Requirements for Adaptive DNS Discovery
draft-box-add-requirements-00
The information below is for an old version of the document.
| Document | Type | Active Internet-Draft (individual) | |
|---|---|---|---|
| Authors | Chris Box , Tommy Pauly , Christopher A. Wood , Tirumaleswar Reddy.K | ||
| Last updated | 2020-09-04 | ||
| Replaces | draft-pauly-add-requirements | ||
| Replaced by | draft-ietf-add-requirements | ||
| Stream | (None) | ||
| Formats | plain text html xml htmlized pdfized bibtex | ||
| Stream | Stream state | (No stream defined) | |
| Consensus boilerplate | Unknown | ||
| RFC Editor Note | (None) | ||
| IESG | IESG state | I-D Exists | |
| Telechat date | (None) | ||
| Responsible AD | (None) | ||
| Send notices to | (None) |
draft-box-add-requirements-00
ADD C. Box
Internet-Draft BT
Intended status: Informational T. Pauly
Expires: March 8, 2021 Apple
C.A. Wood
Cloudflare
T. Reddy
McAfee
September 4, 2020
Requirements for Adaptive DNS Discovery
draft-box-add-requirements-00
Abstract
Adaptive DNS Discovery is chartered to define mechanisms that allow
clients to discover and select encrypted DNS resolvers. This
document describes several use cases for discovering DNS resolvers
that support encrypted transports, and lists requirements that any
proposed discovery and selection mechanisms should address.
Discussion Venues
This note is to be removed before publishing as an RFC.
Source for this draft and an issue tracker can be found at
https://github.com/ietf-wg-add/draft-add-requirements.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on March 8, 2021.
Box, et al. Expires March 8, 2021 [Page 1]
Internet-Draft ADDREQ September 2020
Copyright Notice
Copyright (c) 2020 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents (https://trustee.ietf.org/
license-info) in effect on the date of publication of this document.
Please review these documents carefully, as they describe your rights
and restrictions with respect to this document. Code Components
extracted from this document must include Simplified BSD License text
as described in Section 4.e of the Trust Legal Provisions and are
provided without warranty as described in the Simplified BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1. Requirements Language . . . . . . . . . . . . . . . . . . 3
2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3
3. Discovery of associated resolvers . . . . . . . . . . . . . . 4
3.1. Network-provisioned resolvers . . . . . . . . . . . . . . 5
3.1.1. Unencrypted forwarder . . . . . . . . . . . . . . . . 6
3.1.2. Encrypted forwarder . . . . . . . . . . . . . . . . . 6
3.2. Client-selected resolvers . . . . . . . . . . . . . . . . 7
3.3. VPN resolvers . . . . . . . . . . . . . . . . . . . . . . 7
4. Discovery of limited domain resolvers . . . . . . . . . . . . 8
4.1. Discover a mapping between a locally-hosted domain and a
resolver . . . . . . . . . . . . . . . . . . . . . . . . 8
4.1.1. Encrypted resolvers for local or home content . . . . 9
4.1.2. Locally-cached content . . . . . . . . . . . . . . . 9
4.1.3. Private enterprise names . . . . . . . . . . . . . . 10
4.2. Encrypted resolvers for content providers . . . . . . . . 10
5. Privacy and security requirements . . . . . . . . . . . . . . 11
5.1. On opportunistic encryption . . . . . . . . . . . . . . . 12
5.2. Handling exceptions and failures . . . . . . . . . . . . 13
6. Requirements Summary . . . . . . . . . . . . . . . . . . . . 13
7. Security Considerations . . . . . . . . . . . . . . . . . . . 14
8. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 14
9. References . . . . . . . . . . . . . . . . . . . . . . . . . 14
9.1. Normative References . . . . . . . . . . . . . . . . . . 14
9.2. Informative References . . . . . . . . . . . . . . . . . 14
Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . 16
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 16
Box, et al. Expires March 8, 2021 [Page 2]
Internet-Draft ADDREQ September 2020
1. Introduction
Several protocols for protecting DNS traffic with encrypted
transports have been defined, such as DNS-over-TLS (DoT) [RFC7858]
and DNS-over-HTTPS (DoH) [RFC8484]. Encrypted DNS can provide many
security and privacy benefits for network clients.
While it is possible for clients to hard-code encrypted DNS resolvers
to use, dynamic discovery and provisioning of encrypted resolvers can
expand the usefulness and applicability of encrypted DNS to many more
use cases.
The Adaptive DNS Discovery (ADD) Working Group is chartered to define
mechanisms that allow clients to automatically discover and select
encrypted DNS resolvers in a wide variety of network environments.
This document describes several use cases for discovering DNS
resolvers that support encrypted transports, and lists requirements
that any proposed discovery and selection mechanisms should address.
They can do this either by providing a solution, or by explicitly
stating why it is not in scope.
Use cases are described between Section 3 and Section 4.2. Each use
case contains a narrative and a set of requirements that apply in
that case. There are additional common requirements in Section 5.
Each requirement is identified as "Ra.b" where a is the group number
and b is the number within that group. Both a and b are integers
starting with 1.
A summary of all requirements in listed in Section 6.
1.1. Requirements Language
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in BCP
14 [RFC2119] [RFC8174] when, and only when, they appear in all
capitals, as shown here.
2. Terminology
This document makes use of the following terms.
Encrypted DNS: DNS-over-HTTPS [RFC8484], DNS-over-TLS [RFC7858], or
any other encrypted DNS technology that the IETF may publish, such as
DNS-over-QUIC [I-D.ietf-dprive-dnsoquic].
Associated resolver: A resolver operated by the same entity that
provides the resolver the client started with. See Section 3.
Box, et al. Expires March 8, 2021 [Page 3]
Internet-Draft ADDREQ September 2020
Equivalent associated resolver: An associated resolver that provides
DNS responses that are identical to the ones served by the original
unencrypted resolver.
Alternative associated resolver: An associated resolver that serves
different responses to some queries; see Section 3 for examples.
3. Discovery of associated resolvers
A client may begin with information about unencrypted resolvers from
the attached networks (Section 3.1), and/or unencrypted resolvers
known from configuration (Section 3.2). This information may be used
to then discover one or more associated encrypted resolvers.
Associated resolvers are defined as resolvers operated by the same
entity that provides the resolver the client started with. Such
associated resolvers may come in two forms:
1. Equivalent - these provide DNS responses that are identical to
the ones served by the unencrypted resolver.
2. Alternative - these serve different responses to some queries.
For example one entity may offer a set of encrypted resolvers
with different levels of filtering (none, just malware, or
malware & adult content), or different proximity (local or
central).
The client may wish to select an equivalent associated resolver, or
select one of the alternatives.
Designs for resolver upgrade mechanisms can either add new parameters
to existing provisioning mechanisms (for example, adding necessary
information to use DoT or DoH to options in DHCP, RAs, or IKEv2) or
else provide a way to communicate with a provisioned unencrypted DNS
resolver and discover the associated encrypted DNS resolvers.
Box, et al. Expires March 8, 2021 [Page 4]
Internet-Draft ADDREQ September 2020
+=============+==============================================+
| Requirement | Description |
+=============+==============================================+
| R1.1 | There must be a mechanism for a client to |
| | learn the set of encrypted resolvers that |
| | are associated with an unencrypted resolver. |
+-------------+----------------------------------------------+
| R1.2 | Discovery must be possible even when the IP |
| | address of the encrypted resolver is only |
| | valid locally. |
+-------------+----------------------------------------------+
Table 1
3.1. Network-provisioned resolvers
DNS servers are often provisioned by a network as part of DHCP
options [RFC2132], IPv6 Router Advertisement (RA) options [RFC8106],
Point-to-Point Protocol (PPP) [RFC1877], 3GPP Protocol Configuration
Options, or another mechanism. Historically this is usually one or
more DNS resolver IP addresses, to be used for traditional
unencrypted DNS. However it could also be a richer set of
information.
Using an encrypted and authenticated resolver that is associated to
the one provisioned by the network can provide several benefits that
are not possible if only unencrypted DNS is used:
* Prevent other devices on the network from observing client DNS
messages
* Verify that answers come from the selected DNS resolver
* Authenticate that the DNS resolver is the one provisioned by the
network
Frequently, network-provisioned resolvers are forwarders running on a
local router. The discovered encrypted resolvers in these cases may
either be local forwarders themselves, or an associated resolver that
is in the network (thus bypassing the router's DNS forwarder).
+=============+=====================+
| Requirement | Description |
+=============+=====================+
| R2.1 | Example requirement |
+-------------+---------------------+
Table 2
Box, et al. Expires March 8, 2021 [Page 5]
Internet-Draft ADDREQ September 2020
3.1.1. Unencrypted forwarder
If the resolver announced by the network is a classic unencrypted
forwarder, it is frequently the case that such forwarders are
difficult to upgrade to support encrypted operation. In such cases
it is useful for the resolver provider to be able to declare which
encrypted resolvers they provide, and for the client to be able to
discover them. If the client wishes to, it can then use one of those
resolvers and bypass the local forwarder.
+=============+=====================+
| Requirement | Description |
+=============+=====================+
| R3.1 | Example requirement |
+-------------+---------------------+
Table 3
3.1.2. Encrypted forwarder
If a subset of local resolvers supports encrypted DNS, the client may
not initially be aware that its local resolver supports it.
Discovering this may require communication with the local resolver,
or an upstream resolver, over an unencrypted transport. Once
discovered, the local encrypted forwarder may be selected by the
client, gaining the benefits of encryption while retaining the
benefits of a local caching forwarder with knowledge of the local
topology.
Another benefit occurs with IoT devices. A common usage pattern for
such devices is for it to "call home" to a service that resides on
the public Internet, where that service is referenced through a
domain name (A or AAAA record). As discussed in Manufacturer Usage
Description Specification [RFC8520], because these devices tend to
require access to very few sites, all other access should be
considered suspect. However, if the query is not accessible for
inspection, it becomes quite difficult for the infrastructure to
suspect anything.
+=============+=====================+
| Requirement | Description |
+=============+=====================+
| R4.1 | Example requirement |
+-------------+---------------------+
Table 4
Box, et al. Expires March 8, 2021 [Page 6]
Internet-Draft ADDREQ September 2020
3.2. Client-selected resolvers
Client devices often allow the device administrator to select a
specific DNS resolver to use on certain networks, or on all networks.
Historically, this selection was specified only with an IP address.
Discovering which equivalent encrypted resolvers are offered by the
same entity allows the client to "upgrade" connections to use
encrypted DNS. This can provide several benefits:
* Prevent devices along the network path to the selected resolver
from observing client DNS messages
* Verify that answers come from the selected DNS resolver
* Authenticate that the DNS resolver is the one selected by the
client
In doing so it is critical that the new resolver is an equivalent
resolver. Switching to a non-equivalent alternative resolver would
break the expectation of the user who previously selected that
resolver.
+=============+=====================+
| Requirement | Description |
+=============+=====================+
| R5.1 | Example requirement |
+-------------+---------------------+
Table 5
3.3. VPN resolvers
Virtual Private Networks (VPNs) also can provision DNS resolvers. In
addition to being able to use DHCP or RAs, VPNs can provision DNS
information in an explicit configuration message. For example, IKEv2
can provision DNS servers using Configuration Attributes [RFC7296].
VPNs can also configure Split DNS rules to limit the use of the
configured resolvers to specific domain names [RFC8598].
Discovering an encrypted resolver that is provisioned by a VPN can
provide the same benefits as doing so for a local network, but
applied to the private network. When using Split DNS, it becomes
possible to use one encrypted resolver for private domains, and
another for other domains.
Box, et al. Expires March 8, 2021 [Page 7]
Internet-Draft ADDREQ September 2020
+=============+=====================+
| Requirement | Description |
+=============+=====================+
| R6.1 | Example requirement |
+-------------+---------------------+
Table 6
4. Discovery of limited domain resolvers
Similar to how VPN DNS configurations can use Split DNS for private
names, other network environments can support resolution of names
that are specific to the local environment. For example, an
enterprise-managed Wi-Fi network might be able to access both the
Internet and a private intranet. In such a scenario, the private
domains managed by the enterprise might only be resolvable using a
specific DNS resolver.
Discovering an encrypted resolver for a subset of names allows a
client to perform Split DNS while maintaining the benefits of
encrypted DNS. For example, a client could use a client-selected
encrypted resolver for public domains, but use a different encrypted
resolver for enterprise-private domains.
Such domain-specific resolver discovery mechanisms additionally need
to provide some information about the applicability and capabilities
of encrypted resolvers. This information can either be provisioned
or can be discovered based on clients actively trying to access
content.
+=============+=====================+
| Requirement | Description |
+=============+=====================+
| R7.1 | Example requirement |
+-------------+---------------------+
Table 7
4.1. Discover a mapping between a locally-hosted domain and a resolver
Narrative required.
Box, et al. Expires March 8, 2021 [Page 8]
Internet-Draft ADDREQ September 2020
+=============+=====================+
| Requirement | Description |
+=============+=====================+
| R8.1 | Example requirement |
+-------------+---------------------+
Table 8
4.1.1. Encrypted resolvers for local or home content
Accessing locally-hosted content can require the use of a specific
resolver. For example, captive networks or networks with walled-
garden content like media on airplane Wi-Fi networks can rely on
using a resolver hosted on the local network.
In cases where a client is using an encrypted resolver provisioned by
a network, and that encrypted resolver is able to resolve names of
local content, this can fall into the use case described in
Section 3.1. However, it might be necessary to discover a local
encrypted resolver along with specific domains if:
* the network-provisioned encrypted resolver is not able to resolve
local-only names, or
* the client has a more-preferred encrypted resolver for generic
traffic, and would otherwise not be able to access local content
The first point can occur in a hybrid deployment, e.g. when the local
resolver is unencrypted but a central one is encrypted. Clients
choosing the encrypted resolver for most queries will need to be
advised to refer to the local one for some names.
This case also include accessing content specific to a home network.
+=============+=====================+
| Requirement | Description |
+=============+=====================+
| R9.1 | Example requirement |
+-------------+---------------------+
Table 9
4.1.2. Locally-cached content
Narrative required.
Box, et al. Expires March 8, 2021 [Page 9]
Internet-Draft ADDREQ September 2020
+=============+=====================+
| Requirement | Description |
+=============+=====================+
| R10.1 | Example requirement |
+-------------+---------------------+
Table 10
4.1.3. Private enterprise names
As stated above, an enterprise-managed Wi-Fi network might be able to
access both the Internet and a private intranet. The private domains
managed by the enterprise might only be resolvable using a specific
DNS resolver, hence use of that resolver is essential for such
domains. However it does not necessarily mean that all queries for
all domains have to flow through that resolver.
Only sending the necessary queries through the enterprise resolver,
and not generic Internet queries, has the privacy benefit of only
exposing traffic to the enterprise that fall within a limited set of
domains.
Using encrypted DNS for private names also opens up the possibility
of doing private name resolution outside of the content of a VPN or
managed network. If the DNS resolver authenticates clients, it can
offer its resolver for private names on a publicly accessible server,
while still limiting the visibility of the DNS traffic.
+=============+=====================+
| Requirement | Description |
+=============+=====================+
| R11.1 | Example requirement |
+-------------+---------------------+
Table 11
4.2. Encrypted resolvers for content providers
Content Delivery Networks (CDNs), and content-providers more broadly,
can also provide encrypted DNS resolvers that can be used by clients
over the public Internet. These resolvers can either allow
resolution of all public names (like normal recursive resolvers), or
be designed to serve a subset of names managed by the content
provider (like an authoritative resolver). Using these resolvers can
allow the content provider to directly control how DNS answers are
used for load balancing and address selection, which could improve
performance of connections to the content provider.
Box, et al. Expires March 8, 2021 [Page 10]
Internet-Draft ADDREQ September 2020
Using a content-provider's encrypted resolver can also provide
several privacy and security benefits:
* Prevent devices along the network path to the content-provider's
resolver from observing client DNS messages
* Verify that answers come from the entity that manages the domains
being resolved
* Reduce the number of entities able to monitor the specific names
accessed by a client to only the client and the content provider,
assuming that the content provider would already see the names
upon a secure connection later being made based on the DNS answers
(e.g., in the TLS SNI extension)
+=============+=====================+
| Requirement | Description |
+=============+=====================+
| R12.1 | Example requirement |
+-------------+---------------------+
Table 12
5. Privacy and security requirements
Encrypted (and authenticated) DNS improves the privacy and security
of DNS queries and answers in the presence of malicious attackers.
Such attackers are assumed to interfere with or otherwise impede DNS
traffic and corresponding discovery mechanisms. They may be on-path
or off-path between the client and entities with which the client
communicates [RFC3552]. These attackers can inject, tamper, or
otherwise interfere with traffic as needed. Given these
capabilities, an attacker may have a variety of goals, including,
though not limited to:
* Monitor and profile clients by observing unencrypted DNS traffic
* Modify unencrypted DNS traffic to filter or augment the user
experience
* Block encrypted DNS
Clients cannot assume that their network does not have such an
attacker unless given some means of authenticating or otherwise
trusting the communication with their DNS resolver.
Box, et al. Expires March 8, 2021 [Page 11]
Internet-Draft ADDREQ September 2020
Given this type of attacker, resolver discovery mechanisms must be
designed carefully to not worsen a client's security or privacy
posture. In particular, attackers must not be able to:
* Redirect secure DNS traffic to themselves when they would not
otherwise handle DNS traffic.
* Override or interfere with the resolver preferences of a user or
administrator.
* Cause clients to use a discovered resolver which has no
authenticated delegation from a client-known entity.
* Influence automatic discovery mechanisms such that a client uses
one or more resolvers that are not otherwise involved with
providing service to the client, such as: a network provider, a
VPN server, a content provider being accessed, or a server that
the client has manually configured.
Beyond these requirements, standards describing resolver discovery
mechanisms must not place any requirements on clients to select
particular resolvers over others.
When discovering DNS resolvers on a local network, clients have no
mechanism to distinguish between cases where an active attacker with
the above capabilities is interfering with discovery, and situations
wherein the network has no encrypted resolver. Absent such a
mechanism, an attacker can always succeed in these goals. Therefore,
in such circumstances, viable solutions for local DNS resolver
discovery should consider weaker attackers, such as those with only
passive eavesdropping capabilities. It is unknown whether such
relaxations represent a realistic attacker in practice. Thus, local
discovery solutions designed around this threat model may have
limited value.
5.1. On opportunistic encryption
Opportunistic encrypted DNS, when the client cannot authenticate the
entity that provides encrypted DNS, does not meet the requirements
laid out here for resolver discovery. While opportunistic encryption
can provide some benefits, specifically in reducing the ability for
other entities to observe traffic, it is not a viable solution
against an on-path attacker.
Performing opportunistic encrypted DNS does not require specific
discovery mechanisms. Section 4.1 of [RFC7858] already describes how
to use DNS-over-TLS opportunistically.
Box, et al. Expires March 8, 2021 [Page 12]
Internet-Draft ADDREQ September 2020
5.2. Handling exceptions and failures
Even with encrypted DNS resolver discovery in place, clients must be
prepared to handle certain scenarios where encrypted DNS cannot be
used. In these scenarios, clients must consider if it is appropriate
to fail open by sending the DNS queries without encryption, fail
closed by not doing so, or presenting a choice to a user or
administrator. The exact behavior is a local client policy decision.
Some networks that use Captive Portals will not allow any Internet
connectivity until a client has interacted with the portal
[I-D.ietf-capport-architecture]. If these networks do not use
encrypted DNS for their own resolution, a client will need to perform
unencrypted DNS queries in order to get out of captivity. Many
operating systems have specific client code responsible for detecting
and interacting with Captive Portals; these system components may be
good candidates for failing open, since they do not generally
represent user traffic.
Other networks may not allow any use of encrypted DNS, or any use of
encrypted DNS to resolvers other than a network-provisioned resolver.
Clients should not silently fail open in these cases, but if these
networks are trusted by or administered by the user, the user may
want to specifically follow the network's DNS policy instead of what
the client would do on an unknown or untrusted network.
6. Requirements Summary
This sections lists the complete set of requirements described above,
for ease of reference.
Box, et al. Expires March 8, 2021 [Page 13]
Internet-Draft ADDREQ September 2020
+=============+=====================================================+
| Requirement | Description |
+=============+=====================================================+
| R1.1 | There must be a mechanism for a client |
| | to learn the set of encrypted resolvers |
| | that are associated with a resolver |
| | that is known only by its IP address. |
+-------------+-----------------------------------------------------+
| R1.2 | Discovery must be possible even when |
| | the IP address is only valid locally. |
+-------------+-----------------------------------------------------+
| R1.3 | More to be added |
+-------------+-----------------------------------------------------+
| R2.1 | Example requirement |
+-------------+-----------------------------------------------------+
| R3.1 | Example requirement |
+-------------+-----------------------------------------------------+
Table 13
7. Security Considerations
All security considerations relevant to a particular use case are
described under that section. Additional considerations common to
all of them are described in Section 5.
8. IANA Considerations
This document has no IANA actions.
9. References
9.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997,
<https://www.rfc-editor.org/info/rfc2119>.
[RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
May 2017, <https://www.rfc-editor.org/info/rfc8174>.
9.2. Informative References
[I-D.ietf-capport-architecture]
Larose, K., Dolson, D., and H. Liu, "Captive Portal
Architecture", Work in Progress, Internet-Draft, draft-
Box, et al. Expires March 8, 2021 [Page 14]
Internet-Draft ADDREQ September 2020
ietf-capport-architecture-09, August 8, 2020,
<http://www.ietf.org/internet-drafts/draft-ietf-capport-
architecture-09.txt>.
[I-D.ietf-dprive-dnsoquic]
Huitema, C., Mankin, A., and S. Dickinson, "Specification
of DNS over Dedicated QUIC Connections", Work in Progress,
Internet-Draft, draft-ietf-dprive-dnsoquic-00, April 27,
2020, <http://www.ietf.org/internet-drafts/draft-ietf-
dprive-dnsoquic-00.txt>.
[RFC1877] Cobb, S., "PPP Internet Protocol Control Protocol
Extensions for Name Server Addresses", RFC 1877,
DOI 10.17487/RFC1877, December 1995,
<https://www.rfc-editor.org/info/rfc1877>.
[RFC2132] Alexander, S. and R. Droms, "DHCP Options and BOOTP Vendor
Extensions", RFC 2132, DOI 10.17487/RFC2132, March 1997,
<https://www.rfc-editor.org/info/rfc2132>.
[RFC3552] Rescorla, E. and B. Korver, "Guidelines for Writing RFC
Text on Security Considerations", BCP 72, RFC 3552,
DOI 10.17487/RFC3552, July 2003,
<https://www.rfc-editor.org/info/rfc3552>.
[RFC7296] Kaufman, C., Hoffman, P., Nir, Y., Eronen, P., and T.
Kivinen, "Internet Key Exchange Protocol Version 2
(IKEv2)", STD 79, RFC 7296, DOI 10.17487/RFC7296, October
2014, <https://www.rfc-editor.org/info/rfc7296>.
[RFC7858] Hu, Z., Zhu, L., Heidemann, J., Mankin, A., Wessels, D.,
and P. Hoffman, "Specification for DNS over Transport
Layer Security (TLS)", RFC 7858, DOI 10.17487/RFC7858, May
2016, <https://www.rfc-editor.org/info/rfc7858>.
[RFC8106] Jeong, J., Park, S., Beloeil, L., and S. Madanapalli,
"IPv6 Router Advertisement Options for DNS Configuration",
RFC 8106, DOI 10.17487/RFC8106, March 2017,
<https://www.rfc-editor.org/info/rfc8106>.
[RFC8484] Hoffman, P. and P. McManus, "DNS Queries over HTTPS
(DoH)", RFC 8484, DOI 10.17487/RFC8484, October 2018,
<https://www.rfc-editor.org/info/rfc8484>.
[RFC8520] Lear, E., Droms, R., and D. Romascanu, "Manufacturer Usage
Description Specification", RFC 8520,
DOI 10.17487/RFC8520, March 2019,
<https://www.rfc-editor.org/info/rfc8520>.
Box, et al. Expires March 8, 2021 [Page 15]
Internet-Draft ADDREQ September 2020
[RFC8598] Pauly, T. and P. Wouters, "Split DNS Configuration for the
Internet Key Exchange Protocol Version 2 (IKEv2)",
RFC 8598, DOI 10.17487/RFC8598, May 2019,
<https://www.rfc-editor.org/info/rfc8598>.
Acknowledgments
This document was started based on contributions during the ADD
meeting of IETF108, on the list, and from draft-pauly-add-
requirements.
More contributions are required! Please consider starting a github
issue, submit a pull request, or simply raise the topic on the ADD
list.
Authors' Addresses
Chris Box
BT
2000 Park Avenue
Bristol
United Kingdom
Email: chris.box@bt.com
Tommy Pauly
Apple
One Apple Park Way
Cupertino, California 95014,
United States of America
Email: tpauly@apple.com
Christopher A. Wood
Cloudflare
101 Townsend St
San Francisco,
United States of America
Email: caw@heapingbits.net
Box, et al. Expires March 8, 2021 [Page 16]
Internet-Draft ADDREQ September 2020
Tirumaleswar Reddy
McAfee
Embassy Golf Link Business Park
Bangalore
India
Email: TirumaleswarReddy_Konda@McAfee.com
Box, et al. Expires March 8, 2021 [Page 17]