<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.6.2 (Ruby 3.0.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-pauly-ohai-svcb-config-00" category="info" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.12.3 -->
  <front>
    <title abbrev="Oblivious Configs in SVCB">Distribution of Oblivious Configurations via Service Binding Records</title>
    <seriesInfo name="Internet-Draft" value="draft-pauly-ohai-svcb-config-00"/>
    <author initials="T." surname="Pauly" fullname="Tommy Pauly">
      <organization>Apple Inc.</organization>
      <address>
        <email>tpauly@apple.com</email>
      </address>
    </author>
    <author initials="T." surname="Reddy" fullname="Tirumaleswar Reddy">
      <organization>Akamai</organization>
      <address>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <date year="2022" month="March" day="05"/>
    <area>Security</area>
    <workgroup>Oblivious HTTP Application Intermediation</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document defines a parameter that can be included in SVCB and HTTPS
DNS resource records to denote that a service is accessible as an Oblivious
HTTP target, along with one or more oblivious key configurations.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-pauly-ohai-svcb-config/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Oblivious HTTP Application Intermediation Working Group mailing list (<eref target="mailto:ohai@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ohai/"/>.
      </t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Oblivious HTTP <xref target="OHTTP"/> allows clients to encrypt
messages exchanged with an HTTP server accessed via a proxy, in such a way
that the proxy cannot inspect the contents of the message and the target HTTP
server does not discover the client's identity. In order to use Oblivious
HTTP, clients need to possess a key configuration to use to encrypt messages
to the oblivious target.</t>
      <t>Since Oblivious HTTP deployments will often involve very specific coordination
between clients, proxies, and targets, the key configuration can often be
shared in a bespoke fashion. However, some deployments involve clients
discovering oblivious targets more dynamically. For example, a network may
want to advertise a DNS resolver that is accessible over Oblivious HTTP
and applies local network resolution policies via mechanisms like Discovery
of Designated Resolvers (<xref target="DDR"/>. Clients
can work with trusted proxies to access these target servers.</t>
      <t>This document defines a mechanism to distribute Oblivious HTTP key
configurations in DNS records, as a parameter that can be included in SVCB and
HTTPS DNS resource records <xref target="SVCB"/>.
The presence of this parameter indicates that a service is an oblivious
target; see <xref section="3" sectionFormat="of" target="OHTTP"/> for a description of oblivious targets.</t>
      <t>This mechanism does not aid in the discovery of proxies to use to access
oblivious targets; the configurations of proxies is out of scope for this
document.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="the-ohttp-configs-and-ohttp-path-svcparamkeys">
      <name>The ohttp-configs and ohttp-path SvcParamKeys</name>
      <t>The "ohttp-configs" SvcParamKey <xref target="iana"/> is used to convey one or more
key configurations that can be used by clients to issue oblivious requests
to a target server described by the SVCB record.</t>
      <t>In wire format, the value of the parameter is one or more <tt>KeyConfig</tt>
structures <xref target="OHTTP"/> concatenated together. In presentation format,
the value is the same concatenated <tt>KeyConfig</tt> structures encoded
in Base64 <xref target="BASE64"/>.</t>
      <t>The meaning of the "ohttp-configs" parameter depends on the scheme
of the SVCB record. This document defines the interpretation for
the "https" <xref target="SVCB"/> and "dns" <xref target="DNS-SVCB"/>
schemes. Other schemes that want to use this parameter <bcp14>MUST</bcp14> define the
interpretation and meaning of the configuration.</t>
      <t>The "ohttp-path" SvcParamKey <xref target="iana"/> is used to convey the URI path of
the oblivious target to which oblivious HTTP requests can sent. In both
wire format and presentation format, this is a UTF-8 encoded string
that contains the path segment of a URI. If this path parameter is not
present, oblivious requests can be made to the root "/" path.</t>
      <section anchor="use-in-https-service-records">
        <name>Use in HTTPS service records</name>
        <t>For the "https" scheme, which uses the HTTPS RR type instead of SVCB,
the presence of the "ohttp-configs" parameter means that the service
being described is an Oblivious HTTP service that uses the default
"message/bhttp" media type <xref target="OHTTP"/>
          <xref target="BINARY-HTTP"/>.</t>
        <t>When present in an HTTPS record, the "ohttp-configs" <bcp14>MUST</bcp14> be included
in the mandatory parameter list, to ensure that implementations that
do not understand the key do not interpret this service as a generic
HTTP service.</t>
        <t>Clients <bcp14>MUST</bcp14> validate that they can parse the value of "ohttp-configs"
as a valid key configuration before attempting to use the service.</t>
      </section>
      <section anchor="use-in-dns-server-svcb-records">
        <name>Use in DNS server SVCB records</name>
        <t>For the "dns" scheme, as defined in <xref target="DNS-SVCB"/>, the presence of
the "ohttp-configs" parameter means that the DNS server being
described is an Oblivious DNS over HTTP (DoH) service. The default
media type expected for use in Oblivious HTTP to DNS resolvers
is "application/dns-message" <xref target="DOH"/>.</t>
        <t>The "ohttp-configs" parameter is only defined for use with DoH, so
the "alpn" SvcParamKey <bcp14>MUST</bcp14> indicate support for a version of HTTP
and the "dohpath" SvcParamKey <bcp14>MUST</bcp14> be present. The "ohttp-configs"
<bcp14>MUST</bcp14> also be included in the mandatory parameter list, to ensure
that implementations that do not understand the key do not interpret
this service as a generic DoH service.</t>
        <t>Clients <bcp14>MUST</bcp14> validate that they can parse the value of "ohttp-configs"
as a valid key configuration before attempting to use the service.</t>
        <section anchor="ddr">
          <name>Use with DDR</name>
          <t>Clients can discover an oblivious DNS server configuration using
DDR, by either querying _dns.resolver.arpa to a locally configured
resolver or querying using the name of a resolver <xref target="DDR"/>.</t>
          <t>In the case of oblivious DNS servers, the client might not be able to
directly use the verification mechanisms described in <xref target="DDR"/>, which
rely on checking for known resolver IP addresses or hostnames in TLS
certificates, since clients do not generally perform TLS with oblivious
targets. A client <bcp14>MAY</bcp14> perform a direct connection to the oblivious
target server to do this TLS check, however this may be impossible
or undesirable if the client does not want to ever expose its IP
address to the oblivious target. If the client does not use the standard
DDR verification check, it <bcp14>MUST</bcp14> use some alternate mechanism to verify
that it should use an oblivious target. For example, the client could have
a local policy of known oblivious target names that it is allowed to
use, or the client could coordinate with the oblivious proxy to either
have the oblivious proxy check the properties of the target's TLS
certificate or filter to only allow targets known and trusted by the
proxy.</t>
          <t>Clients also need to ensure that they are not being targeted with unique
key configurations that would reveal their identity. See <xref target="security"/> for
more discussion.</t>
        </section>
        <section anchor="dnr">
          <name>Use with DNR</name>
          <t>The SvcParamKeys defined in this document also can be used with Discovery
of Network-designated Resolvers (DNR) <xref target="DNR"/>. In this
case, the oblivious configuration and path parameters can be included
in DHCP and Router Advertisement messages.</t>
          <t>While DNR does not require the same kind of verification as DDR, clients
still need to ensure that they are not being targeted with unique
key configurations that would reveal their identity. See <xref target="security"/> for
more discussion.</t>
        </section>
        <section anchor="handling-oblivious-doh-configurations">
          <name>Handling Oblivious DoH Configurations</name>
          <t>Oblivious DoH was originally defined in
<xref target="ODOH"/>. This version of
Oblivious DoH uses a different key configuration format than
generic Oblivious HTTP. SVCB records using the "dns" scheme
can include one or more <tt>ObliviousDoHConfig</tt> structures 
using the "odoh-configs" parameter.</t>
          <t>In wire format, the value of the "odoh-configs" parameter is one
or more <tt>ObliviousDoHConfigs</tt> structures <xref target="ODOH"/> concatenated
together. In presentation format, the value is the same structures
encoded in Base64 <xref target="BASE64"/>.</t>
          <t>All other requirements for "ohttp-configs" in this document apply
to "odoh-configs".</t>
        </section>
      </section>
    </section>
    <section anchor="deployment-considerations">
      <name>Deployment Considerations</name>
      <t>Deployments that add the "ohttp-configs" SvcParamKey need to be
careful to add this only to services meant to be accessed using
Oblivious HTTP. Information in a single SVCB record that contains
"ohttp-configs" only applies to the oblivious service, not
other HTTP services.</t>
      <t>If a service offers both traditional HTTP and oblivious HTTP, these can
be represented by separate SVCB or HTTPS records, both with and
without the "ohttp-configs" SvcParamKey.</t>
    </section>
    <section anchor="security">
      <name>Security and Privacy Considerations</name>
      <t>When discovering designated oblivious DNS servers using this mechanism,
clients need to ensure that the designation is trusted in lieu of
being able to directly check the contents of the target server's TLS
certificate. See <xref target="ddr"/> for more discussion.</t>
      <t>As discussed in <xref target="OHTTP"/>, client requests using Oblivious HTTP
can only be linked by recognizing the key configuration. In order to
prevent unwanted linkability and tracking, clients using any key
configuration discovery mechanism need to be concerned with attacks
that target a specific user or population with a unique key configuration.</t>
      <t>There are several approaches clients can use to mitigate key targetting
attacks. <xref target="CONSISTENCY"/> provides an analysis
of the options for ensuring the key configurations are consistent between
different clients. Clients <bcp14>SHOULD</bcp14> employ some technique to mitigate key
targetting attack. One mitigation specific to this mechanism is validating
that SVCB or HTTPS records including the "oblivious-configs"
are protected by DNSSEC <xref target="DNSSEC"/>. This prevents attacks
where a unique response is generated for each client of a resolver.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>IANA is requested to add the following entry to the SVCB Service Parameters
registry (<xref target="SVCB"/>).</t>
      <table>
        <thead>
          <tr>
            <th align="left">Number</th>
            <th align="left">Name</th>
            <th align="left">Meaning</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">TBD</td>
            <td align="left">ohttp-configs</td>
            <td align="left">Oblivious HTTP key configurations</td>
            <td align="left">(This document)</td>
          </tr>
          <tr>
            <td align="left">TBD</td>
            <td align="left">ohttp-path</td>
            <td align="left">Oblivious HTTP request path</td>
            <td align="left">(This document)</td>
          </tr>
          <tr>
            <td align="left">TBD</td>
            <td align="left">odoh-configs</td>
            <td align="left">Oblivious DoH key configurations</td>
            <td align="left">(This document)</td>
          </tr>
        </tbody>
      </table>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="OHTTP">
          <front>
            <title>Oblivious HTTP</title>
            <author fullname="Martin Thomson">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Christopher A. Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="15" month="February" year="2022"/>
            <abstract>
              <t>   This document describes a system for the forwarding of encrypted HTTP
   messages.  This allows a client to make multiple requests of a server
   without the server being able to link those requests to the client or
   to identify the requests as having come from the same client.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ohai-ohttp-01"/>
        </reference>
        <reference anchor="DDR">
          <front>
            <title>Discovery of Designated Resolvers</title>
            <author fullname="Tommy Pauly">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Eric Kinnear">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Christopher A. Wood">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Patrick McManus">
              <organization>Fastly</organization>
            </author>
            <author fullname="Tommy Jensen">
              <organization>Microsoft</organization>
            </author>
            <date day="31" month="January" year="2022"/>
            <abstract>
              <t>   This document defines Discovery of Designated Resolvers (DDR), a
   mechanism for DNS clients to use DNS records to discover a resolver's
   encrypted DNS configuration.  This mechanism can be used to move from
   unencrypted DNS to encrypted DNS when only the IP address of a
   resolver is known.  This mechanism is designed to be limited to cases
   where unencrypted resolvers and their designated resolvers are
   operated by the same entity or cooperating entities.  It can also be
   used to discover support for encrypted DNS protocols when the name of
   an encrypted resolver is known.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-add-ddr-05"/>
        </reference>
        <reference anchor="SVCB">
          <front>
            <title>Service binding and parameter specification via the DNS (DNS SVCB and HTTPS RRs)</title>
            <author fullname="Ben Schwartz">
              <organization>Google</organization>
            </author>
            <author fullname="Mike Bishop">
              <organization>Akamai Technologies</organization>
            </author>
            <author fullname="Erik Nygren">
              <organization>Akamai Technologies</organization>
            </author>
            <date day="12" month="October" year="2021"/>
            <abstract>
              <t>   This document specifies the "SVCB" and "HTTPS" DNS resource record
   (RR) types to facilitate the lookup of information needed to make
   connections to network services, such as for HTTP origins.  SVCB
   records allow a service to be provided from multiple alternative
   endpoints, each with associated parameters (such as transport
   protocol configuration and keys for encrypting the TLS ClientHello).
   They also enable aliasing of apex domains, which is not possible with
   CNAME.  The HTTPS RR is a variation of SVCB for use with HTTP [HTTP].
   By providing more information to the client before it attempts to
   establish a connection, these records offer potential benefits to
   both performance and privacy.

   TO BE REMOVED: This document is being collaborated on in Github at:
   https://github.com/MikeBishop/dns-alt-svc
   (https://github.com/MikeBishop/dns-alt-svc).  The most recent working
   version of the document, open issues, etc. should all be available
   there.  The authors (gratefully) accept pull requests.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dnsop-svcb-https-08"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="BASE64">
          <front>
            <title>The Base16, Base32, and Base64 Data Encodings</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson">
              <organization/>
            </author>
            <date month="October" year="2006"/>
            <abstract>
              <t>This document describes the commonly used base 64, base 32, and base 16 encoding schemes.  It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4648"/>
          <seriesInfo name="DOI" value="10.17487/RFC4648"/>
        </reference>
        <reference anchor="DNS-SVCB">
          <front>
            <title>Service Binding Mapping for DNS Servers</title>
            <author fullname="Benjamin Schwartz">
              <organization>Google LLC</organization>
            </author>
            <date day="1" month="February" year="2022"/>
            <abstract>
              <t>   The SVCB DNS record type expresses a bound collection of endpoint
   metadata, for use when establishing a connection to a named service.
   DNS itself can be such a service, when the server is identified by a
   domain name.  This document provides the SVCB mapping for named DNS
   servers, allowing them to indicate support for new transport
   protocols.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-add-svcb-dns-02"/>
        </reference>
        <reference anchor="BINARY-HTTP">
          <front>
            <title>Binary Representation of HTTP Messages</title>
            <author fullname="Martin Thomson">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Christopher A. Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="3" month="February" year="2022"/>
            <abstract>
              <t>   This document defines a binary format for representing HTTP messages.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-httpbis-binary-message-01"/>
        </reference>
        <reference anchor="DOH">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <author fullname="P. McManus" initials="P." surname="McManus">
              <organization/>
            </author>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS.  Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="DNR">
          <front>
            <title>DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers (DNR)</title>
            <author fullname="Mohamed Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Tirumaleswar Reddy">
              <organization>Akamai</organization>
            </author>
            <author fullname="Dan Wing">
              <organization>Citrix Systems, Inc.</organization>
            </author>
            <author fullname="Neil Cook">
              <organization>Open-Xchange</organization>
            </author>
            <author fullname="Tommy Jensen">
              <organization>Microsoft</organization>
            </author>
            <date day="13" month="December" year="2021"/>
            <abstract>
              <t>   The document specifies new DHCP and IPv6 Router Advertisement options
   to discover encrypted DNS servers (e.g., DNS-over-HTTPS, DNS-over-
   TLS, DNS-over-QUIC).  Particularly, it allows to learn an
   authentication domain name together with a list of IP addresses and a
   set of service parameters to reach such encrypted DNS servers.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-add-dnr-05"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="ODOH">
          <front>
            <title>Oblivious DNS Over HTTPS</title>
            <author fullname="Eric Kinnear">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Patrick McManus">
              <organization>Fastly</organization>
            </author>
            <author fullname="Tommy Pauly">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Tanya Verma">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Christopher A. Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="17" month="February" year="2022"/>
            <abstract>
              <t>   This document describes a protocol that allows clients to hide their
   IP addresses from DNS resolvers via proxying encrypted DNS over HTTPS
   (DoH) messages.  This improves privacy of DNS operations by not
   allowing any one server entity to be aware of both the client IP
   address and the content of DNS queries and answers.

   This experimental protocol is developed outside the IETF and is
   published here to guide implementation, ensure interoperability among
   implementations, and enable wide-scale experimentation.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-pauly-dprive-oblivious-doh-11"/>
        </reference>
        <reference anchor="CONSISTENCY">
          <front>
            <title>Key Consistency and Discovery</title>
            <author fullname="Alex Davidson">
              <organization>Brave Software</organization>
            </author>
            <author fullname="Matthew Finkel">
              <organization>The Tor Project</organization>
            </author>
            <author fullname="Martin Thomson">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Christopher A. Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="4" month="March" year="2022"/>
            <abstract>
              <t>   This document describes the key consistency and correctness
   requirements of protocols such as Privacy Pass, Oblivious DoH, and
   Oblivious HTTP for user privacy.  It discusses several mechanisms and
   proposals for enabling user privacy in varying threat models.  In
   concludes with discussion of open problems in this area.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-wood-key-consistency-02"/>
        </reference>
        <reference anchor="DNSSEC">
          <front>
            <title>DNS Security Introduction and Requirements</title>
            <author fullname="R. Arends" initials="R." surname="Arends">
              <organization/>
            </author>
            <author fullname="R. Austein" initials="R." surname="Austein">
              <organization/>
            </author>
            <author fullname="M. Larson" initials="M." surname="Larson">
              <organization/>
            </author>
            <author fullname="D. Massey" initials="D." surname="Massey">
              <organization/>
            </author>
            <author fullname="S. Rose" initials="S." surname="Rose">
              <organization/>
            </author>
            <date month="March" year="2005"/>
            <abstract>
              <t>The Domain Name System Security Extensions (DNSSEC) add data origin authentication and data integrity to the Domain Name System.  This document introduces these extensions and describes their capabilities and limitations.  This document also discusses the services that the DNS security extensions do and do not provide.  Last, this document describes the interrelationships between the documents that collectively describe DNSSEC.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4033"/>
          <seriesInfo name="DOI" value="10.17487/RFC4033"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
