Internet DRAFT - draft-zhang-add-requirement-discusses
draft-zhang-add-requirement-discusses
Internet Engineering Task Force M. Zhang
Internet-Draft December 25, 2020
Intended status: Informational
Expires: June 28, 2021
Discussion of Requirements for ADD
draft-zhang-add-requirement-discusses-00
Abstract
This document discusses various usage scenarios and corresponding
requirements for discovering and using encrypted DNS technology.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on June 28, 2021.
Copyright Notice
Copyright (c) 2020 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Zhang Expires June 28, 2021 [Page 1]
Internet-Draft Discussion of Requirements for ADD December 2020
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
2. Conventions Used in This Document . . . . . . . . . . . . . . 2
3. Discover and use of encrypted DNS services . . . . . . . . . 2
3.1. The client automatically obtains DNS resolution service . 3
3.2. The client has been configured with parameters . . . . . 3
3.3. Configuration examples . . . . . . . . . . . . . . . . . 3
4. Encrypted DNS resolution service list . . . . . . . . . . . . 4
4.1. Provide a public encrypted DNS resolution service address
list . . . . . . . . . . . . . . . . . . . . . . . . . . 4
4.2. Provide encrypted DNS resolution configuration for some
specific domain names . . . . . . . . . . . . . . . . . . 4
5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 4
6. Security Considerations . . . . . . . . . . . . . . . . . . . 4
7. Acknowledgment . . . . . . . . . . . . . . . . . . . . . . . 4
8. Informative References . . . . . . . . . . . . . . . . . . . 4
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 5
1. Introduction
Several DNS encryption technologies have been introduced, including
DNS-over-TLS and DNS-over-HTTPS and so on. The work of the Adaptive
DNS Discovery working group includes supporting client discovery of
encrypted DNS resolution services and communication mechanisms for
selection decisions.
Since the proposal of the draft plan should be guided by the existing
problems, the working group should first reach a consensus on the
problems to be solved and the principles applicable to each problem,
and then promote follow-up work on this basis.
This document discusses various usage scenarios and corresponding
requirements for discovering and using encrypted DNS technology.
2. Conventions Used in This Document
Encrypted DNS: DNS-over-HTTPS[RFC8484], DNS-over-TLS[RFC7858] or any
other encrypted DNS technology that the IETF may publish, for
example, DNS-over-QUIC [I-D.ietf-dprive-dnsoquic].
3. Discover and use of encrypted DNS services
The DNS client accesses the recursive server with discovery function,
and the discussion is divided into the following situations:
Zhang Expires June 28, 2021 [Page 2]
Internet-Draft Discussion of Requirements for ADD December 2020
3.1. The client automatically obtains DNS resolution service
1) Ordinary DNS resolution service
The client can automatically obtain the common DNS recursive
resolution server address through DHCP.
2) Encrypted DNS resolution service
The client can choose several types of encryption resolution services
currently provided (such as DOH/DOT, etc.), and accept the default
configuration of the recursive server.
The encrypted DNS recursive resolution server address can be
automatically set through DHCP/RA/PPP and other protocols.
3.2. The client has been configured with parameters
If the client has been configured with parameters, the following two
aspects are initially considered for configuration parameters:
1) For general DNS resolution services, the client can update and
configure the encrypted DNS recursive resolution server type and
address. This method is suitable for common networks and specific
networks.
2) Users can set to use the specified encrypted DNS resolution
service when accessing certain specific domain names. Set up a list
of mapping relationships between domain names and DNS resolution
service addresses.
3.3. Configuration examples
*Normal DNS resolution (single choice)
-Obtain DNS server address automatically (single choice)
-Use the following DNS server address (single choice)
First choice: ____._____.____.____
Alternative: ____._____.____.____
*Encrypted DNS resolution (single choice)
-Type: DOT/DOH
-Obtain DNS server address automatically (single choice)
-Use the following encrypted DNS server address (single choice)
First choice: ____._____.____.____
Alternative: ____._____.____.____
Zhang Expires June 28, 2021 [Page 3]
Internet-Draft Discussion of Requirements for ADD December 2020
Domain name Type Address
www.google.com DOT xxx.xxx.xxx.xxx
4. Encrypted DNS resolution service list
4.1. Provide a public encrypted DNS resolution service address list
We can provide an encrypted DNS recursive resolution server address
list, which can be publicly maintained and updated regularly. The
priority of selecting an encrypted DNS resolver is determined by the
server's own design. Currently Mozilla maintains a similar list
relationship.
4.2. Provide encrypted DNS resolution configuration for some specific
domain names
If some companies or institutions want to use their own encrypted DNS
resolution service when accessing their own domain names, they will
provide the resolution server through the mapping relationship.
5. IANA Considerations
To be added.
6. Security Considerations
To be added.
7. Acknowledgment
The authors would like to thank Jiankang Yao, and Linlin Zhou for
their careful review and valuable comments.
8. Informative References
[I-D.ietf-dprive-dnsoquic]
Huitema, C., Mankin, A., and S. Dickinson, "Specification
of DNS over Dedicated QUIC Connections", draft-ietf-
dprive-dnsoquic-01 (work in progress), October 2020.
[RFC7858] Hu, Z., Zhu, L., Heidemann, J., Mankin, A., Wessels, D.,
and P. Hoffman, "Specification for DNS over Transport
Layer Security (TLS)", RFC 7858, DOI 10.17487/RFC7858, May
2016, <https://www.rfc-editor.org/info/rfc7858>.
Zhang Expires June 28, 2021 [Page 4]
Internet-Draft Discussion of Requirements for ADD December 2020
[RFC8484] Hoffman, P. and P. McManus, "DNS Queries over HTTPS
(DoH)", RFC 8484, DOI 10.17487/RFC8484, October 2018,
<https://www.rfc-editor.org/info/rfc8484>.
Author's Address
Man Zhang
4 South 4th Street, Zhongguancun, Haidian District
Beijing, Beijing 100190
China
Email: zhangman@cnnic.cn
Zhang Expires June 28, 2021 [Page 5]