<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.1.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

<!ENTITY RFC1034 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.1034.xml">
<!ENTITY RFC1035 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.1035.xml">
<!ENTITY RFC2119 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC7858 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7858.xml">
<!ENTITY RFC8484 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8484.xml">
<!ENTITY RFC9162 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9162.xml">
<!ENTITY RFC9250 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9250.xml">
<!ENTITY RFC9499 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9499.xml">
<!ENTITY RFC9606 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9606.xml">
]>


<rfc ipr="trust200902" docName="draft-pan-dnsop-ct-info-of-dns-resolver-00" category="bcp" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="EFAS">Certificate Transparency (CT) information of DNS resolver</title>

    <author initials="L." surname="Pan" fullname="Lanlan Pan">
      <organization></organization>
      <address>
        <postal>
          <city>Guangdong</city>
          <country>China</country>
        </postal>
        <email>abbypan@gmail.com</email>
      </address>
    </author>

    <date year="2025" month="September" day="05"/>

    <area>ops</area>
    <workgroup>dnsop</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 87?>

<t>This document describes the Certificate Transparency (CT) information of the DNS resolver.</t>



    </abstract>



  </front>

  <middle>


<?line 91?>

<section anchor="background"><name>Background</name>

<t>DNS resolver can support any encrypted DNS scheme, such as DNS over HTTPS (DoH) <xref target="RFC8484"/>, DNS over TLS (DoT) <xref target="RFC7858"/>, or DNS over QUIC (DoQ) <xref target="RFC9250"/>.</t>

<t>Certificate hijacking allows attackers to impersonate a legitimate encrypted DNS resolver, see also <xref target="MisIssuedCF"/>.</t>

<t>Certificate Transparency (CT) is to combat the certificate hijacking issue <xref target="RFC9162"/>.
This document describes the CT information of the encrypted DNS resolver.</t>

</section>
<section anchor="terminology"><name>Terminology</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in <xref target="RFC2119"/>.</t>

<t>Basic terms used in this specification are defined in the documents <xref target="RFC1034"/>, <xref target="RFC1035"/>, <xref target="RFC9499"/>, <xref target="RFC9606"/>, <xref target="RFC9162"/>.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<section anchor="dns-resolver-information-keys-registration"><name>DNS Resolver Information Keys Registration</name>

<t><xref target="RFC9606"/> specifies a method for DNS resolvers to publish information about themselves.</t>

<t>IANA has created a new registry called "DNS Resolver Information Keys" <xref target="IANA-DNS"/>.</t>

<t>This document adds a new DNS Resolver Information Key: CT, to present the CT information of the encrypted DNS resolver.</t>

<t>Name:
    CT</t>

<t>Value:
    1</t>

<t>Meaning:
    The value indicates that the certificate of the encrypted DNS resolver contains embedded SCTs.</t>

<t>Reference:
    RFC 9162</t>

<t>Name:
    CT</t>

<t>Value:
    2</t>

<t>Meaning:
    The value indicates that the encrypted DNS resolver supports the transparency_info TLS extension.</t>

<t>Reference:
    RFC 9162</t>

</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>DNS clients can get trustworthy DNS resolver information through DNSSEC query or out-of-band configuration.</t>

<t>Suppose the DNS clients find the CT value in the trustworthy DNS resolver information. In that case, they can mandate the CT validation in the encrypted communication channel setup process with the encrypted DNS resolver.</t>

</section>
<section anchor="acknowledgements"><name>Acknowledgements</name>

<t>Thanks to all in the DNSOP mailing list.</t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">

&RFC1034;
&RFC1035;
&RFC2119;
&RFC7858;
&RFC8484;
&RFC9162;
&RFC9250;
&RFC9499;
&RFC9606;


    </references>

    <references title='Informative References' anchor="sec-informative-references">

<reference anchor="MisIssuedCF" target="https://arstechnica.com/security/2025/09/mis-issued-certificates-for-1-1-1-1-dns-service-pose-a-threat-to-the-internet/">
  <front>
    <title>Mis-issued certificates for 1.1.1.1 DNS service pose a threat to the Internet</title>
    <author initials="D." surname="Goodin" fullname="Dan Goodin">
      <organization></organization>
    </author>
    <date year="2025"/>
  </front>
</reference>
<reference anchor="IANA-DNS" target="https://www.iana.org/assignments/dns-parameters/">
  <front>
    <title>Domain Name System (DNS) Parameters</title>
    <author initials="" surname="IANA" fullname="IANA">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>


    </references>

</references>


<?line 166?>



  </back>

<!-- ##markdown-source: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-->

</rfc>

