<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-dnsop-structured-dns-error-13" category="std" consensus="true" submissionType="IETF" updates="8914" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.1 -->
  <front>
    <title abbrev="Structured DNS Error">Structured Error Data for Filtered DNS</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-dnsop-structured-dns-error-13"/>
    <author fullname="Dan Wing">
      <organization abbrev="Citrix">Citrix Systems, Inc.</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>danwing@gmail.com</email>
      </address>
    </author>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Neil Cook">
      <organization>Open-Xchange</organization>
      <address>
        <postal>
          <country>United Kingdom</country>
        </postal>
        <email>neil.cook@noware.co.uk</email>
      </address>
    </author>
    <author fullname="Mohamed Boucadair">
      <organization>Orange</organization>
      <address>
        <postal>
          <street>Rennes</street>
          <code>35000</code>
          <country>France</country>
        </postal>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <date year="2025" month="April" day="23"/>
    <area>Internet</area>
    <workgroup>DNS Operations Working Group</workgroup>
    <keyword>Customer experience</keyword>
    <keyword>Informed decision</keyword>
    <keyword>transparency</keyword>
    <keyword>enriched feedback</keyword>
    <abstract>
      <?line 82?>

<t>DNS filtering is widely deployed for various reasons, including
network security. However, filtered DNS responses lack structured information
for end users to understand the reason for the filtering.
Existing mechanisms to provide explanatory details to end users cause harm
especially if the blocked DNS response is for HTTPS resources.</t>
      <t>This document updates RFC 8914 by signaling client support for structuring the EXTRA-TEXT field of
the Extended DNS Error to provide details on the DNS filtering. Such
details can be parsed by the client and displayed, logged, or used for
other purposes.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://ietf-wg-dnsop.github.io/draft-ietf-dnsop-structured-dns-error/draft-ietf-dnsop-structured-dns-error.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-dnsop-structured-dns-error/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        dnsop Working Group mailing list (<eref target="mailto:dnsop@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/dnsop/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/dnsop/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-wg-dnsop/draft-ietf-dnsop-structured-dns-error"/>.</t>
    </note>
  </front>
  <middle>
    <?line 95?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>DNS filters are deployed for a variety of reasons, e.g., endpoint
security, parental filtering, and filtering required by law
enforcement. Network-based security solutions such as firewalls and
Intrusion Prevention Systems (IPS) rely upon network traffic
inspection to implement perimeter-based security policies and operate
by filtering DNS responses. In a home network, DNS filtering is used for the
same reasons as above and additionally for parental control. Internet
Service Providers (ISPs) typically block access to some DNS domains due to a
requirement imposed by an external entity (e.g., law enforcement
agency) also performed using DNS-based content filtering.</t>
      <t>End-users or network administrators leveraging DNS services that perform filtering may wish to receive more
explanatory information about such a filtering to resolve problems with the filter
-- for example to contact the DNS service administrator to allowlist a DNS domain that
was erroneously filtered or to understand the reason a particular
domain was filtered. With that information, they can choose
to use another network, open a trouble ticket with the DNS service administrator to
resolve erroneous filtering, log the information, etc.</t>
      <t>For the DNS filtering mechanisms described in <xref target="existing-techniques"/>, the DNS
server can return extended error codes Blocked, Filtered, or
Forged Answer defined in <xref section="4" sectionFormat="of" target="RFC8914"/>. However, these codes
only explain that filtering occurred but lack detail for the user to
diagnose erroneous filterings.</t>
      <t>No matter which type of response is generated (forged IP address(es),
NXDOMAIN or empty answer, even with an extended error code), the user
who triggered the DNS query has little chance to understand which
entity filtered the query, how to report a mistake in the filter, or
why the entity filtered it at all. This document describes a mechanism
to provide such detail.</t>
      <t>One of the other benefits of the approach described in this document is to eliminate the need to
"spoof" block pages for HTTPS resources. This is achieved since
clients implementing this approach would be able to display a
meaningful error message, and would not need to connect to such a
block page. This approach thus avoids the need to install a local root
certificate authority on those IT-managed devices.</t>
      <t>This document describes a format for computer-parsable data in the
EXTRA-TEXT field of <xref target="RFC8914"/>. It updates <xref section="2" sectionFormat="of" target="RFC8914"/> which
says the information in EXTRA-TEXT field is intended for human
consumption (not automated parsing).</t>
      <t>This document does not recommend DNS filtering but provides a
mechanism for better transparency to explain to the users why some DNS
queries are filtered.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document uses terms defined in DNS Terminology <xref target="RFC9499"/>.</t>
      <t>"Requestor" refers to the side that sends a request. "Responder"
refers to an authoritative, recursive resolver, or other DNS component
that responds to questions.</t>
      <t>"Encrypted DNS" refers to any encrypted scheme to convey DNS messages,
for example, DNS-over-HTTPS <xref target="RFC8484"/>, DNS-over-TLS <xref target="RFC7858"/>, or
DNS-over-QUIC <xref target="RFC9250"/>.</t>
      <t>The document refers to an Extended DNS Error (EDE) using its purpose, not its
INFO-CODE as per Table 3 of <xref target="RFC8914"/>. "Forged Answer",
"Blocked", and "Filtered" are thus used to refer to "Forged Answer (4)",
"Blocked (15)", and "Filtered (17)".</t>
      <t>The term "DNS server" refers to a DNS recursive resolver or
a DNS forwarder that generates DNS structured error responses.</t>
    </section>
    <section anchor="existing-techniques">
      <name>DNS Filtering Techniques and Their Limitations</name>
      <t>DNS responses can be filtered by sending, e.g., a bogus (also called
"forged") response, NXDOMAIN error, or empty answer. Also, clients can be informed that filtering has occured by sending an
Extended DNS Error code defined in <xref target="RFC8914"/>. Each of these
methods have advantages and disadvantages that are discussed below:</t>
      <ol spacing="normal" type="1"><li>
          <t>The DNS response is forged to provide a list of IP addresses that
points to an HTTP(S) server alerting the end user about the reason for
blocking access to the requested domain (e.g., malware). If the authority component
of an HTTP(S) URL is blocked, the network security device
(e.g., Customer Premises Equipment (CPE) or firewall) presents a block page instead of the HTTP
response from the content provider hosting that domain. If the authority component
of an HTTP URL is blocked, the network security device intercepts
the HTTP request and returns a block page over HTTP. If the authority component
of an HTTPS URL is blocked, the network security device serves the block page over HTTPS.
In order to return a block page over HTTPS, the network security device uses a locally
generated root certificate and corresponding key pair. The local root certificate is
installed on the endpoint while the network security device stores a copy of the private key.
During the TLS handshake, the on-path network security device modifies the certificate
provided by the server and (re)signs it using the private key from the local root
certificate.  </t>
          <ul spacing="normal">
            <li>
              <t>However, in deployments where DNSSEC is used, this approach becomes ineffective because DNSSEC
ensures the integrity and authenticity of DNS responses, preventing forged DNS
responses from being accepted.</t>
            </li>
            <li>
              <t>The HTTPS server hosted on the network security device will have access to the client's IP address and the
hostname being requested. This information will be sensitive, as it will expose the user's identity and the
domain name that a user attempted to access.</t>
            </li>
            <li>
              <t>Configuring a local root certificate on endpoints is
not a viable option in several deployments like home networks,
schools, Small Office/Home Office (SOHO), or Small/Medium
Enterprise (SME). In these cases, the typical behavior is that
the filtered DNS response points to a server that will display
the block page. If the client is using HTTPS (via a web browser or
another application) this results in a certificate validation
error which gives no information to the end-user about the reason
for the DNS filtering.</t>
            </li>
            <li>
              <t>Enterprise networks do not always assume that all the connected devices
are managed by the IT team or Mobile Device Management (MDM)
devices, especially in the quite common Bring Your Own Device
(BYOD) scenario. In addition, the local root certificate cannot
be installed on IoT devices without a device management tool.</t>
            </li>
            <li>
              <t>An end user does not know why the connection was prevented and,
consequently, may repeatedly try to reach the domain but with no
success. Frustrated, the end user may switch to an alternate
network that offers no DNS filtering against malware and
phishing, potentially compromising both security and
privacy. Furthermore, certificate errors train users to click
through certificate errors, which is a bad security practice. To
eliminate the need for an end user to click through certificate
errors, an end user may manually install a local root certificate
on a host device. Doing so, however, is also a bad security
practice as it creates a security vulnerability that may be
exploited by a MITM attack. When a manually installed local root
certificate expires, the user has to (again) manually install the
new local root certificate.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>The DNS response is forged to provide an NXDOMAIN answer, causing the DNS lookup to fail. This approach is incompatible with DNSSEC when the client performs validation, as the forged response will fail DNSSEC checks. However, in deployments where the client relies on the DNS server to perform DNSSEC validation, a filtering DNS server can forge an NXDOMAIN response for a valid domain, and the client will trust it. This undermines the integrity guarantees of DNSSEC, as the client has no way to distinguish between a genuine and a forged response. Further, the end user may not understand why a domain cannot be reached and may repeatedly attempt access without success. Frustrated, the user may resort to using insecure methods to reach the domain, potentially compromising both security and privacy.</t>
        </li>
        <li>
          <t>The extended error codes Blocked and Filtered defined in
<xref section="4" sectionFormat="of" target="RFC8914"/> can be returned by a DNS server to provide
additional information about the cause of a DNS error.
These extended error codes do not suffer from the limitations
discussed in bullets (1) and (2), but the user still does not know the
exact reason nor is aware of the exact entity blocking the
access to the domain. For example, a DNS server may block access to a
domain based on the content category such as "Malware" to protect the
endpoint from malicious software, "Phishing" to prevent the user from
revealing sensitive information to the attacker, etc. A user may need to
know the contact details of the IT/InfoSec team to raise a complaint.</t>
        </li>
      </ol>
    </section>
    <section anchor="name-spec">
      <name>I-JSON in EXTRA-TEXT Field</name>
      <t>DNS servers that are compliant with this specification and have received an indication that the client also supports this specification as per <xref target="client-request"/> send data in the EXTRA-TEXT field <xref target="RFC8914"/> encoded using the Internet JSON (I-JSON)
message format <xref target="RFC7493"/>.</t>
      <ul empty="true">
        <li>
          <t>Note that <xref target="RFC7493"/> was based on <xref target="RFC7159"/>, but <xref target="RFC7159"/> was replaced by <xref target="RFC8259"/>.</t>
        </li>
      </ul>
      <t>This document defines the following JSON names:</t>
      <dl>
        <dt>c: (contact)</dt>
        <dd>
          <t>The contact details of the IT/InfoSec team to report mis-classified
DNS filtering. This information is important for transparency and also to ease unblocking a legitimate domain name that got blocked due to wrong classification.</t>
        </dd>
        <dt/>
        <dd>
          <t>This field is structured as an array of contact URIs that <bcp14>MUST</bcp14> use 'tel' <xref target="RFC3966"/> or 'sips' <xref target="RFC5630"/> or  'mailto' <xref target="RFC3966"/> schemes. At least one contact URI <bcp14>MUST</bcp14> be included.</t>
        </dd>
        <dt/>
        <dd>
          <t>New contact URI schemes may be added to the IANA registry following the instructions in <xref target="IANA-Contact"/>.</t>
        </dd>
        <dt/>
        <dd>
          <t>This field is mandatory.</t>
        </dd>
        <dt>j: (justification)</dt>
        <dd>
          <t>'UTF-8'-encoded <xref target="RFC5198"/> textual justification for this particular
DNS filtering. The field should be treated only as diagnostic
information for IT staff.</t>
        </dd>
        <dt/>
        <dd>
          <t>Whether the information provided in the "j" name is meaningful or considered as garbage data
(including empty values) is local to each IT teams. Returning garbage data
would indicate that a DNS server is misbehaving. Note also that the provided
justification is useful for cross-validation with another DNS server.</t>
        </dd>
        <dt/>
        <dd>
          <t>This field is mandatory.</t>
        </dd>
        <dt>s: (sub-error)</dt>
        <dd>
          <t>An integer representing the sub-error code for this particular DNS filtering case.</t>
        </dd>
        <dt/>
        <dd>
          <t>The integer values are defined in the IANA-managed registry for DNS Sub-Error Codes in <xref target="IANA-SubError"/>.</t>
        </dd>
        <dt/>
        <dd>
          <t>This field is optional.</t>
        </dd>
        <dt>o: (organization)</dt>
        <dd>
          <t>'UTF-8'-encoded human-friendly name of the organization that filtered this particular DNS query.</t>
        </dd>
        <dt/>
        <dd>
          <t>This field is optional.</t>
        </dd>
        <dt>l: (language)</dt>
        <dd>
          <t>The "l" field indicates the language used for the JSON-encoded "j" and "o" fields.  The value of this field <bcp14>MUST</bcp14> conform to the
language tag syntax specified in <xref section="2.1" sectionFormat="of" target="RFC5646"/>.</t>
        </dd>
        <dt/>
        <dd>
          <t>This field is optional but <bcp14>RECOMMENDED</bcp14> to aid in localization.</t>
        </dd>
      </dl>
      <t>New JSON names can be defined in the IANA registry introduced in <xref target="IANA-Names"/>. Such names <bcp14>MUST</bcp14>
consist only of lower-case ASCII characters, digits, and hyphen-minus (that
is, Unicode characters U+0061 through 007A, U+0030 through U+0039, and
U+002D). Also, these names <bcp14>MUST</bcp14> be 63 characters or shorter and it is
<bcp14>RECOMMENDED</bcp14> they be as short as possible.</t>
      <t>The text in the "j" and "o" names can include international
characters. The text will be in natural language, chosen by the DNS administrator
to match its expected audience. If the text is provided in a language not known to the end-user,
the client can use the "l" (language) field to identify the language of the text
and translate it to the user's preferred language.</t>
      <t>To reduce DNS message size the generated JSON <bcp14>SHOULD</bcp14> be as short as
possible: short domain names, concise text in the values for the "j"
and "o" names, and minified JSON (that is, without spaces or line
breaks between JSON elements).</t>
      <t>The JSON data can be parsed to display to the user, logged, or
otherwise used to assist the end-user or IT staff with troubleshooting
and diagnosing the cause of the DNS filtering.</t>
      <t>The sub-error codes provide a structured way to communicate more detailed and precise communication of the cause of an error (e.g., distinguishing between malware-related blocking and phishing-related blocking under the general blocked error).</t>
      <ul empty="true">
        <li>
          <t>An alternate design for conveying the sub-error would be to define new EDE codes for these errors. However, such design is suboptimal because it requires replicating an error code for each EDE code to which the sub-error applies (e.g., "Malware" sub-error in <xref target="reg"/> would consume three EDE codes).</t>
        </li>
      </ul>
    </section>
    <section anchor="protocol-operation">
      <name>Protocol Operation</name>
      <section anchor="client-request">
        <name>Client Generating Request</name>
        <t>When generating a DNS query the client includes the EDE option (<xref section="2" sectionFormat="of" target="RFC8914"/>) in the OPT pseudo-RR <xref target="RFC6891"/> to
elicit the EDE option in the DNS response. It <bcp14>MUST</bcp14> use an
OPTION-LENGTH of 2, the INFO-CODE field set to "0"
(Other Error), and an empty EXTRA-TEXT field.  This signal indicates
that the client desires that the server responds in accordance with
the present specification.</t>
      </section>
      <section anchor="server-response">
        <name>Server Generating Response</name>
        <t>When the DNS server filters its DNS response to a
query (e.g., A or AAAA resource record query), the DNS response <bcp14>MAY</bcp14> contain an empty answer, NXDOMAIN, or (less
ideally) forged response, as desired by the DNS
server. In addition, if the query contained the OPT pseudo-RR the DNS
server <bcp14>MAY</bcp14> return more detail in the EXTRA-TEXT field as described in
<xref target="client-processing"/>.</t>
        <t>Servers <bcp14>MAY</bcp14> decide to return small TTL values in filtered DNS
responses (e.g., 10 seconds) to handle domain category and reputation
updates. Short TTLs allow for quick adaptation to dynamic changes in domain filtering decisions,
but can result in increased query traffic. In cases where updates are less frequent,
TTL values of 30 to 60 seconds <bcp14>MAY</bcp14> provide a better balance, reducing server load while
still ensuring reasonable flexibility for updates.</t>
        <t>Because the DNS client signals its EDE support (<xref target="client-request"/>)
and because EDE support is signaled via a non-cached OPT resource
record (<xref section="6.2.1" sectionFormat="of" target="RFC6891"/>) the EDE-aware DNS server can
tailor its filtered response to be most appropriate to that client's
EDE support.  If EDE support is signaled in the query as per <xref target="client-request"/>, the server <bcp14>MUST
NOT</bcp14> return the "Forged Answer" extended error code because the client
can take advantage of EDE's more sophisticated error reporting (e.g.,
"Filtered", "Blocked").  Continuing to send "Forged
Answer" even to an EDE-supporting client will cause the persistence of
the drawbacks described in <xref target="existing-techniques"/>.</t>
      </section>
      <section anchor="client-processing">
        <name>Client Processing Response</name>
        <t>On receipt of a DNS response with an EDE option from a
DNS responder, the following ordered actions are performed on the EXTRA-TEXT
field:</t>
        <ol spacing="normal" type="1"><li>
            <t>Servers which don't support this specification might use plain text
in the EXTRA-TEXT field. Requestors <bcp14>SHOULD</bcp14> properly handle
both plaintext and JSON text in the EXTRA-TEXT field. The requestor verifies that
the field contains valid JSON. If not, the requestor <bcp14>MUST</bcp14> consider
the server does not support this specification and stop processing
rest of the actions defined in this section, but may instead choose
to treat EXTRA-TEXT as per <xref target="RFC8914"/>.</t>
          </li>
          <li>
            <t>The response <bcp14>MUST</bcp14> be received over an encrypted DNS channel. If not,
the requestor <bcp14>MUST</bcp14> discard data in the EXTRA-TEXT field.</t>
          </li>
          <li>
            <t>The DNS response <bcp14>MUST</bcp14> also contain an extended error code of
"Blocked by Upstream Server", "Blocked" or "Filtered" <xref target="RFC8914"/>, otherwise
the EXTRA-TEXT field is discarded.</t>
          </li>
          <li>
            <t>If either of the mandatory JSON names "c" and "j" are missing or
have empty values in the EXTRA-TEXT field, the entire JSON is
discarded.</t>
          </li>
          <li>
            <t>If the "c" field contains any URI scheme not registered in the
<xref target="IANA-Contact"/> registry, that field <bcp14>MUST</bcp14> be discarded.</t>
          </li>
          <li>
            <t>If a DNS client has enabled opportunistic privacy profile (<xref section="5" sectionFormat="of" target="RFC8310"/>) for DoT, the DNS client will either fall back to an
encrypted connection without authenticating the DNS server provided
by the local network or fall back to clear text DNS, and cannot
exchange encrypted DNS messages. Both of these fallback mechanisms
adversely impact security and privacy. If the DNS client has enabled
opportunistic privacy profile for DoT and the identity of the DNS server
cannot be verified but the connection is encrypted, the DNS client <bcp14>MUST</bcp14>
ignore the "c", "j", and "o" fields but <bcp14>MAY</bcp14> process the "s" field
and other parts of the response.</t>
          </li>
          <li>
            <t>Opportunistic discovery <xref target="RFC9462"/>, where only the IP address is
validated, the DNS client <bcp14>MUST</bcp14> ignore the "c", "j", and "o" fields
but <bcp14>MAY</bcp14> process the "s" field and other parts of the response.</t>
          </li>
          <li>
            <t>If a DNS client has enabled strict privacy profile (<xref section="5" sectionFormat="of" target="RFC8310"/>) for DoT, the DNS client
requires an encrypted connection
  and successful authentication of the DNS server. In doing so, this mitigates both
  passive eavesdropping and client redirection (at the expense of
  providing no DNS service if an encrypted, authenticated connection
  is not available). If the DNS client has enabled strict privacy
  profile for DoT, the DNS client <bcp14>MAY</bcp14> process the EXTRA-TEXT field of the
  DNS response.</t>
          </li>
          <li>
            <t>The DNS client <bcp14>MUST</bcp14> ignore any other JSON names that it does not support.</t>
          </li>
        </ol>
        <ul empty="true">
          <li>
            <t>Note that the strict and opportunistic privacy profiles as defined in <xref target="RFC8310"/> only apply to DoT; there has been
no such distinction made for DoH.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="deployment-considerations">
      <name>Deployment Considerations</name>
      <t>When a forwarder receives an EDE option, whether or not (and how) to pass along JSON information in the
EXTRA-TEXT field to its client is implementation-dependent <xref target="RFC5625"/>. Implementations <bcp14>MAY</bcp14> choose not to
forward the JSON information, or they <bcp14>MAY</bcp14> choose to create a new EDE option that conveys the information in the
"c", "s", and "j" fields encoded in the JSON object.</t>
      <t>The application that triggered the DNS request may have a local policy to override the contact information (e.g.,
redirect all complaint calls to a single contact point). In such cases, the content of the "c" attribute <bcp14>MAY</bcp14> be
ignored.</t>
    </section>
    <section anchor="new-sub-error-codes-definition">
      <name>New Sub-Error Codes Definition</name>
      <t>The document defines the following new IANA-registered Sub-Error codes.</t>
      <section anchor="policy-reserved">
        <name>Reserved</name>
        <ul spacing="normal">
          <li>
            <t>Number: 0</t>
          </li>
          <li>
            <t>Meaning: Reserved. This sub-error code value <bcp14>MUST NOT</bcp14> be sent. If received, it has no meaning.</t>
          </li>
          <li>
            <t>Applicability: This code should never be used.</t>
          </li>
          <li>
            <t>Reference: This-Document</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
        </ul>
      </section>
      <section anchor="policy-network">
        <name>Network Operator Policy</name>
        <ul spacing="normal">
          <li>
            <t>Number: 5</t>
          </li>
          <li>
            <t>Meaning: Network Operator Policy. The code indicates that the request was filtered according to a policy imposed by the operator of the local network (where local network is a relative term, e.g., it may refer to a Local Area Network or to the network of the ISP selected by the user).</t>
          </li>
          <li>
            <t>Applicability: Blocked</t>
          </li>
          <li>
            <t>Reference: This-Document</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
        </ul>
      </section>
      <section anchor="policy-dns">
        <name>DNS Operator Policy</name>
        <ul spacing="normal">
          <li>
            <t>Number: 6</t>
          </li>
          <li>
            <t>Meaning: DNS Operator Policy. The code indicates that the request was filtered according to policy determined by the operator of the DNS server. This is different from the "Network Operator Policy" code when a third-party DNS resolver is used.</t>
          </li>
          <li>
            <t>Applicability: Blocked</t>
          </li>
          <li>
            <t>Reference:  This-Document</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="extended-dns-error-code-tba1-blocked-by-upstream-dns-server">
      <name>Extended DNS Error Code TBA1 - Blocked by Upstream DNS Server</name>
      <t>The DNS server (e.g., a DNS forwarder) is unable to respond to the request
because the domain is on a blocklist due to an internal security policy
imposed by an upstream DNS server. This error code
is useful in deployments where a network-provided DNS forwarder
is configured to use an external resolver that filters malicious
domains. Typically, when the DNS forwarder receives a Blocked (15) error code from the upstream DNS server, it will replace it with "Blocked by Upstream DNS Server" (TBA1) before forwarding the reply to the DNS client. Additionally, the EXTRA-TEXT field is forwarded to the DNS client.</t>
    </section>
    <section anchor="examples">
      <name>Examples</name>
      <t>An example showing the nameserver at 'ns.example.net' that filtered a
DNS "A" record query for 'example.org' is provided in <xref target="example-json"/>.</t>
      <figure anchor="example-json">
        <name>JSON Returned in EXTRA-TEXT Field of Extended DNS Error Response</name>
        <artwork><![CDATA[
{
  "c": [
    "tel:+358-555-1234567",
    "sips:bob@bobphone.example.com"
  ],
  "j": "malware present for 23 days",
  "s": 1,
  "o": "example.net Filtering Service",
  "l": "tzm"
}
]]></artwork>
      </figure>
      <t>In <xref target="example-json-minified"/> the same content is shown with minified JSON (no
whitespace, no blank lines) with <tt>'\'</tt> line wrapping per <xref target="RFC8792"/>.</t>
      <figure anchor="example-json-minified">
        <name>Minified Response</name>
        <artwork><![CDATA[
{ "c":["tel:+358-555-1234567","sips:bob@bobphone.example.com"],\
"j":"malware present for 23 days",\
"s":1,\
"o":"example.net Filtering Service",\
"l":"tzm" }
]]></artwork>
      </figure>
    </section>
    <section anchor="security">
      <name>Security Considerations</name>
      <t>Security considerations in <xref section="6" sectionFormat="of" target="RFC8914"/> apply to this
document, except the guard against using EDE content to alter DNS protocol
processing. The guard is relaxed in the current specification as it mandates
encryption and recommends the use of an authenticated connection to the DNS
server, while <xref target="RFC8914"/> assumes that EDE information is unauthenticated
and sent over clear text.</t>
      <t>To minimize impact of active on-path attacks on the DNS channel, the
client validates the response as described in <xref target="client-processing"/>.</t>
      <t>A client might choose to display the information in the "c", "j", and
"o" fields if and only if the encrypted resolver has sufficient
reputation, according to some local policy (e.g., user configuration,
administrative configuration, or a built-in list of respectable
resolvers). This limits the ability of a malicious encrypted resolver
to cause harm. For example, an end user can use the details in the "c" field to contact an attacker
to solve the problem of being unable to reach a domain. The attacker can mislead the end user to
install malware or spyware to compromise the device security posture or mislead the end user to reveal
personal data.
If the client decides not to display all of the
information in the EXTRA-TEXT field, it can be logged for diagnostics
purpose and the client can only display the resolver hostname that
blocked the domain, error description for the EDE code and the
sub-error description for the "s" field to the end-user.</t>
      <t>When displaying the free-form text of "j" and "o", the browser <bcp14>MUST
NOT</bcp14> make any of those elements into actionable (clickable) links and these
fields need to be rendered as text, not as HTML. The contact details of "c" can be made
into clickable links to provide a convenient way for users to initiate, e.g., voice calls. The client might
choose to display the contact details only when the identity of the DNS server is verified.</t>
      <t>An attacker might inject (or modify) the EDE EXTRA-TEXT field with a
DNS proxy or DNS forwarder that is unaware of EDE. Such a DNS proxy or
DNS forwarder will forward that attacker-controlled EDE option.  To
prevent such an attack, clients can be configured to process EDE from
explicitly configured DNS servers or utilize RESINFO
<xref target="RFC9606"/>.</t>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This document requests four IANA actions as described in the following subsections.</t>
      <ul empty="true">
        <li>
          <t>Note to the RFC Editor: Please replace RFCXXXX with the RFC number assigned to this document and "TBA1" with the value assigned by IANA.</t>
        </li>
      </ul>
      <section anchor="IANA-Names">
        <name>New Registry for JSON Names</name>
        <t>This document requests IANA to create a new registry, entitled "EXTRA-TEXT JSON Names"
under "Domain Name System (DNS) Parameters, Extended DNS Error Codes"
registry <xref target="IANA-DNS"/>. The registration request for a new JSON name must include the
following fields:</t>
        <dl>
          <dt>JSON Name:</dt>
          <dd>
            <t>Specifies the name of an attribute that is present in the JSON data enclosed in EXTRA-TEXT field. The name must follow the guidelines in <xref target="name-spec"/>.</t>
          </dd>
          <dt>Field Meaning:</dt>
          <dd>
            <t>Provides a brief, human-readable label summarizing the purpose of the JSON attribute.</t>
          </dd>
          <dt>Short description:</dt>
          <dd>
            <t>Includes a short description of the requested JSON name.</t>
          </dd>
          <dt>Mandatory (Y/N?):</dt>
          <dd>
            <t>Indicates whether this attribute is mandatory or optional.</t>
          </dd>
          <dt>Specification:</dt>
          <dd>
            <t>Provides a pointer to the reference document that specifies the attribute.</t>
          </dd>
        </dl>
        <t>The registry is initially populated with the following values:</t>
        <table anchor="reg-names">
          <name>Initial JSON Names Registry</name>
          <thead>
            <tr>
              <th align="center">JSON Name</th>
              <th align="left">Field Meaning</th>
              <th align="left">Description</th>
              <th align="left">Mandatory</th>
              <th align="center">Specification</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="center">c</td>
              <td align="left">contact</td>
              <td align="left">The contact details of the IT/InfoSec team to report mis-classified DNS filtering</td>
              <td align="left">Y</td>
              <td align="center">
                <xref target="name-spec"/> of RFCXXXX</td>
            </tr>
            <tr>
              <td align="center">j</td>
              <td align="left">justification</td>
              <td align="left">UTF-8-encoded <xref target="RFC5198"/> textual justification for a particular DNS filtering</td>
              <td align="left">Y</td>
              <td align="center">
                <xref target="name-spec"/> of RFCXXXX</td>
            </tr>
            <tr>
              <td align="center">s</td>
              <td align="left">sub-error</td>
              <td align="left">Integer representing the sub-error code for this DNS filtering case</td>
              <td align="left">N</td>
              <td align="center">
                <xref target="name-spec"/> of RFCXXXX</td>
            </tr>
            <tr>
              <td align="center">o</td>
              <td align="left">organization</td>
              <td align="left">UTF-8-encoded human-friendly name of the organization that filtered this particular DNS query</td>
              <td align="left">N</td>
              <td align="center">
                <xref target="name-spec"/> of RFCXXXX</td>
            </tr>
            <tr>
              <td align="center">l</td>
              <td align="left">language</td>
              <td align="left">Indicates the language of the "j" and "o" fields as defined in <xref target="RFC5646"/></td>
              <td align="left">No</td>
              <td align="center">
                <xref target="name-spec"/> of RFCXXXX</td>
            </tr>
          </tbody>
        </table>
        <t>New JSON names are registered via IETF Review (<xref section="4.8" sectionFormat="of" target="RFC8126"/>).</t>
      </section>
      <section anchor="IANA-Contact">
        <name>New Registry for Contact URI Scheme</name>
        <t>This document requests IANA to create a new registry, entitled "Contact URI Schemes"
under "Domain Name System (DNS) Parameters, Extended DNS Error Codes"
registry <xref target="IANA-DNS"/>. The registration request for a new Contact URI scheme has to include the
following fields:</t>
        <ul spacing="normal">
          <li>
            <t>Name: URI scheme name.</t>
          </li>
          <li>
            <t>Meaning: Provides a short description of the scheme.</t>
          </li>
          <li>
            <t>Reference: Provides a pointer to an IETF-approved specification that defines
the URI scheme.</t>
          </li>
          <li>
            <t>Change Controller: Indicates the person or entity, with contact information if appropriate.</t>
          </li>
        </ul>
        <t>The Contact URI scheme registry is initially be populated with the
following schemes:</t>
        <table>
          <thead>
            <tr>
              <th align="center">Name</th>
              <th align="left">Meaning</th>
              <th align="center">Reference</th>
              <th align="center">Change Controller</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="center">sips</td>
              <td align="left">SIP Call</td>
              <td align="center">
                <xref target="RFC5630"/></td>
              <td align="center">IETF</td>
            </tr>
            <tr>
              <td align="center">tel</td>
              <td align="left">Telephone Number</td>
              <td align="center">
                <xref target="RFC3966"/></td>
              <td align="center">IETF</td>
            </tr>
            <tr>
              <td align="center">mailto</td>
              <td align="left">Internet mail</td>
              <td align="center">
                <xref target="RFC6068"/></td>
              <td align="center">IETF</td>
            </tr>
          </tbody>
        </table>
        <t>New Contact URI schemes are registered via IETF Review (<xref section="4.8" sectionFormat="of" target="RFC8126"/>).</t>
      </section>
      <section anchor="IANA-SubError">
        <name>New Registry for DNS Sub-Error Codes</name>
        <t>This document requests IANA to create a new registry, entitled "Sub-Error Codes"
under "Domain Name System (DNS) Parameters, Extended DNS Error Codes"
registry <xref target="IANA-DNS"/>. The registration request for a new sub-error codes <bcp14>MUST</bcp14> include the
following fields:</t>
        <ul spacing="normal">
          <li>
            <t>Number: Is the wire format sub-error code (range 0-255).</t>
          </li>
          <li>
            <t>Meaning: Provides a short description of the sub-error.</t>
          </li>
          <li>
            <t>Applicability: Indicates which Extended DNS Error (EDE) Codes apply to this sub-error code.</t>
          </li>
          <li>
            <t>Reference: Provides a pointer to an IETF-approved specification that registered
the code and/or an authoritative specification that describes the
meaning of this code.</t>
          </li>
          <li>
            <t>Change Controller: Indicates the person or entity, with contact information if appropriate.</t>
          </li>
        </ul>
        <t>The Sub-Error Code registry is initially be populated with the
following values:</t>
        <table anchor="reg">
          <name>Initial Sub-Error Code Registry</name>
          <thead>
            <tr>
              <th align="center">Number</th>
              <th align="left">Meaning</th>
              <th align="left">EDE Codes Applicability</th>
              <th align="left">Reference</th>
              <th align="center">Change Controller</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="center">0</td>
              <td align="left">Reserved</td>
              <td align="left">Not used</td>
              <td align="left">
                <xref target="policy-reserved"/> of this document</td>
              <td align="center">IETF</td>
            </tr>
            <tr>
              <td align="center">1</td>
              <td align="left">Malware</td>
              <td align="left">"Blocked", "Blocked by Upstream Server", "Filtered"</td>
              <td align="left">Section 5.5 of <xref target="RFC5901"/></td>
              <td align="center">IETF</td>
            </tr>
            <tr>
              <td align="center">2</td>
              <td align="left">Phishing</td>
              <td align="left">"Blocked", "Blocked by Upstream Server", "Filtered"</td>
              <td align="left">Section 5.5 of <xref target="RFC5901"/></td>
              <td align="center">IETF</td>
            </tr>
            <tr>
              <td align="center">3</td>
              <td align="left">Spam</td>
              <td align="left">"Blocked", "Blocked by Upstream Server", "Filtered"</td>
              <td align="left">Page 289 of <xref target="RFC4949"/></td>
              <td align="center">IETF</td>
            </tr>
            <tr>
              <td align="center">4</td>
              <td align="left">Spyware</td>
              <td align="left">"Blocked", "Blocked by Upstream Server", "Filtered"</td>
              <td align="left">Page 291 of <xref target="RFC4949"/></td>
              <td align="center">IETF</td>
            </tr>
            <tr>
              <td align="center">5</td>
              <td align="left">Network operator policy</td>
              <td align="left">"Blocked"</td>
              <td align="left">
                <xref target="policy-network"/> of this document</td>
              <td align="center">IETF</td>
            </tr>
            <tr>
              <td align="center">6</td>
              <td align="left">DNS operator policy</td>
              <td align="left">"Blocked"</td>
              <td align="left">
                <xref target="policy-dns"/> of this document</td>
              <td align="center">IETF</td>
            </tr>
          </tbody>
        </table>
        <t>New Sub-Error Codes are registered via IETF Review (<xref section="4.8" sectionFormat="of" target="RFC8126"/>).</t>
      </section>
      <section anchor="new-extended-dns-error-code">
        <name>New Extended DNS Error Code</name>
        <t>IANA is requested to assign the following Extended DNS Error code from the "Domain Name System (DNS) Parameters, Extended DNS Error Codes"
registry <xref target="IANA-DNS"/>:</t>
        <table anchor="reg-ede">
          <name>New DNS Error Code</name>
          <thead>
            <tr>
              <th align="center">INFO-CODE</th>
              <th align="left">Purose</th>
              <th align="center">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="center">TBA1</td>
              <td align="left">Blocked by Upstream Server</td>
              <td align="center">RFCXXXX</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8914">
          <front>
            <title>Extended DNS Errors</title>
            <author fullname="W. Kumari" initials="W." surname="Kumari"/>
            <author fullname="E. Hunt" initials="E." surname="Hunt"/>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="W. Hardaker" initials="W." surname="Hardaker"/>
            <author fullname="D. Lawrence" initials="D." surname="Lawrence"/>
            <date month="October" year="2020"/>
            <abstract>
              <t>This document defines an extensible method to return additional information about the cause of DNS errors. Though created primarily to extend SERVFAIL to provide additional information about the cause of DNS and DNSSEC failures, the Extended DNS Errors option defined in this document allows all response types to contain extended error information. Extended DNS Error information does not change the processing of RCODEs.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8914"/>
          <seriesInfo name="DOI" value="10.17487/RFC8914"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC7493">
          <front>
            <title>The I-JSON Message Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="March" year="2015"/>
            <abstract>
              <t>I-JSON (short for "Internet JSON") is a restricted profile of JSON designed to maximize interoperability and increase confidence that software can process it successfully with predictable results.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7493"/>
          <seriesInfo name="DOI" value="10.17487/RFC7493"/>
        </reference>
        <reference anchor="RFC7159">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="March" year="2014"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7159"/>
          <seriesInfo name="DOI" value="10.17487/RFC7159"/>
        </reference>
        <reference anchor="RFC3966">
          <front>
            <title>The tel URI for Telephone Numbers</title>
            <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
            <date month="December" year="2004"/>
            <abstract>
              <t>This document specifies the URI (Uniform Resource Identifier) scheme "tel". The "tel" URI describes resources identified by telephone numbers. This document obsoletes RFC 2806. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3966"/>
          <seriesInfo name="DOI" value="10.17487/RFC3966"/>
        </reference>
        <reference anchor="RFC5630">
          <front>
            <title>The Use of the SIPS URI Scheme in the Session Initiation Protocol (SIP)</title>
            <author fullname="F. Audet" initials="F." surname="Audet"/>
            <date month="October" year="2009"/>
            <abstract>
              <t>This document provides clarifications and guidelines concerning the use of the SIPS URI scheme in the Session Initiation Protocol (SIP). It also makes normative changes to SIP. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5630"/>
          <seriesInfo name="DOI" value="10.17487/RFC5630"/>
        </reference>
        <reference anchor="RFC5198">
          <front>
            <title>Unicode Format for Network Interchange</title>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <author fullname="M. Padlipsky" initials="M." surname="Padlipsky"/>
            <date month="March" year="2008"/>
            <abstract>
              <t>The Internet today is in need of a standardized form for the transmission of internationalized "text" information, paralleling the specifications for the use of ASCII that date from the early days of the ARPANET. This document specifies that format, using UTF-8 with normalization and specific line-ending sequences. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5198"/>
          <seriesInfo name="DOI" value="10.17487/RFC5198"/>
        </reference>
        <reference anchor="RFC5646">
          <front>
            <title>Tags for Identifying Languages</title>
            <author fullname="A. Phillips" initials="A." role="editor" surname="Phillips"/>
            <author fullname="M. Davis" initials="M." role="editor" surname="Davis"/>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the structure, content, construction, and semantics of language tags for use in cases where it is desirable to indicate the language used in an information object. It also describes how to register values for use in language tags and the creation of user-defined extensions for private interchange. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="47"/>
          <seriesInfo name="RFC" value="5646"/>
          <seriesInfo name="DOI" value="10.17487/RFC5646"/>
        </reference>
        <reference anchor="RFC6891">
          <front>
            <title>Extension Mechanisms for DNS (EDNS(0))</title>
            <author fullname="J. Damas" initials="J." surname="Damas"/>
            <author fullname="M. Graff" initials="M." surname="Graff"/>
            <author fullname="P. Vixie" initials="P." surname="Vixie"/>
            <date month="April" year="2013"/>
            <abstract>
              <t>The Domain Name System's wire protocol includes a number of fixed fields whose range has been or soon will be exhausted and does not allow requestors to advertise their capabilities to responders. This document describes backward-compatible mechanisms for allowing the protocol to grow.</t>
              <t>This document updates the Extension Mechanisms for DNS (EDNS(0)) specification (and obsoletes RFC 2671) based on feedback from deployment experience in several implementations. It also obsoletes RFC 2673 ("Binary Labels in the Domain Name System") and adds considerations on the use of extended labels in the DNS.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="75"/>
          <seriesInfo name="RFC" value="6891"/>
          <seriesInfo name="DOI" value="10.17487/RFC6891"/>
        </reference>
        <reference anchor="RFC8310">
          <front>
            <title>Usage Profiles for DNS over TLS and DNS over DTLS</title>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="D. Gillmor" initials="D." surname="Gillmor"/>
            <author fullname="T. Reddy" initials="T." surname="Reddy"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document discusses usage profiles, based on one or more authentication mechanisms, which can be used for DNS over Transport Layer Security (TLS) or Datagram TLS (DTLS). These profiles can increase the privacy of DNS transactions compared to using only cleartext DNS. This document also specifies new authentication mechanisms -- it describes several ways that a DNS client can use an authentication domain name to authenticate a (D)TLS connection to a DNS server. Additionally, it defines (D)TLS protocol profiles for DNS clients and servers implementing DNS over (D)TLS. This document updates RFC 7858.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8310"/>
          <seriesInfo name="DOI" value="10.17487/RFC8310"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC6068">
          <front>
            <title>The 'mailto' URI Scheme</title>
            <author fullname="M. Duerst" initials="M." surname="Duerst"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <author fullname="J. Zawinski" initials="J." surname="Zawinski"/>
            <date month="October" year="2010"/>
            <abstract>
              <t>This document defines the format of Uniform Resource Identifiers (URIs) to identify resources that are reached using Internet mail. It adds better internationalization and compatibility with Internationalized Resource Identifiers (IRIs; RFC 3987) to the previous syntax of 'mailto' URIs (RFC 2368). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6068"/>
          <seriesInfo name="DOI" value="10.17487/RFC6068"/>
        </reference>
        <reference anchor="RFC5901">
          <front>
            <title>Extensions to the IODEF-Document Class for Reporting Phishing</title>
            <author fullname="P. Cain" initials="P." surname="Cain"/>
            <author fullname="D. Jevans" initials="D." surname="Jevans"/>
            <date month="July" year="2010"/>
            <abstract>
              <t>This document extends the Incident Object Description Exchange Format (IODEF) defined in RFC 5070 to support the reporting of phishing events, which is a particular type of fraud. These extensions are flexible enough to support information gleaned from activities throughout the entire electronic fraud cycle -- from receipt of the phishing lure to the disablement of the collection site. Both simple reporting and complete forensic reporting are possible, as is consolidating multiple incidents. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5901"/>
          <seriesInfo name="DOI" value="10.17487/RFC5901"/>
        </reference>
        <reference anchor="RFC4949">
          <front>
            <title>Internet Security Glossary, Version 2</title>
            <author fullname="R. Shirey" initials="R." surname="Shirey"/>
            <date month="August" year="2007"/>
            <abstract>
              <t>This Glossary provides definitions, abbreviations, and explanations of terminology for information system security. The 334 pages of entries offer recommendations to improve the comprehensibility of written material that is generated in the Internet Standards Process (RFC 2026). The recommendations follow the principles that such writing should (a) use the same term or definition whenever the same concept is mentioned; (b) use terms in their plainest, dictionary sense; (c) use terms that are already well-established in open publications; and (d) avoid terms that either favor a particular vendor or favor a particular technology or mechanism over other, competing techniques that already exist or could be developed. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="FYI" value="36"/>
          <seriesInfo name="RFC" value="4949"/>
          <seriesInfo name="DOI" value="10.17487/RFC4949"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="IANA-DNS" target="https://www.iana.org/assignments/dns-parameters/dns-parameters.xhtml#extended-dns-error-codes">
          <front>
            <title>Domain Name System (DNS) Parameters, Extended DNS Error Codes</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="RPZ" target="https://dnsrpz.info">
          <front>
            <title>Response Policy Zone</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="Impl-1" target="https://datatracker.ietf.org/meeting/116/materials/slides-116-dnsop-dns-errors-implementation-proposal-slides-116-dnsop-update-on-dns-errors-implementation-00">
          <front>
            <title>Use of DNS Errors To improve Browsing User Experience With network based malware protection</title>
            <author>
              <organization/>
            </author>
            <date year="2023" month="March"/>
          </front>
        </reference>
        <reference anchor="RFC9499">
          <front>
            <title>DNS Terminology</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
              <t>This document updates RFC 2308 by clarifying the definitions of "forwarder" and "QNAME". It obsoletes RFC 8499 by adding multiple terms and clarifications. Comprehensive lists of changed and new definitions can be found in Appendices A and B.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="219"/>
          <seriesInfo name="RFC" value="9499"/>
          <seriesInfo name="DOI" value="10.17487/RFC9499"/>
        </reference>
        <reference anchor="RFC8484">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="RFC7858">
          <front>
            <title>Specification for DNS over Transport Layer Security (TLS)</title>
            <author fullname="Z. Hu" initials="Z." surname="Hu"/>
            <author fullname="L. Zhu" initials="L." surname="Zhu"/>
            <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="D. Wessels" initials="D." surname="Wessels"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
              <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7858"/>
          <seriesInfo name="DOI" value="10.17487/RFC7858"/>
        </reference>
        <reference anchor="RFC9250">
          <front>
            <title>DNS over Dedicated QUIC Connections</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>This document describes the use of QUIC to provide transport confidentiality for DNS. The encryption provided by QUIC has similar properties to those provided by TLS, while QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides more efficient packet-loss recovery than UDP. DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC 7858, and latency characteristics similar to classic DNS over UDP. This specification describes the use of DoQ as a general-purpose transport for DNS and includes the use of DoQ for stub to recursive, recursive to authoritative, and zone transfer scenarios.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9250"/>
          <seriesInfo name="DOI" value="10.17487/RFC9250"/>
        </reference>
        <reference anchor="RFC8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC9462">
          <front>
            <title>Discovery of Designated Resolvers</title>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="E. Kinnear" initials="E." surname="Kinnear"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <author fullname="T. Jensen" initials="T." surname="Jensen"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document defines Discovery of Designated Resolvers (DDR), a set of mechanisms for DNS clients to use DNS records to discover a resolver's encrypted DNS configuration. An Encrypted DNS Resolver discovered in this manner is referred to as a "Designated Resolver". These mechanisms can be used to move from unencrypted DNS to encrypted DNS when only the IP address of a resolver is known. These mechanisms are designed to be limited to cases where Unencrypted DNS Resolvers and their Designated Resolvers are operated by the same entity or cooperating entities. It can also be used to discover support for encrypted DNS protocols when the name of an Encrypted DNS Resolver is known.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9462"/>
          <seriesInfo name="DOI" value="10.17487/RFC9462"/>
        </reference>
        <reference anchor="RFC5625">
          <front>
            <title>DNS Proxy Implementation Guidelines</title>
            <author fullname="R. Bellis" initials="R." surname="Bellis"/>
            <date month="August" year="2009"/>
            <abstract>
              <t>This document provides guidelines for the implementation of DNS proxies, as found in broadband gateways and other similar network devices. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="152"/>
          <seriesInfo name="RFC" value="5625"/>
          <seriesInfo name="DOI" value="10.17487/RFC5625"/>
        </reference>
        <reference anchor="RFC8792">
          <front>
            <title>Handling Long Lines in Content of Internet-Drafts and RFCs</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="E. Auerswald" initials="E." surname="Auerswald"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <date month="June" year="2020"/>
            <abstract>
              <t>This document defines two strategies for handling long lines in width-bounded text content. One strategy, called the "single backslash" strategy, is based on the historical use of a single backslash ('\') character to indicate where line-folding has occurred, with the continuation occurring with the first character that is not a space character (' ') on the next line. The second strategy, called the "double backslash" strategy, extends the first strategy by adding a second backslash character to identify where the continuation begins and is thereby able to handle cases not supported by the first strategy. Both strategies use a self-describing header enabling automated reconstitution of the original content.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8792"/>
          <seriesInfo name="DOI" value="10.17487/RFC8792"/>
        </reference>
        <reference anchor="RFC9606">
          <front>
            <title>DNS Resolver Information</title>
            <author fullname="T. Reddy.K" initials="T." surname="Reddy.K"/>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <date month="June" year="2024"/>
            <abstract>
              <t>This document specifies a method for DNS resolvers to publish information about themselves. DNS clients can use the resolver information to identify the capabilities of DNS resolvers. How DNS clients use such information is beyond the scope of this document.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9606"/>
          <seriesInfo name="DOI" value="10.17487/RFC9606"/>
        </reference>
      </references>
    </references>
    <?line 678?>

<section anchor="interoperation-with-rpz-servers">
      <name>Interoperation with RPZ Servers</name>
      <t>This appendix provides a non-normative guidance for operation with an Response Policy Zones (RPZ) server <xref target="RPZ"/> that
indicates filtering with a NXDOMAIN response with the Recursion
Available bit cleared (RA=0). This guidance is provided to ease interoperation with RPZ.</t>
      <t>When a DNS client supports this specification, it includes the
EDE option in its DNS query.</t>
      <t>If the server does not support this specification and is performing
RPZ filtering, the server ignores the EDE option in the DNS query and
replies with NXDOMAIN and RA=0. The DNS client can continue to accept
such responses.</t>
      <t>If the server does support this specification and is performing RPZ
filtering, the server can use the EDE option in the query to identify
an EDE-aware client and respond appropriately (that is, by generating
a response described in <xref target="server-response"/>) as NXDOMAIN and RA=0
are not necessary when generating a response to such a client.</t>
    </section>
    <section anchor="implementation-status">
      <name>Implementation Status</name>
      <ul empty="true">
        <li>
          <t>Note to the RFC Editor: please remove this appendix prior publication.</t>
        </li>
      </ul>
      <t>At IETF#116, Gianpaolo Scalone (Vodafone) and Ralf Weber (Akamai) presented an implementation of this specification. More details can be found at <xref target="Impl-1"/>.</t>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Thanks to Vittorio Bertola, Wes Hardaker, Ben Schwartz, Erid Orth,
Viktor Dukhovni, Warren Kumari, Paul Wouters, John Levine, Bob
Harold, Mukund Sivaraman, Stephane Bortzmeyer, Gianpaolo Angelo Scalone, Mark Nottingham, and Daniel Migault for the comments.</t>
      <t>Thanks to Ralf Weber and Gianpaolo Scalone for sharing details about their implementation.</t>
      <t>Thanks Di Ma and Matt Brown for the DNS directorate reviews, and Joseph Salowey for the Security directorate review.</t>
      <t>Thanks Paul Kyzivat for the Art review.</t>
      <t>Thanks to Éric Vyncke for the AD review.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
