<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.26 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-jt-add-dns-server-redirection-01" category="std" consensus="true" xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.16.0 -->
  <front>
    <title abbrev="EDSR">Handling Encrypted DNS Server Redirection</title>
    <seriesInfo name="Internet-Draft" value="draft-jt-add-dns-server-redirection-01"/>
    <author initials="J." surname="Todd" fullname="J. Todd">
      <organization>Quad9</organization>
      <address>
        <email>jtodd@quad9.net</email>
      </address>
    </author>
    <author initials="T." surname="Jensen" fullname="T. Jensen">
      <organization>Microsoft</organization>
      <address>
        <email>tojens@microsoft.com</email>
      </address>
    </author>
    <author initials="C." surname="Mosher" fullname="C. Mosher">
      <organization>Quad9</organization>
      <address>
        <email>cmosher@quad9.net</email>
      </address>
    </author>
    <date year="2023" month="March" day="12"/>
    <area>Internet</area>
    <workgroup>ADD</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document defines Encrypted DNS Server Redirection (EDSR),
a mechanism for encrypted DNS servers to redirect clients to
other encrypted DNS servers. This enables dynamic routing
to geo-located or otherwise more desirable encrypted DNS servers
without modifying DNS client endpoint configurations or the use 
of anycast by the DNS server.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://example.com/LATEST"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-jt-add-dns-server-redirection/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        WG Working Group mailing list (<eref target="mailto:add@ietf.org"/>),
        which is archived at <eref target="https://example.com/WG"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/add/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/johnhtodd/draft-DOH-redirect"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Encrypted DNS Server Redirection (EDSR) is a protocol that allows an encrypted
DNS resolver whose configuration is well known to clients to redirect them to other,
more desirable resolvers without having to support anycast and without having to
configure clients with these other resolvers ahead of time. It uses the mechanism
defined by DDR <xref target="I-D.ietf-add-ddr"/> to redirect an encrypted DNS client from one encrypted DNS
resolver to another encrypted DNS resolver. Where DDR uses a threat model that
presumes the initial DNS traffic is unencrypted, EDSR applies when the initial
DNS traffic is already encrypted.</t>
      <t>One example of what makes redirection to another resolver
desirable is geolocation. A DNS service may document one or a few well known resolver 
configurations even though it routes traffic to hundreds or thousands of resolvers
that are closer to the client, reducing latency and making DNS resolutions more
applicable to the client.</t>
    </section>
    <section anchor="dns-client-behavior">
      <name>DNS client behavior</name>
      <section anchor="discovering-redirections">
        <name>Discovering redirections</name>
        <t>When a DNS client first opens a connection to an encrypted DNS server, it <bcp14>MUST</bcp14>
send a SVCB query for the name of the resolver to discover its encrypted DNS configuration.
The DNS client <bcp14>SHOULD</bcp14> open a connection to the server returned in the SVCB query using the
TargetName and one of the IP addresses returned in additional A/AAAA records for the same
name. Once a connection has been successfully opened, as subsequently described by reaching
a suitable server at the end of the redirection chain, the client <bcp14>SHOULD</bcp14> close the first
connection.</t>
        <t>If the returned SVCB record indicates a server with the same domain name as the
current encrypted DNS connection, even if it contains different values in additional
A or AAAA records, or different values in the ipv4hint or ipv6hint fields, then the
redirection is considered to be from the server to itself. Clients <bcp14>SHOULD NOT</bcp14> follow
these redirections generally. However, clients receiving preferable encryption parameters
as part of the SVCB response <bcp14>MAY</bcp14> choose to reconnect to negotiate to upgrade to the
preferred encryption method. When doing so, there is no need for the client to repeat
EDSR as the redirection from the server to itself has terminated the redirection chain.</t>
        <t>The client does not need to wait for the results of the redirection discovery
query before sending other DNS queries on the connection, though they <bcp14>SHOULD</bcp14>
gracefully close the connection as soon as it has successfully established a
connection to the server it was redirected to and received or timed out the
outstanding queries on the original connection.</t>
        <t>See the considerations section for reasons a client <bcp14>MAY</bcp14> choose to decline a
redirection.</t>
      </section>
      <section anchor="refreshing-redirections">
        <name>Refreshing redirections</name>
        <t>EDSR allows a client to be redirected from an encrypted DNS resolver it was somehow
configured to use. When the redirection TTL expires, the client <bcp14>SHOULD</bcp14> return to
using its originally configured server unless it can refresh the redirection beforehand.
This allows the client to honor the intention of whatever configuration method was
used to instruct it to use the original encrypted DNS resolver.</t>
        <t>If a chain of redirections was followed, the effective TTL of the redirection is the
minimum of the TTLs encountered along the chain. Clients <bcp14>SHOULD</bcp14> however cap this value
to some minimum value at their discretion to avoid frequent redirection checking when
latency plus an incidentally low TTL along the chain results in near-zero effective TTLs.</t>
      </section>
      <section anchor="multiple-redirections">
        <name>Multiple redirections</name>
        <t>When clients receive more than one valid SVCB response, they <bcp14>SHOULD</bcp14> prefer using
the redirections that match their configuration (such as supported IP address family or
desired encrypted DNS protocol) in ascending order of the SVCB priority. Once a successful
connection is made to a redirected destination, clients <bcp14>MAY</bcp14> choose to discard other results
in favor of restarting EDSR with the originally configured resolver.</t>
        <t>Redirections are considered to be a one-to-one relationship (starting with one recursive
resolver and following its redirections should result in one replacement recursive resolver).
It is not expected that a stub resolver ends up using more recursive resolvers than it
was originally configured with when using EDSR.</t>
      </section>
      <section anchor="network-changes">
        <name>Network changes</name>
        <t>When a client device changes what network it is connected to, it <bcp14>SHOULD</bcp14> forget
pre-existing redirections and start EDSR over with the originally configured
resolvers. This ensures that a resolver which redirects clients based on their
source network can behave accordingly.</t>
        <t>Note that this is unrelated to what resolvers a client is originally configured with. 
For example, a client which is configured to always used the resolvers advertised by 
DHCP will likely start with different original resolvers when changing networks. How a 
client is configured with DNS resolvers is out of scope for this document. EDSR only 
provides a mechanism for clients to discover redirections from resolvers they were 
previously configured to use.</t>
      </section>
    </section>
    <section anchor="dns-server-behavior">
      <name>DNS server behavior</name>
      <t>DNS resolvers who want to redirect clients to other resolvers <bcp14>MUST</bcp14> respond to
SVCB <xref target="I-D.ietf-add-svcb-dns"/> queries for their own domain names with records that
describe the configuration of the destination server. Servers <bcp14>SHOULD</bcp14> be prepared
for clients to not follow the redirection immediately as connection failures or
other issues may lead to clients being unable to follow the redirection. Servers
who are redirecting due to being overloaded <bcp14>MAY</bcp14> respond as they normally would
to overwhelming traffic.</t>
      <t>Guidance in <xref section="5" sectionFormat="of" target="I-D.ietf-dnsop-svcb-https"/> to improve performance by
including additional A/AAAA records with the SVCB response <bcp14>SHOULD</bcp14> be followed.</t>
      <t>Redirections <bcp14>MUST</bcp14> only redirect to resolvers which support at least the same
protocol, address family, port, and TLS minimum versions as the referring resolver.
This ensures that redirections do not lead clients to resolvers that are not compatible
with the client. In addition, servers <bcp14>SHOULD</bcp14> avoid redirecting to servers which will also
redirect clients unless they are actively coordinating to ensure a positive
client experience. See the Deployment Considerations section for more details.</t>
    </section>
    <section anchor="deployment-considerations">
      <name>Deployment Considerations</name>
      <section anchor="large-trees-of-redirections">
        <name>Large trees of redirections</name>
        <t>It is possible for DNS servers to redirect clients to DNS servers which also
redirect clients. Clients which are presented with long chains of redirections
<bcp14>MAY</bcp14> choose to stop following redirections to reduce connection thrashing. DNS
server operators <bcp14>SHOULD</bcp14> deploy redirection behavior mindfully to avoid long
chains of redirection.</t>
        <t>Servers <bcp14>SHOULD</bcp14> ensure their redirections do not create loops, where clients
are redirected to a server it already encountered earlier in the process.
Clients <bcp14>MAY</bcp14> stop following redirections when they detect this, but may also
take a simpler approach, following only a maximum number of redirections.</t>
      </section>
      <section anchor="redirection-ttls">
        <name>Redirection TTLs</name>
        <t>Servers <bcp14>SHOULD</bcp14> provide sufficiently long TTLs for clients to avoid the need to
constantly repeat EDSR queries. Server operators should be mindful of redirection
chains because unless they collaboratively control the TTLs of one another's
redirections, redirection chains will end up with greatly reduced effective TTLs
because the client will always use the lowest.</t>
      </section>
      <section anchor="including-ip-addresses-in-edsr-responses">
        <name>Including IP addresses in EDSR responses</name>
        <t>If a recursive resolver does not include additional A/AAAA records per
<xref section="5" sectionFormat="of" target="I-D.ietf-dnsop-svcb-https"/>, stub resolvers might end up failing
the redirection if the redirection destination name cannot be resolved. Additionally,
the recursive resolver <bcp14>SHOULD</bcp14> ensure records conntaining the same IP version as the
existing connection are returned (if the stub is currently connected over IPv4, one or
more A records <bcp14>SHOULD</bcp14> be included, and if the stub is currently connected over IPv6,
one or more AAAA records <bcp14>SHOULD</bcp14> be included).</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <section anchor="trusting-the-redirected-connection">
        <name>Trusting the redirected connection</name>
        <t>EDSR does not provide novel authentication or security mechanisms. Redirection
is trusted by virtue of the server authentication via PKI through TLS <xref target="RFC5280"/>.
The DNS stub resolver implementing EDSR <bcp14>SHOULD</bcp14> use whatever policies it uses for
other TLS connections for encrypted DNS traffic to determine if a given TLS cert
chain is trustworthy before proceeding with EDSR.</t>
        <t>EDSR <bcp14>MUST NOT</bcp14> be used with encrypted DNS protocols that are not based on TLS.
This scenario will require future standards work.</t>
        <t>EDSR should not introduce any additional security considerations beyond use of
the original encrypted resolver prior to redirection. Because the original
connection was trusted, information sent over it about a new connection to use
should be as trusted. This is analogous to the use of 3xx codes in HTTP to
redirect HTTP clients to other servers. However, clients that wish to time bound 
vulnerabilities to attackers who compromise the original resolver <bcp14>MAY</bcp14> choose to 
implement a maximum TTL to honor on SVCB records that redirect to other servers.</t>
      </section>
      <section anchor="use-with-unencrypted-dns">
        <name>Use with unencrypted DNS</name>
        <t>EDSR <bcp14>MUST NOT</bcp14> be used to redirect unencrypted DNS traffic to any other resolver.
This use case is called designation and is covered by Discovery of Designated
Resolvers (DDR) as defined in <xref target="I-D.ietf-add-ddr"/>. Not following DDR opens up a DNS client
to malicious redirection to an attacker-controlled DNS server. For more information,
see <xref section="7" sectionFormat="of" target="I-D.ietf-add-ddr"/>.</t>
        <t>EDSR also <bcp14>MUST NOT</bcp14> be used to redirect encrypted DNS traffic to a resolver that
advertises support for unencrypted DNS. This would reduce the security posture of
the client. Clients <bcp14>MUST NOT</bcp14> follow an encrypted DNS redirection and then send
unencrypted DNS traffic to the new resolver.</t>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>A client <bcp14>MAY</bcp14> choose to not send other name queries until redirection is complete,
but there should be no issue with sending queries to intermediate resolvers before
redirection takes place. This is because the intermediate resolvers are considered
to be appropriate destinations by the client even if the resolver wants to substitute
another resolver for reasons other than name resolution results such as latency
optimization or load balancing.</t>
    </section>
    <section anchor="data-flow-considerations">
      <name>Data Flow Considerations</name>
      <section anchor="data-scope">
        <name>Data Scope</name>
        <t>EDSR does not result in any additional data being shared by the end user, as the
DNS queries going to the new resolver were already going to go to the original
resolver.</t>
      </section>
      <section anchor="data-visibility">
        <name>Data Visibility</name>
        <t>EDSR results in a 1:1 replacement of DNS resolvers used (future queries sent to
the new resolver will not be sent to the original resolver anymore). This means the
number of servers which see any given query remain the same.</t>
        <t>This is only true if clients only use one redirected DNS server per original DNS
server. If the DNS server offers more than one redirection, and the client validates
and uses two or more of those redirections, then there will be greater data
visibility (more destinations). This is however entirely within the client's choice
following their own policy as a redundancy versus volume of exhausted data trade-off.</t>
        <t>EDSR requires the redirection to another server to also use encrypted DNS, so no
third-party will be introduced to the data flow unless the encryption is broken.</t>
      </section>
      <section anchor="data-centralization">
        <name>Data centralization</name>
        <t>EDSR can only increase data centralization if multiple resolver operators choose to
redirect DNS clients to the same, other DNS resolver. To prevent the reduction of
their resolution redundancy, DNS clients <bcp14>MAY</bcp14> choose to ignore redirections if they
find that they point to resolvers they are already configured to use, by a previous
redirection or some other configuration.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="I-D.ietf-add-ddr">
          <front>
            <title>Discovery of Designated Resolvers</title>
            <author fullname="Tommy Pauly" initials="T." surname="Pauly">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Eric Kinnear" initials="E." surname="Kinnear">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Patrick McManus" initials="P." surname="McManus">
              <organization>Fastly</organization>
            </author>
            <author fullname="Tommy Jensen" initials="T." surname="Jensen">
              <organization>Microsoft</organization>
            </author>
            <date day="5" month="August" year="2022"/>
            <abstract>
              <t>   This document defines Discovery of Designated Resolvers (DDR), a
   mechanism for DNS clients to use DNS records to discover a resolver's
   encrypted DNS configuration.  An encrypted DNS resolver discovered in
   this manner is referred to as a "Designated Resolver".  This
   mechanism can be used to move from unencrypted DNS to encrypted DNS
   when only the IP address of a resolver is known.  This mechanism is
   designed to be limited to cases where unencrypted DNS resolvers and
   their designated resolvers are operated by the same entity or
   cooperating entities.  It can also be used to discover support for
   encrypted DNS protocols when the name of an encrypted DNS resolver is
   known.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-add-ddr-10"/>
        </reference>
        <reference anchor="I-D.ietf-add-svcb-dns">
          <front>
            <title>Service Binding Mapping for DNS Servers</title>
            <author fullname="Benjamin M. Schwartz" initials="B. M." surname="Schwartz">
              <organization>Google LLC</organization>
            </author>
            <date day="11" month="August" year="2022"/>
            <abstract>
              <t>   The SVCB DNS resource record type expresses a bound collection of
   endpoint metadata, for use when establishing a connection to a named
   service.  DNS itself can be such a service, when the server is
   identified by a domain name.  This document provides the SVCB mapping
   for named DNS servers, allowing them to indicate support for
   encrypted transport protocols.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-add-svcb-dns-07"/>
        </reference>
        <reference anchor="I-D.ietf-dnsop-svcb-https">
          <front>
            <title>Service binding and parameter specification via the DNS (DNS SVCB and HTTPS RRs)</title>
            <author fullname="Benjamin M. Schwartz" initials="B. M." surname="Schwartz">
              <organization>Google</organization>
            </author>
            <author fullname="Mike Bishop" initials="M." surname="Bishop">
              <organization>Akamai Technologies</organization>
            </author>
            <author fullname="Erik Nygren" initials="E." surname="Nygren">
              <organization>Akamai Technologies</organization>
            </author>
            <date day="11" month="March" year="2023"/>
            <abstract>
              <t>   This document specifies the "SVCB" and "HTTPS" DNS resource record
   (RR) types to facilitate the lookup of information needed to make
   connections to network services, such as for HTTP origins.  SVCB
   records allow a service to be provided from multiple alternative
   endpoints, each with associated parameters (such as transport
   protocol configuration), and are extensible to support future uses
   (such as keys for encrypting the TLS ClientHello).  They also enable
   aliasing of apex domains, which is not possible with CNAME.  The
   HTTPS RR is a variation of SVCB for use with HTTP [HTTP].  By
   providing more information to the client before it attempts to
   establish a connection, these records offer potential benefits to
   both performance and privacy.

   TO BE REMOVED: This document is being collaborated on in Github at:
   https://github.com/MikeBishop/dns-alt-svc
   (https://github.com/MikeBishop/dns-alt-svc).  The most recent working
   version of the document, open issues, etc. should all be available
   there.  The authors (gratefully) accept pull requests.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dnsop-svcb-https-12"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper">
              <organization/>
            </author>
            <author fullname="S. Santesson" initials="S." surname="Santesson">
              <organization/>
            </author>
            <author fullname="S. Farrell" initials="S." surname="Farrell">
              <organization/>
            </author>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen">
              <organization/>
            </author>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <author fullname="W. Polk" initials="W." surname="Polk">
              <organization/>
            </author>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
      </references>
    </references>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank the following individuals for their invaluable feedback
to this document: Ben Schwartz, Eric Orth, Erik Nygren, Ralph Weber, Ted Hardie, Tommy
Pauly, Viktor Dukhovni, and Vittorio Bertola.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
