." zone contained an expired signature record
+ (extended DNS error 7) for type A for the domain name "broken.test.".
+ The monitoring agent can contact the operators of "test." to fix the
+ issue.
+
+5. EDNS0 Option Specification
+
+ This method uses an EDNS0 [RFC6891] option to indicate the agent
+ domain in DNS responses. The option is structured as follows:
+
+ 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 3 3
+ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | OPTION-CODE = 18 | OPTION-LENGTH |
+ +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
+ / AGENT DOMAIN /
+ +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
+
+ Field definition details:
+
+ OPTION-CODE: 2 octets; an EDNS0 code that is used in an EDNS0 option
+ to indicate support for error reporting. The name for this EDNS0
+ option code is Report-Channel.
+
+ OPTION-LENGTH: 2 octets; contains the length of the AGENT DOMAIN
+ field in octets.
+
+ AGENT DOMAIN: A fully qualified domain name [RFC9499] in
+ uncompressed DNS wire format.
+
+6. DNS Error Reporting Specification
+
+ The various errors that a reporting resolver may encounter are listed
+ in [RFC8914]. Note that not all listed errors may be supported by
+ the reporting resolver. This document does not specify what is or is
+ not an error.
+
+ The DNS class is not specified in the error report.
+
+6.1. Reporting Resolver Specification
+
+ Care should be taken when additional DNS resolution is needed to
+ resolve the QNAME that contains the error report. This resolution
+ itself could trigger another error report to be created. A maximum
+ expense or depth limit MUST be used to prevent cascading errors.
+
+ The EDNS0 Report-Channel option MUST NOT be included in queries.
+
+ The reporting resolver MUST NOT use DNS error reporting if the
+ authoritative server returned an empty AGENT DOMAIN field in the
+ EDNS0 Report-Channel option.
+
+ For the monitoring agent to gain more confidence that the report is
+ not spoofed, the reporting resolver SHOULD send error reports over
+ TCP [RFC7766] or other connection-oriented protocols or SHOULD use
+ DNS Cookies [RFC7873]. This makes it harder to falsify the source
+ address.
+
+ A reporting resolver MUST validate responses received from the
+ monitoring agent. There is no special treatment for responses to
+ error-reporting queries. Section 9 ("Security Considerations")
+ contains the rationale behind this.
+
+6.1.1. Constructing the Report Query
+
+ The QNAME for the report query is constructed by concatenating the
+ following elements:
+
+ * A label containing the string "_er".
+
+ * The QTYPE that was used in the query that resulted in the extended
+ DNS error, presented as a decimal value, in a single DNS label.
+ If additional QTYPEs were present in the query, such as described
+ in [MULTI-QTYPES], they are represented as unique, ordered decimal
+ values separated by a hyphen. As an example, if both QTYPE A and
+ AAAA were present in the query, they are presented as the label
+ "1-28".
+
+ * The list of non-null labels representing the query name that is
+ the subject of the DNS error report.
+
+ * The extended DNS error code, presented as a decimal value, in a
+ single DNS label.
+
+ * A label containing the string "_er".
+
+ * The agent domain. The agent domain as received in the EDNS0
+ Report-Channel option set by the authoritative server.
+
+ If the QNAME of the report query exceeds 255 octets, it MUST NOT be
+ sent.
+
+ The "_er" labels allow the monitoring agent to differentiate between
+ the agent domain and the faulty query name. When the specified agent
+ domain is empty, or is a null label (despite being not allowed in
+ this specification), the report query will have "_er" as a top-level
+ domain, and not the top-level domain from the query name that was the
+ subject of this error report. The purpose of the first "_er" label
+ is to indicate that a complete report query has been received instead
+ of a shorter report query due to query minimization.
+
+6.2. Authoritative Server Specification
+
+ The authoritative server MUST NOT include more than one EDNS0 Report-
+ Channel option in a response.
+
+ The authoritative server includes the EDNS0 Report-Channel option
+ unsolicited in responses. There is no requirement that the EDNS0
+ Report-Channel option be present in queries.
+
+6.3. Monitoring Agent Specification
+
+ It is RECOMMENDED that the authoritative server for the agent domain
+ reply with a positive response (i.e., not with NODATA or NXDOMAIN)
+ containing a TXT record.
+
+ The monitoring agent SHOULD respond to queries received over UDP that
+ have no DNS Cookie set with a response that has the truncation bit
+ (TC bit) set to challenge the resolver to requery over TCP.
+
+7. IANA Considerations
+
+ IANA has assigned the following in the "DNS EDNS0 Option Codes (OPT)"
+ registry:
+
+ +=======+================+==========+===========+
+ | Value | Name | Status | Reference |
+ +=======+================+==========+===========+
+ | 18 | Report-Channel | Standard | RFC 9567 |
+ +-------+----------------+----------+-----------+
+
+ Table 1
+
+ IANA has assigned the following in the "Underscored and Globally
+ Scoped DNS Node Names" registry:
+
+ +=========+============+===========+
+ | RR Type | _NODE NAME | Reference |
+ +=========+============+===========+
+ | TXT | _er | RFC 9567 |
+ +---------+------------+-----------+
+
+ Table 2
+
+8. Operational Considerations
+
+8.1. Choosing an Agent Domain
+
+ It is RECOMMENDED that the agent domain be kept relatively short to
+ allow for a longer QNAME in the report query. The agent domain MUST
+ NOT be a subdomain of the domain it is reporting on. That is, if the
+ authoritative server hosts the foo.example domain, then its agent
+ domain MUST NOT end in foo.example.
+
+8.2. Managing Caching Optimizations
+
+ The reporting resolver may utilize various caching optimizations that
+ inhibit subsequent error reporting to the same monitoring agent.
+
+ If the monitoring agent were to respond with NXDOMAIN (name error),
+ [RFC8020] states that any name at or below that domain should be
+ considered unreachable, and negative caching would prohibit
+ subsequent queries for anything at or below that domain for a period
+ of time, depending on the negative TTL [RFC2308].
+
+ Since the monitoring agent may not know the contents of all the zones
+ for which it acts as a monitoring agent, the monitoring agent MUST
+ NOT respond with NXDOMAIN for domains it is monitoring because that
+ could inhibit subsequent queries. One method to avoid NXDOMAIN is to
+ use a wildcard domain name [RFC4592] in the zone for the agent
+ domain.
+
+ When the agent domain is signed, a resolver may use aggressive
+ negative caching (described in [RFC8198]). This optimization makes
+ use of NSEC and NSEC3 (without opt-out) records and allows the
+ resolver to do the wildcard synthesis. When this happens, the
+ resolver does not send subsequent queries because it will be able to
+ synthesize a response from previously cached material.
+
+ A solution is to avoid DNSSEC for the agent domain. Signing the
+ agent domain will incur an additional burden on the reporting
+ resolver, as it has to validate the response. However, this response
+ has no utility to the reporting resolver other than dampening the
+ query load for error reports.
+
+9. Security Considerations
+
+ Use of DNS error reporting may expose local configuration mistakes in
+ the reporting resolver, such as stale DNSSEC trust anchors, to the
+ monitoring agent.
+
+ DNS error reporting SHOULD be done using DNS query name minimization
+ [RFC9156] to improve privacy.
+
+ DNS error reporting is done without any authentication between the
+ reporting resolver and the authoritative server of the agent domain.
+
+ Resolvers that send error reports SHOULD send them over TCP [RFC7766]
+ or SHOULD use DNS Cookies [RFC7873]. This makes it hard to falsify
+ the source address. The monitoring agent SHOULD respond to queries
+ received over UDP that have no DNS Cookie set with a response that
+ has the truncation bit (TC bit) set to challenge the resolver to
+ requery over TCP.
+
+ Well-known addresses of reporting resolvers can provide a higher
+ level of confidence in the error reports and potentially enable more
+ automated processing of these reports.
+
+ Monitoring agents that receive error reports over UDP should consider
+ that the source of the reports and the reports themselves may be
+ false.
+
+ The method described in this document will cause additional queries
+ by the reporting resolver to authoritative servers in order to
+ resolve the report query.
+
+ This method can be abused by intentionally deploying broken zones
+ with agent domains that are delegated to victims. This is
+ particularly effective when DNS requests that trigger error messages
+ are sent through open resolvers [RFC9499] or widely distributed
+ network monitoring systems that perform distributed queries from
+ around the globe.
+
+ An adversary may create massive error report flooding to camouflage
+ an attack.
+
+ Though this document gives no guidance on the content of the RDATA in
+ the TXT resource record, if the RDATA content is logged, the
+ monitoring agent MUST assume the content can be malicious and take
+ appropriate measures to avoid exploitation. One such method could be
+ to log in hexadecimal. This would avoid remote code execution
+ through logging string attacks, such as the vulnerability described
+ in [CVE-2021-44228].
+
+ The rationale behind mandating DNSSEC validation for responses from a
+ reporting agent, even if the agent domain is proposed to remain
+ unsigned, is to mitigate the risk of a downgrade attack orchestrated
+ by adversaries. In such an attack, a victim's legitimately signed
+ domain could be deceptively advertised as an agent domain by
+ malicious actors. Consequently, if the validating resolver treats it
+ as unsigned, it is exposed to potential cache poisoning attacks. By
+ enforcing DNSSEC validation, this vulnerability is preemptively
+ addressed.
+
+10. References
+
+10.1. Normative References
+
+ [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
+ Requirement Levels", BCP 14, RFC 2119,
+ DOI 10.17487/RFC2119, March 1997,
+ <https://www.rfc-editor.org/info/rfc2119>.
+
+ [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
+ 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
+ May 2017, <https://www.rfc-editor.org/info/rfc8174>.
+
+10.2. Informative References
+
+ [CVE-2021-44228]
+ CVE, "CVE-2021-44228", 26 November 2021,
+ <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-
+ 2021-44228>.
+
+ [MULTI-QTYPES]
+ Bellis, R., "DNS Multiple QTYPEs", Work in Progress,
+ Internet-Draft, draft-ietf-dnssd-multi-qtypes-00, 4
+ December 2023, <https://datatracker.ietf.org/doc/html/
+ draft-ietf-dnssd-multi-qtypes-00>.
+
+ [RFC2308] Andrews, M., "Negative Caching of DNS Queries (DNS
+ NCACHE)", RFC 2308, DOI 10.17487/RFC2308, March 1998,
+ <https://www.rfc-editor.org/info/rfc2308>.
+
+ [RFC4592] Lewis, E., "The Role of Wildcards in the Domain Name
+ System", RFC 4592, DOI 10.17487/RFC4592, July 2006,
+ <https://www.rfc-editor.org/info/rfc4592>.
+
+ [RFC6891] Damas, J., Graff, M., and P. Vixie, "Extension Mechanisms
+ for DNS (EDNS(0))", STD 75, RFC 6891,
+ DOI 10.17487/RFC6891, April 2013,
+ <https://www.rfc-editor.org/info/rfc6891>.
+
+ [RFC7766] Dickinson, J., Dickinson, S., Bellis, R., Mankin, A., and
+ D. Wessels, "DNS Transport over TCP - Implementation
+ Requirements", RFC 7766, DOI 10.17487/RFC7766, March 2016,
+ <https://www.rfc-editor.org/info/rfc7766>.
+
+ [RFC7873] Eastlake 3rd, D. and M. Andrews, "Domain Name System (DNS)
+ Cookies", RFC 7873, DOI 10.17487/RFC7873, May 2016,
+ <https://www.rfc-editor.org/info/rfc7873>.
+
+ [RFC8020] Bortzmeyer, S. and S. Huque, "NXDOMAIN: There Really Is
+ Nothing Underneath", RFC 8020, DOI 10.17487/RFC8020,
+ November 2016, <https://www.rfc-editor.org/info/rfc8020>.
+
+ [RFC8198] Fujiwara, K., Kato, A., and W. Kumari, "Aggressive Use of
+ DNSSEC-Validated Cache", RFC 8198, DOI 10.17487/RFC8198,
+ July 2017, <https://www.rfc-editor.org/info/rfc8198>.
+
+ [RFC8914] Kumari, W., Hunt, E., Arends, R., Hardaker, W., and D.
+ Lawrence, "Extended DNS Errors", RFC 8914,
+ DOI 10.17487/RFC8914, October 2020,
+ <https://www.rfc-editor.org/info/rfc8914>.
+
+ [RFC9156] Bortzmeyer, S., Dolmans, R., and P. Hoffman, "DNS Query
+ Name Minimisation to Improve Privacy", RFC 9156,
+ DOI 10.17487/RFC9156, November 2021,
+ <https://www.rfc-editor.org/info/rfc9156>.
+
+ [RFC9499] Hoffman, P. and K. Fujiwara, "DNS Terminology", BCP 219,
+ RFC 9499, DOI 10.17487/RFC9499, March 2024,
+ <https://www.rfc-editor.org/info/rfc9499>.
+
+Acknowledgements
+
+ This document is based on an idea by Roy Arends and David Conrad.
+ The authors would like to thank Peter van Dijk, Stephane Bortzmeyer,
+ Shane Kerr, Vladimir Cunat, Paul Hoffman, Philip Homburg, Mark
+ Andrews, Libor Peltan, Matthijs Mekking, Willem Toorop, Tom Carpay,
+ Dick Franks, Ben Schwartz, Yaron Sheffer, Viktor Dukhovni, Wes
+ Hardaker, James Gannon, Tim Wicinski, Warren Kumari, Gorry Fairhurst,
+ Benno Overeinder, Paul Wouters, and Petr Spacek for their
+ contributions.
+
+Authors' Addresses
+
+ Roy Arends
+ ICANN
+ Email: roy.arends@icann.org
+
+
+ Matt Larson
+ ICANN
+ Email: matt.larson@icann.org