Discovery of Encrypted DNS Resolvers: Deployment Considerations
draft-boucadair-add-deployment-considerations-02
Document | Type |
Expired Internet-Draft
(individual)
Expired & archived
|
|
---|---|---|---|
Authors | Mohamed Boucadair , Tirumaleswar Reddy.K , Dan Wing , Neil Cook , Tommy Jensen | ||
Last updated | 2023-04-21 (Latest revision 2022-10-18) | ||
RFC stream | Independent Submission | ||
Intended RFC status | Informational | ||
Formats | |||
Additional resources |
GitHub Repository
|
||
Stream | ISE state | In ISE Review | |
Consensus boilerplate | Unknown | ||
Document shepherd | (None) | ||
IESG | IESG state | Expired | |
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
The document discusses some deployment considerations of the various options to discover encrypted DNS resolvers (e.g., DNS-over-HTTPS, DNS-over-TLS, or DNS-over-QUIC). In particular, the document describes how Discovery of Network-designated Resolvers (DNR) and Discovery of Designated Resolvers (DDR) can be used in typical deployment contexts. This document does not intend to provide deployment recommendations, but is meant to exemplify how operators can enable the encrypted DNS discovery mechanisms. In addition, the document illustrates the feasibility of hosting encrypted DNS forwarders in Customer Premises Equipment (CPEs).
Authors
Mohamed Boucadair
Tirumaleswar Reddy.K
Dan Wing
Neil Cook
Tommy Jensen
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)