Skip to main content

Analysis of DNS Forwarder Scenario Relative to DDR and DNR
draft-stark-add-dns-forwarder-analysis-00

Document Type Expired Internet-Draft (individual)
Expired & archived
Authors Barbara Stark , Chris Box
Last updated 2021-12-18 (Latest revision 2021-06-16)
RFC stream (None)
Intended RFC status (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

This draft analyzes the behaviors that residential end users and home network owners (e.g., parents of young children) might experience when operating systems and clients support [I-D.ietf-add-ddr] and/or [I-D.ietf-add-dnr] for discovery of encrypted DNS services and the CE router of the home network offers itself as the Do53 resolver. This use case is explicitly mentioned in [I-D.ietf-add-requirements] Section 3.2 and has several requirements related to it. This draft has two goals: determine if the analysis it provides is accurate and, if it is accurate, determine if the behavior is acceptable to the WG or if there should be changes to either of the discovery mechanisms.

Authors

Barbara Stark
Chris Box

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)