<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.25 (Ruby 3.1.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-core-dns-over-coap-02" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.16.0 -->
  <front>
    <title abbrev="DoC">DNS over CoAP (DoC)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-core-dns-over-coap-02"/>
    <author initials="M. S." surname="Lenders" fullname="Martine Sophie Lenders">
      <organization abbrev="FU Berlin">Freie Universität Berlin</organization>
      <address>
        <postal>
          <street>Takustrasse 9</street>
          <city>Berlin</city>
          <code>D-14195</code>
          <country>Germany</country>
        </postal>
        <email>m.lenders@fu-berlin.de</email>
      </address>
    </author>
    <author initials="C." surname="Amsüss" fullname="Christian Amsüss">
      <organization/>
      <address>
        <email>christian@amsuess.com</email>
      </address>
    </author>
    <author initials="C." surname="Gündoğan" fullname="Cenk Gündoğan">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <street>Riesstrasse 25</street>
          <city>Munich</city>
          <code>D-80992</code>
          <country>Germany</country>
        </postal>
        <email>cenk.gundogan@huawei.com</email>
      </address>
    </author>
    <author initials="T. C." surname="Schmidt" fullname="Thomas C. Schmidt">
      <organization>HAW Hamburg</organization>
      <address>
        <postal>
          <street>Berliner Tor 7</street>
          <city>Hamburg</city>
          <code>D-20099</code>
          <country>Germany</country>
        </postal>
        <email>t.schmidt@haw-hamburg.de</email>
      </address>
    </author>
    <author initials="M." surname="Wählisch" fullname="Matthias Wählisch">
      <organization abbrev="FU Berlin">Freie Universität Berlin</organization>
      <address>
        <postal>
          <street>Takustrasse 9</street>
          <city>Berlin</city>
          <code>D-14195</code>
          <country>Germany</country>
        </postal>
        <email>m.waehlisch@fu-berlin.de</email>
      </address>
    </author>
    <date year="2023" month="March" day="13"/>
    <area>Applications</area>
    <workgroup>CoRE</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document defines a protocol for sending DNS messages over the
Constrained Application Protocol (CoAP). These CoAP messages are protected
by DTLS-Secured CoAP (CoAPS) or Object Security for Constrained RESTful
Environments (OSCORE) to provide encrypted DNS message exchange for
constrained devices in the Internet of Things (IoT).</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Constrained RESTful Environments Working Group mailing list (core@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/core/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/core-wg/draft-dns-over-coap"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>This document defines DNS over CoAP (DoC), a protocol to send DNS
<xref target="RFC1035"/> queries and get DNS responses over the Constrained Application
Protocol (CoAP) <xref target="RFC7252"/>. Each DNS query-response pair is mapped into a
CoAP message exchange. Each CoAP message is secured by DTLS <xref target="RFC9147"/> or
Object Security for Constrained RESTful Environments (OSCORE) <xref target="RFC8613"/>
to ensure message integrity and confidentiality.</t>
      <t>The application use case of DoC is inspired by DNS over HTTPS <xref target="RFC8484"/>
(DoH). DoC, however, aims for the deployment in the constrained Internet of
Things (IoT), which usually conflicts with the requirements introduced by
HTTPS.</t>
      <t>To prevent TCP and HTTPS resource requirements, constrained IoT devices
could use DNS over DTLS <xref target="RFC8094"/>. In contrast to DNS over DTLS, DoC
utilizes CoAP features to mitigate drawbacks of datagram-based
communication. These features include: block-wise transfer, which solves
the Path MTU problem of DNS over DTLS (see <xref target="RFC8094"/>, section 5); CoAP
proxies, which provide an additional level of caching; re-use of data
structures for application traffic and DNS information, which saves memory
on constrained devices.</t>
      <t>To prevent resource requirements of DTLS or TLS on top of UDP (e.g.,
introduced by DNS over QUIC <xref target="RFC9250"/>), DoC allows
for lightweight end-to-end payload encryption based on OSCORE.</t>
      <figure anchor="fig-overview-arch">
        <name>Basic DoC architecture</name>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="224" width="552" viewBox="0 0 552 224" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
              <path d="M 8,96 L 8,144" fill="none" stroke="black"/>
              <path d="M 64,96 L 64,144" fill="none" stroke="black"/>
              <path d="M 208,96 L 208,144" fill="none" stroke="black"/>
              <path d="M 264,96 L 264,144" fill="none" stroke="black"/>
              <path d="M 400,112 L 400,128" fill="none" stroke="black"/>
              <path d="M 544,112 L 544,128" fill="none" stroke="black"/>
              <path d="M 8,96 L 64,96" fill="none" stroke="black"/>
              <path d="M 208,96 L 264,96" fill="none" stroke="black"/>
              <path d="M 416,96 L 528,96" fill="none" stroke="black"/>
              <path d="M 72,112 L 200,112" fill="none" stroke="black"/>
              <path d="M 272,112 L 288,112" fill="none" stroke="black"/>
              <path d="M 304,112 L 320,112" fill="none" stroke="black"/>
              <path d="M 336,112 L 352,112" fill="none" stroke="black"/>
              <path d="M 368,112 L 392,112" fill="none" stroke="black"/>
              <path d="M 72,128 L 200,128" fill="none" stroke="black"/>
              <path d="M 272,128 L 296,128" fill="none" stroke="black"/>
              <path d="M 312,128 L 328,128" fill="none" stroke="black"/>
              <path d="M 344,128 L 360,128" fill="none" stroke="black"/>
              <path d="M 376,128 L 392,128" fill="none" stroke="black"/>
              <path d="M 8,144 L 64,144" fill="none" stroke="black"/>
              <path d="M 208,144 L 264,144" fill="none" stroke="black"/>
              <path d="M 416,144 L 528,144" fill="none" stroke="black"/>
              <path d="M 40,192 L 80,192" fill="none" stroke="black"/>
              <path d="M 192,192 L 224,192" fill="none" stroke="black"/>
              <path d="M 248,192 L 264,192" fill="none" stroke="black"/>
              <path d="M 480,192 L 504,192" fill="none" stroke="black"/>
              <path d="M 32,176 L 40,192" fill="none" stroke="black"/>
              <path d="M 236,168 L 248,192" fill="none" stroke="black"/>
              <path d="M 104,64 L 120,32" fill="none" stroke="black"/>
              <path d="M 224,192 L 236,168" fill="none" stroke="black"/>
              <path d="M 504,192 L 512,176" fill="none" stroke="black"/>
              <path d="M 416,96 C 407.16936,96 400,103.16936 400,112" fill="none" stroke="black"/>
              <path d="M 528,96 C 536.83064,96 544,103.16936 544,112" fill="none" stroke="black"/>
              <path d="M 416,144 C 407.16936,144 400,136.83064 400,128" fill="none" stroke="black"/>
              <path d="M 528,144 C 536.83064,144 544,136.83064 544,128" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="400,112 388,106.4 388,117.6" fill="black" transform="rotate(0,392,112)"/>
              <polygon class="arrowhead" points="280,128 268,122.4 268,133.6" fill="black" transform="rotate(180,272,128)"/>
              <polygon class="arrowhead" points="208,112 196,106.4 196,117.6" fill="black" transform="rotate(0,200,112)"/>
              <polygon class="arrowhead" points="80,128 68,122.4 68,133.6" fill="black" transform="rotate(180,72,128)"/>
              <g class="text">
                <text x="152" y="36">FETCH</text>
                <text x="268" y="36">coaps://[2001:db8::1]/</text>
                <text x="108" y="84">CoAP</text>
                <text x="160" y="84">request</text>
                <text x="108" y="100">[DNS</text>
                <text x="156" y="100">query]</text>
                <text x="304" y="100">DNS</text>
                <text x="344" y="100">query</text>
                <text x="32" y="116">DoC</text>
                <text x="232" y="116">DoC</text>
                <text x="464" y="116">DNS</text>
                <text x="36" y="132">Client</text>
                <text x="236" y="132">Server</text>
                <text x="468" y="132">Infrastructure</text>
                <text x="100" y="148">CoAP</text>
                <text x="156" y="148">response</text>
                <text x="296" y="148">DNS</text>
                <text x="348" y="148">response</text>
                <text x="100" y="164">[DNS</text>
                <text x="160" y="164">response]</text>
                <text x="96" y="196">DNS</text>
                <text x="132" y="196">over</text>
                <text x="172" y="196">CoAP</text>
                <text x="280" y="196">DNS</text>
                <text x="316" y="196">over</text>
                <text x="408" y="196">UDP/HTTPS/QUIC/..</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
              . FETCH coaps://[2001:db8::1]/
             /
            /
           CoAP request
+------+   [DNS query]   +------+   DNS query     .---------------.
| DoC  |---------------->| DoC  |--- --- --- --->|      DNS        |
|Client|<----------------|Server|<--- --- --- ---| Infrastructure  |
+------+  CoAP response  +------+  DNS response   '---------------'
          [DNS response]
   \                        /\                                 /
    '-----DNS over CoAP----'  '--DNS over UDP/HTTPS/QUIC/...--'

]]></artwork>
        </artset>
      </figure>
      <t>The most important components of DoC can be seen in <xref target="fig-overview-arch"/>: A DoC
client tries to resolve DNS information by sending DNS queries carried within
CoAP requests to a DoC server.
That DoC server is a DNS client (i.e., a stub or recursive resolver) that resolves DNS information by using other DNS transports such
as DNS over UDP <xref target="RFC1035"/>, DNS over HTTPS <xref target="RFC8484"/>, or DNS over QUIC <xref target="RFC9250"/> when communicating with the upstream
DNS infrastructure.
Using that information, the DoC server then replies to the queries of the DoC client with DNS
responses carried within CoAP responses.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>A server that provides the service specified in this document is called a "DoC
server" to differentiate it from a classic "DNS server".
A DoC server acts either as a DNS stub resolver <xref target="RFC8499"/> or a DNS recursive resolver <xref target="RFC8499"/>.</t>
      <t>A client using the service specified in this document to retrieve the
DNS information is called a "DoC client".</t>
      <t>The term "constrained nodes" is used as defined in <xref target="RFC7228"/>.</t>
      <t>The terms "CoAP payload" and "CoAP body" are used as defined in <xref target="RFC7959"/>, Section 2.</t>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="selection-of-a-doc-server">
      <name>Selection of a DoC Server</name>
      <t>In this document, it is assumed that the DoC client knows the DoC server and the DNS resource at the
DoC server.
Possible options could be manual configuration of a URI <xref target="RFC3986"/> or CRI <xref target="I-D.ietf-core-href"/>,
or automatic configuration, e.g., using a CoRE resource directory
<xref target="RFC9176"/>, DHCP or Router Advertisement options <xref target="I-D.ietf-add-dnr"/>.
Automatic configuration <bcp14>SHOULD</bcp14> only be done from a trusted source.</t>
      <t>When discovering the DNS resource through a link mechanism that allows describing a resource type
(e.g., the Resource Type Attribute in <xref target="RFC6690"/>), the resource type "core.dns" can be
used to identify a generic DNS resolver that is available to the client.</t>
    </section>
    <section anchor="basic-message-exchange">
      <name>Basic Message Exchange</name>
      <section anchor="sec_content-format">
        <name>The "application/dns-message" Content-Format</name>
        <t>This document defines a CoAP Content-Format number for the Internet media type "application/dns-message". This media type is defined as in <xref target="RFC8484"/>
Section 6, i.e., a single DNS message encoded in the DNS on-the-wire format
<xref target="RFC1035"/>.
Both DoC client and DoC server <bcp14>MUST</bcp14> be able to parse contents in the "application/dns-message" format.</t>
      </section>
      <section anchor="dns-queries-in-coap-requests">
        <name>DNS Queries in CoAP Requests</name>
        <t>A DoC client encodes a single DNS query in one or more CoAP request
messages that use the CoAP FETCH <xref target="RFC8132"/> method.
Requests <bcp14>SHOULD</bcp14> include an Accept option to indicate the type of content that can be parsed in the response.</t>
        <t>Since CoAP provides reliability of the message layer (e.g. CON) the retransmission mechanism of the
DNS protocol as defined in <xref target="RFC1035"/> is not needed.</t>
        <section anchor="request-format">
          <name>Request Format</name>
          <t>When sending a CoAP request, a DoC client <bcp14>MUST</bcp14> include the DNS query in the body of the CoAP request.
As specified in <xref target="RFC8132"/> Section 2.3.1, the type of content of the body <bcp14>MUST</bcp14> be indicated using the Content-Format option.
This document specifies the usage of Content-Format "application/dns-message" (details see <xref target="sec_content-format"/>).
A DoC server <bcp14>MUST</bcp14> be able to parse requests of Content-Format "application/dns-message".</t>
        </section>
        <section anchor="sec_req-caching">
          <name>Support of CoAP Caching</name>
          <t>The DoC client <bcp14>SHOULD</bcp14> set the ID field of the DNS header always to 0 to enable a CoAP cache (e.g., a CoAP proxy en-route) to respond to the same DNS queries with a cache entry.
This ensures that the CoAP Cache-Key (see <xref target="RFC8132"/> Section 2) does not change when multiple DNS queries for the same DNS data, carried in CoAP requests, are issued.</t>
        </section>
        <section anchor="examples">
          <name>Examples</name>
          <t>The following example illustrates the usage of a CoAP message to
resolve "example.org. IN AAAA" based on the URI "coaps://[2001:db8::1]/". The
CoAP body is encoded in "application/dns-message" Content Format.</t>
          <artwork><![CDATA[
FETCH coaps://[2001:db8::1]/
Content-Format: application/dns-message
Accept: application/dns-message
Payload: 00 00 01 20 00 02 00 00 00 00 00 00 07 65 78 61 [binary]
         6d 70 6c 65 03 6f 72 67 00 00 1c 00 01 c0 0c 00 [binary]
         01 00 01                                        [binary]
]]></artwork>
        </section>
      </section>
      <section anchor="dns-responses-in-coap-responses">
        <name>DNS Responses in CoAP Responses</name>
        <t>Each DNS query-response pair is mapped to a CoAP REST request-response
operation. DNS responses are provided in the body of the CoAP response.
A DoC server <bcp14>MUST</bcp14> be able to produce responses in the "application/dns-message"
Content-Format (details see <xref target="sec_content-format"/>) when requested.
A DoC client <bcp14>MUST</bcp14> understand responses in "application/dns-message" format
when it does not send an Accept option.
Any other response format than "application/dns-message" <bcp14>MUST</bcp14> be indicated with
the Content-Format option by the DoC server.</t>
        <section anchor="response-codes-and-handling-dns-and-coap-errors">
          <name>Response Codes and Handling DNS and CoAP errors</name>
          <t>A DNS response indicates either success or failure in the Response code of
the DNS header (see <xref target="RFC1035"/> Section 4.1.1). It is <bcp14>RECOMMENDED</bcp14> that
CoAP responses that carry any valid DNS response use a "2.05 Content"
response code.</t>
          <t>CoAP responses use non-successful response codes <bcp14>MUST NOT</bcp14> contain a DNS response
and <bcp14>MUST</bcp14> only be used on errors in the CoAP layer or when a request does not
fulfill the requirements of the DoC protocol.</t>
          <t>Communication errors with a DNS server (e.g., timeouts) <bcp14>SHOULD</bcp14> be indicated
by including a SERVFAIL DNS response in a successful CoAP response.</t>
          <t>A DoC client might try to repeat a non-successful exchange unless otherwise prohibited.
The DoC client might also decide to repeat a non-successful exchange with a different URI, for instance, when the response indicates an unsupported Content-Format.</t>
        </section>
        <section anchor="sec_resp-caching">
          <name>Support of CoAP Caching</name>
          <t>The DoC server <bcp14>MUST</bcp14> ensure that any sum of the Max-Age value of a CoAP response and any TTL in the
DNS response is less or equal to the corresponding TTL received from an upstream DNS server.
This also includes the default Max-Age value of 60 seconds (see <xref target="RFC7252"/>, section 5.10.5) when no Max-Age option is provided.
The DoC client <bcp14>MUST</bcp14> then add the Max-Age value of the carrying CoAP response to all TTLs in a DNS response on reception and use these calculated TTLs for the associated records.</t>
          <t>The <bcp14>RECOMMENDED</bcp14> algorithm to assure the requirement for the DoC is to set the Max-Age option of a response to the minimum TTL of a DNS response and to subtract this value from all TTLs of that DNS response.
This prevents expired records unintentionally being served from an intermediate CoAP cache.
Additionally, it allows for the ETag value for cache validation, if it is based on the content of the response, not to change even if the TTL values are updated by an upstream DNS cache.
If only one record set per DNS response is assumed, a simplification of this algorithm is to just set all TTLs in the response to 0 and set the TTLs at the DoC client to the value of the Max-Age option.</t>
          <!--
With short responses, a usable ETag might be almost as long as the response.
With long-lived responses, the client does not need to revalidate often.
With responses large enough to be fragmented,
it's best practice for servers to set an ETag anyway.
As specified in {{RFC7252}} and {{RFC8132}}, if the response associated with
the ETag is still valid, the response uses the "2.03 Valid" code and consequently
carries no payload.
-->

</section>
        <section anchor="examples-1">
          <name>Examples</name>
          <t>The following examples illustrate the replies to the query "example.org. IN
AAAA record", recursion turned on. Successful responses carry one answer
record including address 2001:db8:1::1:2:3:4 and TTL 58719.</t>
          <t>A successful response:</t>
          <artwork><![CDATA[
2.05 Content
Content-Format: application/dns-message
Max-Age: 58719
Payload: 00 00 81 a0 00 01 00 01 00 00 00 00 07 65 78 61 [binary]
         6d 70 6c 65 03 6f 72 67 00 00 1c 00 01 c0 0c 00 [binary]
         1c 00 01 00 01 37 49 00 10 20 01 0d b8 00 01 00 [binary]
         00 00 01 00 02 00 03 00 04                      [binary]
]]></artwork>
          <t>When a DNS error (SERVFAIL in this case) is noted in the DNS response, the CoAP
response still indicates success:</t>
          <artwork><![CDATA[
2.05 Content
Content-Format: application/dns-message
Payload: 00 00 81 a2 00 01 00 00 00 00 00 00 07 65 78 61 [binary]
         6d 70 6c 65 03 6f 72 67 00 00 1c 00 01          [binary]
]]></artwork>
          <t>When an error occurs on the CoAP layer, the DoC server <bcp14>SHOULD</bcp14> respond with
an appropriate CoAP error, for instance "4.15 Unsupported Content-Format"
if the Content-Format option in the request was not set to
"application/dns-message" and the Content-Format is not otherwise supported by
the server.</t>
        </section>
      </section>
    </section>
    <section anchor="coapcore-integration">
      <name>CoAP/CoRE Integration</name>
      <section anchor="dns-push">
        <name>DNS Push</name>
        <t>DNS Push requires additional overhead, which conflicts with constrained resources,
This is the reason why it is <bcp14>RECOMMENDED</bcp14> to use CoAP Observe <xref target="RFC7641"/> instead of DNS Push
in the DoC domain.</t>
        <t>If the CoAP request indicates that the DoC client wants to observe a resource record, a DoC server
<bcp14>MAY</bcp14> use a DNS Subscribe message <xref target="RFC8765"/> instead of a classic DNS query to fetch the
information on behalf of a DoC client.
If this is not supported by the DoC server, it <bcp14>MUST</bcp14> act as if the resource were not observable.</t>
        <t>Whenever the DoC server receives a DNS Push message <xref target="RFC8765"/> from the DNS
infrastructure for an observed resource record, the DoC server sends an appropriate Observe response
to the DoC client.</t>
        <t>If no more DoC clients observe a resource record for which the DoC server has an open subscription,
the DoC server <bcp14>MUST</bcp14> use a DNS Unsubscribe message <xref target="RFC8765"/> to close its subscription to the
resource record as well.</t>
      </section>
      <section anchor="oscore">
        <name>OSCORE</name>
        <t>It is <bcp14>RECOMMENDED</bcp14> to carry DNS messages end-to-end encrypted using OSCORE <xref target="RFC8613"/>.
The exchange of the security context is out of scope of this document.</t>
      </section>
    </section>
    <section anchor="sec_unencrypted-coap">
      <name>Considerations for Unencrypted Use</name>
      <t>While not recommended,
DoC can be used without any encryption
(e.g., in very constrained environments where encryption is not possible or necessary).
It can also be used when lower layers provide secure communication between client and server.
In both cases,
potential benefits of
unencrypted DoC usage over classic DNS are e.g. block-wise transfer or alternative CoAP
Content-Formats to overcome link-layer constraints.
For unencrypted DoC usage the ID field <bcp14>MUST</bcp14> not be set to a fixed value as suggested in
<xref target="sec_req-caching"/>, but changed with every query.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>When using unencrypted CoAP (see <xref target="sec_unencrypted-coap"/>), setting the ID of a DNS message to 0 as
specified in <xref target="sec_req-caching"/> opens the DNS cache of a DoC client to cache poisoning attacks via
response spoofing.
Because of that, this documents requires the ID to be changed with every query when CoAP is not
secured (see <xref target="sec_unencrypted-coap"/>).</t>
      <t>For encrypted usage with DTLS or OSCORE the impact of a fixed ID on security is limited, as both
harden against injecting spoofed responses.
Consequently, it is of little concern to leverage the benefits of CoAP caching by setting the ID to
0.</t>
      <t>TODO more security</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="new-applicationdns-message-content-format">
        <name>New "application/dns-message" Content-Format</name>
        <t>IANA is requested to assign CoAP Content-Format ID for the DNS message media
type in the "CoAP Content-Formats" sub-registry, within the "CoRE Parameters"
registry <xref target="RFC7252"/>, corresponding to the "application/dns-message" media
type from the "Media Types" registry:</t>
        <t>Media-Type: application/dns-message</t>
        <t>Encoding: -</t>
        <t>Id: TBD</t>
        <t>Reference: [TBD-this-spec]</t>
      </section>
      <section anchor="new-coredns-resource-type">
        <name>New "core.dns" Resource Type</name>
        <t>IANA is requested to assign a new Resource Type (rt=) Link Target Attribute, "core.dns" in the
"Resource Type (rt=) Link Target Attribute Values" sub-registry, within the "CoRE Parameters"
register <xref target="RFC6690"/>.</t>
        <t>Attribute Value: core.dns</t>
        <t>Description: DNS over CoAP resource.</t>
        <t>Reference: [TBD-this-spec] <xref target="selection-of-a-doc-server"/></t>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC1035">
          <front>
            <title>Domain names - implementation and specification</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris">
              <organization/>
            </author>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System.  It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1035"/>
          <seriesInfo name="DOI" value="10.17487/RFC1035"/>
        </reference>
        <reference anchor="RFC7228">
          <front>
            <title>Terminology for Constrained-Node Networks</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <author fullname="M. Ersue" initials="M." surname="Ersue">
              <organization/>
            </author>
            <author fullname="A. Keranen" initials="A." surname="Keranen">
              <organization/>
            </author>
            <date month="May" year="2014"/>
            <abstract>
              <t>The Internet Protocol Suite is increasingly used on small devices with severe constraints on power, memory, and processing resources, creating constrained-node networks.  This document provides a number of basic terms that have been useful in the standardization work for constrained-node networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7228"/>
          <seriesInfo name="DOI" value="10.17487/RFC7228"/>
        </reference>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby">
              <organization/>
            </author>
            <author fullname="K. Hartke" initials="K." surname="Hartke">
              <organization/>
            </author>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks.  The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s.  The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types.  CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC7641">
          <front>
            <title>Observing Resources in the Constrained Application Protocol (CoAP)</title>
            <author fullname="K. Hartke" initials="K." surname="Hartke">
              <organization/>
            </author>
            <date month="September" year="2015"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a RESTful application protocol for constrained nodes and networks.  The state of a resource on a CoAP server can change over time.  This document specifies a simple protocol extension for CoAP that enables CoAP clients to "observe" resources, i.e., to retrieve a representation of a resource and keep this representation updated by the server over a period of time.  The protocol follows a best-effort approach for sending new representations to clients and provides eventual consistency between the state observed by each client and the actual resource state at the server.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7641"/>
          <seriesInfo name="DOI" value="10.17487/RFC7641"/>
        </reference>
        <reference anchor="RFC7959">
          <front>
            <title>Block-Wise Transfers in the Constrained Application Protocol (CoAP)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <author fullname="Z. Shelby" initials="Z." role="editor" surname="Shelby">
              <organization/>
            </author>
            <date month="August" year="2016"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a RESTful transfer protocol for constrained nodes and networks.  Basic CoAP messages work well for small payloads from sensors and actuators; however, applications will need to transfer larger payloads occasionally -- for instance, for firmware updates.  In contrast to HTTP, where TCP does the grunt work of segmenting and resequencing, CoAP is based on datagram transports such as UDP or Datagram Transport Layer Security (DTLS).  These transports only offer fragmentation, which is even more problematic in constrained nodes and networks, limiting the maximum size of resource representations that can practically be transferred.</t>
              <t>Instead of relying on IP fragmentation, this specification extends basic CoAP with a pair of "Block" options for transferring multiple blocks of information from a resource representation in multiple request-response pairs.  In many important cases, the Block options enable a server to be truly stateless: the server can handle each block transfer separately, with no need for a connection setup or other server-side memory of previous block transfers.  Essentially, the Block options provide a minimal way to transfer larger representations in a block-wise fashion.</t>
              <t>A CoAP implementation that does not support these options generally is limited in the size of the representations that can be exchanged, so there is an expectation that the Block options will be widely used in CoAP implementations.  Therefore, this specification updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7959"/>
          <seriesInfo name="DOI" value="10.17487/RFC7959"/>
        </reference>
        <reference anchor="RFC8132">
          <front>
            <title>PATCH and FETCH Methods for the Constrained Application Protocol (CoAP)</title>
            <author fullname="P. van der Stok" initials="P." surname="van der Stok">
              <organization/>
            </author>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <author fullname="A. Sehgal" initials="A." surname="Sehgal">
              <organization/>
            </author>
            <date month="April" year="2017"/>
            <abstract>
              <t>The methods defined in RFC 7252 for the Constrained Application Protocol (CoAP) only allow access to a complete resource, not to parts of a resource.  In case of resources with larger or complex data, or in situations where resource continuity is required, replacing or requesting the whole resource is undesirable.  Several applications using CoAP need to access parts of the resources.</t>
              <t>This specification defines the new CoAP methods, FETCH, PATCH, and iPATCH, which are used to access and update parts of a resource.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8132"/>
          <seriesInfo name="DOI" value="10.17487/RFC8132"/>
        </reference>
        <reference anchor="RFC8613">
          <front>
            <title>Object Security for Constrained RESTful Environments (OSCORE)</title>
            <author fullname="G. Selander" initials="G." surname="Selander">
              <organization/>
            </author>
            <author fullname="J. Mattsson" initials="J." surname="Mattsson">
              <organization/>
            </author>
            <author fullname="F. Palombini" initials="F." surname="Palombini">
              <organization/>
            </author>
            <author fullname="L. Seitz" initials="L." surname="Seitz">
              <organization/>
            </author>
            <date month="July" year="2019"/>
            <abstract>
              <t>This document defines Object Security for Constrained RESTful Environments (OSCORE), a method for application-layer protection of the Constrained Application Protocol (CoAP), using CBOR Object Signing and Encryption (COSE).  OSCORE provides end-to-end protection between endpoints communicating using CoAP or CoAP-mappable HTTP. OSCORE is designed for constrained nodes and networks supporting a range of proxy operations, including translation between different transport protocols.</t>
              <t>Although an optional functionality of CoAP, OSCORE alters CoAP options processing and IANA registration.  Therefore, this document updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8613"/>
          <seriesInfo name="DOI" value="10.17487/RFC8613"/>
        </reference>
        <reference anchor="RFC9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
              <organization/>
            </author>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu">
              <organization/>
            </author>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability.  Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee">
              <organization/>
            </author>
            <author fullname="R. Fielding" initials="R." surname="Fielding">
              <organization/>
            </author>
            <author fullname="L. Masinter" initials="L." surname="Masinter">
              <organization/>
            </author>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource.  This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet.  The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier.  This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC6690">
          <front>
            <title>Constrained RESTful Environments (CoRE) Link Format</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby">
              <organization/>
            </author>
            <date month="August" year="2012"/>
            <abstract>
              <t>This specification defines Web Linking using a link format for use by constrained web servers to describe hosted resources, their attributes, and other relationships between links.  Based on the HTTP Link Header field defined in RFC 5988, the Constrained RESTful Environments (CoRE) Link Format is carried as a payload and is assigned an Internet media type.  "RESTful" refers to the Representational State Transfer (REST) architecture.  A well-known URI is defined as a default entry point for requesting the links hosted by a server.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6690"/>
          <seriesInfo name="DOI" value="10.17487/RFC6690"/>
        </reference>
        <reference anchor="RFC8765">
          <front>
            <title>DNS Push Notifications</title>
            <author fullname="T. Pusateri" initials="T." surname="Pusateri">
              <organization/>
            </author>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire">
              <organization/>
            </author>
            <date month="June" year="2020"/>
            <abstract>
              <t>The Domain Name System (DNS) was designed to return matching records efficiently for queries for data that are relatively static.  When those records change frequently, DNS is still efficient at returning the updated results when polled, as long as the polling rate is not too high. But, there exists no mechanism for a client to be asynchronously notified when these changes occur.  This document defines a mechanism for a client to be notified of such changes to DNS records, called DNS Push Notifications.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8765"/>
          <seriesInfo name="DOI" value="10.17487/RFC8765"/>
        </reference>
        <reference anchor="RFC8094">
          <front>
            <title>DNS over Datagram Transport Layer Security (DTLS)</title>
            <author fullname="T. Reddy" initials="T." surname="Reddy">
              <organization/>
            </author>
            <author fullname="D. Wing" initials="D." surname="Wing">
              <organization/>
            </author>
            <author fullname="P. Patil" initials="P." surname="Patil">
              <organization/>
            </author>
            <date month="February" year="2017"/>
            <abstract>
              <t>DNS queries and responses are visible to network elements on the path between the DNS client and its server.  These queries and responses can contain privacy-sensitive information, which is valuable to protect.</t>
              <t>This document proposes the use of Datagram Transport Layer Security (DTLS) for DNS, to protect against passive listeners and certain active attacks.  As latency is critical for DNS, this proposal also discusses mechanisms to reduce DTLS round trips and reduce the DTLS handshake size.  The proposed mechanism runs over port 853.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8094"/>
          <seriesInfo name="DOI" value="10.17487/RFC8094"/>
        </reference>
        <reference anchor="RFC8484">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <author fullname="P. McManus" initials="P." surname="McManus">
              <organization/>
            </author>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS.  Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="RFC9176">
          <front>
            <title>Constrained RESTful Environments (CoRE) Resource Directory</title>
            <author fullname="C. Amsüss" initials="C." role="editor" surname="Amsüss">
              <organization/>
            </author>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby">
              <organization/>
            </author>
            <author fullname="M. Koster" initials="M." surname="Koster">
              <organization/>
            </author>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <author fullname="P. van der Stok" initials="P." surname="van der Stok">
              <organization/>
            </author>
            <date month="April" year="2022"/>
            <abstract>
              <t>In many Internet of Things (IoT) applications, direct discovery of resources is not practical due to sleeping nodes or networks where multicast traffic is inefficient. These problems can be solved by employing an entity called a Resource Directory (RD), which contains information about resources held on other servers, allowing lookups to be performed for those resources. The input to an RD is composed of links, and the output is composed of links constructed from the information stored in the RD. This document specifies the web interfaces that an RD supports for web servers to discover the RD and to register, maintain, look up, and remove information on resources. Furthermore, new target attributes useful in conjunction with an RD are defined.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9176"/>
          <seriesInfo name="DOI" value="10.17487/RFC9176"/>
        </reference>
        <reference anchor="RFC9250">
          <front>
            <title>DNS over Dedicated QUIC Connections</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema">
              <organization/>
            </author>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson">
              <organization/>
            </author>
            <author fullname="A. Mankin" initials="A." surname="Mankin">
              <organization/>
            </author>
            <date month="May" year="2022"/>
            <abstract>
              <t>This document describes the use of QUIC to provide transport confidentiality for DNS. The encryption provided by QUIC has similar properties to those provided by TLS, while QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides more efficient packet-loss recovery than UDP. DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC 7858, and latency characteristics similar to classic DNS over UDP. This specification describes the use of DoQ as a general-purpose transport for DNS and includes the use of DoQ for stub to recursive, recursive to authoritative, and zone transfer scenarios.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9250"/>
          <seriesInfo name="DOI" value="10.17487/RFC9250"/>
        </reference>
        <reference anchor="RFC8499">
          <front>
            <title>DNS Terminology</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <author fullname="A. Sullivan" initials="A." surname="Sullivan">
              <organization/>
            </author>
            <author fullname="K. Fujiwara" initials="K." surname="Fujiwara">
              <organization/>
            </author>
            <date month="January" year="2019"/>
            <abstract>
              <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs.  The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has sometimes changed in the decades since the DNS was first defined.  This document gives current definitions for many of the terms used in the DNS in a single document.</t>
              <t>This document obsoletes RFC 7719 and updates RFC 2308.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="219"/>
          <seriesInfo name="RFC" value="8499"/>
          <seriesInfo name="DOI" value="10.17487/RFC8499"/>
        </reference>
        <reference anchor="I-D.ietf-add-dnr">
          <front>
            <title>DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers (DNR)</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dan Wing" initials="D." surname="Wing">
              <organization>Citrix Systems, Inc.</organization>
            </author>
            <author fullname="Neil Cook" initials="N." surname="Cook">
              <organization>Open-Xchange</organization>
            </author>
            <author fullname="Tommy Jensen" initials="T." surname="Jensen">
              <organization>Microsoft</organization>
            </author>
            <date day="13" month="March" year="2023"/>
            <abstract>
              <t>   The document specifies new DHCP and IPv6 Router Advertisement options
   to discover encrypted DNS resolvers (e.g., DNS-over-HTTPS, DNS-over-
   TLS, DNS-over-QUIC).  Particularly, it allows a host to learn an
   authentication domain name together with a list of IP addresses and a
   set of service parameters to reach such encrypted DNS resolvers.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-add-dnr-14"/>
        </reference>
        <reference anchor="I-D.ietf-core-href">
          <front>
            <title>Constrained Resource Identifiers</title>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <date day="6" month="March" year="2023"/>
            <abstract>
              <t>   The Constrained Resource Identifier (CRI) is a complement to the
   Uniform Resource Identifier (URI) that serializes the URI components
   in Concise Binary Object Representation (CBOR) instead of a sequence
   of characters.  This simplifies parsing, comparison and reference
   resolution in environments with severe limitations on processing
   power, code size, and memory size.


   // The present revision -12 of this draft adds a registry that is
   // intended to provide full coverage for representing a URI scheme
   // (and certain text strings used in their place) as negative
   // integers.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-href-12"/>
        </reference>
      </references>
    </references>
    <section anchor="reference-implementations">
      <name>Reference Implementations</name>
      <t>The authors of this document provide two reference implementations,
a <eref target="https://doc.riot-os.org/group__net__gcoap__dns.html">DoC client implementation available in the IoT operating system RIOT</eref> and
a <eref target="https://github.com/anr-bmbf-pivot/aiodnsprox">DoC server implementation in Python</eref>.</t>
    </section>
    <section anchor="change-log">
      <name>Change Log</name>
      <section anchor="since-draft-ietf-core-dns-over-coap-01">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-ietf-core-dns-over-coap-01">draft-ietf-core-dns-over-coap-01</eref></name>
        <ul spacing="normal">
          <li>Specify DoC server role in terms of DNS terminology</li>
          <li>Clarify communication of DoC to DNS infrastructure is agnostic of the transport</li>
          <li>Add subsection on how to implement DNS Push in DoC</li>
          <li>Add appendix on reference implementation</li>
        </ul>
      </section>
      <section anchor="since-draft-ietf-core-dns-over-coap-00">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-ietf-core-dns-over-coap-00">draft-ietf-core-dns-over-coap-00</eref></name>
        <ul spacing="normal">
          <li>SVGify ASCII art</li>
          <li>Move section on "DoC Server Considerations" (was Section 5.1) to its own draft
(<eref target="https://datatracker.ietf.org/doc/draft-lenders-dns-cns/">draft-lenders-dns-cns</eref>)</li>
          <li>Replace layer violating statement for CON with statement of fact</li>
          <li>Add security considerations on ID=0</li>
        </ul>
      </section>
      <section anchor="since-draft-lenders-dns-over-coap-04">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-lenders-dns-over-coap-04">draft-lenders-dns-over-coap-04</eref></name>
        <ul spacing="normal">
          <li>Removed change log of draft-lenders-dns-over-coap</li>
        </ul>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors of this document want to thank Ben Schwartz and Tim Wicinski for their feedback and
comments.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
