<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.1 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-core-dns-over-coap-04" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.2 -->
  <front>
    <title abbrev="DoC">DNS over CoAP (DoC)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-core-dns-over-coap-04"/>
    <author initials="M. S." surname="Lenders" fullname="Martine Sophie Lenders">
      <organization abbrev="TU Dresden">TUD Dresden University of Technology</organization>
      <address>
        <postal>
          <street>Helmholtzstr. 10</street>
          <city>Dresden</city>
          <code>D-01069</code>
          <country>Germany</country>
        </postal>
        <email>martine.lenders@tu-dresden.de</email>
      </address>
    </author>
    <author initials="C." surname="Amsüss" fullname="Christian Amsüss">
      <organization/>
      <address>
        <email>christian@amsuess.com</email>
      </address>
    </author>
    <author initials="C." surname="Gündoğan" fullname="Cenk Gündoğan">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <street>Riesstrasse 25</street>
          <city>Munich</city>
          <code>D-80992</code>
          <country>Germany</country>
        </postal>
        <email>cenk.gundogan@huawei.com</email>
      </address>
    </author>
    <author initials="T. C." surname="Schmidt" fullname="Thomas C. Schmidt">
      <organization>HAW Hamburg</organization>
      <address>
        <postal>
          <street>Berliner Tor 7</street>
          <city>Hamburg</city>
          <code>D-20099</code>
          <country>Germany</country>
        </postal>
        <email>t.schmidt@haw-hamburg.de</email>
      </address>
    </author>
    <author initials="M." surname="Wählisch" fullname="Matthias Wählisch">
      <organization abbrev="TU Dresden &amp; Barkhausen Institut">TUD Dresden University of Technology &amp; Barkhausen Institut</organization>
      <address>
        <postal>
          <street>Helmholtzstr. 10</street>
          <city>Dresden</city>
          <code>D-01069</code>
          <country>Germany</country>
        </postal>
        <email>m.waehlisch@tu-dresden.de</email>
      </address>
    </author>
    <date year="2023" month="October" day="23"/>
    <area>Applications</area>
    <workgroup>CoRE</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 73?>

<t>This document defines a protocol for sending DNS messages over the
Constrained Application Protocol (CoAP). These CoAP messages are protected
by DTLS-Secured CoAP (CoAPS) or Object Security for Constrained RESTful
Environments (OSCORE) to provide encrypted DNS message exchange for
constrained devices in the Internet of Things (IoT).</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Constrained RESTful Environments Working Group mailing list (core@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/core/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/core-wg/draft-dns-over-coap"/>.</t>
    </note>
  </front>
  <middle>
    <?line 81?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document defines DNS over CoAP (DoC), a protocol to send DNS
<xref target="RFC1035"/> queries and get DNS responses over the Constrained Application
Protocol (CoAP) <xref target="RFC7252"/>. Each DNS query-response pair is mapped into a
CoAP message exchange. Each CoAP message is secured by DTLS <xref target="RFC9147"/> or
Object Security for Constrained RESTful Environments (OSCORE) <xref target="RFC8613"/>
to ensure message integrity and confidentiality.</t>
      <t>The application use case of DoC is inspired by DNS over HTTPS <xref target="RFC8484"/>
(DoH). DoC, however, aims for the deployment in the constrained Internet of
Things (IoT), which usually conflicts with the requirements introduced by
HTTPS.
Constrained IoT devices may be restricted in memory, power consumption,
link layer frame sizes, throughput, and latency. They may
only have a handful kilobytes of both RAM and ROM. They may sleep for long
durations of time, after which they need to refresh the named resources they
know about. Name resolution in such scenarios must take into account link
layer frame sizes of only a few hundred bytes, bit rates in the magnitute
of kilobits per second, and latencies of several seconds <xref target="RFC7228"/>.</t>
      <t>To prevent TCP and HTTPS resource requirements, constrained IoT devices
could use DNS over DTLS <xref target="RFC8094"/>. In contrast to DNS over DTLS, DoC
utilizes CoAP features to mitigate drawbacks of datagram-based
communication. These features include: block-wise transfer, which solves
the Path MTU problem of DNS over DTLS (see <xref target="RFC8094"/>, section 5); CoAP
proxies, which provide an additional level of caching; re-use of data
structures for application traffic and DNS information, which saves memory
on constrained devices.</t>
      <t>To prevent resource requirements of DTLS or TLS on top of UDP (e.g.,
introduced by DNS over QUIC <xref target="RFC9250"/>), DoC allows
for lightweight payload encryption based on OSCORE.</t>
      <figure anchor="fig-overview-arch">
        <name>Basic DoC architecture</name>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="224" width="552" viewBox="0 0 552 224" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,96 L 8,144" fill="none" stroke="black"/>
              <path d="M 64,96 L 64,144" fill="none" stroke="black"/>
              <path d="M 208,96 L 208,144" fill="none" stroke="black"/>
              <path d="M 264,96 L 264,144" fill="none" stroke="black"/>
              <path d="M 400,112 L 400,128" fill="none" stroke="black"/>
              <path d="M 544,112 L 544,128" fill="none" stroke="black"/>
              <path d="M 8,96 L 64,96" fill="none" stroke="black"/>
              <path d="M 208,96 L 264,96" fill="none" stroke="black"/>
              <path d="M 416,96 L 528,96" fill="none" stroke="black"/>
              <path d="M 72,112 L 200,112" fill="none" stroke="black"/>
              <path d="M 272,112 L 288,112" fill="none" stroke="black"/>
              <path d="M 304,112 L 320,112" fill="none" stroke="black"/>
              <path d="M 336,112 L 352,112" fill="none" stroke="black"/>
              <path d="M 368,112 L 392,112" fill="none" stroke="black"/>
              <path d="M 72,128 L 200,128" fill="none" stroke="black"/>
              <path d="M 272,128 L 296,128" fill="none" stroke="black"/>
              <path d="M 312,128 L 328,128" fill="none" stroke="black"/>
              <path d="M 344,128 L 360,128" fill="none" stroke="black"/>
              <path d="M 376,128 L 392,128" fill="none" stroke="black"/>
              <path d="M 8,144 L 64,144" fill="none" stroke="black"/>
              <path d="M 208,144 L 264,144" fill="none" stroke="black"/>
              <path d="M 416,144 L 528,144" fill="none" stroke="black"/>
              <path d="M 40,192 L 80,192" fill="none" stroke="black"/>
              <path d="M 192,192 L 224,192" fill="none" stroke="black"/>
              <path d="M 248,192 L 264,192" fill="none" stroke="black"/>
              <path d="M 480,192 L 504,192" fill="none" stroke="black"/>
              <path d="M 32,176 L 40,192" fill="none" stroke="black"/>
              <path d="M 236,168 L 248,192" fill="none" stroke="black"/>
              <path d="M 104,64 L 120,32" fill="none" stroke="black"/>
              <path d="M 224,192 L 236,168" fill="none" stroke="black"/>
              <path d="M 504,192 L 512,176" fill="none" stroke="black"/>
              <path d="M 416,96 C 407.16936,96 400,103.16936 400,112" fill="none" stroke="black"/>
              <path d="M 528,96 C 536.83064,96 544,103.16936 544,112" fill="none" stroke="black"/>
              <path d="M 416,144 C 407.16936,144 400,136.83064 400,128" fill="none" stroke="black"/>
              <path d="M 528,144 C 536.83064,144 544,136.83064 544,128" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="400,112 388,106.4 388,117.6" fill="black" transform="rotate(0,392,112)"/>
              <polygon class="arrowhead" points="280,128 268,122.4 268,133.6" fill="black" transform="rotate(180,272,128)"/>
              <polygon class="arrowhead" points="208,112 196,106.4 196,117.6" fill="black" transform="rotate(0,200,112)"/>
              <polygon class="arrowhead" points="80,128 68,122.4 68,133.6" fill="black" transform="rotate(180,72,128)"/>
              <g class="text">
                <text x="152" y="36">FETCH</text>
                <text x="268" y="36">coaps://[2001:db8::1]/</text>
                <text x="108" y="84">CoAP</text>
                <text x="160" y="84">request</text>
                <text x="108" y="100">[DNS</text>
                <text x="156" y="100">query]</text>
                <text x="304" y="100">DNS</text>
                <text x="344" y="100">query</text>
                <text x="32" y="116">DoC</text>
                <text x="232" y="116">DoC</text>
                <text x="464" y="116">DNS</text>
                <text x="36" y="132">Client</text>
                <text x="236" y="132">Server</text>
                <text x="468" y="132">Infrastructure</text>
                <text x="100" y="148">CoAP</text>
                <text x="156" y="148">response</text>
                <text x="296" y="148">DNS</text>
                <text x="348" y="148">response</text>
                <text x="100" y="164">[DNS</text>
                <text x="160" y="164">response]</text>
                <text x="96" y="196">DNS</text>
                <text x="132" y="196">over</text>
                <text x="172" y="196">CoAP</text>
                <text x="280" y="196">DNS</text>
                <text x="316" y="196">over</text>
                <text x="408" y="196">UDP/HTTPS/QUIC/..</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
              . FETCH coaps://[2001:db8::1]/
             /
            /
           CoAP request
+------+   [DNS query]   +------+   DNS query     .---------------.
| DoC  |---------------->| DoC  |--- --- --- --->|      DNS        |
|Client|<----------------|Server|<--- --- --- ---| Infrastructure  |
+------+  CoAP response  +------+  DNS response   '---------------'
          [DNS response]
   \                        /\                                 /
    '-----DNS over CoAP----'  '--DNS over UDP/HTTPS/QUIC/...--'

]]></artwork>
        </artset>
      </figure>
      <t>The most important components of DoC can be seen in <xref target="fig-overview-arch"/>: A DoC
client tries to resolve DNS information by sending DNS queries carried within
CoAP requests to a DoC server.
That DoC server is a DNS client (i.e., a stub or recursive resolver) that resolves DNS information by using other DNS transports such
as DNS over UDP <xref target="RFC1035"/>, DNS over HTTPS <xref target="RFC8484"/>, or DNS over QUIC <xref target="RFC9250"/> when communicating with the upstream
DNS infrastructure.
Using that information, the DoC server then replies to the queries of the DoC client with DNS
responses carried within CoAP responses.</t>
      <t>Note that this specification is disjunct from DoH since the CoRE-specific FETCH method is used.
This was done to take benefit from having the DNS query in the payload as with POST, but still
having the caching advantages we would gain with GET.
Having the DNS query in the payload means we do not need extra base64 encoding, which would increase
code complexity and message sizes.
We are also able to transfer a query block-wise.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>A server that provides the service specified in this document is called a "DoC
server" to differentiate it from a classic "DNS server".
A DoC server acts either as a DNS stub resolver <xref target="RFC8499"/> or a DNS recursive resolver <xref target="RFC8499"/>.</t>
      <t>A client using the service specified in this document to retrieve the
DNS information is called a "DoC client".</t>
      <t>The term "constrained nodes" is used as defined in <xref target="RFC7228"/>.</t>
      <t>The terms "CoAP payload" and "CoAP body" are used as defined in <xref target="RFC7959"/>, Section 2.</t>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="selection-of-a-doc-server">
      <name>Selection of a DoC Server</name>
      <t>In this document, it is assumed that the DoC client knows the DoC server and the DNS resource at the
DoC server.
Possible options could be manual configuration of a URI <xref target="RFC3986"/> or CRI <xref target="I-D.ietf-core-href"/>,
or automatic configuration, e.g., using a CoRE resource directory
<xref target="RFC9176"/>, DHCP or Router Advertisement options <xref target="I-D.ietf-add-dnr"/>.
Automatic configuration <bcp14>SHOULD</bcp14> only be done from a trusted source.</t>
      <t>TBD DNR Service Parameters + SVCB Resource Records (also see <eref target="https://github.com/core-wg/draft-dns-over-coap/issues/22">#22</eref>):</t>
      <ul spacing="normal">
        <li>
          <t><tt>coap</tt> Exists already in TLS Application-Layer Protocol Negotiation (ALPN) Protocol IDs
registry <xref target="RFC8323"/></t>
        </li>
        <li>
          <t>Never mandated for DTLS, should be kept for CoAP over TLS; DTLS needs its own ALPN ID</t>
        </li>
        <li>
          <t>SVCB: Also needs to considering OSCORE/EDHOC</t>
        </li>
      </ul>
      <t>When discovering the DNS resource through a link mechanism that allows describing a resource type
(e.g., the Resource Type Attribute in <xref target="RFC6690"/>), the resource type "core.dns" can be
used to identify a generic DNS resolver that is available to the client.</t>
      <t>While there is no path specified it is <bcp14>RECOMMENDED</bcp14> to use the root path "/" for the DNS resource to
keep the CoAP requests small.</t>
    </section>
    <section anchor="basic-message-exchange">
      <name>Basic Message Exchange</name>
      <section anchor="sec_content-format">
        <name>The "application/dns-message" Content-Format</name>
        <t>This document defines a CoAP Content-Format number for the Internet media type "application/dns-message" to be the mnemonic 553--based on the port assignment of DNS.
This media type is defined as in <xref target="RFC8484"/> Section 6, i.e., a single DNS message encoded in the DNS on-the-wire format <xref target="RFC1035"/>.
Both DoC client and DoC server <bcp14>MUST</bcp14> be able to parse contents in the "application/dns-message" format.</t>
      </section>
      <section anchor="sec_queries">
        <name>DNS Queries in CoAP Requests</name>
        <t>A DoC client encodes a single DNS query in one or more CoAP request
messages that use the CoAP FETCH <xref target="RFC8132"/> method.
Requests <bcp14>SHOULD</bcp14> include an Accept option to indicate the type of content that can be parsed in the response.</t>
        <t>Since CoAP provides reliability of the message layer (e.g. CON) the retransmission mechanism of the
DNS protocol as defined in <xref target="RFC1035"/> is not needed.</t>
        <section anchor="request-format">
          <name>Request Format</name>
          <t>When sending a CoAP request, a DoC client <bcp14>MUST</bcp14> include the DNS query in the body of the CoAP request.
As specified in <xref target="RFC8132"/> Section 2.3.1, the type of content of the body <bcp14>MUST</bcp14> be indicated using the Content-Format option.
This document specifies the usage of Content-Format "application/dns-message" (details see <xref target="sec_content-format"/>).
A DoC server <bcp14>MUST</bcp14> be able to parse requests of Content-Format "application/dns-message".</t>
        </section>
        <section anchor="sec_req-caching">
          <name>Support of CoAP Caching</name>
          <t>The DoC client <bcp14>SHOULD</bcp14> set the ID field of the DNS header always to 0 to enable a CoAP cache (e.g., a CoAP proxy en-route) to respond to the same DNS queries with a cache entry.
This ensures that the CoAP Cache-Key (see <xref target="RFC8132"/> Section 2) does not change when multiple DNS queries for the same DNS data, carried in CoAP requests, are issued.</t>
        </section>
        <section anchor="examples">
          <name>Examples</name>
          <t>The following example illustrates the usage of a CoAP message to
resolve "example.org. IN AAAA" based on the URI "coaps://[2001:db8::1]/". The
CoAP body is encoded in "application/dns-message" Content Format.</t>
          <artwork><![CDATA[
FETCH coaps://[2001:db8::1]/
Content-Format: application/dns-message
Accept: application/dns-message
Payload: 00 00 01 20 00 02 00 00 00 00 00 00 07 65 78 61 [binary]
         6d 70 6c 65 03 6f 72 67 00 00 1c 00 01 c0 0c 00 [binary]
         01 00 01                                        [binary]
]]></artwork>
        </section>
      </section>
      <section anchor="dns-responses-in-coap-responses">
        <name>DNS Responses in CoAP Responses</name>
        <t>Each DNS query-response pair is mapped to a CoAP REST request-response
operation. DNS responses are provided in the body of the CoAP response.
A DoC server <bcp14>MUST</bcp14> be able to produce responses in the "application/dns-message"
Content-Format (details see <xref target="sec_content-format"/>) when requested.
A DoC client <bcp14>MUST</bcp14> understand responses in "application/dns-message" format
when it does not send an Accept option.
Any other response format than "application/dns-message" <bcp14>MUST</bcp14> be indicated with
the Content-Format option by the DoC server.</t>
        <section anchor="response-codes-and-handling-dns-and-coap-errors">
          <name>Response Codes and Handling DNS and CoAP errors</name>
          <t>A DNS response indicates either success or failure in the Response code of
the DNS header (see <xref target="RFC1035"/> Section 4.1.1). It is <bcp14>RECOMMENDED</bcp14> that
CoAP responses that carry any valid DNS response use a "2.05 Content"
response code.</t>
          <t>CoAP responses use non-successful response codes <bcp14>MUST NOT</bcp14> contain a DNS response
and <bcp14>MUST</bcp14> only be used on errors in the CoAP layer or when a request does not
fulfill the requirements of the DoC protocol.</t>
          <t>Communication errors with a DNS server (e.g., timeouts) <bcp14>SHOULD</bcp14> be indicated
by including a SERVFAIL DNS response in a successful CoAP response.</t>
          <t>A DoC client might try to repeat a non-successful exchange unless otherwise prohibited.
The DoC client might also decide to repeat a non-successful exchange with a different URI, for instance, when the response indicates an unsupported Content-Format.</t>
        </section>
        <section anchor="sec_resp-caching">
          <name>Support of CoAP Caching</name>
          <t>For reliability and energy saving measures content decoupling and thus en-route caching on proxies takes a far greater role than it does, e.g., in HTTP.
Likewise, CoAP utilizes cache validation to refresh stale cache entries without large messages which often uses hashing over the message content for ETag generation.
As such, the approach to guarantee the same cache key for DNS responses as proposed in DoH (<xref target="RFC8484"/>, section 5.1) is not sufficient and needs to be updated so that the TTLs in the response are more often the same regardless of query time.</t>
          <t>The DoC server <bcp14>MUST</bcp14> ensure that any sum of the Max-Age value of a CoAP response and any TTL in the
DNS response is less or equal to the corresponding TTL received from an upstream DNS server.
This also includes the default Max-Age value of 60 seconds (see <xref target="RFC7252"/>, section 5.10.5) when no Max-Age option is provided.
The DoC client <bcp14>MUST</bcp14> then add the Max-Age value of the carrying CoAP response to all TTLs in a DNS response on reception and use these calculated TTLs for the associated records.</t>
          <t>The <bcp14>RECOMMENDED</bcp14> algorithm to assure the requirement for the DoC is to set the Max-Age option of a response to the minimum TTL of a DNS response and to subtract this value from all TTLs of that DNS response.
This prevents expired records unintentionally being served from an intermediate CoAP cache.
Additionally, it allows for the ETag value for cache validation, if it is based on the content of the response, not to change even if the TTL values are updated by an upstream DNS cache.
If only one record set per DNS response is assumed, a simplification of this algorithm is to just set all TTLs in the response to 0 and set the TTLs at the DoC client to the value of the Max-Age option.</t>
          <!--
With short responses, a usable ETag might be almost as long as the response.
With long-lived responses, the client does not need to revalidate often.
With responses large enough to be fragmented,
it's best practice for servers to set an ETag anyway.
As specified in {{RFC7252}} and {{RFC8132}}, if the response associated with
the ETag is still valid, the response uses the "2.03 Valid" code and consequently
carries no payload.
-->

</section>
        <section anchor="examples-1">
          <name>Examples</name>
          <t>The following examples illustrate the replies to the query "example.org. IN
AAAA record", recursion turned on. Successful responses carry one answer
record including address 2001:db8:1::1:2:3:4 and TTL 58719.</t>
          <t>A successful response:</t>
          <artwork><![CDATA[
2.05 Content
Content-Format: application/dns-message
Max-Age: 58719
Payload: 00 00 81 a0 00 01 00 01 00 00 00 00 07 65 78 61 [binary]
         6d 70 6c 65 03 6f 72 67 00 00 1c 00 01 c0 0c 00 [binary]
         1c 00 01 00 01 37 49 00 10 20 01 0d b8 00 01 00 [binary]
         00 00 01 00 02 00 03 00 04                      [binary]
]]></artwork>
          <t>When a DNS error (SERVFAIL in this case) is noted in the DNS response, the CoAP
response still indicates success:</t>
          <artwork><![CDATA[
2.05 Content
Content-Format: application/dns-message
Payload: 00 00 81 a2 00 01 00 00 00 00 00 00 07 65 78 61 [binary]
         6d 70 6c 65 03 6f 72 67 00 00 1c 00 01          [binary]
]]></artwork>
          <t>When an error occurs on the CoAP layer, the DoC server <bcp14>SHOULD</bcp14> respond with
an appropriate CoAP error, for instance "4.15 Unsupported Content-Format"
if the Content-Format option in the request was not set to
"application/dns-message" and the Content-Format is not otherwise supported by
the server.</t>
        </section>
      </section>
    </section>
    <section anchor="coapcore-integration">
      <name>CoAP/CoRE Integration</name>
      <section anchor="dns-push">
        <name>DNS Push</name>
        <t>DNS Push requires additional overhead, which conflicts with constrained resources,
This is the reason why it is <bcp14>RECOMMENDED</bcp14> to use CoAP Observe <xref target="RFC7641"/> instead of DNS Push
in the DoC domain.</t>
        <t>If the CoAP request indicates that the DoC client wants to observe a resource record, a DoC server
<bcp14>MAY</bcp14> use a DNS Subscribe message <xref target="RFC8765"/> instead of a classic DNS query to fetch the
information on behalf of a DoC client.
If this is not supported by the DoC server, it <bcp14>MUST</bcp14> act as if the resource were not observable.</t>
        <t>Whenever the DoC server receives a DNS Push message <xref target="RFC8765"/> from the DNS
infrastructure for an observed resource record, the DoC server sends an appropriate Observe response
to the DoC client.</t>
        <t>If no more DoC clients observe a resource record for which the DoC server has an open subscription,
the DoC server <bcp14>MUST</bcp14> use a DNS Unsubscribe message <xref target="RFC8765"/> to close its subscription to the
resource record as well.</t>
      </section>
      <section anchor="oscore">
        <name>OSCORE</name>
        <t>It is <bcp14>RECOMMENDED</bcp14> to carry DNS messages encrypted using OSCORE <xref target="RFC8613"/> between the DoC client and the DoC server.
The exchange of the security context is out of scope of this document.</t>
      </section>
      <section anchor="mapping-doc-to-doh">
        <name>Mapping DoC to DoH</name>
        <t>This document provides no specification how to map between DoC and DoH, e.g., at a CoAP-HTTP-proxy,
and it is <bcp14>NOT RECOMMENDED</bcp14>.
Rewriting the FETCH method (<xref target="sec_queries"/>) and the TTL rewriting (<xref target="sec_resp-caching"/>) as
specified in this draft would be non-trivial.
It is <bcp14>RECOMMENDED</bcp14> to use a DNS forwarder to map between DoC and DoH, as would be the case for
mapping between any other DNS transport.</t>
      </section>
    </section>
    <section anchor="sec_unencrypted-coap">
      <name>Considerations for Unencrypted Use</name>
      <t>The use of DoC without a security mode of CoAP is <bcp14>NOT RECOMMENDED</bcp14>.
Without a security mode, a large number of possible attacks need to be evaluate in the context of
the application's threat model.
This includes threats that are mitigated even by DNS over UDP:
For example, the random ID of the DNS header afford some protection against off-path cache poisoning
attacks---a threat that might be mitigated by using random large token values in the CoAP request.</t>
    </section>
    <section anchor="implementation-status">
      <name>Implementation Status</name>
      <t>This section records the status of known implementations of the protocol
defined by this specification at the time of posting of this
Internet-Draft, and is based on a proposal described in
<xref target="RFC7942"/>.  The description of implementations in this
section is intended to assist the IETF in its decision processes in
progressing drafts to RFCs.  Please note that the listing of any individual
implementation here does not imply endorsement by the IETF.  Furthermore,
no effort has been spent to verify the information presented here that was
supplied by IETF contributors.  This is not intended as, and must not be
construed to be, a catalog of available implementations or their features.
Readers are advised to note that other implementations may exist.</t>
      <t>According to <xref target="RFC7942"/>, "this will allow reviewers and
working groups to assign due consideration to documents that have the
benefit of running code, which may serve as evidence of valuable
experimentation and feedback that have made the implemented protocols more
mature.  It is up to the individual working groups to use this information
as they see fit".</t>
      <section anchor="doc-client">
        <name>DoC Client</name>
        <t>The authors of this document provide a <eref target="https://doc.riot-os.org/group__net__gcoap__dns.html">DoC client implementation available
in the IoT operating system RIOT</eref>.</t>
        <dl>
          <dt>Level of maturity:</dt>
          <dd>
            <t>production</t>
          </dd>
          <dt>Version compability:</dt>
          <dd>
            <t>draft-ietf-core-dns-over-coap-04</t>
          </dd>
          <dt>License:</dt>
          <dd>
            <t>LGPL-2.1</t>
          </dd>
          <dt>Contact information:</dt>
          <dd>
            <t><tt>Martine Lenders &lt;m.lenders@fu-berlin.de&gt;</tt></t>
          </dd>
          <dt>Last update of this information:</dt>
          <dd>
            <t>October 2023</t>
          </dd>
        </dl>
      </section>
      <section anchor="doc-server">
        <name>DoC Server</name>
        <t>The authors of this document provide a <eref target="https://github.com/anr-bmbf-pivot/aiodnsprox">DoC server implementation in
Python</eref>.</t>
        <dl>
          <dt>Level of maturity:</dt>
          <dd>
            <t>production</t>
          </dd>
          <dt>Version compability:</dt>
          <dd>
            <t>draft-ietf-core-dns-over-coap-04</t>
          </dd>
          <dt>License:</dt>
          <dd>
            <t>MIT</t>
          </dd>
          <dt>Contact information:</dt>
          <dd>
            <t><tt>Martine Lenders &lt;m.lenders@fu-berlin.de&gt;</tt></t>
          </dd>
          <dt>Last update of this information:</dt>
          <dd>
            <t>October 2023</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>When using unencrypted CoAP (see <xref target="sec_unencrypted-coap"/>), setting the ID of a DNS message to 0 as
specified in <xref target="sec_req-caching"/> opens open the DNS cache of a DoC client to cache poisoning attacks
via response spoofing.
This documents requires an unpredictable CoAP token in each DoC query from the client when CoAP is
not secured to mitigate such an attack over DoC (see <xref target="sec_unencrypted-coap"/>).</t>
      <t>For encrypted usage with DTLS or OSCORE the impact of a fixed ID on security is limited, as both
harden against injecting spoofed responses.
Consequently, it is of little concern to leverage the benefits of CoAP caching by setting the ID to
0.</t>
      <t>TODO more security</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="new-applicationdns-message-content-format">
        <name>New "application/dns-message" Content-Format</name>
        <t>IANA is requested to assign CoAP Content-Format ID for the DNS message media
type in the "CoAP Content-Formats" sub-registry, within the "CoRE Parameters"
registry <xref target="RFC7252"/>, corresponding to the "application/dns-message" media
type from the "Media Types" registry:</t>
        <t>Media-Type: application/dns-message</t>
        <t>Encoding: -</t>
        <t>Id: 553</t>
        <t>Reference: [TBD-this-spec]</t>
      </section>
      <section anchor="new-coredns-resource-type">
        <name>New "core.dns" Resource Type</name>
        <t>IANA is requested to assign a new Resource Type (rt=) Link Target Attribute, "core.dns" in the
"Resource Type (rt=) Link Target Attribute Values" sub-registry, within the "CoRE Parameters"
register <xref target="RFC6690"/>.</t>
        <t>Attribute Value: core.dns</t>
        <t>Description: DNS over CoAP resource.</t>
        <t>Reference: [TBD-this-spec] <xref target="selection-of-a-doc-server"/></t>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC1035">
          <front>
            <title>Domain names - implementation and specification</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1035"/>
          <seriesInfo name="DOI" value="10.17487/RFC1035"/>
        </reference>
        <reference anchor="RFC7228">
          <front>
            <title>Terminology for Constrained-Node Networks</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="M. Ersue" initials="M." surname="Ersue"/>
            <author fullname="A. Keranen" initials="A." surname="Keranen"/>
            <date month="May" year="2014"/>
            <abstract>
              <t>The Internet Protocol Suite is increasingly used on small devices with severe constraints on power, memory, and processing resources, creating constrained-node networks. This document provides a number of basic terms that have been useful in the standardization work for constrained-node networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7228"/>
          <seriesInfo name="DOI" value="10.17487/RFC7228"/>
        </reference>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC7641">
          <front>
            <title>Observing Resources in the Constrained Application Protocol (CoAP)</title>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <date month="September" year="2015"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a RESTful application protocol for constrained nodes and networks. The state of a resource on a CoAP server can change over time. This document specifies a simple protocol extension for CoAP that enables CoAP clients to "observe" resources, i.e., to retrieve a representation of a resource and keep this representation updated by the server over a period of time. The protocol follows a best-effort approach for sending new representations to clients and provides eventual consistency between the state observed by each client and the actual resource state at the server.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7641"/>
          <seriesInfo name="DOI" value="10.17487/RFC7641"/>
        </reference>
        <reference anchor="RFC7959">
          <front>
            <title>Block-Wise Transfers in the Constrained Application Protocol (CoAP)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="Z. Shelby" initials="Z." role="editor" surname="Shelby"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a RESTful transfer protocol for constrained nodes and networks. Basic CoAP messages work well for small payloads from sensors and actuators; however, applications will need to transfer larger payloads occasionally -- for instance, for firmware updates. In contrast to HTTP, where TCP does the grunt work of segmenting and resequencing, CoAP is based on datagram transports such as UDP or Datagram Transport Layer Security (DTLS). These transports only offer fragmentation, which is even more problematic in constrained nodes and networks, limiting the maximum size of resource representations that can practically be transferred.</t>
              <t>Instead of relying on IP fragmentation, this specification extends basic CoAP with a pair of "Block" options for transferring multiple blocks of information from a resource representation in multiple request-response pairs. In many important cases, the Block options enable a server to be truly stateless: the server can handle each block transfer separately, with no need for a connection setup or other server-side memory of previous block transfers. Essentially, the Block options provide a minimal way to transfer larger representations in a block-wise fashion.</t>
              <t>A CoAP implementation that does not support these options generally is limited in the size of the representations that can be exchanged, so there is an expectation that the Block options will be widely used in CoAP implementations. Therefore, this specification updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7959"/>
          <seriesInfo name="DOI" value="10.17487/RFC7959"/>
        </reference>
        <reference anchor="RFC8132">
          <front>
            <title>PATCH and FETCH Methods for the Constrained Application Protocol (CoAP)</title>
            <author fullname="P. van der Stok" initials="P." surname="van der Stok"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="A. Sehgal" initials="A." surname="Sehgal"/>
            <date month="April" year="2017"/>
            <abstract>
              <t>The methods defined in RFC 7252 for the Constrained Application Protocol (CoAP) only allow access to a complete resource, not to parts of a resource. In case of resources with larger or complex data, or in situations where resource continuity is required, replacing or requesting the whole resource is undesirable. Several applications using CoAP need to access parts of the resources.</t>
              <t>This specification defines the new CoAP methods, FETCH, PATCH, and iPATCH, which are used to access and update parts of a resource.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8132"/>
          <seriesInfo name="DOI" value="10.17487/RFC8132"/>
        </reference>
        <reference anchor="RFC8613">
          <front>
            <title>Object Security for Constrained RESTful Environments (OSCORE)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Mattsson" initials="J." surname="Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <date month="July" year="2019"/>
            <abstract>
              <t>This document defines Object Security for Constrained RESTful Environments (OSCORE), a method for application-layer protection of the Constrained Application Protocol (CoAP), using CBOR Object Signing and Encryption (COSE). OSCORE provides end-to-end protection between endpoints communicating using CoAP or CoAP-mappable HTTP. OSCORE is designed for constrained nodes and networks supporting a range of proxy operations, including translation between different transport protocols.</t>
              <t>Although an optional functionality of CoAP, OSCORE alters CoAP options processing and IANA registration. Therefore, this document updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8613"/>
          <seriesInfo name="DOI" value="10.17487/RFC8613"/>
        </reference>
        <reference anchor="RFC9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC6690">
          <front>
            <title>Constrained RESTful Environments (CoRE) Link Format</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <date month="August" year="2012"/>
            <abstract>
              <t>This specification defines Web Linking using a link format for use by constrained web servers to describe hosted resources, their attributes, and other relationships between links. Based on the HTTP Link Header field defined in RFC 5988, the Constrained RESTful Environments (CoRE) Link Format is carried as a payload and is assigned an Internet media type. "RESTful" refers to the Representational State Transfer (REST) architecture. A well-known URI is defined as a default entry point for requesting the links hosted by a server. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6690"/>
          <seriesInfo name="DOI" value="10.17487/RFC6690"/>
        </reference>
        <reference anchor="RFC8765">
          <front>
            <title>DNS Push Notifications</title>
            <author fullname="T. Pusateri" initials="T." surname="Pusateri"/>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <date month="June" year="2020"/>
            <abstract>
              <t>The Domain Name System (DNS) was designed to return matching records efficiently for queries for data that are relatively static. When those records change frequently, DNS is still efficient at returning the updated results when polled, as long as the polling rate is not too high. But, there exists no mechanism for a client to be asynchronously notified when these changes occur. This document defines a mechanism for a client to be notified of such changes to DNS records, called DNS Push Notifications.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8765"/>
          <seriesInfo name="DOI" value="10.17487/RFC8765"/>
        </reference>
        <reference anchor="RFC8094">
          <front>
            <title>DNS over Datagram Transport Layer Security (DTLS)</title>
            <author fullname="T. Reddy" initials="T." surname="Reddy"/>
            <author fullname="D. Wing" initials="D." surname="Wing"/>
            <author fullname="P. Patil" initials="P." surname="Patil"/>
            <date month="February" year="2017"/>
            <abstract>
              <t>DNS queries and responses are visible to network elements on the path between the DNS client and its server. These queries and responses can contain privacy-sensitive information, which is valuable to protect.</t>
              <t>This document proposes the use of Datagram Transport Layer Security (DTLS) for DNS, to protect against passive listeners and certain active attacks. As latency is critical for DNS, this proposal also discusses mechanisms to reduce DTLS round trips and reduce the DTLS handshake size. The proposed mechanism runs over port 853.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8094"/>
          <seriesInfo name="DOI" value="10.17487/RFC8094"/>
        </reference>
        <reference anchor="RFC8484">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="RFC9176">
          <front>
            <title>Constrained RESTful Environments (CoRE) Resource Directory</title>
            <author fullname="C. Amsüss" initials="C." role="editor" surname="Amsüss"/>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="M. Koster" initials="M." surname="Koster"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. van der Stok" initials="P." surname="van der Stok"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>In many Internet of Things (IoT) applications, direct discovery of resources is not practical due to sleeping nodes or networks where multicast traffic is inefficient. These problems can be solved by employing an entity called a Resource Directory (RD), which contains information about resources held on other servers, allowing lookups to be performed for those resources. The input to an RD is composed of links, and the output is composed of links constructed from the information stored in the RD. This document specifies the web interfaces that an RD supports for web servers to discover the RD and to register, maintain, look up, and remove information on resources. Furthermore, new target attributes useful in conjunction with an RD are defined.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9176"/>
          <seriesInfo name="DOI" value="10.17487/RFC9176"/>
        </reference>
        <reference anchor="RFC9250">
          <front>
            <title>DNS over Dedicated QUIC Connections</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>This document describes the use of QUIC to provide transport confidentiality for DNS. The encryption provided by QUIC has similar properties to those provided by TLS, while QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides more efficient packet-loss recovery than UDP. DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC 7858, and latency characteristics similar to classic DNS over UDP. This specification describes the use of DoQ as a general-purpose transport for DNS and includes the use of DoQ for stub to recursive, recursive to authoritative, and zone transfer scenarios.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9250"/>
          <seriesInfo name="DOI" value="10.17487/RFC9250"/>
        </reference>
        <reference anchor="RFC8499">
          <front>
            <title>DNS Terminology</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="A. Sullivan" initials="A." surname="Sullivan"/>
            <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
            <date month="January" year="2019"/>
            <abstract>
              <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has sometimes changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
              <t>This document obsoletes RFC 7719 and updates RFC 2308.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="219"/>
          <seriesInfo name="RFC" value="8499"/>
          <seriesInfo name="DOI" value="10.17487/RFC8499"/>
        </reference>
        <reference anchor="RFC7942">
          <front>
            <title>Improving Awareness of Running Code: The Implementation Status Section</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>This document describes a simple process that allows authors of Internet-Drafts to record the status of known implementations by including an Implementation Status section. This will allow reviewers and working groups to assign due consideration to documents that have the benefit of running code, which may serve as evidence of valuable experimentation and feedback that have made the implemented protocols more mature.</t>
              <t>This process is not mandatory. Authors of Internet-Drafts are encouraged to consider using the process for their documents, and working groups are invited to think about applying the process to all of their protocol specifications. This document obsoletes RFC 6982, advancing it to a Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="205"/>
          <seriesInfo name="RFC" value="7942"/>
          <seriesInfo name="DOI" value="10.17487/RFC7942"/>
        </reference>
        <reference anchor="I-D.ietf-add-dnr">
          <front>
            <title>DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers (DNR)</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dan Wing" initials="D." surname="Wing">
              <organization>Citrix Systems, Inc.</organization>
            </author>
            <author fullname="Neil Cook" initials="N." surname="Cook">
              <organization>Open-Xchange</organization>
            </author>
            <author fullname="Tommy Jensen" initials="T." surname="Jensen">
              <organization>Microsoft</organization>
            </author>
            <date day="27" month="April" year="2023"/>
            <abstract>
              <t>   The document specifies new DHCP and IPv6 Router Advertisement options
   to discover encrypted DNS resolvers (e.g., DNS-over-HTTPS, DNS-over-
   TLS, DNS-over-QUIC).  Particularly, it allows a host to learn an
   authentication domain name together with a list of IP addresses and a
   set of service parameters to reach such encrypted DNS resolvers.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-add-dnr-16"/>
        </reference>
        <reference anchor="I-D.ietf-core-href">
          <front>
            <title>Constrained Resource Identifiers</title>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <date day="10" month="July" year="2023"/>
            <abstract>
              <t>   The Constrained Resource Identifier (CRI) is a complement to the
   Uniform Resource Identifier (URI) that represents the URI components
   in Concise Binary Object Representation (CBOR) instead of a sequence
   of characters.  This simplifies parsing, comparison and reference
   resolution in environments with severe limitations on processing
   power, code size, and memory size.


   // (This "cref" paragraph will be removed by the RFC editor:) The
   // present revision -13 of this draft picks up some additional
   // discussion points and is intended as input to the CoRE WG meeting
   // at IETF 117.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-href-13"/>
        </reference>
        <reference anchor="DoC-paper">
          <front>
            <title>Securing Name Resolution in the IoT: DNS over CoAP</title>
            <author fullname="Martine S. Lenders" initials="M." surname="Lenders">
              <organization>Freie Universität Berlin &amp;amp; TU Dresden, Berlin, Germany</organization>
            </author>
            <author fullname="Christian Amsüss" initials="C." surname="Amsüss">
              <organization>Unaffiliated, Vienna, Austria</organization>
            </author>
            <author fullname="Cenk Gündogan" initials="C." surname="Gündogan">
              <organization>Huawei Technologies, Munich, Germany</organization>
            </author>
            <author fullname="Marcin Nawrocki" initials="M." surname="Nawrocki">
              <organization>Freie Universität Berlin &amp;amp; TU Dresden, Berlin, Germany</organization>
            </author>
            <author fullname="Thomas C. Schmidt" initials="T." surname="Schmidt">
              <organization>HAW Hamburg, Hamburg, Germany</organization>
            </author>
            <author fullname="Matthias Wählisch" initials="M." surname="Wählisch">
              <organization>TU Dresden &amp;amp; Barkhausen Institut, Dresden, Germany</organization>
            </author>
            <date month="September" year="2023"/>
          </front>
          <seriesInfo name="Proceedings of the ACM on Networking" value="vol. 1, no. CoNEXT2, pp. 1-25"/>
          <seriesInfo name="DOI" value="10.1145/3609423"/>
          <refcontent>Association for Computing Machinery (ACM)</refcontent>
        </reference>
        <reference anchor="RFC8323">
          <front>
            <title>CoAP (Constrained Application Protocol) over TCP, TLS, and WebSockets</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="S. Lemay" initials="S." surname="Lemay"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="B. Silverajan" initials="B." surname="Silverajan"/>
            <author fullname="B. Raymor" initials="B." role="editor" surname="Raymor"/>
            <date month="February" year="2018"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP), although inspired by HTTP, was designed to use UDP instead of TCP. The message layer of CoAP over UDP includes support for reliable delivery, simple congestion control, and flow control.</t>
              <t>Some environments benefit from the availability of CoAP carried over reliable transports such as TCP or Transport Layer Security (TLS). This document outlines the changes required to use CoAP over TCP, TLS, and WebSockets transports. It also formally updates RFC 7641 for use with these transports and RFC 7959 to enable the use of larger messages over a reliable transport.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8323"/>
          <seriesInfo name="DOI" value="10.17487/RFC8323"/>
        </reference>
      </references>
    </references>
    <?line 499?>

<section anchor="sec_evaluation">
      <name>Evaluation</name>
      <t>The authors of this document presented the design, implementation, and analysis of DoC in their
paper "Securing Name Resolution in the IoT: DNS over CoAP" <xref target="DoC-paper"/>.</t>
    </section>
    <section anchor="change-log">
      <name>Change Log</name>
      <section anchor="since-draft-ietf-core-dns-over-coap-03">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-ietf-core-dns-over-coap-03">draft-ietf-core-dns-over-coap-03</eref></name>
        <ul spacing="normal">
          <li>
            <t>Amended Introduction with short contextualization of constrained environments</t>
          </li>
          <li>
            <t>Add <xref target="sec_evaluation"/> on evaluation</t>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-ietf-core-dns-over-coap-02">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-ietf-core-dns-over-coap-02">draft-ietf-core-dns-over-coap-02</eref></name>
        <ul spacing="normal">
          <li>
            <t>Move implementation details to Implementation Status (in accordance with <xref target="RFC7942"/>)</t>
          </li>
          <li>
            <t>Recommend root path to keep the CoAP options small</t>
          </li>
          <li>
            <t>Set Content-Format for application/dns-message to 553</t>
          </li>
          <li>
            <t>SVCB/DNR: Move to Server Selection Section but leave TBD based on DNSOP discussion for now</t>
          </li>
          <li>
            <t>Clarify that DoC and DoC are disjunct</t>
          </li>
          <li>
            <t>Clarify mapping between DoC and DoH</t>
          </li>
          <li>
            <t>Update considerations on unencrypted use</t>
          </li>
          <li>
            <t>Don't call OSCORE end-to-end encrypted</t>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-ietf-core-dns-over-coap-01">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-ietf-core-dns-over-coap-01">draft-ietf-core-dns-over-coap-01</eref></name>
        <ul spacing="normal">
          <li>
            <t>Specify DoC server role in terms of DNS terminology</t>
          </li>
          <li>
            <t>Clarify communication of DoC to DNS infrastructure is agnostic of the transport</t>
          </li>
          <li>
            <t>Add subsection on how to implement DNS Push in DoC</t>
          </li>
          <li>
            <t>Add appendix on reference implementation</t>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-ietf-core-dns-over-coap-00">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-ietf-core-dns-over-coap-00">draft-ietf-core-dns-over-coap-00</eref></name>
        <ul spacing="normal">
          <li>
            <t>SVGify ASCII art</t>
          </li>
          <li>
            <t>Move section on "DoC Server Considerations" (was Section 5.1) to its own draft
(<eref target="https://datatracker.ietf.org/doc/draft-lenders-dns-cns/">draft-lenders-dns-cns</eref>)</t>
          </li>
          <li>
            <t>Replace layer violating statement for CON with statement of fact</t>
          </li>
          <li>
            <t>Add security considerations on ID=0</t>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-lenders-dns-over-coap-04">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-lenders-dns-over-coap-04">draft-lenders-dns-over-coap-04</eref></name>
        <ul spacing="normal">
          <li>
            <t>Removed change log of draft-lenders-dns-over-coap</t>
          </li>
        </ul>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors of this document want to thank Ben Schwartz and Tim Wicinski for their feedback and
comments.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
