Usage Profiles for DNS over TLS and DNS over DTLS
RFC 8310

Document Type RFC - Proposed Standard (March 2018; No errata)
Updates RFC 7858
Last updated 2018-03-21
Replaces draft-dgr-dprive-dtls-and-tls-profiles
Stream IETF
Formats plain text pdf html bibtex
Reviews
Stream WG state Submitted to IESG for Publication
Document shepherd Tim Wicinski
Shepherd write-up Show (last changed 2017-01-24)
IESG IESG state RFC 8310 (Proposed Standard)
Consensus Boilerplate Yes
Telechat date
Responsible AD Terry Manderson
Send notices to "Tim Wicinski" <tjw.ietf@gmail.com>
IANA IANA review state Version Changed - Review Needed
IANA action state No IC
Internet Engineering Task Force (IETF)                      S. Dickinson
Request for Comments: 8310                                       Sinodun
Updates: 7858                                                 D. Gillmor
Category: Standards Track                                           ACLU
ISSN: 2070-1721                                                 T. Reddy
                                                                  McAfee
                                                              March 2018

           Usage Profiles for DNS over TLS and DNS over DTLS

Abstract

   This document discusses usage profiles, based on one or more
   authentication mechanisms, which can be used for DNS over Transport
   Layer Security (TLS) or Datagram TLS (DTLS).  These profiles can
   increase the privacy of DNS transactions compared to using only
   cleartext DNS.  This document also specifies new authentication
   mechanisms -- it describes several ways that a DNS client can use an
   authentication domain name to authenticate a (D)TLS connection to a
   DNS server.  Additionally, it defines (D)TLS protocol profiles for
   DNS clients and servers implementing DNS over (D)TLS.  This document
   updates RFC 7858.

Status of This Memo

   This is an Internet Standards Track document.

   This document is a product of the Internet Engineering Task Force
   (IETF).  It represents the consensus of the IETF community.  It has
   received public review and has been approved for publication by the
   Internet Engineering Steering Group (IESG).  Further information on
   Internet Standards is available in Section 2 of RFC 7841.

   Information about the current status of this document, any errata,
   and how to provide feedback on it may be obtained at
   https://www.rfc-editor.org/info/rfc8310.

Dickinson, et al.            Standards Track                    [Page 1]
RFC 8310           Usage Profiles for DNS over (D)TLS         March 2018

Copyright Notice

   Copyright (c) 2018 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (https://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

Dickinson, et al.            Standards Track                    [Page 2]
RFC 8310           Usage Profiles for DNS over (D)TLS         March 2018

Table of Contents

   1. Introduction ....................................................4
   2. Terminology .....................................................6
   3. Scope ...........................................................7
   4. Discussion ......................................................8
   5. Usage Profiles ..................................................8
      5.1. DNS Resolution ............................................11
   6. Authentication in DNS over (D)TLS ..............................11
      6.1. DNS-over-(D)TLS Startup Configuration Problems ............11
      6.2. Credential Verification ...................................12
      6.3. Summary of Authentication Mechanisms ......................12
      6.4. Combining Authentication Mechanisms .......................15
      6.5. Authentication in Opportunistic Privacy ...................15
      6.6. Authentication in Strict Privacy ..........................16
      6.7. Implementation Guidance ...................................16
   7. Sources of Authentication Domain Names .........................17
      7.1. Full Direct Configuration .................................17
      7.2. Direct Configuration of ADN Only ..........................17
      7.3. Dynamic Discovery of ADN ..................................17
           7.3.1. DHCP ...............................................18
   8. Credential Verification Based on Authentication Domain Name ....18
      8.1. Authentication Based on PKIX Certificate ..................18
      8.2. DANE ......................................................19
           8.2.1. Direct DNS Meta-Queries ............................20
           8.2.2. TLS DNSSEC Chain Extension .........................20
   9. (D)TLS Protocol Profile ........................................20
   10. IANA Considerations ...........................................21
   11. Security Considerations .......................................21
      11.1. Countermeasures to DNS Traffic Analysis ..................22
   12. References ....................................................22
      12.1. Normative References .....................................22
Show full document text