<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.24 (Ruby 3.3.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-dnsop-svcb-dane-05" category="std" consensus="true" updates="6698" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.0 -->
  <front>
    <title abbrev="SVCB-DANE">Using DNSSEC Authentication of Named Entities (DANE) with DNS Service Bindings (SVCB) and QUIC</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-dnsop-svcb-dane-05"/>
    <author initials="B. M." surname="Schwartz" fullname="Benjamin M. Schwartz">
      <organization>Meta Platforms, Inc.</organization>
      <address>
        <email>ietf@bemasc.net</email>
      </address>
    </author>
    <author initials="R." surname="Evans" fullname="Robert Evans">
      <organization>Google LLC</organization>
      <address>
        <email>evansr@google.com</email>
      </address>
    </author>
    <date year="2025" month="March" day="03"/>
    <area>ops</area>
    <workgroup>dnsop</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 32?>

<t>Service Binding (SVCB) records introduce a new form of name indirection in DNS.  They also convey information about the endpoint's supported protocols, such as whether QUIC transport is available.  This document specifies how DNS-Based Authentication of Named Entities (DANE) interacts with Service Bindings to secure connections, including use of port numbers and transport protocols discovered via SVCB queries.  The "_quic" transport name label is introduced to distinguish TLSA records for DTLS and QUIC.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/bemasc/svcb-dane"/>.</t>
    </note>
  </front>
  <middle>
    <?line 36?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The DNS-Based Authentication of Named Entities specification <xref target="RFC7671"/> explains how clients locate the TLSA record for a service of interest, starting with knowledge of the service's hostname, transport, and port number.  These are concatenated, forming a name like <tt>_8080._tcp.example.com</tt>.  It also specifies how clients should locate the TLSA records when one or more CNAME records are present, aliasing either the hostname or the initial TLSA query name, and the resulting server names used in TLS or DTLS.</t>
      <t>There are various DNS records other than CNAME that add indirection to the host resolution process, requiring similar specifications.  Thus, <xref target="RFC7672"/> describes how DANE interacts with MX records, and <xref target="RFC7673"/> describes its interaction with SRV records.</t>
      <t>This document describes the interaction of DANE with indirection via Service Bindings <xref target="SVCB"/>, i.e. SVCB-compatible records such as SVCB and HTTPS.  It also explains how to use DANE with new TLS-based transports such as QUIC.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>The contents of this document apply equally to all SVCB-compatible record types, such as SVCB and HTTPS records.  For brevity, the abbrevation "SVCB" is used to refer to these record types generally.</t>
    </section>
    <section anchor="using-dane-with-service-bindings-svcb">
      <name>Using DANE with Service Bindings (SVCB)</name>
      <t><xref section="6" sectionFormat="of" target="RFC7671"/> says:</t>
      <ul empty="true">
        <li>
          <t>With protocols that support explicit transport redirection via DNS MX records, SRV records, or other similar records, the TLSA base domain is based on the redirected transport endpoint rather than the origin domain.</t>
        </li>
      </ul>
      <t>This document applies the same logic to SVCB-compatible records.  Specifically, if SVCB resolution was entirely secure (including any AliasMode records and/or CNAMEs), then for each connection attempt derived from a SVCB-compatible record,</t>
      <ul spacing="normal">
        <li>
          <t>The initial TLSA base domain <bcp14>MUST</bcp14> be the final SVCB TargetName used for this connection attempt.  (Names appearing earlier in a resolution chain are not used.)</t>
        </li>
        <li>
          <t>The transport prefix <bcp14>MUST</bcp14> be the transport of this connection attempt (possibly influenced by the "alpn" SvcParam).</t>
        </li>
        <li>
          <t>The port prefix <bcp14>MUST</bcp14> be the port number of this connection attempt (possibly influenced by the "port" SvcParam).</t>
        </li>
      </ul>
      <t>Resolution security is assessed according to the criteria in <xref section="4.1" sectionFormat="of" target="RFC6698"/>.</t>
      <t>If the initial TLSA base domain is the start of a secure CNAME chain, clients <bcp14>MUST</bcp14> first try to use the end of the chain as the TLSA base domain, with fallback to the initial base domain, as described in <xref section="7" sectionFormat="of" target="RFC7671"/>.  However, domain owners <bcp14>SHOULD NOT</bcp14> place a CNAME record on a SVCB TargetName, as this arrangement is unusual, inefficient, and at risk for deprecation in a future revision.</t>
      <t>If any TLSA QNAME is aliased by a CNAME, clients <bcp14>MUST</bcp14> follow the TLSA CNAME to complete the resolution of the TLSA records.  (This does not alter the TLSA base domain.)</t>
      <t>If a TLSA RRSet is securely resolved, the client <bcp14>MUST</bcp14> set the SNI to the TLSA base domain of the RRSet.  In usage modes other than DANE-EE(3), the client <bcp14>MUST</bcp14> validate that the certificate covers this base domain, and <bcp14>MUST NOT</bcp14> require it to cover any other domain.</t>
      <t>If the client has SVCB-optional behavior (as defined in <xref section="3" sectionFormat="of" target="SVCB"/>), it <bcp14>MUST</bcp14> use the standard DANE logic described in <xref section="4.1" sectionFormat="of" target="RFC6698"/> when falling back to non-SVCB connection.</t>
    </section>
    <section anchor="protocols">
      <name>Adding a TLSA protocol prefix for QUIC</name>
      <t><xref section="3" sectionFormat="of" target="RFC6698"/> defines the protocol prefix used for constructing TLSA QNAMEs, and says:</t>
      <ul empty="true">
        <li>
          <t>The transport names defined for this protocol are "tcp", "udp", and "sctp".</t>
        </li>
      </ul>
      <t>When this text was written, there was exactly one TLS-based protocol defined for each of these transports.  However, with the introduction of QUIC <xref target="RFC9000"/>, there are now multiple TLS-derived protocols that can operate over UDP, even on the same port.  To distinguish the availability and configuration of DTLS and QUIC, this document updates the above sentence as follows:</t>
      <ul empty="true">
        <li>
          <t>The transport names defined for this protocol are "tcp" (TLS over TCP <xref target="RFC8446"/>), "udp" (DTLS <xref target="RFC9147"/>), "sctp" (TLS over SCTP <xref target="RFC3436"/>), and "quic" (QUIC <xref target="RFC9000"/>).</t>
        </li>
      </ul>
    </section>
    <section anchor="operational-considerations">
      <name>Operational considerations</name>
      <section anchor="recommended-configurations">
        <name>Recommended configurations</name>
        <t>Service consumers are expected to use a CNAME or SVCB AliasMode record to point at provider-controlled records when possible, e.g.:</t>
        <sourcecode type="Zone"><![CDATA[
alias.example.                  HTTPS 0 xyz.provider.example.
www.alias.example.              CNAME xyz.provider.example.
xyz.provider.example.           HTTPS 1 . alpn=h2 ...
xyz.provider.example.           A     192.0.2.1
_443._tcp.xyz.provider.example. TLSA  ...
]]></sourcecode>
        <t>If the service needs its own SvcParamKeys, it cannot use CNAME or AliasMode, so it publishes its own SVCB ServiceMode record with SvcParams that are compatible with the provider, e.g.:</t>
        <sourcecode type="Zone"><![CDATA[
_dns.dns.example. HTTPS 1 xyz.provider.example. ( alpn=h2 ...
                                                  dohpath=/doh{?dns} )
]]></sourcecode>
        <t>For ease of management, providers may want to alias various TLSA QNAMEs to a single RRSet:</t>
        <sourcecode type="Zone"><![CDATA[
_443._tcp.xyz.provider.example. CNAME dane-central.provider.example.
dane-central.provider.example.  TLSA  ...
]]></sourcecode>
        <t>Any DANE certificate usage mode is compatible with SVCB, but the usage guidelines from <xref section="4" sectionFormat="of" target="RFC7671"/> continue to apply.</t>
      </section>
      <section anchor="unintended-pinning">
        <name>Unintended pinning</name>
        <t>As noted in <xref section="6" sectionFormat="of" target="RFC7671"/>, DANE encounters operational difficulties when the TLSA RRset is published by an entity other than the service provider.  For example, a customer might copy the TLSA records into their own zone, rather than publishing an alias to the TLSA RRset hosted in the service provider's zone.  When the service subsequently rotates its TLS keys, DANE authentication will fail, resulting in an outage for this customer.  Accordingly, zone owners <bcp14>MUST NOT</bcp14> publish TLSA records for public keys that are not under their control unless they have an explicit arrangement with the key holder.</t>
        <t>To prevent the above misconfiguration and ensure that TLS keys can be rotated freely, service operators <bcp14>MAY</bcp14> reject TLS connections whose SNI does not correspond to an approved TLSA base domain.</t>
        <t>Service Bindings also enable any third party consumer to publish fixed SvcParams for the service.  This can cause an outage or service degradation if the service makes a backward-incompatible configuration change.  Accordingly, zone owners should avoid publishing SvcParams for a TargetName that they do not control, and service operators should exercise caution when making incompatible configuration changes.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The use of TLSA records specified in this document is independent for each SVCB connection attempt.  In environments where DANE is optional, this means that the client might use DANE for some connection attempts but not others when processing a single SVCB RRSet.</t>
      <t>This document only specifies the use of TLSA records when all relevant DNS records (including SVCB, TLSA, and CNAME records) were resolved securely.  If any of these resolutions were insecure (as defined in <xref section="4.3" sectionFormat="of" target="RFC4035"/>), the client <bcp14>MUST NOT</bcp14> rely on the TLSA record for connection security.  However, if the client would otherwise have used an insecure plaintext transport, it <bcp14>MAY</bcp14> use an insecure resolution result to achieve opportunistic security.</t>
      <t>Certain protocols that can run over TLS, such as HTTP/1.0, do not confirm the name of the service after connecting.  With DANE, these protocols are subject to an Unknown Key Share (UKS) attack, in which the client believes it is connecting to the attacker's domain, but is actually connecting to an unaffiliated victim domain <xref target="I-D.barnes-dane-uks-00"/>.  Clients <bcp14>SHOULD NOT</bcp14> use DANE with vulnerable protocols.  (HTTP/1.1 and later and encrypted DNS are not normally vulnerable to UKS attacks, but see <xref target="uks"/> for some important exceptions.)</t>
    </section>
    <section anchor="examples">
      <name>Examples</name>
      <t>The following examples demonstrate Service Binding interaction with TLSA base domain selection.</t>
      <t>All of the RRSets below are assumed fully-secure with all related DNSSEC record types omitted for brevity.</t>
      <section anchor="https-servicemode">
        <name>HTTPS ServiceMode</name>
        <t>Given service URI <tt>https://api.example.com</tt> and record:</t>
        <artwork><![CDATA[
api.example.com. HTTPS 1 .
]]></artwork>
        <t>The TLSA QNAME is <tt>_443._tcp.api.example.com</tt>.</t>
      </section>
      <section anchor="https-aliasmode">
        <name>HTTPS AliasMode</name>
        <t>Given service URI <tt>https://api.example.com</tt> and records:</t>
        <artwork><![CDATA[
api.example.com.     HTTPS 0 svc4.example.net.
svc4.example.net.    HTTPS 0 xyz.cdn.example.
xyz.cdn.example.     A     192.0.2.1
]]></artwork>
        <t>The TLSA QNAME is <tt>_443._tcp.xyz.cdn.example</tt>.</t>
      </section>
      <section anchor="quic-and-cname">
        <name>QUIC and CNAME</name>
        <t>Given service URI <tt>https://www.example.com</tt> and records:</t>
        <artwork><![CDATA[
www.example.com.  CNAME api.example.com.
api.example.com.  HTTPS 1 svc4.example.net alpn=h2,h3 port=8443
svc4.example.net. CNAME xyz.cdn.example.
]]></artwork>
        <t>If the connection attempt is using HTTP/3, the transport label is set to <tt>_quic</tt>; otherwise <tt>_tcp</tt> is used.</t>
        <t>The initial TLSA QNAME would be one of:</t>
        <ul spacing="normal">
          <li>
            <t><tt>_8443._quic.xyz.cdn.example</tt></t>
          </li>
          <li>
            <t><tt>_8443._tcp.xyz.cdn.example</tt></t>
          </li>
        </ul>
        <t>If no TLSA record is found, the fallback TLSA QNAME would be one of:</t>
        <ul spacing="normal">
          <li>
            <t><tt>_8443._quic.svc4.example.net</tt></t>
          </li>
          <li>
            <t><tt>_8443._tcp.svc4.example.net</tt></t>
          </li>
        </ul>
      </section>
      <section anchor="dns-servicemode">
        <name>DNS ServiceMode</name>
        <t>Given a DNS server <tt>dns.example.com</tt> and record:</t>
        <artwork><![CDATA[
_dns.dns.example.com. SVCB 1 dns.my-dns-host.example. alpn=dot
]]></artwork>
        <t>The TLSA QNAME is <tt>_853._tcp.dns.my-dns-host.example</tt>.  The port and protocol are inferred from the "dot" ALPN value.</t>
      </section>
      <section anchor="dns-aliasmode">
        <name>DNS AliasMode</name>
        <t>Given a DNS server <tt>dns.example.com</tt> and records:</t>
        <artwork><![CDATA[
_dns.dns.example.com.     SVCB 0 dns.my-dns-host.example.
dns.my-dns-host.example.  SVCB 1 . alpn=doq
]]></artwork>
        <t>The TLSA QNAME is <tt>_853._quic.dns.my-dns-host.example</tt>.  The port and protocol are inferred from the "doq" ALPN value.</t>
      </section>
      <section anchor="new-scheme-servicemode">
        <name>New scheme ServiceMode</name>
        <t>Given service URI <tt>foo://api.example.com:8443</tt> and record:</t>
        <artwork><![CDATA[
_8443._foo.api.example.com. SVCB 1 api.example.com.
]]></artwork>
        <t>The TLSA QNAME is <tt>_8443._$PROTO.api.example.com</tt>, where $PROTO is the appropriate value for the client-selected transport as discussed in <xref target="protocols"/> .</t>
      </section>
      <section anchor="new-scheme-aliasmode">
        <name>New scheme AliasMode</name>
        <t>Given service URI <tt>foo://api.example.com:8443</tt> and records:</t>
        <artwork><![CDATA[
_8443._foo.api.example.com. SVCB 0 svc4.example.net.
svc4.example.net.           SVCB 1 .
svc4.example.net.           A    192.0.2.1
]]></artwork>
        <t>The TLSA QNAME is <tt>_8443._$PROTO.svc4.example.net</tt> (with $PROTO as above).  This is the same if the ServiceMode record is absent.</t>
      </section>
      <section anchor="new-protocols">
        <name>New protocols</name>
        <t>Given service URI <tt>foo://api.example.com:8443</tt> and records:</t>
        <artwork><![CDATA[
_8443._foo.api.example.com. SVCB 0 svc4.example.net.
svc4.example.net. SVCB 3 . alpn=foo,bar port=8004
]]></artwork>
        <t>The TLSA QNAME is <tt>_8004._$PROTO1.svc4.example.net</tt> or <tt>_8004._$PROTO2.svc4.example.net</tt>, where $PROTO1 and $PROTO2 are the transport prefixes appropriate for "foo" and "bar" respectively.  (Note that SVCB requires each ALPN to unambiguously indicate a transport.)</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to add the following entry to the "Underscored and Globally Scoped DNS Node Names" registry (<xref section="4" sectionFormat="comma" target="RFC8552"/>):</t>
      <table>
        <thead>
          <tr>
            <th align="left">RR Type</th>
            <th align="left">_NODE NAME</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">TLSA</td>
            <td align="left">_quic</td>
            <td align="left">(This document)</td>
          </tr>
        </tbody>
      </table>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC7671">
          <front>
            <title>The DNS-Based Authentication of Named Entities (DANE) Protocol: Updates and Operational Guidance</title>
            <author fullname="V. Dukhovni" initials="V." surname="Dukhovni"/>
            <author fullname="W. Hardaker" initials="W." surname="Hardaker"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>This document clarifies and updates the DNS-Based Authentication of Named Entities (DANE) TLSA specification (RFC 6698), based on subsequent implementation experience. It also contains guidance for implementers, operators, and protocol developers who want to use DANE records.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7671"/>
          <seriesInfo name="DOI" value="10.17487/RFC7671"/>
        </reference>
        <reference anchor="SVCB">
          <front>
            <title>Service Binding and Parameter Specification via the DNS (SVCB and HTTPS Resource Records)</title>
            <author fullname="Benjamin M. Schwartz" initials="B. M." surname="Schwartz">
              <organization>Google</organization>
            </author>
            <author fullname="Mike Bishop" initials="M." surname="Bishop">
              <organization>Akamai Technologies</organization>
            </author>
            <author fullname="Erik Nygren" initials="E." surname="Nygren">
              <organization>Akamai Technologies</organization>
            </author>
            <date day="11" month="March" year="2023"/>
            <abstract>
              <t>This document specifies the "SVCB" ("Service Binding") and "HTTPS" DNS resource record (RR) types to facilitate the lookup of information needed to make connections to network services, such as for HTTP origins.  SVCB records allow a service to be provided from multiple alternative endpoints, each with associated parameters (such as transport protocol configuration), and are extensible to support future uses (such as keys for encrypting the TLS ClientHello).  They also enable aliasing of apex domains, which is not possible with CNAME.  The HTTPS RR is a variation of SVCB for use with HTTP (see RFC 9110, "HTTP Semantics").  By providing more information to the client before it attempts to establish a connection, these records offer potential benefits to both performance and privacy.
              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dnsop-svcb-https-12"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC6698">
          <front>
            <title>The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="J. Schlyter" initials="J." surname="Schlyter"/>
            <date month="August" year="2012"/>
            <abstract>
              <t>Encrypted communication on the Internet often uses Transport Layer Security (TLS), which depends on third parties to certify the keys used. This document improves on that situation by enabling the administrators of domain names to specify the keys used in that domain's TLS servers. This requires matching improvements in TLS client software, but no change in TLS server software. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6698"/>
          <seriesInfo name="DOI" value="10.17487/RFC6698"/>
        </reference>
        <reference anchor="RFC9000">
          <front>
            <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9000"/>
          <seriesInfo name="DOI" value="10.17487/RFC9000"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC3436">
          <front>
            <title>Transport Layer Security over Stream Control Transmission Protocol</title>
            <author fullname="A. Jungmaier" initials="A." surname="Jungmaier"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="M. Tuexen" initials="M." surname="Tuexen"/>
            <date month="December" year="2002"/>
            <abstract>
              <t>This document describes the usage of the Transport Layer Security (TLS) protocol, as defined in RFC 2246, over the Stream Control Transmission Protocol (SCTP), as defined in RFC 2960 and RFC 3309. The user of TLS can take advantage of the features provided by SCTP, namely the support of multiple streams to avoid head of line blocking and the support of multi-homing to provide network level fault tolerance. Additionally, discussions of extensions of SCTP are also supported, meaning especially the support of dynamic reconfiguration of IP- addresses. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3436"/>
          <seriesInfo name="DOI" value="10.17487/RFC3436"/>
        </reference>
        <reference anchor="RFC4035">
          <front>
            <title>Protocol Modifications for the DNS Security Extensions</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of new resource records and protocol modifications that add data origin authentication and data integrity to the DNS. This document describes the DNSSEC protocol modifications. This document defines the concept of a signed zone, along with the requirements for serving and resolving by using DNSSEC. These techniques allow a security-aware resolver to authenticate both DNS resource records and authoritative DNS error indications.</t>
              <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4035"/>
          <seriesInfo name="DOI" value="10.17487/RFC4035"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC7672">
          <front>
            <title>SMTP Security via Opportunistic DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS)</title>
            <author fullname="V. Dukhovni" initials="V." surname="Dukhovni"/>
            <author fullname="W. Hardaker" initials="W." surname="Hardaker"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>This memo describes a downgrade-resistant protocol for SMTP transport security between Message Transfer Agents (MTAs), based on the DNS-Based Authentication of Named Entities (DANE) TLSA DNS record. Adoption of this protocol enables an incremental transition of the Internet email backbone to one using encrypted and authenticated Transport Layer Security (TLS).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7672"/>
          <seriesInfo name="DOI" value="10.17487/RFC7672"/>
        </reference>
        <reference anchor="RFC7673">
          <front>
            <title>Using DNS-Based Authentication of Named Entities (DANE) TLSA Records with SRV Records</title>
            <author fullname="T. Finch" initials="T." surname="Finch"/>
            <author fullname="M. Miller" initials="M." surname="Miller"/>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>The DNS-Based Authentication of Named Entities (DANE) specification (RFC 6698) describes how to use TLSA resource records secured by DNSSEC (RFC 4033) to associate a server's connection endpoint with its Transport Layer Security (TLS) certificate (thus enabling administrators of domain names to specify the keys used in that domain's TLS servers). However, application protocols that use SRV records (RFC 2782) to indirectly name the target server connection endpoints for a service domain name cannot apply the rules from RFC 6698. Therefore, this document provides guidelines that enable such protocols to locate and use TLSA records.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7673"/>
          <seriesInfo name="DOI" value="10.17487/RFC7673"/>
        </reference>
        <reference anchor="I-D.barnes-dane-uks-00">
          <front>
            <title>Unknown Key-Share Attacks on DNS-based Authentications of Named Entities (DANE)</title>
            <author fullname="Richard Barnes" initials="R." surname="Barnes">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Martin Thomson" initials="M." surname="Thomson">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Mozilla</organization>
            </author>
            <date day="9" month="October" year="2016"/>
            <abstract>
              <t>   Unknown key-share attacks are a class of attacks that allow an
   attacker to deceive one peer of a secure communication as to the
   identity of the remote peer.  When used with traditional, PKI-based
   authentication, TLS-based applications are generally safe from
   unknown key-share attacks.  DNS-based Authentication of Named
   Entities (DANE), however, proposes that applications perform a
   different set of checks as part of authenticating a TLS connection.
   As a result, DANE as currently specified is likely to lead to unknown
   key-share attacks when clients support DANE for authentication.  We
   describe these risks and some simple mitigations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-barnes-dane-uks-00"/>
        </reference>
        <reference anchor="RFC8552">
          <front>
            <title>Scoped Interpretation of DNS Resource Records through "Underscored" Naming of Attribute Leaves</title>
            <author fullname="D. Crocker" initials="D." surname="Crocker"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>Formally, any DNS Resource Record (RR) may occur under any domain name. However, some services use an operational convention for defining specific interpretations of an RRset by locating the records in a DNS branch under the parent domain to which the RRset actually applies. The top of this subordinate branch is defined by a naming convention that uses a reserved node name, which begins with the underscore character (e.g., "_name"). The underscored naming construct defines a semantic scope for DNS record types that are associated with the parent domain above the underscored branch. This specification explores the nature of this DNS usage and defines the "Underscored and Globally Scoped DNS Node Names" registry with IANA. The purpose of this registry is to avoid collisions resulting from the use of the same underscored name for different services.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="222"/>
          <seriesInfo name="RFC" value="8552"/>
          <seriesInfo name="DOI" value="10.17487/RFC8552"/>
        </reference>
        <reference anchor="RFC9110">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="RFC8441">
          <front>
            <title>Bootstrapping WebSockets with HTTP/2</title>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <date month="September" year="2018"/>
            <abstract>
              <t>This document defines a mechanism for running the WebSocket Protocol (RFC 6455) over a single stream of an HTTP/2 connection.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8441"/>
          <seriesInfo name="DOI" value="10.17487/RFC8441"/>
        </reference>
        <reference anchor="RFC7858">
          <front>
            <title>Specification for DNS over Transport Layer Security (TLS)</title>
            <author fullname="Z. Hu" initials="Z." surname="Hu"/>
            <author fullname="L. Zhu" initials="L." surname="Zhu"/>
            <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="D. Wessels" initials="D." surname="Wessels"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
              <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7858"/>
          <seriesInfo name="DOI" value="10.17487/RFC7858"/>
        </reference>
        <reference anchor="RFC8094">
          <front>
            <title>DNS over Datagram Transport Layer Security (DTLS)</title>
            <author fullname="T. Reddy" initials="T." surname="Reddy"/>
            <author fullname="D. Wing" initials="D." surname="Wing"/>
            <author fullname="P. Patil" initials="P." surname="Patil"/>
            <date month="February" year="2017"/>
            <abstract>
              <t>DNS queries and responses are visible to network elements on the path between the DNS client and its server. These queries and responses can contain privacy-sensitive information, which is valuable to protect.</t>
              <t>This document proposes the use of Datagram Transport Layer Security (DTLS) for DNS, to protect against passive listeners and certain active attacks. As latency is critical for DNS, this proposal also discusses mechanisms to reduce DTLS round trips and reduce the DTLS handshake size. The proposed mechanism runs over port 853.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8094"/>
          <seriesInfo name="DOI" value="10.17487/RFC8094"/>
        </reference>
        <reference anchor="RFC9250">
          <front>
            <title>DNS over Dedicated QUIC Connections</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>This document describes the use of QUIC to provide transport confidentiality for DNS. The encryption provided by QUIC has similar properties to those provided by TLS, while QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides more efficient packet-loss recovery than UDP. DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC 7858, and latency characteristics similar to classic DNS over UDP. This specification describes the use of DoQ as a general-purpose transport for DNS and includes the use of DoQ for stub to recursive, recursive to authoritative, and zone transfer scenarios.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9250"/>
          <seriesInfo name="DOI" value="10.17487/RFC9250"/>
        </reference>
        <reference anchor="RFC9103">
          <front>
            <title>DNS Zone Transfer over TLS</title>
            <author fullname="W. Toorop" initials="W." surname="Toorop"/>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="S. Sahib" initials="S." surname="Sahib"/>
            <author fullname="P. Aras" initials="P." surname="Aras"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <date month="August" year="2021"/>
            <abstract>
              <t>DNS zone transfers are transmitted in cleartext, which gives attackers the opportunity to collect the content of a zone by eavesdropping on network connections. The DNS Transaction Signature (TSIG) mechanism is specified to restrict direct zone transfer to authorized clients only, but it does not add confidentiality. This document specifies the use of TLS, rather than cleartext, to prevent zone content collection via passive monitoring of zone transfers: XFR over TLS (XoT). Additionally, this specification updates RFC 1995 and RFC 5936 with respect to efficient use of TCP connections and RFC 7766 with respect to the recommended number of connections between a client and server for each transport.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9103"/>
          <seriesInfo name="DOI" value="10.17487/RFC9103"/>
        </reference>
      </references>
    </references>
    <?line 263?>

<section anchor="uks">
      <name>Unknown Key-Share Attacks</name>
      <t>In the Unknown Key-Share (UKS) Attack <xref target="I-D.barnes-dane-uks-00"/>, a hostile domain ("attacker.example") claims the IP addresses and TLSA records of another domain ("victim.example").  A client who attempts to connect to "attacker.example" will actually be connecting to "victim.example".</t>
      <t>The client then sends some commands or requests over this connection.  If the server rejects these requests, or if the attacker could have forwarded these requests itself, the attack confers no advantage.  However, if the client issues commands that the attacker could not have issued, and the victim does not ignore these requests, then the attack could change state at the victim server, reveal confidential information to the attacker (e.g., via same-origin data sharing in the client), or waste resources.</t>
      <t>Here are some examples of requests that the attacker likely could not have issued themselves:</t>
      <ul spacing="normal">
        <li>
          <t>Requests authenticated using a TLS Client Certificate or other credential that is bound to the connection but not the domain.</t>
        </li>
        <li>
          <t>Requests that are only permitted if they appear to come from a particular IP range.</t>
        </li>
      </ul>
      <t>This section lists some protocols that can be used with SVCB, analyzes their vulnerability to this attack, and indicates any resulting restrictions on their use:</t>
      <ul spacing="normal">
        <li>
          <t>HTTP/0.9 and HTTP/1.0: <strong>Vulnerable</strong>
          </t>
          <ul spacing="normal">
            <li>
              <t>Clients <bcp14>MUST NOT</bcp14> use TLS Client Authentication with DANE and these protocol versions.
              </t>
              <ul spacing="normal">
                <li>
                  <t>Example attack: "https://attacker.example/" fetches "/profile" in Javascript.  The second request is directed to "victim.example" and authenticated by a client certificate, revealing the user's profile to the attacker.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>Use of these protocol versions with DANE is <bcp14>NOT RECOMMENDED</bcp14>.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>HTTP/1.1 and later: <strong>Slightly Vulnerable</strong>
          </t>
          <ul spacing="normal">
            <li>
              <t>The CONNECT method (<xref section="3.6" sectionFormat="comma" target="RFC9110"/>) <bcp14>MUST NOT</bcp14> be used on a connection authenticated with DANE.
              </t>
              <ul spacing="normal">
                <li>
                  <t>Example attack: "attacker.example" advertises a CONNECT proxy service to existing customers of the "victim.example" proxy, which is access-controlled by client IP.  To reduce its own operating costs, "attacker.example" uses UKS to send users back to "victim.example", resulting in the attacker's service appearing to work but silently consuming clients' transfer quota on "victim.example".</t>
                </li>
              </ul>
            </li>
            <li>
              <t>Clients <bcp14>MAY</bcp14> use all other methods with DANE, including Extended CONNECT <xref target="RFC8441"/>.  These methods are defended from misdirection attacks by server verification of the <tt>Host</tt> or <tt>:authority</tt> header (<xref section="7.4" sectionFormat="comma" target="RFC9110"/>).</t>
            </li>
          </ul>
        </li>
        <li>
          <t>DNS over TLS, DTLS, or QUIC <xref target="RFC7858"/><xref target="RFC8094"/><xref target="RFC9250"/>:
          </t>
          <ul spacing="normal">
            <li>
              <t>For resolution: <strong>Not Vulnerable</strong>
              </t>
              <ul spacing="normal">
                <li>
                  <t>DNS resolution does not change state at the server, reveal confidential information to the attacker, or waste significant resources.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>For other uses: <strong>Mitigation Required</strong>
              </t>
              <ul spacing="normal">
                <li>
                  <t>When using DNS for other purposes such as zone transfers <xref target="RFC9103"/>, clients relying on DANE for server authentication <bcp14>MUST NOT</bcp14> use a client certificate that is authorized by multiple potentially hostile servers.</t>
                </li>
              </ul>
            </li>
          </ul>
        </li>
      </ul>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
