<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.8) -->
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc compact="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-nottingham-dnsop-censorship-transparency-01" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title>DNS Filtering Transparency</title>
    <seriesInfo name="Internet-Draft" value="draft-nottingham-dnsop-censorship-transparency-01"/>
    <author initials="M." surname="Nottingham" fullname="Mark Nottingham">
      <organization>Cloudflare</organization>
      <address>
        <postal>
          <postalLine>Melbourne</postalLine>
          <postalLine>Australia</postalLine>
        </postal>
        <email>mnot@mnot.net</email>
        <uri>https://www.mnot.net/</uri>
      </address>
    </author>
    <author initials="D." surname="Adrian" fullname="David Adrian">
      <organization>Google</organization>
      <address>
        <postal>
          <country>USA</country>
        </postal>
        <email>davidcadrian@gmail.com</email>
      </address>
    </author>
    <date year="2026" month="February" day="22"/>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 37?>

<t><xref target="I-D.ietf-dnsop-structured-dns-error"/> introduces structured error data for DNS responses that have been filtered. This specification allows more specific details of filtering incidents to be conveyed.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/mnot/public-resolver-errors"/>.</t>
    </note>
  </front>
  <middle>
    <?line 41?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Internet DNS resolvers are increasingly subject to legal orders that require blocking or filtering of specific names. Because such filtering happens during DNS resolution, there is not an effective way to communicate what is happening to end users, often resulting in misattribution of the issue as a technical problem, rather than a policy intervention.</t>
      <t>Some organizations such as Lumen <xref target="lumen"/> monitor legally-mandated filtering as a public service, tracking specific filtering incidents in publicly accessible databases. Other parties may also choose to track filtering requests over time and make them available.</t>
      <t>This draft defines a mechanism for DNS resolvers to convey identifiers for entries in such databases, based upon the structured error data for DNS responses introduced by <xref target="I-D.ietf-dnsop-structured-dns-error"/>.</t>
      <t>A consuming party (e.g., a Web browser) can use this information to construct a link to the specific entry in one or more databases of filtering incidents. This enables user agents to direct users to additional context about the filtering incident they encountered.</t>
      <t>The information conveyed is a DNS Filtering Database Entry, specified in <xref target="entry-id"/>. This abstraction is necessary because allowing DNS resolvers to inject links or user-visible messages would bring unique challenges. DNS resolvers are often automatically configured by unknown networks and DNS responses are unauthenticated, so these messages can come from untrusted parties -- including attackers (e.g., the so-called "coffee shop" attack) that leverage many users' lack of a nuanced model of the trust relationships between all of the parties that are involved in the service they are using.</t>
      <t>This specification attempts to mitigate these risks by minimising the information carried in the DNS response to abstract, publicly registered identifiers associated with databases of filtering incidents -- the DNS Filtering Database Entry -- rather than arbitrary URLs. An application can choose which database identifiers they support and are willing to direct their users to, without enabling every DNS server to surface arbitrary links and text, and without requiring the consuming party to independently track which URLs are in use.</t>
      <section anchor="example">
        <name>Example</name>
        <t>In typical use, a DNS query that is filtered might contain an Extended DNS Error Code 17 (see <xref target="RFC8914"/>) and an EXTRA-TEXT field "fdbs", which is an array of references to filtering database entries:</t>
        <sourcecode type="json"><![CDATA[
{
  "fdbs": [
    {"db": "example",
    "id": "abc123"},
    {"db": "lumen",
    "id": "def456"}
  ]
}
]]></sourcecode>
        <t>This indicates that the filtering incident can be accessed in two different databases, along with the ID associated with each database. In this example, the data is available in the "example" database at identifier "abc123", and in the "lumen" database at identifier "def456".</t>
        <t>An application that decides to present the "example" entry to its users would look up "example" in a local copy of the DNS Filtering Incident Database Registry (see <xref target="registry"/>) and obtain the corresponding URI template (see <xref target="template"/>). For purposes of this example, assume that the registry entry for that value contains:</t>
        <artwork><![CDATA[
https://example.com/filtering-incidents/{id}
]]></artwork>
        <t>That URI template can be expanded using the value of "id" to:</t>
        <artwork><![CDATA[
https://example.com/filtering-incidents/abc123
]]></artwork>
        <t>The application could (but might not) then decide to convey some or all of this information to its user; for example:</t>
        <ul empty="true">
          <li>
            <t>The webpage at www.example.net was blocked by your DNS resolver due to a
legal request. More information is available here:</t>
            <t>https://example.com/filtering-incidents/abc123</t>
          </li>
        </ul>
        <t>Note that there is no requirement for the resolver to convey any particular information here. The resolver both chooses which database providers it supports, and can evaluate whatever mechanisms it chooses to determine if and when to provide a link to the database entry.</t>
      </section>
      <section anchor="notational-conventions">
        <name>Notational Conventions</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="data-types">
      <name>Data Types</name>
      <t>This section defines the data types used to look up the details of a filtering incident from a DNS error response. Note that these identifiers are not suitable for presentation to end users.</t>
      <section anchor="entry-id">
        <name>DNS Filtering Database Entry</name>
        <t>A Filtering Database Operator ID is a string identifier for the operator of a database of filtering incidents. It uses the key "db".</t>
        <t>A Filtering Incident ID is a string identifier for a particular filtering incident. It might be specific to a particular request, but need not be. It uses the key "id".</t>
        <t>An object containing both a Filtering Database Operator ID and a Filtering Incident ID is a Filtering Database Entry.</t>
        <sourcecode type="json"><![CDATA[
{
  "db": "example",
  "id": "abc123"
}
]]></sourcecode>
      </section>
      <section anchor="entry-list">
        <name>DNS Filtering Database Entry List</name>
        <t>A DNS Filtering Database Entries list is an array of Filtering Database Entry objects. Each entry <bcp14>MUST</bcp14> be related to the same underlying incident.</t>
        <t>It is carried in the EXTRA-TEXT field of the Extended DNS Error with the JSON field name "fdbs". For example:</t>
        <sourcecode type="json"><![CDATA[
{
  "fdbs": [ { ... }, { ... }, ... ]
}
]]></sourcecode>
        <t>Different applications will implement support for a varying set of database operators. Resolvers provide a list of entries (rather than a single entry) so that they can support as many databases as possible.</t>
      </section>
    </section>
    <section anchor="template">
      <name>Database Entry Resolution Templates</name>
      <t>An Database Entry Resolution Template is a URI Template <xref target="RFC6570"/> contained in the DNS Filtering Database Registry (<xref target="registry"/>) that, upon expansion, provides a URI that can be dereferenced to obtain details about the filtering incident.</t>
      <t>It <bcp14>MUST</bcp14> be a Level 1 or Level 2 template (see <xref section="1.2" sectionFormat="of" target="RFC6570"/>). It has the following variables from the Filtering Database Entry (see <xref target="entry-id"/>) available to it:</t>
      <dl>
        <dt>db:</dt>
        <dd>
          <t>the Filtering Database Operator ID</t>
        </dd>
        <dt>id:</dt>
        <dd>
          <t>the Filtering Incident ID</t>
        </dd>
      </dl>
      <t>For example:</t>
      <artwork><![CDATA[
https://resolver.example.com/filtering-incidents/{id}
]]></artwork>
      <t>Applications <bcp14>MUST</bcp14> store a local copy of the DNS Filtering Database Registry (<xref target="registry"/>) for purposes of template lookup; they <bcp14>MUST NOT</bcp14> query the IANA registry upon each use. The registry is keyed by the Filtering Database Operator ID.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="extra-text-json-names">
        <name>EXTRA-TEXT JSON Names</name>
        <t>IANA will register the following fields in the "EXTRA-TEXT JSON Names" sub-registry established by <xref target="I-D.ietf-dnsop-structured-dns-error"/>:</t>
        <dl spacing="compact">
          <dt>JSON Name:</dt>
          <dd>
            <t>"fdbs"</t>
          </dd>
          <dt>Short Description:</dt>
          <dd>
            <t>a array of filtering database entries</t>
          </dd>
          <dt>Mandatory:</dt>
          <dd>
            <t>no</t>
          </dd>
          <dt>Specification:</dt>
          <dd>
            <t>this document</t>
          </dd>
        </dl>
      </section>
      <section anchor="registry">
        <name>The DNS Filtering Database Registry</name>
        <t>IANA will establish a new registry, the "DNS Filtering Database Registry." Its registration policy is first-come, first-served (FCFS), although IANA may refuse registrations that it deems to be deceptive or spurious.</t>
        <t>It contains the following fields:</t>
        <dl>
          <dt>Name:</dt>
          <dd>
            <t>The name of the DNS Filtering Database</t>
          </dd>
          <dt>Contact:</dt>
          <dd>
            <t>an e-mail address or other appropriate contact mechanism</t>
          </dd>
          <dt>Filtering Database Operator ID:</dt>
          <dd>
            <t>see <xref target="entry-id"/></t>
          </dd>
          <dt>Database Entry Resolution Template:</dt>
          <dd>
            <t>see <xref target="template"/></t>
          </dd>
        </dl>
        <t>The Database Entry Resolution Template can be updated by the contact at any time. However, operators <bcp14>SHOULD</bcp14> accommodate potentially long lag times for applications to update their copies of the registry.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This specification does not provide a way to authenticate that a particular filtering incident as experienced by an application was actually associated with the information presented. This means that an attacker (for example, one controlling a DNS resolver) can claim that a particular filtering incident is occurring when in fact it is not. However, a successful attack would need to reuse an existing DNS Filtering Database Operator ID and Filtering Incident ID that combine to expand to a URL that can be successfully dereferenced. Doing so is not currently thought to be particularly advantageous to an attacker to do so. Future iterations of this specification may introduce more robust protections.</t>
      <t>The details of DNS responses are not available to all applications, depending on how they are architected and the information made available to them by their host. As a result, this mechanism is not reliable; some applications will not be able to display this error information.</t>
      <t>Because the registry is first-come first-served, applications (such as Web browsers) will need to exercise judgement regarding which database operators' error messages they display to users. This decision might be influenced by the identity of the resolver producing the error message, the database operator, or local configuration.</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>An application dereferencing an incident URL may reveal the IP address of the
user to the filtering database operator, along with the fact that the user
attempted to resolve a specific domain whose resolution was filtered or
censored. In some jurisdictions this exposure may carry meaningful risk to the
user. While allowing users the choice to trust only specific filtering databases
may mitigate the risk from a filtering database operator, on-path network
observers may still infer that the user encountered a filtering incident for a
sensitive domain based on a connection to the filtering database.</t>
      <t>To mitigate this risk, applications can choose to route
incident URL fetches through a privacy-preserving
mechanism like a proxy. In
absence of such a proxy, applications <bcp14>MUST NOT</bcp14> automatically fetch incident URLs
without explicit user action.</t>
      <t>Applications and users should be aware that a resolver and filtering database
operator acting in collusion, or a single party operating in both roles, could
use unique Filtering Incident IDs to correlate user activity across requests.
As such, applications should get explicit input from users on which filtering
database operators they trust, and consequently disregard any entries from
operators the user does not explicitly trust.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.ietf-dnsop-structured-dns-error">
          <front>
            <title>Structured Error Data for Filtered DNS</title>
            <author fullname="Dan Wing" initials="D." surname="Wing">
              <organization>Citrix Systems, Inc.</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Neil Cook" initials="N." surname="Cook">
              <organization>Open-Xchange</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <date day="1" month="February" year="2026"/>
            <abstract>
              <t>   DNS filtering is widely deployed for various reasons, including
   network security.  However, filtered DNS responses lack structured
   information for end users to understand the reason for the filtering.
   Existing mechanisms to provide explanatory details to end users cause
   harm especially if the blocked DNS response is for HTTPS resources.

   This document updates RFC 8914 by signaling client support for
   structuring the EXTRA-TEXT field of the Extended DNS Error to provide
   details on the DNS filtering.  Such details can be parsed by the
   client and displayed, logged, or used for other purposes.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dnsop-structured-dns-error-16"/>
        </reference>
        <reference anchor="RFC8914">
          <front>
            <title>Extended DNS Errors</title>
            <author fullname="W. Kumari" initials="W." surname="Kumari"/>
            <author fullname="E. Hunt" initials="E." surname="Hunt"/>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="W. Hardaker" initials="W." surname="Hardaker"/>
            <author fullname="D. Lawrence" initials="D." surname="Lawrence"/>
            <date month="October" year="2020"/>
            <abstract>
              <t>This document defines an extensible method to return additional information about the cause of DNS errors. Though created primarily to extend SERVFAIL to provide additional information about the cause of DNS and DNSSEC failures, the Extended DNS Errors option defined in this document allows all response types to contain extended error information. Extended DNS Error information does not change the processing of RCODEs.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8914"/>
          <seriesInfo name="DOI" value="10.17487/RFC8914"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC6570">
          <front>
            <title>URI Template</title>
            <author fullname="J. Gregorio" initials="J." surname="Gregorio"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="M. Hadley" initials="M." surname="Hadley"/>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <author fullname="D. Orchard" initials="D." surname="Orchard"/>
            <date month="March" year="2012"/>
            <abstract>
              <t>A URI Template is a compact sequence of characters for describing a range of Uniform Resource Identifiers through variable expansion. This specification defines the URI Template syntax and the process for expanding a URI Template into a URI reference, along with guidelines for the use of URI Templates on the Internet. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6570"/>
          <seriesInfo name="DOI" value="10.17487/RFC6570"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="lumen" target="https://lumendatabase.org/">
          <front>
            <title>Lumen</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 246?>

<section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Thanks to Lars Eggert, Tommy Pauly, Emily Stark, and Martin Thomson for their input to this specification.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
