<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-li-qname-minimization-trade-offs-00" category="std" consensus="true" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="QNAME Minimization Trade-offs">QNAME Minimization Trade-offs : Privacy Leakage and Amplification potential</title>
    <seriesInfo name="Internet-Draft" value="draft-li-qname-minimization-trade-offs-00"/>
    <author initials="Q." surname="Li" fullname="Qinxin Li">
      <organization>Chinese Academy of Sciences</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>liqinxin23s@ict.ac.cn</email>
      </address>
    </author>
    <author initials="Z." surname="Wang" fullname="Zhaohua Wang">
      <organization>Chinese Academy of Sciences</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>wangzh@cnic.cn</email>
      </address>
    </author>
    <author initials="W." surname="Wu" fullname="Wenhao Wu">
      <organization>Chinese Academy of Sciences</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>wuwenhao22s@ict.ac.cn</email>
      </address>
    </author>
    <author initials="Z." surname="Li" fullname="Zihan Li">
      <organization>Chinese Academy of Sciences</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>lizihan24z@ict.ac.cn</email>
      </address>
    </author>
    <author initials="J." surname="Yan" fullname="Jin Yan">
      <organization>China Internet Network Information Center</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>yanjin@cnnic.cn</email>
      </address>
    </author>
    <author initials="Z." surname="Li" fullname="Zhenyu Li">
      <organization>Chinese Academy of Sciences</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>zyli@ict.ac.cn</email>
      </address>
    </author>
    <author initials="Z." surname="Yan" fullname="Zhiwei Yan">
      <organization>China Internet Network Information Center</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>yanzhiwei@cnnic.cn</email>
      </address>
    </author>
    <date year="2025" month="December" day="23"/>
    <area>Operations and Management Area</area>
    <workgroup>Domain Name System Operations (dnsop)</workgroup>
    <keyword>QNAME Minimisation</keyword>
    <keyword>Amplification potential</keyword>
    <keyword>Privacy Leakage</keyword>
    <abstract>
      <?line 106?>

<t>This document examines the current protocol policies and operational state of QNAME Minimization (QMIN), defined in RFC 9156 <xref target="RFC9156"/>. While QMIN is a DNS privacy mechanism, its existing implementation strategies introduce subtle trade-offs between privacy and security. Specifically, current policies may still present potential information leakage or introduce query amplification potential. This informational document aims to alert protocol designers, implementers, and users to these emerging challenges and suggests that a careful re-evaluation and improvement of the QMIN mechanism are necessary to fully mitigate these combined privacy and security risks.</t>
    </abstract>
  </front>
  <middle>
    <?line 110?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Domain Name System (DNS) is foundational to the modern internet. However, its inherent design, which involves recursive resolution and delegation chains, presents challenges related to both privacy and operational efficiency. In the traditional DNS resolution process, recursive resolvers typically send the Original QNAME (the query name identical to the initial client request) across the entire delegation chain <xref target="RFC1034"/><xref target="RFC1035"/>. This practice results in the unnecessary exposure of sensitive subdomain information to intermediate, higher-level nameservers that do not require the full name to perform their delegation task <xref target="RFC6973"/><xref target="RFC7626"/><xref target="RFC9076"/>.</t>
      <t>To address this critical privacy concern, the QNAME Minimization (QMIN) mechanism was introduced and standardized in RFC 9156 <xref target="RFC9156"/>. QMIN is a technique where a recursive resolver minimizes the DNS query name sent to an authoritative nameserver. Instead of sending the full name, the resolver only sends the minimum set of labels necessary to receive a referral to the next nameserver in the delegation chain<xref target="RFC7816"/>.</t>
      <t>For example, to resolve www.example.com., a QMIN-enabled resolver first asks the root server only for com., then asks the .com server only for example.com., and so on.</t>
      <t>However, while QMIN successfully mitigates privacy leakage, its implementation has inadvertently introduced new security and performance complexities, primarily related to query amplification. The inherent structure of DNS, where resolution is hierarchical and delegated, means that resolvers must traverse the entire delegation chain, generating a minimum number of requests equal to the chain's length <xref target="firstlook"/><xref target="secondlook"/>. As detailed in the following sections, this baseline query volume is further inflated by factors such as the need to resolve NS records (glue records) and domain redirections (CNAME/DNAME RRs). The adoption of QMIN, due to its label-by-label request nature and the potential to apply minimization to passively introduced Referral QNAMEs (domain names encountered during resolution), can significantly exacerbate this traffic inflation. This characteristic makes QMIN a potential amplifier in various types of DNS resolver amplification attacks.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key terms used in this document are defined as follows:</t>
      <t>Delegation point: The specific label that leads to a delegation to another nameserver.</t>
      <t>Original QNAME: The QNAME identical to the initial client query.</t>
      <t>Referral QNAME: Other QNAMEs introduced during the resolution process.</t>
      <t>Privacy leakage: Any QNAME labels sent to the current server but not necessary for its task—and are instead destined for servers further down the chain.</t>
    </section>
    <section anchor="requirements-language">
      <name>Requirements Language</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="qmin-amplification-characteristics">
      <name>QMIN Amplification Characteristics</name>
      <t>The DNS resolution scope is hierarchical and delegated. Consequently, each authoritative nameserver can only resolve queries for the specific Zone of Authority it directly manages, along with any subdomains within that zone that have not been further delegated <xref target="RFC1034"/><xref target="RFC1035"/>.</t>
      <t>To resolve any given domain name, regardless of the method used, recursive resolvers must traverse the entire delegation chain, querying each nameserver in the chain until the nameserver holding the final Resource Records (RRs) is reached, at which point the final resolution is performed. Therefore, the minimum number of requests generated on the authority side by a single user query is equal to the length of the nameserver delegation chain. As a result, the number of requests observed on the authority side generally exceeds the number of user-initiated queries.</t>
      <t>Beyond potential network or server anomalies, or domain errors, the primary reasons for this inflation include:</t>
      <ul spacing="normal">
        <li>
          <t>Delegation Chain Length: A single user query generates a minimum of requests equal to the length of the delegation chain, resulting in higher authority-side traffic for longer chains.</t>
        </li>
        <li>
          <t>NS Record Resolution: Resolvers may not be able to obtain the IP addresses of the delegated child nameservers directly from the parent nameserver's referral response (e.g., due to the lack of glue records in the Additional section), necessitating separate queries to resolve those NS hostnames.</t>
        </li>
        <li>
          <t>Domain Redirection: Resolvers may encounter redirection records, such as CNAME or DNAME RRs, during resolution, which redirects the query to a new domain name, thereby increasing the total number of required queries.</t>
        </li>
      </ul>
      <t>The adoption of QNAME Minimization (QMIN), as defined in RFC 9156 <xref target="RFC9156"/>, can further amplify the traffic on the authority side because:</t>
      <ul spacing="normal">
        <li>
          <t>Label-by-Label Request: Under QMIN, resolvers may repeatedly query the same authoritative server label-by-label. If the number of labels in the QNAME exceeds the length of the nameserver delegation chain, the sequential label-by-label querying inherent to QMIN will result in a higher query count compared to non-QMIN resolution.</t>
        </li>
        <li>
          <t>Undefined Scope for Referral QNAMEs: RFC 9156 <xref target="RFC9156"/> does not explicitly specify the domain scope for QMIN execution. By default, resolvers may apply QMIN to both the Original QNAME from the user request and any Referral QNAMEs passively introduced in responses, further increasing query traffic.</t>
        </li>
        <li>
          <t>Exploitation via Referral Responses: An attacker can exploit QMIN by intentionally returning referral responses that omit glue records in every QMIN request, thus increasing the number of Referral QNAMEs the resolver must process. This can be further escalated by increasing the depth of referral resolution, significantly expanding the authority-side request volume.</t>
        </li>
      </ul>
      <t>Consequently, due to its inherent query amplification characteristics, QMIN can be leveraged as an amplifier in various types of DNS resolver amplification attacks.</t>
    </section>
    <section anchor="qmin-implementation-strategies">
      <name>QMIN Implementation Strategies</name>
      <t>While RFC 9156 <xref target="RFC9156"/> imposes necessary constraints on the functionality and deployment of QNAME Minimization (QMIN), significant variations in protocol implementation approaches persist among recursive resolvers. These implementation differences result in notable variances in the amplification risk profile presented by different QMIN strategies.</t>
      <t>In summary, three main implementation strategies are currently observed.</t>
      <section anchor="complete-qmin">
        <name>Complete QMIN</name>
        <t>Resolvers deploying Complete QMIN apply the minimization technique to both the Original QNAME from the client request and all Referral QNAMEs generated throughout the resolution process. Consequently, Complete QMIN presents the greatest amplification potential and is subject to the largest traffic pressure when facing amplification attacks.</t>
      </section>
      <section anchor="root-tld-only">
        <name>Root &amp; TLD Only</name>
        <t>Under this QMIN implementation strategy, resolvers still apply minimization to the Original QNAME and all Referral QNAMEs, but QMIN querying is strictly used only for labels that are resolved by Root or Top-Level Domain (TLD) nameservers. For subsequent domain prefixes, the No QMIN (full QNAME) policy is used.</t>
        <t>The Root &amp; TLD Only strategy mitigates amplification risk by:</t>
        <ul spacing="normal">
          <li>
            <t>Limiting the scope of QMIN execution to the top levels, thereby avoiding repeated, label-by-label requests to the same authoritative server.</t>
          </li>
          <li>
            <t>Restricting the total number of QMIN queries, which limits the volume of malicious Referral QNAMEs that an attacker can construct during an amplification attack.</t>
          </li>
        </ul>
        <t>Therefore, the Root &amp; TLD Only strategy achieves an effectiveness in mitigating amplification attacks that is comparable to the No-QMIN policy.</t>
      </section>
      <section anchor="original-qname-only">
        <name>Original QNAME Only</name>
        <t>In this implementation, resolvers only perform QNAME minimization on the original domain name requested by the user, while adopting the No-QMIN policy for querying all Referral QNAMEs generated during the recursive resolution. However, the "Original QNAME Only" strategy is not effective in reducing the issue of repeatedly querying the same name server with the original QNAME. While it effectively lowers the amplification factor, it still carries a certain risk of amplification.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document considers the security challenges introduced by the deployment of the QNAME Minimization (QMIN) mechanism.</t>
      <t>QMIN's design goal is to enhance privacy by reducing the exposure of sensitive subdomain information to upstream nameservers. However, as discussed in Section 3, certain QMIN implementation strategies (specifically Complete QMIN) can significantly increase query traffic on authoritative nameservers due to their label-by-label querying nature and the handling of Referral QNAMEs.</t>
      <t>This amplification of query traffic makes QMIN a potential amplifier in DNS resolver amplification attacks. A malicious attacker can exploit this characteristic by manipulating referral responses (e.g., omitting glue records) to force resolvers to send a large volume of queries to a target authoritative server, thus posing a Denial of Service (DoS) or Distributed Denial of Service (DDoS) threat.</t>
      <t>The guidelines in this document aim to direct protocol designers and implementers to balance the privacy benefits of QMIN against the amplification risks it may exacerbate, recommending strategies that restrict the scope of QMIN, such as the Root &amp; TLD Only approach, to mitigate security risks.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC1034">
          <front>
            <title>Domain names - concepts and facilities</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised basic definition of The Domain Name System. It obsoletes RFC-882. This memo describes the domain style names and their used for host address look up and electronic mail forwarding. It discusses the clients and servers in the domain name system and the protocol used between them.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1034"/>
          <seriesInfo name="DOI" value="10.17487/RFC1034"/>
        </reference>
        <reference anchor="RFC1035">
          <front>
            <title>Domain names - implementation and specification</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1035"/>
          <seriesInfo name="DOI" value="10.17487/RFC1035"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC9156">
          <front>
            <title>DNS Query Name Minimisation to Improve Privacy</title>
            <author fullname="S. Bortzmeyer" initials="S." surname="Bortzmeyer"/>
            <author fullname="R. Dolmans" initials="R." surname="Dolmans"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="November" year="2021"/>
            <abstract>
              <t>This document describes a technique called "QNAME minimisation" to improve DNS privacy, where the DNS resolver no longer always sends the full original QNAME and original QTYPE to the upstream name server. This document obsoletes RFC 7816.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9156"/>
          <seriesInfo name="DOI" value="10.17487/RFC9156"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC6973">
          <front>
            <title>Privacy Considerations for Internet Protocols</title>
            <author fullname="A. Cooper" initials="A." surname="Cooper"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="J. Peterson" initials="J." surname="Peterson"/>
            <author fullname="J. Morris" initials="J." surname="Morris"/>
            <author fullname="M. Hansen" initials="M." surname="Hansen"/>
            <author fullname="R. Smith" initials="R." surname="Smith"/>
            <date month="July" year="2013"/>
            <abstract>
              <t>This document offers guidance for developing privacy considerations for inclusion in protocol specifications. It aims to make designers, implementers, and users of Internet protocols aware of privacy-related design choices. It suggests that whether any individual RFC warrants a specific privacy considerations section will depend on the document's content.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6973"/>
          <seriesInfo name="DOI" value="10.17487/RFC6973"/>
        </reference>
        <reference anchor="RFC7626">
          <front>
            <title>DNS Privacy Considerations</title>
            <author fullname="S. Bortzmeyer" initials="S." surname="Bortzmeyer"/>
            <date month="August" year="2015"/>
            <abstract>
              <t>This document describes the privacy issues associated with the use of the DNS by Internet users. It is intended to be an analysis of the present situation and does not prescribe solutions.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7626"/>
          <seriesInfo name="DOI" value="10.17487/RFC7626"/>
        </reference>
        <reference anchor="RFC7816">
          <front>
            <title>DNS Query Name Minimisation to Improve Privacy</title>
            <author fullname="S. Bortzmeyer" initials="S." surname="Bortzmeyer"/>
            <date month="March" year="2016"/>
            <abstract>
              <t>This document describes a technique to improve DNS privacy, a technique called "QNAME minimisation", where the DNS resolver no longer sends the full original QNAME to the upstream name server.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7816"/>
          <seriesInfo name="DOI" value="10.17487/RFC7816"/>
        </reference>
        <reference anchor="RFC9076">
          <front>
            <title>DNS Privacy Considerations</title>
            <author fullname="T. Wicinski" initials="T." role="editor" surname="Wicinski"/>
            <date month="July" year="2021"/>
            <abstract>
              <t>This document describes the privacy issues associated with the use of the DNS by Internet users. It provides general observations about typical current privacy practices. It is intended to be an analysis of the present situation and does not prescribe solutions. This document obsoletes RFC 7626.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9076"/>
          <seriesInfo name="DOI" value="10.17487/RFC9076"/>
        </reference>
        <reference anchor="firstlook">
          <front>
            <title>A first look at QNAME minimization in the domain name system</title>
            <author initials="" surname="de Vries">
              <organization/>
            </author>
            <date year="2019"/>
          </front>
          <seriesInfo name="International Conference on Passive and Active Network Measurement" value="Springer"/>
        </reference>
        <reference anchor="secondlook">
          <front>
            <title>A second look at DNS QNAME minimization</title>
            <author initials="" surname="Magnusson">
              <organization/>
            </author>
            <author initials="" surname="Müller">
              <organization/>
            </author>
            <author initials="" surname="Brunstrom">
              <organization/>
            </author>
            <date year="2023"/>
          </front>
          <seriesInfo name="International Conference on Passive and Active Network Measurement" value="496-521"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
