<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-core-dns-over-coap-18" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.0 -->
  <?v3xml2rfc silence="Found SVG with width or height specified"?>
  <front>
    <title abbrev="DoC">DNS over CoAP (DoC)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-core-dns-over-coap-18"/>
    <author initials="M. S." surname="Lenders" fullname="Martine Sophie Lenders">
      <organization abbrev="TU Dresden">TUD Dresden University of Technology</organization>
      <address>
        <postal>
          <street>Helmholtzstr. 10</street>
          <city>Dresden</city>
          <code>D-01069</code>
          <country>Germany</country>
        </postal>
        <email>martine.lenders@tu-dresden.de</email>
      </address>
    </author>
    <author initials="C." surname="Amsüss" fullname="Christian Amsüss">
      <organization/>
      <address>
        <email>christian@amsuess.com</email>
      </address>
    </author>
    <author initials="C." surname="Gündoğan" fullname="Cenk Gündoğan">
      <organization>NeuralAgent GmbH</organization>
      <address>
        <postal>
          <street>Mies-van-der-Rohe-Straße 6</street>
          <city>Munich</city>
          <code>D-80807</code>
          <country>Germany</country>
        </postal>
        <email>cenk.gundogan@neuralagent.ai</email>
      </address>
    </author>
    <author initials="T. C." surname="Schmidt" fullname="Thomas C. Schmidt">
      <organization>HAW Hamburg</organization>
      <address>
        <postal>
          <street>Berliner Tor 7</street>
          <city>Hamburg</city>
          <code>D-20099</code>
          <country>Germany</country>
        </postal>
        <email>t.schmidt@haw-hamburg.de</email>
      </address>
    </author>
    <author initials="M." surname="Wählisch" fullname="Matthias Wählisch">
      <organization abbrev="TU Dresden &amp; Barkhausen Institut">TUD Dresden University of Technology &amp; Barkhausen Institut</organization>
      <address>
        <postal>
          <street>Helmholtzstr. 10</street>
          <city>Dresden</city>
          <code>D-01069</code>
          <country>Germany</country>
        </postal>
        <email>m.waehlisch@tu-dresden.de</email>
      </address>
    </author>
    <date year="2025" month="August" day="29"/>
    <area>Applications</area>
    <workgroup>CoRE</workgroup>
    <keyword>Internet-Draft</keyword>
    <keyword>CoRE</keyword>
    <keyword>CoAP</keyword>
    <keyword>DNS</keyword>
    <abstract>
      <?line 115?>

<t>This document defines a protocol for exchanging DNS queries (OPCODE 0) over the
Constrained Application Protocol (CoAP). These CoAP messages can be protected
by (D)TLS-Secured CoAP (CoAPS) or Object Security for Constrained RESTful
Environments (OSCORE) to provide encrypted DNS message exchange for
constrained devices in the Internet of Things (IoT).</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://core-wg.github.io/draft-dns-over-coap/draft-ietf-core-dns-over-coap.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-core-dns-over-coap/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        CoRE Working Group mailing list (<eref target="mailto:core@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/core/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/core/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/core-wg/draft-dns-over-coap"/>.</t>
    </note>
  </front>
  <middle>
    <?line 123?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document defines DNS over CoAP (DoC), a protocol to send DNS
<xref target="STD13"/> queries and get DNS responses over the Constrained Application
Protocol (CoAP) <xref target="RFC7252"/> using OPCODE 0 (Query). Each DNS query-response pair is mapped into a
CoAP message exchange. Each CoAP message can be secured by DTLS 1.2 or newer <xref target="RFC6347"/> <xref target="RFC9147"/>
as well as Object Security for Constrained RESTful Environments (OSCORE) <xref target="RFC8613"/>
but also TLS 1.3 or newer <xref target="RFC8323"/> <xref target="RFC8446"/>
to ensure message integrity and confidentiality.</t>
      <t>The application use case of DoC is inspired by DNS over HTTPS <xref target="RFC8484"/>
(DoH). DoC, however, aims for deployment in the constrained Internet of
Things (IoT), which usually conflicts with the requirements introduced by
HTTPS.
Constrained IoT devices may be restricted in memory, power consumption,
link-layer frame sizes, throughput, and latency. They may
only have a handful kilobytes of both RAM and ROM. They may sleep for long
durations of time, after which they need to refresh the named resources they
know about. Name resolution in such scenarios must take into account link
layer frame sizes of only a few hundred bytes, bit rates in the magnitude
of kilobits per second, and latencies of several seconds <xref target="RFC7228"/> <xref target="I-D.ietf-iotops-7228bis"/> <cref anchor="remove-constr-nodes">RFC Ed.: Please remove the <xref target="RFC7228"/> reference and replace it with <xref target="I-D.ietf-iotops-7228bis"/> throughout the document in case <xref target="I-D.ietf-iotops-7228bis"/> becomes an RFC before publication.</cref>.</t>
      <t>In order not to be burdened by the resource requirements of TCP and HTTPS, constrained IoT devices could use DNS over DTLS <xref target="RFC8094"/>.
In contrast to DNS over DTLS, DoC
can take advantage of CoAP features to mitigate drawbacks of datagram-based
communication. These features include: block-wise transfer <xref target="RFC7959"/>, which solves
the Path MTU problem of DNS over DTLS (see <xref section="5" sectionFormat="comma" target="RFC8094"/>); CoAP
proxies, which provide an additional level of caching; re-use of data
structures for application traffic and DNS information, which saves memory
on constrained devices.</t>
      <t>To avoid the resource requirements of DTLS or TLS on top of UDP (e.g., introduced by DNS over DTLS <xref target="RFC8094"/> or DNS over QUIC <xref target="RFC9250"/>), DoC allows for lightweight message protection based on OSCORE.</t>
      <figure anchor="fig-overview-arch">
        <name>Basic DoC architecture</name>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="224" width="552" viewBox="0 0 552 224" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,96 L 8,144" fill="none" stroke="black"/>
              <path d="M 64,96 L 64,144" fill="none" stroke="black"/>
              <path d="M 208,96 L 208,144" fill="none" stroke="black"/>
              <path d="M 264,96 L 264,144" fill="none" stroke="black"/>
              <path d="M 400,112 L 400,128" fill="none" stroke="black"/>
              <path d="M 544,112 L 544,128" fill="none" stroke="black"/>
              <path d="M 8,96 L 64,96" fill="none" stroke="black"/>
              <path d="M 208,96 L 264,96" fill="none" stroke="black"/>
              <path d="M 416,96 L 528,96" fill="none" stroke="black"/>
              <path d="M 72,112 L 200,112" fill="none" stroke="black"/>
              <path d="M 272,112 L 288,112" fill="none" stroke="black"/>
              <path d="M 304,112 L 320,112" fill="none" stroke="black"/>
              <path d="M 336,112 L 352,112" fill="none" stroke="black"/>
              <path d="M 368,112 L 392,112" fill="none" stroke="black"/>
              <path d="M 72,128 L 200,128" fill="none" stroke="black"/>
              <path d="M 272,128 L 296,128" fill="none" stroke="black"/>
              <path d="M 312,128 L 328,128" fill="none" stroke="black"/>
              <path d="M 344,128 L 360,128" fill="none" stroke="black"/>
              <path d="M 376,128 L 392,128" fill="none" stroke="black"/>
              <path d="M 8,144 L 64,144" fill="none" stroke="black"/>
              <path d="M 208,144 L 264,144" fill="none" stroke="black"/>
              <path d="M 416,144 L 528,144" fill="none" stroke="black"/>
              <path d="M 40,192 L 80,192" fill="none" stroke="black"/>
              <path d="M 192,192 L 224,192" fill="none" stroke="black"/>
              <path d="M 248,192 L 264,192" fill="none" stroke="black"/>
              <path d="M 480,192 L 504,192" fill="none" stroke="black"/>
              <path d="M 32,176 L 40,192" fill="none" stroke="black"/>
              <path d="M 236,168 L 248,192" fill="none" stroke="black"/>
              <path d="M 104,64 L 120,32" fill="none" stroke="black"/>
              <path d="M 224,192 L 236,168" fill="none" stroke="black"/>
              <path d="M 504,192 L 512,176" fill="none" stroke="black"/>
              <path d="M 416,96 C 407.16936,96 400,103.16936 400,112" fill="none" stroke="black"/>
              <path d="M 528,96 C 536.83064,96 544,103.16936 544,112" fill="none" stroke="black"/>
              <path d="M 416,144 C 407.16936,144 400,136.83064 400,128" fill="none" stroke="black"/>
              <path d="M 528,144 C 536.83064,144 544,136.83064 544,128" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="400,112 388,106.4 388,117.6" fill="black" transform="rotate(0,392,112)"/>
              <polygon class="arrowhead" points="280,128 268,122.4 268,133.6" fill="black" transform="rotate(180,272,128)"/>
              <polygon class="arrowhead" points="208,112 196,106.4 196,117.6" fill="black" transform="rotate(0,200,112)"/>
              <polygon class="arrowhead" points="80,128 68,122.4 68,133.6" fill="black" transform="rotate(180,72,128)"/>
              <g class="text">
                <text x="152" y="36">FETCH</text>
                <text x="268" y="36">coaps://[2001:db8::1]/</text>
                <text x="108" y="84">CoAP</text>
                <text x="160" y="84">request</text>
                <text x="108" y="100">[DNS</text>
                <text x="156" y="100">query]</text>
                <text x="304" y="100">DNS</text>
                <text x="344" y="100">query</text>
                <text x="32" y="116">DoC</text>
                <text x="232" y="116">DoC</text>
                <text x="464" y="116">DNS</text>
                <text x="36" y="132">Client</text>
                <text x="236" y="132">Server</text>
                <text x="468" y="132">Infrastructure</text>
                <text x="100" y="148">CoAP</text>
                <text x="156" y="148">response</text>
                <text x="296" y="148">DNS</text>
                <text x="348" y="148">response</text>
                <text x="100" y="164">[DNS</text>
                <text x="160" y="164">response]</text>
                <text x="96" y="196">DNS</text>
                <text x="132" y="196">over</text>
                <text x="172" y="196">CoAP</text>
                <text x="280" y="196">DNS</text>
                <text x="316" y="196">over</text>
                <text x="408" y="196">UDP/HTTPS/QUIC/..</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
              . FETCH coaps://[2001:db8::1]/
             /
            /
           CoAP request
+------+   [DNS query]   +------+   DNS query     .---------------.
| DoC  |---------------->| DoC  |--- --- --- --->|      DNS        |
|Client|<----------------|Server|<--- --- --- ---| Infrastructure  |
+------+  CoAP response  +------+  DNS response   '---------------'
          [DNS response]
   \                        /\                                 /
    '-----DNS over CoAP----'  '--DNS over UDP/HTTPS/QUIC/...--'

]]></artwork>
        </artset>
      </figure>
      <t>The most important components of DoC can be seen in <xref target="fig-overview-arch"/>: a DoC
client tries to resolve DNS information by sending DNS queries carried within
CoAP requests to a DoC server.
That DoC server is a DNS client (i.e., a stub or recursive resolver) that resolves DNS information by using other DNS transports such
as DNS over UDP <xref target="STD13"/>, DNS over HTTPS <xref target="RFC8484"/>, or DNS over QUIC <xref target="RFC9250"/> when communicating with the upstream
DNS infrastructure.
Using that information, the DoC server then replies to the queries of the DoC client with DNS
responses carried within CoAP responses.
A DoC server <bcp14>MAY</bcp14> also serve as DNSSEC validator to provide DNSSEC validation to the more
constrained DoC clients.</t>
      <t>Note that this specification is distinct from DoH, since the CoAP-specific FETCH method <xref target="RFC8132"/> is used.
This has the benefit of having the DNS query in the body as when using the POST method, but still with the same caching advantages of responses to requests that use the GET method.
Having the DNS query in the body means that we do not need extra base64 encoding, which would increase
code complexity and message sizes.
Also, this allows for the block-wise transfer of queries <xref target="RFC7959"/>.</t>
    </section>
    <section anchor="terminology-and-conventions">
      <name>Terminology and Conventions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>A server that provides the service specified in this document is called a "DoC
server" to differentiate it from a classic "DNS server".
A DoC server acts either as a DNS stub resolver or a DNS recursive resolver <xref target="BCP219"/>.
As such, the DoC server communicates with an "upstream DNS infrastructure" or a single "upstream DNS server".
A "DoC resource" is a CoAP resource <xref target="RFC7252"/> at the DoC server that DoC clients can target to send a DNS query in a CoAP request.</t>
      <t>A client using the service specified in this document to retrieve the
DNS information is called a "DoC client".</t>
      <t>The term "constrained nodes" is used as defined in <xref target="RFC7228"/>.
<xref target="RFC6690"/> describes that "Constrained RESTful Environments (CoRE)" realize the Representational State Transfer (REST) architecture <xref target="REST"/> in a suitable form for such constrained nodes.</t>
      <t>The terms "payload" and "body" are used as defined in <xref section="2" sectionFormat="comma" target="RFC7959"/>.
Note that, when block-wise transfer is not used, the terms "payload" and "body" are to be understood as equal.</t>
      <t>For better readability, in the examples in this document the binary payload and resource records are shown in a hexadecimal representation as well as a human-readable format.
In the actual message sent and received, however, they are encoded in the binary message format defined in <xref target="STD13"/>.</t>
    </section>
    <section anchor="sec_doc-server-selection">
      <name>Selection of a DoC Server</name>
      <t>While there is no path specified for the DoC resource, it is <bcp14>RECOMMENDED</bcp14> to use the root path "/"
to keep the CoAP requests small.</t>
      <t>The DoC client needs to know the DoC server and the DoC resource at the DoC server.
Possible options to assure this could be manual configuration of a Uniform Resource Identifier (URI) <xref target="RFC3986"/> or Constrained Resource Identifier (CRI) <xref target="I-D.ietf-core-href"/>,
or automatic configuration, e.g., using a CoRE resource directory
<xref target="RFC9176"/>, DHCP or Router Advertisement options <xref target="RFC9463"/>, or discovery of designated resolvers
<xref target="RFC9462"/>.
Automatic configuration <bcp14>MUST</bcp14> only be done from a trusted source.</t>
      <section anchor="discovery-by-resource-type">
        <name>Discovery by Resource Type</name>
        <t>For discovery of the DoC resource through a link mechanism that allows describing a resource type
(e.g., the Resource Type attribute in <xref target="RFC6690"/>), this document introduces the resource type "core.dns".
It can be used to identify a generic DNS resolver that is available to the client.</t>
      </section>
      <section anchor="discovery-using-svcb-resource-records-or-dnr">
        <name>Discovery using SVCB Resource Records or DNR</name>
        <t>A DoC server can also be discovered using Service Binding (SVCB) Resource Records (RR) <xref target="RFC9460"/> <xref target="RFC9461"/> or Discovery of Network-designated Resolvers (DNR)
Service Parameters <xref target="RFC9463"/>.
<xref target="RFC8323"/> defines the Application-Layer Protocol Negotiation (ALPN) ID for CoAP over TLS servers and <xref target="I-D.ietf-core-coap-dtls-alpn"/> defines the ALPN ID for CoAP over DTLS servers.
Because the ALPN extension is only defined for (D)TLS, these mechanisms cannot be used for DoC servers which use only OSCORE <xref target="RFC8613"/> and Ephemeral Diffie-Hellman Over COSE (EDHOC) <xref target="RFC9528"/> (with COSE abbreviating "Concise Binary Object Notation (CBOR) Object Signing and Encryption" <xref target="RFC9052"/>) for security.
Specifying an alternate discovery mechanism is out of scope of this specification.
<xref target="I-D.lenders-core-dnr"/> provides  further exploration of the challenges here.</t>
        <t>This document is not an SVCB mapping document for the CoAP schemes
as defined in <xref section="2.4.3" sectionFormat="of" target="RFC9460"/>.
A full SVCB mapping is specified in <xref target="I-D.ietf-core-transport-indication"/>.
It generalizes mechanisms for all CoAP services.
This document introduces only the discovery of DoC services.</t>
        <t>This document specifies "docpath" as
a single-valued SvcParamKey that is mandatory for DoC SVCB records.
If the "docpath" SvcParamKey is absent, the service should not be considered a valid DoC service.</t>
        <t>The docpath is devided up into segments of the absolute path to the DoC resource (docpath-segment),
each a sequence of 1-255 octets.
In ABNF <xref target="RFC5234"/>:</t>
        <artwork><![CDATA[
docpath-segment = 1*255OCTET
]]></artwork>
        <t>Note that this restricts the length of each docpath-segment to at most 255 octets.
Paths with longer segments cannot be advertised with the "docpath" SvcParam and are thus <bcp14>NOT
RECOMMENDED</bcp14> for the path to the DoC resource.</t>
        <t>The presentation format value of "docpath" <bcp14>SHALL</bcp14> be a comma-separated list (<xref section="A.1" sectionFormat="of" target="RFC9460"/>)
of 0 or more docpath-segments.
The root path "/" is represented by 0 docpath-segments, i.e., an empty list.
The same considerations for the "," and "" characters in docpath-segments for zone-file
implementations as for the alpn-ids in an "alpn" SvcParam apply (<xref section="7.1.1" sectionFormat="of" target="RFC9460"/>).</t>
        <t>The wire-format value for "docpath" consists of 0 or more sequences of octets prefixed by their
respective length as a single octet.
We call this single octet the length octet.
The length octet and the corresponding sequence form a length-value pair.
These length-value pairs are concatenated to form the SvcParamValue.
These pairs <bcp14>MUST</bcp14> exactly fill the SvcParamValue; otherwise, the SvcParamValue is malformed.
Each such length-value pair represents one segment of the absolute path to the DoC resource.
The root path "/" is represented by 0 length-value pairs, i.e., SvcParamValue length 0.</t>
        <t>Note that this format uses the same encoding as the "alpn" SvcParam and can reuse the
decoders and encoders for that SvcParam with the adaption that a length of zero is allowed.
As long as each docpath-segment is of length 0 and 24 octets, it is easily transferred into the path
representation in CRIs <xref target="I-D.ietf-core-href"/> by masking each length octet with the CBOR text string major type 3
(<tt>0x60</tt> as an octet, see <xref target="RFC8949"/>).
Furthermore, it is easily transferable into a sequence of CoAP Uri-Path options by
mapping each length octet into the Option Delta and Option Length of the corresponding CoAP Uri-Path
option, provided the docpath-segments are all of a length between 0 and 12 octets (see <xref section="3.1" sectionFormat="comma" target="RFC7252"/>).
Likewise, it can be transferred into a URI path-abempty form by replacing each length octet with the "/" character
None of the abovementioned prevent longer docpath-segments than the considered, they just make the
translation harder, as they require to make space for the longer delimiters, in turn requiring to move octets.</t>
        <t>To use the service binding from an SVCB RR or DNR Encrypted DNS option, the DoC client <bcp14>MUST</bcp14> send a DoC request constructed from the SvcParams including "docpath".
The construction algorithm for DoC requests is as follows, going through the provided records in order of their priority.
For the purposes of this algorithm, the DoC client is assumed to be SVCB-optional (see <xref section="3" sectionFormat="of" target="RFC9460"/>).</t>
        <ul spacing="normal">
          <li>
            <t>If the "alpn" SvcParam value for the service is "coap", a CoAP request for CoAP over TLS <bcp14>MUST</bcp14> be constructed <xref target="RFC8323"/>.
If it is "co", a CoAP request for CoAP over DTLS <bcp14>MUST</bcp14> be constructed <xref target="I-D.ietf-core-coap-dtls-alpn"/>.
Any other SvcParamKeys specifying a transport are out of the scope of this document.</t>
          </li>
          <li>
            <t>The destination address for the request <bcp14>SHOULD</bcp14> be taken from additional information about the target, e.g., from an AAAA record associated with the target name or from an "ipv6hint" SvcParam value.
As a fallback, an address <bcp14>MAY</bcp14> be queried for the target name of the SVCB record.</t>
          </li>
          <li>
            <t>The destination port for the request <bcp14>MUST</bcp14> be taken from the "port" SvcParam value, if present.
Otherwise, take the default port of the CoAP transport, e.g., with regards to this specification TCP port 5684 for "coap" or UDP port 5684 for "co".
This document introduces no limitations on the ports that can be used.
If a malicious SVCB record allows its originator to influence message payloads, <xref section="12" sectionFormat="of" target="RFC9460"/> recommends placing such restrictions in the SVCB mapping document.
The records used in this document only infuence the Uri-Path option.
That option is only sent in the plaintext of an encrytped (D)TLS channel,
and thus does not warrant any limitations.</t>
          </li>
          <li>
            <t>The request URI's hostname component <bcp14>MUST</bcp14> be the Authentication Domain Name (ADN) when obtained through DNR
and <bcp14>MUST</bcp14> be the target name of the SVCB record when obtained through a <tt>_dns</tt> query
(if AliasMode is used, to the target name of the AliasMode record).
This can be achieved efficiently by setting that name in TLS Server Name Indication (SNI) <xref target="RFC8446"/>,
or by setting the Uri-Host option on each request.</t>
          </li>
          <li>
            <t>For each element in the CBOR sequence of the "docpath" SvcParam value, a Uri-Path option <bcp14>MUST</bcp14> be added to the request.</t>
          </li>
          <li>
            <t>If the request constructed this way receives a response, the same SVCB record <bcp14>MUST</bcp14> be used for construction of future DoC queries.
If not, or if the endpoint becomes unreachable, the algorithm repeats with the SVCB RR or DNR Encrypted DNS option with the next highest Service Priority as a fallback (see Sections <xref target="RFC9460" section="2.4.1" sectionFormat="bare"/> and <xref target="RFC9460" section="3" sectionFormat="bare"/> of <xref target="RFC9460"/>).</t>
          </li>
        </ul>
        <t>A more generalized construction algorithm for any CoAP request can be found in <xref target="I-D.ietf-core-transport-indication"/>.</t>
        <section anchor="examples">
          <name>Examples</name>
          <t><cref anchor="replace-hex">RFC Ed.: Since the number for "docpath" was not assigned at the time of writing, we
used the hex <tt>ff 0a</tt> (in decimal 65290; from the private use range of SvcParamKeys) throughout
this section. Before publication, please replace <tt>ff 0a</tt> with the hexadecimal representation of
the final value assigned by IANA in this section. Please remove this paragraph after that.</cref></t>
          <t>A typical SVCB resource record response for a DoC server at the root path "/" of the server looks
like the following (the "docpath" SvcParam is the last 4 bytes <tt>ff 0a 00 00</tt> in the binary):</t>
          <artwork><![CDATA[
Resource record (binary):
  04 5f 64 6e 73 07 65 78 61 6d 70 6c 65 03 6f 72
  67 00 00 40 00 01 00 00 06 28 00 1e 00 01 03 64
  6e 73 07 65 78 61 6d 70 6c 65 03 6f 72 67 00 00
  01 00 03 02 63 6f ff 0a 00 00

Resource record (human-readable):
  _dns.example.org.  1576  IN SVCB 1 dns.example.org (
      alpn=co docpath )
]]></artwork>
          <t>The root path is <bcp14>RECOMMENDED</bcp14> but not required. Here are two examples where the "docpath" represents
paths of varying depth. First, "/dns" is provided in the following example
(the last 8 bytes <tt>ff 0a 00 04 03 64 6e 73</tt>):</t>
          <artwork><![CDATA[
Resource record (binary):
  04 5f 64 6e 73 07 65 78 61 6d 70 6c 65 03 6f 72
  67 00 00 40 00 01 00 00 00 55 00 22 00 01 03 64
  6e 73 07 65 78 61 6d 70 6c 65 03 6f 72 67 00 00
  01 00 03 02 63 6f ff 0a 00 04 03 64 6e 73

Resource record (human-readable):
  _dns.example.org.    85  IN SVCB 1 dns.example.org (
      alpn=co docpath=dns )
]]></artwork>
          <t>Second, an examples for the path "/n/s" (the last 8 bytes <tt>ff 0a 00 04 01 6e 01 73</tt>):</t>
          <artwork><![CDATA[
Resource record (binary):
  04 5f 64 6e 73 07 65 78 61 6d 70 6c 65 03 6f 72
  67 00 00 40 00 01 00 00 06 6b 00 22 00 01 03 64
  6e 73 07 65 78 61 6d 70 6c 65 03 6f 72 67 00 00
  01 00 03 02 63 6f ff 0a 00 04 01 6e 01 73

Resource record (human-readable):
  _dns.example.org.   643  IN SVCB 1 dns.example.org (
      alpn=co docpath=n,s )
]]></artwork>
          <t>If the server also provides DNS over HTTPS, "dohpath" and "docpath" <bcp14>MAY</bcp14> co-exist:</t>
          <artwork><![CDATA[
Resource record (binary):
  04 5f 64 6e 73 07 65 78 61 6d 70 6c 65 03 6f 72
  67 00 00 40 00 01 00 00 01 ad 00 2b 00 01 03 64
  6e 73 07 65 78 61 6d 70 6c 65 03 6f 72 67 00 00
  01 00 06 02 68 33 02 63 6f 00 07 00 07 2f 7b 3f
  64 6e 73 7d ff 0a 00 00

Resource record (human-readable):
  _dns.example.org.   429  IN SVCB 1 dns.example.org (
      alpn=h3,co dohpath=/{?dns} docpath )
]]></artwork>
        </section>
      </section>
    </section>
    <section anchor="basic-message-exchange">
      <name>Basic Message Exchange</name>
      <section anchor="sec_content-format">
        <name>The "application/dns-message" Content-Format</name>
        <t>This document defines a CoAP Content-Format identifier for the Internet
media type "application/dns-message" to be the mnemonic 553 — based on the port assignment of DNS.
This media type is defined as in <xref section="6" sectionFormat="of" target="RFC8484"/>, i.e., a single DNS message encoded in the DNS on-the-wire format <xref target="STD13"/>.
Both DoC client and DoC server <bcp14>MUST</bcp14> be able to parse contents in the "application/dns-message" Content-Format.
This document only specifies OPCODE 0 (Query) for DNS over CoAP messages.
Future documents can provide considerations for additional OPCODEs or extend its specification (e.g. by describing whether other CoAP codes need to be used for which OPCODE).
Unless another error takes precedence, a DoC server uses RCODE = 4, NotImp <xref target="STD13"/>, in its response to a query with an OPCODE that it does not implement (see also <xref target="sec_resp-examples"/>).</t>
      </section>
      <section anchor="sec_queries">
        <name>DNS Queries in CoAP Requests</name>
        <t>A DoC client encodes a single DNS query in one or more CoAP request
messages that use the CoAP FETCH <xref target="RFC8132"/> request method.
Requests <bcp14>SHOULD</bcp14> include an Accept option to indicate the type of content that can be parsed in the response.</t>
        <t>Since CoAP provides reliability at the message layer (e.g., through Confirmable messages) the retransmission mechanism of the
DNS protocol as defined in <xref target="STD13"/> is not needed.</t>
        <section anchor="request-format">
          <name>Request Format</name>
          <t>When sending a CoAP request, a DoC client <bcp14>MUST</bcp14> include the DNS query in the body of the CoAP request.
As specified in <xref section="2.3.1" sectionFormat="of" target="RFC8132"/>, the type of content of the body <bcp14>MUST</bcp14> be indicated using the Content-Format option.
This document specifies the usage of Content-Format "application/dns-message" (for details, see <xref target="sec_content-format"/>).
A DoC server <bcp14>MUST</bcp14> be able to parse requests of Content-Format "application/dns-message".</t>
        </section>
        <section anchor="sec_req-caching">
          <name>Support of CoAP Caching</name>
          <t>The DoC client <bcp14>SHOULD</bcp14> set the ID field of the DNS header to 0 to enable a CoAP cache (e.g., a CoAP proxy en-route) to respond to the same DNS queries with a cache entry.
This ensures that the CoAP Cache-Key (see <xref section="2" sectionFormat="comma" target="RFC8132"/>) does not change when multiple DNS queries for the same DNS data, carried in CoAP requests, are issued.
Apart from losing these caching benefits, there is no harm it not setting it to 0, e.g., when the query was received from somewhere else.
In any instance, a DoC server <bcp14>MUST</bcp14> copy the ID from the query in its response to that query.</t>
        </section>
        <section anchor="sec_req-examples">
          <name>Example</name>
          <t>The following example illustrates the usage of a CoAP message to
resolve "example.org. IN AAAA" based on the URI "coaps://[2001:db8::1]/". The
CoAP body is encoded in the "application/dns-message" Content-Format.</t>
          <artwork><![CDATA[
FETCH coaps://[2001:db8::1]/
Content-Format: 553 (application/dns-message)
Accept: 553 (application/dns-message)
Payload (binary):
  00 00 01 00 00 01 00 00 00 00 00 00 07 65 78 61
  6d 70 6c 65 03 6f 72 67 00 00 1c 00 01

Payload (human-readable):
  ;; ->>Header<<- opcode: QUERY, status: NOERROR, id: 0
  ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0

  ;; QUESTION SECTION:
  ;example.org.             IN      AAAA
]]></artwork>
        </section>
      </section>
      <section anchor="dns-responses-in-coap-responses">
        <name>DNS Responses in CoAP Responses</name>
        <t>Each DNS query-response pair is mapped to a CoAP request-response operation.
DNS responses are provided in the body of the CoAP response, i.e., it is also possible to transfer them using block-wise transfer <xref target="RFC7959"/>.
A DoC server <bcp14>MUST</bcp14> be able to produce responses in the "application/dns-message"
Content-Format (for details, see <xref target="sec_content-format"/>) when requested.
The use of the Accept option in the request is optional.
However, all DoC clients <bcp14>MUST</bcp14> be able to parse a "application/dns-message" response (see also <xref target="sec_content-format"/>).
Any response Content-Format other than "application/dns-message" <bcp14>MUST</bcp14> be indicated with
the Content-Format option by the DoC server.</t>
        <section anchor="response-codes-and-handling-dns-and-coap-errors">
          <name>Response Codes and Handling DNS and CoAP errors</name>
          <t>A DNS response indicates either success or failure in the RCODE of the DNS header (see <xref target="STD13"/>).
It is <bcp14>RECOMMENDED</bcp14> that CoAP responses that carry a parseable DNS response use a 2.05 (Content) response code.</t>
          <t>CoAP responses using non-successful response codes <bcp14>MUST NOT</bcp14> contain a DNS response
and <bcp14>MUST</bcp14> only be used for errors in the CoAP layer or when a request does not
fulfill the requirements of the DoC protocol.</t>
          <t>Communication errors with an upstream DNS server (e.g., timeouts) <bcp14>MUST</bcp14> be indicated by including a DNS response with the appropriate RCODE in a successful CoAP response, i.e., using a 2.xx response code.
When an error occurs at the CoAP layer, e.g., if an unexpected request method or an unsupported Content-Format in the request are used, the DoC server <bcp14>SHOULD</bcp14> respond with an appropriate CoAP error.</t>
          <t>A DoC client might try to repeat a non-successful exchange unless otherwise prohibited.
The DoC client might also decide to repeat a non-successful exchange with a different URI, for instance, when the response indicates an unsupported Content-Format.</t>
        </section>
        <section anchor="sec_resp-caching">
          <name>Support of CoAP Caching</name>
          <t>For reliability and energy saving measures, content decoupling (such as en-route caching on proxies) takes a far greater role than it does in HTTP.
Likewise, CoAP makes it possible to use cache validation to refresh stale cache entries to reduce the number of large response messages.
For cache validation, CoAP implementations regularly use hashing over the message content for ETag generation (see <xref section="5.10.6" sectionFormat="comma" target="RFC7252"/>).
As such, the approach to guarantee the same cache key for DNS responses as proposed in DoH (<xref section="5.1" sectionFormat="comma" target="RFC8484"/>) is not sufficient and needs to be updated so that the TTLs in the response are more often the same regardless of query time.</t>
          <t>The DoC server <bcp14>MUST</bcp14> ensure that the sum of the Max-Age value of a CoAP response and any TTL in the
DNS response is less than or equal to the corresponding TTL received from an upstream DNS server.
This also includes the default Max-Age value of 60 seconds (see <xref section="5.10.5" sectionFormat="of" target="RFC7252"/>) when no Max-Age option is provided.
The DoC client <bcp14>MUST</bcp14> then add the Max-Age value of the carrying CoAP response to all TTLs in a DNS response on reception and use these calculated TTLs for the associated records.</t>
          <t>The <bcp14>RECOMMENDED</bcp14> algorithm for a DoC server to meet the requirement for DoC is as follows:
Set the Max-Age option of a response to the minimum TTL of a DNS response and subtract this value from all TTLs of that DNS response.
This prevents expired records unintentionally being served from an intermediate CoAP cache.
Additionally, if the ETag for cache validation is based on the content of the response, it allows that ETag not to change.
This then remains the case even if the TTL values are updated by an upstream DNS cache.
If only one record set per DNS response is assumed, a simplification of this algorithm is to just set all TTLs in the response to 0 and set the TTLs at the DoC client to the value of the Max-Age option.</t>
          <t>If shorter caching periods are plausible, e.g., if the RCODE of the message indicates an error that should only be cached for a minimal duration, the value for the Max-Age option <bcp14>SHOULD</bcp14> be set accordingly.
This value might be 0, but if the DoC server knows that the error will persist, greater values are also conceivable, depending on the projected duration of the error.
The same applies for DNS responses that for any reason do not carry any records with a TTL.</t>
        </section>
        <section anchor="sec_resp-examples">
          <name>Examples</name>
          <t>The following example illustrates the response to the query "example.org. IN
AAAA record", with recursion turned on. Successful responses carry one answer
record including address 2001:db8:1:0:1:2:3:4 and TTL 79689.</t>
          <t>A successful response:</t>
          <artwork><![CDATA[
2.05 Content
Content-Format: 553 (application/dns-message)
Max-Age: 58719
Payload (human-readable):
  ;; ->>Header<<- opcode: QUERY, status: NOERROR, id: 0
  ;; flags: qr rd ad; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0

  ;; QUESTION SECTION:
  ;example.org.                 IN      AAAA
  ;; ANSWER SECTION:
  ;example.org.         79689   IN      AAAA    2001:db8:1:0:1:2:3:4
]]></artwork>
          <t>When a DNS error – NxDomain (RCODE = 3) for "does.not.exist" in this case – is noted in the DNS response, the CoAP response still indicates success.</t>
          <artwork><![CDATA[
2.05 Content
Content-Format: 553 (application/dns-message)
Payload (human-readable):
  ;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 0
  ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0

  ;; QUESTION SECTION:
  ;does.not.exist.              IN      AAAA
]]></artwork>
          <t>As described in <xref target="sec_content-format"/>, a DoC server uses NotImp (RCODE = 4) if it does not support an OPCODE—a DNS Update (OPCODE = 5) for "example.org" in this case.</t>
          <artwork><![CDATA[
2.05 Content
Content-Format: 553 (application/dns-message)
Payload (human-readable):
  ;; ->>Header<<- opcode: UPDATE, status: NOTIMP, id: 0
  ;; flags: qr ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0

  ;; QUERY SECTION:
  ;example.org.                 IN      AAAA
]]></artwork>
          <t>When an error occurs at the CoAP layer, the DoC server responds with
an appropriate CoAP error, for instance 4.15 (Unsupported Content-Format)
if the Content-Format option in the request was not set to
"application/dns-message" and the Content-Format is not otherwise supported by
the server.</t>
          <artwork><![CDATA[
4.15 Unsupported Content-Format
[no payload]
]]></artwork>
        </section>
      </section>
    </section>
    <section anchor="interaction-with-other-coap-and-core-features">
      <name>Interaction with other CoAP and CoRE Features</name>
      <section anchor="dns-push-notifications-and-coap-observe">
        <name>DNS Push Notifications and CoAP Observe</name>
        <t>DNS Push Notifications <xref target="RFC8765"/> provides the capability to asynchronously notify clients about resource record changes.
However, it results in additional overhead, which conflicts with constrained resources.
This is the reason why it is <bcp14>RECOMMENDED</bcp14> to use CoAP Observe <xref target="RFC7641"/> instead of DNS Push
in the DoC domain.
The DoC server <bcp14>SHOULD</bcp14> provide Observe capabilities on its DoC resource and do as follows.</t>
        <t>A DoC server
<bcp14>MAY</bcp14> subscribe to DNS push notifications,
which involves sending a DNS Subscribe message (see (<xref section="6.2" sectionFormat="of" target="RFC8765"/>),
instead of a classic DNS query to fetch the
information on behalf of a DoC client.
This is particularly useful
when a CoAP request indicates that the DoC client wants to observe a resource record,
or when a short-lived record is requested frequently.
After the list of observers for a particular DNS query has become empty
(by explicit or implicit cancellation of the observation as per <xref section="3.6" sectionFormat="of" target="RFC7641"/>),
and no other reason to subscribe to that request is present,
the DoC server <bcp14>SHOULD</bcp14> cancel the corresponding subscription.
This can involve sending an DNS Unsubscribe message or closing the session (see <xref section="6.4" sectionFormat="of" target="RFC8765"/>).</t>
        <t>Whenever the DoC server receives a DNS Push message from the DNS
infrastructure for an observed resource record, the DoC server sends an appropriate Observe notification response
to the DoC client.</t>
        <t>A server that cannot proxy to DNS Push (or any other means of obtaining new records) should not send the response as a notification
(i.e., it should not send the Observe option).</t>
      </section>
      <section anchor="oscore">
        <name>OSCORE</name>
        <t>It is <bcp14>RECOMMENDED</bcp14> to carry DNS messages protected using OSCORE <xref target="RFC8613"/> between the DoC client
and the DoC server. The establishment and maintenance of the OSCORE Security Context is out of the
scope of this document.</t>
        <t><xref target="I-D.amsuess-core-cachable-oscore"/> describes a method to allow cache retrieval of OSCORE responses and discusses
the corresponding implications on message sizes and security properties.</t>
      </section>
      <section anchor="mapping-doc-to-doh">
        <name>Mapping DoC to DoH</name>
        <t>This document provides no specification on how to map between DoC and DoH, e.g., at a CoAP-to-HTTP-proxy; such a direct mapping is <bcp14>NOT RECOMMENDED</bcp14>:
rewriting the FETCH method (<xref target="sec_queries"/>) and the TTL rewriting (<xref target="sec_resp-caching"/>) as
specified in this draft would be non-trivial.
It is <bcp14>RECOMMENDED</bcp14> to use a DNS forwarder to map between DoC and DoH, as would be the case for
mapping between any other pair of DNS transports.</t>
      </section>
    </section>
    <section anchor="sec_unprotected-coap">
      <name>Considerations for Unprotected Use</name>
      <t>The use of DoC without confidentiality and integrity protection is <bcp14>NOT RECOMMENDED</bcp14>.
Without secure communication, many possible attacks need to be evaluated in the context of
the application's threat model.
This includes known threats for unprotected DNS <xref target="RFC3833"/> <xref target="RFC9076"/> and CoAP <xref section="11" sectionFormat="of" target="RFC7252"/>.
While DoC does not use the random ID of the DNS header (see <xref target="sec_req-caching"/>), equivalent protection against off-path poisoning attacks is achieved by using random large token values for unprotected CoAP requests.
If a DoC message is unprotected it <bcp14>MUST</bcp14> use a random token of at least 2 bytes length to mitigate this kind of poisoning attack.</t>
    </section>
    <section anchor="implementation-status">
      <name>Implementation Status</name>
      <t>This section records the status of known implementations of the
protocol defined by this specification at the time of posting of
this Internet-Draft, and is based on a proposal described in
<xref target="RFC7942"/>.  The description of implementations in this section is
intended to assist the IETF in its decision processes in
progressing drafts to RFCs.  Please note that the listing of any
individual implementation here does not imply endorsement by the
IETF.  Furthermore, no effort has been spent to verify the
information presented here that was supplied by IETF contributors.
This is not intended as, and must not be construed to be, a
catalog of available implementations or their features.  Readers
are advised to note that other implementations may exist.</t>
      <t>According to <xref target="RFC7942"/>, "this will allow reviewers and working
groups to assign due consideration to documents that have the
benefit of running code, which may serve as evidence of valuable
experimentation and feedback that have made the implemented
protocols more mature.  It is up to the individual working groups
to use this information as they see fit".
<?line -20?>
      </t>
      <t><cref anchor="remove-impl-status">RFC Ed.: Please remove this section before publication. When deleting this
section, please also remove RFC7942 from the references of this document.</cref></t>
      <section anchor="doc-client">
        <name>DoC Client</name>
        <t>The authors of this document provide a <eref target="https://doc.riot-os.org/group__net__gcoap__dns.html">DoC client implementation available
in the IoT operating system RIOT</eref>.</t>
        <dl>
          <dt>Level of maturity:</dt>
          <dd>
            <t>production</t>
          </dd>
          <dt>Version compatibility:</dt>
          <dd>
            <t>draft-ietf-core-dns-over-coap-13</t>
          </dd>
          <dt>License:</dt>
          <dd>
            <t>LGPL-2.1</t>
          </dd>
          <dt>Contact information:</dt>
          <dd>
            <t><tt>Martine S. Lenders &lt;martine.lenders@tu-dresden.de&gt;</tt></t>
          </dd>
          <dt>Last update of this information:</dt>
          <dd>
            <t>September 2024</t>
          </dd>
        </dl>
      </section>
      <section anchor="doc-server">
        <name>DoC Server</name>
        <t>The authors of this document provide a <eref target="https://github.com/anr-bmbf-pivot/aiodnsprox">DoC server implementation in
Python</eref>.</t>
        <dl>
          <dt>Level of maturity:</dt>
          <dd>
            <t>production</t>
          </dd>
          <dt>Version compatibility:</dt>
          <dd>
            <t>draft-ietf-core-dns-over-coap-13</t>
          </dd>
          <dt>License:</dt>
          <dd>
            <t>MIT</t>
          </dd>
          <dt>Contact information:</dt>
          <dd>
            <t><tt>Martine S. Lenders &lt;martine.lenders@tu-dresden.de&gt;</tt></t>
          </dd>
          <dt>Last update of this information:</dt>
          <dd>
            <t>September 2024</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>General CoAP security considerations (<xref section="11" sectionFormat="comma" target="RFC7252"/>) apply to DoC.
DoC also inherits the security considerations of the protocols used for secure communication, e.g., OSCORE (<xref section="12" sectionFormat="comma" target="RFC8613"/>) as well as DTLS 1.2 or newer (<xref section="5" sectionFormat="comma" target="RFC6347"/> <xref section="11" sectionFormat="comma" target="RFC9147"/>).
Additionally, DoC uses request patterns that require the maintenance of long-lived security
contexts.
<xref section="2.6" sectionFormat="of" target="I-D.ietf-core-corr-clar"/> provides insights on what can be done when those are resumed from a new endpoint.</t>
      <t>Though DTLS v1.2 <xref target="RFC6347"/> was obsoleteted by DTLS v1.3 <xref target="RFC9147"/> there are still many CoAP
implementations that still use v1.2 at the time of writing.
As such, this document also accounts for the usage of DTLS v1.2 even though newer versions are
<bcp14>RECOMMENDED</bcp14> when using DTLS to secure CoAP.</t>
      <t>When using unprotected CoAP (see <xref target="sec_unprotected-coap"/>), setting the ID of a DNS message to 0 as
specified in <xref target="sec_req-caching"/> opens the DNS cache of a DoC client to cache poisoning attacks
via response spoofing.
This document requires an unpredictable CoAP token in each DoC query from the client when CoAP is
not secured to mitigate such an attack over DoC (see <xref target="sec_unprotected-coap"/>).</t>
      <t>For secure communication via (D)TLS or OSCORE, an unpredictable ID against spoofing is not necessary.
Both (D)TLS and OSCORE offer mechanisms to harden against injecting spoofed responses in their protocol design.
Consequently, the ID of the DNS message can be set to 0 without any concern in order to leverage the advantages of CoAP caching.</t>
      <t>A DoC client must be aware that the DoC server
may communicate unprotected with the upstream DNS infrastructure, e.g., using DNS over UDP.
DoC can only guarantee confidentiality and integrity of communication between parties for which the
security context is exchanged.
The DoC server may use another security context to communicate upstream with both confidentiality and integrity
(e.g., DNS over QUIC <xref target="RFC9250"/>), but, while recommended, this is opaque to the DoC client on the protocol level.
Record integrity can also be ensured upstream using DNSSEC <xref target="BCP237"/>.</t>
      <t>A DoC client may not be able to perform DNSSEC validation,
e.g., due to code size constraints, or due to the size of the responses.
It may trust its DoC server to perform DNSSEC validation;
how that trust is expressed is out of the scope of this document.
For instance, a DoC client may be, configured to use a particular credential by which it recognizes an eligible DoC server.
That information can also imply trust in the DNSSEC validation by that DoC server.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t><cref anchor="replace-xxxx">RFC Ed.: throughout this section, please replace
RFC-XXXX with the RFC number of this specification and remove this
note.</cref></t>
      <t>This document has the following actions for IANA.</t>
      <section anchor="coap-content-formats-registry">
        <name>CoAP Content-Formats Registry</name>
        <t>IANA is requested to assign a CoAP Content-Format ID for the "application/dns-message" media
type in the "CoAP Content-Formats" registry, within the "Constrained RESTful Environments (CoRE) Parameters"
registry group <xref target="RFC7252"/>, corresponding to the "application/dns-message" media
type from the "Media Types" registry (see <xref target="RFC8484"/>).</t>
        <t>Content Type: application/dns-message</t>
        <t>Content Coding: -</t>
        <t>ID: 553 (suggested)</t>
        <t>Reference: <xref target="RFC8484"/> and [RFC-XXXX], <xref target="sec_content-format"/></t>
      </section>
      <section anchor="dns-service-bindings-svcb-registry">
        <name>DNS Service Bindings (SVCB) Registry</name>
        <t>IANA is requested to add the following entry to the "Service Parameter Keys (SvcParamKeys)" registry within the "DNS Service Bindings (SVCB)" registry group.
The definition of this parameter can be found in <xref target="sec_doc-server-selection"/>.</t>
        <table anchor="tab-svc-param-keys">
          <name>Values for SvcParamKeys</name>
          <thead>
            <tr>
              <th align="left">Number</th>
              <th align="left">Name</th>
              <th align="left">Meaning</th>
              <th align="left">Change Controller</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">10 (suggested)</td>
              <td align="left">docpath</td>
              <td align="left">DNS over CoAP resource path</td>
              <td align="left">IETF</td>
              <td align="left">[RFC-XXXX], <xref target="sec_doc-server-selection"/></td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="resource-type-rt-link-target-attribute-values-registry">
        <name>Resource Type (rt=) Link Target Attribute Values Registry</name>
        <t>IANA is requested to add a new Resource Type (rt=) Link Target Attribute "core.dns" to the "Resource Type (rt=) Link Target Attribute Values" registry within the "Constrained RESTful Environments (CoRE) Parameters" registry group.</t>
        <t>Value: core.dns</t>
        <t>Description: DNS over CoAP resource.</t>
        <t>Reference: [RFC-XXXX], <xref target="sec_doc-server-selection"/></t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <referencegroup anchor="STD13" target="https://www.rfc-editor.org/info/std13">
          <reference anchor="RFC1034" target="https://www.rfc-editor.org/info/rfc1034">
            <front>
              <title>Domain names - concepts and facilities</title>
              <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
              <date month="November" year="1987"/>
              <abstract>
                <t>This RFC is the revised basic definition of The Domain Name System. It obsoletes RFC-882. This memo describes the domain style names and their used for host address look up and electronic mail forwarding. It discusses the clients and servers in the domain name system and the protocol used between them.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="13"/>
            <seriesInfo name="RFC" value="1034"/>
            <seriesInfo name="DOI" value="10.17487/RFC1034"/>
          </reference>
          <reference anchor="RFC1035" target="https://www.rfc-editor.org/info/rfc1035">
            <front>
              <title>Domain names - implementation and specification</title>
              <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
              <date month="November" year="1987"/>
              <abstract>
                <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="13"/>
            <seriesInfo name="RFC" value="1035"/>
            <seriesInfo name="DOI" value="10.17487/RFC1035"/>
          </reference>
        </referencegroup>
        <reference anchor="RFC3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC5234">
          <front>
            <title>Augmented BNF for Syntax Specifications: ABNF</title>
            <author fullname="D. Crocker" initials="D." role="editor" surname="Crocker"/>
            <author fullname="P. Overell" initials="P." surname="Overell"/>
            <date month="January" year="2008"/>
            <abstract>
              <t>Internet technical specifications often need to define a formal syntax. Over the years, a modified version of Backus-Naur Form (BNF), called Augmented BNF (ABNF), has been popular among many Internet specifications. The current specification documents ABNF. It balances compactness and simplicity with reasonable representational power. The differences between standard BNF and ABNF involve naming rules, repetition, alternatives, order-independence, and value ranges. This specification also supplies additional rule definitions and encoding for a core lexical analyzer of the type common to several Internet specifications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="68"/>
          <seriesInfo name="RFC" value="5234"/>
          <seriesInfo name="DOI" value="10.17487/RFC5234"/>
        </reference>
        <reference anchor="RFC6347">
          <front>
            <title>Datagram Transport Layer Security Version 1.2</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="January" year="2012"/>
            <abstract>
              <t>This document specifies version 1.2 of the Datagram Transport Layer Security (DTLS) protocol. The DTLS protocol provides communications privacy for datagram protocols. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. The DTLS protocol is based on the Transport Layer Security (TLS) protocol and provides equivalent security guarantees. Datagram semantics of the underlying transport are preserved by the DTLS protocol. This document updates DTLS 1.0 to work with TLS version 1.2. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6347"/>
          <seriesInfo name="DOI" value="10.17487/RFC6347"/>
        </reference>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC7641">
          <front>
            <title>Observing Resources in the Constrained Application Protocol (CoAP)</title>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <date month="September" year="2015"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a RESTful application protocol for constrained nodes and networks. The state of a resource on a CoAP server can change over time. This document specifies a simple protocol extension for CoAP that enables CoAP clients to "observe" resources, i.e., to retrieve a representation of a resource and keep this representation updated by the server over a period of time. The protocol follows a best-effort approach for sending new representations to clients and provides eventual consistency between the state observed by each client and the actual resource state at the server.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7641"/>
          <seriesInfo name="DOI" value="10.17487/RFC7641"/>
        </reference>
        <reference anchor="RFC7959">
          <front>
            <title>Block-Wise Transfers in the Constrained Application Protocol (CoAP)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="Z. Shelby" initials="Z." role="editor" surname="Shelby"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a RESTful transfer protocol for constrained nodes and networks. Basic CoAP messages work well for small payloads from sensors and actuators; however, applications will need to transfer larger payloads occasionally -- for instance, for firmware updates. In contrast to HTTP, where TCP does the grunt work of segmenting and resequencing, CoAP is based on datagram transports such as UDP or Datagram Transport Layer Security (DTLS). These transports only offer fragmentation, which is even more problematic in constrained nodes and networks, limiting the maximum size of resource representations that can practically be transferred.</t>
              <t>Instead of relying on IP fragmentation, this specification extends basic CoAP with a pair of "Block" options for transferring multiple blocks of information from a resource representation in multiple request-response pairs. In many important cases, the Block options enable a server to be truly stateless: the server can handle each block transfer separately, with no need for a connection setup or other server-side memory of previous block transfers. Essentially, the Block options provide a minimal way to transfer larger representations in a block-wise fashion.</t>
              <t>A CoAP implementation that does not support these options generally is limited in the size of the representations that can be exchanged, so there is an expectation that the Block options will be widely used in CoAP implementations. Therefore, this specification updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7959"/>
          <seriesInfo name="DOI" value="10.17487/RFC7959"/>
        </reference>
        <reference anchor="RFC8132">
          <front>
            <title>PATCH and FETCH Methods for the Constrained Application Protocol (CoAP)</title>
            <author fullname="P. van der Stok" initials="P." surname="van der Stok"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="A. Sehgal" initials="A." surname="Sehgal"/>
            <date month="April" year="2017"/>
            <abstract>
              <t>The methods defined in RFC 7252 for the Constrained Application Protocol (CoAP) only allow access to a complete resource, not to parts of a resource. In case of resources with larger or complex data, or in situations where resource continuity is required, replacing or requesting the whole resource is undesirable. Several applications using CoAP need to access parts of the resources.</t>
              <t>This specification defines the new CoAP methods, FETCH, PATCH, and iPATCH, which are used to access and update parts of a resource.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8132"/>
          <seriesInfo name="DOI" value="10.17487/RFC8132"/>
        </reference>
        <reference anchor="RFC8323">
          <front>
            <title>CoAP (Constrained Application Protocol) over TCP, TLS, and WebSockets</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="S. Lemay" initials="S." surname="Lemay"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="B. Silverajan" initials="B." surname="Silverajan"/>
            <author fullname="B. Raymor" initials="B." role="editor" surname="Raymor"/>
            <date month="February" year="2018"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP), although inspired by HTTP, was designed to use UDP instead of TCP. The message layer of CoAP over UDP includes support for reliable delivery, simple congestion control, and flow control.</t>
              <t>Some environments benefit from the availability of CoAP carried over reliable transports such as TCP or Transport Layer Security (TLS). This document outlines the changes required to use CoAP over TCP, TLS, and WebSockets transports. It also formally updates RFC 7641 for use with these transports and RFC 7959 to enable the use of larger messages over a reliable transport.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8323"/>
          <seriesInfo name="DOI" value="10.17487/RFC8323"/>
        </reference>
        <reference anchor="RFC8484">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="RFC8613">
          <front>
            <title>Object Security for Constrained RESTful Environments (OSCORE)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Mattsson" initials="J." surname="Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <date month="July" year="2019"/>
            <abstract>
              <t>This document defines Object Security for Constrained RESTful Environments (OSCORE), a method for application-layer protection of the Constrained Application Protocol (CoAP), using CBOR Object Signing and Encryption (COSE). OSCORE provides end-to-end protection between endpoints communicating using CoAP or CoAP-mappable HTTP. OSCORE is designed for constrained nodes and networks supporting a range of proxy operations, including translation between different transport protocols.</t>
              <t>Although an optional functionality of CoAP, OSCORE alters CoAP options processing and IANA registration. Therefore, this document updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8613"/>
          <seriesInfo name="DOI" value="10.17487/RFC8613"/>
        </reference>
        <reference anchor="RFC8765">
          <front>
            <title>DNS Push Notifications</title>
            <author fullname="T. Pusateri" initials="T." surname="Pusateri"/>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <date month="June" year="2020"/>
            <abstract>
              <t>The Domain Name System (DNS) was designed to return matching records efficiently for queries for data that are relatively static. When those records change frequently, DNS is still efficient at returning the updated results when polled, as long as the polling rate is not too high. But, there exists no mechanism for a client to be asynchronously notified when these changes occur. This document defines a mechanism for a client to be notified of such changes to DNS records, called DNS Push Notifications.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8765"/>
          <seriesInfo name="DOI" value="10.17487/RFC8765"/>
        </reference>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="I-D.ietf-core-coap-dtls-alpn">
          <front>
            <title>ALPN ID Specification for CoAP over DTLS</title>
            <author fullname="Martine Sophie Lenders" initials="M. S." surname="Lenders">
              <organization>TUD Dresden University of Technology</organization>
            </author>
            <author fullname="Christian Amsüss" initials="C." surname="Amsüss">
         </author>
            <author fullname="Thomas C. Schmidt" initials="T. C." surname="Schmidt">
              <organization>HAW Hamburg</organization>
            </author>
            <author fullname="Matthias Wählisch" initials="M." surname="Wählisch">
              <organization>TUD Dresden University of Technology &amp; Barkhausen Institut</organization>
            </author>
            <date day="11" month="August" year="2025"/>
            <abstract>
              <t>   This document specifies an Application-Layer Protocol Negotiation
   (ALPN) ID for transport-layer-secured Constrained Application
   Protocol (CoAP) services.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-coap-dtls-alpn-05"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <referencegroup anchor="BCP219" target="https://www.rfc-editor.org/info/bcp219">
          <reference anchor="RFC9499" target="https://www.rfc-editor.org/info/rfc9499">
            <front>
              <title>DNS Terminology</title>
              <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
              <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
              <date month="March" year="2024"/>
              <abstract>
                <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
                <t>This document updates RFC 2308 by clarifying the definitions of "forwarder" and "QNAME". It obsoletes RFC 8499 by adding multiple terms and clarifications. Comprehensive lists of changed and new definitions can be found in Appendices A and B.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="219"/>
            <seriesInfo name="RFC" value="9499"/>
            <seriesInfo name="DOI" value="10.17487/RFC9499"/>
          </reference>
        </referencegroup>
        <referencegroup anchor="BCP237" target="https://www.rfc-editor.org/info/bcp237">
          <reference anchor="RFC9364" target="https://www.rfc-editor.org/info/rfc9364">
            <front>
              <title>DNS Security Extensions (DNSSEC)</title>
              <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
              <date month="February" year="2023"/>
              <abstract>
                <t>This document describes the DNS Security Extensions (commonly called "DNSSEC") that are specified in RFCs 4033, 4034, and 4035, as well as a handful of others. One purpose is to introduce all of the RFCs in one place so that the reader can understand the many aspects of DNSSEC. This document does not update any of those RFCs. A second purpose is to state that using DNSSEC for origin authentication of DNS data is the best current practice. A third purpose is to provide a single reference for other documents that want to refer to DNSSEC.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="237"/>
            <seriesInfo name="RFC" value="9364"/>
            <seriesInfo name="DOI" value="10.17487/RFC9364"/>
          </reference>
        </referencegroup>
        <reference anchor="RFC3833">
          <front>
            <title>Threat Analysis of the Domain Name System (DNS)</title>
            <author fullname="D. Atkins" initials="D." surname="Atkins"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <date month="August" year="2004"/>
            <abstract>
              <t>Although the DNS Security Extensions (DNSSEC) have been under development for most of the last decade, the IETF has never written down the specific set of threats against which DNSSEC is designed to protect. Among other drawbacks, this cart-before-the-horse situation has made it difficult to determine whether DNSSEC meets its design goals, since its design goals are not well specified. This note attempts to document some of the known threats to the DNS, and, in doing so, attempts to measure to what extent (if any) DNSSEC is a useful tool in defending against these threats. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3833"/>
          <seriesInfo name="DOI" value="10.17487/RFC3833"/>
        </reference>
        <reference anchor="RFC6690">
          <front>
            <title>Constrained RESTful Environments (CoRE) Link Format</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <date month="August" year="2012"/>
            <abstract>
              <t>This specification defines Web Linking using a link format for use by constrained web servers to describe hosted resources, their attributes, and other relationships between links. Based on the HTTP Link Header field defined in RFC 5988, the Constrained RESTful Environments (CoRE) Link Format is carried as a payload and is assigned an Internet media type. "RESTful" refers to the Representational State Transfer (REST) architecture. A well-known URI is defined as a default entry point for requesting the links hosted by a server. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6690"/>
          <seriesInfo name="DOI" value="10.17487/RFC6690"/>
        </reference>
        <reference anchor="RFC7228">
          <front>
            <title>Terminology for Constrained-Node Networks</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="M. Ersue" initials="M." surname="Ersue"/>
            <author fullname="A. Keranen" initials="A." surname="Keranen"/>
            <date month="May" year="2014"/>
            <abstract>
              <t>The Internet Protocol Suite is increasingly used on small devices with severe constraints on power, memory, and processing resources, creating constrained-node networks. This document provides a number of basic terms that have been useful in the standardization work for constrained-node networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7228"/>
          <seriesInfo name="DOI" value="10.17487/RFC7228"/>
        </reference>
        <reference anchor="RFC8094">
          <front>
            <title>DNS over Datagram Transport Layer Security (DTLS)</title>
            <author fullname="T. Reddy" initials="T." surname="Reddy"/>
            <author fullname="D. Wing" initials="D." surname="Wing"/>
            <author fullname="P. Patil" initials="P." surname="Patil"/>
            <date month="February" year="2017"/>
            <abstract>
              <t>DNS queries and responses are visible to network elements on the path between the DNS client and its server. These queries and responses can contain privacy-sensitive information, which is valuable to protect.</t>
              <t>This document proposes the use of Datagram Transport Layer Security (DTLS) for DNS, to protect against passive listeners and certain active attacks. As latency is critical for DNS, this proposal also discusses mechanisms to reduce DTLS round trips and reduce the DTLS handshake size. The proposed mechanism runs over port 853.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8094"/>
          <seriesInfo name="DOI" value="10.17487/RFC8094"/>
        </reference>
        <reference anchor="RFC9076">
          <front>
            <title>DNS Privacy Considerations</title>
            <author fullname="T. Wicinski" initials="T." role="editor" surname="Wicinski"/>
            <date month="July" year="2021"/>
            <abstract>
              <t>This document describes the privacy issues associated with the use of the DNS by Internet users. It provides general observations about typical current privacy practices. It is intended to be an analysis of the present situation and does not prescribe solutions. This document obsoletes RFC 7626.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9076"/>
          <seriesInfo name="DOI" value="10.17487/RFC9076"/>
        </reference>
        <reference anchor="RFC9176">
          <front>
            <title>Constrained RESTful Environments (CoRE) Resource Directory</title>
            <author fullname="C. Amsüss" initials="C." role="editor" surname="Amsüss"/>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="M. Koster" initials="M." surname="Koster"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. van der Stok" initials="P." surname="van der Stok"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>In many Internet of Things (IoT) applications, direct discovery of resources is not practical due to sleeping nodes or networks where multicast traffic is inefficient. These problems can be solved by employing an entity called a Resource Directory (RD), which contains information about resources held on other servers, allowing lookups to be performed for those resources. The input to an RD is composed of links, and the output is composed of links constructed from the information stored in the RD. This document specifies the web interfaces that an RD supports for web servers to discover the RD and to register, maintain, look up, and remove information on resources. Furthermore, new target attributes useful in conjunction with an RD are defined.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9176"/>
          <seriesInfo name="DOI" value="10.17487/RFC9176"/>
        </reference>
        <reference anchor="RFC9250">
          <front>
            <title>DNS over Dedicated QUIC Connections</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>This document describes the use of QUIC to provide transport confidentiality for DNS. The encryption provided by QUIC has similar properties to those provided by TLS, while QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides more efficient packet-loss recovery than UDP. DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC 7858, and latency characteristics similar to classic DNS over UDP. This specification describes the use of DoQ as a general-purpose transport for DNS and includes the use of DoQ for stub to recursive, recursive to authoritative, and zone transfer scenarios.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9250"/>
          <seriesInfo name="DOI" value="10.17487/RFC9250"/>
        </reference>
        <reference anchor="RFC9460">
          <front>
            <title>Service Binding and Parameter Specification via the DNS (SVCB and HTTPS Resource Records)</title>
            <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
            <author fullname="M. Bishop" initials="M." surname="Bishop"/>
            <author fullname="E. Nygren" initials="E." surname="Nygren"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies the "SVCB" ("Service Binding") and "HTTPS" DNS resource record (RR) types to facilitate the lookup of information needed to make connections to network services, such as for HTTP origins. SVCB records allow a service to be provided from multiple alternative endpoints, each with associated parameters (such as transport protocol configuration), and are extensible to support future uses (such as keys for encrypting the TLS ClientHello). They also enable aliasing of apex domains, which is not possible with CNAME. The HTTPS RR is a variation of SVCB for use with HTTP (see RFC 9110, "HTTP Semantics"). By providing more information to the client before it attempts to establish a connection, these records offer potential benefits to both performance and privacy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9460"/>
          <seriesInfo name="DOI" value="10.17487/RFC9460"/>
        </reference>
        <reference anchor="RFC9461">
          <front>
            <title>Service Binding Mapping for DNS Servers</title>
            <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>The SVCB DNS resource record type expresses a bound collection of endpoint metadata, for use when establishing a connection to a named service. DNS itself can be such a service, when the server is identified by a domain name. This document provides the SVCB mapping for named DNS servers, allowing them to indicate support for encrypted transport protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9461"/>
          <seriesInfo name="DOI" value="10.17487/RFC9461"/>
        </reference>
        <reference anchor="RFC9462">
          <front>
            <title>Discovery of Designated Resolvers</title>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="E. Kinnear" initials="E." surname="Kinnear"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <author fullname="T. Jensen" initials="T." surname="Jensen"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document defines Discovery of Designated Resolvers (DDR), a set of mechanisms for DNS clients to use DNS records to discover a resolver's encrypted DNS configuration. An Encrypted DNS Resolver discovered in this manner is referred to as a "Designated Resolver". These mechanisms can be used to move from unencrypted DNS to encrypted DNS when only the IP address of a resolver is known. These mechanisms are designed to be limited to cases where Unencrypted DNS Resolvers and their Designated Resolvers are operated by the same entity or cooperating entities. It can also be used to discover support for encrypted DNS protocols when the name of an Encrypted DNS Resolver is known.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9462"/>
          <seriesInfo name="DOI" value="10.17487/RFC9462"/>
        </reference>
        <reference anchor="RFC9463">
          <front>
            <title>DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers (DNR)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="T. Reddy.K" initials="T." role="editor" surname="Reddy.K"/>
            <author fullname="D. Wing" initials="D." surname="Wing"/>
            <author fullname="N. Cook" initials="N." surname="Cook"/>
            <author fullname="T. Jensen" initials="T." surname="Jensen"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies new DHCP and IPv6 Router Advertisement options to discover encrypted DNS resolvers (e.g., DNS over HTTPS, DNS over TLS, and DNS over QUIC). Particularly, it allows a host to learn an Authentication Domain Name together with a list of IP addresses and a set of service parameters to reach such encrypted DNS resolvers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9463"/>
          <seriesInfo name="DOI" value="10.17487/RFC9463"/>
        </reference>
        <reference anchor="RFC9528">
          <front>
            <title>Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>This document specifies Ephemeral Diffie-Hellman Over COSE (EDHOC), a very compact and lightweight authenticated Diffie-Hellman key exchange with ephemeral keys. EDHOC provides mutual authentication, forward secrecy, and identity protection. EDHOC is intended for usage in constrained scenarios, and a main use case is to establish an Object Security for Constrained RESTful Environments (OSCORE) security context. By reusing CBOR Object Signing and Encryption (COSE) for cryptography, Concise Binary Object Representation (CBOR) for encoding, and Constrained Application Protocol (CoAP) for transport, the additional code size can be kept very low.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9528"/>
          <seriesInfo name="DOI" value="10.17487/RFC9528"/>
        </reference>
        <reference anchor="I-D.ietf-core-href">
          <front>
            <title>Constrained Resource Identifiers</title>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <date day="7" month="July" year="2025"/>
            <abstract>
              <t>   The Constrained Resource Identifier (CRI) is a complement to the
   Uniform Resource Identifier (URI) that represents the URI components
   in Concise Binary Object Representation (CBOR) rather than as a
   sequence of characters.  This approach simplifies parsing,
   comparison, and reference resolution in environments with severe
   limitations on processing power, code size, and memory size.

   This RFC updates RFC 7595 to add a note on how the "URI Schemes"
   registry of RFC 7595 cooperates with the "CRI Scheme Numbers"
   registry created by the present RFC.


   // (This "cref" paragraph will be removed by the RFC editor:) The
   // present revision –23 attempts to address the AD review comments;
   // it is submitted right before the I-D deadline in order to serve as
   // discussion input to IETF 123 even though not all discussions have
   // completed.  In particular, the updated handling of zone
   // identifiers requires some additional scrutiny.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-href-23"/>
        </reference>
        <reference anchor="I-D.ietf-core-transport-indication">
          <front>
            <title>CoAP Transport Indication</title>
            <author fullname="Christian Amsüss" initials="C." surname="Amsüss">
         </author>
            <author fullname="Martine Sophie Lenders" initials="M. S." surname="Lenders">
              <organization>TUD Dresden University of Technology</organization>
            </author>
            <date day="7" month="July" year="2025"/>
            <abstract>
              <t>   The Constrained Application Protocol (CoAP, [RFC7252]) is available
   over different transports (UDP, DTLS, TCP, TLS, WebSockets), but
   lacks a way to unify these addresses.  This document provides
   terminology and provisions based on Web Linking [RFC8288] and Service
   Bindings (SVCB, [RFC9460]) to express alternative transports
   available to a device, and to optimize exchanges using these.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-transport-indication-09"/>
        </reference>
        <reference anchor="I-D.ietf-iotops-7228bis">
          <front>
            <title>Terminology for Constrained-Node Networks</title>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <author fullname="Mehmet Ersue" initials="M." surname="Ersue">
         </author>
            <author fullname="Ari Keränen" initials="A." surname="Keränen">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Carles Gomez" initials="C." surname="Gomez">
              <organization>Universitat Politecnica de Catalunya</organization>
            </author>
            <date day="7" month="July" year="2025"/>
            <abstract>
              <t>   The Internet Protocol Suite is increasingly used on small devices
   with severe constraints on power, memory, and processing resources,
   creating constrained-node networks.  This document provides a number
   of basic terms that have been useful in the standardization work for
   constrained-node networks.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-iotops-7228bis-02"/>
        </reference>
        <reference anchor="I-D.lenders-core-dnr">
          <front>
            <title>Discovery of Network-designated OSCORE-based Resolvers: Problem Statement</title>
            <author fullname="Martine Sophie Lenders" initials="M. S." surname="Lenders">
              <organization>TUD Dresden University of Technology</organization>
            </author>
            <author fullname="Christian Amsüss" initials="C." surname="Amsüss">
         </author>
            <author fullname="Thomas C. Schmidt" initials="T. C." surname="Schmidt">
              <organization>HAW Hamburg</organization>
            </author>
            <author fullname="Matthias Wählisch" initials="M." surname="Wählisch">
              <organization>TUD Dresden University of Technology &amp; Barkhausen Institut</organization>
            </author>
            <date day="7" month="July" year="2025"/>
            <abstract>
              <t>   This document states problems when designing DNS SVCB records to
   discover endpoints that communicate over Object Security for
   Constrained RESTful Environments (OSCORE) [RFC8613].  As a
   consequence of learning about OSCORE, this discovery will allow a
   host to learn both CoAP servers and DNS over CoAP resolvers that use
   OSCORE to encrypt messages and Ephemeral Diffie-Hellman Over COSE
   (EDHOC) [RFC9528] for key exchange.  Challenges arise because SVCB
   records are not meant to be used to exchange security contexts, which
   is required in OSCORE scenarios.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-lenders-core-dnr-06"/>
        </reference>
        <reference anchor="I-D.amsuess-core-cachable-oscore">
          <front>
            <title>Cacheable OSCORE</title>
            <author fullname="Christian Amsüss" initials="C." surname="Amsüss">
         </author>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE AB</organization>
            </author>
            <date day="6" month="July" year="2025"/>
            <abstract>
              <t>   Group communication with the Constrained Application Protocol (CoAP)
   can be secured end-to-end using Group Object Security for Constrained
   RESTful Environments (Group OSCORE), also across untrusted
   intermediary proxies.  However, this sidesteps the proxies' abilities
   to cache responses from the origin server(s).  This specification
   restores cacheability of protected responses at proxies, by
   introducing consensus requests which any client in a group can send
   to one server or multiple servers in the same group.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-amsuess-core-cachable-oscore-11"/>
        </reference>
        <reference anchor="DoC-paper">
          <front>
            <title>Securing Name Resolution in the IoT: DNS over CoAP</title>
            <author fullname="Martine S. Lenders" initials="M." surname="Lenders">
              <organization>TU Dresden, Germany</organization>
            </author>
            <author fullname="Christian Amsüss" initials="C." surname="Amsüss">
              <organization>Unaffiliated, Vienna, Austria</organization>
            </author>
            <author fullname="Cenk Gündogan" initials="C." surname="Gündogan">
              <organization>Huawei Technologies, Munich, Germany</organization>
            </author>
            <author fullname="Marcin Nawrocki" initials="M." surname="Nawrocki">
              <organization>TU Dresden, Germany</organization>
            </author>
            <author fullname="Thomas C. Schmidt" initials="T." surname="Schmidt">
              <organization>HAW Hamburg, Hamburg, Germany</organization>
            </author>
            <author fullname="Matthias Wählisch" initials="M." surname="Wählisch">
              <organization>TU Dresden &amp;amp; Barkhausen Institut, Dresden, Germany</organization>
            </author>
            <date month="September" year="2023"/>
          </front>
          <seriesInfo name="Proceedings of the ACM on Networking" value="vol. 1, no. CoNEXT2, pp. 1-25"/>
          <seriesInfo name="DOI" value="10.1145/3609423"/>
          <refcontent>Association for Computing Machinery (ACM)</refcontent>
        </reference>
        <reference anchor="I-D.ietf-core-corr-clar">
          <front>
            <title>Constrained Application Protocol (CoAP): Corrections and Clarifications</title>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <date day="20" month="June" year="2025"/>
            <abstract>
              <t>   RFC 7252 defines the Constrained Application Protocol (CoAP), along
   with a number of additional specifications, including RFC 7641, RFC
   7959, RFC 8132, and RFC 8323.  RFC 6690 defines the link format that
   is used in CoAP self-description documents.

   Some parts of the specification may be unclear or even contain errors
   that may lead to misinterpretations that may impair interoperability
   between different implementations.  The present document provides
   corrections, additions, and clarifications to the RFCs cited; this
   document thus updates these RFCs.  In addition, other clarifications
   related to the use of CoAP in other specifications, including RFC
   7390 and RFC 8075, are also provided.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-corr-clar-02"/>
        </reference>
        <reference anchor="REST" target="https://www.ics.uci.edu/~fielding/pubs/dissertation/fielding_dissertation.pdf">
          <front>
            <title>Architectural Styles and the Design of Network-based Software Architectures</title>
            <author initials="R." surname="Fielding" fullname="Roy Thomas Fielding">
              <organization>University of California, Irvine</organization>
            </author>
            <date year="2000"/>
          </front>
          <seriesInfo name="Ph.D." value="Dissertation, University of California, Irvine"/>
          <format type="HTML" target="https://ics.uci.edu/~fielding/pubs/dissertation/top.htm"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9052">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="RFC7942">
          <front>
            <title>Improving Awareness of Running Code: The Implementation Status Section</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>This document describes a simple process that allows authors of Internet-Drafts to record the status of known implementations by including an Implementation Status section. This will allow reviewers and working groups to assign due consideration to documents that have the benefit of running code, which may serve as evidence of valuable experimentation and feedback that have made the implemented protocols more mature.</t>
              <t>This process is not mandatory. Authors of Internet-Drafts are encouraged to consider using the process for their documents, and working groups are invited to think about applying the process to all of their protocol specifications. This document obsoletes RFC 6982, advancing it to a Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="205"/>
          <seriesInfo name="RFC" value="7942"/>
          <seriesInfo name="DOI" value="10.17487/RFC7942"/>
        </reference>
      </references>
    </references>
    <?line 781?>

<section anchor="sec_evaluation">
      <name>Evaluation</name>
      <t>The authors of this document presented the design, implementation, and analysis of DoC in their
paper "Securing Name Resolution in the IoT: DNS over CoAP" <xref target="DoC-paper"/>.</t>
    </section>
    <section anchor="change-log">
      <name>Change Log</name>
      <t><cref anchor="remove-changelog">RFC Ed.: Please remove this section before publication.</cref></t>
      <section anchor="since-draft-ietf-core-dns-over-coap-17">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-ietf-core-dns-over-coap-17">draft-ietf-core-dns-over-coap-17</eref></name>
        <ul spacing="normal">
          <li>
            <t>Address Roman Danyliw's COMMENT:
            </t>
            <ul spacing="normal">
              <li>
                <t>Remove unused RFC8742 reference</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Address Vladimír Čunát's DNSDIR review
            </t>
            <ul spacing="normal">
              <li>
                <t>Address Éric Vyncke' COMMENT:</t>
              </li>
              <li>
                <t>Mention OPCODE 0 in Abstract and Introduction</t>
              </li>
              <li>
                <t>Reference to STD13 instead of RFC1035</t>
              </li>
              <li>
                <t>Provide extension pointers for future documents on other OPCODES</t>
              </li>
              <li>
                <t>Use only singular for example section if there is only one example</t>
              </li>
              <li>
                <t>Improvements on DNSSEC</t>
              </li>
              <li>
                <t>Hyphenate link-layer as modifier to frame</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Address Paul Wouters's DISCUSS and COMMENT:
            </t>
            <ul spacing="normal">
              <li>
                <t>Remove unnecessary and confusing ad flag from query example</t>
              </li>
              <li>
                <t>Phrase full SVCB mapping sentence more neutrally</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Address Gorry Fairhurst's COMMENT:
            </t>
            <ul spacing="normal">
              <li>
                <t>Add note (in addition to the <tt>RFC Ed.:</tt>) about paragraph removal</t>
              </li>
              <li>
                <t>Add references for "coap" and "co" ALPN to SvcParam algorithm</t>
              </li>
              <li>
                <t>Address Gorry's nits</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Address Gorry Fairhurst's DISCUSS:
            </t>
            <ul spacing="normal">
              <li>
                <t>Update push notifications</t>
              </li>
              <li>
                <t>observation: Do not use normative language</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Address Orie Steele's COMMENT:
            </t>
            <ul spacing="normal">
              <li>
                <t>Automatic configuration <bcp14>MUST</bcp14> only be done from a trusted source</t>
              </li>
              <li>
                <t>Remove confusing and unnecessary <bcp14>MAY</bcp14></t>
              </li>
              <li>
                <t>Remove normative repeat of SvcParam algorithm by citing RFC 9461</t>
              </li>
              <li>
                <t>Fix wording around Accept option</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Address Deb Cooley's COMMENT:
            </t>
            <ul spacing="normal">
              <li>
                <t>Group (D)TLS references</t>
              </li>
              <li>
                <t>Automatic configuration <bcp14>MUST</bcp14> only be done from a trusted source</t>
              </li>
              <li>
                <t>Fix wording about unpredictable ID and spoofing</t>
              </li>
              <li>
                <t>Remove confusing "e.g."</t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-ietf-core-dns-over-coap-16">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-ietf-core-dns-over-coap-16">draft-ietf-core-dns-over-coap-16</eref></name>
        <ul spacing="normal">
          <li>
            <t>Mention TLS as possible protection mechanism in abstract and intro</t>
          </li>
          <li>
            <t>Fix representation format in the docpath examples</t>
          </li>
          <li>
            <t>Make docpath wire-format paragraph easier to parse</t>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-ietf-core-dns-over-coap-15">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-ietf-core-dns-over-coap-15">draft-ietf-core-dns-over-coap-15</eref></name>
        <ul spacing="normal">
          <li>
            <t>Address Genart and Artart review:
            </t>
            <ul spacing="normal">
              <li>
                <t>Add editor's note about removing RFC7228 reference in case rfc7228bis comes out before
publication</t>
              </li>
              <li>
                <t>Address minor nits</t>
              </li>
              <li>
                <t>Resolve less well-known abbreviations</t>
              </li>
              <li>
                <t>Name default ports for "coap" and "co"</t>
              </li>
              <li>
                <t>Add reasoning why we also consider DTLS v1.2 (RFC 6347)</t>
              </li>
              <li>
                <t>Add illustrative reference for ETag generation</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Address DNS SVCB SvcParamKeys IANA expert review:
            </t>
            <ul spacing="normal">
              <li>
                <t>docpath: clarifications and examples</t>
              </li>
              <li>
                <t>Rework representation format and wire-format of "docpath"</t>
              </li>
              <li>
                <t>State that we don't do the full SVCB mapping</t>
              </li>
              <li>
                <t>Explicitly do not limit what port= can do.</t>
              </li>
              <li>
                <t>port limitations: We're not the SVCB mapping document</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Address Tsvart Review
            </t>
            <ul spacing="normal">
              <li>
                <t>Prefer ADN for Uri-Host; don't prescribe <em>how</em> it is set</t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-ietf-core-dns-over-coap-14">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-ietf-core-dns-over-coap-14">draft-ietf-core-dns-over-coap-14</eref></name>
        <ul spacing="normal">
          <li>
            <t>Remove superfluous and confusing step in SVCB to request algorithm</t>
          </li>
          <li>
            <t>Address AD review:
            </t>
            <ul spacing="normal">
              <li>
                <t>Remove RFC8949 as CBOR diagnostic notation reference</t>
              </li>
              <li>
                <t>CoRE-specific FETCH method -&gt; CoAP-specific FETCH method</t>
              </li>
              <li>
                <t>Remove double reference to BCP 219</t>
              </li>
              <li>
                <t>Fix wording and references around SVCB records and ALPN</t>
              </li>
              <li>
                <t>Move format description for examples to Terminology section</t>
              </li>
              <li>
                <t>Retitle section 5 to "Interaction with other CoAP and CoRE Features"</t>
              </li>
              <li>
                <t>Make prevention of poisoning attacks normative for unprotected CoAP</t>
              </li>
              <li>
                <t>Provide specs on if the <bcp14>SHOULD</bcp14> on ID=0 does not apply</t>
              </li>
              <li>
                <t>Make construction algorithm normative</t>
              </li>
              <li>
                <t>Add definition for CoRE</t>
              </li>
              <li>
                <t>General grammar, wording, and spelling cleanups</t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-ietf-core-dns-over-coap-13">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-ietf-core-dns-over-coap-13">draft-ietf-core-dns-over-coap-13</eref></name>
        <ul spacing="normal">
          <li>
            <t>Address shepherd review</t>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-ietf-core-dns-over-coap-12">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-ietf-core-dns-over-coap-12">draft-ietf-core-dns-over-coap-12</eref></name>
        <ul spacing="normal">
          <li>
            <t>Address Esko's review</t>
          </li>
          <li>
            <t>Address Marcos's review</t>
          </li>
          <li>
            <t>Address Mikolai's review</t>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-ietf-core-dns-over-coap-10">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-ietf-core-dns-over-coap-10">draft-ietf-core-dns-over-coap-10</eref></name>
        <ul spacing="normal">
          <li>
            <t>Replace imprecise or wrong terms:
            </t>
            <ul spacing="normal">
              <li>
                <t>disjunct =&gt; distinct</t>
              </li>
              <li>
                <t>unencrypted CoAP =&gt; unprotected CoAP</t>
              </li>
              <li>
                <t>security mode =&gt; confidential communication</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Pull in definition of CBOR sequences and their EDN</t>
          </li>
          <li>
            <t>Fix broken external section references</t>
          </li>
          <li>
            <t>Define terminology for "upstream DNS infrastructure" and "upstream DNS server"</t>
          </li>
          <li>
            <t>Fix wording on DNS error handling</t>
          </li>
          <li>
            <t>Clarify that any OpCode beyond 0 is not supported for now and remove now redundant DNS Upgrade
section as a consequence</t>
          </li>
          <li>
            <t>Clarify that the DoC/DoH mapping is what is <bcp14>NOT RECOMMENDED</bcp14></t>
          </li>
          <li>
            <t>Avoid use of undefined term “CoAP resource identifier”</t>
          </li>
          <li>
            <t>Discuss Max-Age option value in an error case</t>
          </li>
          <li>
            <t>Add human-readable format to examples</t>
          </li>
          <li>
            <t>General language check pass</t>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-ietf-core-dns-over-coap-09">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-ietf-core-dns-over-coap-09">draft-ietf-core-dns-over-coap-09</eref></name>
        <ul spacing="normal">
          <li>
            <t>Update SVCB SvcParamKey</t>
          </li>
          <li>
            <t>Update corr-clar reference</t>
          </li>
          <li>
            <t>Add reference to DNS Update <eref target="https://datatracker.ietf.org/doc/html/rfc2136">[RFC2136]</eref>, clarify that it is currently not considered</t>
          </li>
          <li>
            <t>Add to security considerations: unprotected upstream DNS and DNSSEC</t>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-ietf-core-dns-over-coap-08">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-ietf-core-dns-over-coap-08">draft-ietf-core-dns-over-coap-08</eref></name>
        <ul spacing="normal">
          <li>
            <t>Update Cenk's Affiliation</t>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-ietf-core-dns-over-coap-07">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-ietf-core-dns-over-coap-07">draft-ietf-core-dns-over-coap-07</eref></name>
        <ul spacing="normal">
          <li>
            <t>Address IANA early review #1368678</t>
          </li>
          <li>
            <t>Update normative reference to CoAP over DTLS alpn SvcParam</t>
          </li>
          <li>
            <t>Add missing DTLSv1.2 reference</t>
          </li>
          <li>
            <t>Security considerations: Point into corr-clar-future</t>
          </li>
          <li>
            <t>Implementation Status: Update to current version</t>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-ietf-core-dns-over-coap-06">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-ietf-core-dns-over-coap-06">draft-ietf-core-dns-over-coap-06</eref></name>
        <ul spacing="normal">
          <li>
            <t>Add "docpath" SVCB ParamKey definition</t>
          </li>
          <li>
            <t>IANA fixes
            </t>
            <ul spacing="normal">
              <li>
                <t>Use new column names (see Errata 4954)</t>
              </li>
              <li>
                <t>Add reference to RFC 8484 for application/dns-message Media Type</t>
              </li>
              <li>
                <t>IANA: unify self references</t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-ietf-core-dns-over-coap-05">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-ietf-core-dns-over-coap-05">draft-ietf-core-dns-over-coap-05</eref></name>
        <ul spacing="normal">
          <li>
            <t>Add references to relevant SVCB/DNR RFCs and drafts</t>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-ietf-core-dns-over-coap-04">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-ietf-core-dns-over-coap-04">draft-ietf-core-dns-over-coap-04</eref></name>
        <ul spacing="normal">
          <li>
            <t>Add note on cacheable OSCORE</t>
          </li>
          <li>
            <t>Address early IANA review</t>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-ietf-core-dns-over-coap-03">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-ietf-core-dns-over-coap-03">draft-ietf-core-dns-over-coap-03</eref></name>
        <ul spacing="normal">
          <li>
            <t>Amended Introduction with short contextualization of constrained environments</t>
          </li>
          <li>
            <t>Add <xref target="sec_evaluation"/> on evaluation</t>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-ietf-core-dns-over-coap-02">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-ietf-core-dns-over-coap-02">draft-ietf-core-dns-over-coap-02</eref></name>
        <ul spacing="normal">
          <li>
            <t>Move implementation details to Implementation Status (in accordance with <xref target="RFC7942"/>)</t>
          </li>
          <li>
            <t>Recommend root path to keep the CoAP options small</t>
          </li>
          <li>
            <t>Set Content-Format for application/dns-message to 553</t>
          </li>
          <li>
            <t>SVCB/DNR: Move to Server Selection Section but leave TBD based on DNSOP discussion for now</t>
          </li>
          <li>
            <t>Clarify that DoC and DoH are distinct</t>
          </li>
          <li>
            <t>Clarify mapping between DoC and DoH</t>
          </li>
          <li>
            <t>Update considerations on unprotected use</t>
          </li>
          <li>
            <t>Don't call OSCORE end-to-end encrypted</t>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-ietf-core-dns-over-coap-01">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-ietf-core-dns-over-coap-01">draft-ietf-core-dns-over-coap-01</eref></name>
        <ul spacing="normal">
          <li>
            <t>Specify DoC server role in terms of DNS terminology</t>
          </li>
          <li>
            <t>Clarify communication of DoC to DNS infrastructure is agnostic of the transport</t>
          </li>
          <li>
            <t>Add subsection on how to implement DNS Push in DoC</t>
          </li>
          <li>
            <t>Add appendix on reference implementation</t>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-ietf-core-dns-over-coap-00">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-ietf-core-dns-over-coap-00">draft-ietf-core-dns-over-coap-00</eref></name>
        <ul spacing="normal">
          <li>
            <t>SVGify ASCII art</t>
          </li>
          <li>
            <t>Move section on "DoC Server Considerations" (was Section 5.1) to its own draft
(<eref target="https://datatracker.ietf.org/doc/draft-lenders-dns-cns/">draft-lenders-dns-cns</eref>)</t>
          </li>
          <li>
            <t>Replace layer violating statement for CON with statement of fact</t>
          </li>
          <li>
            <t>Add security considerations on ID=0</t>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-lenders-dns-over-coap-04">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-lenders-dns-over-coap-04">draft-lenders-dns-over-coap-04</eref></name>
        <ul spacing="normal">
          <li>
            <t>Removed change log of draft-lenders-dns-over-coap</t>
          </li>
        </ul>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors of this document want to thank Mike Bishop, Carsten Bormann, Elwyn B. Davies, Esko Dijk, Thomas Fossati, Mikolai Gütschow, Todd Herr, Tommy Pauly, Ben Schwartz, Marco Tiloca, and Tim Wicinski for their feedback and comments.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA8V92XIb2ZXge37FbVREF+kGQIC7WFbZFEmJjBFFmqSq2lGl
cSWQF0CaiUw4F1JwSQ6/TsQ89uNM9EzEvM4f9NNUf4m/ZM52l0wAJFWWbYat
IoHMu5x79u12Op3g7kBtBUEZl4k+UK3jN9cqu9O5OsoOL9XacXa03grCwSDX
8Bz8FUTZMA2n8GiUh6OyE+ty1Blmue5EadHBN+GvcNbp7wfDsNTjLJ8fqKKM
gqIaTOOiiLO0nM/g9bOTm5dBcLf1fpps5qPhQaBUESc6HWr8taNeZlUaqetv
Xqn7uJzAPxH8m+VqouPxpFTFTA/jUayjIAhzHR6ow9ksiWFKmKAI7rP8dpxn
1ewA9nF1EtzqOXwU8chnaanzVJedY9wBfUQP8S+Hl/QLwCG402lFq1HKHwz/
5j18C9PE6Vi9wm/p82kYJwcK4fFrhEw3y8f0eZgPJwDdSVnOioONDXwMP4rv
dNc8t4EfbAzy7L7QGzjCRounhu1XA3iZoHw/3mDA18DNTyYA8KL0ppE3ujxE
N86Wvbvx4EF2J+U0aQGQq3KS5QCMjlJ8/udhXsapVtfZbBJr9Vqnkc4LWgjs
5kDdvD1Wx7kuIp2qtynsNC/icq6ykbrRw0maJdl4zrAR7Lp5a56nj4sy1xp2
c6qT6SRLyj/CB13V79GXQxjqoPb4MItgUcedXr+3+0w+qdIS0e+VzqdhypNp
PqEpL76b8Kp/XVadiAfrRtrb5NEkj4syDlN1OC1++o+i8AcZmi9/HU6LShdF
d5hN/Zd1eqte/fQfaZT957+HqQPNG13lYXI41mmpXk0Hp7X9nse66NyFaQcW
1rnKJrpzXebhT/+u1a639fMqjYeT2s73e/u9vUd3PoRFdcdAW9kYFp7SSkJc
STeMvbXfTLJpWKijrroeTqZAfG71p4ffqtNwOqgEt83CX+g8AZjm6gbIdM9b
q/+wWexmr/fs8WMquwXP/utJeN+Z8Dj1EzoPy3ISw1K//en/TJK4EKA8GQXV
P6sXYX47CasCnjpL4UDLqlyBmA88/LdF1+59qHl3DVQN0gyeLmFvyKiub477
W8CaU8TTq5dHW8/2dw9Ulcf8587m1vYBbCsd8d+7W9t78HSZFP1N/mRvc2cT
+Vc4k793t/v8dycbFDq/0/L5s51n8vkgyYa393Eh3+z3t2SEzkiXdBr46dbm
lnxaDmXs/e19WE2UmUd2celZgTxIPtnb3aHNdGZVYZ56to0TD7Kc/37Wt1vY
gk/OOsddx8loPvyuEyazVOa3fwdBnI586L04utzsP+MZQURMY8uk8JutPfqm
0EOB7f7Wljw7AQlUCsh3d5/1WAJ0gBpuOzyDge7mPn4HeJN3UsAAeWe/94wg
gUuTbfX2dmXreXwXDudmt/gxDZ5H8tHmTg/f/YP8ub0LfxZ3w4H9u89/dyxW
wGdwRFGU2z9pI+bPHVykjibZcAGgsNERzE/4VP8GWFRazLIcBEkaiRwG+l3y
qf9qnJXZrOggXAZxUQdNBz6RZ4VLG/GUCwh4yfiA8F859XA4CQeJ7jAuwcP1
D+AdUGQ6s3CmYaTji7Nuv9ft97d3NrZ24SA2l+FRDtIQJLZMjH/jnwiwk+sb
VhHKMB8jAzDC9/7+vhsPi241jLs6qjb+BNpKEoG6sDGrBsVGBMqQzksCyYb5
6nf+p91ZNOKRWTc7RIWh1MMSWba6LueJLlQISlI50epYF/E4Rdb2Rpeo/nQG
YaFBgcpG5T1oSP7bmqWYFen0E6cA/6uueilLkY+ZyV5lcyMRGt8Tn63z1qMw
iQHr0zhsq7P8DkQCPRuBdnKggO8zS4RtgqBDCjQraF1OusfdFiqhHhTaj47O
yg/TmRnr9Ob8tTuKpx4DICPqOzLG5fHLz32anU4H2C+geDgsg+BmEhdAucNq
iopApEewGThRNcuBLIZZgntS+j0gbzpGNRN18z9UBDe1dnF5dHF8onrrrK4D
DgRHRD0hjBL56rC6NOOtoXq73oWj1IVmDX8KZAPivwAiSdVA09yAJKBXD+ag
/q/fvL7uXOshIE0kJgH+e72OqvjF4PfwqKKv8XRwuf4akDZGVRKcpHdxnqW4
S1z49dHF1cm6KjOc7C6OtAKtP5/PYFLaoizJ7FzjuMHQGzfSd/EQlhynhPpG
nye5PgFAwSRn2c16NyB4g/oQJSAo4bE8i6oh8aDn3s+qg1hiCrX904ENgBZA
aw5+/BHZ68eP9nyQLoEd0CBAcDNYPnxqjkqtOKqgcVQKxkWhBQNXBaKAOXW1
9huYaA5neQLMzWLGvGPmUrMwzhVsaxrOZjBJnMJyw8A/cwtgGaT2naBDIUcP
yHAMqKD63U08+VTfw0Zw06Q7wPLM71sfPwbAJe51kij47xNRRC1HERiUWTYM
OqhKFSZFpngZW7VlGMWCFvIr0i22d+El2LNOC9iB3RfAQY9pKXhCgFUjQMAU
lPgEPusiKmgVerQDih7AAv4B5AIMQIgCp5zFBigGR05vbi6vCQrZBCYGbDmF
w4E32mqS3Wt4BHAnnhYEgUjPkmxOyCY47KO3h8+Bj89tdT8BnR+WVIVJMqfF
wzoBYGQh4zC5/kMFS2MwxoLwtNKAFtit8QgY1NLSNJzjeQP6lHmM9I8rm+op
2O9tNcsQzrjGajojphyQbpOEc/h8lIOMAOP9j7powyrAFh5PZlXZJgijTZoO
58Rz5jhLkKWw9kl4B3CG/6QRHv9tnGSDeYkUMlKDDHZzdXhO719dnLt3VZFo
PSMQJhmIoAgkIRn8+FoZTzXMOQLgCaBKfC3VsBfAA9BcYHMMJhRqEe41q3Lc
PD4Y3KbZPTDnrCq76g3uCL9PKsICgEVRwYgFWE9hHmcAr6ooQeTfaqGsIanv
CsESLIAFl0fbDtVI36sJWF+MPyWCbBCXKkfT3SDDNBynYFeAdg/vEWhiOE7Q
VpAcszTyIRvz6AViGGgF/EDBNOF0KSbQpnYFn373XwFbAIFr370DOlj+xQEq
iOok6h6oy0QjWfBTtOzFOQHmOkeXDi04B6wP4XfYLiHs8hUJAsEx0KCWKwNs
iA6XvzWAfU+J7dIKBxpwBHhgNTCE3EUBADwD9EiVZiViBKA7mJNA/UzKTD+M
EnVCQrlydEl7ICpq18nVoyJAgiQinmEZA7FN4gvIHz9+7OI64H14vaBl1J5s
k48NmS/hVhjdhWmJfAs1H+TPI7A0UIPDN6dxGY8BC9AVdz8Ih7e0VNCzwjHg
HiuAIDinU/QVMBRE9NtR4nSYVGiJkhXXQTOOlfaRx1ithffxo+FBQBl3oEYi
zC5DOMtzsJFBMIKSPSVOWdv9WqG1A0EbpQFR1c7Hj+tfscsN3n0fIzHw8EYx
ADiEURTj04DcCSB5gsOjQg988Ss4pk7FvBl3HcCZVKzgEo/w+ThsajSKh3SI
uDpr+qGGKXsCnlQIzwMupZaoHCgggNjvsjh6GF9o37AE+g/Mns3w07fHoEfo
7rjbrjPn1diCY9gvf/P27Ii//ANAjlAFRGKS3fN2E3SM3rN71Ig7UecQAmwP
wC8sXWErf/rTn1QYFnfjQDRe8wNWwMnN0SnZy6j8fgdae/8gGuwfHPTfbdQf
rv9Z+4sQFiEDQiX4lw79/At8/p1VV97BX94X9nNeRaf+0w0+0JbVh8YXna+9
L5T3f/icfnBc+fkQfDhKYjimD79sjvLhGv0bOX3hj/IBJPIIqVWQCwdxi5ZN
itbl7cbX/GDiLxuzfelB6jv/2Xf4xfdqxc/Gym8aZ8Dz1XRYmpa+sR8DRm4Q
T9tA5Nrodru4MsSM4McD9cUoHpMr+C7W9x30T7Mt+rz1IiyAmAgBPbuy9TFg
DWqaAW+Lp2j5A/8CPIJfU0sb8JZVLzUJ1x9/XJjp48cDEJfEDem8gIJjZnsk
l+90k4yRjlAfb1pKwzCH/0Ykc+I08JGShqNJFPm28i6sPiy9D1DfC2k4WcUa
mH9dNAOKshogdeao2hZgoZp15WDa4CDyZ7FsnazMg56jmbytn6QgPQM1aP+I
lDEv2qsUzvZqRgHcTSMzs2IAZrYKYzVDv2U4DWSRHpp3g7e0StpMjV2Sv8GB
qMTxUbjL+eDXBviol8nTAkCaGk0mZxXVT6hOUcByD/3Jzg9/y2YA/a0YUNcn
R+oONHgQAgAGz7Csf0dygNc3RT+Qz+DdCpHJvwGuyRsv0TSUYJOIErQV0e+f
gmEzyrMpvHvaBkUP9Ry27YDUzCvCSae6nGSRlajkGYWjgaFAfkVdtkAnIami
QBgpmKBkz4KezGegPeYoauIgi+YIADrfqjDPXV5c38h8oFuCGgVLBWPMHnmB
aqlIUKdg0FG5IyEyMzSCcEAxi2+/OjGDd4PTxxY31YDW/P49qnKkeZFCrt8D
4Ekk7W6j+Z8h2RpBfE9aFMAzRxUzQFc5sZBEvzeGm5FvpF4DigBGtPmsPIFI
61ii18BODX4uUXG6yMOc95emA6vpDq1EjC0+X/3DzO8WrA6MNhaqdf72+qbV
5v+qNxf0+9UJkOfVyTH+fn16+Pq1/SWQJ65PL96+Pna/uTePLs7PT94c88vw
qap9FLSAOlpsHbQuLm/OLt4cvm7xifgODnQHsv6L1nA+yzXae2ERgD49zOMB
G38vji7/3//qbwOI/glU6s1+/xlZEf9EPv69bWEsPBsZN/wn2VLocwhzHAWO
A5BtFpchan6ArQWYw6kCxgcMJvjFdwgZMCt+ORjO+ttfywe44dqHBma1Dwlm
i58svMxAXPLRkmksNGufNyBdX+/hb2t/G7h7H/7yVxgXU53+/q++BuQ6dIwT
CENYFVM+fgF6potuLx5ejPwySfDAVAvFIw/WwhON4hEZXGWMVkEs7CkExhYW
KK8pui/PN/hqiH4EHZNECo3MIxlnxBpKmFC0mqbIEwHlR02QkA5ZnC1IDCeM
tDgvQB1oGVmkFmVRiydHHpfoxpPefhAeVidvsew20oT1dOdPC8tFOSaiX+SA
YjMMvfrW1xfWOV1Y03G7eLYi5hw/fsKZErdF/YYt6aCpMTTPXCZpib8KoY7p
AU6akWncMuIFD5SdmhErWw07vRvQR/WIFYDIsANh4a3HHXeYH7Hegs2AwP0j
C4wrDfwFYMdecApcIHLeGGa8hiOt19RIWCF+iPIRQVxUwD3AsiQXPzF28sUs
7LcbOHAA752F8yQLoxazQ5RHLeJ8qyDiSwFno24ieKw60GZhu0yoAKxRuuHo
jO+PLIMZcEWBrTLLaEmARmEC23gJexzoEj1ZAMooHMTonWwb2arfhygMiyWI
hBIvTkPATplXPC/WTB2SYMIFMCMmCE9gxAiwcwrHk9fOS3m+XHiumoZph5ck
5xGW5NDAiYGFwPKdaCZRQ7MPNTCLyPOEkmcOF0Gi35CEXbsZgidonBQpwgCk
a53IGYE8ZyWeDTgwfn78otDDAwBLh2kb/iMPf1wtv4Pg20mcENbCyug8AYrA
nBzlGq3C5zNtZLTwtCcg8HCNwpRngBU0TGujhQ7pW3RhGj3RaVkFAD8RgvbU
ZdSWSB0j92SDY9ngn7ecRcbWDS4zYP94YtmM3aVo9hTkFyf8YbfVAD2PKR4h
ucXH4lxl8L5NYyK/KzPNGbnNASpAwm+vzshZX+UxuyxqnGLZG0fyxhDfaAfI
3asyQ3Y3rM/eVuwvYX4aUgaW22sUA3KV6K8xHCyPyEo6PbrEdVxlFRLRYQRg
KIFciUgMEAiXcrGdQKMfou1EMcaIgqlhKU5ilHAFhXiinMTa8qUqUl1IFRqg
tgsiX+QviLECB+NVwyF/8YU6thOCPWhhdDOfaSL/2noWzlicpDA0cmygFwzk
xMWUGbWowMK+GW7uVZxBnFDMn72pAXlADIHRoC1bbEqF9XZTITGerKLuEsOJ
OGmtCyQLsuqsNGY/sWDAQQ69jNAvPgabJ0eXAntCWKtg0xM4zx3myyECi/nG
xNEEJOPI9TdHL9yuroTjkXl8Vdd5cDVkS+JxySg6MsOI2H4Rs0thDcddXxx4
7eqKMBlTLNjNbpItxHvnH6SJzXsIdmUQTK3BAtcDM+9liPGDEr8wiCpy2oa6
TKASIeIFETuvKf5gQ4lv9DhDjRBRdO3w9eWbdXV2LJE44EDkMUC3I0OFQ5dm
Ipss05wOhlkc5dgbphu80MPQcEF6How+nRai0BCdGM6Ow3CwmZCy0A6lSQ1D
yWrwBp91h1jYoJjmIdm76YcOaUMnswlQP4ZIjkFJjnXnFKQasDt1Qd6xi+sT
tXZyfHpxRIdJ2S/w5hopp/QtJ4PF7D9BVWiI4v8FCywJc4KeIGA+enEBaGGi
n3DWRIW4Dg51w0MtCVU+6+2AkrHOio3ESbvBNcmcOb8GWIohQXL1W3RyRI/Q
rMhdAN/NNHOMptvCKXmES87uUKMqJ7Vfv58lmeP5RGcTVDtTdA+IxXbTNEbw
aGCFRHUYa8YV2++NvCQUKYZ4BEXQ1L2sqtXdxrDuSAktoUYPKmZSH9vty2oE
y7KMKNBSMlshZbTwUYqiAzAyr4sprug2N+cYG2EWhaN8ajZYaCIDtbfNIkEF
hM9QAWihiW2MmM5dmFSYn3M3JEr/L3pu2R2gJXmy5hbXCQKivMG++HDcuP4g
yC4HqHu169bHhGS8EBLqznD4OVkU5B3zNyNaiAxP/i6NuAKsccbhzkKPbaiD
VL8BhUo1KzrCpGsSa01G68ir6+1AY9IBwAM1IPSdwVj9zubOjsqGpUY3HOiV
hy/evMQjxpzFjx8P2DPdGEo9V/1fwHsXRzcnN/RA039notrMuxChMZd8pGgF
zdFQNyrZg+0vBsNcYqxi7JmCsQIEx6BCo2hEzt+2eEzECMgGmFQFOiECX3c0
NLMKlHI6NS1dFGXCKdyYNye5RHBpZHWHsM1ZmJPkSWLY4tqPP4LoQLf5e3XY
7Xvkt47R5x6KMHSWNsFE1NLQbhWBWhbGga3ewnugLrMHPVV6OivntAwejD2T
gpoS2DfQaLXFgvq+hVwJE6iQ+QMDaE5Ar/wRtK/OCLT5IEZTaWogVaAhY8ZE
udaJIxoFHRD4t39KIFLnCCDDoPa6/TqE5CjuQQvt1I4AZ3BnQFsqmFocQA3e
c3YAYRke6ih+b+PRcU5ecpz+zuItWWLiCaHXusG3mvwDwvW9r2r4zs/eND6x
RgQmNZL/l9QdS5Wk9YfyCnMtyi2ikQq9+AVbl7BndO+wjgNYTMPgNAa83+AL
ZhB+j/RnMEWHJcB9FNOGGi98xUETttEXvmXmmeBc6FSnrCbyFSws0uEpMndt
aPnJ/Oyp2L8IHYP/9YXLifQWYw+CV1VhXIRIJMZjriRisIC6mNsUYlRGFLAA
zPssMtodW925oQQY3r5p2RbY+DOOmJBJ4XHNP+o8U8bTjnA+LIglkgdjGUeN
CcXNFmkFm9uC8sZ61mERo4wVd0puUtYMJwwafgmME12dFdaGRHBPw4LKcWgR
NRy3u0K9TJWgiGK+Pj47DX+PMEBbZStY+6H3frf3A5FYyq+2lSQvYMo5kfxL
VpeQhlcsniwVTguqSTfSNt7mcYdSJowZOpgHRrdZXLiFwQUfxrFOypAgKB+8
tseySMO1+QKer20Uv8ik19SZJ9IushIy+mUpA7BaMFDLR9ffNNzK5HWgpdAO
DJfc6vYJTq/jW810GlvDb+F4Q/X26owOGEQ8ywPiFHCanC70yHki3VlxAKST
akfCoKdNOWgDswHyYATHyO6FfQOWu0w8Vo3ETfV7zPSaYjYO0hHtIGEchHkj
yuvjDDKTBEKpOfh8MQuZgTIblpl1Ek9jFF7sz6vyVF4khzG8ivlURuvAdBNj
QxlVbiAWKTsXRPW+uhIT11gYkkxrTr0RhSVWazzaxNfIDSVO1YoSAGl8n8ea
dCGygIx0Y05o3yOfYTLOwIqZTK3+ar1csQhg8lC01ThjLzl7M4jWDXYaV2Vs
srb4XIF1z/I4YyPppVGVqnyWFSbcTKxJVrCwcVpAUU1ZKgFKIvQ6DCUwDgWl
LS43pH1HGd27wXCd2PdPCiZrUXleuxEpWGJ904kMdO0EauZ+F8sSRsJxYNjH
Bj1+bFTPtsexD9O5ZCR45oQxttgQdXkKxCfE6KQd1wxPYwR1AWBkSWgMl4tD
OcLqJaeEmcVLSA6ZBNBOKtjtkr/8eAhlabKTncIzxkloKOIQfgSB8LSzYUxq
iOUaEtTBNFCkGvNaK57d7U6ALzUPlsCDatcIWCMm2rUlM412gikJA5Py4HzE
tUkYSp4Ztww0BNgmXMwJelAhBMSHm+sEjjIyhgGu+cLTlYSBoekdVknJk8m6
CGns2RpoErhyPQ7zSPI6FlIhMC2SBtrZ3d9mrZfwHaGKeSsL37VwWSvN7DRT
xBxNUi9zZM6LITXE8x8KOYSo8MXDOANLygOv8YFi4ixwgjGCmFNDAI8Slsg2
R44jJcCOHOGjkLOUT2NOYbEAByOTSK00diWtVkIYSx0hvGsXfyFH1kL0hrwM
sD5eHg7WUBZ4mNC4sK0brfAyyWGBGNV/T4eLRhaKgxJLANjBhuIyTXXShrFY
9a9wCZo9OfdhnocUt5n7R2Gw1SAlCO0vCzUBGzllm03yuxy2os+vwsyg0uDK
cTaFlXFq9drh8Zt1jqVlg5LjBEYKoJuWl+YP9jA1rRgqVD/8LkqLHzhgC6Ou
AX0cJnFYnGNOiYRH20bBXzKHe5gnWrf4K6iIeTSgWYBOjemlKGKSOWeilaXN
nqIRYe8IfolRERjOrLtKrV2/oYiIK17AA8I4oD8WY8Qp+iYEBeB/pB7ZEDRW
zuf8mWbD12AG6b6+PrrCOyGsJGxinz0PYHwsPj0+1XWycZkuQYh+H85NMLDg
kARlG7WdXeMfqZnNOn1rOgYsf1RRsBiFu6TzCE8ARKaYTszrAbqdgZ5R2iTx
Ks21lAS2xRFgFBZQOrGU04mKJyhX7uEUyW4Sjyck0IwjX9QVNtyNBGloGgV5
P/uE9k2l45D9Bc6VGT2kbiHl1rQCQdQR9VN42GEafPHFF+pEostcA0Ap+52J
fv+u+bdXC3Btc9/SajrA2oea/+M+FDdxgVEP9DmK8I6Z0O5h9Zz+xZWCHB6C
B2Aa9cNopHrhD0C6qTIx6t2dzWe9r5wwpBrZklBF5VQyBqP6Wsy6cmUFXFJJ
soxh31UvFsoFwEwy9Q1ctGCWYc/6gZh5JmWb8NQoRt2FtUO7fSDps8M3h1YA
2HU0ayrgO3TWjfNwNpHKFuQnhBNgssJaE0MytQC/yzsecdKOFzIuF6PSVonj
R5Isuy2CJBaFgZV1CoGtYBix+FWxoGGbq1oEXqrXg//9UA/vrx9wvvlVY9Fr
9mvOY+5tq52R2t1Wu1rtbaneHpy72ttXu321G6m9ntod4ie9LbU7Unub8tbu
Hk+qtunfXl/+7O2qzX38pa/N5/DitnnrSVPYwc0KeXB4Eb6iZ7xdr9hkPYfC
bhblVFcSO7AbSFep/s7eLvCzN3zEfdV4Qq15GeSoxj8fZtZnvx40HFSNBAXM
C0WSFJM16qpTTHogp/R95jJM7ikXon7uznUWzMgpDuhzBwdHCo+elRMsIs4L
4MGtDYz84tzWrBNMcEglUwVrFoX2F1Fomw+Lj+mHfxAC9dTODv67ufl3QaDa
nv9qZFJqf+dnItNzeBYR6toWnzn8qAUrWhvpBhz3YyfZxy3Bv/+4k9xVu4O/
70m6Pf/1J7m7vfVzTzJt00maCKKRCZgDYePB9QqDNhL+RMKXGH+xbADN3mHW
0e/jovzHHCOoSxEd4+BzH+MuHeO+2vLOEz/fk3834d2B2hqZucyO9qLPKgHU
9uazTzrqyVabTpsO7PnGj7/CNBRfKHDdzrlYvidSAL4iJ45lSMsro0N+3hG7
uYVZXiWIgc5LDlEok3c3lM8lZShoFlo99LOyKQLptI0ZY5dRZhiRKZ4OpjqK
Q0lCWrkDdgHie9MUlK4UYLOzs6X+8ud/c+VyxgUh+psJEwGZSMKAN1PsUhvC
op7dsEtavRTr2CIijtXVuh7UMyKJGtMO/NrBMKMJB7k8yBdYLe05OKnA0auX
MTabZE+BPlmQO7CUGnFxZz7tjJspEux9sJkOze4E7P+ttVEw/SYwjkLmmxmL
LWpTuLMkCuz5AnkeSuqinKKI/Dx11xSluKGq7aXBgTZDDk52c9J6ENiFLRL3
zU3OK+KpwAx7mybo7AtTflnnOWJceKspajvUEVrV7bqyTUG7K4LJc7Xdxvyg
s+nMq+YC8OPKrbpOERHOLjdp8QJTzg0pnafGxrXZkiQe/uOPSH44WsdIaDYh
8Qx+IyUvpsLqyvjkLd2KFf0wwQaSQyfoxuha1HHZ5sdTPEbi3bVqUNt2pFZc
RI9wwVSzUspYs6b2yK5e/MZSyEze3+EQtFBjnJPLj4xccSTN2VEtJFDzKxJx
WNIzp4K5xmTg0vKsnMx1EktmtrGqDA1zAwCbZMnOqCPMFQUiQkI021+Xicgg
l/aIXmIX22V0erbryELmOmcaSiYWIjL6RsmSFxgppl1Mb9apLZGsxw4M4vrh
IQNSw4YW67t897H1Ax0uJGi5BK8tyZ/wj7a99FhkaJrG8DBzjpFXXdGQCMZP
uioXC1+pCltQX3t3NRNc46YdZRhjERM7bpYIOiS1w8eZrw2GfcIS5ESvq5nx
27M8lDI+pl8YuCOFfR8XEsmFTgpJCsHcTWxTZNOL4YAnoJJocpL3FHVOoXUL
ouDA2uB0aGnh/Rye6+SYZ70uxbkYfjbeQfLq+dW4zNZkNI0N7+SwuE9LYTIf
tNug7mBemx9sZtSpFWmsO84oXYPIJTytkjKeJfU12DCdWRw2D2jbMlRXgsrn
1CazGIizomQHOEQprEoyg4aFq6iU4k1qheLqCCZhPkX2jesz7tyYcs16NtyC
68VlCf8PC1s5wdMV2VSzPa4T5EpnKTn74rQow0XZQ7g3zGZze9zGW2bpuCl6
CPT0bd0V6KGXFSuMXwtmvIqTpMLU/7JJbGG9v1CZBaaOu1VTekHbxfBdq66A
YZZAy7Qj+N7vR/D9u40WtbXgym5iGIRONTXq6QoOqdSPtj+ov3VAWuPaijnW
6Q2WSk958lIqdxaspwXzxzom3P+cvWNsk4esHtUf8lBBfeYVJspXX6nO11+f
Epv45S87wG25jeVv3p5c/RYYYxmWVXGg3lycXF1dXIF6Ex2onnt3lIRj+DqP
vuI3DlS/rQ7fXH97cnWAdHD49ub04urs5rf81/HxGZdS4iBuFHj1Gj9X1ydH
+F+7uKbDw/4AStEP4lXAytCVrXR26pB88pi5EgRPbLlFypzPSdyT2UxU225Q
bxCGnKbpK1siak3ghO0ITglgK95U+iA5m9I0eHEqIvOJbV4ek2McsPXW/RiZ
BQ1B92SJymxRAMiV8uznNwG6mrJnNTdWfDA+Kpkd3eDUtuFKklqZ53IpHT7A
M+w5NlXvZQpBOnfPN7UVMiUo9Wj1ZIvaD8rQYKXyY3oZ+QVgog7aVUTSoe4U
/klMwwwudAf8ItumIEXf72FiFmDrhIsKgF+QGTaCg0RrTg6AbZ5F1cJ2AkrZ
MDlbrJxDGVTvAGFU9DzHQiE6HTqq2uIqOrLNbm8Hq1AJLOvuW2RTAIXGuEwS
KZjXshMsaK29I8iB9d94tCFVS/rzBjZObeq+rP3IULTBV5ya7QKyLXVKEVDG
U6O6BLAAm/fabClkztRYArQfr7eTmdAYjkuKpK1JEk81aGxgfiwi12DuZXnV
N+slh85gFbOcysz5rKVS14JxKaMyRXyb3ffvm4dDxkkou1DZEEvMla8KEvCM
shRTbkOV6vcz6lbZsA+pXBy/L1hhpuaVdddRnVOYwuCFUnVRm41aa4DrA8DR
TLdhHE+pFxPouKwZY2gZdt9AONvmsmIPg01wxpOexIPYsr2FkYnzYBAy0k+a
QZRv2yYA1ao2IatTIq0auoTuHwTpE02UYubZKC+pgY5nR1Nyss7Hc+zGRfm5
OiS7oG0tQ8xkrmbEtdYoCwfTjsUEsVp4Rq4kbCm2Lk4aDL3naoydmrGsOqNC
3zC1PhVACHR4+3mrrLDS23FZE62VKPy60VrGNBkEYCbaM3Js5yISm16gHPOi
MevEQdtzkGHOQ2MSWVSzqCHX4wrGSea0sklYMBBMt1Hb1FNAiCd+chOOJaeA
/WV+Mq9r0Ya9kXdZkPnNHAj/UQ2CXY2rEHOGtHZGFS8bG6EYD6Cn4lA0EPM1
ScM5zk6xxgI9o7VpUfaLU6OoTG4NIYgtiUZuO4tCrqx1huPNzeui6cMhAic3
VDYqBcELbvKI+W1MeCMxjZA9epXYvhIk3UTtXEVlvDTqPHzfORxrV4QT1pkg
V/2ANgDrk+UFdflaKFoHoSUKEOwGYCtea5ndOETdOFzO8MW2Jj4h7pyilgW4
sOjdnu0h2ciFJVTYse4bq5uBdWtGcWlpRoddYFwExZJ4fRQthxttF6W9zWGv
+UdBPJoTboinLCWg8CIQ2uJXJGJNhlVCqEIv2xIglx1qy+toyb5O0kiwqfUM
yYC4xKXiCWyb+FzLdz4IruXRBsAIWeqWOGBrnMZTQC88a+5w4O8Vt1dUA+ok
zZkikoJMyGBgRNAM612IBSckIb7Ask/qZmtzE9OYuASpzaTTcD1Q7uMaNQ6i
wIcRgETywCWslz6Zt00GFvGa0RJ2hvCp2fkN95+nQNiydtoQjSh9PKWJMW+r
ZHMBUw0LwSSAFm7VLAbhSbBia8twkMF8gYZkS2fSvBWd2RLDQy/aTOeqSb+S
Ws6hHeDRLhyxkJlOWTMZVxfgcD5e1zgXuePouLXH37wuD6Y/HqNNjYzqeNal
wG8xQemdW1EJ+4gz6QkyS8KKhJynZy3o866VsqcXSDwEz0ZKTY1CTFCMhHQI
qYGrRba9g1uzockGcbjEcALTEA8AQw3Gccgvs0IED/W46VnsFGYhVWyg4bkX
ecH3qG3PsLs8+sCNduChB7FOLGYDXssJg5GeiQvdBAfz7PeshEZVvXxalMIb
I2zIxhMHZF0o0rJM+h62PctS0y9NDB/6nClU1DjAg0bKnq9kfbKnrsl/WBY2
nXOBl1vfsjni1A8q42oWIuYu6IELJlUhe0FCCtPiXmN5I9GTZ3FIUr11ufUP
evD/zYOtg22iAiTfvWe7+89I2V5iuEkuApmCoqH+TJedICI8ur/Xf/Z39JD9
ARRU0BWW+sn6fzs/2YKvzI7Fkz9tJDqcxkh0IEtOVGJSLNuYIv85jUB9/Uq9
eS8J42smgLq1bvJKQTsGyuhS6onrb0ec3rzOqmM9jl5POK5rFtwk0bE0Qazu
Z0OmJ2LOyeHxydVDmPOvxxfnh2dvHkadPPzbuFjroG9gT93Nemgb0Jgw4DIH
2bKAuUTJ7blvryM392PfYoK68Phf/vxvjENvSZrb2zGeqx1BGg9V6xjzdz/h
Bd7w9vL48ObEZw43Z+eXDx3wX326V7/9K7jCk101DQEs9gvLr2ClE6XukFDb
3f6OWnu70u2wHsTGNb7MGdrw85hUdNKlsmC119VUxTfdRvy689G4ZQ3mgcup
E6yixa9eOz3zHbUZI9R5R7eUaNTpbV2Bl6vCDtqrE/VS2rc/1It0WToXUshl
VUyQxKxqWjjH74Vc8fXUXK0V40kzSLy0y280w9r4zPh6qAfZPB1O8izNqgKU
xTSjZlDGL89Vfs3Udtb2C8+fH9NDYM2yTejShND/gY5n01e2cWGG30DQ3gUh
SmVsdCLSxO4n89VN3nzI2ViKXJZGLQyLEtZguuIjuAIjk4A2IhJy3aazQZRe
kw5lhrfgo97KHMGtN3+Do4wyz+a0LkkeOMCsTbAbmTGb6wfwpBj65gzbAYMs
Tu+4ibVLG8EXru0IxhggZ4HXK2O3yxV0DhHW24EHC9eU1KWWYJsIDOyTa8Sv
98Sghp6Eyci1+jMdwMxpYVQ+HjonGN47JF72WjWMk/DWEvCbU4cpNwWX8/Mb
pzH+Ua86GZgsqU5CThijyBYuVgXGMhVblWiqHEr1hua2K9jyY2A6WLFp5Hbg
gQRbQnPZEndLCdbATsVGTfEQG0Tn5Amk34fILZOkZn/wFLaR44yCfa5Of9fl
4lh8hVMiH1smjEcoAHv++FgjHc5tmE0qAtrBcvc5L26JI0sG9bN2huReILRz
WJeydE+LBcRDr4JLxIA3OImq4bza7W430bHLgkwbJ2lNUtkiNcvibE9Kk0aB
PczrXWrFgDMnu9B3c0EiFlRS2pCEhtZ9enTxJq8XiW2CV28oLN2IODdHCJx2
sCbmJR8s9+YmPMS4FkXC9L2xMdf9hlHUJ6DuTS0oyuAWGKzZUPSyF82eWCgj
6LlNm0iaZXHATIxFLze2cLeTmeuwFpu9mWYVdSgFfqtMEdFU0Qr4C0paXEym
xr08pfrZNPSKJGUae4sVSfH3pdd4DTnWqhr4gDqv1e8grHXXDU3Uit2b2b34
yaQncEjdOGQNnh8dWX1cDKuikJtY6qTFnMGVUtdapotDSfaDyId9q6iN2bnU
LiOkEH2y0yX6QCPBzsp44Bv1NFxsk4GNS7ElxsweDl0cQYnKp8bTRIErap1f
Zh2MxHQIg7/iSutQWn36beAaXbkPglxLJSEdWq3x/hqbHybD9eO6VfDYlW5e
XPNSaE2YCh8ugiXtm/HeZGlWP9AUdIPzuosx2WApQnOMGhEaGMU9NQ95EDDY
e9eMbl2ZeBmeAYJ5y1E1paCIquEulaBQ8UJC9dvUkdPbwmR5Ve5T9vM/Qcn0
kzJwB6heIWE0rlejnbkL2Ly7aRZPsxt8K4PwFXSqdo9RG3vkzV1ILixLuv7I
y+NGuqlCzwMwzExZfCARLEMeX6IygK4/NQWDLDFKhYmXoOMwlScYch6MCNKm
+zk/IrfhubtbpQUl6SFei4G+F0vpSu9hVgm17SXNbBfeBqFzdrw6o6KZ/olt
WjEcAUAQ+jSgDsfoGkcwjDpUFTLLYpDwJGUFiuimNmXt9rISWQRHK8sMm1GI
m7QJkVryJLnPWWWzfuOi9ngsQSGmDpmGJ0Btr1RYFFuqTaklkz5A/vVXRI23
cUqKZXM76PSuRUupAXm1wnaSLo5SkWs9rqRZ0Gs4BSNEMwYrUsAmapssbUrH
Weic0SiBBkwm/kPICQ/X76jnSxb8WEkoMVR0pXteloAbCOw928a+5cp0GDEa
Fs7UXHajCBlmCUj+SYk/6uiFpAyf3Lw0aaOYdEB6FiwD/WQUQMe9j9F7S5Wg
uHDSpWFBBaxFiptTr70ZK8O8b2RiAWrnIEgw7llfJ7UfrRc/YOJxlOXS1JmT
ngJcI8xV69EFMkmPRugvYm0ak+BnEjEBPQBNzqbB4bq4Sf1ryK4DNOSTWEq4
ERx0kRs2TM5yz3SkJRoghgUfH90Y6PXfBK3RMCt4IAC8CJOMIWHbHS/gGKmq
wOLNBW5drC9DRlAEFK2I7mLprezgzJKhORRep8hePFAgTVAFX/RRqK1a3LkB
naOsmmATXLx2k1UI7GaMlwGP86yamb7ieBFxVDWKeOh+ClvrQwujSyAR9N6F
N3mVEvGia8zY7XTzo7nuhzqRim5GLB7gFGAaUB47bMGljUAWUKcFN9c0lHIG
CwwdWYItOD9gSoAFuLIIr2YmHuLhpuxa8a4D2+2dpIbXpkj6giGLhu21uvYm
kM0e3QRiL1nE9XSYwbxb8fEDVy961Lvk4kNF7jqQa1pUo7iQC5iHtU4HFOmS
MQUBnLFjb3Islim4yN35VrWgpiJquWN68SV3w5/6zu/OVSd6SwjGY4J3LUru
LBqPczCzp+rq7OLm3XdjFKRYQ4m3V742NwXSaYKycRAcSNYqWSvBN5oDVti5
BgZjlxQ+RGyr467+RjGOfiQ2k/tbMHY81BRmOlCvX12+7mx2+6RelRiJ944f
H/jhHI16OPHrLnbqo56Lv5zyZ+ZW81+XVQdjXoDV3Uh//QPMgPKO49IWcI2B
r/UMto4ZRJu9zW0+Ae4s83NPwNx3Vj8BYOqXcxggffddGGcADFTK/44QPj+7
+ccD17f7PCV6lWIcBK+4VYtpLy1vN2oawdRAMtvc2XR5T31Ke+LGs2R7HXUD
vuWREniAj8eluSlo+aiiITqmZvNRl+vRbHyJcblmDWlvSZtsANlrQBbvgV6z
F0HX7vZ0d0I3NtjMEsEdUuTHOJQAYVD9KZybKZYuFA3jHHsqigPOACQQPb/A
hueu8sz4unK80TbPh6DH+r5pUIkxgYAM5XuvIpBucZCUyEzSyNDZPLW5MOQ1
MS2GKHmIu1ghlO4QTP4t2ahDZNhbVpdakk7Mg1v+Fdq4V2nHwYHJqWnrs9DP
mFMu6CEUQjTl8v46tRS+2n1giF1yg7FLjbKVO24rlEZT8gb56O+YyilXotbF
2ruUjt6npuGEgLgL8b3JAwvGg2fULJijaNn4DbHYKgprNdScMtOw2ZcYSShL
JE3I5vs0XczsicIvFgylAGx9L4I8y7IRgbnuGxH0lexZ0CyjeMj3GXHbPbJ0
YmnjZZpZzZ3oNa5phBcnfxYBO9f4anbfEmJfSSoLlD6QMOTDAJUbh5YxCIVb
lMZx8AjzifbiVuAUjGFp4OBKUtFACLGojGrVZTTqYctsJ8N0ZL89f5lxb1Vn
rcYpptiQ0MfhdeQ5wlg3oMag1vRCHZQvOzcu+LaHLebAFy6754o8679AoqPc
nzx1fUjhiYRu2x4zS6pfoWhz4QgTGungaAFgocl96OeQetEZ1HS9y9FqlLFw
Z+eSe9Lqt+X4V4iyHMGNUl6Wy9l92EdDFbk+PhiXE0UrxPi3t60HvlQyHlKT
fR4tBLlwt2T1S039wttIej40zMYJFHRN/IOrN9fcrLxAeVDRjV7oeLEtHrkG
gO24bBYC9qgFn7uX+cUIRzdTY1G6ZDMZ8Pk3zHDqcOR2YQ8JryhljxFAgPqw
1dEmnBu70ZYo6ZzaJC/cb9oOeMsRL5uuzkSHrwt2YmUq1l65fdH3jYTLglyY
ODPdXWQDjS7tdeUSvgrI4UvYze9Sjin6BXRUd5mvbBv7slaSEDahgRazuXqJ
OSA7j7wQ2jDXghYoZCWYWdIxj1PxgCudxGPyHy7cAOybcfYQ2esgm7JpRY0L
Zgdyj0et/IravT2uPfot9t7Dz7uFDzwr0HW0q5mAzc513IPm5VHnX+HHMREc
xtUgLHNQ0c1t1sKkYdCnsHDRibm11mUYhkPnZMadm8qrevJDoa70OAaknD+c
byDQq0VWnZ9heWOYM3eNxuoUD0pfDrhvi5QvLlsmlvvxOtvmhmJ59km3IXoX
ObUCMxJ7DtxtlO1G7EYo80lrdy2Bz6kRDd7j5S3a1dxlEvWU/dGDB2rFFO6x
I7pp4EDhQRxLHlRRjcd0EusBMD1xDRzYWQh5vv/OYN3379or0r84JaVx1Vbh
7tp6Cn48giZSZeDlv6ZSkEUwW7huS1HX67Va90gPmj4GPLB27w06apZ95BKO
a/ngMzvvYp/OlXcYooj4oN4w+aoP3EzW/XxQ5zokRfWBnw/qiIvC8JxzgA4M
9UHZwzRPwTwCYGV/W/XBsp9lDy1+RvP0ez5iySJN7yq76no7IRthp4c+sFP2
w1LcWw5JmBkvugctFjuudug4OreIAnLT/TcuyOHjBF51X786by0vn6+r13gf
3w03Ej60l+nJIJ+E0Et/gkCtRHM2RZ++KHc3n6WGT93RCsL4GaxxgV4CmuFA
mUUCq3CBjIMVaNCtsaOnY0EQ4JEodBcHwQlHDpFKOSSq7Qd+MPQx75qJIJQc
gwFh1W5419pSEhYm84LvSKGSITFnglmICTst9j4BMROV03WBlZ/aeJbdNMCB
N8vBSB0agJiFkPrrbBw0tQ1yNLOGnmTjd0s//Nm+Z9M56btHnH57755MEkFH
HUqNwFWGF/gdg5WWxPdfFoq9Dzec0toBUNEaq5RcYNhXe29703myvYG+ScIo
nv70f3P1n/+9Sn/63+WX1Abx+OxKwh0yonn+p/+GV1V+M0+Ht/rL5rTnXDvl
mqHBOR0OCq7UwgM/k4b35Cc1SzVsFyjx+ua4v+XnDcLS+72tHXn2Uvy27jZF
cj2ZRLJRs60aChsyr3hB1zLMW3NhIlohpDJT0boUh9ho4EhcUabVPPrDTMtW
Huhsil40bSdjlVi+PJ3PJnQJFF1U2uEC+BBDLRH37cOcP2QC3mlchsAuvqWb
Wws8iLPro7fX0p5gxQlbHwPffASmgZSaR5Q2zToS+1Xqi7+c5JRUsXDNIBEv
3RKAOJ3qCs4vSebeMl9lmJ70MozzSZUX5SL+wYMchVvz0lINq/3BUNQP65Lo
6jo9E3GFiTeMF37xLlmgfpzDrMW3ayLm2PufTJVZA3FpzbBSUEKKB7ciQDdb
kbT6xTxR+d5LNARelNnshZSNKLy8DHhJhXqlm/Uij7W6LjWw4SXA++vu2K0j
iIcQWBXqocv54W/rj7oVSzW910ncK94DK2/IGUN4js+2pd1OR72M32N4kLMW
c9Llai1KvP0f6wGw6yzR88XtvyL7QFxl7vQ/K3BqSyUUXPTpYZaY+PNWgbSF
HofWUzn97idxesNLyWFYuHwfL5/FuwYVL4bx+CxdLBLwPhsd2ke1JhBGxzQl
czgxXpdiPvfv93NUipd+iSsEW5I8FQA7P0vUvQImmvO2DvMSf2XB5PMaOLky
y7/kwiebPQ+nJWi6t7m573AJN08JZfloiN8MMPWWrkfA91iWS22IJ9Eb/GQa
pxgFQm5isIN7elEhO0aMOpws427PdUyD9Bn/OpqlzK3GBUNxwGNC/r0rziS3
ihenWEOi3N3a3lv33rb1jkzcBgxLeiH4NIomHsqF2p1IpIJTzkHzHARlDjC7
PW+UWFj0MqDCNIIVmEm5FR7a+Xd6yvuYxmRSU4jav8QKKTZ2m+JMXjmRxHG8
eZmZNN3xwhEvPIHnZIVGWVdeoCor7x6YA/Wt/jLXXHk9WXHZjQe+m+IOcfXK
V6IuCfbq8PgNZyHKhSZfyRYQGpzh/YtJdv8LqbsodPlUAtv+JAITdlZU6M9M
KrxGqK5CAN/ES295q9TDQzrGWBHrtnt47KGDHRs1z2fbz5CB0RUsURyOU8z3
GiIcTX630UrxRbSOOsYdV09k7XzNSbJLv/VnjbJqkPiIDmt/cXSpNqmStcH9
05qKIXLLv3SYOQ+oGfTuOU4gmOmnl3kaJAVxbnSOHAJMiLnRKGWJZFxbLXMH
H259UulTixeCbFo6GYhXZTGd0Yn0ZZmKga9TI1S5sEauGOLyBfjg7Ph5z+Wf
UYTerWDFdSx24sDwIM8BxJe1XZ3QdyZhACTLdBrmbXMybZHAwEgpKQqMrxQz
jp5ICls/S9YUEw1KO90iQmT7xMk2f9ZkJ8Vt9mVhpnKfn4f5MCuWfhPfZkkY
u6+euL7eJ/IFvvcFLPZc01XvGOjK8ZpT7HxRWIYfF7+vUtA4nn+Nv4NKOCzl
qyrV9rYgQmJ4ZAn24aM28oUJyPicH9eqR+BgbZcVlSo33Im1650Kk98eg3Q7
fiNa0CCnYDNajjkWyLk0V6tgdkAtxbxV2qWhXRLLD4QdRVovaUDTCuqchu1D
qRydSPc5eOaIxKWETjDsejHDLnWgh8yx7VbPtQIylZS4JlAt/DhFSumJEfAu
vMKMy4GBoiKkP7NVqlwZmrgweQFqc0ugbwPbEnm1BvdyNXsjSx3R8i6LI5P8
DlNL1i+CT/3lz/+j7qV0Dev/8uf/ibDm+o1mywtuaRF7RbaoqTENqHp1sWHD
Zearr4afGKtLDSd6eAuKavFU3tF79knkIgZiU1Vy32B8o4NKUdMBU5dQXg33
d+S+2+xv7X7/7t3apCypFyu26kUV/1bnXVw71itvgOaxMSmnyQbosvjCelv0
LzlU1iGAxHJKBeC2GvaeV1mHyVBZTKo6qJFtDcupVoMdHk+E6/7PgeuRTm+B
4R2ORnHCSvRTp/t5njVWcKmWkpms+gLAur+7t+/W5FvK3gk2LiDFayksRgik
qdG5JAaRvu6jxPWqM7ikO9zo1mCLTB32dgXkhVrM8T8wa8V3+PRNxtJT4fdp
9iruzrsgC6nBkILHrXG5CGC86h2tgX8hZxw674dZUk1Tui9Q+m+d5ACAUG0/
29lep0cXSAZtnf1tuWJzRTRPudAgDYLTI1YjhRQ6GfkS4ImA+WQ71tcwSY9O
NCbOEJQ28G49rBPgqjYqHXjqQj5N37dOOQrsA1skJmqqES0BMO7TKX2SltH7
RJWLM05qLmHWfam22CTCVHjtn63s9evWtRdVkd1xnMOLWXykSyLt30/dyafo
c4HYBI3sYWnwi8e9lD7ZM0rFB5TRSTvntFgqP1gnRUwSc7zLzGC8Ww1mmW04
Ye5SL6ZhkhATKZspAQ9RB4y3s7OF7wkuHvB20KUqdcwmVmQzWbHJFKjj8NTN
i2NXmAPC4OLS1GUaPR8Uk6ae4RX6UZqn1R3dc80qP+8VX67W03/TuqwireGY
DOshdhiTjDsAJ5ZZamq3KTpq8FTE6H8aYlzzBdK1+mrsvonON9SkbbmiUzg9
INSzzyREJopCo/oay9aMYS35RbYEUmgDy8fl/FxhqrtJxZZKU1/KI3kJu3mn
ESixvqbcQPWnwu5TjBDCx1cIhMPro7MzQJPS0Jm3iZZL/W9kGLXUGuYbe/0b
6YYGuhL5PmUuC9JgTdYsGfO04mFavFv3rCCO29zFWSKVF+h7so0Ojy7eCNOy
H+P1rOHQgn1Vsjrb1Q3g+Qv5OXw+sG4d0y1ESWHVA+MHwRfqcIjOykRHY+an
Px5UKedI6UjaqK2M92LnCGmMkN6ijYopIcDEZ211FOYF9hx9gYwoTdvqJLmf
w59ddRyCaCnaZASDLfD727a6mWRTOLSXGXCmMm4ba1e9+uk/ymIIGAuPZADS
U7AL8NfpdE4Bs3lbvYA5roeTe8CTP7bZgFY3cZINQ3Yj3MRT9W08jNPiNjbp
UVRKJnVS7Pea0t67QfB4zPZAPU0rf2ygR6fa/VxT7T461c7nmmrn0am2P9dU
249OtfW5ptp6dKrNzzXV5qNT9T7XVL3HpgJr+PNM1Xv26FT7n2uq/Uen+lwk
3HuUhHufi4R7j5Jw73ORcO9REu59LhLuPUrCvc9Fwr1HSbj3uUi49ygJgy75
mabqPzrV5+IWPcstmhrTE8Zf+uLGsgH/CixbNUzgFcl6I2bDbh5nZScraDDK
v/vd71Jd/u53/DzdTIrjB34RqBthDLpfNeiC7rARpnlnMB2MOrP4Lis33OPB
/wdf12J6a8AAAA==

-->

</rfc>
