<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version  -->
<?rfc strict="yes"?>
<?rfc compact="yes"?>
<?rfc comments="yes"?>
<?rfc subcompact="no"?>
<?rfc iprnotified="no"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-amsuess-core-transport-indication-03" category="std" consensus="true" tocDepth="3" tocInclude="true" sortRefs="true" symRefs="true" obsoletes="" updates="" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.12.2 -->
  <front>
    <title>CoAP Protocol Indication</title>
    <seriesInfo name="Internet-Draft" value="draft-amsuess-core-transport-indication-03"/>
    <author initials="C." surname="Amsüss" fullname="Christian Amsüss">
      <organization/>
      <address>
        <postal>
          <country>Austria</country>
        </postal>
        <email>christian@amsuess.com</email>
      </address>
    </author>
    <date year="2022" month="March" day="03"/>
    <area>Internet</area>
    <workgroup>CoRE</workgroup>
    <keyword>CoRE, Web Linking, Proxy, URI, aliasing</keyword>
    <abstract>
      <t>The Constrained Application Protocol (CoAP, <xref target="RFC7252" format="default"/>) is available over different transports
(UDP, DTLS, TCP, TLS, WebSockets),
but lacks a way to unify these addresses.
This document provides terminology and provisions based on Web Linking <xref target="RFC8288" format="default"/>
to express alternative transports available to a device,
and to optimize exchanges using these.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
  Constrained RESTful Environments Working Group mailing list (core@ietf.org),
  which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/core/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
  <eref target="https://gitlab.com/chrysn/transport-indication"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" toc="default">
      <name>Introduction</name>
      <t>The Constrained Application Protocol (CoAP) provides transports mechanisms
(UDP and DTLS since <xref target="RFC7252" format="default"/>, TCP, TLS and WebSockets since <xref target="RFC8323" format="default"/>),
with some additional being used in LwM2M <xref target="lwm2m" format="default"/>
and even more being explored (<xref target="I-D.bormann-t2trg-slipmux" format="default"/>, <xref target="I-D.amsuess-core-coap-over-gatt" format="default"/>).
These are mutually incompatible on the wire,
but CoAP implementations commonly support several of them,
and proxies can translate between them.</t>
      <t>CoAP currently lacks a way to indicate which transports are available for a given resource,
and to indicate that a device is prepared to serve as a proxy;
this document solves both by introducing the "has-proxy" terminology to Web Linking <xref target="RFC8288" format="default"/> that expresses the former through the latter.
The additional "has-unique-proxy" term is introduced
to negate any per-request overhead that would otherwise be introduced in the course of this.</t>
      <t>CoAP also lacks a unified scheme to label a resource in a transport-independent way.
This document does <em>not</em> attempt to introduce any new scheme here,
or raise a scheme to be the canonical one.
Instead, each host or application can pick a canonical address for its resources,
and advertise other transports in addition.</t>
      <section anchor="terminology" numbered="true" toc="default">
        <name>Terminology</name>
        <t>Readers are expected to be familiar with the terms and concepts
described in CoAP <xref target="RFC7252" format="default"/>
and link format (<xref target="RFC6690" format="default"/>
(or, equivalently, web links as described in <xref target="RFC8288" format="default"/>).</t>
        <dl>
          <dt>
Same-host proxy:  </dt>
          <dd>
            <t>A CoAP server that accepts forward proxy requests (i.e., requests carrying the Proxy-Scheme option)
exclusively for URIs that it is also the authoritative server for is defined as a "same-host proxy".</t>
          </dd>
          <dt/>
          <dd>
            <t>The distinction between a same-host and any other proxy is only relevant on a practical, server-implementation and illustrative level;
this specification does not use the distinction in normative requirements,
and clients need not make the distinction at all.</t>
          </dd>
          <dt>
hosts:  </dt>
          <dd>
            <t>The verb "to host" is used here in the sense of the link relation of the same name defined in <xref target="RFC6690" format="default"/>.</t>
            <t>For resources discovered via CoAP's discovery interface,
a hosting statement is typically provided by the defaults implied by <xref target="RFC6690" format="default"/>
where a link like <tt>&lt;/sensor/temp&gt;</tt> is implied to have the relation "hosts" and the anchor <tt>/</tt>,
such that a statement "coap://hostname hosts coap://hostname/sensor/temp" is implied in the link.</t>
            <t>The link relation has been occasionally used with different interpretations,
which ascribe more meaning to the term than it has in its definition.
In particular,</t>
            <ul spacing="normal">
              <li>the "hosts" relation can not be inferred merely by two URIs having
the same scheme, host and port (and vice versa), and</li>
              <li>the "hosts" relation on its own does not make any statement
about the physical devices that hold the resource's representation.</li>
            </ul>
            <t>[ TBD: The former could probably still be used without too many ill effects;
but things might also get weird when a dynamic resource created
with one transport from use with another transport unless explicitly cleared.
]</t>
          </dd>
        </dl>
        <t>When talking of proxy requests,
this document only talks of the Proxy-Scheme option.
Given that all URIs this is usable with can be expressed in decomposed CoAP URIs,
the need for using the Proxy-URI option should never arise.
The Proxy-URI option is still equivalent to the decomposed options,
and can be used if the server supports it.</t>
        <section anchor="using-uris-to-identify-protocol-endpoints" numbered="true" toc="default">
          <name>Using URIs to identify protocol endpoints</name>
          <t>The URI <tt>coap://device.example.com</tt> identifies a particular resource, possibly a "welcome" text.
It is, colloquially, also used to identify the combination
of a host (identified through a name), the default port, and the CoAP method of sending requests to the host.</t>
          <t>For precision, this document uses the term
"the transport address indicated by (a URI)" to refer to the host / port / protocol combination,
but otherwise no big deal is made of it.</t>
          <t>For the CoAP schemes (coap, coaps, coap+tcp, coaps+tcp, coap+ws, coaps+ws),
URIs indicating a transport are always given with an empty path
(which under their URI normalization rules is equivalent to a path containing a single slash).
For the coap and coap+tcp schemes, URIs with different host names
can indicate the same transport as long as the names resolve to the same addresses.
For the other protocols, the given host name informs the name set in TLS's Server Name Indication (SNI)
and/or the host sent in the "Host" header of the underlying HTTP request.</t>
          <t>If an update to this document extends the list,
for new schemes it might be allowed to have paths, queries or fragment identifiers present in the URI indicating the transport address.
No guidance can be given here for these,
as no realistic example is known.
(Note that while the coap+ws scheme does use the well-known path <tt>/.well-known/coap</tt> internally,
that is used purely on the HTTP side, and not part of the CoAP URI, not even for indicating the transport address).</t>
          <t>URIs indicating a transport are especially useful when talking about proxies;
this use is aligned with the way they are exprssed in the conventional environment variables <tt>http_proxy</tt> etc.
[ cite https://about.gitlab.com/blog/2021/01/27/we-need-to-talk-no-proxy/ ].
Furthermore, URIs processing is widespread in CoAP systems,
and when that changes (e.g. through the introduction of <xref target="I-D.ietf-core-href" format="default"/>),
URIs indicating a transport will still be efficient to encode.
And last but not least, it lines up well with the colloquial identity mentioned above.
(An alternative would be using a dedicated naming scheme, say, <tt>transport:coap:device.example.com:port</tt>,
but that would needlessly introduce implementation complexity).</t>
          <t>Note that this mechanism can only used with proxies that use CoAP's native address indication mechanisms.
Proxies that perform URI mapping
(as described in Section 5 of <xref target="RFC8075" format="default"/>, especially using URI templates)
are not supported in this document.</t>
          <t>[ TBD: Do we want to extend this to HTTP proxies? Probably just not, and if so, only to those that can just take coap://... for a URI. ]</t>
        </section>
      </section>
      <section anchor="goals" numbered="true" toc="default">
        <name>Goals</name>
        <t>This document introduces provisions for the seamless use of different transport mechanisms for CoAP.
Combined, these provide:</t>
        <ul spacing="normal">
          <li>Enablement: Inform clients of the availability of other transports of servers.</li>
          <li>No Aliasing: Any URI aliasing must be opt-in by the server. Any defined mechanisms must allow applications to keep working on the canonical URIs given by the server.</li>
          <li>Optimization: Do not incur per-request overhead from switching protocols. This may depend on the server's willingness to create aliased URIs.</li>
          <li>Proxy usability: All information provided must be usable by aware proxies to reduce the need for duplicate cache entries.</li>
          <li>Proxy announcement: Allow third parties to announce that they provide alternative transports to a host.</li>
        </ul>
        <t>For all these functions, security policies must be described that allow the client to use them as securely as the original transport.</t>
        <t>This document will not concern itself with changes in transport availability over time,
neither in causing them ("Please take up your TCP interface, I'm going to send a firmware update")
nor in advertising their availability in advance.
Hosts whose transport's availability changes over time can utilize
any suitable mechanism to keep client updated,
such as placing a suitable Max-Age value on their resources
or having them observable.</t>
      </section>
    </section>
    <section anchor="indicating-alternative-transports" numbered="true" toc="default">
      <name>Indicating alternative transports</name>
      <t>While CoAP can set the authority component of the requested URI in all requests (by means of Uri-Host and Uri-Port),
setting the scheme of a requested URI (by means of Proxy-Scheme) makes the request implicitly a proxy request.
However, this needs to be of only little practical concern:
Any device can serve as a proxy for itself (a "same-host proxy")
by accepting requests that carry the Proxy-Scheme option.
If it is to be a well-behaved proxy,
the device should then check whether it recognizes the name set in Uri-Host as one of its own
(as it should if no Proxy-Scheme option accompanied it). <!-- without 7252 explicitly mandating that -->
If the name is not recognized,
it should reject the request with 5.05 (Proxying Not Supported)
-- unless, of course, it implements forward proxy functionality exceeding the same-host proxy.
If the name is recognized,
it should process the request as it would process a request coming in on the given protocol
(which, for many hosts, is the same as if the option were absent completely).</t>
      <t>A server can advertise a recommended proxy
by serving a Web Link with the "has-proxy" relation to a URI indicating its transport address.
In particular (and that is a typical case),
it can indicate its own transport address on an alternative transport when implementing same-host proxy functionality.</t>
      <t>The semantics of a link from S to P with relations has-proxy ("S has-proxy P", <tt>&lt;P&gt;;rel=has-proxy;anchor="S"</tt>)
are that for any resource R hosted on S ("S hosts R"), the proxy with the transport address indicated by P can be used to obtain R.</t>
      <section anchor="example" numbered="true" toc="default">
        <name>Example</name>
        <t>A constrained device at the address 2001:db8::1 that supports CoAP over TCP in addition to CoAP can self-describe like this:</t>
        <figure anchor="fig-has-proxy">
          <name>Discovery and follow-up request through a has-proxy relation</name>
          <artwork name="" type="" align="left" alt=""><![CDATA[
Req: to [ff02::fd]:5683 on UDP
Code: GET
Uri-Path: /.well-known/core
Uri-Query: if=tag:example.com,sensor

Res: from [2001:db8::1]:5683
Content-Format: application/link-format
Payload:
</sensors/temp>;if="tag:example.com,sensor",
<coap+tcp://[2001:db8::1]>;rel=has-proxy;anchor="/"


Req: to [2001:db8::1]:5683 on TCP
Code: GET
Proxy-Scheme: coap
Uri-Path: /sensors/temp
Observe: 0

Res: 2.05 Content
Observe: 0
Payload:
39.1°C
]]></artwork>
        </figure>
        <t>Note that generating this discovery file needs to be dynamic based on its available addresses;
only if queried using a link-local source address, the server may also respond with a link-local address in the authority component of the proxy URI.</t>
        <t>Unless the device makes resources discoverable at <tt>coap+tcp://[2001:db8::1]/.well-known/core</tt> or another discovery mechanism,
clients may not assume that <tt>coap+tcp://[2001:db8::1]/sensors/temp</tt> is a valid resource (let alone is equivalent to the other resource on the same path).
The server advertising itself like this may reject any request on CoAP-over-TCP unless it contains a Proxy-Scheme option.</t>
        <t>Clients that want to access the device using CoAP-over-TCP would send a request
by connecting to 2001:db8::1 TCP port 5683
and sending a GET with the options Proxy-Scheme: coap, no Uri-Host or -Port options (utilizing their default values),
and the Uri-Paths "sensors" and "temp".</t>
      </section>
      <section anchor="secctx-propagation" numbered="true" toc="default">
        <name>Security context propagation</name>
        <t>If the originally requested URI R or the application requirements demand a security mechanism is used,
the client MUST only use the proxy P if the proxy can provide suitable credentials.
(The hosting URI S is immaterial to these considerations).</t>
        <t>For example, if the application uses the host name and a public key infrastructure and R is <tt>coap://example.com/</tt>
the proxy accessed as <tt>coap+tcp://[2001:db8::1]</tt> still needs to provide a certificate chain for the name example.com to one of the system's trust anchors.
If, on the other hand, the application is doing a firmware update and requires any certificate from its configured firmware update issuer,
the proxy needs to provide such a firmware update certificate.</t>
        <t>Some applications have requirements
exceeding the requirements of a secure connection,
e.g., (explicitly or implicitly) requiring that
name resolution happen through a secure process
and packets are only routed into networks where it trusts that they will not be intercepted on the path to the server.
Such applications need to extend their requirements to the source of the <tt>has-proxy</tt> statement;
a sufficient (but maybe needlessly strict) requirement is to only follow <tt>has-proxy</tt> statements
that are part of the same resource that advertises the link currently being followed.
Section <xref target="proxy-foreign-advertisement" format="default"/> adds further considerations.</t>
      </section>
      <section anchor="choice-of-transports" numbered="true" toc="default">
        <name>Choice of transports</name>
        <t>It is up to the client whether to use an advertised proxy transport,
or (if multiple are provided) which to pick.</t>
        <t>Links to proxies may be annotated with additional metadata that may help guide such a choice;
defining such metadata is out of scope for this document.</t>
        <t>Clients MAY switch between advertised transports as long as the document describing them is fresh;
they may even do so per request.
(For example, they may perform individual requests using CoAP-over-UDP,
but choose CoAP-over-TCP for requests with large expected responses).
When the describing document approaches expiry,
the client can use the representation's ETag to efficiently renew its justification for using the alternative transport.</t>
      </section>
      <section anchor="selection-of-a-canonical-origin" numbered="true" toc="default">
        <name>Selection of a canonical origin</name>
        <t>While a server is at liberty to provide the same resource independently on different transports (i.e. to create aliases),
it may make sense for it to pick a single scheme and authority under which it announces its resources.
Using only one address helps proxies keep their caches efficient,
and makes it easier for clients to avoid exploring the same server twice from different angles.</t>
        <t>When there is a predominant scheme and authority through which an existing service is discovered,
it makes sense to use these for the canonical addresses.</t>
        <t>Otherwise,
it is suggested to use the <tt>coap</tt> or <tt>coaps</tt> scheme
(given that these are the most basic and widespread ones),
and the most stable usable name the host has.</t>
      </section>
      <section anchor="advertisement-through-a-resource-directory" numbered="true" toc="default">
        <name>Advertisement through a Resource Directory</name>
        <t>In the Resource Directory specification <xref target="I-D.ietf-core-resource-directory" format="default"/>,
protocol negotiation was anticipated to use multiple base values.
This approach was abandoned since then,
as it would incur heavy URI aliasing.</t>
        <t>Instead, devices can submit their has-proxy links to the Resource Directory like all their other metadata.</t>
        <t>A client performing resource lookup can ask the RD to provide available (same-host-)proxies in a follow-up request
by asking for <tt>?anchor=&lt;the-discovered-host&gt;&amp;rel=has-proxy</tt>.
<!-- We don't say that the RD can not do that, right? -->
The RD may also volunteer that information during resource lookups even though the has-proxy link itself does not match the search criteria.</t>
        <t>[ It may be useful to define RD parameters for use with lookup here, which'd guide which available proxies to include.
For example, asking <tt>?if=tag:example.com,sensor&amp;proxy-links=tcp</tt> could give as a result:
<tt>&lt;coap://[2001:db8::1]/s&gt;;rt=tag:example.com,sensor,&lt;coap+tcp://[2001:db8::1]/&gt;;rel=has-proxy;anchor="coap://[2001:db8::1]/"</tt>
]</t>
      </section>
    </section>
    <section anchor="elision-of-proxy-scheme-and-uri-host" numbered="true" toc="default">
      <name>Elision of Proxy-Scheme and Uri-Host</name>
      <t>A CoAP server may publish and accept multiple URIs for the same resource,
for example when it accepts requests on different IP addresses that do not carry a Uri-Host option,
or when it accepts requests both with and without the Uri-Host option carrying a registered name.
Likewise, the server may serve the same resources on different transports.
This makes for efficient requests (with no Proxy-Scheme or Uri-Host option),
but in general is discouraged <xref target="aliases" format="default"/>.</t>
      <t>To make efficient requests possible without creating URI aliases that propagate,
the "has-unique-proxy" specialization of the has-proxy relation is defined.</t>
      <t>If a proxy is unique,
it means that requests arriving at the proxy are treated the same
no matter whether the scheme, authority and port of the link context are set in the Proxy-Scheme, Uri-Host and Uri-Port options, respectively,
or whether all of them are absent.</t>
      <t>[ The following two paragraphs are both true but follow different approaches to explaining the observable and implementable behavior;
   it may later be decided to focus on one or the other in this document. ]</t>
      <t>While this creates URI aliasing in the requests as they are sent over the network,
applications that discover a proxy this way should not "think" in terms of these URIs,
but retain the originally discovered URIs (which, because Cool URIs Don't Change<xref target="cooluris" format="default"/>, should be long-term usable).
They use the proxy for as long as they have fresh knowledge of the has-(unique-)proxy statement.</t>
      <t>In a way, advertising <tt>has-unique-proxy</tt> can be viewed as a description of the link target in terms of SCHC <xref target="I-D.ietf-lpwan-coap-static-context-hc" format="default"/>:
In requests to that target, the link source's scheme and host are implicitly present.</t>
      <t>While applications retain knowledge of the originally requested URI
(even if it is not expressed in full on the wire),
the original URI is not accessible to caches both within the host and on the network
(for the latter, see <xref target="actualproxies" format="default"/>).
Thus, cached responses to the canonical and any aliased URI are mutually interchangeable
as long as both the response and the proxy statement are fresh.</t>
      <t>A client MAY use a unique-proxy like a proxy and still send the Proxy-Scheme and Uri-Host option;
such a client needs to recognize both relation types, as relations of the has-unique-proxy type
are a specialization of has-proxy and typically don't carry the latter (redundant) annotation.
[ To be evaluated -- on one hand, supporting it this way means that the server needs to identify all of its addresses and reject others.
   Then again, is a server that (like many now do) fully ignore any set Uri-Host correct at all? ]</t>
      <t>Example:</t>
      <figure anchor="fig-has-unique-proxy">
        <name>Follow-up request through a has-unique-proxy relation. Compared to the last example, 5 bytes of scheme indication are saved during the follow-up request.</name>
        <artwork name="" type="" align="left" alt=""><![CDATA[
Req: to [ff02::fd]:5683 on UDP
Code: GET
Uri-Path: /.well-known/core
Uri-Query: if=tag:example.com,sensor

Res: from [2001:db8::1]:5683
Content-Format: application/link-format
Payload:
</sensors/>;if="tag:example.com,collection",
<coaps+ws://[2001:db8::1]>;rel=has-unique-proxy;anchor="/"


Req: to [2001:db8::1] via WebSockets over HTTPS
Code: GET
Uri-Path: /sensors/

Res: 2.05 Content
Content-Format: application/link-format
Payload:
</sensors/temperature>;if="tag:example.com,sensor"
]]></artwork>
      </figure>
      <t>It is noteworthy that when the URI reference <tt>/sensors/temperature</tt> is resolved,
the base URI is <tt>coap://device0815.example.com</tt> and not its coaps+ws counterpart --
as the request is still for that URI, which both the client and the server are aware of.
However, this detail is of little practical importance:
A simplistic client that uses <tt>coaps+ws://device0815.proxy.rd.example.com</tt> as a base URI will still arrive at an identical follow-up request with no ill effect,
as long as it only uses the wrongly assembled URI for dereferencing resources,
the security context is the same,
the state is kept no longer than the has-unique-proxy statement is fresh,
and it does not (for example) pass the URI on to other devices.</t>
      <section anchor="impact-on-caches" numbered="true" toc="default">
        <name>Impact on caches</name>
        <t>[ This section is written with the "there is implied URI aliasing" mindset;
it should be possible to write it with the "compression" mindset as well
(but there is no point in having both around in the document at this time).</t>
        <t>It is also slightly duplicating, but also more detailed than,
the brief note on the topic in <xref target="actualproxies" format="default"/>
]</t>
        <t>When a node that performs caching learns of a <tt>has-unique-proxy</tt> statement,
it can utilize the information about the implied URI aliasing:
Requests to resources hosted by S can be answered with cached entries from P
(because by the rules of <tt>has-unique-proxy</tt> a request can be crafted that is sent to P for which a fresh response is available).
The inverse direction (serving resources whose URI "starts with" P from a cached request that was sent to S) is harder to serve because it additionaly requires a fresh statement
that "S hosts R" for the matching resource R.</t>
      </section>
      <section anchor="unique-security" numbered="true" toc="default">
        <name>Using unique proxies securely</name>
        <t>[
This section is work in progress, it is more a flow of considerations turning back on each other.
This is all made a bit trickier by not applying to OSCORE which is usually the author's go-to example,
because OSCORE's requirements already preclude all these troubles.
]</t>
        <t>The use of unique proxies requires slightly more care in terms of security.</t>
        <t>No requirements are necessary on the client side; those of {#secctx-propagation} suffice.
(In particular, it is not necessary for the statement to originate from the original server
unless that were already a requirement without the uniqueness property).</t>
        <t>The extra care is necessary on the side of servers that are commissioned with wide ranging authorization [ or is it? ]:
These may now be tricked into serving a resource of which the client assumes a different name.
For example,
if the desired resource is <tt>coaps://high-security.example.org/configuration</tt>,
and there exists a "home page" style service for employees with patterns of
<tt>coaps+tcp://user-${username}.example.org/</tt> at which they can store files,
and the server operating that service is commissioned with a wild-card certificate "*.example.org",
then a device that receives the (malicious) information
<tt>&lt;coaps+tcp://user-mave.example.org&gt;;rel=has-unique-proxy;anchor="coaps://high-security.example.org"</tt>
might use this statement to contact the transport address indicated by <tt>coaps+tcp://user-mave.example.org</tt> and ask for <tt>/config</tt>
(which, to the server, is indistinguishable from <tt>coaps+tcp://user-mave.example.org/config</tt>)
and obtain a malicious configuration.</t>
        <t>In a non-unique proxy situation,
the error would have been caught by the server,
which would have seen the request for <tt>coaps://high-security.example.com</tt>
and refused to serve a request containing critical options it can not adaequately process.</t>
        <t>In the unique proxy situation, ...
[ TBD:
now whose fault is it?
Can only be the client's ...
because it looked at the wildcard certificate rather than whether the host-name it was narrowing it down to is authorized to speak for high-security.example.com?
The server (operator) can barely be blamed,
for while the certificate is needlessly wide,
to the server it did look precisely like a good request.
]</t>
      </section>
    </section>
    <section anchor="thirdparty" numbered="true" toc="default">
      <name>Third party proxy services</name>
      <t>A server that is aware of a suitable cross proxy may use the has-proxy relation to advertise that proxy.
If the protocol used towards the proxy provides name indication (as CoAP over TLS or WebSockets does),
or by using a large number of addresses or ports,
it can even advertise a (more efficient) has-unique-proxy relation.
This is particularly interesting when the advertisements are made available across transports,
for example in a Resource Directory.</t>
      <t>How the server can discover and trust such a proxy
is out of scope for this document,
but generally involves the same kind of links.
In particular, a server may obtain a link to a third party proxy from an administrator as part of its configuration.</t>
      <t>The proxy may advertise itself without the origin server's involvement;
in that case, the client needs to take additional care (see <xref target="proxy-foreign-advertisement" format="default"/>).</t>
      <figure anchor="fig-external-proxy">
        <name>HTTP based discovery and CoAP-over-WS request to a CoAP resource through a has-unique-proxy relation</name>
        <artwork name="" type="" align="left" alt=""><![CDATA[
Req: GET http://rd.example.com/rd-lookup?if=tag:example.com,sensor

Res:
Content-Format: application/link-format
Payload:
<coap://device0815.example.com/sensors/>;if="tag:example.com,collection",
<coap+wss://device0815.proxy.rd.example.com>;rel=has-unique-proxy;anchor="coap://device0815.example.com/"


Req: to device0815.proxy.rd.example.com on WebSocket
Host (indicated during upgrade): device0815.proxy.rd.example.com
Code: GET
Uri-Path: /sensors/

Res: 2.05 Content
Content-Format: application/link-format
Payload:
</sensors/temperature>;if="tag:example.com,sensor"
]]></artwork>
      </figure>
      <section anchor="generic-advertisements" numbered="true" toc="default">
        <name>Generic proxy advertisements</name>
        <t>A third party proxy may advertise its availability to act as a proxy for arbitrary CoAP requests.
This use is not directly related to the protocol indication in other parts of this document,
but sufficiently similar to warrant being described in the same document.</t>
        <t>The resource type "TBDcore.proxy" can be used to describe such a proxy.
The link target attribute "proxy-schemes" can be used to indicate the scheme(s) supported by the proxy, separated by the space character.</t>
        <figure anchor="fig-6lbr-proxy">
          <name>A CoAP client discovers that its border router can also serve as a proxy, and uses that to access a resource on an HTTP server.</name>
          <artwork name="" type="" align="left" alt=""><![CDATA[
Req: GET coap://[fe80::1]/.well-known/core?rt=TBDcore.proxy

Res:
Content-Format: application/link-format
Payload:
<>;rt=TBDcore.proxy;proxy-schemes="coap coap+tcp coap+ws http"

Req: to [fe80::1] via CoAP
Code: GET
Proxy-Scheme: http
Uri-Host: example.com
Uri-Path: /motd
Accept: text/plain

Res: 2.05 Content
Content-Format: text/plain
Payload:
On Monday, October 25th 2021, there is no special message of the day.
]]></artwork>
        </figure>
        <t>The considerations of <xref target="proxy-foreign-advertisement" format="default"/> apply here.</t>
        <t>A generic advertised proxy is always a forward proxy,
and can not be advertised as a "unique" proxy as it would lack information about where to forward.
(A proxy limited to a single outbound protocol might in theory work as a unique proxy when using a transport in which the full default Uri-Host value is configured at setup time,
but these are considered impractical and thus not assigned a resource type here.)</t>
        <t>The use of a generic proxy can be limited to a set of devices that have permission to use it.
Clients can be allowed by their network address if they can be verified,
or by using explicit client authentication using the methods of <xref target="I-D.tiloca-core-oscore-capable-proxies" format="default"/>.</t>
      </section>
    </section>
    <section anchor="actualproxies" numbered="true" toc="default">
      <name>Client picked proxies</name>
      <t>This section is purely informative,
and serves to illustrate that the mechanisms introduced in this document do not hinder the continued use of existing proxies.</t>
      <t>When a resource is accessed through an "actual" proxy (i.e., a host between the client and the server, which itself may have a same-host proxy in addition to that),
the proxy's choice of the upstream server is originally (i.e., without the mechanisms of this document)
either configured (as in a "chain" of proxies)
or determined by the request URI (where a proxy picks CoAP over TCP and resolves the given name for a request aimed at a coap+tcp URI).</t>
      <t>A proxy that has learned,
by active solicitation of the information or by consulting links in its cache,
that the requested URI is available through a (possibly same-host) proxy,
may use that information
in choosing the upstream transport,
to correct the URI associated with a cached response,
and to use responses obtained through one transport to satisfy requests on another.</t>
      <t>For example, if a host at coap://h1.example.com has advertised <tt>&lt;/res&gt;,&lt;coap+tcp://h1.example.com&gt;;rel=has-proxy;anchor="/"</tt>,
then a proxy that has an active CoAP-over-TCP connection to h1.example.com
can forward an incoming request for coap://h1.example.com/res through that CoAP-over-TCP connection
with a suitable Proxy-Scheme on that connection.</t>
      <t>If the host had marked the proxy point as <tt>&lt;coap+tcp://h1.example.com&gt;;rel=has-unique-proxy</tt> instead,
then the proxy could elide the Proxy-Scheme and Uri-Host options,
and would (from the original CoAP caching rules) also be allowed
to use any fresh cache representation of coap+tcp://h1.example.com/res
to satisfy requests for coap://h1.example.com/res.</t>
      <t>A client that uses a forward proxy
and learns of a different proxy advertised to access a particular resource
will not change its behavior if its original proxy is part of its configuration.
If the forward proxy was only used out of necessity
(e.g., to access a resource on the protocol not supported by the client)
it can be practical for the client to use the advertised proxy instead.</t>
    </section>
    <section anchor="security-considerations" numbered="true" toc="default">
      <name>Security considerations</name>
      <section anchor="security-context-propagation" numbered="true" toc="default">
        <name>Security context propagation</name>
        <t>Clients need to strictly enforce the rules of <xref target="secctx-propagation" format="default"/>.
Failure to do so,
in particular using a thusly announced proxy based on a certificate that attests the proxy's name,
would allow attackers to circumvent the client's security expectation.</t>
        <t>When security is terminated at proxies (as is in DTLS and TLS),
a third party proxy can usually not satisfy this requirement;
these transports are limited to same-host proxies.</t>
      </section>
      <section anchor="proxy-foreign-advertisement" numbered="true" toc="default">
        <name>Traffic misdirection</name>
        <t>Accepting arbitrary proxies,
even with security context propagation performed properly,
would allow attackers to redirect traffic through systems under their control.
Not only does that impact availability,
it also allows an attacker to observe traffic patterns.</t>
        <t>This affects both OSCORE and (D)TLS,
as neither protect the participants' network addresses.</t>
        <t>Other than the security context propagation rules,
there are no hard and general rules about when an advertised proxy is a suitable candidate.
Aspects for consideration are:</t>
        <ul spacing="normal">
          <li>
            <t>When no direct connection is possible
(e.g. because the resource to be accessed is served as coap+tcp and TCP is not implemented in the client,
or because the resource's host is available on IPv6 while the client has no default IPv6 route),
using a proxy is necessary if complete service disruption is to be avoided.  </t>
            <t>
While an adversary can cause such a situation (e.g. by manipulating routing or DNS entries),
such an adversary is usually already in a position to observe traffic patterns.</t>
          </li>
          <li>
            <t>A proxy advertised by the device hosting the resource to be accessed is less risky to use than one advertised by a third party.  </t>
            <t>
Note that in some applications, servers produce representations based on unverified user input.
In such cases, and more so when multiple applications share a security context, the advertisements' provenance may need to be considered.</t>
          </li>
        </ul>
        <!-- Note that these aspects' applicability is mutually exclusive:
When the advertisement was obtained from the target host,
that needs to be reachable. -->

</section>
      <section anchor="protecting-the-proxy" numbered="true" toc="default">
        <name>Protecting the proxy</name>
        <t>A widely published statement about a host's availability as a proxy can cause many clients to attempt to use it.</t>
        <t>This is mitigated in well-behaved clients by observing the rate limits of <xref target="RFC7252" format="default"/>,
and by ceasing attempts to reach a proxy for the Max-Age of received errors.</t>
        <t>Operators can further limit ill-effects
by ensuring that their client systems do not needlessly use proxies advertised in an unsecured way,
and by providing own proxies when their clients need them<!-- in a sense, avoid having starving clients that grab any straw at connectivity -->.</t>
      </section>
    </section>
    <section anchor="iana-considerations" numbered="true" toc="default">
      <name>IANA considerations</name>
      <section anchor="link-relation-types" numbered="true" toc="default">
        <name>Link Relation Types</name>
        <t>IANA is asked to add two entries into the Link Relation Type Registry last updated in <xref target="RFC8288" format="default"/>:</t>
        <table anchor="tab-iana" align="center">
          <name>New Link Relation types</name>
          <thead>
            <tr>
              <th align="left">Relation Name</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">has-proxy</td>
              <td align="left">The link target can be used as a proxy to reach the link context.</td>
              <td align="left">RFCthis</td>
            </tr>
            <tr>
              <td align="left">has-unique-proxy</td>
              <td align="left">Like has-proxy, and using this proxy implies scheme and host of the target.</td>
              <td align="left">RFCthis</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="resource-types" numbered="true" toc="default">
        <name>Resource Types</name>
        <t>IANA is asked to add an entry into the "Resource Type (rt=) Link Target Attribute Values" registry under the Constrained RESTful Environments (CoRE) Parameters:</t>
        <t>[ The RFC Editor is asked to replace any occurrence of TBDcore.proxy with the actually registered attribute value. ]</t>
        <t>Attribute Value: core.proxy</t>
        <t>Description: Forward proxying services</t>
        <t>Reference: [ this document ]</t>
        <t>Notes: The schemes for which the proxy is usable may be indicated using the proxy-schemes target attribute as per <xref target="generic-advertisements" format="default"/> of [ this document ].</t>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby">
              <organization/>
            </author>
            <author fullname="K. Hartke" initials="K." surname="Hartke">
              <organization/>
            </author>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks.  The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s.  The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types.  CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC8288">
          <front>
            <title>Web Linking</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham">
              <organization/>
            </author>
            <date month="October" year="2017"/>
            <abstract>
              <t>This specification defines a model for the relationships between resources on the Web ("links") and the type of those relationships ("link relation types").</t>
              <t>It also defines the serialisation of such links in HTTP headers with the Link header field.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8288"/>
          <seriesInfo name="DOI" value="10.17487/RFC8288"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="aliases" target="https://www.w3.org/TR/webarch/#uri-aliases">
          <front>
            <title>Architecture of the World Wide Web, Section 2.3.1 URI aliases</title>
            <author>
              <organization>W3C</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="cooluris" target="https://www.w3.org/Provider/Style/URI">
          <front>
            <title>Cool URIs don't change</title>
            <author initials="T." surname="BL" fullname="Tim BL">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="lwm2m" target="https://omaspecworks.org/white-paper-lightweight-m2m-1-1/">
          <front>
            <title>White Paper – Lightweight M2M 1.1</title>
            <author>
              <organization>OMA SpecWorks</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC8323">
          <front>
            <title>CoAP (Constrained Application Protocol) over TCP, TLS, and WebSockets</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <author fullname="S. Lemay" initials="S." surname="Lemay">
              <organization/>
            </author>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
              <organization/>
            </author>
            <author fullname="K. Hartke" initials="K." surname="Hartke">
              <organization/>
            </author>
            <author fullname="B. Silverajan" initials="B." surname="Silverajan">
              <organization/>
            </author>
            <author fullname="B. Raymor" initials="B." role="editor" surname="Raymor">
              <organization/>
            </author>
            <date month="February" year="2018"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP), although inspired by HTTP, was designed to use UDP instead of TCP.  The message layer of CoAP over UDP includes support for reliable delivery, simple congestion control, and flow control.</t>
              <t>Some environments benefit from the availability of CoAP carried over reliable transports such as TCP or Transport Layer Security (TLS). This document outlines the changes required to use CoAP over TCP, TLS, and WebSockets transports.  It also formally updates RFC 7641 for use with these transports and RFC 7959 to enable the use of larger messages over a reliable transport.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8323"/>
          <seriesInfo name="DOI" value="10.17487/RFC8323"/>
        </reference>
        <reference anchor="I-D.bormann-t2trg-slipmux">
          <front>
            <title>Slipmux: Using an UART interface for diagnostics, configuration, and packet transfer</title>
            <author fullname="Carsten Bormann">
              <organization>Universitaet Bremen TZI</organization>
            </author>
            <author fullname="Tobias Kaupat">
              <organization>Lobaro UG</organization>
            </author>
            <date day="4" month="November" year="2019"/>
            <abstract>
              <t>   Many research and maker platforms for Internet of Things
   experimentation offer a serial interface.  This is often used for
   programming, diagnostic output, as well as a crude command interface
   ("AT interface").  Alternatively, it is often used with SLIP
   (RFC1055) to transfer IP packets only.

   The present report describes how to use a single serial interface for
   diagnostics, configuration commands and state readback, as well as
   packet transfer.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-bormann-t2trg-slipmux-03"/>
        </reference>
        <reference anchor="I-D.amsuess-core-coap-over-gatt">
          <front>
            <title>CoAP over GATT (Bluetooth Low Energy Generic Attributes)</title>
            <author fullname="Christian Amsüss">
	 </author>
            <date day="2" month="November" year="2020"/>
            <abstract>
              <t>   Interaction from computers and cell phones to constrained devices is
   limited by the different network technologies used, and by the
   available APIs.  This document describes a transport for the
   Constrained Application Protocol (CoAP) that uses Bluetooth GATT
   (Generic Attribute Profile) and its use cases.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-amsuess-core-coap-over-gatt-01"/>
        </reference>
        <reference anchor="RFC6690">
          <front>
            <title>Constrained RESTful Environments (CoRE) Link Format</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby">
              <organization/>
            </author>
            <date month="August" year="2012"/>
            <abstract>
              <t>This specification defines Web Linking using a link format for use by constrained web servers to describe hosted resources, their attributes, and other relationships between links.  Based on the HTTP Link Header field defined in RFC 5988, the Constrained RESTful Environments (CoRE) Link Format is carried as a payload and is assigned an Internet media type.  "RESTful" refers to the Representational State Transfer (REST) architecture.  A well-known URI is defined as a default entry point for requesting the links hosted by a server.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6690"/>
          <seriesInfo name="DOI" value="10.17487/RFC6690"/>
        </reference>
        <reference anchor="I-D.ietf-core-href">
          <front>
            <title>Constrained Resource Identifiers</title>
            <author fullname="Carsten Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <author fullname="Henk Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <date day="15" month="January" year="2022"/>
            <abstract>
              <t>   The Constrained Resource Identifier (CRI) is a complement to the
   Uniform Resource Identifier (URI) that serializes the URI components
   in Concise Binary Object Representation (CBOR) instead of a sequence
   of characters.  This simplifies parsing, comparison and reference
   resolution in environments with severe limitations on processing
   power, code size, and memory size.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-href-09"/>
        </reference>
        <reference anchor="RFC8075">
          <front>
            <title>Guidelines for Mapping Implementations: HTTP to the Constrained Application Protocol (CoAP)</title>
            <author fullname="A. Castellani" initials="A." surname="Castellani">
              <organization/>
            </author>
            <author fullname="S. Loreto" initials="S." surname="Loreto">
              <organization/>
            </author>
            <author fullname="A. Rahman" initials="A." surname="Rahman">
              <organization/>
            </author>
            <author fullname="T. Fossati" initials="T." surname="Fossati">
              <organization/>
            </author>
            <author fullname="E. Dijk" initials="E." surname="Dijk">
              <organization/>
            </author>
            <date month="February" year="2017"/>
            <abstract>
              <t>This document provides reference information for implementing a cross-protocol network proxy that performs translation from the HTTP protocol to the Constrained Application Protocol (CoAP).  This will enable an HTTP client to access resources on a CoAP server through the proxy.  This document describes how an HTTP request is mapped to a CoAP request and how a CoAP response is mapped back to an HTTP response.  This includes guidelines for status code, URI, and media type mappings, as well as additional interworking advice.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8075"/>
          <seriesInfo name="DOI" value="10.17487/RFC8075"/>
        </reference>
        <reference anchor="I-D.ietf-core-resource-directory">
          <front>
            <title>CoRE Resource Directory</title>
            <author fullname="Christian Amsüss">
	 </author>
            <author fullname="Zach Shelby">
              <organization>ARM</organization>
            </author>
            <author fullname="Michael Koster">
              <organization>SmartThings</organization>
            </author>
            <author fullname="Carsten Bormann">
              <organization>Universitaet Bremen TZI</organization>
            </author>
            <author fullname="Peter van der Stok">
              <organization>consultant</organization>
            </author>
            <date day="7" month="March" year="2021"/>
            <abstract>
              <t>   In many IoT applications, direct discovery of resources is not
   practical due to sleeping nodes, or networks where multicast traffic
   is inefficient.  These problems can be solved by employing an entity
   called a Resource Directory (RD), which contains information about
   resources held on other servers, allowing lookups to be performed for
   those resources.  The input to an RD is composed of links and the
   output is composed of links constructed from the information stored
   in the RD.  This document specifies the web interfaces that an RD
   supports for web servers to discover the RD and to register,
   maintain, lookup and remove information on resources.  Furthermore,
   new target attributes useful in conjunction with an RD are defined.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-resource-directory-28"/>
        </reference>
        <reference anchor="I-D.ietf-lpwan-coap-static-context-hc">
          <front>
            <title>Static Context Header Compression (SCHC) for the Constrained Application Protocol (CoAP)</title>
            <author fullname="Ana Minaburo">
              <organization>Acklio</organization>
            </author>
            <author fullname="Laurent Toutain">
              <organization>Institut MINES TELECOM; IMT Atlantique</organization>
            </author>
            <author fullname="Ricardo Andreasen">
              <organization>Universidad de Buenos Aires</organization>
            </author>
            <date day="8" month="March" year="2021"/>
            <abstract>
              <t>This document defines how to compress Constrained Application Protocol (CoAP) headers using the Static Context Header Compression and fragmentation (SCHC) framework.  SCHC defines a header compression mechanism adapted for Constrained Devices.  SCHC uses a static description of the header to reduce the header's redundancy and size.  While RFC 8724 describes the SCHC compression and fragmentation framework, and its application for IPv6/UDP headers, this document applies SCHC to CoAP headers.  The CoAP header structure differs from IPv6 and UDP, since CoAP uses a flexible header with a variable number of options, themselves of variable length.  The CoAP message format is asymmetric: the request messages have a header format different from the format in the response messages.  This specification gives guidance on applying SCHC to flexible headers and how to leverage the asymmetry for more efficient compression Rules.
              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lpwan-coap-static-context-hc-19"/>
        </reference>
        <reference anchor="I-D.tiloca-core-oscore-capable-proxies">
          <front>
            <title>OSCORE-capable Proxies</title>
            <author fullname="Marco Tiloca">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Rikard Höglund">
              <organization>RISE AB</organization>
            </author>
            <date day="25" month="October" year="2021"/>
            <abstract>
              <t>   Object Security for Constrained RESTful Environments (OSCORE) can be
   used to protect CoAP messages end-to-end between two endpoints at the
   application layer, also in the presence of intermediaries such as
   proxies.  This document defines how OSCORE is used to protect CoAP
   messages also between an origin application endpoint and an
   intermediary, or between two intermediaries.  Besides, it defines how
   a CoAP message can be double-protected through "OSCORE-in-OSCORE",
   i.e., both end-to-end between origin application endpoints, as well
   as between an application endpoint and an intermediary or between two
   intermediaries.  Thus, this document updates RFC 8613.  The same
   approach applies to Group OSCORE, for protecting CoAP messages when
   group communication with intermediaries is used.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-tiloca-core-oscore-capable-proxies-01"/>
        </reference>
        <reference anchor="RFC7838">
          <front>
            <title>HTTP Alternative Services</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham">
              <organization/>
            </author>
            <author fullname="P. McManus" initials="P." surname="McManus">
              <organization/>
            </author>
            <author fullname="J. Reschke" initials="J." surname="Reschke">
              <organization/>
            </author>
            <date month="April" year="2016"/>
            <abstract>
              <t>This document specifies "Alternative Services" for HTTP, which allow an origin's resources to be authoritatively available at a separate network location, possibly accessed with a different protocol configuration.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7838"/>
          <seriesInfo name="DOI" value="10.17487/RFC7838"/>
        </reference>
        <reference anchor="RFC6763">
          <front>
            <title>DNS-Based Service Discovery</title>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire">
              <organization/>
            </author>
            <author fullname="M. Krochmal" initials="M." surname="Krochmal">
              <organization/>
            </author>
            <date month="February" year="2013"/>
            <abstract>
              <t>This document specifies how DNS resource records are named and structured to facilitate service discovery.  Given a type of service that a client is looking for, and a domain in which the client is looking for that service, this mechanism allows clients to discover a list of named instances of that desired service, using standard DNS queries. This mechanism is referred to as DNS-based Service Discovery, or DNS-SD.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6763"/>
          <seriesInfo name="DOI" value="10.17487/RFC6763"/>
        </reference>
        <reference anchor="I-D.amsuess-t2trg-rdlink">
          <front>
            <title>rdlink: Robust distributed links to constrained devices</title>
            <author fullname="Christian Amsüss">
	 </author>
            <date day="23" month="September" year="2019"/>
            <abstract>
              <t>   Thing to thing communication in Constrained RESTful Environments
   (CoRE) relies on URIs to link to servers.  Next to hierarchical
   configuration and short-lived IP addresses, this document introduces
   a naming scheme for devices based on cryptographic identifiers.  A
   special purpose domain is reserved for expressing those identifiers,
   and mechanisms for constrained devices to announce their names and to
   look them up are described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-amsuess-t2trg-rdlink-01"/>
        </reference>
        <reference anchor="RFC8613">
          <front>
            <title>Object Security for Constrained RESTful Environments (OSCORE)</title>
            <author fullname="G. Selander" initials="G." surname="Selander">
              <organization/>
            </author>
            <author fullname="J. Mattsson" initials="J." surname="Mattsson">
              <organization/>
            </author>
            <author fullname="F. Palombini" initials="F." surname="Palombini">
              <organization/>
            </author>
            <author fullname="L. Seitz" initials="L." surname="Seitz">
              <organization/>
            </author>
            <date month="July" year="2019"/>
            <abstract>
              <t>This document defines Object Security for Constrained RESTful Environments (OSCORE), a method for application-layer protection of the Constrained Application Protocol (CoAP), using CBOR Object Signing and Encryption (COSE).  OSCORE provides end-to-end protection between endpoints communicating using CoAP or CoAP-mappable HTTP. OSCORE is designed for constrained nodes and networks supporting a range of proxy operations, including translation between different transport protocols.</t>
              <t>Although an optional functionality of CoAP, OSCORE alters CoAP options processing and IANA registration.  Therefore, this document updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8613"/>
          <seriesInfo name="DOI" value="10.17487/RFC8613"/>
        </reference>
        <reference anchor="I-D.silverajan-core-coap-protocol-negotiation">
          <front>
            <title>CoAP Protocol Negotiation</title>
            <author fullname="Bilhanan Silverajan">
              <organization>TUT</organization>
            </author>
            <author fullname="Mert Ocak">
              <organization>Ericsson</organization>
            </author>
            <date day="2" month="July" year="2018"/>
            <abstract>
              <t>   CoAP has been standardised as an application-level REST-based
   protocol.  When multiple transport protocols exist for exchanging
   CoAP resource representations, this document introduces a way forward
   for CoAP endpoints as well as intermediaries to agree upon alternate
   transport and protocol configurations as well as URIs for CoAP
   messaging.  Several mechanisms are proposed: Extending the CoRE
   Resource Directory with new parameter types, introducing a new CoAP
   Option with which clients can interact directly with servers without
   needing the Resource Directory, and finally a new CoRE Link Attribute
   allowing exposing alternate locations on a per-resource basis.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-silverajan-core-coap-protocol-negotiation-09"/>
        </reference>
      </references>
    </references>
    <section anchor="change-log" numbered="true" toc="default">
      <name>Change log</name>
      <t>Since -02 (mainly processing reviews from Marco and Klaus):</t>
      <ul spacing="normal">
        <li>Acknowledge that 'coap://hostname/' is not the proxy but a URI that (in a particular phrasing) is used to stand in for the proxy's address (while it regularly identifies a resurce on the server)</li>
        <li>Security: Referencing traffic misdirection already in the first security block.</li>
        <li>Security: Add (incomplete) considerations for unique-proxy case.</li>
        <li>Narrow down "unique" proxy semantics to those properties used by the client, allowing unique proxies to be co-hosted with forward proxies.</li>
        <li>"Client picked proxies" clarified to merely illustrate how this is compatible with them.</li>
        <li>Use of "hosts" relation sharpened.</li>
        <li>Precision on how this does and does not consider changing transports.</li>
        <li>"Related work" section demoted to appendix.</li>
        <li>Add note on DTLS session resumption.</li>
        <li>Variable renaming.</li>
        <li>Various editorial fixes.</li>
      </ul>
      <t>Since -01:</t>
      <ul spacing="normal">
        <li>Removed suggestion for generally trusted proxies;
now stating that with (D)TLS,
"a third party proxy can usually not satisfy [the security context propagation requirement]".</li>
        <li>State more clearly that valid cache entries for resources aliased through has-unique-proxy can be used.</li>
        <li>Added considerations for Multipath TCP.</li>
        <li>Added concrete suggestion and example for advertisement of general proxies.</li>
        <li>Added concrete suggestion for RD lookup extension that provides proxies.</li>
        <li>Minor editorial and example changes.</li>
      </ul>
      <t>Since -00:</t>
      <ul spacing="normal">
        <li>Added introduction</li>
        <li>Added examples</li>
        <li>Added SCHC analogy</li>
        <li>Expanded security considerations</li>
        <li>Added guidance on choice of transport, and canonical addresses</li>
        <li>Added subsection on interaction with a Resource Directory</li>
        <li>Added comparisons with related work, including rdlink and DNS-SD sketches</li>
        <li>Added IANA considerations</li>
        <li>Added section on open questions</li>
      </ul>
    </section>
    <section anchor="related-work-and-applicability-to-related-fields" numbered="true" toc="default">
      <name>Related work and applicability to related fields</name>
      <section anchor="on-http" numbered="true" toc="default">
        <name>On HTTP</name>
        <t>The mechanisms introduced here are similar to the Alt-Svc header of <xref target="RFC7838" format="default"/>
in that they do not create different application-visible addresses,
but provide dispatch through lower transport implementations.</t>
        <t>Unlike in HTTP, the variations of CoAP protocols each come with their unique URI schemes
and thus enable the "transport address indicated by a URI" concept.
Thus, there is no need for a distinction between protocol-id and scheme.</t>
        <t>To accommodate the message size constraints typical of CoRE environments,
and accounting for the differences between HTTP headers and CoAP options,
information is delivered once at discovery time.</t>
        <t>Using the has-proxy and has-unique-proxy with HTTP URIs as the context is NOT RECOMMENDED;
the HTTP provisions of the Alt-Svc header and ALPN are preferred.</t>
      </section>
      <section anchor="using-dns" numbered="true" toc="default">
        <name>Using DNS</name>
        <t>As pointed out in <xref target="RFC7838" format="default"/>,
DNS can already serve some of the applications of Alt-Svc and has-unique-proxy by providing different CNAME records.
These cover cases of multiple addresses,
but not different ports or protocols.</t>
        <t>While not specified for CoAP yet (and neither being specified here),</t>
        <t>[ which is an open discussion point for CoRE -- should we? Here? In a separate DNS-SD document? ]</t>
        <t>DNS SRV records (possibly in combination with DNS Service Discovery <xref target="RFC6763" format="default"/>) can provide records that could be considered equivalent to has-unique-proxy relations.
If <tt>_coap._tcp</tt>, <tt>_coaps._tcp</tt>, <tt>_coap._udp</tt>, <tt>_coap+ws._tcp</tt> etc. were defined with suitable semantics,
these can be equivalent:</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
_coap._udp.device.example.com SRV 0 0 device.example.com 61616
device.example.com AAAA 2001:db8::1

<coap://[2001:db8::1]>;rel=has-unique-proxy;anchor="coap://device.example.com"
]]></artwork>
        <t>It would be up to such a specification to give details on what the link's context is;
unlike the link based discovery of this document,
it would either need to pick one distinguished context scheme for which these records are looked up,
or would introduce aliasing on its own.</t>
      </section>
      <section anchor="using-names-outside-regular-dns" numbered="true" toc="default">
        <name>Using names outside regular DNS</name>
        <t>Names that are resolved through different mechanisms than DNS,
or names which are defined within the scope of DNS but have no universally valid answers to A/AAAA requests,
can be advertised using the relation types defined here and CoAP discovery.</t>
        <t>In <xref target="fig-rdlink" format="default"/>, a server using a cryptographic name as described in <xref target="I-D.amsuess-t2trg-rdlink" format="default"/> is discovered and used.</t>
        <figure anchor="fig-rdlink">
          <name>Obtaining a sensor value from a local device with a global name</name>
          <artwork name="" type="" align="left" alt=""><![CDATA[
Req: to [ff02::fd]:5683 on UDP
Code: GET
Uri-Path: /.well-known/core
Uri-Query: rel=has-proxy
Uri-Query: anchor=coap://nbswy3dpo5xxe3denbswy3dpo5xxe3de.ab.rdlink.arpa

Res: from [2001:db8::1]:5683
Content-Format: application/link-format
Payload:
<coap+tcp://[2001:db8::1]>;rel=has-unique-proxy;
  anchor="coap://nbswy3dpo5xxe3denbswy3dpo5xxe3de.ab.rdlink.arpa"


Req: to [2001:db8::1]:5683 on TCP
Code: GET
OSCORE: ...
Uri-Path: /sensors/temp
Observe: 0

Res: 2.05 Content
OSCORE: ...
Observe: 0
Payload:
39.1°C
]]></artwork>
        </figure>
      </section>
      <section anchor="multipath-tcp" numbered="true" toc="default">
        <name>Multipath TCP</name>
        <t>When CoAP-over-TCP is used over Multipath TCP
and no Uri-Host option is sent,
the implicit assumption is that there is aliasing between URIs containing any of the endpoints' addresses.</t>
        <t>As these are negotiated within MPTCP,
this works independently of this document's mechanisms.
As long as all the server's addresses are equally reachable,
there is no need to advertise multiple addresses that can later be discovered through MPTCP anyway.
When advertisements are long-lived and there is no single more stable address,
several available addresses can be advertised (independently of whether MPTCP is involved or not).
If a client uses an address that is merely a proxy address (and not a unique proxy address),
but during MPTCP finds out that the network location being accessed is actually an MPTCP alternative address of the used one,
the client MAY forego sending of the Proxy-Scheme and Uri-Path option.</t>
        <t>[ This follows from multiple addresses being valid for that TCP connection;
at some point we may want to say something about what that means for the default value of the Uri-Host option --
maybe something like "has the default value of any of the associated addresses, but the server may only enable MPTCP if there is implicit aliasing between all of them" (similar to OSCORE's statement)?  ]</t>
        <t>[ TBD: Do we need a section analog to this that deals with (D)TLS session resumption in absence of SNI? ]</t>
      </section>
    </section>
    <section anchor="open-questions-further-ideas" numbered="true" toc="default">
      <name>Open Questions / further ideas</name>
      <ul spacing="normal">
        <li>
          <t>OSCORE interaction: <xref target="RFC8613" format="default"/> Section 4.1.3.2 requirements place OSCORE use in a weird category between has-proxy and has-unique-proxy
(because if routing still works, the result will be correct).
Not sure how to write this down properly,
or whether it's actionable at all.  </t>
          <t>
Possibly there is an inbetween category of
"The host needs the Uri-Host etc. when accessed through CoAP,
but because the host does not use the same OSCORE KID across different virtual hosts,
it's has-unique-proxy as soon as you talk OSCORE".</t>
        </li>
        <li>
          <t>Self-uniqueness:  </t>
          <t>
A host that wants to indicate that it doesn't care about Uri-Host
can probably publish something like <tt>&lt;/&gt;;rel=has-unique-proxy</tt> to do so.  </t>
          <t>
This'd help applications justify when they can elide the Uri-Host,
even when no different protocols are involved.</t>
        </li>
        <li>
          <t>Advertising under a stable name:  </t>
          <t>
If a host wants to advertise its host name rather than its IP address during multicast, how does it best do that?  </t>
          <t>
Options, when answering from 2001:db8::1 to a request to ff02::fd are:  </t>
          <artwork name="" type="" align="left" alt=""><![CDATA[
<coap://myhostname/foo>,...,
<coap://[2001:db8::1]>;rel=has-unique-proxy;anchor="coap://myhostname"
]]></artwork>
          <t>
which is verbose but formally clear, and  </t>
          <artwork name="" type="" align="left" alt=""><![CDATA[
</foo>,...,
<coap://[2001:db8::1]>;rel=has-unique-proxy;anchor="coap://myhostname"
]]></artwork>
          <t>
which is compatible with unaware clients,
but its correctness with respect to canonical URIs needs to be argued by the client, in this sequence  </t>
          <ul spacing="normal">
            <li>understanding the has-unique-proxy line,</li>
            <li>understanding that the request that went to 2001:db8::1 was really a Proxy-Scheme/Uri-Host-elided version of a request to coap://myhostname, and then</li>
            <li>processing any relative reference with this new base in mind.</li>
          </ul>
          <t>
(Not that it'd need to happen in software in that sequence,
but that's the sequence needed to understand how the <tt>/foo</tt> here is really <tt>coap://myhostname/foo</tt>).  </t>
          <t>
If CoRAL is used during discovery, a base directive or reverse relation to has-unique-proxy would make this easier.</t>
        </li>
      </ul>
    </section>
    <section anchor="acknowledgements" numbered="true" toc="default">
      <name>Acknowledgements</name>
      <t>This document heavily builds on concepts
explored by Bill Silverajan and Mert Ocak in <xref target="I-D.silverajan-core-coap-protocol-negotiation" format="default"/>,
and together with Ines Robles and Klaus Hartke inside T2TRG.</t>
      <t>[ TBD: reviewers
Marco
Klaus
]</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
