<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-ietf-iotops-iot-dns-guidelines-02" category="bcp" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="IoT-DNS-Guidelines">IoT DNS Security and Privacy Guidelines</title>

    <author initials="A." surname="Mishra" fullname="Abhishek Mishra">
      <organization>Inria</organization>
      <address>
        <email>abhishek.mishra@inria.fr</email>
      </address>
    </author>
    <author initials="A." surname="Losty" fullname="Andrew Losty">
      <organization>UCL</organization>
      <address>
        <email>andrew.losty.23@ucl.ac.uk</email>
      </address>
    </author>
    <author initials="A. M." surname="Mandalari" fullname="Anna Maria Mandalari">
      <organization>UCL</organization>
      <address>
        <email>a.mandalari@ucl.ac.uk</email>
      </address>
    </author>
    <author initials="J." surname="Mozley" fullname="Jim Mozley">
      <organization>Infoblox</organization>
      <address>
        <email>jmozley@infoblox.com</email>
      </address>
    </author>
    <author initials="M." surname="Cunche" fullname="Mathieu Cunche">
      <organization>INSA-Lyon &amp; Inria</organization>
      <address>
        <email>mathieu.cunche@inria.fr</email>
      </address>
    </author>

    <date year="2026" month="February" day="24"/>

    <area>ops</area>
    <workgroup>iotops</workgroup>
    

    <abstract>


<?line 51?>

<t>This document outlines best current practices for Internet of Things (IoT) device providers regarding the implementation of DNS stub resolvers, with the aim of mitigating security threats, enhancing privacy, and resolving operational challenges. It also provides guidelines for network operators on mitigating the risks identified in this draft as DNS resolution includes services outside of the stub-resolver, and for device providers' management zones.</t>



    </abstract>

    <note title="About This Document" removeInRFC="true">
      <t>
        The latest revision of this draft can be found at <eref target="https://miishra.github.io/IoT-DNS-Guidelines/draft-mishra-iotops-iot-dns-guidelines-latest.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-iotops-iot-dns-guidelines/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/miishra/IoT-DNS-Guidelines"/>.</t>
    </note>


  </front>

  <middle>


<?line 55?>

<section anchor="introduction"><name>Introduction</name>

<t>Research into the DNS behavior of IoT devices <xref target="UCLandInriaPaper"/> shows widespread non-compliance with protocol standards, gaps in protocol support, and security vulnerabilities. This leads to unpredictable operational behavior and exposes devices to fingerprinting and denial-of-service attacks.</t>

<t>While the recommendations in this BCP may apply to all DNS stub resolver behavior, we treat IoT devices as a specific case where targeted recommendations are useful for the following reasons:</t>

<t><list style="symbols">
  <t>The recommendations address specific IoT-related security concerns not seen in the DNS behavior of general-purpose operating systems</t>
  <t>IoT devices have different resource characteristics from general-purpose devices, such as constrained power consumption, meaning incorrect software implementations can have an increased operational impact</t>
  <t>IoT devices do not typically have security agents installed on them</t>
  <t>There are many DNS RFCs, and this BCP can be used to identify those related to specific security issues observed through research into IoT devices, with the aim of making it easier to address these vulnerabilities</t>
  <t>IoT devices may be deployed at scale on dedicated networks, and these recommendations will be useful to network security teams in mitigating vulnerabilities, especially where device behavior cannot be changed</t>
  <t>Manufacturers may use standard software distributions aimed at IoT devices without considering DNS behavior. This BCP provides recommendations that can be used as part of the criteria to evaluate these distributions</t>
  <t>IoT devices typically perform the same set of DNS queries on start-up, which makes them both more vulnerable because of this predictable behavior and also more prone to fingerprinting</t>
</list></t>

<t>DNS terminology in this draft conforms to RFC 9499. In this context, Stub Resolver refers to the IoT device, and Resolver refers to the DNS server used by the IoT device.</t>

<t>The BCP is primarily concerned with device-to-cloud communication <xref target="RFC7452"/>, but DNS may be used in other IoT device communication patterns. Hence recommendations would apply to any deployment type where DNS is used, but decisions on implementation may be proportionate to security risks and operational considerations. For example the implementation of {#configuring-resolvers} and <xref target="transaction-randomization"/> would be appropriate to any implementation, where as <xref target="encrypted-standards"/> may not be proportionate in industrial automation environments where devices do not encrypt other types of traffic <xref target="RFC9150"/>.</t>

</section>
<section anchor="conventions-and-definitions"><name>Conventions and Definitions</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
<section anchor="stub-resolvers"><name>Recommendations for IoT Device Stub Resolvers</name>

<section anchor="configuring-resolvers"><name>Configuration of DNS servers used by IoT Stub Resolvers</name>

<t>IoT devices have been observed to fall back to hard-coded IP addresses for DNS resolvers, such as well-known open resolvers, or ignore addresses assigned to them via automated configuration methods such as DHCP Option 6. This may result in an insecure communication channel, and the open resolvers used in these hard-coded configurations may be blocked by network policy, preventing the device from working.</t>

<t>DNS resolvers on devices <bcp14>MUST</bcp14> be configurable via network configuration protocols. Stub resolvers <bcp14>MUST NOT</bcp14> fall back to hard-coded resolvers.</t>

<t>Devices <bcp14>SHOULD</bcp14> use the following priority order for selecting a resolver. The first one that results in a discovered service should be selected.</t>

<t><list style="numbers" type="1">
  <t>Manual user configuration</t>
  <t>Device management software</t>
  <t>IPv6 Router Advertisement (RA) <xref target="RFC8106"/>, DHCPv6 <xref target="RFC8415"/> (if M=1 bit in RA), IPv4 DHCP <xref target="RFC2132"/>. When Encrypted resolver options are present in DHCP and IPv6 Router Advertisements <xref target="RFC9463"/>, then they <bcp14>SHOULD</bcp14> be used.</t>
</list></t>

<t>If the selected resolver is a plain IP address (e.g. from option 3) this implies unencrypted DNS. In such cases Discovery of Designated Resolvers (DDR) <xref target="RFC9462"/> <bcp14>SHOULD</bcp14> be performed to upgrade to encrypted access, where available.</t>

</section>
<section anchor="transaction-randomization"><name>Source Port and Transaction ID Randomization</name>

<t>Some IoT devices have been observed to have insufficient or no randomization in the source ports of DNS queries or DNS transaction IDs. This leaves them vulnerable to spoofed responses. A combination of Source Port and Transaction ID is used, amongst other criteria, by the stub resolver when accepting a DNS response.</t>

<t>IoT devices <bcp14>MUST</bcp14> undergo adequate Source Port and Transaction ID randomization in their DNS queries as a mitigation against cache poisoning from spoofed responses. Having both of these values correctly randomized decreases the chances of a successful spoofed attack. Stub resolvers <bcp14>MUST</bcp14> follow the recommendations of <xref target="RFC5452"/> as described in Section 4.5 to ensure Source Port randomization and Transaction ID randomization as required by <xref target="RFC1035"/>.</t>

</section>
<section anchor="ttl-value-handling"><name>Handling of TTL Values</name>

<t>IoT devices have been observed making unexpectedly high numbers of DNS queries even when DNS record Time-To-Live values (TTLs) would mean this should be unnecessary. Devices have also been observed issuing DNS queries at fixed, highly predictable intervals for the same domain names, regardless of operational changes or TTL values.</t>

<t>Unnecessary queries may lead to a drain of power in resource-constrained IoT devices. Conversely, very high TTLs may impact device operations such as communicating with management servers, receiving software updates, or other changes, which may lead to security issues. Deterministic querying behavior increases the risk of device fingerprinting by adversaries who can profile query timing to identify specific device models or firmware versions.</t>

<t>The ideal operational scenario is for the owners of the authoritative zones used to manage the devices setting TTL values appropriately for the zones and specific records within them. Devices would then query these records only as needed.</t>

<t>IoT devices <bcp14>MUST</bcp14> cache DNS responses and <bcp14>SHOULD</bcp14> honour TTLs when caching. If for operational reasons this is not ideal, such as the case where a management server record could be cached for an extended period preventing failover or change, then minimum and maximum TTLs <bcp14>MAY</bcp14> be configurable on the device but <bcp14>MUST NOT</bcp14> be hardcoded values. Where IoT stub resolvers cannot be configured with minimum and maximum TTL values, this can be mitigated by setting these on the network resolver.</t>

<t>If certain device operational requirements necessitate periodic revalidation of critical domains (e.g. management servers), these repeated queries <bcp14>SHOULD</bcp14> use non-deterministic inter-query timing to avoid fixed intervals.</t>

<t>In case of unsuccessful resolution, such as when the resolver is unavailable, IoT devices should implement exponential back-off strategies.</t>

</section>
<section anchor="support-of-edns0"><name>Support of EDNS(0)</name>

<t>Devices have been observed having limited support for EDNS(0), causing them to revert to TCP for queries over 512 bytes, affecting the device's efficiency. Other research findings include consuming additional processing resources and failing to maintain their network connectivity when responses to DNS requests exceed 512 bytes.</t>

<t>IoT devices <bcp14>MUST</bcp14> support EDNS(0) and send a supported UDP packet size via OPT 41 <xref target="RFC6891"/>. To avoid fragmentation of UDP packets, which may be dropped by intervening networks, the maximum packet size <bcp14>SHOULD</bcp14> be set to 1220 bytes as a default, although device configuration <bcp14>MAY</bcp14> allow this to be configurable. Although the networks to which IoT devices connect may support larger packet sizes than 1220 bytes, the nature of these devices in being deployed on many network types and DNS queries traversing networks controlled by different operators means it is operationally more effective to use this value. In addition, IoT devices <bcp14>MUST</bcp14> support using TCP for queries when a TC bit is returned from the resolver <xref target="RFC1035"/>.</t>

</section>
<section anchor="improve-device-behavior-in-response-to-resolution-problems"><name>Improve Device Behavior in Response to Resolution Problems</name>

<t>When resolving domain names, IoT devices may be unable to obtain an answer, and as a result, surges in the number of queries and retries have been observed, or an increase in queries using an alternate protocol (more aggressively querying via IPv6 rather than IPv4).</t>

<t>The use of serve-stale <xref target="RFC8767"/> by resolver software on the IoT device may mitigate the impact of failed resolution, such as when authoritative servers are unavailable. If the stub-resolver has this capability, device manufacturers should consider the benefits and any impact of using this.</t>

</section>
<section anchor="encrypted-standards"><name>Compliance with Encrypted DNS Standards</name>

<t>The majority of IoT devices use unencrypted DNS over port 53, which means this traffic can be captured and is open to interception and manipulation. Encrypted DNS protocols are not mandated for compliance with DNS standards, but the use of encrypted DNS may be mandated by some regulators and advised by competent authorities <xref target="ENISAGuidanceForNIS2"/> in deployment guidelines. Encrypted DNS support is widely deployed and it is possible for IoT devices to discover DNS resolver support for this as described in <xref target="configuring-resolvers"/>.</t>

<t>IoT devices <bcp14>SHOULD</bcp14> support encrypted DNS protocols such as DNS over TLS (DoT) <xref target="RFC7858"/>, DNS over QUIC (DoQ) <xref target="RFC9250"/>, or DNS over HTTPS (DoH) <xref target="RFC8484"/> for enhanced privacy, security, and compatibility. To mitigate against fingerprinting IoT devices, DNS queries can be padded as detailed in <xref target="RFC7830"/> and <xref target="RFC8467"/>.</t>

</section>
<section anchor="stub-resolver-dnssec"><name>Use of DNSSEC</name>

<t>IoT devices can be induced to contact an adversary server or make large volumes of DNS queries via spoofed responses to queries. It would be difficult for manufacturers to mitigate this by implementing checks of data received via DNS queries, such as validating IP addresses in the A/AAAA record RDATA. In addition, any validation of this type does not address the problem of man-in-the-middle (MiTM) attacks targeting DNS query responses.</t>

<t>DNSSEC can be implemented by manufacturers to mitigate MitM attacks on DNS query responses.Manufacturers <bcp14>MUST</bcp14> sign public zones used for device management and services to ensure queries can be validated by their device stub-resolvers or more generally network resolvers that may use DNSSEC for validation. This will improve security regardless of whether devices can support checking that queries are validated, as many network operators will implement validation by their resolvers.</t>

<t>Manufacturers <bcp14>MAY</bcp14> improve device security by utilizing DNSSEC validation <xref target="RFC9364"/> on the stub-resolver. Devices would typically adopt one of two models for validation (see <xref target="stub-resolver-validation"/>) by setting a combination of the DO and CD bits in DNS queries:</t>

<t><list style="symbols">
  <t>Stub-resolver checking for validation - the stub-resolver checks for the Authenticated Data (AD) bit in the response, which is suitable for constrained devices but requires explicit trust in the upstream resolver</t>
  <t>Stub-resolver performing full validation - local cryptographic checks, providing stronger assurance</t>
</list></t>

<t>Both models improve security over unvalidated queries, but manufacturers should weigh the security considerations, such as trust assumptions, against the operational feasibility when considering which approach to take. Manufacturers should consider the type of network the device is likely to be deployed on, such as a home network vs. other types, in determining the likelihood of DNSSEC validation being available on the network and thus deciding if the device should rely on a validating resolver or making the device independently capable of validation.</t>

<t>Deployment options are summarised below, with two of them being the typical deployment cases:</t>

<texttable title="Stub-resolver deployment options" anchor="stub-resolver-validation">
      <ttcol align='center'>DO Bit</ttcol>
      <ttcol align='center'>CD Bit</ttcol>
      <ttcol align='center'>Resolver Validated?</ttcol>
      <ttcol align='center'>DNSSEC RRs Returned?</ttcol>
      <ttcol align='left'>Notes</ttcol>
      <c>Y</c>
      <c>Y</c>
      <c>N</c>
      <c>Y</c>
      <c>Resolver does not validate. DNSSEC data returned. Stub-resolver performing full validation deployment.</c>
      <c>Y</c>
      <c>N</c>
      <c>Y</c>
      <c>Y</c>
      <c>Resolver validates. DNSSEC data returned. Stub-resolver can use AD bit to check validation.</c>
      <c>N</c>
      <c>Y</c>
      <c>N</c>
      <c>N</c>
      <c>Resolver does not validate. No DNSSEC data returned. Do not use.</c>
      <c>N</c>
      <c>N</c>
      <c>Y</c>
      <c>N</c>
      <c>Resolver validates. No DNSSEC data. Stub-resolver checking for validation deployment.</c>
</texttable>

<section anchor="stub-resolver-checking-for-validation"><name>Stub-resolver Checking for Validation</name>

<t>Where a manufacturer does utilize DNSSEC validation on the device the minimum implementation will be a stub-resolver checking the AD bit to see if the answer has been validated. Relying solely on the AD bit assumes that the upstream resolver is trustworthy and uncompromised.</t>

<t>Manufacturers may implement a testing mechanism to determine if the network resolver supports DNSSEC so that it can utilize validation in a network that supports it, or falls back to unvalidated queries. Any test of the resolver will only validate that it supports DNSSEC, given that the resolver is performing the validation it must be explicitly trusted.</t>

<t>In order to check that a DNS query has been validated a stub-resolver <bcp14>MUST</bcp14> check the Authenticated Data (AD) bit <xref target="RFC4035"/> in responses to determine whether data was validated by the resolver it is using. When checking for the AD bit stub-resolvers <bcp14>MUST</bcp14> treat DNSSEC validation failures as fatal. Responses that fail validation <bcp14>MUST NOT</bcp14> be used for name resolution.</t>

</section>
<section anchor="stub-resolver-performing-full-validation"><name>Stub-resolver Performing Full Validation</name>

<t>Device stub-resolvers can perform validation themselves in cases where the network resolver does not validate queries or the device does not trust the network resolver to do so.</t>

<t>Considerations for device manufacturers in implementing full validation include:</t>

<t><list style="symbols">
  <t>Devices performing local validation gain end-to-end trust but at higher computational cost</t>
  <t>Devices should cache results including intermediate validation results to reduce repeated computation</t>
  <t>Devices will need to be shipped with a root trust anchor and have a mechanism to securely update this</t>
</list></t>

<t>To implement full local validation stub-resolvers <bcp14>MUST</bcp14> conform to <xref target="RFC4035"/> section 4.9. In practice it is likely to be easier for manufacturers to implement a minimum footprint validating recursive server on the device, configured to forward queries to the network resolver(s), rather than develop this capability in any stub resolver.</t>

</section>
</section>
</section>
<section anchor="recommendations-for-network-operators"><name>Recommendations for Network Operators</name>

<t>Most IoT devices do not have specific security software agents installed on them, as is typically the case with general-purpose operating systems, and supply chain vulnerabilities may mean that these devices are compromised before reaching the consumer. Network operators can use DNS resolvers to mitigate these risks. Manufacturers should be aware of network operator DNS deployment options as devices will use these resolvers, even though this infrastructure is not under manufacturer control.</t>

<t>As some aspects of DNS security rely on the stub-resolver, resolver, and authoritative server resolution process and record types (notably DNSSEC), it is also necessary for network operators to implement DNS in such a way as to support some of the recommendations in <xref target="stub-resolvers"/>.</t>

<section anchor="resolvers-supporting-dnssec"><name>Resolvers Supporting DNSSEC</name>

<t>In order to support improving device DNS security as described in <xref target="stub-resolver-dnssec"/> resolvers <bcp14>SHOULD</bcp14> be configured to validate DNS responses using DNSSEC.</t>

</section>
<section anchor="blocking-malicious-traffic"><name>Blocking of Unmanaged or Malicious DNS Traffic</name>

<t>Private network operators may block DNS traffic to any resolvers other than those managed by the operator, so that traffic is not bypassing any DNS security controls such as response policy zones or DNS traffic logging. This is more likely to be the case on enterprise or other private networks rather than service providers that don't want to limit customers using alternate resolvers.</t>

<t>Where operators have networks dedicated to IoT devices, they <bcp14>MAY</bcp14> limit DNS resolution to only domain names used by those IoT devices to mitigate any impact in the event of a compromise to the device. Manufacturers <bcp14>SHOULD</bcp14> provide domain names used for communication to facilitate this and other security measures used to secure devices and identify those that are compromised. Manufacturer Usage Descriptions (MUDs) can provide details of domain names used in device operations that can then be added to DNS security controls.</t>

</section>
<section anchor="availability"><name>Availability</name>

<t>Providers <bcp14>SHOULD</bcp14> alter resolver configuration to mitigate some of the security risks or operational issues identified in this BCP where it does not impact the operation of other types of DNS clients.</t>

<t>Network operators <bcp14>SHOULD</bcp14> configure DNS resolvers to use serve-stale <xref target="RFC8767"/> for networks supporting IoT devices, especially where these networks are dedicated to this type of device, to limit any operational impact on IoT devices when resolution fails. Network operators <bcp14>MUST</bcp14> support IoT devices with dual-stack resolvers, rather than providing only IPv4 resolvers when devices are configured with both IPv4 and IPv6.</t>

<t>DNS queries are most commonly carried over UDP and compromised devices have been used in DoS attacks by sending queries with forged source addresses, hence network operators <bcp14>MUST</bcp14> implement <xref target="RFC2827"/> network ingress filtering. Network operators should implement DNS Response Rate Limiting (RRL) on resolvers to mitigate high query volumes from devices causing DoS to the DNS infrastructure.</t>

</section>
</section>
<section anchor="recommendations-for-manufacturer-authoritative-dns-zones"><name>Recommendations for Manufacturer Authoritative DNS Zones</name>

<section anchor="zone-signing"><name>Zone Signing</name>

<t>Zones supporting the management and data collection of devices <bcp14>MUST</bcp14> be DNSSEC signed in order to support the behavior described in <xref target="stub-resolver-dnssec"/> and <xref target="resolvers-supporting-dnssec"/>. The zones used for these purposes <bcp14>SHOULD</bcp14> be publicly listed for network operators to use in securing their networks as described in <xref target="blocking-malicious-traffic"/>.</t>

</section>
<section anchor="ttl-values"><name>TTL Values</name>

<t>As stated in <xref target="ttl-value-handling"/> manufacturers <bcp14>MUST</bcp14> consider setting TTL values for management zone records that are appropriate for device operations, considering a balance between devices performing excess queries, continuous operation in the event of resolvers being unreachable, and the potential for changes in RDATA such as management IP addresses.</t>

</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>This document does not include protocol changes so there are no specific security considerations in this draft related to new protocol implementations, rather the BCP focusses on security improvements by implementing existing protocols as in the sections above.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document has no IANA actions.</t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>
<reference anchor="RFC5452">
  <front>
    <title>Measures for Making DNS More Resilient against Forged Answers</title>
    <author fullname="A. Hubert" initials="A." surname="Hubert"/>
    <author fullname="R. van Mook" initials="R." surname="van Mook"/>
    <date month="January" year="2009"/>
    <abstract>
      <t>The current Internet climate poses serious threats to the Domain Name System. In the interim period before the DNS protocol can be secured more fully, measures can already be taken to harden the DNS to make 'spoofing' a recursing nameserver many orders of magnitude harder.</t>
      <t>Even a cryptographically secured DNS benefits from having the ability to discard bogus responses quickly, as this potentially saves large amounts of computation.</t>
      <t>By describing certain behavior that has previously not been standardized, this document sets out how to make the DNS more resilient against accepting incorrect responses. This document updates RFC 2181. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5452"/>
  <seriesInfo name="DOI" value="10.17487/RFC5452"/>
</reference>
<reference anchor="RFC1035">
  <front>
    <title>Domain names - implementation and specification</title>
    <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
    <date month="November" year="1987"/>
    <abstract>
      <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="13"/>
  <seriesInfo name="RFC" value="1035"/>
  <seriesInfo name="DOI" value="10.17487/RFC1035"/>
</reference>
<reference anchor="RFC6891">
  <front>
    <title>Extension Mechanisms for DNS (EDNS(0))</title>
    <author fullname="J. Damas" initials="J." surname="Damas"/>
    <author fullname="M. Graff" initials="M." surname="Graff"/>
    <author fullname="P. Vixie" initials="P." surname="Vixie"/>
    <date month="April" year="2013"/>
    <abstract>
      <t>The Domain Name System's wire protocol includes a number of fixed fields whose range has been or soon will be exhausted and does not allow requestors to advertise their capabilities to responders. This document describes backward-compatible mechanisms for allowing the protocol to grow.</t>
      <t>This document updates the Extension Mechanisms for DNS (EDNS(0)) specification (and obsoletes RFC 2671) based on feedback from deployment experience in several implementations. It also obsoletes RFC 2673 ("Binary Labels in the Domain Name System") and adds considerations on the use of extended labels in the DNS.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="75"/>
  <seriesInfo name="RFC" value="6891"/>
  <seriesInfo name="DOI" value="10.17487/RFC6891"/>
</reference>
<reference anchor="RFC2827">
  <front>
    <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
    <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
    <author fullname="D. Senie" initials="D." surname="Senie"/>
    <date month="May" year="2000"/>
    <abstract>
      <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="38"/>
  <seriesInfo name="RFC" value="2827"/>
  <seriesInfo name="DOI" value="10.17487/RFC2827"/>
</reference>



    </references>

    <references title='Informative References' anchor="sec-informative-references">

<reference anchor="UCLandInriaPaper" target="https://hal.science/hal-05110445/">
  <front>
    <title>Towards Operational and Security Best Practices for DNS in the Internet of Things</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="ENISAGuidanceForNIS2" target="https://www.enisa.europa.eu/publications/nis2-technical-implementation-guidance">
  <front>
    <title>NIS2 Technical Implementation Guidance</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>


<reference anchor="RFC7452">
  <front>
    <title>Architectural Considerations in Smart Object Networking</title>
    <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
    <author fullname="J. Arkko" initials="J." surname="Arkko"/>
    <author fullname="D. Thaler" initials="D." surname="Thaler"/>
    <author fullname="D. McPherson" initials="D." surname="McPherson"/>
    <date month="March" year="2015"/>
    <abstract>
      <t>The term "Internet of Things" (IoT) denotes a trend where a large number of embedded devices employ communication services offered by Internet protocols. Many of these devices, often called "smart objects", are not directly operated by humans but exist as components in buildings or vehicles, or are spread out in the environment. Following the theme "Everything that can be connected will be connected", engineers and researchers designing smart object networks need to decide how to achieve this in practice.</t>
      <t>This document offers guidance to engineers designing Internet- connected smart objects.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7452"/>
  <seriesInfo name="DOI" value="10.17487/RFC7452"/>
</reference>
<reference anchor="RFC9150">
  <front>
    <title>TLS 1.3 Authentication and Integrity-Only Cipher Suites</title>
    <author fullname="N. Cam-Winget" initials="N." surname="Cam-Winget"/>
    <author fullname="J. Visoky" initials="J." surname="Visoky"/>
    <date month="April" year="2022"/>
    <abstract>
      <t>This document defines the use of cipher suites for TLS 1.3 based on Hashed Message Authentication Code (HMAC). Using these cipher suites provides server and, optionally, mutual authentication and data authenticity, but not data confidentiality. Cipher suites with these properties are not of general applicability, but there are use cases, specifically in Internet of Things (IoT) and constrained environments, that do not require confidentiality of exchanged messages while still requiring integrity protection, server authentication, and optional client authentication. This document gives examples of such use cases, with the caveat that prior to using these integrity-only cipher suites, a threat model for the situation at hand is needed, and a threat analysis must be performed within that model to determine whether the use of integrity-only cipher suites is appropriate. The approach described in this document is not endorsed by the IETF and does not have IETF consensus, but it is presented here to enable interoperable implementation of a reduced-security mechanism that provides authentication and message integrity without supporting confidentiality.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9150"/>
  <seriesInfo name="DOI" value="10.17487/RFC9150"/>
</reference>
<reference anchor="RFC8106">
  <front>
    <title>IPv6 Router Advertisement Options for DNS Configuration</title>
    <author fullname="J. Jeong" initials="J." surname="Jeong"/>
    <author fullname="S. Park" initials="S." surname="Park"/>
    <author fullname="L. Beloeil" initials="L." surname="Beloeil"/>
    <author fullname="S. Madanapalli" initials="S." surname="Madanapalli"/>
    <date month="March" year="2017"/>
    <abstract>
      <t>This document specifies IPv6 Router Advertisement (RA) options (called "DNS RA options") to allow IPv6 routers to advertise a list of DNS Recursive Server Addresses and a DNS Search List to IPv6 hosts.</t>
      <t>This document, which obsoletes RFC 6106, defines a higher default value of the lifetime of the DNS RA options to reduce the likelihood of expiry of the options on links with a relatively high rate of packet loss.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8106"/>
  <seriesInfo name="DOI" value="10.17487/RFC8106"/>
</reference>
<reference anchor="RFC8415">
  <front>
    <title>Dynamic Host Configuration Protocol for IPv6 (DHCPv6)</title>
    <author fullname="T. Mrugalski" initials="T." surname="Mrugalski"/>
    <author fullname="M. Siodelski" initials="M." surname="Siodelski"/>
    <author fullname="B. Volz" initials="B." surname="Volz"/>
    <author fullname="A. Yourtchenko" initials="A." surname="Yourtchenko"/>
    <author fullname="M. Richardson" initials="M." surname="Richardson"/>
    <author fullname="S. Jiang" initials="S." surname="Jiang"/>
    <author fullname="T. Lemon" initials="T." surname="Lemon"/>
    <author fullname="T. Winters" initials="T." surname="Winters"/>
    <date month="November" year="2018"/>
    <abstract>
      <t>This document describes the Dynamic Host Configuration Protocol for IPv6 (DHCPv6): an extensible mechanism for configuring nodes with network configuration parameters, IP addresses, and prefixes. Parameters can be provided statelessly, or in combination with stateful assignment of one or more IPv6 addresses and/or IPv6 prefixes. DHCPv6 can operate either in place of or in addition to stateless address autoconfiguration (SLAAC).</t>
      <t>This document updates the text from RFC 3315 (the original DHCPv6 specification) and incorporates prefix delegation (RFC 3633), stateless DHCPv6 (RFC 3736), an option to specify an upper bound for how long a client should wait before refreshing information (RFC 4242), a mechanism for throttling DHCPv6 clients when DHCPv6 service is not available (RFC 7083), and relay agent handling of unknown messages (RFC 7283). In addition, this document clarifies the interactions between models of operation (RFC 7550). As such, this document obsoletes RFC 3315, RFC 3633, RFC 3736, RFC 4242, RFC 7083, RFC 7283, and RFC 7550.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8415"/>
  <seriesInfo name="DOI" value="10.17487/RFC8415"/>
</reference>
<reference anchor="RFC2132">
  <front>
    <title>DHCP Options and BOOTP Vendor Extensions</title>
    <author fullname="S. Alexander" initials="S." surname="Alexander"/>
    <author fullname="R. Droms" initials="R." surname="Droms"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>This document specifies the current set of DHCP options. Future options will be specified in separate RFCs. The current list of valid options is also available in ftp://ftp.isi.edu/in-notes/iana/assignments. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2132"/>
  <seriesInfo name="DOI" value="10.17487/RFC2132"/>
</reference>
<reference anchor="RFC9463">
  <front>
    <title>DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers (DNR)</title>
    <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
    <author fullname="T. Reddy.K" initials="T." role="editor" surname="Reddy.K"/>
    <author fullname="D. Wing" initials="D." surname="Wing"/>
    <author fullname="N. Cook" initials="N." surname="Cook"/>
    <author fullname="T. Jensen" initials="T." surname="Jensen"/>
    <date month="November" year="2023"/>
    <abstract>
      <t>This document specifies new DHCP and IPv6 Router Advertisement options to discover encrypted DNS resolvers (e.g., DNS over HTTPS, DNS over TLS, and DNS over QUIC). Particularly, it allows a host to learn an Authentication Domain Name together with a list of IP addresses and a set of service parameters to reach such encrypted DNS resolvers.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9463"/>
  <seriesInfo name="DOI" value="10.17487/RFC9463"/>
</reference>
<reference anchor="RFC9462">
  <front>
    <title>Discovery of Designated Resolvers</title>
    <author fullname="T. Pauly" initials="T." surname="Pauly"/>
    <author fullname="E. Kinnear" initials="E." surname="Kinnear"/>
    <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
    <author fullname="P. McManus" initials="P." surname="McManus"/>
    <author fullname="T. Jensen" initials="T." surname="Jensen"/>
    <date month="November" year="2023"/>
    <abstract>
      <t>This document defines Discovery of Designated Resolvers (DDR), a set of mechanisms for DNS clients to use DNS records to discover a resolver's encrypted DNS configuration. An Encrypted DNS Resolver discovered in this manner is referred to as a "Designated Resolver". These mechanisms can be used to move from unencrypted DNS to encrypted DNS when only the IP address of a resolver is known. These mechanisms are designed to be limited to cases where Unencrypted DNS Resolvers and their Designated Resolvers are operated by the same entity or cooperating entities. It can also be used to discover support for encrypted DNS protocols when the name of an Encrypted DNS Resolver is known.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9462"/>
  <seriesInfo name="DOI" value="10.17487/RFC9462"/>
</reference>
<reference anchor="RFC8767">
  <front>
    <title>Serving Stale Data to Improve DNS Resiliency</title>
    <author fullname="D. Lawrence" initials="D." surname="Lawrence"/>
    <author fullname="W. Kumari" initials="W." surname="Kumari"/>
    <author fullname="P. Sood" initials="P." surname="Sood"/>
    <date month="March" year="2020"/>
    <abstract>
      <t>This document defines a method (serve-stale) for recursive resolvers to use stale DNS data to avoid outages when authoritative nameservers cannot be reached to refresh expired data. One of the motivations for serve-stale is to make the DNS more resilient to DoS attacks and thereby make them less attractive as an attack vector. This document updates the definitions of TTL from RFCs 1034 and 1035 so that data can be kept in the cache beyond the TTL expiry; it also updates RFC 2181 by interpreting values with the high-order bit set as being positive, rather than 0, and suggests a cap of 7 days.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8767"/>
  <seriesInfo name="DOI" value="10.17487/RFC8767"/>
</reference>
<reference anchor="RFC7858">
  <front>
    <title>Specification for DNS over Transport Layer Security (TLS)</title>
    <author fullname="Z. Hu" initials="Z." surname="Hu"/>
    <author fullname="L. Zhu" initials="L." surname="Zhu"/>
    <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
    <author fullname="A. Mankin" initials="A." surname="Mankin"/>
    <author fullname="D. Wessels" initials="D." surname="Wessels"/>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <date month="May" year="2016"/>
    <abstract>
      <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
      <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7858"/>
  <seriesInfo name="DOI" value="10.17487/RFC7858"/>
</reference>
<reference anchor="RFC9250">
  <front>
    <title>DNS over Dedicated QUIC Connections</title>
    <author fullname="C. Huitema" initials="C." surname="Huitema"/>
    <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
    <author fullname="A. Mankin" initials="A." surname="Mankin"/>
    <date month="May" year="2022"/>
    <abstract>
      <t>This document describes the use of QUIC to provide transport confidentiality for DNS. The encryption provided by QUIC has similar properties to those provided by TLS, while QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides more efficient packet-loss recovery than UDP. DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC 7858, and latency characteristics similar to classic DNS over UDP. This specification describes the use of DoQ as a general-purpose transport for DNS and includes the use of DoQ for stub to recursive, recursive to authoritative, and zone transfer scenarios.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9250"/>
  <seriesInfo name="DOI" value="10.17487/RFC9250"/>
</reference>
<reference anchor="RFC8484">
  <front>
    <title>DNS Queries over HTTPS (DoH)</title>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <author fullname="P. McManus" initials="P." surname="McManus"/>
    <date month="October" year="2018"/>
    <abstract>
      <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8484"/>
  <seriesInfo name="DOI" value="10.17487/RFC8484"/>
</reference>
<reference anchor="RFC7830">
  <front>
    <title>The EDNS(0) Padding Option</title>
    <author fullname="A. Mayrhofer" initials="A." surname="Mayrhofer"/>
    <date month="May" year="2016"/>
    <abstract>
      <t>This document specifies the EDNS(0) "Padding" option, which allows DNS clients and servers to pad request and response messages by a variable number of octets.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7830"/>
  <seriesInfo name="DOI" value="10.17487/RFC7830"/>
</reference>
<reference anchor="RFC8467">
  <front>
    <title>Padding Policies for Extension Mechanisms for DNS (EDNS(0))</title>
    <author fullname="A. Mayrhofer" initials="A." surname="Mayrhofer"/>
    <date month="October" year="2018"/>
    <abstract>
      <t>RFC 7830 specifies the "Padding" option for Extension Mechanisms for DNS (EDNS(0)) but does not specify the actual padding length for specific applications. This memo lists the possible options ("padding policies"), discusses the implications of each option, and provides a recommended (experimental) option.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8467"/>
  <seriesInfo name="DOI" value="10.17487/RFC8467"/>
</reference>
<reference anchor="RFC9364">
  <front>
    <title>DNS Security Extensions (DNSSEC)</title>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <date month="February" year="2023"/>
    <abstract>
      <t>This document describes the DNS Security Extensions (commonly called "DNSSEC") that are specified in RFCs 4033, 4034, and 4035, as well as a handful of others. One purpose is to introduce all of the RFCs in one place so that the reader can understand the many aspects of DNSSEC. This document does not update any of those RFCs. A second purpose is to state that using DNSSEC for origin authentication of DNS data is the best current practice. A third purpose is to provide a single reference for other documents that want to refer to DNSSEC.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="237"/>
  <seriesInfo name="RFC" value="9364"/>
  <seriesInfo name="DOI" value="10.17487/RFC9364"/>
</reference>
<reference anchor="RFC4035">
  <front>
    <title>Protocol Modifications for the DNS Security Extensions</title>
    <author fullname="R. Arends" initials="R." surname="Arends"/>
    <author fullname="R. Austein" initials="R." surname="Austein"/>
    <author fullname="M. Larson" initials="M." surname="Larson"/>
    <author fullname="D. Massey" initials="D." surname="Massey"/>
    <author fullname="S. Rose" initials="S." surname="Rose"/>
    <date month="March" year="2005"/>
    <abstract>
      <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of new resource records and protocol modifications that add data origin authentication and data integrity to the DNS. This document describes the DNSSEC protocol modifications. This document defines the concept of a signed zone, along with the requirements for serving and resolving by using DNSSEC. These techniques allow a security-aware resolver to authenticate both DNS resource records and authoritative DNS error indications.</t>
      <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4035"/>
  <seriesInfo name="DOI" value="10.17487/RFC4035"/>
</reference>



    </references>

</references>


<?line 237?>

<section numbered="false" anchor="acknowledgments"><name>Acknowledgments</name>

<t>We thank the researchers, reviewers, and engineers who contributed to the analysis and testing process.</t>

<t>The authors thank Mohamed Boucadair, Chris Box, Ross Gibson, Eliot Lear, Martine Sophie Lenders, Jim Reid, Michael Richardson and Hannes Tschofenig for their contributions, questions and comments.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

