<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.20 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-rbw-add-encrypted-dns-forwarders-02" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.24.0 -->
  <front>
    <title abbrev="Encrypted DNS Forwarders on CPEs">Hosting Encrypted DNS Forwarders on CPEs</title>
    <seriesInfo name="Internet-Draft" value="draft-rbw-add-encrypted-dns-forwarders-02"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Mohamed Boucadair">
      <organization>Orange</organization>
      <address>
        <postal>
          <city>Rennes</city>
          <code>35000</code>
          <country>France</country>
        </postal>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <author initials="D." surname="Wing" fullname="Dan Wing">
      <organization abbrev="Cloud Software Group">Cloud Software Group Holdings, Inc.</organization>
      <address>
        <email>danwing@gmail.com</email>
      </address>
    </author>
    <date year="2024" month="November" day="04"/>
    <area>Internet</area>
    <workgroup>Adaptive DNS Discovery</workgroup>
    <keyword>DNS</keyword>
    <keyword>deployment</keyword>
    <keyword>Discovery</keyword>
    <abstract>
      <?line 73?>

<t>Typical connectivity service offerings based upon on Customer Premise Equipment (CPEs)
involve DNS forwarders on the CPE for various reasons (offer
local services, control the scope/content of information in DNS, ensure better
dependability for local service, provide control to users, etc.). Upgrading DNS to use
encrypted transports introduces deployment complications as to how to sustain current
offerings with local services. Solutions are needed to ease operating
DNS forwarders in CPEs while allowing to make use of encrypted DNS  capabilities.</t>
      <t>This document describes the problem and to what extent existing solutions can or can't be used for
these deployments. For example, Star certificates and name constraints extension suffer from
the problem of deploying a new feature to CAs, TLS clients, and servers.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Adaptive DNS Discovery Working Group mailing list (add@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/add/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/boucadair/encrypted-dns-forwarders"/>.</t>
    </note>
  </front>
  <middle>
    <?line 87?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Customer Premises Equipment (CPEs, also called Home Routers) are a
   critical component of the home network, and their security is
   essential to protecting the devices and data that are connected to
   them.  For example, the prpl Foundation <xref target="prpl"/> has developed a number
   of initiatives to promote home router security and hardening.  The
   prplWrt project <xref target="prplwrt"/> is an initiative in prpl Foundation that
   aims to improve the security and performance of open-source router
   firmware, such as OpenWrt <xref target="openwrt"/>.  OpenWrt is an open-source
   operating system that is designed to run on a wide range of routers
   and embedded devices.  It now includes support for containerization
   technology such as Docker, making it possible to run containerized
   applications on a home router.  Further, DNS providers have optimized
   the encrypted DNS forwarder to run in a container in home routers.</t>
      <t>However, upgrading DNS to use encrypted transports (e.g., DNS over HTTPS (DoH) <xref target="RFC8484"/>, DNS over TLS (DoT) <xref target="RFC7858"/>,
   and DNS over QUIC (DoQ) <xref target="RFC9250"/>) introduces deployment complications as to how to sustain current
offerings with local services.</t>
      <t>This document describes the problem encountered to host encrypted DNS resolvers
   in managed CPEs. It also identifies a set of requirements and discusses to what extent existing solutions
   can (or can't) meet these requirements.</t>
    </section>
    <section anchor="scope">
      <name>Scope</name>
      <t>This document describes the current state of the art for deploying
encrypted DNS on customer premise equipment.  New mechanisms should be
described in separate documents.</t>
      <t>The document does not focus on generic considerations related to
deploying DNS proxies. The reader may refer to <xref target="RFC5625"/> for such
matters.</t>
      <t>The mechanism for the client to authenticate the local encrypted DNS
server is out of scope of this draft (see
<xref target="I-D.rbw-home-servers"/>).  This draft details how such an
authenticated local encrypted DNS server would be used.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>This document makes use of the terms defined in <xref target="RFC9499"/>.</t>
      <t>The following additional terms are used:</t>
      <dl>
        <dt>DHCP:</dt>
        <dd>
          <t>refers to both DHCPv4 and DHCPv6.</t>
        </dd>
        <dt>Do53:</dt>
        <dd>
          <t>refers to unencrypted DNS.</t>
        </dd>
        <dt>DNR:</dt>
        <dd>
          <t>refers to the Discovery of Network-designated Resolvers
procedure defined in <xref target="RFC9463"/>.</t>
        </dd>
        <dt>DDR:</dt>
        <dd>
          <t>refers to the Discovery of Designated Resolvers procedure
defined in <xref target="RFC9462"/>.</t>
        </dd>
        <dt>Encrypted DNS:</dt>
        <dd>
          <t>refers to a scheme where DNS exchanges are
transported over an encrypted channel.  Examples of encrypted DNS
are DoH <xref target="RFC8484"/>, DoT <xref target="RFC7858"/>, and DoQ <xref target="RFC9250"/>.</t>
        </dd>
        <dt>Managed CPE:</dt>
        <dd>
          <t>refers to a CPE that is managed by an ISP or CPE vendor
or Security Service Provider.</t>
        </dd>
      </dl>
    </section>
    <section anchor="proxied-dns-in-local-networks">
      <name>Proxied DNS In Local Networks</name>
      <t><xref target="fig1"/> shows various network setups where the CPE embeds a caching
   encrypted DNS forwarder.</t>
      <figure anchor="fig1">
        <name>Proxied Encrypted DNS Sessions</name>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="384" width="560" viewBox="0 0 560 384" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 48,272 L 48,352" fill="none" stroke="black"/>
              <path d="M 80,96 L 80,176" fill="none" stroke="black"/>
              <path d="M 88,240 L 88,272" fill="none" stroke="black"/>
              <path d="M 120,64 L 120,96" fill="none" stroke="black"/>
              <path d="M 224,272 L 224,352" fill="none" stroke="black"/>
              <path d="M 256,96 L 256,176" fill="none" stroke="black"/>
              <path d="M 288,240 L 288,320" fill="none" stroke="black"/>
              <path d="M 320,64 L 320,144" fill="none" stroke="black"/>
              <path d="M 400,104 L 400,176" fill="none" stroke="black"/>
              <path d="M 408,240 L 408,272" fill="none" stroke="black"/>
              <path d="M 448,64 L 448,80" fill="none" stroke="black"/>
              <path d="M 480,272 L 480,352" fill="none" stroke="black"/>
              <path d="M 136,48 L 240,48" fill="none" stroke="black"/>
              <path d="M 336,48 L 432,48" fill="none" stroke="black"/>
              <path d="M 96,80 L 112,80" fill="none" stroke="black"/>
              <path d="M 272,80 L 312,80" fill="none" stroke="black"/>
              <path d="M 336,96 L 432,96" fill="none" stroke="black"/>
              <path d="M 136,112 L 240,112" fill="none" stroke="black"/>
              <path d="M 88,142 L 152,142" fill="none" stroke="black"/>
              <path d="M 88,146 L 152,146" fill="none" stroke="black"/>
              <path d="M 184,142 L 248,142" fill="none" stroke="black"/>
              <path d="M 184,146 L 248,146" fill="none" stroke="black"/>
              <path d="M 88,158 L 112,158" fill="none" stroke="black"/>
              <path d="M 88,162 L 112,162" fill="none" stroke="black"/>
              <path d="M 224,158 L 248,158" fill="none" stroke="black"/>
              <path d="M 224,162 L 248,162" fill="none" stroke="black"/>
              <path d="M 104,224 L 208,224" fill="none" stroke="black"/>
              <path d="M 304,224 L 392,224" fill="none" stroke="black"/>
              <path d="M 64,256 L 80,256" fill="none" stroke="black"/>
              <path d="M 240,256 L 280,256" fill="none" stroke="black"/>
              <path d="M 416,256 L 456,256" fill="none" stroke="black"/>
              <path d="M 104,288 L 208,288" fill="none" stroke="black"/>
              <path d="M 304,288 L 392,288" fill="none" stroke="black"/>
              <path d="M 56,318 L 120,318" fill="none" stroke="black"/>
              <path d="M 56,322 L 120,322" fill="none" stroke="black"/>
              <path d="M 152,318 L 216,318" fill="none" stroke="black"/>
              <path d="M 152,322 L 216,322" fill="none" stroke="black"/>
              <path d="M 56,334 L 80,334" fill="none" stroke="black"/>
              <path d="M 56,338 L 80,338" fill="none" stroke="black"/>
              <path d="M 192,334 L 216,334" fill="none" stroke="black"/>
              <path d="M 192,338 L 216,338" fill="none" stroke="black"/>
              <path d="M 232,334 L 296,334" fill="none" stroke="black"/>
              <path d="M 232,338 L 296,338" fill="none" stroke="black"/>
              <path d="M 408,334 L 472,334" fill="none" stroke="black"/>
              <path d="M 408,338 L 472,338" fill="none" stroke="black"/>
              <path d="M 136,48 C 127.16936,48 120,55.16936 120,64" fill="none" stroke="black"/>
              <path d="M 240,48 C 248.83064,48 256,55.16936 256,64" fill="none" stroke="black"/>
              <path d="M 336,48 C 327.16936,48 320,55.16936 320,64" fill="none" stroke="black"/>
              <path d="M 432,48 C 440.83064,48 448,55.16936 448,64" fill="none" stroke="black"/>
              <path d="M 336,96 C 327.16936,96 320,88.83064 320,80" fill="none" stroke="black"/>
              <path d="M 432,96 C 440.83064,96 448,88.83064 448,80" fill="none" stroke="black"/>
              <path d="M 136,112 C 127.16936,112 120,104.83064 120,96" fill="none" stroke="black"/>
              <path d="M 240,112 C 248.83064,112 256,104.83064 256,96" fill="none" stroke="black"/>
              <path d="M 104,224 C 95.16936,224 88,231.16936 88,240" fill="none" stroke="black"/>
              <path d="M 208,224 C 216.83064,224 224,231.16936 224,240" fill="none" stroke="black"/>
              <path d="M 304,224 C 295.16936,224 288,231.16936 288,240" fill="none" stroke="black"/>
              <path d="M 392,224 C 400.83064,224 408,231.16936 408,240" fill="none" stroke="black"/>
              <path d="M 104,288 C 95.16936,288 88,280.83064 88,272" fill="none" stroke="black"/>
              <path d="M 208,288 C 216.83064,288 224,280.83064 224,272" fill="none" stroke="black"/>
              <path d="M 304,288 C 295.16936,288 288,280.83064 288,272" fill="none" stroke="black"/>
              <path d="M 392,288 C 400.83064,288 408,280.83064 408,272" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="480,336 468,330.4 468,341.6" fill="black" transform="rotate(0,472,336)"/>
              <polygon class="arrowhead" points="256,160 244,154.4 244,165.6" fill="black" transform="rotate(0,248,160)"/>
              <polygon class="arrowhead" points="256,144 244,138.4 244,149.6" fill="black" transform="rotate(0,248,144)"/>
              <polygon class="arrowhead" points="240,336 228,330.4 228,341.6" fill="black" transform="rotate(180,232,336)"/>
              <polygon class="arrowhead" points="224,336 212,330.4 212,341.6" fill="black" transform="rotate(0,216,336)"/>
              <polygon class="arrowhead" points="224,320 212,314.4 212,325.6" fill="black" transform="rotate(0,216,320)"/>
              <polygon class="arrowhead" points="96,160 84,154.4 84,165.6" fill="black" transform="rotate(180,88,160)"/>
              <polygon class="arrowhead" points="96,144 84,138.4 84,149.6" fill="black" transform="rotate(180,88,144)"/>
              <polygon class="arrowhead" points="64,336 52,330.4 52,341.6" fill="black" transform="rotate(180,56,336)"/>
              <polygon class="arrowhead" points="64,320 52,314.4 52,325.6" fill="black" transform="rotate(180,56,320)"/>
              <g class="text">
                <text x="16" y="36">(a)</text>
                <text x="384" y="68">ISP</text>
                <text x="76" y="84">Host</text>
                <text x="184" y="84">LAN</text>
                <text x="256" y="84">CPE</text>
                <text x="352" y="84">DNS</text>
                <text x="404" y="84">Resolver</text>
                <text x="288" y="132">&lt;=DNR=&gt;</text>
                <text x="168" y="148">DNR</text>
                <text x="152" y="164">Encrypted</text>
                <text x="208" y="164">DNS</text>
                <text x="304" y="164">&lt;=Encrypted</text>
                <text x="376" y="164">DNS=&gt;</text>
                <text x="16" y="212">(b)</text>
                <text x="472" y="244">3rd</text>
                <text x="512" y="244">Party</text>
                <text x="44" y="260">Host</text>
                <text x="152" y="260">LAN</text>
                <text x="224" y="260">CPE</text>
                <text x="352" y="260">ISP</text>
                <text x="472" y="260">DNS</text>
                <text x="524" y="260">Resolver</text>
                <text x="256" y="308">&lt;=DNR=&gt;</text>
                <text x="136" y="324">DNR</text>
                <text x="120" y="340">Encrypted</text>
                <text x="176" y="340">DNS</text>
                <text x="336" y="340">Encrypted</text>
                <text x="392" y="340">DNS</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
   (a)
                  .--------------.         .-------------.
                 |                |       |      ISP      |
          Host---|      LAN      CPE------|  DNS Resolver |
            |    |                |       |'-------------'
            |     '--------------'|       |         |
            |                     |<=DNR=>|         |
            |<========DNR========>|       |         |
            |<===Encrypted DNS===>|<=Encrypted DNS=>|
            |                     |                 |

   (b)
              .--------------.         .------------.
             |                |       |              |      3rd Party
      Host---|      LAN      CPE------|      ISP     |------DNS Resolver
        |    |                |       |              |        |
        |     '--------------'|       |'------------'         |
        |                     |<=DNR=>|                       |
        |<========DNR========>|       |                       |
        |<===Encrypted DNS===>|<========Encrypted DNS========>|
        |                     |                               |
]]></artwork>
        </artset>
      </figure>
      <t>For all the cases shown in <xref target="fig1"/>, the CPE advertises itself as the
   default DNS server to the hosts it serves in the LAN.  The CPE relies
   upon DHCP or RA to advertise itself to internal hosts as the default
   encrypted DNS forwarder using DNR. When receiving a DNS request that a CPE cannot
   handle locally, the CPE forwards the request to an upstream encrypted
   DNS. The upstream encrypted DNS can be hosted by the ISP or provided
   by a third party.</t>
      <t>Such a forwarder presence is required for (but not limuted to):</t>
      <ul spacing="normal">
        <li>
          <t>IPv4 service continuity purposes (e.g., <xref section="3.1" sectionFormat="of" target="RFC8585"/>).</t>
        </li>
        <li>
          <t>Supporting advanced services within a local network such as:
          </t>
          <ul spacing="normal">
            <li>
              <t>malware filtering,</t>
            </li>
            <li>
              <t>parental control,</t>
            </li>
            <li>
              <t>Manufacturer Usage Description (MUD) <xref target="RFC8520"/> to only allow
 intended communications to and from an IoT device, and</t>
            </li>
            <li>
              <t>offer multicast DNS proxy service for the ".local" domain <xref target="RFC6762"/>.</t>
            </li>
          </ul>
        </li>
      </ul>
      <t>When the CPE behaves as a DNS forwarder, DNS communications can be decomposed into
   two legs to resolve queries:</t>
      <ul spacing="normal">
        <li>
          <t>The leg between an internal host and the CPE.</t>
        </li>
        <li>
          <t>The leg between the CPE and an upstream DNS resolver.</t>
        </li>
      </ul>
    </section>
    <section anchor="deploying-encrypted-dns-forwarder-in-local-networks">
      <name>Deploying Encrypted DNS Forwarder in Local Networks</name>
      <t>This section discusses some deployment challenges to host an
   encrypted DNS forwarder within a local network.</t>
      <section anchor="discovery-of-designated-resolvers-ddr">
        <name>Discovery of Designated Resolvers (DDR)</name>
        <t>DDR requires proving possession of an IP address, as the DDR
   certificate contains the server's IPv4 and IPv6 addresses and is
   signed by a Certification Authority (CA).  DDR is constrained to public IP
   addresses because (WebPKI) CAs will not sign
   special-purpose IP addresses <xref target="RFC6890"/>, most notably IPv4 private-use
   <xref target="RFC1918"/>, IPv4 shared address <xref target="RFC6598"/>, or IPv6 Unique-Local
   <xref target="RFC8190"/> address space.</t>
        <t>A tempting solution for enabling an encrypted DNS forwarder with DDR is to use the CPE's WAN
   IP address for DDR and prove possession of that IP address.  However,
   the CPE's WAN IPv4 address will not be a public IPv4 address if the
   CPE is behind another layer of NAT (either Carrier Grade NAT (CGN) or
   another on-premise NAT), reducing the success of this mechanism to
   CPE's WAN IPv6 address.</t>
        <t>Also, if the ISP renumbers the subscriber's
   network suddenly (rather than slow IPv6 renumbering described in
   <xref target="RFC4192"/>), encrypted DNS service will be delayed until that new
   certificate is acquired.</t>
      </section>
      <section anchor="discovery-of-network-designated-resolvers-dnr">
        <name>Discovery of Network-designated Resolvers (DNR)</name>
        <t>DNR requires proving possession of a domain name as the encrypted
   resolver's certificate contains the FQDN. For example, the entity (e.g., ISP or
   network administrator) managing the CPE would assign a unique FQDN to
   the CPE. There are two mechanisms for the CPE to obtain the
   certificate for the FQDN: using one of its WAN IP addresses or
   requesting its signed certificate from an Internet-facing server used
   for remote CPE management (e.g., the Auto Configuration Server (ACS)
   in the CPE WAN Management Protocol <xref target="TR-069"/>).</t>
        <t>If the CPE's WAN IP address is used, the CPE needs a public IPv4 or a global unicast IPv6
   address together with DNS A or AAAA records pointing to that CPE's
   WAN address to prove possession of the DNS name to obtain a (WebPKI)
   CA-signed certificate. That is, the CPE fulfills the DNS or HTTP
   challenge discussed in Automatic Certificate Management Environment (ACME) <xref target="RFC8555"/>.  However, a CPE's WAN address
   will not be a public IPv4 address if the CPE is behind another layer
   of NAT (either a CGN or another on-premise NAT), reducing the success
   of this mechanism to a CPE's WAN IPv6 address. If the ISP renumbers the subscriber's
   network, the DNS record will also need to expire and changed to
   reflect the new IP address.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>DNR-related security considerations are discussed in
   <xref section="7" sectionFormat="of" target="RFC9463"/>.  Likewise, DDR-related security considerations
   are discussed in <xref section="7" sectionFormat="of" target="RFC9462"/>.</t>
      <t>The communication between the CPE and endpoints is encrypted using mechanisms such as WPA2/3,
   and any communication with the DNS server co-located on the CPE is also protected.
   However, the client does not know whether the DNS server is co-located on the CPE or not.
   If the client uses clear text DNS (i.e., Do53), it will assume that the DNS messages are susceptible to
   pervasive monitoring. For instance, in an Enterprise deployment, multiple network devices
   could exist between an endpoint and the CPE;  hosting an encrypted DNS server on
   the CPE minimizes the impact of a breach, which is an essential zero trust principle. Furthermore,
   the client and user would be able to identify the entity hosting the encrypted DNS server
   using the ADN assigned to it.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9463">
          <front>
            <title>DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers (DNR)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="T. Reddy.K" initials="T." role="editor" surname="Reddy.K"/>
            <author fullname="D. Wing" initials="D." surname="Wing"/>
            <author fullname="N. Cook" initials="N." surname="Cook"/>
            <author fullname="T. Jensen" initials="T." surname="Jensen"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies new DHCP and IPv6 Router Advertisement options to discover encrypted DNS resolvers (e.g., DNS over HTTPS, DNS over TLS, and DNS over QUIC). Particularly, it allows a host to learn an Authentication Domain Name together with a list of IP addresses and a set of service parameters to reach such encrypted DNS resolvers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9463"/>
          <seriesInfo name="DOI" value="10.17487/RFC9463"/>
        </reference>
        <reference anchor="RFC9462">
          <front>
            <title>Discovery of Designated Resolvers</title>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="E. Kinnear" initials="E." surname="Kinnear"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <author fullname="T. Jensen" initials="T." surname="Jensen"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document defines Discovery of Designated Resolvers (DDR), a set of mechanisms for DNS clients to use DNS records to discover a resolver's encrypted DNS configuration. An Encrypted DNS Resolver discovered in this manner is referred to as a "Designated Resolver". These mechanisms can be used to move from unencrypted DNS to encrypted DNS when only the IP address of a resolver is known. These mechanisms are designed to be limited to cases where Unencrypted DNS Resolvers and their Designated Resolvers are operated by the same entity or cooperating entities. It can also be used to discover support for encrypted DNS protocols when the name of an Encrypted DNS Resolver is known.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9462"/>
          <seriesInfo name="DOI" value="10.17487/RFC9462"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="openwrt" target="https://openwrt.org/">
          <front>
            <title>OpenWrt Project</title>
            <author>
              <organization>OpenWrt</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="prpl" target="https://prplfoundation.org/">
          <front>
            <title>Prpl Foundation</title>
            <author>
              <organization>Prpl Foundation</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="prplwrt" target="https://prplfoundation.org/project/prplwrt/">
          <front>
            <title>Prpl WRT</title>
            <author>
              <organization>Prpl Foundation</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="TR-069" target="https://www.broadband-forum.org/technical/download/TR-069.pdf">
          <front>
            <title>CPE WAN Management Protocol</title>
            <author>
              <organization>The Broadband Forum</organization>
            </author>
            <date year="2018" month="December"/>
          </front>
        </reference>
        <reference anchor="RFC8484">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="RFC7858">
          <front>
            <title>Specification for DNS over Transport Layer Security (TLS)</title>
            <author fullname="Z. Hu" initials="Z." surname="Hu"/>
            <author fullname="L. Zhu" initials="L." surname="Zhu"/>
            <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="D. Wessels" initials="D." surname="Wessels"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
              <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7858"/>
          <seriesInfo name="DOI" value="10.17487/RFC7858"/>
        </reference>
        <reference anchor="RFC9250">
          <front>
            <title>DNS over Dedicated QUIC Connections</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>This document describes the use of QUIC to provide transport confidentiality for DNS. The encryption provided by QUIC has similar properties to those provided by TLS, while QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides more efficient packet-loss recovery than UDP. DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC 7858, and latency characteristics similar to classic DNS over UDP. This specification describes the use of DoQ as a general-purpose transport for DNS and includes the use of DoQ for stub to recursive, recursive to authoritative, and zone transfer scenarios.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9250"/>
          <seriesInfo name="DOI" value="10.17487/RFC9250"/>
        </reference>
        <reference anchor="RFC5625">
          <front>
            <title>DNS Proxy Implementation Guidelines</title>
            <author fullname="R. Bellis" initials="R." surname="Bellis"/>
            <date month="August" year="2009"/>
            <abstract>
              <t>This document provides guidelines for the implementation of DNS proxies, as found in broadband gateways and other similar network devices. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="152"/>
          <seriesInfo name="RFC" value="5625"/>
          <seriesInfo name="DOI" value="10.17487/RFC5625"/>
        </reference>
        <reference anchor="I-D.rbw-home-servers">
          <front>
            <title>Identifying and Authenticating Home Servers: Requirements and Solution Analysis</title>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Dan Wing" initials="D." surname="Wing">
              <organization>Cloud Software Group Holdings, Inc.</organization>
            </author>
            <date day="19" month="September" year="2024"/>
            <abstract>
              <t>   Obtaining CA-signed certificates for servers within a home network is
   difficult and causes problems at scale.  This document explores
   requirements to improve this situation and analyzes existing
   solutions.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-rbw-home-servers-00"/>
        </reference>
        <reference anchor="RFC9499">
          <front>
            <title>DNS Terminology</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
              <t>This document updates RFC 2308 by clarifying the definitions of "forwarder" and "QNAME". It obsoletes RFC 8499 by adding multiple terms and clarifications. Comprehensive lists of changed and new definitions can be found in Appendices A and B.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="219"/>
          <seriesInfo name="RFC" value="9499"/>
          <seriesInfo name="DOI" value="10.17487/RFC9499"/>
        </reference>
        <reference anchor="RFC8585">
          <front>
            <title>Requirements for IPv6 Customer Edge Routers to Support IPv4-as-a-Service</title>
            <author fullname="J. Palet Martinez" initials="J." surname="Palet Martinez"/>
            <author fullname="H. M.-H. Liu" initials="H. M.-H." surname="Liu"/>
            <author fullname="M. Kawashima" initials="M." surname="Kawashima"/>
            <date month="May" year="2019"/>
            <abstract>
              <t>This document specifies the IPv4 service continuity requirements for IPv6 Customer Edge (CE) routers that are provided either by the service provider or by vendors who sell through the retail market.</t>
              <t>Specifically, this document extends the basic requirements for IPv6 CE routers as described in RFC 7084 to allow the provisioning of IPv6 transition services for the support of IPv4-as-a-Service (IPv4aaS) by means of new transition mechanisms. The document only covers IPv4aaS, i.e., transition technologies for delivering IPv4 in IPv6-only access networks. IPv4aaS is necessary because there aren't sufficient IPv4 addresses available for every possible customer/ device. However, devices or applications in the customer Local Area Networks (LANs) may be IPv4-only or IPv6-only and still need to communicate with IPv4-only services on the Internet.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8585"/>
          <seriesInfo name="DOI" value="10.17487/RFC8585"/>
        </reference>
        <reference anchor="RFC8520">
          <front>
            <title>Manufacturer Usage Description Specification</title>
            <author fullname="E. Lear" initials="E." surname="Lear"/>
            <author fullname="R. Droms" initials="R." surname="Droms"/>
            <author fullname="D. Romascanu" initials="D." surname="Romascanu"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>This memo specifies a component-based architecture for Manufacturer Usage Descriptions (MUDs). The goal of MUD is to provide a means for end devices to signal to the network what sort of access and network functionality they require to properly function. The initial focus is on access control. Later work can delve into other aspects.</t>
              <t>This memo specifies two YANG modules, IPv4 and IPv6 DHCP options, a Link Layer Discovery Protocol (LLDP) TLV, a URL, an X.509 certificate extension, and a means to sign and verify the descriptions.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8520"/>
          <seriesInfo name="DOI" value="10.17487/RFC8520"/>
        </reference>
        <reference anchor="RFC6762">
          <front>
            <title>Multicast DNS</title>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <author fullname="M. Krochmal" initials="M." surname="Krochmal"/>
            <date month="February" year="2013"/>
            <abstract>
              <t>As networked devices become smaller, more portable, and more ubiquitous, the ability to operate with less configured infrastructure is increasingly important. In particular, the ability to look up DNS resource record data types (including, but not limited to, host names) in the absence of a conventional managed DNS server is useful.</t>
              <t>Multicast DNS (mDNS) provides the ability to perform DNS-like operations on the local link in the absence of any conventional Unicast DNS server. In addition, Multicast DNS designates a portion of the DNS namespace to be free for local use, without the need to pay any annual fee, and without the need to set up delegations or otherwise configure a conventional DNS server to answer for those names.</t>
              <t>The primary benefits of Multicast DNS names are that (i) they require little or no administration or configuration to set them up, (ii) they work when no infrastructure is present, and (iii) they work during infrastructure failures.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6762"/>
          <seriesInfo name="DOI" value="10.17487/RFC6762"/>
        </reference>
        <reference anchor="RFC6890">
          <front>
            <title>Special-Purpose IP Address Registries</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="L. Vegoda" initials="L." surname="Vegoda"/>
            <author fullname="R. Bonica" initials="R." role="editor" surname="Bonica"/>
            <author fullname="B. Haberman" initials="B." surname="Haberman"/>
            <date month="April" year="2013"/>
            <abstract>
              <t>This memo reiterates the assignment of an IPv4 address block (192.0.0.0/24) to IANA. It also instructs IANA to restructure its IPv4 and IPv6 Special-Purpose Address Registries. Upon restructuring, the aforementioned registries will record all special-purpose address blocks, maintaining a common set of information regarding each address block.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="153"/>
          <seriesInfo name="RFC" value="6890"/>
          <seriesInfo name="DOI" value="10.17487/RFC6890"/>
        </reference>
        <reference anchor="RFC1918">
          <front>
            <title>Address Allocation for Private Internets</title>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <author fullname="B. Moskowitz" initials="B." surname="Moskowitz"/>
            <author fullname="D. Karrenberg" initials="D." surname="Karrenberg"/>
            <author fullname="G. J. de Groot" initials="G. J." surname="de Groot"/>
            <author fullname="E. Lear" initials="E." surname="Lear"/>
            <date month="February" year="1996"/>
            <abstract>
              <t>This document describes address allocation for private internets. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="5"/>
          <seriesInfo name="RFC" value="1918"/>
          <seriesInfo name="DOI" value="10.17487/RFC1918"/>
        </reference>
        <reference anchor="RFC6598">
          <front>
            <title>IANA-Reserved IPv4 Prefix for Shared Address Space</title>
            <author fullname="J. Weil" initials="J." surname="Weil"/>
            <author fullname="V. Kuarsingh" initials="V." surname="Kuarsingh"/>
            <author fullname="C. Donley" initials="C." surname="Donley"/>
            <author fullname="C. Liljenstolpe" initials="C." surname="Liljenstolpe"/>
            <author fullname="M. Azinger" initials="M." surname="Azinger"/>
            <date month="April" year="2012"/>
            <abstract>
              <t>This document requests the allocation of an IPv4 /10 address block to be used as Shared Address Space to accommodate the needs of Carrier- Grade NAT (CGN) devices. It is anticipated that Service Providers will use this Shared Address Space to number the interfaces that connect CGN devices to Customer Premises Equipment (CPE).</t>
              <t>Shared Address Space is distinct from RFC 1918 private address space because it is intended for use on Service Provider networks. However, it may be used in a manner similar to RFC 1918 private address space on routing equipment that is able to do address translation across router interfaces when the addresses are identical on two different interfaces. Details are provided in the text of this document.</t>
              <t>This document details the allocation of an additional special-use IPv4 address block and updates RFC 5735. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="153"/>
          <seriesInfo name="RFC" value="6598"/>
          <seriesInfo name="DOI" value="10.17487/RFC6598"/>
        </reference>
        <reference anchor="RFC8190">
          <front>
            <title>Updates to the Special-Purpose IP Address Registries</title>
            <author fullname="R. Bonica" initials="R." surname="Bonica"/>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Haberman" initials="B." surname="Haberman"/>
            <author fullname="L. Vegoda" initials="L." surname="Vegoda"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>This memo updates the IANA IPv4 and IPv6 Special-Purpose Address Registries to address issues raised by the definition of a "global" prefix. It also corrects several errors in registry entries to ensure the integrity of the IANA Special-Purpose Address Registries.</t>
              <t>This memo updates RFC 6890.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="153"/>
          <seriesInfo name="RFC" value="8190"/>
          <seriesInfo name="DOI" value="10.17487/RFC8190"/>
        </reference>
        <reference anchor="RFC4192">
          <front>
            <title>Procedures for Renumbering an IPv6 Network without a Flag Day</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="E. Lear" initials="E." surname="Lear"/>
            <author fullname="R. Droms" initials="R." surname="Droms"/>
            <date month="September" year="2005"/>
            <abstract>
              <t>This document describes a procedure that can be used to renumber a network from one prefix to another. It uses IPv6's intrinsic ability to assign multiple addresses to a network interface to provide continuity of network service through a "make-before-break" transition, as well as addresses naming and configuration management issues. It also uses other IPv6 features to minimize the effort and time required to complete the transition from the old prefix to the new prefix. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4192"/>
          <seriesInfo name="DOI" value="10.17487/RFC4192"/>
        </reference>
        <reference anchor="RFC8555">
          <front>
            <title>Automatic Certificate Management Environment (ACME)</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="J. Hoffman-Andrews" initials="J." surname="Hoffman-Andrews"/>
            <author fullname="D. McCarney" initials="D." surname="McCarney"/>
            <author fullname="J. Kasten" initials="J." surname="Kasten"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>Public Key Infrastructure using X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names. Thus, certification authorities (CAs) in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate. As of this writing, this verification is done through a collection of ad hoc mechanisms. This document describes a protocol that a CA and an applicant can use to automate the process of verification and certificate issuance. The protocol also provides facilities for other certificate management functions, such as certificate revocation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8555"/>
          <seriesInfo name="DOI" value="10.17487/RFC8555"/>
        </reference>
        <reference anchor="I-D.reddy-add-delegated-credentials">
          <front>
            <title>Delegated Credentials to Host Encrypted DNS Forwarders on CPEs</title>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Dan Wing" initials="D." surname="Wing">
              <organization>Citrix Systems, Inc.</organization>
            </author>
            <author fullname="Shashank Jain" initials="S." surname="Jain">
              <organization>McAfee</organization>
            </author>
            <date day="1" month="December" year="2023"/>
            <abstract>
              <t>   An encrypted DNS server is authenticated by a certificate signed by a
   Certificate Authority (CA).  However, for typical encrypted DNS
   server deployments on Customer Premise Equipment (CPEs), the
   signature cannot be obtained or requires excessive interactions with
   a Certificate Authority.

   This document explores the use of TLS delegated credentials for a DNS
   server deployed on a CPE.  This approach is meant to ease operating
   DNS forwarders in CPEs while allowing to make use of encrypted DNS
   capabilities.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-reddy-add-delegated-credentials-03"/>
        </reference>
      </references>
    </references>
    <?line 289?>

<section anchor="example-of-delegated-certificate-issuance">
      <name>Example of Delegated Certificate Issuance</name>
      <t>Let's consider that the encrypted DNS forwarder is hosted on a CPE and provisioned by a
   service (e.g., ACS) in the operator's network. Also, let's assume that each CPE is assigned
   a unique FQDN (e.g., "cpe-12345.example.com" where 12345 is a unique
   number).</t>
      <ul empty="true">
        <li>
          <t>It is best to ensure that such an FQDN does not carry any
   Personally Identifiable Information (PII) or device identification
   details like the customer number or device's serial number.</t>
        </li>
      </ul>
      <t>The CPE generates a public and private key-pair, builds a certificate signing
   request (CSR), and sends the CSR to a service in the operator
   managing the CPE.  Upon receipt of the CSR, the operator's service
   can utilize certificate management protocols like ACME <xref target="RFC8555"/> to automate
   certificate management functions such as domain validation procedure,
   certificate issuance, and certificate revocation.</t>
      <t>The challenge with this technique is that the service will have to
   communicate with the CA to issue certificates for millions of CPEs.
   If an external CA is unable to issue a certificate in time or replace
   an expired certificate, the service would no longer be able to
   present a valid certificate to a CPE.  When the service requests
   certificate issuance for a large number of subdomains (e.g., millions
   of CPEs), it may be treated as an attacker by the CA to overwhelm it.
   Furthermore, the short-lived certificates (e.g., certificates that
   expire after 90 days) issued by the CA will have to be renewed
   frequently.  With short-lived certificates, there is a smaller time
   window to renew a certificate and, therefore, a higher risk that a CA
   outage will negatively affect the uptime of the encrypted DNS
   forwarders on CPEs (and the services offered via these CPEs).</t>
      <t>These challenges can be addressed by using protocols like
   ACME to automate the certificate renewal process, ensuring certificates
   are renewed well before expiration. Additionally, incorporating another
   CA as a backup can provide redundancy and further mitigate the risk of
   outages. By having a secondary CA, the service can switch to the backup
   CA in case the primary CA is unavailable, thus maintaining continuous
   service availability and reducing the risk of service disruption.</t>
      <t>It offers the additional advantage of improving the security of
   Browser and CPE interactions. This ensures that HTTPS access to
   the CPE is possible, allowing the device administrator to securely
   communicate with and manage the CPE.</t>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This draft is triggered by the discussion that occured at IETF#119 (Brisbane)
about the need to frame the problem to be solved. Thanks to all the
participants to that discussion.</t>
      <dl>
        <dt>Acknowledgements from <xref target="I-D.reddy-add-delegated-credentials"/>:</dt>
        <dd>
          <t>Thanks to Neil Cook, Martin Thomson, Tommy Pauly, Benjamin Schwartz,
   and Michael Richardson for the discussion and comments.</t>
        </dd>
      </dl>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
