<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.35 (Ruby 3.4.9) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-masque-connect-ip-dns-06" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.32.0 -->
  <front>
    <title abbrev="CONNECT-IP DNS and PREF64">DNS and PREF64 Configuration for Proxying IP in HTTP</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-masque-connect-ip-dns-06"/>
    <author initials="D." surname="Schinazi" fullname="David Schinazi">
      <organization>Google LLC</organization>
      <address>
        <postal>
          <street>1600 Amphitheatre Parkway</street>
          <city>Mountain View</city>
          <region>CA</region>
          <code>94043</code>
          <country>United States of America</country>
        </postal>
        <email>dschinazi.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="Y." surname="Rosomakho" fullname="Yaroslav Rosomakho">
      <organization>Zscaler</organization>
      <address>
        <postal>
          <street>120 Holger Way</street>
          <city>San Jose</city>
          <region>CA</region>
          <code>95134</code>
          <country>United States of America</country>
        </postal>
        <email>yrosomakho@zscaler.com</email>
      </address>
    </author>
    <date year="2026" month="April" day="12"/>
    <area>Web and Internet Transport</area>
    <workgroup>MASQUE</workgroup>
    <keyword>quic</keyword>
    <keyword>http</keyword>
    <keyword>datagram</keyword>
    <keyword>udp</keyword>
    <keyword>tcp</keyword>
    <keyword>proxy</keyword>
    <keyword>tunnels</keyword>
    <keyword>quic in quic</keyword>
    <keyword>turtles all the way down</keyword>
    <keyword>masque</keyword>
    <keyword>http-ng</keyword>
    <keyword>dns</keyword>
    <abstract>
      <?line 57?>

<t>Proxying IP in HTTP allows building a VPN through HTTP load balancers. However,
at the time of writing, that mechanism lacks a way to communicate network
configuration details such as DNS information or IPv6 NAT64 prefixes (PREF64).
In contrast, most existing VPN protocols provide mechanisms to exchange
such configuration information.</t>
      <t>This document defines extensions that convey DNS and PREF64 configuration
using HTTP capsules. This mechanism supports encrypted DNS transports
and can be used to inform peers about network translation prefixes for IPv6/IPv4
synthesis.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://ietf-wg-masque.github.io/draft-ietf-masque-connect-ip-dns/draft-ietf-masque-connect-ip-dns.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-masque-connect-ip-dns/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Multiplexed Application Substrate over QUIC Encryption Working Group mailing list (<eref target="mailto:masque@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/masque/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/masque/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-wg-masque/draft-ietf-masque-connect-ip-dns"/>.</t>
    </note>
  </front>
  <middle>
    <?line 70?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Proxying IP in HTTP (<xref target="CONNECT-IP"/>) allows building a VPN through
HTTP load balancers. However, at the time of writing, that mechanism lacks
a way to communicate network configuration details such as DNS information
or IPv6 NAT64 prefixes (PREF64). In contrast, most existing VPN protocols provide
mechanisms to exchange such configuration information (for example
<xref target="IKEv2"/> supports discovery of DNS servers).</t>
      <t>This document defines extensions that allow CONNECT-IP peers to convey DNS
and PREF64 configuration information to its peer using HTTP capsules
(<xref target="HTTP-DGRAM"/>). These extensions do not define any new way to
transport DNS queries or responses, but instead enable the exchange of DNS
resolver configuration and NAT64 prefix information inline with CONNECT-IP
sessions.</t>
      <t>Note that these extensions are meant for cases where CONNECT-IP operates as a
Remote Access VPN (see <xref section="8.1" sectionFormat="of" target="CONNECT-IP"/>) or a Site-to-Site VPN
(see <xref section="8.2" sectionFormat="of" target="CONNECT-IP"/>), but not for cases like IP Flow Forwarding
(see <xref section="8.3" sectionFormat="of" target="CONNECT-IP"/>).</t>
      <t>For DNS configuration, this specification uses Service Bindings (<xref target="SVCB"/>)
to exchange information about nameservers, such as which encrypted DNS transport is
supported. This allows support for DNS over HTTPS (<xref target="DoH"/>), DNS over
QUIC (<xref target="DoQ"/>), DNS over TLS (<xref target="DoT"/>), unencrypted DNS over
UDP port 53 and TCP port 53 (<xref target="DNS"/>), as well as potential future DNS
transports. PREF64 configuration is represented in a way similar to Router
Advertisement option defined in <xref section="4" sectionFormat="of" target="PREF64-RA"/>.</t>
      <t>Similar to how Proxying IP in HTTP exchanges IP address configuration
information (<xref section="4.7" sectionFormat="of" target="CONNECT-IP"/>), the mechanism defined in this document
leverages capsules. Similarly, these mechanisms are bidirectional: either endpoint
can send configuration information.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document uses terminology from <xref target="QUIC"/>. Where this document
defines protocol types, the definition format uses the notation from <xref section="1.3" sectionFormat="of" target="QUIC"/>. This specification uses the variable-length integer encoding
from <xref section="16" sectionFormat="of" target="QUIC"/>. Variable-length integer values do not
need to be encoded in the minimum number of bytes necessary.</t>
      <t>In this document, we use the term "nameserver" to refer to a DNS recursive
resolver as defined in <xref section="6" sectionFormat="of" target="DNS-TERMS"/>, and the term
"domain name" is used as defined in <xref section="2" sectionFormat="of" target="DNS-TERMS"/>.</t>
    </section>
    <section anchor="dns-configuration-mechanism">
      <name>DNS Configuration Mechanism</name>
      <t>Either endpoint can send DNS configuration information in a
<tt>DNS_ASSIGN</tt> capsule. The capsule format is defined below.</t>
      <section anchor="domain-structure">
        <name>Domain Structure</name>
        <figure anchor="domain-format">
          <name>Domain Format</name>
          <artwork><![CDATA[
Domain {
  Domain Length (i),
  Domain Name (..),
}
]]></artwork>
        </figure>
        <t>Each Domain contains the following fields:</t>
        <dl>
          <dt>Domain Length:</dt>
          <dd>
            <t>Length of the following Domain field, encoded as a variable-length integer.</t>
          </dd>
          <dt>Domain Name:</dt>
          <dd>
            <t>Fully Qualified Domain Name in DNS presentation format and using an
Internationalized Domain Names for Applications (IDNA) A-label
(<xref target="IDNA"/>).</t>
          </dd>
        </dl>
      </section>
      <section anchor="domain-struct">
        <name>Nameserver Structure</name>
        <figure anchor="ns-format">
          <name>Nameserver Format</name>
          <artwork><![CDATA[
Nameserver {
  Service Priority (16),
  IPv4 Address Count (i),
  IPv4 Address (32) ...,
  IPv6 Address Count (i),
  IPv6 Address (128) ...,
  Authentication Domain Name (..),
  Service Parameters Length (i),
  Service Parameters (..),
}
]]></artwork>
        </figure>
        <t>Each Nameserver structure contains the following fields:</t>
        <dl>
          <dt>Service Priority:</dt>
          <dd>
            <t>The priority of this attribute compared to other nameservers, as specified in
<xref section="2.4.1" sectionFormat="of" target="SVCB"/>. Since this specification relies on using Service
Bindings in ServiceMode (<xref section="2.4.3" sectionFormat="of" target="SVCB"/>), this field <bcp14>MUST NOT</bcp14> be set
to 0.</t>
          </dd>
          <dt>IPv4 Address Count:</dt>
          <dd>
            <t>The number of IPv4 Address fields following this field. Encoded as a
variable-length integer.</t>
          </dd>
          <dt>IPv4 Address:</dt>
          <dd>
            <t>Sequence of IPv4 Addresses that can be used to reach this nameserver. Encoded
in network byte order.</t>
          </dd>
          <dt>IPv6 Address Count:</dt>
          <dd>
            <t>The number of IPv6 Address fields following this field. Encoded as a
variable-length integer.</t>
          </dd>
          <dt>IPv6 Address:</dt>
          <dd>
            <t>Sequence of IPv6 Addresses that can be used to reach this nameserver. Encoded
in network byte order.</t>
          </dd>
          <dt>Authentication Domain Name:</dt>
          <dd>
            <t>A Domain structure (see <xref target="domain-struct"/>) representing the domain name of
the nameserver. This <bcp14>MAY</bcp14> be empty if the nameserver only supports unencrypted
DNS (as traditionally sent over UDP port 53 and TCP port 53).</t>
          </dd>
          <dt>Service Parameters Length:</dt>
          <dd>
            <t>Length of the following Service Parameters field, encoded as a
variable-length integer.</t>
          </dd>
          <dt>Service Parameters:</dt>
          <dd>
            <t>Set of service parameters that apply to this nameserver. Encoded using the
wire format specified in <xref section="2.2" sectionFormat="of" target="SVCB"/>.</t>
          </dd>
        </dl>
        <t>Service parameters allow exchanging additional information about the nameserver:</t>
        <ul spacing="normal">
          <li>
            <t>The "port" service parameter is used to indicate which port the nameserver is
reachable on. If no "port" service parameter is included, this indicates that
default port numbers should be used.</t>
          </li>
          <li>
            <t>The "alpn" service parameter is used to indicate which encrypted DNS
transports are supported by this nameserver. If the "no-default-alpn" service
parameter is omitted, that indicates that the nameserver supports unencrypted
DNS, as is traditionally sent over UDP port 53 and TCP port 53. In that case,
the sum of IPv4 Address Count and IPv6 Address Count <bcp14>MUST</bcp14> be nonzero. If
Authentication Domain Name is empty, the "alpn" and "no-default-alpn" service
parameter <bcp14>MUST</bcp14> be omitted.</t>
          </li>
          <li>
            <t>The "dohpath" service parameter is used to convey a relative DNS over HTTPS
URI Template, see <xref section="5" sectionFormat="of" target="SVCB-DNS"/>.</t>
          </li>
          <li>
            <t>The service parameters <bcp14>MUST NOT</bcp14> include "ipv4hint" or "ipv6hint" SvcParams,
as they are superseded by the included IP addresses.</t>
          </li>
        </ul>
      </section>
      <section anchor="dns-configuration-structure">
        <name>DNS Configuration Structure</name>
        <figure anchor="dns-configuration">
          <name>DNS Configuration Format</name>
          <artwork><![CDATA[
DNS Configuration {
  Nameserver Count (i),
  Nameserver (..) ...,
  Internal Domain Count (i),
  Internal Domain (..) ...,
  Search Domain Count (i),
  Search Domain (..) ...,
}
]]></artwork>
        </figure>
        <t>Each DNS Configuration contains the following fields:</t>
        <dl newline="true" spacing="normal">
          <dt>Nameserver Count:</dt>
          <dd>
            <t>The number of Nameserver structures following this field. Encoded as
a variable-length integer.</t>
          </dd>
          <dt>Nameserver:</dt>
          <dd>
            <t>A series of Nameserver structures representing nameservers.</t>
          </dd>
          <dt>Internal Domain Count:</dt>
          <dd>
            <t>The number of Domain structures following this field. Encoded as a
variable-length integer.</t>
          </dd>
          <dt>Internal Domain:</dt>
          <dd>
            <t>A series of Domain structures representing internal domain names.</t>
          </dd>
          <dt>Search Domain Count:</dt>
          <dd>
            <t>The number of Domain structures following this field. Encoded as a
variable-length integer.</t>
          </dd>
          <dt>Search Domain:</dt>
          <dd>
            <t>A series of Domain structures representing search domains.</t>
          </dd>
        </dl>
      </section>
      <section anchor="dns-assign">
        <name>DNS_ASSIGN Capsule</name>
        <t>The DNS_ASSIGN capsule (see <xref target="iana"/> for the value of the capsule type) allows
an endpoint to send DNS configuration to its peer.</t>
        <figure anchor="dns-assign-format">
          <name>DNS_ASSIGN Capsule Format</name>
          <artwork><![CDATA[
DNS_ASSIGN Capsule {
  Type (i) = DNS_ASSIGN,
  Length (i),
  DNS Configuration (..) ...,
}
]]></artwork>
        </figure>
        <t>DNS_ASSIGN capsule <bcp14>MAY</bcp14> include multiple DNS configurations if different DNS
servers are responsible for separate internal domains.</t>
        <t>If multiple DNS_ASSIGN capsules are sent in one direction, each DNS_ASSIGN
capsule supersedes prior ones.</t>
      </section>
      <section anchor="handling">
        <name>Handling</name>
        <t>Note that internal domains include subdomains. In other words, if the DNS
configuration contains a domain, that indicates that the corresponding domain
and all of its subdomains can be resolved by the nameservers exchanged in the
same DNS configuration. Sending an empty string as an internal domain indicates
the DNS root; i.e., that the corresponding nameserver can resolve all domain
names.</t>
        <t>As with other IP Proxying capsules, the receiver can decide whether to use or
ignore the configuration information. For example, in the consumer VPN
scenario, clients will trust the IP proxy and apply received DNS configuration,
whereas IP proxies will ignore any DNS configuration sent by the client.</t>
        <t>If the IP proxy sends a DNS_ASSIGN capsule containing a DNS over HTTPS
nameserver, then the client can validate whether the IP proxy is authoritative
for the origin of the URI template. If this validation succeeds, the client
<bcp14>SHOULD</bcp14> send its DNS queries to that nameserver directly as independent HTTPS
requests. When possible, those requests <bcp14>SHOULD</bcp14> be coalesced over the same HTTPS
connection.</t>
      </section>
      <section anchor="examples">
        <name>Examples</name>
        <section anchor="full-tunnel-consumer-vpn">
          <name>Full-Tunnel Consumer VPN</name>
          <t>A full-tunnel consumer VPN hosted at masque.example.org could configure the
client to use DNS over HTTPS to the IP proxy itself by sending the following
configuration.</t>
          <figure anchor="ex-doh">
            <name>Full Tunnel Example</name>
            <artwork><![CDATA[
DNS Configuration = {
  Nameservers = [{
    Service Priority = 1,
    IPv4 Address = [],
    IPv6 Address = [],
    Authentication Domain Name = "masque.example.org",
    Service Parameters = {
      alpn=h2,h3
      dohpath=/dns-query{?dns}
    },
  }],
  Internal Domains = [""],
  Search Domains = [],
}
]]></artwork>
          </figure>
        </section>
        <section anchor="split-tunnel-enterprise-vpn">
          <name>Split-Tunnel Enterprise VPN</name>
          <t>An enterprise switching their preexisting IKEv2/IPsec split-tunnel VPN to
connect-ip could use the following configuration.</t>
          <figure anchor="ex-split">
            <name>Split Tunnel Example</name>
            <artwork><![CDATA[
DNS Configuration = {
  Nameservers = [{
    Service Priority = 1,
    IPv4 Address = [192.0.2.33],
    IPv6 Address = [2001:db8::1],
    Authentication Domain Name = "",
    Service Parameters = {},
  }],
  Internal Domains = ["internal.corp.example"],
  Search Domains = [
    "internal.corp.example",
    "corp.example",
  ],
}
]]></artwork>
          </figure>
        </section>
      </section>
    </section>
    <section anchor="pref64-configuration-mechanism">
      <name>PREF64 Configuration Mechanism</name>
      <t>This document defines a new capsule type, <tt>PREF64</tt>, that allows a CONNECT-IP peer
to communicate the IPv6 NAT64 prefixes to be used for IPv6/IPv4 address synthesis.
This information enables an endpoint operating in an IPv6-only environment to
construct IPv4-reachable addresses from IPv6 literals when a NAT64 translator is in use.</t>
      <section anchor="pref64-capsule">
        <name>PREF64 Capsule</name>
        <t>Each PREF64 capsule conveys zero or more NAT64 prefixes. If multiple capsules are sent
in the same direction, the most recent one replaces any previously advertised prefixes.
Empty PREF64 capsule is used to inform that NAT64 prefixes are not available.</t>
        <t>The capsule has the following structure (see <xref target="iana"/> for the value of the capsule type):</t>
        <figure anchor="pref64-format">
          <name>PREF64 Capsule Format</name>
          <artwork><![CDATA[
PREF64 Capsule {
  Type (i) = PREF64,
  Length (i),
  NAT64 Prefix (104) ...,
}
]]></artwork>
        </figure>
        <t>Individual NAT64 prefix has the following structure:</t>
        <figure anchor="nat64-prefix">
          <name>NAT64 Prefix Format</name>
          <artwork><![CDATA[
NAT64 Prefix {
  Prefix Length (8),
  Prefix (96),
}
]]></artwork>
        </figure>
        <t>NAT64 prefix fields are:</t>
        <dl>
          <dt>Prefix Length:</dt>
          <dd>
            <t>The length of the NAT64 prefix in bits encoded as a single byte. Valid values are 32, 40, 48,
56, 64, and 96. These lengths correspond to the prefix sizes permitted for the IPv6-to-IPv4
address synthesis algorithm described in <xref section="2.2" sectionFormat="of" target="IPv6-TRANSLATOR"/>.</t>
          </dd>
          <dt>Prefix:</dt>
          <dd>
            <t>The highest 96 bits of the IPv6 prefix, encoded in network byte order. Note that this field is
always 96 bits long, regardless of the value in the Prefix Length field
preceding it, see <xref section="2.2" sectionFormat="of" target="IPv6-TRANSLATOR"/> for details.</t>
          </dd>
        </dl>
      </section>
      <section anchor="handling-1">
        <name>Handling</name>
        <t>Upon receiving a PREF64 capsule, a peer updates its local NAT64 configuration for the
corresponding CONNECT-IP session. The newly received PREF64 capsule overrides any previously
received PREF64 capsules in the same direction.</t>
        <t>If an endpoint receives a capsule that does not meet one of the requirements listed in <xref target="pref64-capsule"/>, or
with a length that is not a multiple of 13 bytes, it <bcp14>MUST</bcp14> treat it as malformed. An empty
PREF64 capsule invalidates any previously received NAT64 Prefixes.</t>
      </section>
      <section anchor="example">
        <name>Example</name>
        <t>A CONNECT-IP peer would use the following capsule to signal a single NAT64 prefix of <tt>64:ff9b::/96</tt></t>
        <figure anchor="ex-pref64">
          <name>PREF64 Capsule Example</name>
          <artwork><![CDATA[
PREF64 Capsule {
  Type (i) = PREF64,
  Length (i) = 13,
  NAT64 Prefix {
    Prefix Length (8) = 96
    Prefix (96) = 0x00 0x64 0xff 0x9b 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00,
  }
}
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Acting on received DNS_ASSIGN capsules can have significant impact on endpoint
security. Endpoints <bcp14>MUST</bcp14> ignore DNS_ASSIGN capsules unless it has reason to
trust its peer and is expecting DNS configuration from it.</t>
      <t>This mechanism can cause an endpoint to use a nameserver that is outside of the
connect-ip tunnel. While this is acceptable in some scenarios, in others it
could break the privacy properties provided by the tunnel. To avoid this,
implementations need to ensure that DNS_ASSIGN capsules are not sent before the
corresponding ROUTE_ADVERTISEMENT capsule.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>This document, if approved, will request IANA add the following values to the
"HTTP Capsule Types" registry maintained at
&lt;<eref target="https://www.iana.org/assignments/masque"/>&gt;.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Value</th>
            <th align="left">Capsule Type</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">0x1ACE79EC (if this document is approved, this value will be</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">replaced by a smaller one before publication)</td>
            <td align="left">DNS_ASSIGN</td>
          </tr>
          <tr>
            <td align="left">0x274C0FBC (if this document is approved, this value will be</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">replaced by a smaller one before publication)</td>
            <td align="left">PREF64</td>
          </tr>
        </tbody>
      </table>
      <t>All of these new entries use the following values for these fields:</t>
      <dl spacing="compact" newline="false">
        <dt>Status:</dt>
        <dd>
          <t>provisional (permanent if this document is approved)</t>
        </dd>
        <dt>Reference:</dt>
        <dd>
          <t>This document</t>
        </dd>
        <dt>Change Controller:</dt>
        <dd>
          <t>IETF</t>
        </dd>
        <dt>Contact:</dt>
        <dd>
          <t>masque@ietf.org</t>
        </dd>
        <dt>Notes:</dt>
        <dd>
          <t>None</t>
        </dd>
      </dl>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="CONNECT-IP">
          <front>
            <title>Proxying IP in HTTP</title>
            <author fullname="T. Pauly" initials="T." role="editor" surname="Pauly"/>
            <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
            <author fullname="A. Chernyakhovsky" initials="A." surname="Chernyakhovsky"/>
            <author fullname="M. Kühlewind" initials="M." surname="Kühlewind"/>
            <author fullname="M. Westerlund" initials="M." surname="Westerlund"/>
            <date month="October" year="2023"/>
            <abstract>
              <t>This document describes how to proxy IP packets in HTTP. This protocol is similar to UDP proxying in HTTP but allows transmitting arbitrary IP packets. More specifically, this document defines a protocol that allows an HTTP client to create an IP tunnel through an HTTP server that acts as an IP proxy. This document updates RFC 9298.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9484"/>
          <seriesInfo name="DOI" value="10.17487/RFC9484"/>
        </reference>
        <reference anchor="HTTP-DGRAM">
          <front>
            <title>HTTP Datagrams and the Capsule Protocol</title>
            <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
            <author fullname="L. Pardue" initials="L." surname="Pardue"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document describes HTTP Datagrams, a convention for conveying multiplexed, potentially unreliable datagrams inside an HTTP connection.</t>
              <t>In HTTP/3, HTTP Datagrams can be sent unreliably using the QUIC DATAGRAM extension. When the QUIC DATAGRAM frame is unavailable or undesirable, HTTP Datagrams can be sent using the Capsule Protocol, which is a more general convention for conveying data in HTTP connections.</t>
              <t>HTTP Datagrams and the Capsule Protocol are intended for use by HTTP extensions, not applications.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9297"/>
          <seriesInfo name="DOI" value="10.17487/RFC9297"/>
        </reference>
        <reference anchor="SVCB">
          <front>
            <title>Service Binding and Parameter Specification via the DNS (SVCB and HTTPS Resource Records)</title>
            <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
            <author fullname="M. Bishop" initials="M." surname="Bishop"/>
            <author fullname="E. Nygren" initials="E." surname="Nygren"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies the "SVCB" ("Service Binding") and "HTTPS" DNS resource record (RR) types to facilitate the lookup of information needed to make connections to network services, such as for HTTP origins. SVCB records allow a service to be provided from multiple alternative endpoints, each with associated parameters (such as transport protocol configuration), and are extensible to support future uses (such as keys for encrypting the TLS ClientHello). They also enable aliasing of apex domains, which is not possible with CNAME. The HTTPS RR is a variation of SVCB for use with HTTP (see RFC 9110, "HTTP Semantics"). By providing more information to the client before it attempts to establish a connection, these records offer potential benefits to both performance and privacy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9460"/>
          <seriesInfo name="DOI" value="10.17487/RFC9460"/>
        </reference>
        <reference anchor="DoH">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="DoQ">
          <front>
            <title>DNS over Dedicated QUIC Connections</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>This document describes the use of QUIC to provide transport confidentiality for DNS. The encryption provided by QUIC has similar properties to those provided by TLS, while QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides more efficient packet-loss recovery than UDP. DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC 7858, and latency characteristics similar to classic DNS over UDP. This specification describes the use of DoQ as a general-purpose transport for DNS and includes the use of DoQ for stub to recursive, recursive to authoritative, and zone transfer scenarios.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9250"/>
          <seriesInfo name="DOI" value="10.17487/RFC9250"/>
        </reference>
        <reference anchor="DoT">
          <front>
            <title>Specification for DNS over Transport Layer Security (TLS)</title>
            <author fullname="Z. Hu" initials="Z." surname="Hu"/>
            <author fullname="L. Zhu" initials="L." surname="Zhu"/>
            <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="D. Wessels" initials="D." surname="Wessels"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
              <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7858"/>
          <seriesInfo name="DOI" value="10.17487/RFC7858"/>
        </reference>
        <reference anchor="DNS">
          <front>
            <title>Domain names - implementation and specification</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1035"/>
          <seriesInfo name="DOI" value="10.17487/RFC1035"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="QUIC">
          <front>
            <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9000"/>
          <seriesInfo name="DOI" value="10.17487/RFC9000"/>
        </reference>
        <reference anchor="DNS-TERMS">
          <front>
            <title>DNS Terminology</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="A. Sullivan" initials="A." surname="Sullivan"/>
            <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
            <date month="January" year="2019"/>
            <abstract>
              <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has sometimes changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
              <t>This document obsoletes RFC 7719 and updates RFC 2308.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8499"/>
          <seriesInfo name="DOI" value="10.17487/RFC8499"/>
        </reference>
        <reference anchor="IDNA">
          <front>
            <title>Internationalized Domain Names for Applications (IDNA): Definitions and Document Framework</title>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <date month="August" year="2010"/>
            <abstract>
              <t>This document is one of a collection that, together, describe the protocol and usage context for a revision of Internationalized Domain Names for Applications (IDNA), superseding the earlier version. It describes the document collection and provides definitions and other material that are common to the set. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5890"/>
          <seriesInfo name="DOI" value="10.17487/RFC5890"/>
        </reference>
        <reference anchor="SVCB-DNS">
          <front>
            <title>Service Binding Mapping for DNS Servers</title>
            <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>The SVCB DNS resource record type expresses a bound collection of endpoint metadata, for use when establishing a connection to a named service. DNS itself can be such a service, when the server is identified by a domain name. This document provides the SVCB mapping for named DNS servers, allowing them to indicate support for encrypted transport protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9461"/>
          <seriesInfo name="DOI" value="10.17487/RFC9461"/>
        </reference>
        <reference anchor="IPv6-TRANSLATOR">
          <front>
            <title>IPv6 Addressing of IPv4/IPv6 Translators</title>
            <author fullname="C. Bao" initials="C." surname="Bao"/>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="X. Li" initials="X." surname="Li"/>
            <date month="October" year="2010"/>
            <abstract>
              <t>This document discusses the algorithmic translation of an IPv6 address to a corresponding IPv4 address, and vice versa, using only statically configured information. It defines a well-known prefix for use in algorithmic translations, while allowing organizations to also use network-specific prefixes when appropriate. Algorithmic translation is used in IPv4/IPv6 translators, as well as other types of proxies and gateways (e.g., for DNS) used in IPv4/IPv6 scenarios. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6052"/>
          <seriesInfo name="DOI" value="10.17487/RFC6052"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="IKEv2">
          <front>
            <title>Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="C. Kaufman" initials="C." surname="Kaufman"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <date month="October" year="2014"/>
            <abstract>
              <t>This document describes version 2 of the Internet Key Exchange (IKE) protocol. IKE is a component of IPsec used for performing mutual authentication and establishing and maintaining Security Associations (SAs). This document obsoletes RFC 5996, and includes all of the errata for it. It advances IKEv2 to be an Internet Standard.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="79"/>
          <seriesInfo name="RFC" value="7296"/>
          <seriesInfo name="DOI" value="10.17487/RFC7296"/>
        </reference>
        <reference anchor="PREF64-RA">
          <front>
            <title>Discovering PREF64 in Router Advertisements</title>
            <author fullname="L. Colitti" initials="L." surname="Colitti"/>
            <author fullname="J. Linkova" initials="J." surname="Linkova"/>
            <date month="April" year="2020"/>
            <abstract>
              <t>This document specifies a Neighbor Discovery option to be used in Router Advertisements (RAs) to communicate prefixes of Network Address and Protocol Translation from IPv6 clients to IPv4 servers (NAT64) to hosts.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8781"/>
          <seriesInfo name="DOI" value="10.17487/RFC8781"/>
        </reference>
        <reference anchor="IKEv2-DNS">
          <front>
            <title>Split DNS Configuration for the Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="P. Wouters" initials="P." surname="Wouters"/>
            <date month="May" year="2019"/>
            <abstract>
              <t>This document defines two Configuration Payload Attribute Types (INTERNAL_DNS_DOMAIN and INTERNAL_DNSSEC_TA) for the Internet Key Exchange Protocol version 2 (IKEv2). These payloads add support for private (internal-only) DNS domains. These domains are intended to be resolved using non-public DNS servers that are only reachable through the IPsec connection. DNS resolution for other domains remains unchanged. These Configuration Payloads only apply to split- tunnel configurations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8598"/>
          <seriesInfo name="DOI" value="10.17487/RFC8598"/>
        </reference>
        <reference anchor="IKEv2-SVCB">
          <front>
            <title>Internet Key Exchange Protocol Version 2 (IKEv2) Configuration for Encrypted DNS</title>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="T. Reddy.K" initials="T." surname="Reddy.K"/>
            <author fullname="D. Wing" initials="D." surname="Wing"/>
            <author fullname="V. Smyslov" initials="V." surname="Smyslov"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies new Internet Key Exchange Protocol Version 2 (IKEv2) Configuration Payload Attribute Types to assign DNS resolvers that support encrypted DNS protocols, such as DNS over HTTPS (DoH), DNS over TLS (DoT), and DNS over QUIC (DoQ).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9464"/>
          <seriesInfo name="DOI" value="10.17487/RFC9464"/>
        </reference>
      </references>
    </references>
    <?line 503?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The mechanism in this document was inspired by <xref target="IKEv2"/>,
<xref target="IKEv2-DNS"/>, and <xref target="IKEv2-SVCB"/>. The authors would like to
thank <contact fullname="Alex Chernyakhovsky"/>, <contact fullname="Tommy Pauly"/>, and other enthusiasts in
the MASQUE Working Group for their contributions.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
