Skip to main content

Hosting Encrypted DNS Forwarders on CPEs
draft-rbw-add-encrypted-dns-forwarders-02

Document Type Expired Internet-Draft (individual)
Expired & archived
Authors Tirumaleswar Reddy.K , Mohamed Boucadair , Dan Wing
Last updated 2025-05-08 (Latest revision 2024-11-04)
Replaces draft-reddy-add-delegated-credentials
RFC stream (None)
Intended RFC status (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

Typical connectivity service offerings based upon on Customer Premise Equipment (CPEs) involve DNS forwarders on the CPE for various reasons (offer local services, control the scope/content of information in DNS, ensure better dependability for local service, provide control to users, etc.). Upgrading DNS to use encrypted transports introduces deployment complications as to how to sustain current offerings with local services. Solutions are needed to ease operating DNS forwarders in CPEs while allowing to make use of encrypted DNS capabilities. This document describes the problem and to what extent existing solutions can or can't be used for these deployments. For example, Star certificates and name constraints extension suffer from the problem of deploying a new feature to CAs, TLS clients, and servers.

Authors

Tirumaleswar Reddy.K
Mohamed Boucadair
Dan Wing

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)