<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-ietf-iotops-iot-dns-guidelines-03" category="bcp" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="IoT-DNS-Guidelines">IoT DNS Security and Privacy Guidelines</title>

    <author initials="A." surname="Mishra" fullname="Abhishek Mishra">
      <organization>Inria</organization>
      <address>
        <email>abhishek.mishra@inria.fr</email>
      </address>
    </author>
    <author initials="A." surname="Losty" fullname="Andrew Losty">
      <organization>UCL</organization>
      <address>
        <email>andrew.losty.23@ucl.ac.uk</email>
      </address>
    </author>
    <author initials="A. M." surname="Mandalari" fullname="Anna Maria Mandalari">
      <organization>UCL</organization>
      <address>
        <email>a.mandalari@ucl.ac.uk</email>
      </address>
    </author>
    <author initials="J." surname="Mozley" fullname="Jim Mozley">
      <organization>Infoblox</organization>
      <address>
        <email>jmozley@infoblox.com</email>
      </address>
    </author>
    <author initials="M." surname="Cunche" fullname="Mathieu Cunche">
      <organization>INSA-Lyon &amp; Inria</organization>
      <address>
        <email>mathieu.cunche@inria.fr</email>
      </address>
    </author>

    <date year="2026" month="May" day="08"/>

    <area>ops</area>
    <workgroup>iotops</workgroup>
    

    <abstract>


<?line 50?>

<t>This document outlines guidance for Internet of Things (IoT) manufacturers regarding the implementation of DNS stub resolver software on devices, and for the management zones used for purposes such as device configuration and software upgrades. It aims to mitigate security threats, enhance privacy, and to address operational security challenges.</t>

<t>DNS resolution between devices and management zone servers depends upon DNS services within operator networks, and these services and operator networks can be impacted by device behavior. Hence this document also provides guidance to network operators that deploy IoT devices to mitigate the specific risks identified in this document and take advantage of improved DNS security mechanisms provided by manufacturers.</t>



    </abstract>

    <note title="About This Document" removeInRFC="true">
      <t>
        The latest revision of this draft can be found at <eref target="https://miishra.github.io/IoT-DNS-Guidelines/draft-mishra-iotops-iot-dns-guidelines-latest.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-iotops-iot-dns-guidelines/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/miishra/IoT-DNS-Guidelines"/>.</t>
    </note>


  </front>

  <middle>


<?line 56?>

<section anchor="introduction"><name>Introduction</name>

<t>Research into the DNS behavior of IoT devices <xref target="UCLandInriaPaper"/> shows widespread non-compliance with protocol standards, gaps in protocol support, and security vulnerabilities. This leads to unpredictable operational behavior and exposes devices to fingerprinting and denial-of-service attacks. This document provides DNS guidance across the IoT resolution path (device, resolver, and authoritative infrastructure), with primary emphasis on device behavior aimed at IoT manufacturers.</t>

<t>While the guidance in this document may apply to any device using DNS, this document considers IoT devices as a specific case where targeted recommendations are useful for the following reasons:</t>

<t><list style="symbols">
  <t>The recommendations address specific IoT-related security concerns not seen in the DNS behavior of general-purpose operating systems</t>
  <t>IoT devices have different resource characteristics from general-purpose devices, such as constrained power consumption, meaning incorrect software implementations can have an increased operational impact on device functionality</t>
  <t>IoT devices do not typically have end point security agents installed on them that are widely used on general purpose operating systems</t>
  <t>There are many DNS RFCs, and this document can be used to identify those related to specific security issues observed through research into IoT devices, with the aim of making it easier to address these vulnerabilities</t>
  <t>IoT devices may be deployed at scale on dedicated networks, and these recommendations will be useful to network security teams in mitigating vulnerabilities, especially where device behavior cannot be changed post-deployment</t>
  <t>Manufacturers may use standard software distributions aimed at IoT devices without considering DNS behavior and the guidelines here can be used as part of the criteria to evaluate these distributions</t>
  <t>IoT devices typically perform the same set of DNS queries on start-up, which makes them both more vulnerable because of this predictable behavior and also more prone to network fingerprinting</t>
</list></t>

<t>This document is primarily concerned with device-to-cloud communication <xref target="RFC7452"/>, but DNS may be used in other IoT device communication patterns. Hence recommendations apply to any deployment type where DNS is used, but decisions on implementation will be proportionate to the associated security risks and operational considerations. For example the implementation of {#configuring-resolvers} and <xref target="transaction-randomization"/> would be appropriate to any implementation, whereas <xref target="encrypted-standards"/> may not be proportionate in industrial automation environments where devices do not encrypt other types of traffic <xref target="RFC9150"/>.</t>

<t>DNS terminology in this document conforms to <xref target="RFC9499"/>. In this context, Stub Resolver refers to the IoT device, and Resolver refers to the DNS server used by the IoT device.</t>

</section>
<section anchor="conventions-and-definitions"><name>Conventions and Definitions</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
<section anchor="stub-resolvers"><name>Guidance for IoT Device Manufacturers</name>

<t>The following guidance specifies expected behavior for IoT device stub resolvers to ensure secure, privacy-preserving, and operationally efficient DNS resolution.</t>

<section anchor="configuring-resolvers"><name>Configuration of DNS servers used by IoT Stub Resolvers</name>

<t>IoT devices have been observed to fall back to hard-coded IP addresses for DNS resolvers, such as well-known open resolvers, or ignore addresses assigned to them via automated configuration methods such as DHCP Option 6. This may result in an insecure communication channel, and the open resolvers used in these hard-coded configurations may be blocked by network policy, preventing the device from functioning correctly.</t>

<t>DNS resolvers on devices <bcp14>MUST</bcp14> be configurable via network configuration protocols. Stub resolvers <bcp14>MUST NOT</bcp14> fall back to hard-coded resolvers.</t>

<t>Devices <bcp14>SHOULD</bcp14> use the following priority order for selecting a resolver. The first one that results in a valid DNS response <bcp14>SHOULD</bcp14> be selected.</t>

<t><list style="numbers" type="1">
  <t>Manual user configuration</t>
  <t>Device management software</t>
  <t>IPv6 Router Advertisement (RA) <xref target="RFC8106"/>, DHCPv6 <xref target="RFC8415"/> (if M=1 bit in RA), IPv4 DHCP <xref target="RFC2132"/>. When encrypted resolver options are present in DHCP and IPv6 Router Advertisements <xref target="RFC9463"/>, then they <bcp14>SHOULD</bcp14> be used.</t>
</list></t>

<t>If the selected resolver is a plain IP address (e.g. from option 3) this implies unencrypted DNS. In such cases Discovery of Designated Resolvers (DDR) <xref target="RFC9462"/> <bcp14>SHOULD</bcp14> be performed to upgrade to encrypted access, where available.</t>

</section>
<section anchor="transaction-randomization"><name>Source Port and Transaction ID Randomization</name>

<t>Some IoT devices have been observed to have insufficient or no randomization in the source ports of DNS queries or DNS transaction IDs making them vulnerable to spoofed responses. A combination of Source Port and Transaction ID is used, amongst other criteria, by the stub resolver when accepting a DNS response.</t>

<t>IoT devices <bcp14>MUST</bcp14> undergo adequate Source Port and Transaction ID randomization in their DNS queries as a mitigation against cache poisoning from spoofed responses. Having both of these values correctly randomized decreases the chances of a successful spoofed attack. Stub resolvers <bcp14>MUST</bcp14> follow the recommendations of <xref target="RFC5452"/> as described in Section 4.5 to ensure Source Port randomization and Transaction ID randomization.</t>

</section>
<section anchor="ttl-value-handling"><name>Handling of TTL Values</name>

<t>IoT devices have been observed making unexpectedly high numbers of DNS queries even when DNS record Time-To-Live values (TTLs) would mean this should be unnecessary. Devices have also been observed issuing DNS queries at fixed, highly predictable intervals for the same domain names, regardless of operational changes or TTL values.</t>

<t>Unnecessary queries may lead to a drain of power in resource-constrained IoT devices. Conversely, very high TTLs may impact device operations such as communicating with management servers, receiving software updates, or other changes, which may lead to security issues. Deterministic query behavior that ignores TTL values increases the risk of device fingerprinting by adversaries who can profile query timing to identify specific device models or firmware versions.</t>

<t>Manufacturers <bcp14>MUST</bcp14> configure the records in authoritative zones with TTL values appropriate to the use of the records by devices, ensuring the TTL is not too low so as to cause unnecessary queries for frequently used names, but not high enough to cause operational issues, such as when the IP address of an A record in a management zone changes.</t>

<t>IoT devices <bcp14>MUST</bcp14> cache DNS responses and <bcp14>SHOULD</bcp14> honor TTLs when caching. If for operational reasons this is not ideal, then minimum and maximum TTLs <bcp14>MAY</bcp14> be configurable on the device but <bcp14>MUST NOT</bcp14> be hardcoded values. Where device stub resolvers cannot be configured with minimum and maximum TTL values, this <bcp14>MAY</bcp14> be mitigated by setting these on the network resolver.</t>

<t>If certain device operational requirements necessitate periodic revalidation of critical domains (e.g. management servers), these repeated queries <bcp14>SHOULD</bcp14> use non-deterministic inter-query timing to avoid fixed intervals that could enable traffic fingerprinting.</t>

<t>In the event of resolution failure (e.g., no response from the resolver), devices <bcp14>SHOULD</bcp14> implement back-off strategies to limit unnecessary query traffic, also see <xref target="resolution-problems"/>.</t>

</section>
<section anchor="support-of-edns0"><name>Support of EDNS(0)</name>

<t>Devices have been observed having limited support for EDNS(0), causing them to revert to TCP for queries over 512 bytes, affecting the device's efficiency. Other research findings include increased processing overhead and devices failing to maintain their network connectivity when responses to DNS requests exceed 512 bytes.</t>

<t>IoT devices <bcp14>MUST</bcp14> support EDNS(0) and send a supported UDP packet size via OPT 41 <xref target="RFC6891"/>. To avoid fragmentation of UDP packets, which may be dropped by intervening networks, manufacturers <bcp14>MUST</bcp14> follow guidance in <xref target="RFC9715"/>, although device configuration <bcp14>MAY</bcp14> allow this to be configurable. Although the networks to which IoT devices connect may support larger packet sizes, the nature of these devices in being deployed on many network types, and DNS queries traversing networks controlled by different operators, means it is operationally more effective to use a smaller size that avoids fragmentation. In addition, IoT devices <bcp14>MUST</bcp14> support using both TCP and UDP for queries, and support switching to TCP when a TC bit is returned from the resolver <xref target="RFC1035"/>.</t>

</section>
<section anchor="resolution-problems"><name>Improve Device Behavior in Response to Resolution Problems</name>

<t>When resolving domain names, IoT devices may not receive a response from a resolver. As a result, surges in the number of queries and retries have been observed, or an increase in queries using an alternate protocol (more aggressively querying via IPv6 rather than IPv4).</t>

<t>Device software <bcp14>MUST</bcp14> implement DNS resolution algorithms that bound the number and rate of queries sent from the device stub resolver to its configured resolvers. This will be implementation specific, but manufacturers should consider implementing the recommendations for resolvers detailed in <xref target="RFC9520"/> section 3.2 which recommends the caching of resolution failures for at least 1 second.</t>

<t>If supported by the stub-resolver implementation on device operating systems the use of serve-stale <xref target="RFC8767"/> on the IoT device may mitigate the impact of failed resolution, such as when authoritative servers are unavailable. This will reduce the impact of surges in DNS traffic if the network resolver is unreachable and it may allow the device to maintain ongoing communication with endpoints for which previously valid DNS data remain usable.</t>

</section>
<section anchor="encrypted-standards"><name>Compliance with Encrypted DNS Standards</name>

<t>The majority of IoT devices use unencrypted DNS over port 53, which means this traffic can be captured and is open to interception and manipulation. Encrypted DNS protocols are not mandated for compliance with DNS standards, but the use of encrypted DNS may be mandated by some regulators and advised by competent authorities <xref target="ENISAGuidanceForNIS2"/> in deployment guidelines. Encrypted DNS support is widely deployed and it is possible for IoT devices to discover DNS resolver support for this as described in <xref target="configuring-resolvers"/>.</t>

<t>IoT devices <bcp14>SHOULD</bcp14> support encrypted DNS protocols such as DNS over TLS (DoT) <xref target="RFC7858"/>, DNS over QUIC (DoQ) <xref target="RFC9250"/>, or DNS over HTTPS (DoH) <xref target="RFC8484"/>. This enhances privacy by preventing passive observation of DNS queries, improves security by mitigating adversary-in-the-middle (AiTM) attacks, and enables compatibility with resolvers that require encrypted transport. To mitigate against fingerprinting of IoT devices, DNS queries can be padded as detailed in <xref target="RFC7830"/> and <xref target="RFC8467"/>.</t>

</section>
<section anchor="stub-resolver-dnssec"><name>Use of DNSSEC</name>

<t>IoT devices can be induced to contact an adversary server or make large volumes of DNS queries via spoofed responses to queries. It would be difficult for manufacturers to mitigate this by implementing checks of data received via DNS queries, such as validating IP addresses in the A/AAAA record RDATA as this does not reliably prevent malicious redirection. In addition, any validation of this type does not address the problem of AiTM attacks targeting DNS query responses.</t>

<t>DNSSEC can be implemented by manufacturers to mitigate AiTM attacks on DNS query responses. Note that manufacturers <bcp14>MUST</bcp14> have signed public zones used for device management and services so that validation can take place. This improves security when devices do not perform local validation, as many network operators deploy validating resolvers.</t>

<t>Manufacturers <bcp14>MAY</bcp14> improve device security by utilizing DNSSEC validation <xref target="RFC9364"/> on the stub resolver. When supported, devices typically follow one of two models for validation (see <xref target="stub-resolver-validation"/>) by setting a combination of the DO and CD bits in DNS queries:</t>

<t><list style="symbols">
  <t>Stub-resolver checking for validation - the stub resolver checks for the Authenticated Data (AD) bit in the response, which is suitable for constrained devices but requires explicit trust in the upstream resolver performing correct DNSSEC validation</t>
  <t>Stub-resolver performing full validation - local cryptographic checks of DNSSEC related records, providing stronger assurance</t>
</list></t>

<t>Both models improve security over unvalidated queries, but manufacturers should weigh the security considerations, such as trust assumptions, against the operational feasibility when determining which approach to adopt. Manufacturers should consider the type of network the device is likely to be deployed on, such as a home network vs. other environments, in determining the likelihood of DNSSEC validation being available on the network and thus deciding if the device should rely on a validating resolver or be independently capable of performing DNSSEC validation.</t>

<t>The deployment options are summarised below, with two constituting the typical deployment scenarios:</t>

<texttable title="Stub-resolver deployment options" anchor="stub-resolver-validation">
      <ttcol align='center'>DO Bit</ttcol>
      <ttcol align='center'>CD Bit</ttcol>
      <ttcol align='center'>Resolver Validated?</ttcol>
      <ttcol align='center'>DNSSEC RRs Returned?</ttcol>
      <ttcol align='left'>Notes</ttcol>
      <c>Y</c>
      <c>Y</c>
      <c>N</c>
      <c>Y</c>
      <c>Resolver does not validate. DNSSEC data returned. Stub-resolver performing full validation deployment.</c>
      <c>Y</c>
      <c>N</c>
      <c>Y</c>
      <c>Y</c>
      <c>Resolver validates. DNSSEC data returned. Stub-resolver can use AD bit to check validation.</c>
      <c>N</c>
      <c>Y</c>
      <c>N</c>
      <c>N</c>
      <c>Resolver does not validate. No DNSSEC data returned. Do not use.</c>
      <c>N</c>
      <c>N</c>
      <c>Y</c>
      <c>N</c>
      <c>Resolver validates. No DNSSEC data. Stub-resolver checking for validation deployment.</c>
</texttable>

<section anchor="stub-resolver-checking-for-validation"><name>Stub-resolver Checking for Validation</name>

<t>Where a manufacturer does utilize DNSSEC validation on the device the minimum implementation will be a stub resolver checking the AD bit to see if the answer has been validated. Relying solely on the AD bit assumes that the upstream resolver is trustworthy and uncompromised.</t>

<t>Manufacturers may implement a testing mechanism to determine if the network resolver supports DNSSEC enabling the device to utilize validation when available in a network that supports it, or falls back to unvalidated queries. Any such test of the resolver will only validate that it supports DNSSEC, given that the resolver is performing the validation it must be explicitly trusted.</t>

<t>In order to check that a DNS query has been validated a stub resolver <bcp14>MUST</bcp14> check the Authenticated Data (AD) bit <xref target="RFC4035"/> in responses to determine whether data was validated by the resolver it is using. When checking for the AD bit stub resolvers <bcp14>MUST</bcp14> treat DNSSEC validation failures as fatal. Responses that fail validation <bcp14>MUST NOT</bcp14> be used for name resolution.</t>

</section>
<section anchor="stub-resolver-performing-full-validation"><name>Stub-resolver Performing Full Validation</name>

<t>A device stub resolver can perform validation itself in cases where the network resolver does not validate queries or the device does not trust the network resolver to do so.</t>

<t>Considerations for device manufacturers in implementing full validation include:</t>

<t><list style="symbols">
  <t>Devices performing local validation gain end-to-end trust but at higher computational cost</t>
  <t>Devices should cache results including validation outcomes to reduce repeated computation</t>
  <t>Devices need to be shipped with a root trust anchor and have a mechanism to securely update this</t>
</list></t>

<t>To implement full local validation stub resolvers <bcp14>MUST</bcp14> conform to <xref target="RFC4035"/> section 4.9. In practice it is likely to be easier for manufacturers to implement a minimum footprint validating recursive server on the device, configured to forward queries to the network resolver(s), rather than develop this capability in any stub resolver.</t>

</section>
</section>
</section>
<section anchor="guidance-for-manufacturer-authoritative-dns-zones"><name>Guidance for Manufacturer Authoritative DNS Zones</name>

<t>Manufacturers use public authoritative DNS zones for purposes such as device configuration, control and upgrades.</t>

<section anchor="zone-signing"><name>Zone Signing</name>

<t>Zones supporting the management and data collection of devices <bcp14>MUST</bcp14> be DNSSEC signed in order to support the behavior described in <xref target="stub-resolver-dnssec"/> and <xref target="resolvers-supporting-dnssec"/>. The zones used for these purposes <bcp14>SHOULD</bcp14> be publicly listed for network operators to use in securing their networks as described in <xref target="blocking-malicious-traffic"/>.</t>

</section>
<section anchor="ttl-values"><name>TTL Values</name>

<t>As stated in <xref target="ttl-value-handling"/> manufacturers <bcp14>MUST</bcp14> configure TTL values for management zone records that are appropriate for device operations, considering a balance between avoiding excessive query traffic, maintaining continuous operation in the event the resolver is unreachable, and accommodating potential changes in RDATA such as management IP addresses.</t>

</section>
</section>
<section anchor="guidance-for-network-operators"><name>Guidance for Network Operators</name>

<t>Most IoT devices do not have specific security software agents installed on them, as is typically the case with general-purpose operating systems, and supply chain vulnerabilities may mean that these devices are compromised before reaching the consumer. Network operators can use DNS resolvers to mitigate these risks, although this will vary depending on policy. These networks may be public, without restrictions on DNS usage, or may be private networks that could be dedicated to IoT devices where operators implement more security controls to mitigate these risks.</t>

<t>Manufacturers should be aware of network operator DNS deployment options as devices will use these resolvers, even though this infrastructure is not under manufacturer's control.</t>

<t>As some aspects of DNS security rely on the resolution process between stub resolver, resolver, and authoritative servers, as well as DNS record types (notably DNSSEC). It is also necessary for network operators to implement DNS in such a way as to support some of the recommendations in <xref target="stub-resolvers"/>.</t>

<section anchor="resolvers-supporting-dnssec"><name>Resolvers Supporting DNSSEC</name>

<t>In order to support improving device DNS security as described in <xref target="stub-resolver-dnssec"/> resolvers <bcp14>SHOULD</bcp14> be configured to validate DNS responses using DNSSEC.</t>

</section>
<section anchor="blocking-malicious-traffic"><name>Blocking of Unmanaged or Malicious DNS Traffic</name>

<t>Private network operators may block DNS traffic to any resolvers other than those managed by the operator, so that traffic is not bypassing any DNS security controls such as response policy zones or DNS traffic logging. This is more likely to be the case on enterprise or other private networks rather than service providers that don't want to limit customers using alternate resolvers.</t>

<t>Where operators have networks dedicated to IoT devices, they <bcp14>MAY</bcp14> limit DNS resolution to only domain names used by those IoT devices to mitigate any impact in the event of a compromise to the device. Manufacturers <bcp14>SHOULD</bcp14> provide domain names used for communication to facilitate this and other security measures used to secure devices and identify those that are compromised. Manufacturer Usage Descriptions (MUDs) can provide details of domain names used in device operations that can then be added to DNS security controls.</t>

</section>
<section anchor="availability"><name>Availability</name>

<t>Providers <bcp14>SHOULD</bcp14> optimize resolver configurations to mitigate the security and operational risks identified in this document, provided that such optimizations do not adversely affect the operation of other DNS clients.</t>

<t>Network operators <bcp14>SHOULD</bcp14> optimize DNS resolver configurations through the use of serve-stale mechanisms, as specified in <xref target="RFC8767"/>. This is particularly recommended in environments dedicated to supporting IoT devices, in order to minimize operational disruption during DNS resolution failures. Furthermore, network operators <bcp14>MUST</bcp14> provide dual-stack DNS resolvers for IoT devices configured with both IPv4 and IPv6 connectivity, rather than limiting resolver support to IPv4 only.</t>

<t>DNS queries are most commonly transported over UDP, and compromised devices have been used in DoS attacks by sending queries with forged source addresses. Therefore, network operators <bcp14>MUST</bcp14> implement <xref target="RFC2827"/> network ingress filtering. Network operators <bcp14>SHOULD</bcp14> implement DNS Response Rate Limiting (RRL) on resolvers to mitigate high query volumes from devices causing DoS attacks against DNS infrastructure.</t>

</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>IoT devices are often deployed at scale, operate under resource constraints, and typically lack host-based security controls. Consequently, weaknesses in DNS behavior can increase exposure to spoofing, on-path attacks, amplification, and fingerprinting. The recommendations in this document improve the security properties of DNS resolution by promoting correct protocol behavior, reducing unnecessary or anomalous query traffic, and supporting the use of authenticated and integrity-protected data (e.g., DNSSEC) and encrypted transport. The effectiveness of these measures depends on coordinated deployment across stub resolvers, recursive resolvers, and authoritative servers. Partial deployment may reduce the benefits of some mechanisms.</t>

<t>Residual risks remain, including device compromise outside the DNS layer, misconfiguration, or reliance on untrusted upstream resolvers. In addition, the use of encrypted DNS may limit network-based inspection and policy enforcement. This document does not introduce new protocols or mechanisms; it reduces the attack surface and improves the predictability and resilience of DNS interactions in IoT environments.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document has no IANA actions.</t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>
<reference anchor="RFC5452">
  <front>
    <title>Measures for Making DNS More Resilient against Forged Answers</title>
    <author fullname="A. Hubert" initials="A." surname="Hubert"/>
    <author fullname="R. van Mook" initials="R." surname="van Mook"/>
    <date month="January" year="2009"/>
    <abstract>
      <t>The current Internet climate poses serious threats to the Domain Name System. In the interim period before the DNS protocol can be secured more fully, measures can already be taken to harden the DNS to make 'spoofing' a recursing nameserver many orders of magnitude harder.</t>
      <t>Even a cryptographically secured DNS benefits from having the ability to discard bogus responses quickly, as this potentially saves large amounts of computation.</t>
      <t>By describing certain behavior that has previously not been standardized, this document sets out how to make the DNS more resilient against accepting incorrect responses. This document updates RFC 2181. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5452"/>
  <seriesInfo name="DOI" value="10.17487/RFC5452"/>
</reference>
<reference anchor="RFC6891">
  <front>
    <title>Extension Mechanisms for DNS (EDNS(0))</title>
    <author fullname="J. Damas" initials="J." surname="Damas"/>
    <author fullname="M. Graff" initials="M." surname="Graff"/>
    <author fullname="P. Vixie" initials="P." surname="Vixie"/>
    <date month="April" year="2013"/>
    <abstract>
      <t>The Domain Name System's wire protocol includes a number of fixed fields whose range has been or soon will be exhausted and does not allow requestors to advertise their capabilities to responders. This document describes backward-compatible mechanisms for allowing the protocol to grow.</t>
      <t>This document updates the Extension Mechanisms for DNS (EDNS(0)) specification (and obsoletes RFC 2671) based on feedback from deployment experience in several implementations. It also obsoletes RFC 2673 ("Binary Labels in the Domain Name System") and adds considerations on the use of extended labels in the DNS.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="75"/>
  <seriesInfo name="RFC" value="6891"/>
  <seriesInfo name="DOI" value="10.17487/RFC6891"/>
</reference>
<reference anchor="RFC9715">
  <front>
    <title>IP Fragmentation Avoidance in DNS over UDP</title>
    <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
    <author fullname="P. Vixie" initials="P." surname="Vixie"/>
    <date month="January" year="2025"/>
    <abstract>
      <t>The widely deployed Extension Mechanisms for DNS (EDNS(0)) feature in the DNS enables a DNS receiver to indicate its received UDP message size capacity, which supports the sending of large UDP responses by a DNS server. Large DNS/UDP messages are more likely to be fragmented, and IP fragmentation has exposed weaknesses in application protocols. It is possible to avoid IP fragmentation in DNS by limiting the response size where possible and signaling the need to upgrade from UDP to TCP transport where necessary. This document describes techniques to avoid IP fragmentation in DNS.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9715"/>
  <seriesInfo name="DOI" value="10.17487/RFC9715"/>
</reference>
<reference anchor="RFC1035">
  <front>
    <title>Domain names - implementation and specification</title>
    <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
    <date month="November" year="1987"/>
    <abstract>
      <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="13"/>
  <seriesInfo name="RFC" value="1035"/>
  <seriesInfo name="DOI" value="10.17487/RFC1035"/>
</reference>
<reference anchor="RFC2827">
  <front>
    <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
    <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
    <author fullname="D. Senie" initials="D." surname="Senie"/>
    <date month="May" year="2000"/>
    <abstract>
      <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="38"/>
  <seriesInfo name="RFC" value="2827"/>
  <seriesInfo name="DOI" value="10.17487/RFC2827"/>
</reference>



    </references>

    <references title='Informative References' anchor="sec-informative-references">

<reference anchor="UCLandInriaPaper" target="https://discovery.ucl.ac.uk/id/eprint/10223583/">
  <front>
    <title>From Lookup to Lockdown DNS Guidelines for Securing IoT Ecosystems</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="ENISAGuidanceForNIS2" target="https://www.enisa.europa.eu/publications/nis2-technical-implementation-guidance">
  <front>
    <title>NIS2 Technical Implementation Guidance</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>


<reference anchor="RFC7452">
  <front>
    <title>Architectural Considerations in Smart Object Networking</title>
    <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
    <author fullname="J. Arkko" initials="J." surname="Arkko"/>
    <author fullname="D. Thaler" initials="D." surname="Thaler"/>
    <author fullname="D. McPherson" initials="D." surname="McPherson"/>
    <date month="March" year="2015"/>
    <abstract>
      <t>The term "Internet of Things" (IoT) denotes a trend where a large number of embedded devices employ communication services offered by Internet protocols. Many of these devices, often called "smart objects", are not directly operated by humans but exist as components in buildings or vehicles, or are spread out in the environment. Following the theme "Everything that can be connected will be connected", engineers and researchers designing smart object networks need to decide how to achieve this in practice.</t>
      <t>This document offers guidance to engineers designing Internet- connected smart objects.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7452"/>
  <seriesInfo name="DOI" value="10.17487/RFC7452"/>
</reference>
<reference anchor="RFC9150">
  <front>
    <title>TLS 1.3 Authentication and Integrity-Only Cipher Suites</title>
    <author fullname="N. Cam-Winget" initials="N." surname="Cam-Winget"/>
    <author fullname="J. Visoky" initials="J." surname="Visoky"/>
    <date month="April" year="2022"/>
    <abstract>
      <t>This document defines the use of cipher suites for TLS 1.3 based on Hashed Message Authentication Code (HMAC). Using these cipher suites provides server and, optionally, mutual authentication and data authenticity, but not data confidentiality. Cipher suites with these properties are not of general applicability, but there are use cases, specifically in Internet of Things (IoT) and constrained environments, that do not require confidentiality of exchanged messages while still requiring integrity protection, server authentication, and optional client authentication. This document gives examples of such use cases, with the caveat that prior to using these integrity-only cipher suites, a threat model for the situation at hand is needed, and a threat analysis must be performed within that model to determine whether the use of integrity-only cipher suites is appropriate. The approach described in this document is not endorsed by the IETF and does not have IETF consensus, but it is presented here to enable interoperable implementation of a reduced-security mechanism that provides authentication and message integrity without supporting confidentiality.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9150"/>
  <seriesInfo name="DOI" value="10.17487/RFC9150"/>
</reference>
<reference anchor="RFC9499">
  <front>
    <title>DNS Terminology</title>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
    <date month="March" year="2024"/>
    <abstract>
      <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
      <t>This document updates RFC 2308 by clarifying the definitions of "forwarder" and "QNAME". It obsoletes RFC 8499 by adding multiple terms and clarifications. Comprehensive lists of changed and new definitions can be found in Appendices A and B.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="219"/>
  <seriesInfo name="RFC" value="9499"/>
  <seriesInfo name="DOI" value="10.17487/RFC9499"/>
</reference>
<reference anchor="RFC8106">
  <front>
    <title>IPv6 Router Advertisement Options for DNS Configuration</title>
    <author fullname="J. Jeong" initials="J." surname="Jeong"/>
    <author fullname="S. Park" initials="S." surname="Park"/>
    <author fullname="L. Beloeil" initials="L." surname="Beloeil"/>
    <author fullname="S. Madanapalli" initials="S." surname="Madanapalli"/>
    <date month="March" year="2017"/>
    <abstract>
      <t>This document specifies IPv6 Router Advertisement (RA) options (called "DNS RA options") to allow IPv6 routers to advertise a list of DNS Recursive Server Addresses and a DNS Search List to IPv6 hosts.</t>
      <t>This document, which obsoletes RFC 6106, defines a higher default value of the lifetime of the DNS RA options to reduce the likelihood of expiry of the options on links with a relatively high rate of packet loss.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8106"/>
  <seriesInfo name="DOI" value="10.17487/RFC8106"/>
</reference>
<reference anchor="RFC8415">
  <front>
    <title>Dynamic Host Configuration Protocol for IPv6 (DHCPv6)</title>
    <author fullname="T. Mrugalski" initials="T." surname="Mrugalski"/>
    <author fullname="M. Siodelski" initials="M." surname="Siodelski"/>
    <author fullname="B. Volz" initials="B." surname="Volz"/>
    <author fullname="A. Yourtchenko" initials="A." surname="Yourtchenko"/>
    <author fullname="M. Richardson" initials="M." surname="Richardson"/>
    <author fullname="S. Jiang" initials="S." surname="Jiang"/>
    <author fullname="T. Lemon" initials="T." surname="Lemon"/>
    <author fullname="T. Winters" initials="T." surname="Winters"/>
    <date month="November" year="2018"/>
    <abstract>
      <t>This document describes the Dynamic Host Configuration Protocol for IPv6 (DHCPv6): an extensible mechanism for configuring nodes with network configuration parameters, IP addresses, and prefixes. Parameters can be provided statelessly, or in combination with stateful assignment of one or more IPv6 addresses and/or IPv6 prefixes. DHCPv6 can operate either in place of or in addition to stateless address autoconfiguration (SLAAC).</t>
      <t>This document updates the text from RFC 3315 (the original DHCPv6 specification) and incorporates prefix delegation (RFC 3633), stateless DHCPv6 (RFC 3736), an option to specify an upper bound for how long a client should wait before refreshing information (RFC 4242), a mechanism for throttling DHCPv6 clients when DHCPv6 service is not available (RFC 7083), and relay agent handling of unknown messages (RFC 7283). In addition, this document clarifies the interactions between models of operation (RFC 7550). As such, this document obsoletes RFC 3315, RFC 3633, RFC 3736, RFC 4242, RFC 7083, RFC 7283, and RFC 7550.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8415"/>
  <seriesInfo name="DOI" value="10.17487/RFC8415"/>
</reference>
<reference anchor="RFC2132">
  <front>
    <title>DHCP Options and BOOTP Vendor Extensions</title>
    <author fullname="S. Alexander" initials="S." surname="Alexander"/>
    <author fullname="R. Droms" initials="R." surname="Droms"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>This document specifies the current set of DHCP options. Future options will be specified in separate RFCs. The current list of valid options is also available in ftp://ftp.isi.edu/in-notes/iana/assignments. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2132"/>
  <seriesInfo name="DOI" value="10.17487/RFC2132"/>
</reference>
<reference anchor="RFC9463">
  <front>
    <title>DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers (DNR)</title>
    <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
    <author fullname="T. Reddy.K" initials="T." role="editor" surname="Reddy.K"/>
    <author fullname="D. Wing" initials="D." surname="Wing"/>
    <author fullname="N. Cook" initials="N." surname="Cook"/>
    <author fullname="T. Jensen" initials="T." surname="Jensen"/>
    <date month="November" year="2023"/>
    <abstract>
      <t>This document specifies new DHCP and IPv6 Router Advertisement options to discover encrypted DNS resolvers (e.g., DNS over HTTPS, DNS over TLS, and DNS over QUIC). Particularly, it allows a host to learn an Authentication Domain Name together with a list of IP addresses and a set of service parameters to reach such encrypted DNS resolvers.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9463"/>
  <seriesInfo name="DOI" value="10.17487/RFC9463"/>
</reference>
<reference anchor="RFC9462">
  <front>
    <title>Discovery of Designated Resolvers</title>
    <author fullname="T. Pauly" initials="T." surname="Pauly"/>
    <author fullname="E. Kinnear" initials="E." surname="Kinnear"/>
    <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
    <author fullname="P. McManus" initials="P." surname="McManus"/>
    <author fullname="T. Jensen" initials="T." surname="Jensen"/>
    <date month="November" year="2023"/>
    <abstract>
      <t>This document defines Discovery of Designated Resolvers (DDR), a set of mechanisms for DNS clients to use DNS records to discover a resolver's encrypted DNS configuration. An Encrypted DNS Resolver discovered in this manner is referred to as a "Designated Resolver". These mechanisms can be used to move from unencrypted DNS to encrypted DNS when only the IP address of a resolver is known. These mechanisms are designed to be limited to cases where Unencrypted DNS Resolvers and their Designated Resolvers are operated by the same entity or cooperating entities. It can also be used to discover support for encrypted DNS protocols when the name of an Encrypted DNS Resolver is known.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9462"/>
  <seriesInfo name="DOI" value="10.17487/RFC9462"/>
</reference>
<reference anchor="RFC9520">
  <front>
    <title>Negative Caching of DNS Resolution Failures</title>
    <author fullname="D. Wessels" initials="D." surname="Wessels"/>
    <author fullname="W. Carroll" initials="W." surname="Carroll"/>
    <author fullname="M. Thomas" initials="M." surname="Thomas"/>
    <date month="December" year="2023"/>
    <abstract>
      <t>In the DNS, resolvers employ caching to reduce both latency for end users and load on authoritative name servers. The process of resolution may result in one of three types of responses: (1) a response containing the requested data, (2) a response indicating the requested data does not exist, or (3) a non-response due to a resolution failure in which the resolver does not receive any useful information regarding the data's existence. This document concerns itself only with the third type.</t>
      <t>RFC 2308 specifies requirements for DNS negative caching. There, caching of TYPE 2 responses is mandatory and caching of TYPE 3 responses is optional. This document updates RFC 2308 to require negative caching for DNS resolution failures.</t>
      <t>RFC 4035 allows DNSSEC validation failure caching. This document updates RFC 4035 to require caching for DNSSEC validation failures.</t>
      <t>RFC 4697 prohibits aggressive requerying for NS records at a failed zone's parent zone. This document updates RFC 4697 to expand this requirement to all query types and to all ancestor zones.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9520"/>
  <seriesInfo name="DOI" value="10.17487/RFC9520"/>
</reference>
<reference anchor="RFC8767">
  <front>
    <title>Serving Stale Data to Improve DNS Resiliency</title>
    <author fullname="D. Lawrence" initials="D." surname="Lawrence"/>
    <author fullname="W. Kumari" initials="W." surname="Kumari"/>
    <author fullname="P. Sood" initials="P." surname="Sood"/>
    <date month="March" year="2020"/>
    <abstract>
      <t>This document defines a method (serve-stale) for recursive resolvers to use stale DNS data to avoid outages when authoritative nameservers cannot be reached to refresh expired data. One of the motivations for serve-stale is to make the DNS more resilient to DoS attacks and thereby make them less attractive as an attack vector. This document updates the definitions of TTL from RFCs 1034 and 1035 so that data can be kept in the cache beyond the TTL expiry; it also updates RFC 2181 by interpreting values with the high-order bit set as being positive, rather than 0, and suggests a cap of 7 days.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8767"/>
  <seriesInfo name="DOI" value="10.17487/RFC8767"/>
</reference>
<reference anchor="RFC7858">
  <front>
    <title>Specification for DNS over Transport Layer Security (TLS)</title>
    <author fullname="Z. Hu" initials="Z." surname="Hu"/>
    <author fullname="L. Zhu" initials="L." surname="Zhu"/>
    <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
    <author fullname="A. Mankin" initials="A." surname="Mankin"/>
    <author fullname="D. Wessels" initials="D." surname="Wessels"/>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <date month="May" year="2016"/>
    <abstract>
      <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
      <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7858"/>
  <seriesInfo name="DOI" value="10.17487/RFC7858"/>
</reference>
<reference anchor="RFC9250">
  <front>
    <title>DNS over Dedicated QUIC Connections</title>
    <author fullname="C. Huitema" initials="C." surname="Huitema"/>
    <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
    <author fullname="A. Mankin" initials="A." surname="Mankin"/>
    <date month="May" year="2022"/>
    <abstract>
      <t>This document describes the use of QUIC to provide transport confidentiality for DNS. The encryption provided by QUIC has similar properties to those provided by TLS, while QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides more efficient packet-loss recovery than UDP. DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC 7858, and latency characteristics similar to classic DNS over UDP. This specification describes the use of DoQ as a general-purpose transport for DNS and includes the use of DoQ for stub to recursive, recursive to authoritative, and zone transfer scenarios.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9250"/>
  <seriesInfo name="DOI" value="10.17487/RFC9250"/>
</reference>
<reference anchor="RFC8484">
  <front>
    <title>DNS Queries over HTTPS (DoH)</title>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <author fullname="P. McManus" initials="P." surname="McManus"/>
    <date month="October" year="2018"/>
    <abstract>
      <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8484"/>
  <seriesInfo name="DOI" value="10.17487/RFC8484"/>
</reference>
<reference anchor="RFC7830">
  <front>
    <title>The EDNS(0) Padding Option</title>
    <author fullname="A. Mayrhofer" initials="A." surname="Mayrhofer"/>
    <date month="May" year="2016"/>
    <abstract>
      <t>This document specifies the EDNS(0) "Padding" option, which allows DNS clients and servers to pad request and response messages by a variable number of octets.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7830"/>
  <seriesInfo name="DOI" value="10.17487/RFC7830"/>
</reference>
<reference anchor="RFC8467">
  <front>
    <title>Padding Policies for Extension Mechanisms for DNS (EDNS(0))</title>
    <author fullname="A. Mayrhofer" initials="A." surname="Mayrhofer"/>
    <date month="October" year="2018"/>
    <abstract>
      <t>RFC 7830 specifies the "Padding" option for Extension Mechanisms for DNS (EDNS(0)) but does not specify the actual padding length for specific applications. This memo lists the possible options ("padding policies"), discusses the implications of each option, and provides a recommended (experimental) option.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8467"/>
  <seriesInfo name="DOI" value="10.17487/RFC8467"/>
</reference>
<reference anchor="RFC9364">
  <front>
    <title>DNS Security Extensions (DNSSEC)</title>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <date month="February" year="2023"/>
    <abstract>
      <t>This document describes the DNS Security Extensions (commonly called "DNSSEC") that are specified in RFCs 4033, 4034, and 4035, as well as a handful of others. One purpose is to introduce all of the RFCs in one place so that the reader can understand the many aspects of DNSSEC. This document does not update any of those RFCs. A second purpose is to state that using DNSSEC for origin authentication of DNS data is the best current practice. A third purpose is to provide a single reference for other documents that want to refer to DNSSEC.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="237"/>
  <seriesInfo name="RFC" value="9364"/>
  <seriesInfo name="DOI" value="10.17487/RFC9364"/>
</reference>
<reference anchor="RFC4035">
  <front>
    <title>Protocol Modifications for the DNS Security Extensions</title>
    <author fullname="R. Arends" initials="R." surname="Arends"/>
    <author fullname="R. Austein" initials="R." surname="Austein"/>
    <author fullname="M. Larson" initials="M." surname="Larson"/>
    <author fullname="D. Massey" initials="D." surname="Massey"/>
    <author fullname="S. Rose" initials="S." surname="Rose"/>
    <date month="March" year="2005"/>
    <abstract>
      <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of new resource records and protocol modifications that add data origin authentication and data integrity to the DNS. This document describes the DNSSEC protocol modifications. This document defines the concept of a signed zone, along with the requirements for serving and resolving by using DNSSEC. These techniques allow a security-aware resolver to authenticate both DNS resource records and authoritative DNS error indications.</t>
      <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4035"/>
  <seriesInfo name="DOI" value="10.17487/RFC4035"/>
</reference>



    </references>

</references>


<?line 249?>

<section numbered="false" anchor="acknowledgments"><name>Acknowledgments</name>

<t>We thank the researchers, reviewers, and engineers who contributed to the analysis and testing process.</t>

<t>The authors thank Mohamed Boucadair, Chris Box, Ross Gibson, Eliot Lear, Martine Sophie Lenders, Jim Reid, Michael Richardson and Hannes Tschofenig for their contributions, questions and comments.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

