<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-core-dns-over-coap-09" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.2 -->
  <front>
    <title abbrev="DoC">DNS over CoAP (DoC)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-core-dns-over-coap-09"/>
    <author initials="M. S." surname="Lenders" fullname="Martine Sophie Lenders">
      <organization abbrev="TU Dresden">TUD Dresden University of Technology</organization>
      <address>
        <postal>
          <street>Helmholtzstr. 10</street>
          <city>Dresden</city>
          <code>D-01069</code>
          <country>Germany</country>
        </postal>
        <email>martine.lenders@tu-dresden.de</email>
      </address>
    </author>
    <author initials="C." surname="Amsüss" fullname="Christian Amsüss">
      <organization/>
      <address>
        <email>christian@amsuess.com</email>
      </address>
    </author>
    <author initials="C." surname="Gündoğan" fullname="Cenk Gündoğan">
      <organization>NeuralAgent GmbH</organization>
      <address>
        <postal>
          <street>Mies-van-der-Rohe-Straße 6</street>
          <city>Munich</city>
          <code>D-80807</code>
          <country>Germany</country>
        </postal>
        <email>cenk.gundogan@neuralagent.ai</email>
      </address>
    </author>
    <author initials="T. C." surname="Schmidt" fullname="Thomas C. Schmidt">
      <organization>HAW Hamburg</organization>
      <address>
        <postal>
          <street>Berliner Tor 7</street>
          <city>Hamburg</city>
          <code>D-20099</code>
          <country>Germany</country>
        </postal>
        <email>t.schmidt@haw-hamburg.de</email>
      </address>
    </author>
    <author initials="M." surname="Wählisch" fullname="Matthias Wählisch">
      <organization abbrev="TU Dresden &amp; Barkhausen Institut">TUD Dresden University of Technology &amp; Barkhausen Institut</organization>
      <address>
        <postal>
          <street>Helmholtzstr. 10</street>
          <city>Dresden</city>
          <code>D-01069</code>
          <country>Germany</country>
        </postal>
        <email>m.waehlisch@tu-dresden.de</email>
      </address>
    </author>
    <date year="2024" month="October" day="21"/>
    <area>Applications</area>
    <workgroup>CoRE</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 90?>

<t>This document defines a protocol for sending DNS messages over the
Constrained Application Protocol (CoAP). These CoAP messages are protected
by DTLS-Secured CoAP (CoAPS) or Object Security for Constrained RESTful
Environments (OSCORE) to provide encrypted DNS message exchange for
constrained devices in the Internet of Things (IoT).</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Constrained RESTful Environments Working Group mailing list (core@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/core/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/core-wg/draft-dns-over-coap"/>.</t>
    </note>
  </front>
  <middle>
    <?line 98?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document defines DNS over CoAP (DoC), a protocol to send DNS
<xref target="RFC1035"/> queries and get DNS responses over the Constrained Application
Protocol (CoAP) <xref target="RFC7252"/>. Each DNS query-response pair is mapped into a
CoAP message exchange. Each CoAP message is secured by DTLS <xref target="RFC6347"/> <xref target="RFC9147"/> or
Object Security for Constrained RESTful Environments (OSCORE) <xref target="RFC8613"/>
to ensure message integrity and confidentiality.</t>
      <t>The application use case of DoC is inspired by DNS over HTTPS <xref target="RFC8484"/>
(DoH). DoC, however, aims for the deployment in the constrained Internet of
Things (IoT), which usually conflicts with the requirements introduced by
HTTPS.
Constrained IoT devices may be restricted in memory, power consumption,
link layer frame sizes, throughput, and latency. They may
only have a handful kilobytes of both RAM and ROM. They may sleep for long
durations of time, after which they need to refresh the named resources they
know about. Name resolution in such scenarios must take into account link
layer frame sizes of only a few hundred bytes, bit rates in the magnitute
of kilobits per second, and latencies of several seconds <xref target="RFC7228"/>.</t>
      <t>To prevent TCP and HTTPS resource requirements, constrained IoT devices
could use DNS over DTLS <xref target="RFC8094"/>. In contrast to DNS over DTLS, DoC
utilizes CoAP features to mitigate drawbacks of datagram-based
communication. These features include: block-wise transfer, which solves
the Path MTU problem of DNS over DTLS (see <xref target="RFC8094"/>, section 5); CoAP
proxies, which provide an additional level of caching; re-use of data
structures for application traffic and DNS information, which saves memory
on constrained devices.</t>
      <t>To prevent resource requirements of DTLS or TLS on top of UDP (e.g.,
introduced by DNS over QUIC <xref target="RFC9250"/>), DoC allows
for lightweight payload encryption based on OSCORE.</t>
      <figure anchor="fig-overview-arch">
        <name>Basic DoC architecture</name>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="224" width="552" viewBox="0 0 552 224" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,96 L 8,144" fill="none" stroke="black"/>
              <path d="M 64,96 L 64,144" fill="none" stroke="black"/>
              <path d="M 208,96 L 208,144" fill="none" stroke="black"/>
              <path d="M 264,96 L 264,144" fill="none" stroke="black"/>
              <path d="M 400,112 L 400,128" fill="none" stroke="black"/>
              <path d="M 544,112 L 544,128" fill="none" stroke="black"/>
              <path d="M 8,96 L 64,96" fill="none" stroke="black"/>
              <path d="M 208,96 L 264,96" fill="none" stroke="black"/>
              <path d="M 416,96 L 528,96" fill="none" stroke="black"/>
              <path d="M 72,112 L 200,112" fill="none" stroke="black"/>
              <path d="M 272,112 L 288,112" fill="none" stroke="black"/>
              <path d="M 304,112 L 320,112" fill="none" stroke="black"/>
              <path d="M 336,112 L 352,112" fill="none" stroke="black"/>
              <path d="M 368,112 L 392,112" fill="none" stroke="black"/>
              <path d="M 72,128 L 200,128" fill="none" stroke="black"/>
              <path d="M 272,128 L 296,128" fill="none" stroke="black"/>
              <path d="M 312,128 L 328,128" fill="none" stroke="black"/>
              <path d="M 344,128 L 360,128" fill="none" stroke="black"/>
              <path d="M 376,128 L 392,128" fill="none" stroke="black"/>
              <path d="M 8,144 L 64,144" fill="none" stroke="black"/>
              <path d="M 208,144 L 264,144" fill="none" stroke="black"/>
              <path d="M 416,144 L 528,144" fill="none" stroke="black"/>
              <path d="M 40,192 L 80,192" fill="none" stroke="black"/>
              <path d="M 192,192 L 224,192" fill="none" stroke="black"/>
              <path d="M 248,192 L 264,192" fill="none" stroke="black"/>
              <path d="M 480,192 L 504,192" fill="none" stroke="black"/>
              <path d="M 32,176 L 40,192" fill="none" stroke="black"/>
              <path d="M 236,168 L 248,192" fill="none" stroke="black"/>
              <path d="M 104,64 L 120,32" fill="none" stroke="black"/>
              <path d="M 224,192 L 236,168" fill="none" stroke="black"/>
              <path d="M 504,192 L 512,176" fill="none" stroke="black"/>
              <path d="M 416,96 C 407.16936,96 400,103.16936 400,112" fill="none" stroke="black"/>
              <path d="M 528,96 C 536.83064,96 544,103.16936 544,112" fill="none" stroke="black"/>
              <path d="M 416,144 C 407.16936,144 400,136.83064 400,128" fill="none" stroke="black"/>
              <path d="M 528,144 C 536.83064,144 544,136.83064 544,128" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="400,112 388,106.4 388,117.6" fill="black" transform="rotate(0,392,112)"/>
              <polygon class="arrowhead" points="280,128 268,122.4 268,133.6" fill="black" transform="rotate(180,272,128)"/>
              <polygon class="arrowhead" points="208,112 196,106.4 196,117.6" fill="black" transform="rotate(0,200,112)"/>
              <polygon class="arrowhead" points="80,128 68,122.4 68,133.6" fill="black" transform="rotate(180,72,128)"/>
              <g class="text">
                <text x="152" y="36">FETCH</text>
                <text x="268" y="36">coaps://[2001:db8::1]/</text>
                <text x="108" y="84">CoAP</text>
                <text x="160" y="84">request</text>
                <text x="108" y="100">[DNS</text>
                <text x="156" y="100">query]</text>
                <text x="304" y="100">DNS</text>
                <text x="344" y="100">query</text>
                <text x="32" y="116">DoC</text>
                <text x="232" y="116">DoC</text>
                <text x="464" y="116">DNS</text>
                <text x="36" y="132">Client</text>
                <text x="236" y="132">Server</text>
                <text x="468" y="132">Infrastructure</text>
                <text x="100" y="148">CoAP</text>
                <text x="156" y="148">response</text>
                <text x="296" y="148">DNS</text>
                <text x="348" y="148">response</text>
                <text x="100" y="164">[DNS</text>
                <text x="160" y="164">response]</text>
                <text x="96" y="196">DNS</text>
                <text x="132" y="196">over</text>
                <text x="172" y="196">CoAP</text>
                <text x="280" y="196">DNS</text>
                <text x="316" y="196">over</text>
                <text x="408" y="196">UDP/HTTPS/QUIC/..</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
              . FETCH coaps://[2001:db8::1]/
             /
            /
           CoAP request
+------+   [DNS query]   +------+   DNS query     .---------------.
| DoC  |---------------->| DoC  |--- --- --- --->|      DNS        |
|Client|<----------------|Server|<--- --- --- ---| Infrastructure  |
+------+  CoAP response  +------+  DNS response   '---------------'
          [DNS response]
   \                        /\                                 /
    '-----DNS over CoAP----'  '--DNS over UDP/HTTPS/QUIC/...--'

]]></artwork>
        </artset>
      </figure>
      <t>The most important components of DoC can be seen in <xref target="fig-overview-arch"/>: A DoC
client tries to resolve DNS information by sending DNS queries carried within
CoAP requests to a DoC server.
That DoC server is a DNS client (i.e., a stub or recursive resolver) that resolves DNS information by using other DNS transports such
as DNS over UDP <xref target="RFC1035"/>, DNS over HTTPS <xref target="RFC8484"/>, or DNS over QUIC <xref target="RFC9250"/> when communicating with the upstream
DNS infrastructure.
Using that information, the DoC server then replies to the queries of the DoC client with DNS
responses carried within CoAP responses.</t>
      <t>Note that this specification is disjunct from DoH since the CoRE-specific FETCH method is used.
This was done to take benefit from having the DNS query in the payload as with POST, but still
having the caching advantages we would gain with GET.
Having the DNS query in the payload means we do not need extra base64 encoding, which would increase
code complexity and message sizes.
We are also able to transfer a query block-wise.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>A server that provides the service specified in this document is called a "DoC
server" to differentiate it from a classic "DNS server".
A DoC server acts either as a DNS stub resolver <xref target="RFC8499"/> or a DNS recursive resolver <xref target="RFC8499"/>.</t>
      <t>A client using the service specified in this document to retrieve the
DNS information is called a "DoC client".</t>
      <t>The term "constrained nodes" is used as defined in <xref target="RFC7228"/>.</t>
      <t>The terms "CoAP payload" and "CoAP body" are used as defined in <xref target="RFC7959"/>, Section 2.</t>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="sec_doc-server-selection">
      <name>Selection of a DoC Server</name>
      <t>While there is no path specified for the DoC resource, it is <bcp14>RECOMMENDED</bcp14> to use the root path "/"
to keep the CoAP requests small.</t>
      <t>In this document, it is assumed that the DoC client knows the DoC server and the DNS resource at the
DoC server.
Possible options could be manual configuration of a URI <xref target="RFC3986"/> or CRI <xref target="I-D.ietf-core-href"/>,
or automatic configuration, e.g., using a CoRE resource directory
<xref target="RFC9176"/>, DHCP or Router Advertisement options <xref target="RFC9463"/> or discovery of designated resolvers
<xref target="RFC9462"/>.
Automatic configuration <bcp14>SHOULD</bcp14> only be done from a trusted source.</t>
      <section anchor="discovery-by-resource-type">
        <name>Discovery by Resource Type</name>
        <t>When discovering the DNS resource through a link mechanism that allows describing a resource type
(e.g., the Resource Type Attribute in <xref target="RFC6690"/>), the resource type "core.dns" can be
used to identify a generic DNS resolver that is available to the client.</t>
      </section>
      <section anchor="discovery-using-svcb-resource-records-or-dnr">
        <name>Discovery using SVCB Resource Records or DNR</name>
        <t>A DoC server can also be discovered using SVCB Resource Records (RR) <xref target="RFC9460"/>, <xref target="RFC9461"/> or DNR
Service Parameters <xref target="RFC9463"/>.
<xref target="I-D.ietf-core-coap-dtls-alpn"/> provides solutions to discover CoAP over (D)TLS servers using the "alpn" SvcParam.
<xref target="I-D.lenders-core-dnr"/> provides a problem statement for service bindings discovery for OSCORE and EDHOC.
This document specifies "docpath" as
a single-valued SvcParamKey whose value <bcp14>MUST</bcp14> be a CBOR sequence of 0 or more text strings (see
<xref target="RFC8949"/>), delimited by the length of the SvcParamValue field (in octets). If the
SvcParamValue ends within a CBOR text string, the SVCB RR <bcp14>MUST</bcp14> be considered as malformed.
As a text format, e.g., in DNS zone files, the CBOR diagnostic notation (see <xref section="8" sectionFormat="of" target="RFC8949"/>)
of that CBOR sequence can be used.</t>
        <t>Note, that this specifically does not surround the text string sequence with a CBOR array or a
similar CBOR data item. This path format was chosen to coincide with the path representation in CRIs
(<xref target="I-D.ietf-core-href"/>). Furthermore, it is easily transferable into a sequence of CoAP Uri-Path options by
mapping the initial byte of any present CBOR text string (see <xref section="3" sectionFormat="comma" target="RFC8949"/>) into the Option
Delta and Option Length of the CoAP option, provided these CBOR text strings are all of a length
between 0 and 12 octets (see <xref section="3.1" sectionFormat="comma" target="RFC7252"/>). Likewise, it can be transfered into a URI
path-abempty form (see <xref section="3.3" sectionFormat="comma" target="RFC3986"/>) by replacing the initial byte of any present CBOR text
string with the "/" character, provided these CBOR text strings are all of a length lesser than 24
octets and do not contain bytes that need escaping.</t>
        <t>To use the service binding from a SVCB RR, the DoC client <bcp14>MUST</bcp14> send any DoC request to the CoAP
resource identifier constructed from the SvcParams including "docpath". A rough construction
algorithm could be as follows, going through the provided records in order of their priority.</t>
        <ul spacing="normal">
          <li>
            <t>If the "alpn" SvcParam value for the service is "coap", construct a CoAP request for CoAP over TLS,
if it is "co", construct a CoAP request for CoAP over DTLS. Any other SvcParamKeys specifying a
CoAP transport are out of scope of this document.</t>
          </li>
          <li>
            <t>The destination address for the request should be taken from additional information about the
target, e.g. from an AAAA record associated to the target name or from an "ipv6hint" SvcParam
value, or, as a fallback, by querying an address for the target name of the SVCB record.</t>
          </li>
          <li>
            <t>The destination port for the address is taken from the "port" SvcParam value, if present.
Otherwise, take the default port of the CoAP transport.</t>
          </li>
          <li>
            <t>Set the target name of SVCB record in the URI-Host option.</t>
          </li>
          <li>
            <t>For each element in the CBOR sequence of the "docpath" SvcParam value, add a Uri-Path option to
the request.</t>
          </li>
          <li>
            <t>If a "port" SvcParam value is provided or if a port was queried, and if either differs from
the default port of the transport or the destination port selected above, set that port in the
URI-Port option.</t>
          </li>
          <li>
            <t>If the request constructed this way receives a response, use the same SVCB record for construction
of future DoC queries.
If not, or if the endpoint becomes unreachable, repeat with the SVCB record with the next highest
priority.</t>
          </li>
        </ul>
        <t>A more generalized construction algorithm can be found in <xref target="I-D.ietf-core-transport-indication"/>.</t>
      </section>
    </section>
    <section anchor="basic-message-exchange">
      <name>Basic Message Exchange</name>
      <section anchor="sec_content-format">
        <name>The "application/dns-message" Content-Format</name>
        <t>This document defines a CoAP Content-Format number for the Internet media type "application/dns-message" to be the mnemonic 553--based on the port assignment of DNS.
This media type is defined as in <xref target="RFC8484"/> Section 6, i.e., a single DNS message encoded in the DNS on-the-wire format <xref target="RFC1035"/>.
Both DoC client and DoC server <bcp14>MUST</bcp14> be able to parse contents in the "application/dns-message" format.</t>
      </section>
      <section anchor="sec_queries">
        <name>DNS Queries in CoAP Requests</name>
        <t>A DoC client encodes a single DNS query in one or more CoAP request
messages that use the CoAP FETCH <xref target="RFC8132"/> method.
Requests <bcp14>SHOULD</bcp14> include an Accept option to indicate the type of content that can be parsed in the response.</t>
        <t>Since CoAP provides reliability of the message layer (e.g. CON) the retransmission mechanism of the
DNS protocol as defined in <xref target="RFC1035"/> is not needed.</t>
        <section anchor="request-format">
          <name>Request Format</name>
          <t>When sending a CoAP request, a DoC client <bcp14>MUST</bcp14> include the DNS query in the body of the CoAP request.
As specified in <xref target="RFC8132"/> Section 2.3.1, the type of content of the body <bcp14>MUST</bcp14> be indicated using the Content-Format option.
This document specifies the usage of Content-Format "application/dns-message" (details see <xref target="sec_content-format"/>).
A DoC server <bcp14>MUST</bcp14> be able to parse requests of Content-Format "application/dns-message".</t>
        </section>
        <section anchor="sec_req-caching">
          <name>Support of CoAP Caching</name>
          <t>The DoC client <bcp14>SHOULD</bcp14> set the ID field of the DNS header always to 0 to enable a CoAP cache (e.g., a CoAP proxy en-route) to respond to the same DNS queries with a cache entry.
This ensures that the CoAP Cache-Key (see <xref target="RFC8132"/> Section 2) does not change when multiple DNS queries for the same DNS data, carried in CoAP requests, are issued.</t>
        </section>
        <section anchor="examples">
          <name>Examples</name>
          <t>The following example illustrates the usage of a CoAP message to
resolve "example.org. IN AAAA" based on the URI "coaps://[2001:db8::1]/". The
CoAP body is encoded in "application/dns-message" Content Format.</t>
          <artwork><![CDATA[
FETCH coaps://[2001:db8::1]/
Content-Format: application/dns-message
Accept: application/dns-message
Payload: 00 00 01 20 00 02 00 00 00 00 00 00 07 65 78 61 [binary]
         6d 70 6c 65 03 6f 72 67 00 00 1c 00 01 c0 0c 00 [binary]
         01 00 01                                        [binary]
]]></artwork>
        </section>
      </section>
      <section anchor="dns-responses-in-coap-responses">
        <name>DNS Responses in CoAP Responses</name>
        <t>Each DNS query-response pair is mapped to a CoAP REST request-response
operation. DNS responses are provided in the body of the CoAP response.
A DoC server <bcp14>MUST</bcp14> be able to produce responses in the "application/dns-message"
Content-Format (details see <xref target="sec_content-format"/>) when requested.
A DoC client <bcp14>MUST</bcp14> understand responses in "application/dns-message" format
when it does not send an Accept option.
Any other response format than "application/dns-message" <bcp14>MUST</bcp14> be indicated with
the Content-Format option by the DoC server.</t>
        <section anchor="response-codes-and-handling-dns-and-coap-errors">
          <name>Response Codes and Handling DNS and CoAP errors</name>
          <t>A DNS response indicates either success or failure in the Response code of
the DNS header (see <xref target="RFC1035"/> Section 4.1.1). It is <bcp14>RECOMMENDED</bcp14> that
CoAP responses that carry any valid DNS response use a "2.05 Content"
response code.</t>
          <t>CoAP responses use non-successful response codes <bcp14>MUST NOT</bcp14> contain a DNS response
and <bcp14>MUST</bcp14> only be used on errors in the CoAP layer or when a request does not
fulfill the requirements of the DoC protocol.</t>
          <t>Communication errors with a DNS server (e.g., timeouts) <bcp14>SHOULD</bcp14> be indicated
by including a SERVFAIL DNS response in a successful CoAP response.</t>
          <t>A DoC client might try to repeat a non-successful exchange unless otherwise prohibited.
The DoC client might also decide to repeat a non-successful exchange with a different URI, for instance, when the response indicates an unsupported Content-Format.</t>
        </section>
        <section anchor="sec_resp-caching">
          <name>Support of CoAP Caching</name>
          <t>For reliability and energy saving measures content decoupling and thus en-route caching on proxies takes a far greater role than it does, e.g., in HTTP.
Likewise, CoAP utilizes cache validation to refresh stale cache entries without large messages which regularly uses hashing over the message content for ETag generation.
As such, the approach to guarantee the same cache key for DNS responses as proposed in DoH (<xref target="RFC8484"/>, section 5.1) is not sufficient and needs to be updated so that the TTLs in the response are more often the same regardless of query time.</t>
          <t>The DoC server <bcp14>MUST</bcp14> ensure that any sum of the Max-Age value of a CoAP response and any TTL in the
DNS response is less or equal to the corresponding TTL received from an upstream DNS server.
This also includes the default Max-Age value of 60 seconds (see <xref target="RFC7252"/>, section 5.10.5) when no Max-Age option is provided.
The DoC client <bcp14>MUST</bcp14> then add the Max-Age value of the carrying CoAP response to all TTLs in a DNS response on reception and use these calculated TTLs for the associated records.</t>
          <t>The <bcp14>RECOMMENDED</bcp14> algorithm to assure the requirement for the DoC is to set the Max-Age option of a response to the minimum TTL of a DNS response and to subtract this value from all TTLs of that DNS response.
This prevents expired records unintentionally being served from an intermediate CoAP cache.
Additionally, it allows for the ETag value for cache validation, if it is based on the content of the response, not to change even if the TTL values are updated by an upstream DNS cache.
If only one record set per DNS response is assumed, a simplification of this algorithm is to just set all TTLs in the response to 0 and set the TTLs at the DoC client to the value of the Max-Age option.</t>
          <!--
With short responses, a usable ETag might be almost as long as the response.
With long-lived responses, the client does not need to revalidate often.
With responses large enough to be fragmented,
it's best practice for servers to set an ETag anyway.
As specified in {{RFC7252}} and {{RFC8132}}, if the response associated with
the ETag is still valid, the response uses the "2.03 Valid" code and consequently
carries no payload.
-->

</section>
        <section anchor="examples-1">
          <name>Examples</name>
          <t>The following examples illustrate the replies to the query "example.org. IN
AAAA record", recursion turned on. Successful responses carry one answer
record including address 2001:db8:1::1:2:3:4 and TTL 58719.</t>
          <t>A successful response:</t>
          <artwork><![CDATA[
2.05 Content
Content-Format: application/dns-message
Max-Age: 58719
Payload: 00 00 81 a0 00 01 00 01 00 00 00 00 07 65 78 61 [binary]
         6d 70 6c 65 03 6f 72 67 00 00 1c 00 01 c0 0c 00 [binary]
         1c 00 01 00 01 37 49 00 10 20 01 0d b8 00 01 00 [binary]
         00 00 01 00 02 00 03 00 04                      [binary]
]]></artwork>
          <t>When a DNS error (SERVFAIL in this case) is noted in the DNS response, the CoAP
response still indicates success:</t>
          <artwork><![CDATA[
2.05 Content
Content-Format: application/dns-message
Payload: 00 00 81 a2 00 01 00 00 00 00 00 00 07 65 78 61 [binary]
         6d 70 6c 65 03 6f 72 67 00 00 1c 00 01          [binary]
]]></artwork>
          <t>When an error occurs on the CoAP layer, the DoC server <bcp14>SHOULD</bcp14> respond with
an appropriate CoAP error, for instance "4.15 Unsupported Content-Format"
if the Content-Format option in the request was not set to
"application/dns-message" and the Content-Format is not otherwise supported by
the server.</t>
        </section>
      </section>
    </section>
    <section anchor="coapcore-integration">
      <name>CoAP/CoRE Integration</name>
      <section anchor="dns-push">
        <name>DNS Push</name>
        <t>DNS Push requires additional overhead, which conflicts with constrained resources,
This is the reason why it is <bcp14>RECOMMENDED</bcp14> to use CoAP Observe <xref target="RFC7641"/> instead of DNS Push
in the DoC domain.</t>
        <t>If the CoAP request indicates that the DoC client wants to observe a resource record, a DoC server
<bcp14>MAY</bcp14> use a DNS Subscribe message <xref target="RFC8765"/> instead of a classic DNS query to fetch the
information on behalf of a DoC client.
If this is not supported by the DoC server, it <bcp14>MUST</bcp14> act as if the resource were not observable.</t>
        <t>Whenever the DoC server receives a DNS Push message <xref target="RFC8765"/> from the DNS
infrastructure for an observed resource record, the DoC server sends an appropriate Observe response
to the DoC client.</t>
        <t>If no more DoC clients observe a resource record for which the DoC server has an open subscription,
the DoC server <bcp14>MUST</bcp14> use a DNS Unsubscribe message <xref target="RFC8765"/> to close its subscription to the
resource record as well.</t>
      </section>
      <section anchor="oscore">
        <name>OSCORE</name>
        <t>It is <bcp14>RECOMMENDED</bcp14> to carry DNS messages encrypted using OSCORE <xref target="RFC8613"/> between the DoC client
and the DoC server. The establishment and maintenance of the OSCORE Security Context is out of the
scope of this document.</t>
        <t>If cache retrieval of OSCORE responses is desired, it can be achieved, for instance, by using the
method defined in <xref target="I-D.amsuess-core-cachable-oscore"/>. This has, however, implications on message sizes and
security properties, which are compiled in that document.</t>
      </section>
      <section anchor="mapping-doc-to-doh">
        <name>Mapping DoC to DoH</name>
        <t>This document provides no specification how to map between DoC and DoH, e.g., at a CoAP-HTTP-proxy,
and it is <bcp14>NOT RECOMMENDED</bcp14>.
Rewriting the FETCH method (<xref target="sec_queries"/>) and the TTL rewriting (<xref target="sec_resp-caching"/>) as
specified in this draft would be non-trivial.
It is <bcp14>RECOMMENDED</bcp14> to use a DNS forwarder to map between DoC and DoH, as would be the case for
mapping between any other DNS transport.</t>
      </section>
    </section>
    <section anchor="sec_unencrypted-coap">
      <name>Considerations for Unencrypted Use</name>
      <t>The use of DoC without a security mode of CoAP is <bcp14>NOT RECOMMENDED</bcp14>.
Without a security mode, many possible attacks need to be evaluated in the context of
the application's threat model.
This includes threats that are mitigated even by DNS over UDP:
For example, the random ID of the DNS header afford some protection against off-path cache poisoning
attacks---a threat that might be mitigated by using random large token values in the CoAP request.</t>
    </section>
    <section anchor="implementation-status">
      <name>Implementation Status</name>
      <t>This section records the status of known implementations of the protocol
defined by this specification at the time of posting of this
Internet-Draft, and is based on a proposal described in
<xref target="RFC7942"/>.  The description of implementations in this
section is intended to assist the IETF in its decision processes in
progressing drafts to RFCs.  Please note that the listing of any individual
implementation here does not imply endorsement by the IETF.  Furthermore,
no effort has been spent to verify the information presented here that was
supplied by IETF contributors.  This is not intended as, and must not be
construed to be, a catalog of available implementations or their features.
Readers are advised to note that other implementations may exist.</t>
      <t>According to <xref target="RFC7942"/>, "this will allow reviewers and
working groups to assign due consideration to documents that have the
benefit of running code, which may serve as evidence of valuable
experimentation and feedback that have made the implemented protocols more
mature.  It is up to the individual working groups to use this information
as they see fit".</t>
      <section anchor="doc-client">
        <name>DoC Client</name>
        <t>The authors of this document provide a <eref target="https://doc.riot-os.org/group__net__gcoap__dns.html">DoC client implementation available
in the IoT operating system RIOT</eref>.</t>
        <dl>
          <dt>Level of maturity:</dt>
          <dd>
            <t>production</t>
          </dd>
          <dt>Version compability:</dt>
          <dd>
            <t>draft-ietf-core-dns-over-coap-08</t>
          </dd>
          <dt>License:</dt>
          <dd>
            <t>LGPL-2.1</t>
          </dd>
          <dt>Contact information:</dt>
          <dd>
            <t><tt>Martine S. Lenders &lt;martine.lenders@tu-dresden.de&gt;</tt></t>
          </dd>
          <dt>Last update of this information:</dt>
          <dd>
            <t>September 2024</t>
          </dd>
        </dl>
      </section>
      <section anchor="doc-server">
        <name>DoC Server</name>
        <t>The authors of this document provide a <eref target="https://github.com/anr-bmbf-pivot/aiodnsprox">DoC server implementation in
Python</eref>.</t>
        <dl>
          <dt>Level of maturity:</dt>
          <dd>
            <t>production</t>
          </dd>
          <dt>Version compability:</dt>
          <dd>
            <t>draft-ietf-core-dns-over-coap-08</t>
          </dd>
          <dt>License:</dt>
          <dd>
            <t>MIT</t>
          </dd>
          <dt>Contact information:</dt>
          <dd>
            <t><tt>Martine S. Lenders &lt;martine.lenders@tu-dresden.de&gt;</tt></t>
          </dd>
          <dt>Last update of this information:</dt>
          <dd>
            <t>September 2024</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>General CoAP security considerations apply.
Exceeding those in <xref section="11" sectionFormat="of" target="RFC7252"/>,
the request patterns of DoC make it likely that long-lived security contexts are maintained:
<xref target="amp-0rtt"/> goes into more detail on what needs to be done
when those are resumed from a new endpoint.</t>
      <t>When using unencrypted CoAP (see <xref target="sec_unencrypted-coap"/>), setting the ID of a DNS message to 0 as
specified in <xref target="sec_req-caching"/> opens the DNS cache of a DoC client to cache poisoning attacks
via response spoofing.
This document requires an unpredictable CoAP token in each DoC query from the client when CoAP is
not secured to mitigate such an attack over DoC (see <xref target="sec_unencrypted-coap"/>).</t>
      <t>For encrypted usage with DTLS or OSCORE the impact of a fixed ID on security is limited, as both
harden against injecting spoofed responses.
Consequently, it is of little concern to leverage the benefits of CoAP caching by setting the ID to
0.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="new-applicationdns-message-content-format">
        <name>New "application/dns-message" Content-Format</name>
        <t>IANA is requested to assign CoAP Content-Format ID for the DNS message media
type in the "CoAP Content-Formats" sub-registry, within the "CoRE Parameters"
registry <xref target="RFC7252"/>, corresponding to the "application/dns-message" media
type from the "Media Types" registry (see <xref target="RFC8484"/>)</t>
        <t>Content Type: application/dns-message</t>
        <t>Content Coding: -</t>
        <t>Id: 553 (suggested)</t>
        <t>Reference: <xref target="RFC8484"/>[TBD-this-spec, <xref target="sec_content-format"/>]</t>
      </section>
      <section anchor="new-docpath-svcb-service-parameter">
        <name>New "docpath" SVCB Service Parameter</name>
        <t>This document adds the following entry to the Service Parameter Keys (SvcParamKeys) registry in the
DNS Service Bindings (SVCB) registry group.
The definition of this parameter can be found in <xref target="sec_doc-server-selection"/>.</t>
        <table>
          <thead>
            <tr>
              <th align="left">Number</th>
              <th align="left">Name</th>
              <th align="left">Meaning</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">9 (suggested)</td>
              <td align="left">docpath</td>
              <td align="left">DNS over CoAP resource path</td>
              <td align="left">[TBD-this-spec, <xref target="sec_doc-server-selection"/>]</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="new-coredns-resource-type">
        <name>New "core.dns" Resource Type</name>
        <t>IANA is requested to assign a new Resource Type (rt=) Link Target Attribute, "core.dns" in the
"Resource Type (rt=) Link Target Attribute Values" sub-registry, within the "CoRE Parameters"
register <xref target="RFC6690"/>.</t>
        <t>Attribute Value: core.dns</t>
        <t>Description: DNS over CoAP resource.</t>
        <t>Reference: [TBD-this-spec, <xref target="sec_doc-server-selection"/>]</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC1035">
          <front>
            <title>Domain names - implementation and specification</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1035"/>
          <seriesInfo name="DOI" value="10.17487/RFC1035"/>
        </reference>
        <reference anchor="RFC6347">
          <front>
            <title>Datagram Transport Layer Security Version 1.2</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="January" year="2012"/>
            <abstract>
              <t>This document specifies version 1.2 of the Datagram Transport Layer Security (DTLS) protocol. The DTLS protocol provides communications privacy for datagram protocols. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. The DTLS protocol is based on the Transport Layer Security (TLS) protocol and provides equivalent security guarantees. Datagram semantics of the underlying transport are preserved by the DTLS protocol. This document updates DTLS 1.0 to work with TLS version 1.2. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6347"/>
          <seriesInfo name="DOI" value="10.17487/RFC6347"/>
        </reference>
        <reference anchor="RFC7228">
          <front>
            <title>Terminology for Constrained-Node Networks</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="M. Ersue" initials="M." surname="Ersue"/>
            <author fullname="A. Keranen" initials="A." surname="Keranen"/>
            <date month="May" year="2014"/>
            <abstract>
              <t>The Internet Protocol Suite is increasingly used on small devices with severe constraints on power, memory, and processing resources, creating constrained-node networks. This document provides a number of basic terms that have been useful in the standardization work for constrained-node networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7228"/>
          <seriesInfo name="DOI" value="10.17487/RFC7228"/>
        </reference>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC7641">
          <front>
            <title>Observing Resources in the Constrained Application Protocol (CoAP)</title>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <date month="September" year="2015"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a RESTful application protocol for constrained nodes and networks. The state of a resource on a CoAP server can change over time. This document specifies a simple protocol extension for CoAP that enables CoAP clients to "observe" resources, i.e., to retrieve a representation of a resource and keep this representation updated by the server over a period of time. The protocol follows a best-effort approach for sending new representations to clients and provides eventual consistency between the state observed by each client and the actual resource state at the server.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7641"/>
          <seriesInfo name="DOI" value="10.17487/RFC7641"/>
        </reference>
        <reference anchor="RFC7959">
          <front>
            <title>Block-Wise Transfers in the Constrained Application Protocol (CoAP)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="Z. Shelby" initials="Z." role="editor" surname="Shelby"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a RESTful transfer protocol for constrained nodes and networks. Basic CoAP messages work well for small payloads from sensors and actuators; however, applications will need to transfer larger payloads occasionally -- for instance, for firmware updates. In contrast to HTTP, where TCP does the grunt work of segmenting and resequencing, CoAP is based on datagram transports such as UDP or Datagram Transport Layer Security (DTLS). These transports only offer fragmentation, which is even more problematic in constrained nodes and networks, limiting the maximum size of resource representations that can practically be transferred.</t>
              <t>Instead of relying on IP fragmentation, this specification extends basic CoAP with a pair of "Block" options for transferring multiple blocks of information from a resource representation in multiple request-response pairs. In many important cases, the Block options enable a server to be truly stateless: the server can handle each block transfer separately, with no need for a connection setup or other server-side memory of previous block transfers. Essentially, the Block options provide a minimal way to transfer larger representations in a block-wise fashion.</t>
              <t>A CoAP implementation that does not support these options generally is limited in the size of the representations that can be exchanged, so there is an expectation that the Block options will be widely used in CoAP implementations. Therefore, this specification updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7959"/>
          <seriesInfo name="DOI" value="10.17487/RFC7959"/>
        </reference>
        <reference anchor="RFC8132">
          <front>
            <title>PATCH and FETCH Methods for the Constrained Application Protocol (CoAP)</title>
            <author fullname="P. van der Stok" initials="P." surname="van der Stok"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="A. Sehgal" initials="A." surname="Sehgal"/>
            <date month="April" year="2017"/>
            <abstract>
              <t>The methods defined in RFC 7252 for the Constrained Application Protocol (CoAP) only allow access to a complete resource, not to parts of a resource. In case of resources with larger or complex data, or in situations where resource continuity is required, replacing or requesting the whole resource is undesirable. Several applications using CoAP need to access parts of the resources.</t>
              <t>This specification defines the new CoAP methods, FETCH, PATCH, and iPATCH, which are used to access and update parts of a resource.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8132"/>
          <seriesInfo name="DOI" value="10.17487/RFC8132"/>
        </reference>
        <reference anchor="RFC8613">
          <front>
            <title>Object Security for Constrained RESTful Environments (OSCORE)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Mattsson" initials="J." surname="Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <date month="July" year="2019"/>
            <abstract>
              <t>This document defines Object Security for Constrained RESTful Environments (OSCORE), a method for application-layer protection of the Constrained Application Protocol (CoAP), using CBOR Object Signing and Encryption (COSE). OSCORE provides end-to-end protection between endpoints communicating using CoAP or CoAP-mappable HTTP. OSCORE is designed for constrained nodes and networks supporting a range of proxy operations, including translation between different transport protocols.</t>
              <t>Although an optional functionality of CoAP, OSCORE alters CoAP options processing and IANA registration. Therefore, this document updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8613"/>
          <seriesInfo name="DOI" value="10.17487/RFC8613"/>
        </reference>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="I-D.ietf-core-coap-dtls-alpn">
          <front>
            <title>ALPN ID Specification for CoAP over DTLS</title>
            <author fullname="Martine Sophie Lenders" initials="M. S." surname="Lenders">
              <organization>TUD Dresden University of Technology</organization>
            </author>
            <author fullname="Christian Amsüss" initials="C." surname="Amsüss">
         </author>
            <author fullname="Thomas C. Schmidt" initials="T. C." surname="Schmidt">
              <organization>HAW Hamburg</organization>
            </author>
            <author fullname="Matthias Wählisch" initials="M." surname="Wählisch">
              <organization>TUD Dresden University of Technology &amp; Barkhausen Institut</organization>
            </author>
            <date day="5" month="September" year="2024"/>
            <abstract>
              <t>   This document specifies an Application-Layer Protocol Negotiation
   (ALPN) ID for transport-layer-secured CoAP services.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-coap-dtls-alpn-00"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC6690">
          <front>
            <title>Constrained RESTful Environments (CoRE) Link Format</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <date month="August" year="2012"/>
            <abstract>
              <t>This specification defines Web Linking using a link format for use by constrained web servers to describe hosted resources, their attributes, and other relationships between links. Based on the HTTP Link Header field defined in RFC 5988, the Constrained RESTful Environments (CoRE) Link Format is carried as a payload and is assigned an Internet media type. "RESTful" refers to the Representational State Transfer (REST) architecture. A well-known URI is defined as a default entry point for requesting the links hosted by a server. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6690"/>
          <seriesInfo name="DOI" value="10.17487/RFC6690"/>
        </reference>
        <reference anchor="RFC8765">
          <front>
            <title>DNS Push Notifications</title>
            <author fullname="T. Pusateri" initials="T." surname="Pusateri"/>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <date month="June" year="2020"/>
            <abstract>
              <t>The Domain Name System (DNS) was designed to return matching records efficiently for queries for data that are relatively static. When those records change frequently, DNS is still efficient at returning the updated results when polled, as long as the polling rate is not too high. But, there exists no mechanism for a client to be asynchronously notified when these changes occur. This document defines a mechanism for a client to be notified of such changes to DNS records, called DNS Push Notifications.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8765"/>
          <seriesInfo name="DOI" value="10.17487/RFC8765"/>
        </reference>
        <reference anchor="RFC8094">
          <front>
            <title>DNS over Datagram Transport Layer Security (DTLS)</title>
            <author fullname="T. Reddy" initials="T." surname="Reddy"/>
            <author fullname="D. Wing" initials="D." surname="Wing"/>
            <author fullname="P. Patil" initials="P." surname="Patil"/>
            <date month="February" year="2017"/>
            <abstract>
              <t>DNS queries and responses are visible to network elements on the path between the DNS client and its server. These queries and responses can contain privacy-sensitive information, which is valuable to protect.</t>
              <t>This document proposes the use of Datagram Transport Layer Security (DTLS) for DNS, to protect against passive listeners and certain active attacks. As latency is critical for DNS, this proposal also discusses mechanisms to reduce DTLS round trips and reduce the DTLS handshake size. The proposed mechanism runs over port 853.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8094"/>
          <seriesInfo name="DOI" value="10.17487/RFC8094"/>
        </reference>
        <reference anchor="RFC8484">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="RFC9176">
          <front>
            <title>Constrained RESTful Environments (CoRE) Resource Directory</title>
            <author fullname="C. Amsüss" initials="C." role="editor" surname="Amsüss"/>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="M. Koster" initials="M." surname="Koster"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. van der Stok" initials="P." surname="van der Stok"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>In many Internet of Things (IoT) applications, direct discovery of resources is not practical due to sleeping nodes or networks where multicast traffic is inefficient. These problems can be solved by employing an entity called a Resource Directory (RD), which contains information about resources held on other servers, allowing lookups to be performed for those resources. The input to an RD is composed of links, and the output is composed of links constructed from the information stored in the RD. This document specifies the web interfaces that an RD supports for web servers to discover the RD and to register, maintain, look up, and remove information on resources. Furthermore, new target attributes useful in conjunction with an RD are defined.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9176"/>
          <seriesInfo name="DOI" value="10.17487/RFC9176"/>
        </reference>
        <reference anchor="RFC9250">
          <front>
            <title>DNS over Dedicated QUIC Connections</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>This document describes the use of QUIC to provide transport confidentiality for DNS. The encryption provided by QUIC has similar properties to those provided by TLS, while QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides more efficient packet-loss recovery than UDP. DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC 7858, and latency characteristics similar to classic DNS over UDP. This specification describes the use of DoQ as a general-purpose transport for DNS and includes the use of DoQ for stub to recursive, recursive to authoritative, and zone transfer scenarios.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9250"/>
          <seriesInfo name="DOI" value="10.17487/RFC9250"/>
        </reference>
        <reference anchor="RFC8499">
          <front>
            <title>DNS Terminology</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="A. Sullivan" initials="A." surname="Sullivan"/>
            <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
            <date month="January" year="2019"/>
            <abstract>
              <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has sometimes changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
              <t>This document obsoletes RFC 7719 and updates RFC 2308.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8499"/>
          <seriesInfo name="DOI" value="10.17487/RFC8499"/>
        </reference>
        <reference anchor="RFC7942">
          <front>
            <title>Improving Awareness of Running Code: The Implementation Status Section</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>This document describes a simple process that allows authors of Internet-Drafts to record the status of known implementations by including an Implementation Status section. This will allow reviewers and working groups to assign due consideration to documents that have the benefit of running code, which may serve as evidence of valuable experimentation and feedback that have made the implemented protocols more mature.</t>
              <t>This process is not mandatory. Authors of Internet-Drafts are encouraged to consider using the process for their documents, and working groups are invited to think about applying the process to all of their protocol specifications. This document obsoletes RFC 6982, advancing it to a Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="205"/>
          <seriesInfo name="RFC" value="7942"/>
          <seriesInfo name="DOI" value="10.17487/RFC7942"/>
        </reference>
        <reference anchor="RFC9460">
          <front>
            <title>Service Binding and Parameter Specification via the DNS (SVCB and HTTPS Resource Records)</title>
            <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
            <author fullname="M. Bishop" initials="M." surname="Bishop"/>
            <author fullname="E. Nygren" initials="E." surname="Nygren"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies the "SVCB" ("Service Binding") and "HTTPS" DNS resource record (RR) types to facilitate the lookup of information needed to make connections to network services, such as for HTTP origins. SVCB records allow a service to be provided from multiple alternative endpoints, each with associated parameters (such as transport protocol configuration), and are extensible to support future uses (such as keys for encrypting the TLS ClientHello). They also enable aliasing of apex domains, which is not possible with CNAME. The HTTPS RR is a variation of SVCB for use with HTTP (see RFC 9110, "HTTP Semantics"). By providing more information to the client before it attempts to establish a connection, these records offer potential benefits to both performance and privacy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9460"/>
          <seriesInfo name="DOI" value="10.17487/RFC9460"/>
        </reference>
        <reference anchor="RFC9461">
          <front>
            <title>Service Binding Mapping for DNS Servers</title>
            <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>The SVCB DNS resource record type expresses a bound collection of endpoint metadata, for use when establishing a connection to a named service. DNS itself can be such a service, when the server is identified by a domain name. This document provides the SVCB mapping for named DNS servers, allowing them to indicate support for encrypted transport protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9461"/>
          <seriesInfo name="DOI" value="10.17487/RFC9461"/>
        </reference>
        <reference anchor="RFC9462">
          <front>
            <title>Discovery of Designated Resolvers</title>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="E. Kinnear" initials="E." surname="Kinnear"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <author fullname="T. Jensen" initials="T." surname="Jensen"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document defines Discovery of Designated Resolvers (DDR), a set of mechanisms for DNS clients to use DNS records to discover a resolver's encrypted DNS configuration. An Encrypted DNS Resolver discovered in this manner is referred to as a "Designated Resolver". These mechanisms can be used to move from unencrypted DNS to encrypted DNS when only the IP address of a resolver is known. These mechanisms are designed to be limited to cases where Unencrypted DNS Resolvers and their Designated Resolvers are operated by the same entity or cooperating entities. It can also be used to discover support for encrypted DNS protocols when the name of an Encrypted DNS Resolver is known.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9462"/>
          <seriesInfo name="DOI" value="10.17487/RFC9462"/>
        </reference>
        <reference anchor="RFC9463">
          <front>
            <title>DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers (DNR)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="T. Reddy.K" initials="T." role="editor" surname="Reddy.K"/>
            <author fullname="D. Wing" initials="D." surname="Wing"/>
            <author fullname="N. Cook" initials="N." surname="Cook"/>
            <author fullname="T. Jensen" initials="T." surname="Jensen"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies new DHCP and IPv6 Router Advertisement options to discover encrypted DNS resolvers (e.g., DNS over HTTPS, DNS over TLS, and DNS over QUIC). Particularly, it allows a host to learn an Authentication Domain Name together with a list of IP addresses and a set of service parameters to reach such encrypted DNS resolvers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9463"/>
          <seriesInfo name="DOI" value="10.17487/RFC9463"/>
        </reference>
        <reference anchor="I-D.ietf-core-href">
          <front>
            <title>Constrained Resource Identifiers</title>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <date day="24" month="July" year="2024"/>
            <abstract>
              <t>   The Constrained Resource Identifier (CRI) is a complement to the
   Uniform Resource Identifier (URI) that represents the URI components
   in Concise Binary Object Representation (CBOR) instead of in a
   sequence of characters.  This simplifies parsing, comparison, and
   reference resolution in environments with severe limitations on
   processing power, code size, and memory size.

   This RFC updates RFC 7595 to add a note on how the URI Schemes
   registry RFC 7595 describes cooperates with the CRI Scheme Numbers
   registry created by the present RFC.


   // (This "cref" paragraph will be removed by the RFC editor:) The
   // present revision –16 of this draft continues -15 by picking up
   // more comments; it was made specifically for IETF 120.  This
   // revision still contains open issues and is intended to serve as a
   // snapshot.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-href-16"/>
        </reference>
        <reference anchor="I-D.ietf-core-transport-indication">
          <front>
            <title>CoAP Transport Indication</title>
            <author fullname="Christian Amsüss" initials="C." surname="Amsüss">
         </author>
            <author fullname="Martine Sophie Lenders" initials="M. S." surname="Lenders">
              <organization>TUD Dresden University of Technology</organization>
            </author>
            <date day="8" month="July" year="2024"/>
            <abstract>
              <t>   The Constrained Application Protocol (CoAP, [RFC7252]) is available
   over different transports (UDP, DTLS, TCP, TLS, WebSockets), but
   lacks a way to unify these addresses.  This document provides
   terminology and provisions based on Web Linking [RFC8288] to express
   alternative transports available to a device, and to optimize
   exchanges using these.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-transport-indication-06"/>
        </reference>
        <reference anchor="I-D.lenders-core-dnr">
          <front>
            <title>Discovery of Network-designated OSCORE-based Resolvers: Problem Statement</title>
            <author fullname="Martine Sophie Lenders" initials="M. S." surname="Lenders">
              <organization>TUD Dresden University of Technology</organization>
            </author>
            <author fullname="Christian Amsüss" initials="C." surname="Amsüss">
         </author>
            <author fullname="Thomas C. Schmidt" initials="T. C." surname="Schmidt">
              <organization>HAW Hamburg</organization>
            </author>
            <author fullname="Matthias Wählisch" initials="M." surname="Wählisch">
              <organization>TUD Dresden University of Technology &amp; Barkhausen Institut</organization>
            </author>
            <date day="8" month="July" year="2024"/>
            <abstract>
              <t>   This document states problems when designing DNS SVCB records to
   discover endpoints that communicate over Object Security for
   Constrained RESTful Environments (OSCORE) [RFC8613].  As a
   consequence of learning about OSCORE, this discovery will allow a
   host to learn both CoAP servers and DNS over CoAP resolvers that use
   OSCORE to encrypt messages and Ephemeral Diffie-Hellman Over COSE
   (EDHOC) [RFC9528] for key exchange.  Challenges arise because SVCB
   records are not meant to be used to exchange security contexts, which
   is required in OSCORE scenarios.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-lenders-core-dnr-03"/>
        </reference>
        <reference anchor="I-D.amsuess-core-cachable-oscore">
          <front>
            <title>Cacheable OSCORE</title>
            <author fullname="Christian Amsüss" initials="C." surname="Amsüss">
         </author>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE AB</organization>
            </author>
            <date day="8" month="July" year="2024"/>
            <abstract>
              <t>   Group communication with the Constrained Application Protocol (CoAP)
   can be secured end-to-end using Group Object Security for Constrained
   RESTful Environments (Group OSCORE), also across untrusted
   intermediary proxies.  However, this sidesteps the proxies' abilities
   to cache responses from the origin server(s).  This specification
   restores cacheability of protected responses at proxies, by
   introducing consensus requests which any client in a group can send
   to one server or multiple servers in the same group.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-amsuess-core-cachable-oscore-09"/>
        </reference>
        <reference anchor="DoC-paper">
          <front>
            <title>Securing Name Resolution in the IoT: DNS over CoAP</title>
            <author fullname="Martine S. Lenders" initials="M." surname="Lenders">
              <organization>Freie Universität Berlin &amp;amp; TU Dresden, Berlin, Germany</organization>
            </author>
            <author fullname="Christian Amsüss" initials="C." surname="Amsüss">
              <organization>Unaffiliated, Vienna, Austria</organization>
            </author>
            <author fullname="Cenk Gündogan" initials="C." surname="Gündogan">
              <organization>Huawei Technologies, Munich, Germany</organization>
            </author>
            <author fullname="Marcin Nawrocki" initials="M." surname="Nawrocki">
              <organization>Freie Universität Berlin &amp;amp; TU Dresden, Berlin, Germany</organization>
            </author>
            <author fullname="Thomas C. Schmidt" initials="T." surname="Schmidt">
              <organization>HAW Hamburg, Hamburg, Germany</organization>
            </author>
            <author fullname="Matthias Wählisch" initials="M." surname="Wählisch">
              <organization>TU Dresden &amp;amp; Barkhausen Institut, Dresden, Germany</organization>
            </author>
            <date month="September" year="2023"/>
          </front>
          <seriesInfo name="Proceedings of the ACM on Networking" value="vol. 1, no. CoNEXT2, pp. 1-25"/>
          <seriesInfo name="DOI" value="10.1145/3609423"/>
          <refcontent>Association for Computing Machinery (ACM)</refcontent>
        </reference>
        <reference anchor="amp-0rtt" target="https://github.com/core-wg/corrclar/pull/40">
          <front>
            <title>PR #40 "Amplification and 0-RTT" on "CoAP: Corrections and Clarifications"</title>
            <author>
              <organization/>
            </author>
            <date year="2024" month="September" day="25"/>
          </front>
          <annotation>Note: It is expected that that PR will be merged way ahead of this document's publication;
at the next revision, this reference will be replaced with a reference to what will by then most likely be
I-D.ietf-core-corr-clar-00 (now bormann-core-clar-05).</annotation>
        </reference>
      </references>
    </references>
    <?line 578?>

<section anchor="sec_evaluation">
      <name>Evaluation</name>
      <t>The authors of this document presented the design, implementation, and analysis of DoC in their
paper "Securing Name Resolution in the IoT: DNS over CoAP" <xref target="DoC-paper"/>.</t>
    </section>
    <section anchor="change-log">
      <name>Change Log</name>
      <section anchor="since-draft-ietf-core-dns-over-coap-08">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-ietf-core-dns-over-coap-08">draft-ietf-core-dns-over-coap-08</eref></name>
        <ul spacing="normal">
          <li>
            <t>Update Cenk's Affiliation</t>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-ietf-core-dns-over-coap-07">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-ietf-core-dns-over-coap-07">draft-ietf-core-dns-over-coap-07</eref></name>
        <ul spacing="normal">
          <li>
            <t>Address IANA early review #1368678</t>
          </li>
          <li>
            <t>Update normative reference to CoAP over DTLS alpn SvcParam</t>
          </li>
          <li>
            <t>Add missing DTLSv1.2 reference</t>
          </li>
          <li>
            <t>Security considerations: Point into corr-clar-future</t>
          </li>
          <li>
            <t>Implementation Status: Update to current version</t>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-ietf-core-dns-over-coap-06">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-ietf-core-dns-over-coap-06">draft-ietf-core-dns-over-coap-06</eref></name>
        <ul spacing="normal">
          <li>
            <t>Add "docpath" SVCB ParamKey definition</t>
          </li>
          <li>
            <t>IANA fixes
            </t>
            <ul spacing="normal">
              <li>
                <t>Use new column names (see Errata 4954)</t>
              </li>
              <li>
                <t>Add reference to RFC 8484 for application/dns-message Media Type</t>
              </li>
              <li>
                <t>IANA: unify self references</t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-ietf-core-dns-over-coap-05">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-ietf-core-dns-over-coap-05">draft-ietf-core-dns-over-coap-05</eref></name>
        <ul spacing="normal">
          <li>
            <t>Add references to relevant SVCB/DNR RFCs and drafts</t>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-ietf-core-dns-over-coap-04">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-ietf-core-dns-over-coap-04">draft-ietf-core-dns-over-coap-04</eref></name>
        <ul spacing="normal">
          <li>
            <t>Add note on cachable OSCORE</t>
          </li>
          <li>
            <t>Address early IANA review</t>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-ietf-core-dns-over-coap-03">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-ietf-core-dns-over-coap-03">draft-ietf-core-dns-over-coap-03</eref></name>
        <ul spacing="normal">
          <li>
            <t>Amended Introduction with short contextualization of constrained environments</t>
          </li>
          <li>
            <t>Add <xref target="sec_evaluation"/> on evaluation</t>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-ietf-core-dns-over-coap-02">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-ietf-core-dns-over-coap-02">draft-ietf-core-dns-over-coap-02</eref></name>
        <ul spacing="normal">
          <li>
            <t>Move implementation details to Implementation Status (in accordance with <xref target="RFC7942"/>)</t>
          </li>
          <li>
            <t>Recommend root path to keep the CoAP options small</t>
          </li>
          <li>
            <t>Set Content-Format for application/dns-message to 553</t>
          </li>
          <li>
            <t>SVCB/DNR: Move to Server Selection Section but leave TBD based on DNSOP discussion for now</t>
          </li>
          <li>
            <t>Clarify that DoC and DoC are disjunct</t>
          </li>
          <li>
            <t>Clarify mapping between DoC and DoH</t>
          </li>
          <li>
            <t>Update considerations on unencrypted use</t>
          </li>
          <li>
            <t>Don't call OSCORE end-to-end encrypted</t>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-ietf-core-dns-over-coap-01">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-ietf-core-dns-over-coap-01">draft-ietf-core-dns-over-coap-01</eref></name>
        <ul spacing="normal">
          <li>
            <t>Specify DoC server role in terms of DNS terminology</t>
          </li>
          <li>
            <t>Clarify communication of DoC to DNS infrastructure is agnostic of the transport</t>
          </li>
          <li>
            <t>Add subsection on how to implement DNS Push in DoC</t>
          </li>
          <li>
            <t>Add appendix on reference implementation</t>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-ietf-core-dns-over-coap-00">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-ietf-core-dns-over-coap-00">draft-ietf-core-dns-over-coap-00</eref></name>
        <ul spacing="normal">
          <li>
            <t>SVGify ASCII art</t>
          </li>
          <li>
            <t>Move section on "DoC Server Considerations" (was Section 5.1) to its own draft
(<eref target="https://datatracker.ietf.org/doc/draft-lenders-dns-cns/">draft-lenders-dns-cns</eref>)</t>
          </li>
          <li>
            <t>Replace layer violating statement for CON with statement of fact</t>
          </li>
          <li>
            <t>Add security considerations on ID=0</t>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-lenders-dns-over-coap-04">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-lenders-dns-over-coap-04">draft-lenders-dns-over-coap-04</eref></name>
        <ul spacing="normal">
          <li>
            <t>Removed change log of draft-lenders-dns-over-coap</t>
          </li>
        </ul>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors of this document want to thank Carsten Bormann, Ben Schwartz, Marco Tiloca, and Tim
Wicinski for their feedback and comments.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
