<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.27 (Ruby 3.3.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-core-dns-over-coap-14" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.1 -->
  <?v3xml2rfc silence="Found SVG with width or height specified"?>
  <front>
    <title abbrev="DoC">DNS over CoAP (DoC)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-core-dns-over-coap-14"/>
    <author initials="M. S." surname="Lenders" fullname="Martine Sophie Lenders">
      <organization abbrev="TU Dresden">TUD Dresden University of Technology</organization>
      <address>
        <postal>
          <street>Helmholtzstr. 10</street>
          <city>Dresden</city>
          <code>D-01069</code>
          <country>Germany</country>
        </postal>
        <email>martine.lenders@tu-dresden.de</email>
      </address>
    </author>
    <author initials="C." surname="Amsüss" fullname="Christian Amsüss">
      <organization/>
      <address>
        <email>christian@amsuess.com</email>
      </address>
    </author>
    <author initials="C." surname="Gündoğan" fullname="Cenk Gündoğan">
      <organization>NeuralAgent GmbH</organization>
      <address>
        <postal>
          <street>Mies-van-der-Rohe-Straße 6</street>
          <city>Munich</city>
          <code>D-80807</code>
          <country>Germany</country>
        </postal>
        <email>cenk.gundogan@neuralagent.ai</email>
      </address>
    </author>
    <author initials="T. C." surname="Schmidt" fullname="Thomas C. Schmidt">
      <organization>HAW Hamburg</organization>
      <address>
        <postal>
          <street>Berliner Tor 7</street>
          <city>Hamburg</city>
          <code>D-20099</code>
          <country>Germany</country>
        </postal>
        <email>t.schmidt@haw-hamburg.de</email>
      </address>
    </author>
    <author initials="M." surname="Wählisch" fullname="Matthias Wählisch">
      <organization abbrev="TU Dresden &amp; Barkhausen Institut">TUD Dresden University of Technology &amp; Barkhausen Institut</organization>
      <address>
        <postal>
          <street>Helmholtzstr. 10</street>
          <city>Dresden</city>
          <code>D-01069</code>
          <country>Germany</country>
        </postal>
        <email>m.waehlisch@tu-dresden.de</email>
      </address>
    </author>
    <date year="2025" month="April" day="03"/>
    <area>Applications</area>
    <workgroup>CoRE</workgroup>
    <keyword>Internet-Draft</keyword>
    <keyword>CoRE</keyword>
    <keyword>CoAP</keyword>
    <keyword>DNS</keyword>
    <abstract>
      <?line 102?>

<t>This document defines a protocol for exchanging DNS messages over the
Constrained Application Protocol (CoAP). These CoAP messages can be protected
by DTLS-Secured CoAP (CoAPS) or Object Security for Constrained RESTful
Environments (OSCORE) to provide encrypted DNS message exchange for
constrained devices in the Internet of Things (IoT).</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://core-wg.github.io/draft-dns-over-coap/draft-ietf-core-dns-over-coap.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-core-dns-over-coap/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        CoRE Working Group mailing list (<eref target="mailto:core@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/core/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/core/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/core-wg/draft-dns-over-coap"/>.</t>
    </note>
  </front>
  <middle>
    <?line 110?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document defines DNS over CoAP (DoC), a protocol to send DNS
<xref target="RFC1035"/> queries and get DNS responses over the Constrained Application
Protocol (CoAP) <xref target="RFC7252"/>. Each DNS query-response pair is mapped into a
CoAP message exchange. Each CoAP message can be secured by DTLS <xref target="RFC6347"/> <xref target="RFC9147"/> or
Object Security for Constrained RESTful Environments (OSCORE) <xref target="RFC8613"/>
to ensure message integrity and confidentiality.</t>
      <t>The application use case of DoC is inspired by DNS over HTTPS <xref target="RFC8484"/>
(DoH). DoC, however, aims for deployment in the constrained Internet of
Things (IoT), which usually conflicts with the requirements introduced by
HTTPS.
Constrained IoT devices may be restricted in memory, power consumption,
link layer frame sizes, throughput, and latency. They may
only have a handful kilobytes of both RAM and ROM. They may sleep for long
durations of time, after which they need to refresh the named resources they
know about. Name resolution in such scenarios must take into account link
layer frame sizes of only a few hundred bytes, bit rates in the magnitude
of kilobits per second, and latencies of several seconds <xref target="RFC7228"/> <xref target="I-D.ietf-iotops-7228bis"/>.</t>
      <t>In order not to be burdened by the resource requirements of TCP and HTTPS, constrained IoT devices could use DNS over DTLS <xref target="RFC8094"/>.
In contrast to DNS over DTLS, DoC
can take advantage of CoAP features to mitigate drawbacks of datagram-based
communication. These features include: block-wise transfer <xref target="RFC7959"/>, which solves
the Path MTU problem of DNS over DTLS (see <xref section="5" sectionFormat="comma" target="RFC8094"/>); CoAP
proxies, which provide an additional level of caching; re-use of data
structures for application traffic and DNS information, which saves memory
on constrained devices.</t>
      <t>To avoid resource requirements of DTLS or TLS on top of UDP (e.g., introduced by DNS over DTLS <xref target="RFC8094"/> or DNS over QUIC <xref target="RFC9250"/>), DoC allows for lightweight message protection based on OSCORE.</t>
      <figure anchor="fig-overview-arch">
        <name>Basic DoC architecture</name>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="224" width="552" viewBox="0 0 552 224" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,96 L 8,144" fill="none" stroke="black"/>
              <path d="M 64,96 L 64,144" fill="none" stroke="black"/>
              <path d="M 208,96 L 208,144" fill="none" stroke="black"/>
              <path d="M 264,96 L 264,144" fill="none" stroke="black"/>
              <path d="M 400,112 L 400,128" fill="none" stroke="black"/>
              <path d="M 544,112 L 544,128" fill="none" stroke="black"/>
              <path d="M 8,96 L 64,96" fill="none" stroke="black"/>
              <path d="M 208,96 L 264,96" fill="none" stroke="black"/>
              <path d="M 416,96 L 528,96" fill="none" stroke="black"/>
              <path d="M 72,112 L 200,112" fill="none" stroke="black"/>
              <path d="M 272,112 L 288,112" fill="none" stroke="black"/>
              <path d="M 304,112 L 320,112" fill="none" stroke="black"/>
              <path d="M 336,112 L 352,112" fill="none" stroke="black"/>
              <path d="M 368,112 L 392,112" fill="none" stroke="black"/>
              <path d="M 72,128 L 200,128" fill="none" stroke="black"/>
              <path d="M 272,128 L 296,128" fill="none" stroke="black"/>
              <path d="M 312,128 L 328,128" fill="none" stroke="black"/>
              <path d="M 344,128 L 360,128" fill="none" stroke="black"/>
              <path d="M 376,128 L 392,128" fill="none" stroke="black"/>
              <path d="M 8,144 L 64,144" fill="none" stroke="black"/>
              <path d="M 208,144 L 264,144" fill="none" stroke="black"/>
              <path d="M 416,144 L 528,144" fill="none" stroke="black"/>
              <path d="M 40,192 L 80,192" fill="none" stroke="black"/>
              <path d="M 192,192 L 224,192" fill="none" stroke="black"/>
              <path d="M 248,192 L 264,192" fill="none" stroke="black"/>
              <path d="M 480,192 L 504,192" fill="none" stroke="black"/>
              <path d="M 32,176 L 40,192" fill="none" stroke="black"/>
              <path d="M 236,168 L 248,192" fill="none" stroke="black"/>
              <path d="M 104,64 L 120,32" fill="none" stroke="black"/>
              <path d="M 224,192 L 236,168" fill="none" stroke="black"/>
              <path d="M 504,192 L 512,176" fill="none" stroke="black"/>
              <path d="M 416,96 C 407.16936,96 400,103.16936 400,112" fill="none" stroke="black"/>
              <path d="M 528,96 C 536.83064,96 544,103.16936 544,112" fill="none" stroke="black"/>
              <path d="M 416,144 C 407.16936,144 400,136.83064 400,128" fill="none" stroke="black"/>
              <path d="M 528,144 C 536.83064,144 544,136.83064 544,128" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="400,112 388,106.4 388,117.6" fill="black" transform="rotate(0,392,112)"/>
              <polygon class="arrowhead" points="280,128 268,122.4 268,133.6" fill="black" transform="rotate(180,272,128)"/>
              <polygon class="arrowhead" points="208,112 196,106.4 196,117.6" fill="black" transform="rotate(0,200,112)"/>
              <polygon class="arrowhead" points="80,128 68,122.4 68,133.6" fill="black" transform="rotate(180,72,128)"/>
              <g class="text">
                <text x="152" y="36">FETCH</text>
                <text x="268" y="36">coaps://[2001:db8::1]/</text>
                <text x="108" y="84">CoAP</text>
                <text x="160" y="84">request</text>
                <text x="108" y="100">[DNS</text>
                <text x="156" y="100">query]</text>
                <text x="304" y="100">DNS</text>
                <text x="344" y="100">query</text>
                <text x="32" y="116">DoC</text>
                <text x="232" y="116">DoC</text>
                <text x="464" y="116">DNS</text>
                <text x="36" y="132">Client</text>
                <text x="236" y="132">Server</text>
                <text x="468" y="132">Infrastructure</text>
                <text x="100" y="148">CoAP</text>
                <text x="156" y="148">response</text>
                <text x="296" y="148">DNS</text>
                <text x="348" y="148">response</text>
                <text x="100" y="164">[DNS</text>
                <text x="160" y="164">response]</text>
                <text x="96" y="196">DNS</text>
                <text x="132" y="196">over</text>
                <text x="172" y="196">CoAP</text>
                <text x="280" y="196">DNS</text>
                <text x="316" y="196">over</text>
                <text x="408" y="196">UDP/HTTPS/QUIC/..</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
              . FETCH coaps://[2001:db8::1]/
             /
            /
           CoAP request
+------+   [DNS query]   +------+   DNS query     .---------------.
| DoC  |---------------->| DoC  |--- --- --- --->|      DNS        |
|Client|<----------------|Server|<--- --- --- ---| Infrastructure  |
+------+  CoAP response  +------+  DNS response   '---------------'
          [DNS response]
   \                        /\                                 /
    '-----DNS over CoAP----'  '--DNS over UDP/HTTPS/QUIC/...--'

]]></artwork>
        </artset>
      </figure>
      <t>The most important components of DoC can be seen in <xref target="fig-overview-arch"/>: a DoC
client tries to resolve DNS information by sending DNS queries carried within
CoAP requests to a DoC server.
That DoC server is a DNS client (i.e., a stub or recursive resolver) that resolves DNS information by using other DNS transports such
as DNS over UDP <xref target="RFC1035"/>, DNS over HTTPS <xref target="RFC8484"/>, or DNS over QUIC <xref target="RFC9250"/> when communicating with the upstream
DNS infrastructure.
Using that information, the DoC server then replies to the queries of the DoC client with DNS
responses carried within CoAP responses.</t>
      <t>Note that this specification is distinct from DoH, since the CoRE-specific FETCH method <xref target="RFC8132"/> is used.
This has the benefit of having the DNS query in the body like when using the POST method, but still with the same caching advantages of responses to requests that use the GET method.
Having the DNS query in the body means that we do not need extra base64 encoding, which would increase
code complexity and message sizes.
Also, this allows for the block-wise transfer of queries <xref target="RFC7959"/>.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>A server that provides the service specified in this document is called a "DoC
server" to differentiate it from a classic "DNS server".
A DoC server acts either as a DNS stub resolver <xref target="BCP219"/> or a DNS recursive resolver <xref target="BCP219"/>.
As such, the DoC server communicates with an "upstream DNS infrastructure" or a single "upstream DNS server".
A "DoC resource" is a CoAP resource <xref target="RFC7252"/> at the DoC server that DoC clients can target to send a DNS query in a CoAP request.</t>
      <t>A client using the service specified in this document to retrieve the
DNS information is called a "DoC client".</t>
      <t>The term "constrained nodes" is used as defined in <xref target="RFC7228"/>.</t>
      <t>The terms "payload" and "body" are used as defined in <xref section="2" sectionFormat="comma" target="RFC7959"/>.
Note that, when block-wise transfer is not used, the terms "payload" and "body" are to be understood as equal.</t>
    </section>
    <section anchor="sec_doc-server-selection">
      <name>Selection of a DoC Server</name>
      <t>While there is no path specified for the DoC resource, it is <bcp14>RECOMMENDED</bcp14> to use the root path "/"
to keep the CoAP requests small.</t>
      <t>The DoC client needs to know the DoC server and the DoC resource at the DoC server.
Possible options to assure this could be manual configuration of a URI <xref target="RFC3986"/> or CRI <xref target="I-D.ietf-core-href"/>,
or automatic configuration, e.g., using a CoRE resource directory
<xref target="RFC9176"/>, DHCP or Router Advertisement options <xref target="RFC9463"/>, or discovery of designated resolvers
<xref target="RFC9462"/>.
Automatic configuration <bcp14>SHOULD</bcp14> only be done from a trusted source.</t>
      <section anchor="discovery-by-resource-type">
        <name>Discovery by Resource Type</name>
        <t>For discovery of the DoC resource through a link mechanism that allows describing a resource type
(e.g., the Resource Type attribute in <xref target="RFC6690"/>), this document introduces the resource type "core.dns".
It can be used to identify a generic DNS resolver that is available to the client.</t>
      </section>
      <section anchor="discovery-using-svcb-resource-records-or-dnr">
        <name>Discovery using SVCB Resource Records or DNR</name>
        <t>A DoC server can also be discovered using SVCB Resource Records (RR) <xref target="RFC9460"/> <xref target="RFC9461"/> or DNR
Service Parameters <xref target="RFC9463"/>.
<xref target="I-D.ietf-core-coap-dtls-alpn"/> provides solutions to discover CoAP over (D)TLS servers using the "alpn" SvcParam.
<xref target="I-D.lenders-core-dnr"/> provides a problem statement for service bindings discovery for OSCORE <xref target="RFC8613"/> and Ephemeral Diffie-Hellman Over COSE (EDHOC) <xref target="RFC9528"/>.</t>
        <t>This document specifies "docpath" as
a single-valued SvcParamKey whose value <bcp14>MUST</bcp14> be a CBOR sequence of 0 or more text strings (see
<xref target="RFC8742"/> and <xref target="RFC8949"/>), delimited by the length of the SvcParamValue field (in octets). If the
SvcParamValue ends within a CBOR text string, the SVCB RR <bcp14>MUST</bcp14> be considered as malformed.
As a text format, e.g., in DNS zone files, the CBOR diagnostic
notation (see <xref section="8" sectionFormat="of" target="RFC8949"/> and <xref target="I-D.ietf-cbor-edn-literals"/>)
of that CBOR sequence can be used.</t>
        <t>Note that this specifically does not surround the text string sequence with a CBOR array or a
similar CBOR data item. This path format was chosen to coincide with the path representation in CRIs
<xref target="I-D.ietf-core-href"/>. Furthermore, it is easily transferable into a sequence of CoAP Uri-Path options by
mapping the initial byte of any present CBOR text string (see <xref section="3" sectionFormat="comma" target="RFC8949"/>) into the Option
Delta and Option Length of the corresponding CoAP Uri-Path option, provided these CBOR text strings are all of a length
between 0 and 12 octets (see <xref section="3.1" sectionFormat="comma" target="RFC7252"/>). Likewise, it can be transferred into a URI
path-abempty form (see <xref section="3.3" sectionFormat="comma" target="RFC3986"/>) by replacing the initial byte of any present CBOR text
string with the "/" character, provided these CBOR text strings are all of a length less than 24
octets and do not contain bytes that need escaping.</t>
        <t>To use the service binding from an SVCB RR, the DoC client <bcp14>MUST</bcp14> send a DoC request constructed from the SvcParams including "docpath".
A rough construction algorithm could be as follows, going through the provided records in order of their priority.</t>
        <ul spacing="normal">
          <li>
            <t>If the "alpn" SvcParam value for the service is "coap", construct a CoAP request for CoAP over TLS.
If it is "co", construct a CoAP request for CoAP over DTLS. Any other SvcParamKeys specifying a
CoAP transport are out of the scope of this document.</t>
          </li>
          <li>
            <t>The destination address for the request should be taken from additional information about the
target, e.g., from an AAAA record associated with the target name or from an "ipv6hint" SvcParam
value, or, as a fallback, by querying an address for the target name of the SVCB record.</t>
          </li>
          <li>
            <t>The destination port for the request is taken from the "port" SvcParam value, if present.
Otherwise, take the default port of the CoAP transport.</t>
          </li>
          <li>
            <t>Set the target name of SVCB record in the Uri-Host option.</t>
          </li>
          <li>
            <t>For each element in the CBOR sequence of the "docpath" SvcParam value, add a Uri-Path option to
the request.</t>
          </li>
          <li>
            <t>If a "port" SvcParam value is provided or if a port was queried, and if either differs from
the default port of the transport or the destination port selected above, add the Uri-Port option to the request and set its value to that port.
Uri-Port option.</t>
          </li>
          <li>
            <t>If the request constructed this way receives a response, use the same SVCB record for construction
of future DoC queries.
If not, or if the endpoint becomes unreachable, repeat with the SVCB record with the next highest
priority.</t>
          </li>
        </ul>
        <t>A more generalized construction algorithm can be found in <xref target="I-D.ietf-core-transport-indication"/>.</t>
      </section>
    </section>
    <section anchor="basic-message-exchange">
      <name>Basic Message Exchange</name>
      <section anchor="sec_content-format">
        <name>The "application/dns-message" Content-Format</name>
        <t>This document defines a CoAP Content-Format identifier for the Internet
media type "application/dns-message" to be the mnemonic 553 — based on the port assignment of DNS.
This media type is defined as in <xref section="6" sectionFormat="of" target="RFC8484"/>, i.e., a single DNS message encoded in the DNS on-the-wire format <xref target="RFC1035"/>.
Both DoC client and DoC server <bcp14>MUST</bcp14> be able to parse contents in the "application/dns-message" Content-Format.
For the purposes of this document, only OPCODE 0 (Query) is supported for DNS messages.
Future work might provide specifications and considerations for other values of OPCODE.
Unless another error takes precedence, a DoC server uses RCODE = 4, NotImp <xref target="RFC1035"/>, in its response to a query with an OPCODE that it does not implement (see also <xref target="sec_resp-examples"/>).</t>
      </section>
      <section anchor="sec_queries">
        <name>DNS Queries in CoAP Requests</name>
        <t>A DoC client encodes a single DNS query in one or more CoAP request
messages that use the CoAP FETCH <xref target="RFC8132"/> request method.
Requests <bcp14>SHOULD</bcp14> include an Accept option to indicate the type of content that can be parsed in the response.</t>
        <t>Since CoAP provides reliability at the message layer (e.g., through Confirmable messages) the retransmission mechanism of the
DNS protocol as defined in <xref target="RFC1035"/> is not needed.</t>
        <section anchor="request-format">
          <name>Request Format</name>
          <t>When sending a CoAP request, a DoC client <bcp14>MUST</bcp14> include the DNS query in the body of the CoAP request.
As specified in <xref section="2.3.1" sectionFormat="of" target="RFC8132"/>, the type of content of the body <bcp14>MUST</bcp14> be indicated using the Content-Format option.
This document specifies the usage of Content-Format "application/dns-message" (for details, see <xref target="sec_content-format"/>).
A DoC server <bcp14>MUST</bcp14> be able to parse requests of Content-Format "application/dns-message".</t>
        </section>
        <section anchor="sec_req-caching">
          <name>Support of CoAP Caching</name>
          <t>The DoC client <bcp14>SHOULD</bcp14> set the ID field of the DNS header always to 0 to enable a CoAP cache (e.g., a CoAP proxy en-route) to respond to the same DNS queries with a cache entry.
This ensures that the CoAP Cache-Key (see <xref section="2" sectionFormat="comma" target="RFC8132"/>) does not change when multiple DNS queries for the same DNS data, carried in CoAP requests, are issued.</t>
        </section>
        <section anchor="sec_req-examples">
          <name>Examples</name>
          <t>The following example illustrates the usage of a CoAP message to
resolve "example.org. IN AAAA" based on the URI "coaps://[2001:db8::1]/". The
CoAP body is encoded in the "application/dns-message" Content-Format.
For better readability, the payload is provided in a human-readable format.
In the actual message, however, it would be encoded in the binary message format (bytes printed in hexadecimal representation) defined in <xref target="RFC1035"/>.</t>
          <artwork><![CDATA[
FETCH coaps://[2001:db8::1]/
Content-Format: 553 (application/dns-message)
Accept: 553 (application/dns-message)
Payload (binary):
  00 00 01 20 00 01 00 00 00 00 00 00 07 65 78 61
  6d 70 6c 65 03 6f 72 67 00 00 1c 00 01

Payload (human-readable):
  ;; ->>Header<<- opcode: QUERY, status: NOERROR, id: 0
  ;; flags: rd ad; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ARCOUNT: 0

  ;; QUESTION SECTION:
  ;example.org.             IN      AAAA
]]></artwork>
        </section>
      </section>
      <section anchor="dns-responses-in-coap-responses">
        <name>DNS Responses in CoAP Responses</name>
        <t>Each DNS query-response pair is mapped to a CoAP request-response operation.
DNS responses are provided in the body of the CoAP response, i.e., it is also possible to transfer them using block-wise transfer <xref target="RFC7959"/>.
A DoC server <bcp14>MUST</bcp14> be able to produce responses in the "application/dns-message"
Content-Format (for details, see <xref target="sec_content-format"/>) when requested.
A DoC client <bcp14>MUST</bcp14> be able to understand responses in the "application/dns-message" Content-Format
when it does not send an Accept option.
Any other response Content-Format than "application/dns-message" <bcp14>MUST</bcp14> be indicated with
the Content-Format option by the DoC server.</t>
        <section anchor="response-codes-and-handling-dns-and-coap-errors">
          <name>Response Codes and Handling DNS and CoAP errors</name>
          <t>A DNS response indicates either success or failure in the RCODE of the DNS header (see <xref section="4.1.1" sectionFormat="of" target="RFC1035"/>).
It is <bcp14>RECOMMENDED</bcp14> that CoAP responses that carry a parseable DNS response use a 2.05 (Content) response code.</t>
          <t>CoAP responses using non-successful response codes <bcp14>MUST NOT</bcp14> contain a DNS response
and <bcp14>MUST</bcp14> only be used for errors in the CoAP layer or when a request does not
fulfill the requirements of the DoC protocol.</t>
          <t>Communication errors with an upstream DNS server (e.g., timeouts) <bcp14>MUST</bcp14> be indicated by including a DNS response with the appropriate RCODE in a successful CoAP response, i.e., using a 2.xx response code.
When an error occurs at the CoAP layer, e.g., if an unexpected request method or an unsupported Content-Format in the request are used, the DoC server <bcp14>SHOULD</bcp14> respond with an appropriate CoAP error.</t>
          <t>A DoC client might try to repeat a non-successful exchange unless otherwise prohibited.
The DoC client might also decide to repeat a non-successful exchange with a different URI, for instance, when the response indicates an unsupported Content-Format.</t>
        </section>
        <section anchor="sec_resp-caching">
          <name>Support of CoAP Caching</name>
          <t>For reliability and energy saving measures, content decoupling, i.e., en-route caching on proxies, takes a far greater role than it does, e.g., in HTTP.
Likewise, CoAP makes it possible to use cache validation to refresh stale cache entries to reduce the amount of large response messages.
For cache validation, CoAP implementations regularly use hashing over the message content for ETag generation.
As such, the approach to guarantee the same cache key for DNS responses as proposed in DoH (<xref section="5.1" sectionFormat="comma" target="RFC8484"/>) is not sufficient and needs to be updated so that the TTLs in the response are more often the same regardless of query time.</t>
          <t>The DoC server <bcp14>MUST</bcp14> ensure that any sum of the Max-Age value of a CoAP response and any TTL in the
DNS response is less or equal to the corresponding TTL received from an upstream DNS server.
This also includes the default Max-Age value of 60 seconds (see <xref section="5.10.5" sectionFormat="of" target="RFC7252"/>) when no Max-Age option is provided.
The DoC client <bcp14>MUST</bcp14> then add the Max-Age value of the carrying CoAP response to all TTLs in a DNS response on reception and use these calculated TTLs for the associated records.</t>
          <t>The <bcp14>RECOMMENDED</bcp14> algorithm for a DoC server to meet the requirement for DoC is as follows:
Set the Max-Age option of a response to the minimum TTL of a DNS response and subtract this value from all TTLs of that DNS response.
This prevents expired records unintentionally being served from an intermediate CoAP cache.
Additionally, if the ETag for cache validation is based on the content of the response, it allows that ETag not to change.
This then remains the case even if the TTL values are updated by an upstream DNS cache.
If only one record set per DNS response is assumed, a simplification of this algorithm is to just set all TTLs in the response to 0 and set the TTLs at the DoC client to the value of the Max-Age option.</t>
          <t>If shorter caching periods are plausible, e.g., if the RCODE of the message indicates an error that should only be cached for a minimal duration, the value for the Max-Age option <bcp14>SHOULD</bcp14> be set accordingly.
This value might be 0, but if the DoC server knows that the error will persist, greater values are also conceivable, depending on the projected duration of the error.
The same applies for DNS responses that for any reason do not carry any records with a TTL.</t>
        </section>
        <section anchor="sec_resp-examples">
          <name>Examples</name>
          <t>The following example illustrates the response to the query "example.org. IN
AAAA record", with recursion turned on. Successful responses carry one answer
record including address 2001:db8:1::1:2:3:4 and TTL 79689.
As in <xref target="sec_req-examples"/>, a human-readable format for the payload is used, but the binary conversion is omitted this time.</t>
          <t>A successful response:</t>
          <artwork><![CDATA[
2.05 Content
Content-Format: 553 (application/dns-message)
Max-Age: 58719
Payload (human-readable):
  ;; ->>Header<<- opcode: QUERY, status: NOERROR, id: 0
  ;; flags: qr rd ad; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ARCOUNT: 0

  ;; QUESTION SECTION:
  ;example.org.                 IN      AAAA
  ;; ANSWER SECTION:
  ;example.org.         79689   IN      AAAA    2001:db8:1::1:2:3:4
]]></artwork>
          <t>When a DNS error—NxDomain (RCODE = 3) for "does.not.exist" in this case—is noted in the DNS response, the CoAP response still indicates success.</t>
          <artwork><![CDATA[
2.05 Content
Content-Format: 553 (application/dns-message)
Payload (human-readable):
  ;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 0
  ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0

  ;; QUESTION SECTION:
  ;does.not.exist.              IN      AAAA
]]></artwork>
          <t>As described in <xref target="sec_content-format"/>, a DoC server uses NotImp (RCODE = 4) if it does not support an OPCODE—a DNS Update (OPCODE = 5) for "example.org" in this case.</t>
          <artwork><![CDATA[
2.05 Content
Content-Format: 553 (application/dns-message)
Payload (human-readable):
  ;; ->>Header<<- opcode: UPDATE, status: NOTIMP, id: 0
  ;; flags: qr ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ARCOUNT: 0

  ;; QUERY SECTION:
  ;example.org.                 IN      AAAA
]]></artwork>
          <t>When an error occurs at the CoAP layer, the DoC server responds with
an appropriate CoAP error, for instance 4.15 (Unsupported Content-Format)
if the Content-Format option in the request was not set to
"application/dns-message" and the Content-Format is not otherwise supported by
the server.</t>
          <artwork><![CDATA[
4.15 Unsupported Content-Format
[no payload]
]]></artwork>
        </section>
      </section>
    </section>
    <section anchor="coapcore-integration">
      <name>CoAP/CoRE Integration</name>
      <section anchor="dns-push">
        <name>DNS Push</name>
        <t>DNS Push results in additional overhead, which conflicts with constrained resources.
This is the reason why it is <bcp14>RECOMMENDED</bcp14> to use CoAP Observe <xref target="RFC7641"/> instead of DNS Push
in the DoC domain.
The DoC server <bcp14>SHOULD</bcp14> provide Observe capabilities on its DoC resource and do as follows.</t>
        <t>If the CoAP request indicates that the DoC client wants to observe a resource record, a DoC server
<bcp14>MAY</bcp14> use a DNS Subscribe message <xref target="RFC8765"/> instead of a classic DNS query to fetch the
information on behalf of a DoC client.
If this is not supported by the DoC server, it <bcp14>MUST</bcp14> act as if the DoC resource were not observable.</t>
        <t>Whenever the DoC server receives a DNS Push message <xref target="RFC8765"/> from the DNS
infrastructure for an observed resource record, the DoC server sends an appropriate Observe notification response
to the DoC client.</t>
        <t>If no more DoC clients observe a resource record for which the DoC server has an open subscription,
the DoC server <bcp14>MUST</bcp14> use a DNS Unsubscribe message <xref target="RFC8765"/> to close its subscription to the
resource record as well.</t>
        <t>A DoC server can still provide Observe capabilities to its DoC resource without providing this
proxying to DNS Push, e.g., if it receives new information on a record through other means.</t>
      </section>
      <section anchor="oscore">
        <name>OSCORE</name>
        <t>It is <bcp14>RECOMMENDED</bcp14> to carry DNS messages protected using OSCORE <xref target="RFC8613"/> between the DoC client
and the DoC server. The establishment and maintenance of the OSCORE Security Context is out of the
scope of this document.</t>
        <t>If cache retrieval of OSCORE responses is desired, it can be achieved, for instance, by using the
method defined in <xref target="I-D.amsuess-core-cachable-oscore"/>. This has, however, implications on message sizes and
security properties, which are compiled in that document.</t>
      </section>
      <section anchor="mapping-doc-to-doh">
        <name>Mapping DoC to DoH</name>
        <t>This document provides no specification on how to map between DoC and DoH, e.g., at a CoAP-to-HTTP-proxy.
In fact, such a direct mapping is <bcp14>NOT RECOMMENDED</bcp14>:
rewriting the FETCH method (<xref target="sec_queries"/>) and the TTL rewriting (<xref target="sec_resp-caching"/>) as
specified in this draft would be non-trivial.
It is <bcp14>RECOMMENDED</bcp14> to use a DNS forwarder to map between DoC and DoH, as would be the case for
mapping between any other pair of DNS transports.</t>
      </section>
    </section>
    <section anchor="sec_unprotected-coap">
      <name>Considerations for Unprotected Use</name>
      <t>The use of DoC without confidentiality and integrity protection is <bcp14>NOT RECOMMENDED</bcp14>.
Without secure communication, many possible attacks need to be evaluated in the context of
the application's threat model.
This includes known threats for unprotected DNS <xref target="RFC3833"/> <xref target="RFC9076"/> and CoAP <xref section="11" sectionFormat="of" target="RFC7252"/>.
But there is also an attack that is mitigated even by unprotected DNS over UDP:
the random ID of the DNS header affords some protection against off-path cache poisoning attacks.
Note, however, that this particular threat can also be mitigated by using random large token values in the CoAP request.</t>
    </section>
    <section anchor="implementation-status">
      <name>Implementation Status</name>
      <t>This section records the status of known implementations of the
protocol defined by this specification at the time of posting of
this Internet-Draft, and is based on a proposal described in
<xref target="RFC7942"/>.  The description of implementations in this section is
intended to assist the IETF in its decision processes in
progressing drafts to RFCs.  Please note that the listing of any
individual implementation here does not imply endorsement by the
IETF.  Furthermore, no effort has been spent to verify the
information presented here that was supplied by IETF contributors.
This is not intended as, and must not be construed to be, a
catalog of available implementations or their features.  Readers
are advised to note that other implementations may exist.</t>
      <t>According to <xref target="RFC7942"/>, "this will allow reviewers and working
groups to assign due consideration to documents that have the
benefit of running code, which may serve as evidence of valuable
experimentation and feedback that have made the implemented
protocols more mature.  It is up to the individual working groups
to use this information as they see fit".
<?line -20?>
      </t>
      <t><cref anchor="remove-impl-status">RFC Ed.: Please remove this section before publication. When deleting this
section, please also remove RFC7942 from the references of this document.</cref></t>
      <section anchor="doc-client">
        <name>DoC Client</name>
        <t>The authors of this document provide a <eref target="https://doc.riot-os.org/group__net__gcoap__dns.html">DoC client implementation available
in the IoT operating system RIOT</eref>.</t>
        <dl>
          <dt>Level of maturity:</dt>
          <dd>
            <t>production</t>
          </dd>
          <dt>Version compatibility:</dt>
          <dd>
            <t>draft-ietf-core-dns-over-coap-13</t>
          </dd>
          <dt>License:</dt>
          <dd>
            <t>LGPL-2.1</t>
          </dd>
          <dt>Contact information:</dt>
          <dd>
            <t><tt>Martine S. Lenders &lt;martine.lenders@tu-dresden.de&gt;</tt></t>
          </dd>
          <dt>Last update of this information:</dt>
          <dd>
            <t>September 2024</t>
          </dd>
        </dl>
      </section>
      <section anchor="doc-server">
        <name>DoC Server</name>
        <t>The authors of this document provide a <eref target="https://github.com/anr-bmbf-pivot/aiodnsprox">DoC server implementation in
Python</eref>.</t>
        <dl>
          <dt>Level of maturity:</dt>
          <dd>
            <t>production</t>
          </dd>
          <dt>Version compatibility:</dt>
          <dd>
            <t>draft-ietf-core-dns-over-coap-13</t>
          </dd>
          <dt>License:</dt>
          <dd>
            <t>MIT</t>
          </dd>
          <dt>Contact information:</dt>
          <dd>
            <t><tt>Martine S. Lenders &lt;martine.lenders@tu-dresden.de&gt;</tt></t>
          </dd>
          <dt>Last update of this information:</dt>
          <dd>
            <t>September 2024</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>General CoAP security considerations in <xref section="11" sectionFormat="of" target="RFC7252"/> apply to DoC.
DoC also inherits the security considerations of the protocols used for secure communication, e.g., OSCORE <xref section="12" sectionFormat="of" target="RFC8613"/> or DTLS <xref section="5" sectionFormat="of" target="RFC6347"/> <xref section="11" sectionFormat="of" target="RFC9147"/>.
Additionally, DoC uses request patterns that require the maintenance of long-lived security
contexts.
<xref section="2.6" sectionFormat="of" target="I-D.ietf-core-corr-clar"/> provides insights on what can be done when those are resumed from a new endpoint.</t>
      <t>When using unprotected CoAP (see <xref target="sec_unprotected-coap"/>), setting the ID of a DNS message to 0 as
specified in <xref target="sec_req-caching"/> opens the DNS cache of a DoC client to cache poisoning attacks
via response spoofing.
This document requires an unpredictable CoAP token in each DoC query from the client when CoAP is
not secured to mitigate such an attack over DoC (see <xref target="sec_unprotected-coap"/>).</t>
      <t>For secure communication via DTLS or OSCORE, the impact of a fixed ID on security is limited, as both
harden against injecting spoofed responses.
Consequently, the ID of the DNS message can be set to 0 without any concern in order to leverage the advantages of CoAP caching.</t>
      <t>A DoC client must be aware that the DoC server
may communicate unprotected with the upstream DNS infrastructure, e.g., using DNS over UDP.
DoC can only guarantee confidentiality and integrity of communication between parties for which the
security context is exchanged.
The DoC server may use another security context to communicate upstream with both confidentiality and integrity
(e.g., DNS over QUIC <xref target="RFC9250"/>) or with just integrity (e.g., DNSSEC <xref target="RFC9364"/>), but, while
recommended, this is opaque to the DoC client on the protocol level.</t>
      <t>A DoC client may not be able to perform DNSSEC validation,
e.g., due to code size constraints, or due to the size of the responses.
It may trust its DoC server to perform DNSSEC validation;
how that trust is expressed is out of the scope of this document.
A DoC client may be, for instance, configured to use a particular credential by which it recognizes an eligible DoC server.
That information can also imply trust in the DNSSEC validation by that server.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t><cref anchor="replace-xxxx">RFC Ed.: throughout this section, please replace
RFC-XXXX with the RFC number of this specification and remove this
note.</cref></t>
      <t>This document has the following actions for IANA.</t>
      <section anchor="coap-content-formats-registry">
        <name>CoAP Content-Formats Registry</name>
        <t>IANA is requested to assign a CoAP Content-Format ID for the "application/dns-message" media
type in the "CoAP Content-Formats" registry, within the "Constrained RESTful Environments (CoRE) Parameters"
registry group <xref target="RFC7252"/>, corresponding to the "application/dns-message" media
type from the "Media Types" registry (see <xref target="RFC8484"/>).</t>
        <t>Content Type: application/dns-message</t>
        <t>Content Coding: -</t>
        <t>ID: 553 (suggested)</t>
        <t>Reference: <xref target="RFC8484"/>[RFC-XXXX, <xref target="sec_content-format"/>]</t>
      </section>
      <section anchor="dns-service-bindings-svcb-registry">
        <name>DNS Service Bindings (SVCB) Registry</name>
        <t>IANA is requested to add the following entry to the "Service Parameter Keys (SvcParamKeys)" registry within the "DNS Service Bindings (SVCB)" registry group.
The definition of this parameter can be found in <xref target="sec_doc-server-selection"/>.</t>
        <table anchor="tab-svc-param-keys">
          <name>Values for SvcParamKeys</name>
          <thead>
            <tr>
              <th align="left">Number</th>
              <th align="left">Name</th>
              <th align="left">Meaning</th>
              <th align="left">Change Controller</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">10 (suggested)</td>
              <td align="left">docpath</td>
              <td align="left">DNS over CoAP resource path</td>
              <td align="left">IETF</td>
              <td align="left">[RFC-XXXX, <xref target="sec_doc-server-selection"/>]</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="resource-type-rt-link-target-attribute-values-registry">
        <name>Resource Type (rt=) Link Target Attribute Values Registry</name>
        <t>IANA is requested to add a new Resource Type (rt=) Link Target Attribute "core.dns" to the "Resource Type (rt=) Link Target Attribute Values" registry within the "Constrained RESTful Environments (CoRE) Parameters" registry group.</t>
        <t>Value: core.dns</t>
        <t>Description: DNS over CoAP resource.</t>
        <t>Reference: [RFC-XXXX, <xref target="sec_doc-server-selection"/>]</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC1035">
          <front>
            <title>Domain names - implementation and specification</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1035"/>
          <seriesInfo name="DOI" value="10.17487/RFC1035"/>
        </reference>
        <reference anchor="RFC3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC6347">
          <front>
            <title>Datagram Transport Layer Security Version 1.2</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="January" year="2012"/>
            <abstract>
              <t>This document specifies version 1.2 of the Datagram Transport Layer Security (DTLS) protocol. The DTLS protocol provides communications privacy for datagram protocols. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. The DTLS protocol is based on the Transport Layer Security (TLS) protocol and provides equivalent security guarantees. Datagram semantics of the underlying transport are preserved by the DTLS protocol. This document updates DTLS 1.0 to work with TLS version 1.2. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6347"/>
          <seriesInfo name="DOI" value="10.17487/RFC6347"/>
        </reference>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC7641">
          <front>
            <title>Observing Resources in the Constrained Application Protocol (CoAP)</title>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <date month="September" year="2015"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a RESTful application protocol for constrained nodes and networks. The state of a resource on a CoAP server can change over time. This document specifies a simple protocol extension for CoAP that enables CoAP clients to "observe" resources, i.e., to retrieve a representation of a resource and keep this representation updated by the server over a period of time. The protocol follows a best-effort approach for sending new representations to clients and provides eventual consistency between the state observed by each client and the actual resource state at the server.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7641"/>
          <seriesInfo name="DOI" value="10.17487/RFC7641"/>
        </reference>
        <reference anchor="RFC7959">
          <front>
            <title>Block-Wise Transfers in the Constrained Application Protocol (CoAP)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="Z. Shelby" initials="Z." role="editor" surname="Shelby"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a RESTful transfer protocol for constrained nodes and networks. Basic CoAP messages work well for small payloads from sensors and actuators; however, applications will need to transfer larger payloads occasionally -- for instance, for firmware updates. In contrast to HTTP, where TCP does the grunt work of segmenting and resequencing, CoAP is based on datagram transports such as UDP or Datagram Transport Layer Security (DTLS). These transports only offer fragmentation, which is even more problematic in constrained nodes and networks, limiting the maximum size of resource representations that can practically be transferred.</t>
              <t>Instead of relying on IP fragmentation, this specification extends basic CoAP with a pair of "Block" options for transferring multiple blocks of information from a resource representation in multiple request-response pairs. In many important cases, the Block options enable a server to be truly stateless: the server can handle each block transfer separately, with no need for a connection setup or other server-side memory of previous block transfers. Essentially, the Block options provide a minimal way to transfer larger representations in a block-wise fashion.</t>
              <t>A CoAP implementation that does not support these options generally is limited in the size of the representations that can be exchanged, so there is an expectation that the Block options will be widely used in CoAP implementations. Therefore, this specification updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7959"/>
          <seriesInfo name="DOI" value="10.17487/RFC7959"/>
        </reference>
        <reference anchor="RFC8132">
          <front>
            <title>PATCH and FETCH Methods for the Constrained Application Protocol (CoAP)</title>
            <author fullname="P. van der Stok" initials="P." surname="van der Stok"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="A. Sehgal" initials="A." surname="Sehgal"/>
            <date month="April" year="2017"/>
            <abstract>
              <t>The methods defined in RFC 7252 for the Constrained Application Protocol (CoAP) only allow access to a complete resource, not to parts of a resource. In case of resources with larger or complex data, or in situations where resource continuity is required, replacing or requesting the whole resource is undesirable. Several applications using CoAP need to access parts of the resources.</t>
              <t>This specification defines the new CoAP methods, FETCH, PATCH, and iPATCH, which are used to access and update parts of a resource.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8132"/>
          <seriesInfo name="DOI" value="10.17487/RFC8132"/>
        </reference>
        <reference anchor="RFC8484">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="RFC8613">
          <front>
            <title>Object Security for Constrained RESTful Environments (OSCORE)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Mattsson" initials="J." surname="Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <date month="July" year="2019"/>
            <abstract>
              <t>This document defines Object Security for Constrained RESTful Environments (OSCORE), a method for application-layer protection of the Constrained Application Protocol (CoAP), using CBOR Object Signing and Encryption (COSE). OSCORE provides end-to-end protection between endpoints communicating using CoAP or CoAP-mappable HTTP. OSCORE is designed for constrained nodes and networks supporting a range of proxy operations, including translation between different transport protocols.</t>
              <t>Although an optional functionality of CoAP, OSCORE alters CoAP options processing and IANA registration. Therefore, this document updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8613"/>
          <seriesInfo name="DOI" value="10.17487/RFC8613"/>
        </reference>
        <reference anchor="RFC8742">
          <front>
            <title>Concise Binary Object Representation (CBOR) Sequences</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document describes the Concise Binary Object Representation (CBOR) Sequence format and associated media type "application/cbor-seq". A CBOR Sequence consists of any number of encoded CBOR data items, simply concatenated in sequence.</t>
              <t>Structured syntax suffixes for media types allow other media types to build on them and make it explicit that they are built on an existing media type as their foundation. This specification defines and registers "+cbor-seq" as a structured syntax suffix for CBOR Sequences.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8742"/>
          <seriesInfo name="DOI" value="10.17487/RFC8742"/>
        </reference>
        <reference anchor="RFC8765">
          <front>
            <title>DNS Push Notifications</title>
            <author fullname="T. Pusateri" initials="T." surname="Pusateri"/>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <date month="June" year="2020"/>
            <abstract>
              <t>The Domain Name System (DNS) was designed to return matching records efficiently for queries for data that are relatively static. When those records change frequently, DNS is still efficient at returning the updated results when polled, as long as the polling rate is not too high. But, there exists no mechanism for a client to be asynchronously notified when these changes occur. This document defines a mechanism for a client to be notified of such changes to DNS records, called DNS Push Notifications.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8765"/>
          <seriesInfo name="DOI" value="10.17487/RFC8765"/>
        </reference>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="I-D.ietf-core-coap-dtls-alpn">
          <front>
            <title>ALPN ID Specification for CoAP over DTLS</title>
            <author fullname="Martine Sophie Lenders" initials="M. S." surname="Lenders">
              <organization>TUD Dresden University of Technology</organization>
            </author>
            <author fullname="Christian Amsüss" initials="C." surname="Amsüss">
         </author>
            <author fullname="Thomas C. Schmidt" initials="T. C." surname="Schmidt">
              <organization>HAW Hamburg</organization>
            </author>
            <author fullname="Matthias Wählisch" initials="M." surname="Wählisch">
              <organization>TUD Dresden University of Technology &amp; Barkhausen Institut</organization>
            </author>
            <date day="1" month="April" year="2025"/>
            <abstract>
              <t>   This document specifies an Application-Layer Protocol Negotiation
   (ALPN) ID for transport-layer-secured Constrained Application
   Protocol (CoAP) services.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-coap-dtls-alpn-04"/>
        </reference>
        <reference anchor="I-D.ietf-cbor-edn-literals">
          <front>
            <title>CBOR Extended Diagnostic Notation (EDN)</title>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <date day="8" month="January" year="2025"/>
            <abstract>
              <t>   This document formalizes and consolidates the definition of the
   Extended Diagnostic Notation (EDN) of the Concise Binary Object
   Representation (CBOR), addressing implementer experience.

   Replacing EDN's previous informal descriptions, it updates RFC 8949,
   obsoleting its Section 8, and RFC 8610, obsoleting its Appendix G.

   It also specifies and uses registry-based extension points, using one
   to support text representations of epoch-based dates/times and of IP
   addresses and prefixes.


   // (This cref will be removed by the RFC editor:) The present
   // revision (–16) addresses the first half of the WGLC comments,
   // except for the issues around the specific way how to best achieve
   // pluggable ABNF grammars for application-extensions.  It is
   // intended for use as a reference document for the mid-WGLC CBOR WG
   // interim meeting on 2025-01-08.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cbor-edn-literals-16"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <referencegroup anchor="BCP219" target="https://www.rfc-editor.org/info/bcp219">
          <reference anchor="RFC9499" target="https://www.rfc-editor.org/info/rfc9499">
            <front>
              <title>DNS Terminology</title>
              <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
              <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
              <date month="March" year="2024"/>
              <abstract>
                <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
                <t>This document updates RFC 2308 by clarifying the definitions of "forwarder" and "QNAME". It obsoletes RFC 8499 by adding multiple terms and clarifications. Comprehensive lists of changed and new definitions can be found in Appendices A and B.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="219"/>
            <seriesInfo name="RFC" value="9499"/>
            <seriesInfo name="DOI" value="10.17487/RFC9499"/>
          </reference>
        </referencegroup>
        <reference anchor="RFC3833">
          <front>
            <title>Threat Analysis of the Domain Name System (DNS)</title>
            <author fullname="D. Atkins" initials="D." surname="Atkins"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <date month="August" year="2004"/>
            <abstract>
              <t>Although the DNS Security Extensions (DNSSEC) have been under development for most of the last decade, the IETF has never written down the specific set of threats against which DNSSEC is designed to protect. Among other drawbacks, this cart-before-the-horse situation has made it difficult to determine whether DNSSEC meets its design goals, since its design goals are not well specified. This note attempts to document some of the known threats to the DNS, and, in doing so, attempts to measure to what extent (if any) DNSSEC is a useful tool in defending against these threats. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3833"/>
          <seriesInfo name="DOI" value="10.17487/RFC3833"/>
        </reference>
        <reference anchor="RFC6690">
          <front>
            <title>Constrained RESTful Environments (CoRE) Link Format</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <date month="August" year="2012"/>
            <abstract>
              <t>This specification defines Web Linking using a link format for use by constrained web servers to describe hosted resources, their attributes, and other relationships between links. Based on the HTTP Link Header field defined in RFC 5988, the Constrained RESTful Environments (CoRE) Link Format is carried as a payload and is assigned an Internet media type. "RESTful" refers to the Representational State Transfer (REST) architecture. A well-known URI is defined as a default entry point for requesting the links hosted by a server. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6690"/>
          <seriesInfo name="DOI" value="10.17487/RFC6690"/>
        </reference>
        <reference anchor="RFC7228">
          <front>
            <title>Terminology for Constrained-Node Networks</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="M. Ersue" initials="M." surname="Ersue"/>
            <author fullname="A. Keranen" initials="A." surname="Keranen"/>
            <date month="May" year="2014"/>
            <abstract>
              <t>The Internet Protocol Suite is increasingly used on small devices with severe constraints on power, memory, and processing resources, creating constrained-node networks. This document provides a number of basic terms that have been useful in the standardization work for constrained-node networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7228"/>
          <seriesInfo name="DOI" value="10.17487/RFC7228"/>
        </reference>
        <reference anchor="RFC8094">
          <front>
            <title>DNS over Datagram Transport Layer Security (DTLS)</title>
            <author fullname="T. Reddy" initials="T." surname="Reddy"/>
            <author fullname="D. Wing" initials="D." surname="Wing"/>
            <author fullname="P. Patil" initials="P." surname="Patil"/>
            <date month="February" year="2017"/>
            <abstract>
              <t>DNS queries and responses are visible to network elements on the path between the DNS client and its server. These queries and responses can contain privacy-sensitive information, which is valuable to protect.</t>
              <t>This document proposes the use of Datagram Transport Layer Security (DTLS) for DNS, to protect against passive listeners and certain active attacks. As latency is critical for DNS, this proposal also discusses mechanisms to reduce DTLS round trips and reduce the DTLS handshake size. The proposed mechanism runs over port 853.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8094"/>
          <seriesInfo name="DOI" value="10.17487/RFC8094"/>
        </reference>
        <reference anchor="RFC9076">
          <front>
            <title>DNS Privacy Considerations</title>
            <author fullname="T. Wicinski" initials="T." role="editor" surname="Wicinski"/>
            <date month="July" year="2021"/>
            <abstract>
              <t>This document describes the privacy issues associated with the use of the DNS by Internet users. It provides general observations about typical current privacy practices. It is intended to be an analysis of the present situation and does not prescribe solutions. This document obsoletes RFC 7626.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9076"/>
          <seriesInfo name="DOI" value="10.17487/RFC9076"/>
        </reference>
        <reference anchor="RFC9176">
          <front>
            <title>Constrained RESTful Environments (CoRE) Resource Directory</title>
            <author fullname="C. Amsüss" initials="C." role="editor" surname="Amsüss"/>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="M. Koster" initials="M." surname="Koster"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. van der Stok" initials="P." surname="van der Stok"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>In many Internet of Things (IoT) applications, direct discovery of resources is not practical due to sleeping nodes or networks where multicast traffic is inefficient. These problems can be solved by employing an entity called a Resource Directory (RD), which contains information about resources held on other servers, allowing lookups to be performed for those resources. The input to an RD is composed of links, and the output is composed of links constructed from the information stored in the RD. This document specifies the web interfaces that an RD supports for web servers to discover the RD and to register, maintain, look up, and remove information on resources. Furthermore, new target attributes useful in conjunction with an RD are defined.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9176"/>
          <seriesInfo name="DOI" value="10.17487/RFC9176"/>
        </reference>
        <reference anchor="RFC9250">
          <front>
            <title>DNS over Dedicated QUIC Connections</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>This document describes the use of QUIC to provide transport confidentiality for DNS. The encryption provided by QUIC has similar properties to those provided by TLS, while QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides more efficient packet-loss recovery than UDP. DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC 7858, and latency characteristics similar to classic DNS over UDP. This specification describes the use of DoQ as a general-purpose transport for DNS and includes the use of DoQ for stub to recursive, recursive to authoritative, and zone transfer scenarios.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9250"/>
          <seriesInfo name="DOI" value="10.17487/RFC9250"/>
        </reference>
        <reference anchor="RFC9364">
          <front>
            <title>DNS Security Extensions (DNSSEC)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>This document describes the DNS Security Extensions (commonly called "DNSSEC") that are specified in RFCs 4033, 4034, and 4035, as well as a handful of others. One purpose is to introduce all of the RFCs in one place so that the reader can understand the many aspects of DNSSEC. This document does not update any of those RFCs. A second purpose is to state that using DNSSEC for origin authentication of DNS data is the best current practice. A third purpose is to provide a single reference for other documents that want to refer to DNSSEC.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="237"/>
          <seriesInfo name="RFC" value="9364"/>
          <seriesInfo name="DOI" value="10.17487/RFC9364"/>
        </reference>
        <reference anchor="RFC9460">
          <front>
            <title>Service Binding and Parameter Specification via the DNS (SVCB and HTTPS Resource Records)</title>
            <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
            <author fullname="M. Bishop" initials="M." surname="Bishop"/>
            <author fullname="E. Nygren" initials="E." surname="Nygren"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies the "SVCB" ("Service Binding") and "HTTPS" DNS resource record (RR) types to facilitate the lookup of information needed to make connections to network services, such as for HTTP origins. SVCB records allow a service to be provided from multiple alternative endpoints, each with associated parameters (such as transport protocol configuration), and are extensible to support future uses (such as keys for encrypting the TLS ClientHello). They also enable aliasing of apex domains, which is not possible with CNAME. The HTTPS RR is a variation of SVCB for use with HTTP (see RFC 9110, "HTTP Semantics"). By providing more information to the client before it attempts to establish a connection, these records offer potential benefits to both performance and privacy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9460"/>
          <seriesInfo name="DOI" value="10.17487/RFC9460"/>
        </reference>
        <reference anchor="RFC9461">
          <front>
            <title>Service Binding Mapping for DNS Servers</title>
            <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>The SVCB DNS resource record type expresses a bound collection of endpoint metadata, for use when establishing a connection to a named service. DNS itself can be such a service, when the server is identified by a domain name. This document provides the SVCB mapping for named DNS servers, allowing them to indicate support for encrypted transport protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9461"/>
          <seriesInfo name="DOI" value="10.17487/RFC9461"/>
        </reference>
        <reference anchor="RFC9462">
          <front>
            <title>Discovery of Designated Resolvers</title>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="E. Kinnear" initials="E." surname="Kinnear"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <author fullname="T. Jensen" initials="T." surname="Jensen"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document defines Discovery of Designated Resolvers (DDR), a set of mechanisms for DNS clients to use DNS records to discover a resolver's encrypted DNS configuration. An Encrypted DNS Resolver discovered in this manner is referred to as a "Designated Resolver". These mechanisms can be used to move from unencrypted DNS to encrypted DNS when only the IP address of a resolver is known. These mechanisms are designed to be limited to cases where Unencrypted DNS Resolvers and their Designated Resolvers are operated by the same entity or cooperating entities. It can also be used to discover support for encrypted DNS protocols when the name of an Encrypted DNS Resolver is known.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9462"/>
          <seriesInfo name="DOI" value="10.17487/RFC9462"/>
        </reference>
        <reference anchor="RFC9463">
          <front>
            <title>DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers (DNR)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="T. Reddy.K" initials="T." role="editor" surname="Reddy.K"/>
            <author fullname="D. Wing" initials="D." surname="Wing"/>
            <author fullname="N. Cook" initials="N." surname="Cook"/>
            <author fullname="T. Jensen" initials="T." surname="Jensen"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies new DHCP and IPv6 Router Advertisement options to discover encrypted DNS resolvers (e.g., DNS over HTTPS, DNS over TLS, and DNS over QUIC). Particularly, it allows a host to learn an Authentication Domain Name together with a list of IP addresses and a set of service parameters to reach such encrypted DNS resolvers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9463"/>
          <seriesInfo name="DOI" value="10.17487/RFC9463"/>
        </reference>
        <reference anchor="RFC9528">
          <front>
            <title>Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>This document specifies Ephemeral Diffie-Hellman Over COSE (EDHOC), a very compact and lightweight authenticated Diffie-Hellman key exchange with ephemeral keys. EDHOC provides mutual authentication, forward secrecy, and identity protection. EDHOC is intended for usage in constrained scenarios, and a main use case is to establish an Object Security for Constrained RESTful Environments (OSCORE) security context. By reusing CBOR Object Signing and Encryption (COSE) for cryptography, Concise Binary Object Representation (CBOR) for encoding, and Constrained Application Protocol (CoAP) for transport, the additional code size can be kept very low.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9528"/>
          <seriesInfo name="DOI" value="10.17487/RFC9528"/>
        </reference>
        <reference anchor="I-D.ietf-core-href">
          <front>
            <title>Constrained Resource Identifiers</title>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <date day="20" month="March" year="2025"/>
            <abstract>
              <t>   The Constrained Resource Identifier (CRI) is a complement to the
   Uniform Resource Identifier (URI) that represents the URI components
   in Concise Binary Object Representation (CBOR) rather than as a
   sequence of characters.  This approach simplifies parsing,
   comparison, and reference resolution in environments with severe
   limitations on processing power, code size, and memory size.

   This RFC updates RFC 7595 to add a note on how the "URI Schemes"
   registry of RFC 7595 cooperates with the "CRI Scheme Numbers"
   registry created by the present RFC.


   // (This "cref" paragraph will be removed by the RFC editor:) The
   // present revision –22 addresses a few remaining post-WGLC nits.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-href-22"/>
        </reference>
        <reference anchor="I-D.ietf-core-transport-indication">
          <front>
            <title>CoAP Transport Indication</title>
            <author fullname="Christian Amsüss" initials="C." surname="Amsüss">
         </author>
            <author fullname="Martine Sophie Lenders" initials="M. S." surname="Lenders">
              <organization>TUD Dresden University of Technology</organization>
            </author>
            <date day="3" month="March" year="2025"/>
            <abstract>
              <t>   The Constrained Application Protocol (CoAP, [RFC7252]) is available
   over different transports (UDP, DTLS, TCP, TLS, WebSockets), but
   lacks a way to unify these addresses.  This document provides
   terminology and provisions based on Web Linking [RFC8288] and Service
   Bindings (SVCB, [RFC9460]) to express alternative transports
   available to a device, and to optimize exchanges using these.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-transport-indication-08"/>
        </reference>
        <reference anchor="I-D.ietf-iotops-7228bis">
          <front>
            <title>Terminology for Constrained-Node Networks</title>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <author fullname="Mehmet Ersue" initials="M." surname="Ersue">
         </author>
            <author fullname="Ari Keränen" initials="A." surname="Keränen">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Carles Gomez" initials="C." surname="Gomez">
              <organization>Universitat Politecnica de Catalunya</organization>
            </author>
            <date day="8" month="January" year="2025"/>
            <abstract>
              <t>   The Internet Protocol Suite is increasingly used on small devices
   with severe constraints on power, memory, and processing resources,
   creating constrained-node networks.  This document provides a number
   of basic terms that have been useful in the standardization work for
   constrained-node networks.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-iotops-7228bis-01"/>
        </reference>
        <reference anchor="I-D.lenders-core-dnr">
          <front>
            <title>Discovery of Network-designated OSCORE-based Resolvers: Problem Statement</title>
            <author fullname="Martine Sophie Lenders" initials="M. S." surname="Lenders">
              <organization>TUD Dresden University of Technology</organization>
            </author>
            <author fullname="Christian Amsüss" initials="C." surname="Amsüss">
         </author>
            <author fullname="Thomas C. Schmidt" initials="T. C." surname="Schmidt">
              <organization>HAW Hamburg</organization>
            </author>
            <author fullname="Matthias Wählisch" initials="M." surname="Wählisch">
              <organization>TUD Dresden University of Technology &amp; Barkhausen Institut</organization>
            </author>
            <date day="3" month="March" year="2025"/>
            <abstract>
              <t>   This document states problems when designing DNS SVCB records to
   discover endpoints that communicate over Object Security for
   Constrained RESTful Environments (OSCORE) [RFC8613].  As a
   consequence of learning about OSCORE, this discovery will allow a
   host to learn both CoAP servers and DNS over CoAP resolvers that use
   OSCORE to encrypt messages and Ephemeral Diffie-Hellman Over COSE
   (EDHOC) [RFC9528] for key exchange.  Challenges arise because SVCB
   records are not meant to be used to exchange security contexts, which
   is required in OSCORE scenarios.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-lenders-core-dnr-05"/>
        </reference>
        <reference anchor="I-D.amsuess-core-cachable-oscore">
          <front>
            <title>Cacheable OSCORE</title>
            <author fullname="Christian Amsüss" initials="C." surname="Amsüss">
         </author>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE AB</organization>
            </author>
            <date day="8" month="January" year="2025"/>
            <abstract>
              <t>   Group communication with the Constrained Application Protocol (CoAP)
   can be secured end-to-end using Group Object Security for Constrained
   RESTful Environments (Group OSCORE), also across untrusted
   intermediary proxies.  However, this sidesteps the proxies' abilities
   to cache responses from the origin server(s).  This specification
   restores cacheability of protected responses at proxies, by
   introducing consensus requests which any client in a group can send
   to one server or multiple servers in the same group.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-amsuess-core-cachable-oscore-10"/>
        </reference>
        <reference anchor="DoC-paper">
          <front>
            <title>Securing Name Resolution in the IoT: DNS over CoAP</title>
            <author fullname="Martine S. Lenders" initials="M." surname="Lenders">
              <organization>Freie Universität Berlin &amp;amp; TU Dresden, Berlin, Germany</organization>
            </author>
            <author fullname="Christian Amsüss" initials="C." surname="Amsüss">
              <organization>Unaffiliated, Vienna, Austria</organization>
            </author>
            <author fullname="Cenk Gündogan" initials="C." surname="Gündogan">
              <organization>Huawei Technologies, Munich, Germany</organization>
            </author>
            <author fullname="Marcin Nawrocki" initials="M." surname="Nawrocki">
              <organization>Freie Universität Berlin &amp;amp; TU Dresden, Berlin, Germany</organization>
            </author>
            <author fullname="Thomas C. Schmidt" initials="T." surname="Schmidt">
              <organization>HAW Hamburg, Hamburg, Germany</organization>
            </author>
            <author fullname="Matthias Wählisch" initials="M." surname="Wählisch">
              <organization>TU Dresden &amp;amp; Barkhausen Institut, Dresden, Germany</organization>
            </author>
            <date month="September" year="2023"/>
          </front>
          <seriesInfo name="Proceedings of the ACM on Networking" value="vol. 1, no. CoNEXT2, pp. 1-25"/>
          <seriesInfo name="DOI" value="10.1145/3609423"/>
          <refcontent>Association for Computing Machinery (ACM)</refcontent>
        </reference>
        <reference anchor="I-D.ietf-core-corr-clar">
          <front>
            <title>Constrained Application Protocol (CoAP): Corrections and Clarifications</title>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <date day="18" month="December" year="2024"/>
            <abstract>
              <t>   RFC 7252 defines the Constrained Application Protocol (CoAP), along
   with a number of additional specifications, including RFC 7641, RFC
   7959, RFC 8132, and RFC 8323.  RFC 6690 defines the link format that
   is used in CoAP self-description documents.

   Some parts of the specification may be unclear or even contain errors
   that may lead to misinterpretations that may impair interoperability
   between different implementations.  The present document provides
   corrections, additions, and clarifications to the RFCs cited; this
   document thus updates these RFCs.  In addition, other clarifications
   related to the use of CoAP in other specifications, including RFC
   7390 and RFC 8075, are also provided.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-corr-clar-01"/>
        </reference>
        <reference anchor="RFC7942">
          <front>
            <title>Improving Awareness of Running Code: The Implementation Status Section</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>This document describes a simple process that allows authors of Internet-Drafts to record the status of known implementations by including an Implementation Status section. This will allow reviewers and working groups to assign due consideration to documents that have the benefit of running code, which may serve as evidence of valuable experimentation and feedback that have made the implemented protocols more mature.</t>
              <t>This process is not mandatory. Authors of Internet-Drafts are encouraged to consider using the process for their documents, and working groups are invited to think about applying the process to all of their protocol specifications. This document obsoletes RFC 6982, advancing it to a Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="205"/>
          <seriesInfo name="RFC" value="7942"/>
          <seriesInfo name="DOI" value="10.17487/RFC7942"/>
        </reference>
      </references>
    </references>
    <?line 652?>

<section anchor="sec_evaluation">
      <name>Evaluation</name>
      <t>The authors of this document presented the design, implementation, and analysis of DoC in their
paper "Securing Name Resolution in the IoT: DNS over CoAP" <xref target="DoC-paper"/>.</t>
    </section>
    <section anchor="change-log">
      <name>Change Log</name>
      <t><cref anchor="remove-changelog">RFC Ed.: Please remove this section before publication.</cref></t>
      <section anchor="since-draft-ietf-core-dns-over-coap-13">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-ietf-core-dns-over-coap-13">draft-ietf-core-dns-over-coap-13</eref></name>
        <ul spacing="normal">
          <li>
            <t>Address shepherd review</t>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-ietf-core-dns-over-coap-12">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-ietf-core-dns-over-coap-12">draft-ietf-core-dns-over-coap-12</eref></name>
        <ul spacing="normal">
          <li>
            <t>Address Esko's review</t>
          </li>
          <li>
            <t>Address Marcos's review</t>
          </li>
          <li>
            <t>Address Mikolai's review</t>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-ietf-core-dns-over-coap-10">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-ietf-core-dns-over-coap-10">draft-ietf-core-dns-over-coap-10</eref></name>
        <ul spacing="normal">
          <li>
            <t>Replace imprecise or wrong terms:
            </t>
            <ul spacing="normal">
              <li>
                <t>disjunct =&gt; distinct</t>
              </li>
              <li>
                <t>unencrypted CoAP =&gt; unprotected CoAP</t>
              </li>
              <li>
                <t>security mode =&gt; confidential communication</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Pull in definition of CBOR sequences and their EDN</t>
          </li>
          <li>
            <t>Fix broken external section references</t>
          </li>
          <li>
            <t>Define terminology for "upstream DNS infrastructure" and "upstream DNS server"</t>
          </li>
          <li>
            <t>Fix wording on DNS error handling</t>
          </li>
          <li>
            <t>Clarify that any OpCode beyond 0 is not supported for now and remove now redundant DNS Upgrade
section as a consequence</t>
          </li>
          <li>
            <t>Clarify that the DoC/DoH mapping is what is <bcp14>NOT RECOMMENDED</bcp14></t>
          </li>
          <li>
            <t>Avoid use of undefined term “CoAP resource identifier”</t>
          </li>
          <li>
            <t>Discuss Max-Age option value in an error case</t>
          </li>
          <li>
            <t>Add human-readable format to examples</t>
          </li>
          <li>
            <t>General language check pass</t>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-ietf-core-dns-over-coap-09">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-ietf-core-dns-over-coap-09">draft-ietf-core-dns-over-coap-09</eref></name>
        <ul spacing="normal">
          <li>
            <t>Update SVCB SvcParamKey</t>
          </li>
          <li>
            <t>Update corr-clar reference</t>
          </li>
          <li>
            <t>Add reference to DNS Update <eref target="https://datatracker.ietf.org/doc/html/rfc2136">[RFC2136]</eref>, clarify that it is currently not considered</t>
          </li>
          <li>
            <t>Add to security considerations: unprotected upstream DNS and DNSSEC</t>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-ietf-core-dns-over-coap-08">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-ietf-core-dns-over-coap-08">draft-ietf-core-dns-over-coap-08</eref></name>
        <ul spacing="normal">
          <li>
            <t>Update Cenk's Affiliation</t>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-ietf-core-dns-over-coap-07">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-ietf-core-dns-over-coap-07">draft-ietf-core-dns-over-coap-07</eref></name>
        <ul spacing="normal">
          <li>
            <t>Address IANA early review #1368678</t>
          </li>
          <li>
            <t>Update normative reference to CoAP over DTLS alpn SvcParam</t>
          </li>
          <li>
            <t>Add missing DTLSv1.2 reference</t>
          </li>
          <li>
            <t>Security considerations: Point into corr-clar-future</t>
          </li>
          <li>
            <t>Implementation Status: Update to current version</t>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-ietf-core-dns-over-coap-06">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-ietf-core-dns-over-coap-06">draft-ietf-core-dns-over-coap-06</eref></name>
        <ul spacing="normal">
          <li>
            <t>Add "docpath" SVCB ParamKey definition</t>
          </li>
          <li>
            <t>IANA fixes
            </t>
            <ul spacing="normal">
              <li>
                <t>Use new column names (see Errata 4954)</t>
              </li>
              <li>
                <t>Add reference to RFC 8484 for application/dns-message Media Type</t>
              </li>
              <li>
                <t>IANA: unify self references</t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-ietf-core-dns-over-coap-05">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-ietf-core-dns-over-coap-05">draft-ietf-core-dns-over-coap-05</eref></name>
        <ul spacing="normal">
          <li>
            <t>Add references to relevant SVCB/DNR RFCs and drafts</t>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-ietf-core-dns-over-coap-04">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-ietf-core-dns-over-coap-04">draft-ietf-core-dns-over-coap-04</eref></name>
        <ul spacing="normal">
          <li>
            <t>Add note on cacheable OSCORE</t>
          </li>
          <li>
            <t>Address early IANA review</t>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-ietf-core-dns-over-coap-03">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-ietf-core-dns-over-coap-03">draft-ietf-core-dns-over-coap-03</eref></name>
        <ul spacing="normal">
          <li>
            <t>Amended Introduction with short contextualization of constrained environments</t>
          </li>
          <li>
            <t>Add <xref target="sec_evaluation"/> on evaluation</t>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-ietf-core-dns-over-coap-02">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-ietf-core-dns-over-coap-02">draft-ietf-core-dns-over-coap-02</eref></name>
        <ul spacing="normal">
          <li>
            <t>Move implementation details to Implementation Status (in accordance with <xref target="RFC7942"/>)</t>
          </li>
          <li>
            <t>Recommend root path to keep the CoAP options small</t>
          </li>
          <li>
            <t>Set Content-Format for application/dns-message to 553</t>
          </li>
          <li>
            <t>SVCB/DNR: Move to Server Selection Section but leave TBD based on DNSOP discussion for now</t>
          </li>
          <li>
            <t>Clarify that DoC and DoH are distinct</t>
          </li>
          <li>
            <t>Clarify mapping between DoC and DoH</t>
          </li>
          <li>
            <t>Update considerations on unprotected use</t>
          </li>
          <li>
            <t>Don't call OSCORE end-to-end encrypted</t>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-ietf-core-dns-over-coap-01">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-ietf-core-dns-over-coap-01">draft-ietf-core-dns-over-coap-01</eref></name>
        <ul spacing="normal">
          <li>
            <t>Specify DoC server role in terms of DNS terminology</t>
          </li>
          <li>
            <t>Clarify communication of DoC to DNS infrastructure is agnostic of the transport</t>
          </li>
          <li>
            <t>Add subsection on how to implement DNS Push in DoC</t>
          </li>
          <li>
            <t>Add appendix on reference implementation</t>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-ietf-core-dns-over-coap-00">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-ietf-core-dns-over-coap-00">draft-ietf-core-dns-over-coap-00</eref></name>
        <ul spacing="normal">
          <li>
            <t>SVGify ASCII art</t>
          </li>
          <li>
            <t>Move section on "DoC Server Considerations" (was Section 5.1) to its own draft
(<eref target="https://datatracker.ietf.org/doc/draft-lenders-dns-cns/">draft-lenders-dns-cns</eref>)</t>
          </li>
          <li>
            <t>Replace layer violating statement for CON with statement of fact</t>
          </li>
          <li>
            <t>Add security considerations on ID=0</t>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-lenders-dns-over-coap-04">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-lenders-dns-over-coap-04">draft-lenders-dns-over-coap-04</eref></name>
        <ul spacing="normal">
          <li>
            <t>Removed change log of draft-lenders-dns-over-coap</t>
          </li>
        </ul>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors of this document want to thank Carsten Bormann, Esko Dijk, Thomas Fossati, Mikolai Gütschow, Ben Schwartz, Marco Tiloca, and Tim Wicinski for their feedback and comments.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
