<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.31 (Ruby 3.2.3) -->
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-dnsop-structured-dns-error-19" category="std" consensus="true" submissionType="IETF" updates="8914" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.32.0 -->
  <front>
    <title abbrev="Structured DNS Error">Structured Error Data for Filtered DNS</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-dnsop-structured-dns-error-19"/>
    <author fullname="Dan Wing">
      <organization abbrev="Citrix">Citrix Systems, Inc.</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>danwing@gmail.com</email>
      </address>
    </author>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Neil Cook">
      <organization>Open-Xchange</organization>
      <address>
        <postal>
          <country>United Kingdom</country>
        </postal>
        <email>neil.cook@noware.co.uk</email>
      </address>
    </author>
    <author fullname="Mohamed Boucadair">
      <organization>Orange</organization>
      <address>
        <postal>
          <street>Rennes</street>
          <code>35000</code>
          <country>France</country>
        </postal>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <date year="2026" month="April" day="06"/>
    <area>Internet</area>
    <workgroup>DNS Operations Working Group</workgroup>
    <keyword>Customer experience</keyword>
    <keyword>Informed decision</keyword>
    <keyword>transparency</keyword>
    <keyword>enriched feedback</keyword>
    <abstract>
      <?line 86?>

<t>DNS filtering is widely deployed for various reasons, including
network security. However, filtered DNS responses lack structured information
for end users to understand the reason for the filtering.
Existing mechanisms to provide explanatory details to end users cause harm
especially if the blocked DNS response is for HTTPS resources.</t>
      <t>This document updates RFC 8914 by signaling client support for structuring the EXTRA-TEXT field of
the Extended DNS Error to provide details on the DNS filtering. Such
details can be parsed by the client and displayed, logged, or used for
other purposes.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://ietf-wg-dnsop.github.io/draft-ietf-dnsop-structured-dns-error/draft-ietf-dnsop-structured-dns-error.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-dnsop-structured-dns-error/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        dnsop Working Group mailing list (<eref target="mailto:dnsop@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/dnsop/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/dnsop/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-wg-dnsop/draft-ietf-dnsop-structured-dns-error"/>.</t>
    </note>
  </front>
  <middle>
    <?line 99?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>DNS filters are deployed for a variety of reasons, e.g., endpoint
security, parental filtering, and filtering required by law
enforcement. Network-based security solutions such as firewalls and
Intrusion Prevention Systems (IPS) rely upon network traffic
inspection to implement perimeter-based security policies and operate
by filtering DNS responses. In a home network, DNS filtering is used for the
same reasons as above and additionally for parental control. Internet
Service Providers (ISPs) typically block access to some DNS domains due to a
requirement imposed by an external entity (e.g., law enforcement
agency) also performed using DNS-based content filtering.</t>
      <t>End users or network administrators leveraging DNS services that perform filtering may wish to receive more
explanatory information about such a filtering to resolve problems with the filter
-- for example to contact the DNS service administrator to allowlist a DNS domain that
was erroneously filtered or to understand the reason a particular
domain was filtered. With that information, they can choose
to use another network, open a trouble ticket with the DNS service administrator to
resolve erroneous filtering, log the information, etc.</t>
      <t>For the DNS filtering mechanisms described in <xref target="existing-techniques"/>, the DNS
server can return extended error codes Blocked, Filtered, Censored, or
Forged Answer defined in <xref section="4" sectionFormat="of" target="RFC8914"/>. However, these codes
only explain that filtering occurred but lack detail for the user to
diagnose erroneous filtering.</t>
      <t>No matter which type of response is generated (forged IP address(es),
NXDOMAIN or empty answer, even with an extended error code), the end user
who triggered the DNS query has little chance to understand which
entity filtered the query, how to report a mistake in the filter, or
why the entity filtered it at all. This document describes a mechanism
to provide such detail.</t>
      <t>One of the other benefits of the approach described in this document is to eliminate the need to
"spoof" block pages for HTTPS resources. This is achieved since
clients implementing this approach would be able to display a
meaningful error message, and would not need to connect to such a
block page. This approach thus avoids the need to install a local root
certificate authority on those IT-managed devices.</t>
      <t>This document describes a format for machine-readable data in the
EXTRA-TEXT field of <xref target="RFC8914"/>. It updates <xref section="2" sectionFormat="of" target="RFC8914"/> which
says the information in EXTRA-TEXT field is intended for human
consumption (not automated parsing).</t>
      <t>This document does not recommend DNS filtering but provides a
mechanism for better transparency to explain to the end users why some DNS
queries are filtered.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document uses terms defined in DNS Terminology <xref target="RFC9499"/>.</t>
      <t>"Encrypted DNS" refers to any encrypted scheme to convey DNS messages,
for example, DNS-over-HTTPS <xref target="RFC8484"/>, DNS-over-TLS <xref target="RFC7858"/>, or
DNS-over-QUIC <xref target="RFC9250"/>.</t>
      <t>The document refers to an Extended DNS Error (EDE) using its purpose, not its
INFO-CODE as per Table 3 of <xref target="RFC8914"/>. "Forged Answer",
"Blocked", "Censored", and "Filtered" are thus used to refer to "Forged Answer (4)",
"Blocked (15)", "Censored (16)",and "Filtered (17)".</t>
      <t>In this document, "client security policy evaluation" refers to implementation-defined
decision-making performed by the DNS client or consuming application (e.g., web
browser) to
determine how, or whether, structured error information is used, displayed,
or acted upon.</t>
      <t>Structured DNS Error (SDE) is an EDNS(0) option indicating support for structured encoding of the EXTRA-TEXT field.</t>
    </section>
    <section anchor="existing-techniques">
      <name>DNS Filtering Techniques and Their Limitations</name>
      <t>DNS responses can be filtered by sending, e.g., a bogus (also called
"forged") response, NXDOMAIN error, or empty answer. Also, clients can be informed that filtering occurred by sending an
Extended DNS Error code defined in <xref target="RFC8914"/>. Each of these
methods have advantages and disadvantages that are discussed below:</t>
      <ol spacing="normal" type="1"><li>
          <t>The DNS response is forged to provide a list of IP addresses that
points to an HTTP(S) server alerting the end user about the reason for
blocking access to the requested domain (e.g., malware). If the host component <xref target="RFC3986"/>
of an HTTP URL is blocked, the network security device
(e.g., Customer Premises Equipment (CPE) or firewall) presents a block page instead of the HTTP
response from the content provider hosting that domain. This works succesfully with HTTP.
<br/><br/>
  If this is an HTTPS URL, the network security device attempts to serve the block page over HTTPS.  In order to return a block page over HTTPS, the network security device uses a locally
generated root certificate and corresponding key pair. The local root certificate is
installed on the endpoint while the network security device stores a copy of the private key.
During the TLS handshake, the on-path network security device modifies the certificate
provided by the server and (re)signs it using the private key from the local root
certificate.  </t>
          <ul spacing="normal">
            <li>
              <t>In deployments where DNSSEC is used, this approach becomes ineffective because DNSSEC
ensures the integrity and authenticity of DNS responses, preventing forged DNS
responses from being accepted.</t>
            </li>
            <li>
              <t>The HTTPS server hosted on the network security device will have access to the client's IP address and the
hostname being requested. This information will be sensitive, as it will expose the end user's identity and the
domain name that a end user attempted to access.</t>
            </li>
            <li>
              <t>Configuring a local root certificate on endpoints is
not a viable option in several deployments like home networks,
schools, Small Office/Home Office (SOHO), or Small/Medium
Enterprise (SME). In these cases, the typical behavior is that
the filtered DNS response points to a server that will display
the block page. If the client is using HTTPS (via a web browser or
another application) this results in a certificate validation
error which gives no information to the end user about the reason
for the DNS filtering.</t>
            </li>
            <li>
              <t>Enterprise networks do not always assume that all the connected devices
are managed by the IT team or Mobile Device Management (MDM)
devices, especially in the quite common Bring Your Own Device
(BYOD) scenario. In addition, the local root certificate cannot
be installed on IoT devices without a device management tool.</t>
            </li>
            <li>
              <t>An end user does not know why the connection was prevented and,
consequently, may repeatedly try to reach the domain but with no
success. Frustrated, the end user may switch to an alternate
network that offers no DNS filtering against malware and
phishing, potentially compromising both security and
privacy. Furthermore, certificate errors train end users to click
through certificate errors, which is a bad security practice. To
eliminate the need for an end user to click through certificate
errors, an end user may manually install a local root certificate
on a host device. Doing so, however, is also a bad security
practice as it creates a security vulnerability that may be
exploited by a MITM attack. When a manually installed local root
certificate expires, the end user has to (again) manually install the
new local root certificate.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>The DNS response is forged to provide an NXDOMAIN answer, causing the DNS lookup to fail. This approach is incompatible with DNSSEC when the client performs validation, as the forged response will fail DNSSEC checks. However, in deployments where the client relies on the DNS server to perform DNSSEC validation, a filtering DNS server can forge an NXDOMAIN response for a valid domain, and the client will trust it. This undermines the integrity guarantees of DNSSEC, as the client has no way to distinguish between a genuine and a forged response. Further, the end user may not understand why a domain cannot be reached and may repeatedly attempt access without success. Frustrated, the end user may resort to using insecure methods to reach the domain, potentially compromising both security and privacy.</t>
        </li>
        <li>
          <t>The extended error codes Blocked and Filtered defined in
<xref section="4" sectionFormat="of" target="RFC8914"/> can be returned by a DNS server to provide
additional information about the cause of a DNS error.
These extended error codes do not suffer from the limitations
discussed in bullets (1) and (2), but the user still does not know the
exact reason nor is aware of the exact entity blocking the
access to the domain. For example, a DNS server may block access to a
domain based on the content category such as "Malware" to protect the
endpoint from malicious software, "Phishing" to prevent the end user from
revealing sensitive information to the attacker, etc. A end user may need to
know the contact details of the IT/InfoSec team to raise a complaint.
Further, the information conveyed by <xref target="RFC8914"/> is intended for
diagnostic purposes and is not structured for automated processing,
localization, or extensibility. This document defines a structured,
machine-readable format for conveying such details in the EXTRA-TEXT
field, enabling clients to process the information programmatically
and present it to end users (e.g., with localization support), while
allowing for extensibility and more granular, client security
policy-driven handling of the information. This specification requires
that clients only act upon such information when it is received
over an integrity-protected DNS response.</t>
        </li>
      </ol>
    </section>
    <section anchor="name-spec">
      <name>I-JSON in EXTRA-TEXT Field</name>
      <t>DNS servers that are compliant with this specification and have received an indication that the client also supports this specification as per <xref target="client-request"/> send data in the EXTRA-TEXT field <xref target="RFC8914"/> as a JSON object encoded using the Internet JSON (I-JSON) message format <xref target="RFC7493"/>.</t>
      <t>This document defines the following JSON names:</t>
      <dl>
        <dt>c: (contact)</dt>
        <dd>
          <t>The contact details of the IT/InfoSec team to report misclassified
DNS filtering. This information is important for transparency and also to ease unblocking a legitimate domain name that got blocked due to wrong classification.</t>
        </dd>
        <dt/>
        <dd>
          <t>The field is a JSON array of contact URIs. When multiple contact details are provided, each contact URI is
represented as a separate array element in the JSON array.</t>
        </dd>
        <dt/>
        <dd>
          <t>Contact URIs conveyed in the "c" field <bcp14>MUST</bcp14> use URI schemes registered in <xref target="IANA-Contact"/>.</t>
        </dd>
        <dt/>
        <dd>
          <t>This field is optional.</t>
        </dd>
        <dt>j: (justification)</dt>
        <dd>
          <t>'UTF-8'-encoded <xref target="RFC5198"/> human-readable explanation for the DNS
filtering decision.</t>
        </dd>
        <dt/>
        <dd>
          <t>This field is particularly useful when no applicable sub-error code
is defined or provided for the returned Extended DNS Error.</t>
        </dd>
        <dt/>
        <dd>
          <t>The information conveyed in this field <bcp14>MUST NOT</bcp14> be used as input to
automated processing that affects security policy enforcement or DNS
protocol behavior.</t>
        </dd>
        <dt/>
        <dd>
          <t>The DNS client determines, according to its client security policy,
whether the contents of this field are displayed to the end user,
logged, or ignored.</t>
        </dd>
        <dt/>
        <dd>
          <t>Returning non-UTF-8 data, syntactically invalid content, or
deliberately meaningless values (including empty strings) indicates that
a DNS server is misbehaving.</t>
        </dd>
        <dt/>
        <dd>
          <t>This field is optional.</t>
        </dd>
        <dt>s: (sub-error)</dt>
        <dd>
          <t>An integer representing the sub-error code for this particular DNS filtering case.</t>
        </dd>
        <dt/>
        <dd>
          <t>The integer values are defined in the IANA-managed registry for DNS Sub-Error Codes in <xref target="IANA-SubError"/>.</t>
        </dd>
        <dt/>
        <dd>
          <t>This field is optional.</t>
        </dd>
        <dt>o: (organization)</dt>
        <dd>
          <t>'UTF-8'-encoded human-friendly name of the organization that filtered this particular DNS query.</t>
        </dd>
        <dt/>
        <dd>
          <t>This field is optional.</t>
        </dd>
        <dt>l: (language)</dt>
        <dd>
          <t>The "l" field indicates the language used for the JSON-encoded "j" and "o" fields.  The value of this field <bcp14>MUST</bcp14> conform to the
language tag syntax specified in <xref section="2.1" sectionFormat="of" target="RFC5646"/>.</t>
        </dd>
        <dt/>
        <dd>
          <t>This field is optional but <bcp14>RECOMMENDED</bcp14> to aid in localization.</t>
        </dd>
      </dl>
      <t>The text in the "j" and "o" names can include international
characters. The text will be in natural language, chosen by the DNS administrator
to match its expected audience.</t>
      <t>If the client supports diagnostic interfaces, it <bcp14>MAY</bcp14> use the "l" field to identify
the language of the "j" text and optionally translate it.</t>
      <t>The "o" field <bcp14>MAY</bcp14> be displayed to end users, subject to the conditions described in <xref target="security"/>.
If the text is in a language not understood by the end user, the "l" field can be used
to identify the language and support translation into the end user's preferred language.</t>
      <t>To avoid exceeding the maximum EDNS0 size <xref target="RFC9715"/> the generated JSON values <bcp14>SHOULD</bcp14> be as short as
possible: short domain names, concise text in the values for the "j"
and "o" names, and minified JSON (that is, without spaces or line
breaks between JSON elements).</t>
      <t>The JSON data can be parsed to display to the user, logged, or
otherwise used to assist troubleshooting and diagnosis of DNS filtering.</t>
      <t>The sub-error codes provide a structured way to communicate more detailed and precise description of the cause of an error (e.g., distinguishing between malware-related blocking and phishing-related blocking under the general blocked error).</t>
      <ul empty="true">
        <li>
          <t>An alternate design for conveying the sub-error would be to define new EDE codes for these errors. However, such design is suboptimal because it requires replicating an error code for each EDE code to which the sub-error applies (e.g., "Malware" sub-error in <xref target="reg"/> would consume three EDE codes).</t>
        </li>
      </ul>
      <t>New JSON names <bcp14>MUST</bcp14> consist only of lower-case ASCII characters, digits,
and hyphen-minus (that is, Unicode characters U+0061 through 007A,
U+0030 through U+0039, and U+002D). Also, these names <bcp14>MUST</bcp14> be 63
characters or shorter and it is <bcp14>RECOMMENDED</bcp14> they be as short as
possible to reduce contribution to exceeding maximum EDNS0 response
size <xref target="RFC9715"/>.</t>
    </section>
    <section anchor="protocol-operation">
      <name>Protocol Operation</name>
      <section anchor="client-request">
        <name>Client Generating Request</name>
        <t>When generating a DNS query, a client that supports this specification
<bcp14>SHOULD</bcp14> include the Structured DNS Error (SDE) option defined in <xref target="SDE"/>, unless instructed by local policy otherwise.</t>
        <t>The presence of the SDE option indicates that the client desires the
DNS server to include an EDE option in the DNS response when DNS
filtering is performed, and that any data conveyed in the EXTRA-TEXT
field of the EDE option is encoded and processed in accordance with
this specification.</t>
      </section>
      <section anchor="server-response">
        <name>Server Generating Response</name>
        <t>When the DNS server filters its DNS response to a
query (e.g., A or AAAA resource record query), the DNS response <bcp14>MAY</bcp14> contain an empty answer, NXDOMAIN, or (less
ideally) forged response, as desired by the DNS
server.</t>
        <t>If the query contained the SDE EDNS option (<xref target="client-request"/>), and the DNS server returns an EDE code of "Blocked", "Filtered", "Censored", or "Blocked by Upstream DNS Server", the DNS server <bcp14>SHOULD</bcp14> include additional detail in the EXTRA-TEXT field encoded as structured and machine-readable data in accordance with the present specification, unless configured otherwise. If including the additional detail would cause the response to exceed the EDNS0 size <xref target="RFC9715"/> (and thus setting TC=1), it <bcp14>SHOULD</bcp14> be omitted. In deployments using DNS-over-TLS, DNS-over-HTTPS, or DNS-over-QUIC, transport size limitations are unlikely to necessitate omission of structured data in the EXTRA-TEXT field.</t>
        <t>If the SDE option was not present in the DNS request, the DNS server <bcp14>MUST</bcp14> process the request in accordance with <xref target="RFC8914"/> and <bcp14>MUST NOT</bcp14> assume that the client supports this specification. This preserves compatibility with clients and servers that implement <xref target="RFC8914"/> but do not support this specification.</t>
        <t>Servers <bcp14>MAY</bcp14> decide to return small TTL values in filtered DNS
responses (e.g., 10 seconds) to handle domain category and reputation
updates. Short TTLs allow for quick adaptation to dynamic changes in domain filtering decisions,
but can result in increased query traffic. In cases where updates are less frequent,
TTL values of 30 to 60 seconds <bcp14>MAY</bcp14> provide a better balance, reducing server load while
still ensuring reasonable flexibility for updates.</t>
        <t>If the query includes the SDE option as per <xref target="client-request"/>, the server <bcp14>MUST
NOT</bcp14> return the "Forged Answer" extended error code because the client
can take advantage of EDE's more sophisticated error reporting (e.g.,
"Filtered", "Blocked").  Continuing to send "Forged
Answer" even to an EDE-supporting client will cause the persistence of
the drawbacks described in <xref target="existing-techniques"/>.</t>
        <t>When the "Censored" extended error code is included in the DNS response,
the "c", "j", "o", and "l" fields may be conveyed in the EXTRA-TEXT field.
The sub-error codes defined in this specification are not applicable to
the "Censored" extended error code and <bcp14>MUST NOT</bcp14> be used in conjunction with it.
Future specifications may update this behavior by defining sub-error codes
applicable to "Censored".</t>
      </section>
      <section anchor="client-processing">
        <name>Client Processing Response</name>
        <t>On receipt of a DNS response with an EDE option from a
DNS server, the following ordered actions are performed on the EXTRA-TEXT
field:</t>
        <ol spacing="normal" type="1"><li>
            <t>If the integrity of the DNS response is not guaranteed, the
DNS client <bcp14>MUST NOT</bcp14> act upon data in the EXTRA-TEXT field, as the data
is vulnerable to
modification by an on-path attacker. An attacker can inject or
modify a structured DNS error response in transit without detection,
enabling fabrication of filtering information (e.g., misleading contact
information or false resolver identity information) that appears to
originate from the resolver. The data <bcp14>MAY</bcp14> be retained for diagnostic or
client security policy evaluation purposes.</t>
          </li>
          <li>
            <t>Servers that do not support this specification might use plain text in the
EXTRA-TEXT field. DNS clients <bcp14>SHOULD</bcp14> handle both plaintext and structured content. The client attempts to parse the EXTRA-TEXT field as I-JSON. If parsing fails or the content is not valid I-JSON, the client <bcp14>MUST</bcp14> treat the data as invalid, <bcp14>MUST NOT</bcp14> process it according to this specification. The client <bcp14>MAY</bcp14> instead process the EXTRA-TEXT field as unstructured text as specified in <xref target="RFC8914"/>.</t>
          </li>
          <li>
            <t>The DNS response <bcp14>MUST</bcp14> also contain an EDE code of
"Blocked by Upstream DNS Server", "Blocked", "Censored", or "Filtered" <xref target="RFC8914"/>,
otherwise the EXTRA-TEXT field is discarded.</t>
          </li>
          <li>
            <t>If the JSON object contains an "s" field and the sub-error code
is not defined as applicable to the accompanying Extended DNS Error
(EDE) code, the client <bcp14>MUST</bcp14> ignore the value of the "s" field
and continue processing the remaining fields in accordance with this
specification.</t>
          </li>
          <li>
            <t>If the EXTRA-TEXT field does not contain at least one of the JSON
names "c", "j", or "s", or if all of the fields that are present have
empty values, the entire JSON object <bcp14>MUST</bcp14> be discarded.</t>
          </li>
          <li>
            <t>If the JSON object contains a "c" field any of its Contact URIs
with schemes not registered in the <xref target="IANA-Contact"/> registry are
ignored. Remaining Contact URIs using registered schemes can be
processed.</t>
          </li>
          <li>
            <t>If the identity of the DNS server cannot be verified (e.g., when
using opportunistic privacy such as <xref section="5" sectionFormat="of" target="RFC8310"/> or opportunistic discovery <xref target="RFC9462"/>), the DNS client <bcp14>MUST</bcp14> ignore the "c", "j", and "o" fields, as these fields may influence end user behavior and are vulnerable to active attacks in the absence of resolver authentication. If the DNS response was received over an encrypted connection without server authentication, the client <bcp14>MAY</bcp14> process the "s" field and other parts of the response, as the "s" field is a registry-defined, enumerated value and does not contain free-form text.</t>
          </li>
          <li>
            <t>If the DNS client uses an authenticated connection to the DNS server (e.g., when
using a strict privacy profile for DNS-over-TLS (<xref section="5" sectionFormat="of" target="RFC8310"/>) or an authenticated DNS-over-HTTPS or DNS-over-QUIC connection), this mitigates both passive eavesdropping and client redirection (at the expense of providing no DNS service if such a connection is not available). In such cases, the DNS client <bcp14>MAY</bcp14> process the EXTRA-TEXT field of the DNS response.</t>
          </li>
          <li>
            <t>The DNS client <bcp14>MUST</bcp14> ignore any other JSON names that it does not support.</t>
          </li>
        </ol>
        <ul empty="true">
          <li>
            <t>Note that the strict and opportunistic privacy profiles as defined in <xref target="RFC8310"/> only apply to DoT; there has been
no such distinction made for DoH.</t>
          </li>
        </ul>
      </section>
      <section anchor="SDE">
        <name>Structured DNS Error (SDE) EDNS(0) Option Format</name>
        <t>The Structured DNS Error (SDE) EDNS(0) option is used by a client to
indicate support for I-JSON encoding in the EXTRA-TEXT field of an
Extended DNS Error (EDE) option.</t>
        <t>The SDE option has no OPTION-DATA. The OPTION-LENGTH field <bcp14>MUST</bcp14>
be set to 0. A server receiving an SDE option with a non-zero
OPTION-LENGTH <bcp14>MUST</bcp14> ignore the option.</t>
        <t>The presence of the SDE option in a query indicates that the client
supports processing the EXTRA-TEXT field in accordance with this
specification.</t>
      </section>
    </section>
    <section anchor="new-sub-error-codes-definition">
      <name>New Sub-Error Codes Definition</name>
      <t>The document defines the following new IANA-registered Sub-Error codes.</t>
      <section anchor="policy-reserved">
        <name>Reserved</name>
        <ul spacing="normal">
          <li>
            <t>Number: 0</t>
          </li>
          <li>
            <t>Meaning: Reserved. This sub-error code value <bcp14>MUST NOT</bcp14> be sent. If received, it has no meaning.</t>
          </li>
          <li>
            <t>Applicability: This code should never be used.</t>
          </li>
          <li>
            <t>Reference: This-Document</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
        </ul>
      </section>
      <section anchor="policy-network">
        <name>Network Operator Policy</name>
        <ul spacing="normal">
          <li>
            <t>Number: 5</t>
          </li>
          <li>
            <t>Meaning: Network Operator Policy. The code indicates that the request was filtered according to a policy imposed by the operator of the local network (where local network is a relative term, e.g., it may refer to a Local Area Network or to the network of the ISP selected by the end user).</t>
          </li>
          <li>
            <t>Applicability: Blocked</t>
          </li>
          <li>
            <t>Reference: This-Document</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
        </ul>
      </section>
      <section anchor="policy-dns">
        <name>DNS Operator Policy</name>
        <ul spacing="normal">
          <li>
            <t>Number: 6</t>
          </li>
          <li>
            <t>Meaning: DNS Operator Policy. The code indicates that the request was filtered according to policy determined by the operator of the DNS server. This is different from the "Network Operator Policy" code when a third-party DNS resolver is used.</t>
          </li>
          <li>
            <t>Applicability: Blocked</t>
          </li>
          <li>
            <t>Reference:  This-Document</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="new-extended-dns-errors">
      <name>New Extended DNS Errors</name>
      <t>This document defines an addition to the EDE codes defined in <xref target="RFC8914"/>.</t>
      <section anchor="extended-dns-error-code-tba1-blocked-by-upstream-dns-server">
        <name>Extended DNS Error Code TBA1 - Blocked by Upstream DNS Server</name>
        <t>The DNS server is unable to respond to the request
because the domain is on a blocklist due to an internal security policy
imposed by an upstream DNS server. This error code
is useful in deployments where a network-provided DNS forwarder
is configured to use an external resolver that filters malicious
domains. When the DNS forwarder receives a Blocked (15) error code
from the upstream DNS server, it can replace it with
"Blocked by Upstream DNS Server" (TBA1) before forwarding
the reply to the DNS client. Additionally, the EXTRA-TEXT field may
be forwarded to the DNS client.</t>
        <t>Implementations should ensure that the communication channel with the
upstream DNS server provides adequate integrity protection to mitigate
the threats described in step 1 of <xref target="client-processing"/>.</t>
      </section>
    </section>
    <section anchor="examples">
      <name>Examples</name>
      <t>An example showing the nameserver at 'ns.example.net' that filtered a
DNS "A" record query for 'example.org' is provided in <xref target="example-json"/>.</t>
      <figure anchor="example-json">
        <name>JSON Returned in EXTRA-TEXT Field of Extended DNS Error Response</name>
        <artwork><![CDATA[
{
  "c": [
    "tel:+358-555-1234567",
    "sips:bob@bobphone.example.com"
  ],
  "j": "malware present for 23 days",
  "s": 1,
  "o": "example.net Filtering Service",
  "l": "en"
}
]]></artwork>
      </figure>
      <t>In <xref target="example-json-minified"/> the same content is shown with minified JSON (no
whitespace, no blank lines) with <tt>'\'</tt> line wrapping per <xref target="RFC8792"/>.</t>
      <figure anchor="example-json-minified">
        <name>Minified Response</name>
        <artwork><![CDATA[
{ "c":["tel:+358-555-1234567","sips:bob@bobphone.example.com"],\
"j":"malware present for 23 days",\
"s":1,\
"o":"example.net Filtering Service",\
"l":"en" }
]]></artwork>
      </figure>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>When a forwarder receives an EDE option, whether or not (and how) to pass along JSON information in the
EXTRA-TEXT field to its client is implementation-dependent <xref target="RFC5625"/> and depends on operator policy. Implementations <bcp14>MAY</bcp14> choose not to
forward the JSON information, or they <bcp14>MAY</bcp14> choose to create a new EDE option that conveys the information in the
"c", "s", and "j" fields encoded in the JSON object.</t>
      <t>The application that triggered the DNS request may have a client security policy to override the contact information (e.g., redirect all complaint calls to a single contact point). In such cases, the content of the "c" attribute <bcp14>MAY</bcp14> be ignored.</t>
      <section anchor="backward-compatibility">
        <name>Backward Compatibility</name>
        <t>Future extensions <bcp14>MUST NOT</bcp14> introduce mandatory JSON attributes, as existing implementations are required to ignore unknown JSON names (see <xref target="client-processing"/>).</t>
      </section>
    </section>
    <section anchor="security">
      <name>Security Considerations</name>
      <section anchor="authentication-and-confidentiality">
        <name>Authentication and Confidentiality</name>
        <t>Security considerations in <xref section="6" sectionFormat="of" target="RFC8914"/> apply to this
document. <xref target="RFC8914"/> cautions against relying on EDE information because it may be unauthenticated and transmitted in cleartext. This specification assumes the use of authenticated, integrity-protected DNS transports (e.g., DNS-over-TLS, DNS-over-HTTPS, or DNS-over-QUIC). Such transports <bcp14>MUST</bcp14> be based on TLS 1.3 <xref target="RFC8446"/> or later.  Under these conditions, EDE information is integrity-protected, reducing the risks associated with relying on structured EDE content.</t>
        <t>To minimize impact of active on-path attacks on the DNS channel, the
client validates the response as described in <xref target="client-processing"/>.</t>
      </section>
      <section anchor="restrictions-on-display-of-c-o-and-j-fields">
        <name>Restrictions on Display of "c", "o", and "j" Fields</name>
        <t>A client might choose to display the information in the "c" field
to the end user if and only if the encrypted resolver has sufficient
reputation, according to some client security policy (e.g.,
administrative configuration, or a built-in list of respectable
resolvers). This limits the ability of a malicious encrypted resolver
to cause harm. For example, an end user can use the details in the "c" field to contact an attacker
to solve the problem of being unable to reach a domain. The attacker can mislead the end user to
install malware or spyware to compromise the device security posture or mislead the end user to reveal
personal data.
If the client decides not to display all of the
information in the EXTRA-TEXT field, it can be logged for diagnostics
purpose and the client can only display the resolver hostname that
blocked the domain, error description for the EDE code and the
sub-error description for the "s" field to the end user.</t>
        <t>The same client security policy considerations apply to the display of the "j" field, as it
contains free-form, human-readable text that may influence end user behavior.</t>
        <t>When displaying the free-form text of "o", the client <bcp14>MUST
NOT</bcp14> make any of those elements into actionable (clickable) links and these
fields need to be rendered as text, not as HTML. The contact details of "c" can be made
into clickable links to provide a convenient way for end users to initiate, e.g., voice calls. The client might
choose to display the contact details only when the identity of the DNS server is verified.</t>
        <t>Clients <bcp14>MUST NOT</bcp14> automatically initiate connections to URIs derived from the EXTRA-TEXT field. Doing so could allow a resolver to silently report client activity to third parties, enable denial-of-service reflection attacks, or be used to entrap a client. The restriction of Contact URI schemes to "sips", "tel", and "mailto" is intentional, as these schemes do not result in automatic HTTP connections.</t>
        <t>Further, clients <bcp14>MUST NOT</bcp14> display the value of the <tt>"o"</tt> field to the end user unless one of the following
conditions is met:</t>
        <ul spacing="normal">
          <li>
            <t>The value matches a registered organization name listed in the <xref target="IANA-Enterprise"/> OR</t>
          </li>
          <li>
            <t>The value consists solely of an organization name and does not contain any additional free-form content such
as instructions, URLs, or messaging intended to influence end user behavior, as determined by client security policy or heuristics.</t>
          </li>
        </ul>
        <t>If the organization name cannot be verified through registry checks or heuristics, the client <bcp14>MUST NOT</bcp14> display the "o" field to the end user.</t>
        <t>DNS clients <bcp14>MAY</bcp14> keep all fields conveyed in the EXTRA-TEXT field for evaluation according to the client security  policy. Such data <bcp14>MUST NOT</bcp14> be automatically trusted, displayed to end users, or used to influence security decisions without appropriate validation.</t>
      </section>
      <section anchor="security-risks-from-legacy-dns-forwarders">
        <name>Security Risks from Legacy DNS Forwarders</name>
        <t>An attacker might inject (or modify) the EDE EXTRA-TEXT field with a
DNS proxy or DNS forwarder that is unaware of EDE. Such a DNS proxy or
DNS forwarder will forward that attacker-controlled EDE option.  To
prevent such an attack, clients can be configured to process EDE from
explicitly configured DNS servers or utilize RESINFO
<xref target="RFC9606"/>.</t>
      </section>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This document requests five IANA actions as described in the following subsections.</t>
      <ul empty="true">
        <li>
          <t>Note to the RFC Editor: Please replace RFCXXXX with the RFC number assigned to this document and "TBA1" with the value assigned by IANA.</t>
        </li>
      </ul>
      <section anchor="structured-dns-error-edns-option">
        <name>Structured DNS Error EDNS Option</name>
        <t>IANA is requested to register the following new EDNS(0) Option Code in the
"DNS EDNS0 Option Codes (OPT)" registry under the "Domain Name System (DNS) Parameters" registry group <xref target="IANA-DNS"/>:</t>
        <dl>
          <dt>Value:</dt>
          <dd>
            <t>TBD</t>
          </dd>
          <dt>Name:</dt>
          <dd>
            <t>Structured DNS Error</t>
          </dd>
          <dt>Status:</dt>
          <dd>
            <t>Standard</t>
          </dd>
          <dt>Reference:</dt>
          <dd>
            <t>RFC XXXX</t>
          </dd>
        </dl>
      </section>
      <section anchor="IANA-Names">
        <name>New Registry for JSON Names</name>
        <t>This document requests IANA to create a new registry, entitled "EXTRA-TEXT JSON Names"
under "Extended DNS Error Codes" registry, which is under the "Domain Name System (DNS) Parameters" registry group <xref target="IANA-DNS"/>. The registration request for a new JSON name must include the
following fields:</t>
        <dl>
          <dt>JSON Name:</dt>
          <dd>
            <t>Specifies the name of an attribute that is present in the JSON data enclosed in EXTRA-TEXT field. The name must follow the guidelines in <xref target="name-spec"/>.</t>
          </dd>
          <dt>Field Meaning:</dt>
          <dd>
            <t>Provides a brief, human-readable label summarizing the purpose of the JSON attribute.</t>
          </dd>
          <dt>Short description:</dt>
          <dd>
            <t>Includes a short description of the requested JSON name.</t>
          </dd>
          <dt>Mandatory (Y/N?):</dt>
          <dd>
            <t>Indicates whether this attribute is mandatory or optional.</t>
          </dd>
          <dt>Specification:</dt>
          <dd>
            <t>Provides a pointer to the reference document that specifies the attribute.</t>
          </dd>
        </dl>
        <t>The registry is initially populated with the following values:</t>
        <table anchor="reg-names">
          <name>Initial JSON Names Registry</name>
          <thead>
            <tr>
              <th align="center">JSON Name</th>
              <th align="left">Field Meaning</th>
              <th align="left">Description</th>
              <th align="center">Specification</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="center">c</td>
              <td align="left">contact</td>
              <td align="left">The contact details of the IT/InfoSec team to report misclassified DNS filtering</td>
              <td align="center">
                <xref target="name-spec"/> of RFCXXXX</td>
            </tr>
            <tr>
              <td align="center">j</td>
              <td align="left">justification</td>
              <td align="left">UTF-8-encoded <xref target="RFC5198"/> textual justification for a particular DNS filtering</td>
              <td align="center">
                <xref target="name-spec"/> of RFCXXXX</td>
            </tr>
            <tr>
              <td align="center">s</td>
              <td align="left">sub-error</td>
              <td align="left">Integer representing the sub-error code for this DNS filtering case</td>
              <td align="center">
                <xref target="name-spec"/> of RFCXXXX</td>
            </tr>
            <tr>
              <td align="center">o</td>
              <td align="left">organization</td>
              <td align="left">UTF-8-encoded human-friendly name of the organization that filtered this particular DNS query</td>
              <td align="center">
                <xref target="name-spec"/> of RFCXXXX</td>
            </tr>
            <tr>
              <td align="center">l</td>
              <td align="left">language</td>
              <td align="left">Indicates the language of the "j" and "o" fields as defined in <xref target="RFC5646"/></td>
              <td align="center">
                <xref target="name-spec"/> of RFCXXXX</td>
            </tr>
          </tbody>
        </table>
        <t>New JSON names are registered via IETF Review (<xref section="4.8" sectionFormat="of" target="RFC8126"/>) and their formatting
constraints are described in <xref target="name-spec"/>.</t>
      </section>
      <section anchor="IANA-Contact">
        <name>New Registry for Contact URI Scheme</name>
        <t>This document requests IANA to create a new registry, entitled "Contact URI Schemes"
under "Extended DNS Error Codes"
registry, which is under the "Domain Name System (DNS) Parameters" registry group <xref target="IANA-DNS"/>. The registration request for a new Contact URI scheme has to include the
following fields:</t>
        <ul spacing="normal">
          <li>
            <t>Name: URI scheme name.</t>
          </li>
          <li>
            <t>Meaning: Provides a short description of the scheme.</t>
          </li>
          <li>
            <t>Reference: Provides a pointer to an IETF-approved specification that defines
the URI scheme.</t>
          </li>
        </ul>
        <t>The Contact URI scheme registry is initially populated with the
following schemes:</t>
        <table>
          <thead>
            <tr>
              <th align="center">Name</th>
              <th align="left">Meaning</th>
              <th align="center">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="center">sips</td>
              <td align="left">SIP Call</td>
              <td align="center">
                <xref target="RFC5630"/></td>
            </tr>
            <tr>
              <td align="center">tel</td>
              <td align="left">Telephone Number</td>
              <td align="center">
                <xref target="RFC3966"/></td>
            </tr>
            <tr>
              <td align="center">mailto</td>
              <td align="left">Internet mail</td>
              <td align="center">
                <xref target="RFC6068"/></td>
            </tr>
          </tbody>
        </table>
        <t>The registration procedure for adding new Contact URI schemes to the "Contact URI Schemes" registry is "IETF
Review" as defined in <xref section="4.8" sectionFormat="of" target="RFC8126"/>.</t>
      </section>
      <section anchor="IANA-SubError">
        <name>New Registry for DNS Sub-Error Codes</name>
        <t>This document requests IANA to create a new registry, entitled "Sub-Error Codes"
under "Extended DNS Error Codes" registry, which is under the "Domain Name System (DNS) Parameters" registry group <xref target="IANA-DNS"/>. The registration request for a new sub-error code must include the
following fields:</t>
        <ul spacing="normal">
          <li>
            <t>Number: Is the wire format sub-error code (range 0-255).</t>
          </li>
          <li>
            <t>Meaning: Provides a short description of the sub-error.</t>
          </li>
          <li>
            <t>EDE Codes Applicability: Indicates which Extended DNS Error (EDE) Codes apply to this sub-error code.</t>
          </li>
          <li>
            <t>Reference: Provides a pointer to an IETF-approved specification that registered
the code and/or an authoritative specification that describes the
meaning of this code.</t>
          </li>
        </ul>
        <t>The Sub-Error Code registry is initially populated with the
following values:</t>
        <table anchor="reg">
          <name>Initial Sub-Error Code Registry</name>
          <thead>
            <tr>
              <th align="center">Number</th>
              <th align="left">Meaning</th>
              <th align="left">EDE Codes Applicability</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="center">0</td>
              <td align="left">Reserved</td>
              <td align="left">Not used</td>
              <td align="left">
                <xref target="policy-reserved"/> of this document</td>
            </tr>
            <tr>
              <td align="center">1</td>
              <td align="left">Malware</td>
              <td align="left">"Blocked", "Blocked by Upstream DNS Server", "Filtered"</td>
              <td align="left">Section 5.5 of <xref target="RFC5901"/></td>
            </tr>
            <tr>
              <td align="center">2</td>
              <td align="left">Phishing</td>
              <td align="left">"Blocked", "Blocked by Upstream DNS Server", "Filtered"</td>
              <td align="left">Section 5.5 of <xref target="RFC5901"/></td>
            </tr>
            <tr>
              <td align="center">3</td>
              <td align="left">Spam</td>
              <td align="left">"Blocked", "Blocked by Upstream DNS Server", "Filtered"</td>
              <td align="left">Page 289 of <xref target="RFC4949"/></td>
            </tr>
            <tr>
              <td align="center">4</td>
              <td align="left">Spyware</td>
              <td align="left">"Blocked", "Blocked by Upstream DNS Server", "Filtered"</td>
              <td align="left">Page 291 of <xref target="RFC4949"/></td>
            </tr>
            <tr>
              <td align="center">5</td>
              <td align="left">Network operator policy</td>
              <td align="left">"Blocked"</td>
              <td align="left">
                <xref target="policy-network"/> of this document</td>
            </tr>
            <tr>
              <td align="center">6</td>
              <td align="left">DNS operator policy</td>
              <td align="left">"Blocked"</td>
              <td align="left">
                <xref target="policy-dns"/> of this document</td>
            </tr>
          </tbody>
        </table>
        <t>The registration procedure to add New Sub-Error Codes is IETF Review as defined in <xref section="4.8" sectionFormat="of" target="RFC8126"/>.</t>
      </section>
      <section anchor="new-extended-dns-error-code">
        <name>New Extended DNS Error Code</name>
        <t>IANA is requested to assign the following Extended DNS Error code from the "Extended DNS Error Codes"
registry under the "Domain Name System (DNS) Parameters" registry group <xref target="IANA-DNS"/>:</t>
        <table anchor="reg-ede">
          <name>New DNS Error Code</name>
          <thead>
            <tr>
              <th align="center">INFO-CODE</th>
              <th align="left">Purpose</th>
              <th align="center">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="center">TBA1</td>
              <td align="left">Blocked by Upstream DNS Server</td>
              <td align="center">RFCXXXX</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8914">
          <front>
            <title>Extended DNS Errors</title>
            <author fullname="W. Kumari" initials="W." surname="Kumari"/>
            <author fullname="E. Hunt" initials="E." surname="Hunt"/>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="W. Hardaker" initials="W." surname="Hardaker"/>
            <author fullname="D. Lawrence" initials="D." surname="Lawrence"/>
            <date month="October" year="2020"/>
            <abstract>
              <t>This document defines an extensible method to return additional information about the cause of DNS errors. Though created primarily to extend SERVFAIL to provide additional information about the cause of DNS and DNSSEC failures, the Extended DNS Errors option defined in this document allows all response types to contain extended error information. Extended DNS Error information does not change the processing of RCODEs.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8914"/>
          <seriesInfo name="DOI" value="10.17487/RFC8914"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC9499">
          <front>
            <title>DNS Terminology</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
              <t>This document updates RFC 2308 by clarifying the definitions of "forwarder" and "QNAME". It obsoletes RFC 8499 by adding multiple terms and clarifications. Comprehensive lists of changed and new definitions can be found in Appendices A and B.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="219"/>
          <seriesInfo name="RFC" value="9499"/>
          <seriesInfo name="DOI" value="10.17487/RFC9499"/>
        </reference>
        <reference anchor="RFC7493">
          <front>
            <title>The I-JSON Message Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="March" year="2015"/>
            <abstract>
              <t>I-JSON (short for "Internet JSON") is a restricted profile of JSON designed to maximize interoperability and increase confidence that software can process it successfully with predictable results.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7493"/>
          <seriesInfo name="DOI" value="10.17487/RFC7493"/>
        </reference>
        <reference anchor="RFC5198">
          <front>
            <title>Unicode Format for Network Interchange</title>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <author fullname="M. Padlipsky" initials="M." surname="Padlipsky"/>
            <date month="March" year="2008"/>
            <abstract>
              <t>The Internet today is in need of a standardized form for the transmission of internationalized "text" information, paralleling the specifications for the use of ASCII that date from the early days of the ARPANET. This document specifies that format, using UTF-8 with normalization and specific line-ending sequences. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5198"/>
          <seriesInfo name="DOI" value="10.17487/RFC5198"/>
        </reference>
        <reference anchor="RFC5646">
          <front>
            <title>Tags for Identifying Languages</title>
            <author fullname="A. Phillips" initials="A." role="editor" surname="Phillips"/>
            <author fullname="M. Davis" initials="M." role="editor" surname="Davis"/>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the structure, content, construction, and semantics of language tags for use in cases where it is desirable to indicate the language used in an information object. It also describes how to register values for use in language tags and the creation of user-defined extensions for private interchange. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="47"/>
          <seriesInfo name="RFC" value="5646"/>
          <seriesInfo name="DOI" value="10.17487/RFC5646"/>
        </reference>
        <reference anchor="RFC8310">
          <front>
            <title>Usage Profiles for DNS over TLS and DNS over DTLS</title>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="D. Gillmor" initials="D." surname="Gillmor"/>
            <author fullname="T. Reddy" initials="T." surname="Reddy"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document discusses usage profiles, based on one or more authentication mechanisms, which can be used for DNS over Transport Layer Security (TLS) or Datagram TLS (DTLS). These profiles can increase the privacy of DNS transactions compared to using only cleartext DNS. This document also specifies new authentication mechanisms -- it describes several ways that a DNS client can use an authentication domain name to authenticate a (D)TLS connection to a DNS server. Additionally, it defines (D)TLS protocol profiles for DNS clients and servers implementing DNS over (D)TLS. This document updates RFC 7858.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8310"/>
          <seriesInfo name="DOI" value="10.17487/RFC8310"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC5630">
          <front>
            <title>The Use of the SIPS URI Scheme in the Session Initiation Protocol (SIP)</title>
            <author fullname="F. Audet" initials="F." surname="Audet"/>
            <date month="October" year="2009"/>
            <abstract>
              <t>This document provides clarifications and guidelines concerning the use of the SIPS URI scheme in the Session Initiation Protocol (SIP). It also makes normative changes to SIP. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5630"/>
          <seriesInfo name="DOI" value="10.17487/RFC5630"/>
        </reference>
        <reference anchor="RFC3966">
          <front>
            <title>The tel URI for Telephone Numbers</title>
            <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
            <date month="December" year="2004"/>
            <abstract>
              <t>This document specifies the URI (Uniform Resource Identifier) scheme "tel". The "tel" URI describes resources identified by telephone numbers. This document obsoletes RFC 2806. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3966"/>
          <seriesInfo name="DOI" value="10.17487/RFC3966"/>
        </reference>
        <reference anchor="RFC6068">
          <front>
            <title>The 'mailto' URI Scheme</title>
            <author fullname="M. Duerst" initials="M." surname="Duerst"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <author fullname="J. Zawinski" initials="J." surname="Zawinski"/>
            <date month="October" year="2010"/>
            <abstract>
              <t>This document defines the format of Uniform Resource Identifiers (URIs) to identify resources that are reached using Internet mail. It adds better internationalization and compatibility with Internationalized Resource Identifiers (IRIs; RFC 3987) to the previous syntax of 'mailto' URIs (RFC 2368). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6068"/>
          <seriesInfo name="DOI" value="10.17487/RFC6068"/>
        </reference>
        <reference anchor="RFC5901">
          <front>
            <title>Extensions to the IODEF-Document Class for Reporting Phishing</title>
            <author fullname="P. Cain" initials="P." surname="Cain"/>
            <author fullname="D. Jevans" initials="D." surname="Jevans"/>
            <date month="July" year="2010"/>
            <abstract>
              <t>This document extends the Incident Object Description Exchange Format (IODEF) defined in RFC 5070 to support the reporting of phishing events, which is a particular type of fraud. These extensions are flexible enough to support information gleaned from activities throughout the entire electronic fraud cycle -- from receipt of the phishing lure to the disablement of the collection site. Both simple reporting and complete forensic reporting are possible, as is consolidating multiple incidents. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5901"/>
          <seriesInfo name="DOI" value="10.17487/RFC5901"/>
        </reference>
        <reference anchor="RFC4949">
          <front>
            <title>Internet Security Glossary, Version 2</title>
            <author fullname="R. Shirey" initials="R." surname="Shirey"/>
            <date month="August" year="2007"/>
            <abstract>
              <t>This Glossary provides definitions, abbreviations, and explanations of terminology for information system security. The 334 pages of entries offer recommendations to improve the comprehensibility of written material that is generated in the Internet Standards Process (RFC 2026). The recommendations follow the principles that such writing should (a) use the same term or definition whenever the same concept is mentioned; (b) use terms in their plainest, dictionary sense; (c) use terms that are already well-established in open publications; and (d) avoid terms that either favor a particular vendor or favor a particular technology or mechanism over other, competing techniques that already exist or could be developed. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="FYI" value="36"/>
          <seriesInfo name="RFC" value="4949"/>
          <seriesInfo name="DOI" value="10.17487/RFC4949"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="IANA-DNS" target="https://www.iana.org/assignments/dns-parameters/dns-parameters.xhtml#extended-dns-error-codes">
          <front>
            <title>Domain Name System (DNS) Parameters, Extended DNS Error Codes</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="RPZ" target="https://dnsrpz.info">
          <front>
            <title>Response Policy Zone</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="Impl-1" target="https://datatracker.ietf.org/meeting/116/materials/slides-116-dnsop-dns-errors-implementation-proposal-slides-116-dnsop-update-on-dns-errors-implementation-00">
          <front>
            <title>Use of DNS Errors To improve Browsing User Experience With network based malware protection</title>
            <author>
              <organization/>
            </author>
            <date year="2023" month="March"/>
          </front>
        </reference>
        <reference anchor="IANA-Enterprise" target="https://www.iana.org/assignments/enterprise-numbers/">
          <front>
            <title>Private Enterprise Numbers (PENs)</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="RFC8484">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="RFC7858">
          <front>
            <title>Specification for DNS over Transport Layer Security (TLS)</title>
            <author fullname="Z. Hu" initials="Z." surname="Hu"/>
            <author fullname="L. Zhu" initials="L." surname="Zhu"/>
            <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="D. Wessels" initials="D." surname="Wessels"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
              <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7858"/>
          <seriesInfo name="DOI" value="10.17487/RFC7858"/>
        </reference>
        <reference anchor="RFC9250">
          <front>
            <title>DNS over Dedicated QUIC Connections</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>This document describes the use of QUIC to provide transport confidentiality for DNS. The encryption provided by QUIC has similar properties to those provided by TLS, while QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides more efficient packet-loss recovery than UDP. DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC 7858, and latency characteristics similar to classic DNS over UDP. This specification describes the use of DoQ as a general-purpose transport for DNS and includes the use of DoQ for stub to recursive, recursive to authoritative, and zone transfer scenarios.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9250"/>
          <seriesInfo name="DOI" value="10.17487/RFC9250"/>
        </reference>
        <reference anchor="RFC3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC9715">
          <front>
            <title>IP Fragmentation Avoidance in DNS over UDP</title>
            <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
            <author fullname="P. Vixie" initials="P." surname="Vixie"/>
            <date month="January" year="2025"/>
            <abstract>
              <t>The widely deployed Extension Mechanisms for DNS (EDNS(0)) feature in the DNS enables a DNS receiver to indicate its received UDP message size capacity, which supports the sending of large UDP responses by a DNS server. Large DNS/UDP messages are more likely to be fragmented, and IP fragmentation has exposed weaknesses in application protocols. It is possible to avoid IP fragmentation in DNS by limiting the response size where possible and signaling the need to upgrade from UDP to TCP transport where necessary. This document describes techniques to avoid IP fragmentation in DNS.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9715"/>
          <seriesInfo name="DOI" value="10.17487/RFC9715"/>
        </reference>
        <reference anchor="RFC9462">
          <front>
            <title>Discovery of Designated Resolvers</title>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="E. Kinnear" initials="E." surname="Kinnear"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <author fullname="T. Jensen" initials="T." surname="Jensen"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document defines Discovery of Designated Resolvers (DDR), a set of mechanisms for DNS clients to use DNS records to discover a resolver's encrypted DNS configuration. An Encrypted DNS Resolver discovered in this manner is referred to as a "Designated Resolver". These mechanisms can be used to move from unencrypted DNS to encrypted DNS when only the IP address of a resolver is known. These mechanisms are designed to be limited to cases where Unencrypted DNS Resolvers and their Designated Resolvers are operated by the same entity or cooperating entities. It can also be used to discover support for encrypted DNS protocols when the name of an Encrypted DNS Resolver is known.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9462"/>
          <seriesInfo name="DOI" value="10.17487/RFC9462"/>
        </reference>
        <reference anchor="RFC8792">
          <front>
            <title>Handling Long Lines in Content of Internet-Drafts and RFCs</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="E. Auerswald" initials="E." surname="Auerswald"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <date month="June" year="2020"/>
            <abstract>
              <t>This document defines two strategies for handling long lines in width-bounded text content. One strategy, called the "single backslash" strategy, is based on the historical use of a single backslash ('\') character to indicate where line-folding has occurred, with the continuation occurring with the first character that is not a space character (' ') on the next line. The second strategy, called the "double backslash" strategy, extends the first strategy by adding a second backslash character to identify where the continuation begins and is thereby able to handle cases not supported by the first strategy. Both strategies use a self-describing header enabling automated reconstitution of the original content.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8792"/>
          <seriesInfo name="DOI" value="10.17487/RFC8792"/>
        </reference>
        <reference anchor="RFC5625">
          <front>
            <title>DNS Proxy Implementation Guidelines</title>
            <author fullname="R. Bellis" initials="R." surname="Bellis"/>
            <date month="August" year="2009"/>
            <abstract>
              <t>This document provides guidelines for the implementation of DNS proxies, as found in broadband gateways and other similar network devices. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="152"/>
          <seriesInfo name="RFC" value="5625"/>
          <seriesInfo name="DOI" value="10.17487/RFC5625"/>
        </reference>
        <reference anchor="RFC9606">
          <front>
            <title>DNS Resolver Information</title>
            <author fullname="T. Reddy.K" initials="T." surname="Reddy.K"/>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <date month="June" year="2024"/>
            <abstract>
              <t>This document specifies a method for DNS resolvers to publish information about themselves. DNS clients can use the resolver information to identify the capabilities of DNS resolvers. How DNS clients use such information is beyond the scope of this document.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9606"/>
          <seriesInfo name="DOI" value="10.17487/RFC9606"/>
        </reference>
      </references>
    </references>
    <?line 757?>

<section anchor="interoperation-with-rpz-servers">
      <name>Interoperation with RPZ Servers</name>
      <t>This appendix provides a non-normative guidance for operation with a Response Policy Zones (RPZ) server <xref target="RPZ"/> that
indicates filtering with a NXDOMAIN response with the Recursion
Available bit cleared (RA=0). This guidance is provided to ease interoperation with RPZ.</t>
      <t>When a DNS client supports this specification, it includes the
SDE option in its DNS query.</t>
      <t>If the server does not support this specification and is performing
RPZ filtering, the server ignores the SDE option in the DNS query and
replies with NXDOMAIN and RA=0. The DNS client can continue to accept
such responses.</t>
      <t>If the server does support this specification and is performing RPZ
filtering, the server can use the SDE option in the query to identify
an SDE-aware client and respond appropriately (that is, by generating
a response described in <xref target="server-response"/>) as NXDOMAIN and RA=0
are not necessary when generating a response to such a client.</t>
    </section>
    <section anchor="implementation-status">
      <name>Implementation Status</name>
      <ul empty="true">
        <li>
          <t>Note to the RFC Editor: please remove this appendix prior publication.</t>
        </li>
      </ul>
      <t>At IETF#116, Gianpaolo Scalone (Vodafone) and Ralf Weber (Akamai) presented an implementation of this specification. More details can be found at <xref target="Impl-1"/>.</t>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Thanks to Vittorio Bertola, Wes Hardaker, Ben Schwartz, Erid Orth,
Viktor Dukhovni, Warren Kumari, Paul Wouters, John Levine, Bob
Harold, Mukund Sivaraman, Gianpaolo Angelo Scalone, Mark Nottingham, Stephane Bortzmeyer, Daniel Migault, and Stephen Farrell for the comments.</t>
      <t>Thanks to Ralf Weber and Gianpaolo Scalone for sharing details about their implementation.</t>
      <t>Thanks Petr Špaček, Di Ma and Matt Brown for the DNS directorate reviews, and Joseph Salowey for the Security directorate review.</t>
      <t>Thanks Paul Kyzivat for the Art review.</t>
      <t>Thanks to Éric Vyncke for the AD review.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
