<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.10 (Ruby 3.0.4) -->
<?rfc strict="yes"?>
<?rfc compact="yes"?>
<?rfc comments="yes"?>
<?rfc subcompact="no"?>
<?rfc iprnotified="no"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-core-transport-indication-00" category="std" consensus="true" tocDepth="3" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.12.7 -->
  <front>
    <title>CoAP Protocol Indication</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-core-transport-indication-00"/>
    <author initials="C." surname="Amsüss" fullname="Christian Amsüss">
      <organization/>
      <address>
        <postal>
          <country>Austria</country>
        </postal>
        <email>christian@amsuess.com</email>
      </address>
    </author>
    <date year="2022" month="May" day="30"/>
    <area>Internet</area>
    <workgroup>CoRE</workgroup>
    <keyword>CoRE, Web Linking, Proxy, URI, aliasing</keyword>
    <abstract>
      <t>The Constrained Application Protocol (CoAP, <xref target="RFC7252"/>) is available over different transports
(UDP, DTLS, TCP, TLS, WebSockets),
but lacks a way to unify these addresses.
This document provides terminology and provisions based on Web Linking <xref target="RFC8288"/>
to express alternative transports available to a device,
and to optimize exchanges using these.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Constrained RESTful Environments Working Group mailing list (core@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/core/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/core-wg/transport-indication"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>The Constrained Application Protocol (CoAP) provides transports mechanisms
(UDP and DTLS since <xref target="RFC7252"/>, TCP, TLS and WebSockets since <xref target="RFC8323"/>),
with some additional being used in LwM2M <xref target="lwm2m"/>
and even more being explored (<xref target="I-D.bormann-t2trg-slipmux"/>, <xref target="I-D.amsuess-core-coap-over-gatt"/>).
These are mutually incompatible on the wire,
but CoAP implementations commonly support several of them,
and proxies can translate between them.</t>
      <t>CoAP currently lacks a way to indicate which transports are available for a given resource,
and to indicate that a device is prepared to serve as a proxy;
this document solves both by introducing the "has-proxy" terminology to Web Linking <xref target="RFC8288"/> that expresses the former through the latter.
The additional "has-unique-proxy" term is introduced
to negate any per-request overhead that would otherwise be introduced in the course of this.</t>
      <t>CoAP also lacks a unified scheme to label a resource in a transport-independent way.
This document does <em>not</em> attempt to introduce any new scheme here,
or raise a scheme to be the canonical one.
Instead, each host or application can pick a canonical address for its resources,
and advertise other transports in addition.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>Readers are expected to be familiar with the terms and concepts
described in CoAP <xref target="RFC7252"/>
and link format (<xref target="RFC6690"/>
(or, equivalently, web links as described in <xref target="RFC8288"/>).</t>
        <dl>
          <dt>Same-host proxy:</dt>
          <dd>
            <t>A CoAP server that accepts forward proxy requests (i.e., requests carrying the Proxy-Scheme option)
exclusively for URIs that it is also the authoritative server for is defined as a "same-host proxy".</t>
          </dd>
          <dt/>
          <dd>
            <t>The distinction between a same-host and any other proxy is only relevant on a practical, server-implementation and illustrative level;
this specification does not use the distinction in normative requirements,
and clients need not make the distinction at all.</t>
          </dd>
          <dt>hosts:</dt>
          <dd>
            <t>The verb "to host" is used here in the sense of the link relation of the same name defined in <xref target="RFC6690"/>.</t>
            <t>For resources discovered via CoAP's discovery interface,
a hosting statement is typically provided by the defaults implied by <xref target="RFC6690"/>
where a link like <tt>&lt;/sensor/temp&gt;</tt> is implied to have the relation "hosts" and the anchor <tt>/</tt>,
such that a statement "coap://hostname hosts coap://hostname/sensor/temp" is implied in the link.</t>
            <t>The link relation has been occasionally used with different interpretations,
which ascribe more meaning to the term than it has in its definition.
In particular,</t>
            <ul spacing="normal">
              <li>the "hosts" relation can not be inferred merely by two URIs having
the same scheme, host and port (and vice versa), and</li>
              <li>the "hosts" relation on its own does not make any statement
about the physical devices that hold the resource's representation.</li>
            </ul>
            <t>[ TBD: The former could probably still be used without too many ill effects;
but things might also get weird when a dynamic resource created
with one transport from use with another transport unless explicitly cleared.
]</t>
          </dd>
        </dl>
        <t>When talking of proxy requests,
this document only talks of the Proxy-Scheme option.
Given that all URIs this is usable with can be expressed in decomposed CoAP URIs,
the need for using the Proxy-URI option should never arise.
The Proxy-URI option is still equivalent to the decomposed options,
and can be used if the server supports it.</t>
        <section anchor="using-uris-to-identify-protocol-endpoints">
          <name>Using URIs to identify protocol endpoints</name>
          <t>The URI <tt>coap://device.example.com</tt> identifies a particular resource, possibly a "welcome" text.
It is, colloquially, also used to identify the combination
of a host (identified through a name), the default port, and the CoAP method of sending requests to the host.</t>
          <t>For precision, this document uses the term
"the transport address indicated by (a URI)" to refer to the host / port / protocol combination,
but otherwise no big deal is made of it.</t>
          <t>For the CoAP schemes (coap, coaps, coap+tcp, coaps+tcp, coap+ws, coaps+ws),
URIs indicating a transport are always given with an empty path
(which under their URI normalization rules is equivalent to a path containing a single slash).
For the coap and coap+tcp schemes, URIs with different host names
can indicate the same transport as long as the names resolve to the same addresses.
For the other protocols, the given host name informs the name set in TLS's Server Name Indication (SNI)
and/or the host sent in the "Host" header of the underlying HTTP request.</t>
          <t>If an update to this document extends the list,
for new schemes it might be allowed to have paths, queries or fragment identifiers present in the URI indicating the transport address.
No guidance can be given here for these,
as no realistic example is known.
(Note that while the coap+ws scheme does use the well-known path <tt>/.well-known/coap</tt> internally,
that is used purely on the HTTP side, and not part of the CoAP URI, not even for indicating the transport address).</t>
          <t>URIs indicating a transport are especially useful when talking about proxies;
this use is aligned with the way they are exprssed in the conventional environment variables <tt>http_proxy</tt> etc.
[ cite https://about.gitlab.com/blog/2021/01/27/we-need-to-talk-no-proxy/ ].
Furthermore, URIs processing is widespread in CoAP systems,
and when that changes (e.g. through the introduction of <xref target="I-D.ietf-core-href"/>),
URIs indicating a transport will still be efficient to encode.
And last but not least, it lines up well with the colloquial identity mentioned above.
(An alternative would be using a dedicated naming scheme, say, <tt>transport:coap:device.example.com:port</tt>,
but that would needlessly introduce implementation complexity).</t>
          <t>Note that this mechanism can only used with proxies that use CoAP's native address indication mechanisms.
Proxies that perform URI mapping
(as described in Section 5 of <xref target="RFC8075"/>, especially using URI templates)
are not supported in this document.</t>
          <t>[ TBD: Do we want to extend this to HTTP proxies? Probably just not, and if so, only to those that can just take coap://... for a URI. ]</t>
        </section>
      </section>
      <section anchor="goals">
        <name>Goals</name>
        <t>This document introduces provisions for the seamless use of different transport mechanisms for CoAP.
Combined, these provide:</t>
        <ul spacing="normal">
          <li>Enablement: Inform clients of the availability of other transports of servers.</li>
          <li>No Aliasing: Any URI aliasing must be opt-in by the server. Any defined mechanisms must allow applications to keep working on the canonical URIs given by the server.</li>
          <li>Optimization: Do not incur per-request overhead from switching protocols. This may depend on the server's willingness to create aliased URIs.</li>
          <li>Proxy usability: All information provided must be usable by aware proxies to reduce the need for duplicate cache entries.</li>
          <li>Proxy announcement: Allow third parties to announce that they provide alternative transports to a host.</li>
        </ul>
        <t>For all these functions, security policies must be described that allow the client to use them as securely as the original transport.</t>
        <t>This document will not concern itself with changes in transport availability over time,
neither in causing them ("Please take up your TCP interface, I'm going to send a firmware update")
nor in advertising their availability in advance.
Hosts whose transport's availability changes over time can utilize
any suitable mechanism to keep client updated,
such as placing a suitable Max-Age value on their resources
or having them observable.</t>
      </section>
    </section>
    <section anchor="indicating-alternative-transports">
      <name>Indicating alternative transports</name>
      <t>While CoAP can set the authority component of the requested URI in all requests (by means of Uri-Host and Uri-Port),
setting the scheme of a requested URI (by means of Proxy-Scheme) makes the request implicitly a proxy request.
However, this needs to be of only little practical concern:
Any device can serve as a proxy for itself (a "same-host proxy")
by accepting requests that carry the Proxy-Scheme option.
If it is to be a well-behaved proxy,
the device should then check whether it recognizes the name set in Uri-Host as one of its own
(as it should if no Proxy-Scheme option accompanied it). <!-- without 7252 explicitly mandating that -->
If the name is not recognized,
it should reject the request with 5.05 (Proxying Not Supported)
-- unless, of course, it implements forward proxy functionality exceeding the same-host proxy.
If the name is recognized,
it should process the request as it would process a request coming in on the given protocol
(which, for many hosts, is the same as if the option were absent completely).</t>
      <t>A server can advertise a recommended proxy
by serving a Web Link with the "has-proxy" relation to a URI indicating its transport address.
In particular (and that is a typical case),
it can indicate its own transport address on an alternative transport when implementing same-host proxy functionality.</t>
      <t>The semantics of a link from S to P with relations has-proxy ("S has-proxy P", <tt>&lt;P&gt;;rel=has-proxy;anchor="S"</tt>)
are that for any resource R hosted on S ("S hosts R"), the proxy with the transport address indicated by P can be used to obtain R.</t>
      <section anchor="example">
        <name>Example</name>
        <t>A constrained device at the address 2001:db8::1 that supports CoAP over TCP in addition to CoAP can self-describe like this:</t>
        <figure anchor="fig-has-proxy">
          <name>Discovery and follow-up request through a has-proxy relation</name>
          <artwork><![CDATA[
Req: to [ff02::fd]:5683 on UDP
Code: GET
Uri-Path: /.well-known/core
Uri-Query: if=tag:example.com,sensor

Res: from [2001:db8::1]:5683
Content-Format: application/link-format
Payload:
</sensors/temp>;if="tag:example.com,sensor",
<coap+tcp://[2001:db8::1]>;rel=has-proxy;anchor="/"


Req: to [2001:db8::1]:5683 on TCP
Code: GET
Proxy-Scheme: coap
Uri-Path: /sensors/temp
Observe: 0

Res: 2.05 Content
Observe: 0
Payload:
39.1°C
]]></artwork>
        </figure>
        <t>Note that generating this discovery file needs to be dynamic based on its available addresses;
only if queried using a link-local source address, the server may also respond with a link-local address in the authority component of the proxy URI.</t>
        <t>Unless the device makes resources discoverable at <tt>coap+tcp://[2001:db8::1]/.well-known/core</tt> or another discovery mechanism,
clients may not assume that <tt>coap+tcp://[2001:db8::1]/sensors/temp</tt> is a valid resource (let alone is equivalent to the other resource on the same path).
The server advertising itself like this may reject any request on CoAP-over-TCP unless it contains a Proxy-Scheme option.</t>
        <t>Clients that want to access the device using CoAP-over-TCP would send a request
by connecting to 2001:db8::1 TCP port 5683
and sending a GET with the options Proxy-Scheme: coap, no Uri-Host or -Port options (utilizing their default values),
and the Uri-Paths "sensors" and "temp".</t>
      </section>
      <section anchor="secctx-propagation">
        <name>Security context propagation</name>
        <t>If the originally requested URI R or the application requirements demand a security mechanism is used,
the client MUST only use the proxy P if the proxy can provide suitable credentials.
(The hosting URI S is immaterial to these considerations).</t>
        <t>For example, if the application uses the host name and a public key infrastructure and R is <tt>coap://example.com/</tt>
the proxy accessed as <tt>coap+tcp://[2001:db8::1]</tt> still needs to provide a certificate chain for the name example.com to one of the system's trust anchors.
If, on the other hand, the application is doing a firmware update and requires any certificate from its configured firmware update issuer,
the proxy needs to provide such a firmware update certificate.</t>
        <t>Some applications have requirements
exceeding the requirements of a secure connection,
e.g., (explicitly or implicitly) requiring that
name resolution happen through a secure process
and packets are only routed into networks where it trusts that they will not be intercepted on the path to the server.
Such applications need to extend their requirements to the source of the <tt>has-proxy</tt> statement;
a sufficient (but maybe needlessly strict) requirement is to only follow <tt>has-proxy</tt> statements
that are part of the same resource that advertises the link currently being followed.
Section <xref target="proxy-foreign-advertisement"/> adds further considerations.</t>
      </section>
      <section anchor="choice-of-transports">
        <name>Choice of transports</name>
        <t>It is up to the client whether to use an advertised proxy transport,
or (if multiple are provided) which to pick.</t>
        <t>Links to proxies may be annotated with additional metadata that may help guide such a choice;
defining such metadata is out of scope for this document.</t>
        <t>Clients MAY switch between advertised transports as long as the document describing them is fresh;
they may even do so per request.
(For example, they may perform individual requests using CoAP-over-UDP,
but choose CoAP-over-TCP for requests with large expected responses).
When the describing document approaches expiry,
the client can use the representation's ETag to efficiently renew its justification for using the alternative transport.</t>
      </section>
      <section anchor="selection-of-a-canonical-origin">
        <name>Selection of a canonical origin</name>
        <t>While a server is at liberty to provide the same resource independently on different transports (i.e. to create aliases),
it may make sense for it to pick a single scheme and authority under which it announces its resources.
Using only one address helps proxies keep their caches efficient,
and makes it easier for clients to avoid exploring the same server twice from different angles.</t>
        <t>When there is a predominant scheme and authority through which an existing service is discovered,
it makes sense to use these for the canonical addresses.</t>
        <t>Otherwise,
it is suggested to use the <tt>coap</tt> or <tt>coaps</tt> scheme
(given that these are the most basic and widespread ones),
and the most stable usable name the host has.</t>
      </section>
      <section anchor="advertisement-through-a-resource-directory">
        <name>Advertisement through a Resource Directory</name>
        <t>In the Resource Directory specification <xref target="I-D.ietf-core-resource-directory"/>,
protocol negotiation was anticipated to use multiple base values.
This approach was abandoned since then,
as it would incur heavy URI aliasing.</t>
        <t>Instead, devices can submit their has-proxy links to the Resource Directory like all their other metadata.</t>
        <t>A client performing resource lookup can ask the RD to provide available (same-host-)proxies in a follow-up request
by asking for <tt>?anchor=&lt;the-discovered-host&gt;&amp;rel=has-proxy</tt>.
<!-- We don't say that the RD can not do that, right? -->
The RD may also volunteer that information during resource lookups even though the has-proxy link itself does not match the search criteria.</t>
        <t>[ It may be useful to define RD parameters for use with lookup here, which'd guide which available proxies to include.
For example, asking <tt>?if=tag:example.com,sensor&amp;proxy-links=tcp</tt> could give as a result:
<tt>&lt;coap://[2001:db8::1]/s&gt;;rt=tag:example.com,sensor,&lt;coap+tcp://[2001:db8::1]/&gt;;rel=has-proxy;anchor="coap://[2001:db8::1]/"</tt>
]</t>
      </section>
    </section>
    <section anchor="elision-of-proxy-scheme-and-uri-host">
      <name>Elision of Proxy-Scheme and Uri-Host</name>
      <t>A CoAP server may publish and accept multiple URIs for the same resource,
for example when it accepts requests on different IP addresses that do not carry a Uri-Host option,
or when it accepts requests both with and without the Uri-Host option carrying a registered name.
Likewise, the server may serve the same resources on different transports.
This makes for efficient requests (with no Proxy-Scheme or Uri-Host option),
but in general is discouraged <xref target="aliases"/>.</t>
      <t>To make efficient requests possible without creating URI aliases that propagate,
the "has-unique-proxy" specialization of the has-proxy relation is defined.</t>
      <t>If a proxy is unique,
it means that requests arriving at the proxy are treated the same
no matter whether the scheme, authority and port of the link context are set in the Proxy-Scheme, Uri-Host and Uri-Port options, respectively,
or whether all of them are absent.</t>
      <t>[ The following two paragraphs are both true but follow different approaches to explaining the observable and implementable behavior;
   it may later be decided to focus on one or the other in this document. ]</t>
      <t>While this creates URI aliasing in the requests as they are sent over the network,
applications that discover a proxy this way should not "think" in terms of these URIs,
but retain the originally discovered URIs (which, because Cool URIs Don't Change<xref target="cooluris"/>, should be long-term usable).
They use the proxy for as long as they have fresh knowledge of the has-(unique-)proxy statement.</t>
      <t>In a way, advertising <tt>has-unique-proxy</tt> can be viewed as a description of the link target in terms of SCHC <xref target="I-D.ietf-lpwan-coap-static-context-hc"/>:
In requests to that target, the link source's scheme and host are implicitly present.</t>
      <t>While applications retain knowledge of the originally requested URI
(even if it is not expressed in full on the wire),
the original URI is not accessible to caches both within the host and on the network
(for the latter, see <xref target="actualproxies"/>).
Thus, cached responses to the canonical and any aliased URI are mutually interchangeable
as long as both the response and the proxy statement are fresh.</t>
      <t>A client MAY use a unique-proxy like a proxy and still send the Proxy-Scheme and Uri-Host option;
such a client needs to recognize both relation types, as relations of the has-unique-proxy type
are a specialization of has-proxy and typically don't carry the latter (redundant) annotation.
[ To be evaluated -- on one hand, supporting it this way means that the server needs to identify all of its addresses and reject others.
   Then again, is a server that (like many now do) fully ignore any set Uri-Host correct at all? ]</t>
      <t>Example:</t>
      <figure anchor="fig-has-unique-proxy">
        <name>Follow-up request through a has-unique-proxy relation. Compared to the last example, 5 bytes of scheme indication are saved during the follow-up request.</name>
        <artwork><![CDATA[
Req: to [ff02::fd]:5683 on UDP
Code: GET
Uri-Path: /.well-known/core
Uri-Query: if=tag:example.com,sensor

Res: from [2001:db8::1]:5683
Content-Format: application/link-format
Payload:
</sensors/>;if="tag:example.com,collection",
<coaps+ws://[2001:db8::1]>;rel=has-unique-proxy;anchor="/"


Req: to [2001:db8::1] via WebSockets over HTTPS
Code: GET
Uri-Path: /sensors/

Res: 2.05 Content
Content-Format: application/link-format
Payload:
</sensors/temperature>;if="tag:example.com,sensor"
]]></artwork>
      </figure>
      <t>It is noteworthy that when the URI reference <tt>/sensors/temperature</tt> is resolved,
the base URI is <tt>coap://device0815.example.com</tt> and not its coaps+ws counterpart --
as the request is still for that URI, which both the client and the server are aware of.
However, this detail is of little practical importance:
A simplistic client that uses <tt>coaps+ws://device0815.proxy.rd.example.com</tt> as a base URI will still arrive at an identical follow-up request with no ill effect,
as long as it only uses the wrongly assembled URI for dereferencing resources,
the security context is the same,
the state is kept no longer than the has-unique-proxy statement is fresh,
and it does not (for example) pass the URI on to other devices.</t>
      <section anchor="impact-on-caches">
        <name>Impact on caches</name>
        <t>[ This section is written with the "there is implied URI aliasing" mindset;
it should be possible to write it with the "compression" mindset as well
(but there is no point in having both around in the document at this time).</t>
        <t>It is also slightly duplicating, but also more detailed than,
the brief note on the topic in <xref target="actualproxies"/>
]</t>
        <t>When a node that performs caching learns of a <tt>has-unique-proxy</tt> statement,
it can utilize the information about the implied URI aliasing:
Requests to resources hosted by S can be answered with cached entries from P
(because by the rules of <tt>has-unique-proxy</tt> a request can be crafted that is sent to P for which a fresh response is available).
The inverse direction (serving resources whose URI "starts with" P from a cached request that was sent to S) is harder to serve because it additionaly requires a fresh statement
that "S hosts R" for the matching resource R.</t>
      </section>
      <section anchor="unique-security">
        <name>Using unique proxies securely</name>
        <t>[
This section is work in progress, it is more a flow of considerations turning back on each other.
This is all made a bit trickier by not applying to OSCORE which is usually the author's go-to example,
because OSCORE's requirements already preclude all these troubles.
]</t>
        <t>The use of unique proxies requires slightly more care in terms of security.</t>
        <t>No requirements are necessary on the client side; those of {#secctx-propagation} suffice.
(In particular, it is not necessary for the statement to originate from the original server
unless that were already a requirement without the uniqueness property).</t>
        <t>The extra care is necessary on the side of servers that are commissioned with wide ranging authorization [ or is it? ]:
These may now be tricked into serving a resource of which the client assumes a different name.
For example,
if the desired resource is <tt>coaps://high-security.example.org/configuration</tt>,
and there exists a "home page" style service for employees with patterns of
<tt>coaps+tcp://user-${username}.example.org/</tt> at which they can store files,
and the server operating that service is commissioned with a wild-card certificate "*.example.org",
then a device that receives the (malicious) information
<tt>&lt;coaps+tcp://user-mave.example.org&gt;;rel=has-unique-proxy;anchor="coaps://high-security.example.org"</tt>
might use this statement to contact the transport address indicated by <tt>coaps+tcp://user-mave.example.org</tt> and ask for <tt>/config</tt>
(which, to the server, is indistinguishable from <tt>coaps+tcp://user-mave.example.org/config</tt>)
and obtain a malicious configuration.</t>
        <t>In a non-unique proxy situation,
the error would have been caught by the server,
which would have seen the request for <tt>coaps://high-security.example.com</tt>
and refused to serve a request containing critical options it can not adaequately process.</t>
        <t>In the unique proxy situation, ...
[ TBD:
now whose fault is it?
Can only be the client's ...
because it looked at the wildcard certificate rather than whether the host-name it was narrowing it down to is authorized to speak for high-security.example.com?
The server (operator) can barely be blamed,
for while the certificate is needlessly wide,
to the server it did look precisely like a good request.
]</t>
      </section>
    </section>
    <section anchor="thirdparty">
      <name>Third party proxy services</name>
      <t>A server that is aware of a suitable cross proxy may use the has-proxy relation to advertise that proxy.
If the protocol used towards the proxy provides name indication (as CoAP over TLS or WebSockets does),
or by using a large number of addresses or ports,
it can even advertise a (more efficient) has-unique-proxy relation.
This is particularly interesting when the advertisements are made available across transports,
for example in a Resource Directory.</t>
      <t>How the server can discover and trust such a proxy
is out of scope for this document,
but generally involves the same kind of links.
In particular, a server may obtain a link to a third party proxy from an administrator as part of its configuration.</t>
      <t>The proxy may advertise itself without the origin server's involvement;
in that case, the client needs to take additional care (see <xref target="proxy-foreign-advertisement"/>).</t>
      <figure anchor="fig-external-proxy">
        <name>HTTP based discovery and CoAP-over-WS request to a CoAP resource through a has-unique-proxy relation</name>
        <artwork><![CDATA[
Req: GET http://rd.example.com/rd-lookup?if=tag:example.com,sensor

Res:
Content-Format: application/link-format
Payload:
<coap://device0815.example.com/sensors/>;if="tag:example.com,collection",
<coap+wss://device0815.proxy.rd.example.com>;rel=has-unique-proxy;anchor="coap://device0815.example.com/"


Req: to device0815.proxy.rd.example.com on WebSocket
Host (indicated during upgrade): device0815.proxy.rd.example.com
Code: GET
Uri-Path: /sensors/

Res: 2.05 Content
Content-Format: application/link-format
Payload:
</sensors/temperature>;if="tag:example.com,sensor"
]]></artwork>
      </figure>
      <section anchor="generic-advertisements">
        <name>Generic proxy advertisements</name>
        <t>A third party proxy may advertise its availability to act as a proxy for arbitrary CoAP requests.
This use is not directly related to the protocol indication in other parts of this document,
but sufficiently similar to warrant being described in the same document.</t>
        <t>The resource type "TBDcore.proxy" can be used to describe such a proxy.
The link target attribute "proxy-schemes" can be used to indicate the scheme(s) supported by the proxy, separated by the space character.</t>
        <figure anchor="fig-6lbr-proxy">
          <name>A CoAP client discovers that its border router can also serve as a proxy, and uses that to access a resource on an HTTP server.</name>
          <artwork><![CDATA[
Req: GET coap://[fe80::1]/.well-known/core?rt=TBDcore.proxy

Res:
Content-Format: application/link-format
Payload:
<>;rt=TBDcore.proxy;proxy-schemes="coap coap+tcp coap+ws http"

Req: to [fe80::1] via CoAP
Code: GET
Proxy-Scheme: http
Uri-Host: example.com
Uri-Path: /motd
Accept: text/plain

Res: 2.05 Content
Content-Format: text/plain
Payload:
On Monday, October 25th 2021, there is no special message of the day.
]]></artwork>
        </figure>
        <t>The considerations of <xref target="proxy-foreign-advertisement"/> apply here.</t>
        <t>A generic advertised proxy is always a forward proxy,
and can not be advertised as a "unique" proxy as it would lack information about where to forward.
(A proxy limited to a single outbound protocol might in theory work as a unique proxy when using a transport in which the full default Uri-Host value is configured at setup time,
but these are considered impractical and thus not assigned a resource type here.)</t>
        <t>The use of a generic proxy can be limited to a set of devices that have permission to use it.
Clients can be allowed by their network address if they can be verified,
or by using explicit client authentication using the methods of <xref target="I-D.tiloca-core-oscore-capable-proxies"/>.</t>
      </section>
    </section>
    <section anchor="actualproxies">
      <name>Client picked proxies</name>
      <t>This section is purely informative,
and serves to illustrate that the mechanisms introduced in this document do not hinder the continued use of existing proxies.</t>
      <t>When a resource is accessed through an "actual" proxy (i.e., a host between the client and the server, which itself may have a same-host proxy in addition to that),
the proxy's choice of the upstream server is originally (i.e., without the mechanisms of this document)
either configured (as in a "chain" of proxies)
or determined by the request URI (where a proxy picks CoAP over TCP and resolves the given name for a request aimed at a coap+tcp URI).</t>
      <t>A proxy that has learned,
by active solicitation of the information or by consulting links in its cache,
that the requested URI is available through a (possibly same-host) proxy,
may use that information
in choosing the upstream transport,
to correct the URI associated with a cached response,
and to use responses obtained through one transport to satisfy requests on another.</t>
      <t>For example, if a host at coap://h1.example.com has advertised <tt>&lt;/res&gt;,&lt;coap+tcp://h1.example.com&gt;;rel=has-proxy;anchor="/"</tt>,
then a proxy that has an active CoAP-over-TCP connection to h1.example.com
can forward an incoming request for coap://h1.example.com/res through that CoAP-over-TCP connection
with a suitable Proxy-Scheme on that connection.</t>
      <t>If the host had marked the proxy point as <tt>&lt;coap+tcp://h1.example.com&gt;;rel=has-unique-proxy</tt> instead,
then the proxy could elide the Proxy-Scheme and Uri-Host options,
and would (from the original CoAP caching rules) also be allowed
to use any fresh cache representation of coap+tcp://h1.example.com/res
to satisfy requests for coap://h1.example.com/res.</t>
      <t>A client that uses a forward proxy
and learns of a different proxy advertised to access a particular resource
will not change its behavior if its original proxy is part of its configuration.
If the forward proxy was only used out of necessity
(e.g., to access a resource on the protocol not supported by the client)
it can be practical for the client to use the advertised proxy instead.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security considerations</name>
      <section anchor="security-context-propagation">
        <name>Security context propagation</name>
        <t>Clients need to strictly enforce the rules of <xref target="secctx-propagation"/>.
Failure to do so,
in particular using a thusly announced proxy based on a certificate that attests the proxy's name,
would allow attackers to circumvent the client's security expectation.</t>
        <t>When security is terminated at proxies (as is in DTLS and TLS),
a third party proxy can usually not satisfy this requirement;
these transports are limited to same-host proxies.</t>
      </section>
      <section anchor="proxy-foreign-advertisement">
        <name>Traffic misdirection</name>
        <t>Accepting arbitrary proxies,
even with security context propagation performed properly,
would allow attackers to redirect traffic through systems under their control.
Not only does that impact availability,
it also allows an attacker to observe traffic patterns.</t>
        <t>This affects both OSCORE and (D)TLS,
as neither protect the participants' network addresses.</t>
        <t>Other than the security context propagation rules,
there are no hard and general rules about when an advertised proxy is a suitable candidate.
Aspects for consideration are:</t>
        <ul spacing="normal">
          <li>
            <t>When no direct connection is possible
(e.g. because the resource to be accessed is served as coap+tcp and TCP is not implemented in the client,
or because the resource's host is available on IPv6 while the client has no default IPv6 route),
using a proxy is necessary if complete service disruption is to be avoided.  </t>
            <t>
While an adversary can cause such a situation (e.g. by manipulating routing or DNS entries),
such an adversary is usually already in a position to observe traffic patterns.</t>
          </li>
          <li>
            <t>A proxy advertised by the device hosting the resource to be accessed is less risky to use than one advertised by a third party.  </t>
            <t>
Note that in some applications, servers produce representations based on unverified user input.
In such cases, and more so when multiple applications share a security context, the advertisements' provenance may need to be considered.</t>
          </li>
        </ul>
        <!-- Note that these aspects' applicability is mutually exclusive:
When the advertisement was obtained from the target host,
that needs to be reachable. -->

</section>
      <section anchor="protecting-the-proxy">
        <name>Protecting the proxy</name>
        <t>A widely published statement about a host's availability as a proxy can cause many clients to attempt to use it.</t>
        <t>This is mitigated in well-behaved clients by observing the rate limits of <xref target="RFC7252"/>,
and by ceasing attempts to reach a proxy for the Max-Age of received errors.</t>
        <t>Operators can further limit ill-effects
by ensuring that their client systems do not needlessly use proxies advertised in an unsecured way,
and by providing own proxies when their clients need them<!-- in a sense, avoid having starving clients that grab any straw at connectivity -->.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA considerations</name>
      <section anchor="link-relation-types">
        <name>Link Relation Types</name>
        <t>IANA is asked to add two entries into the Link Relation Type Registry last updated in <xref target="RFC8288"/>:</t>
        <table anchor="tab-iana">
          <name>New Link Relation types</name>
          <thead>
            <tr>
              <th align="left">Relation Name</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">has-proxy</td>
              <td align="left">The link target can be used as a proxy to reach the link context.</td>
              <td align="left">RFCthis</td>
            </tr>
            <tr>
              <td align="left">has-unique-proxy</td>
              <td align="left">Like has-proxy, and using this proxy implies scheme and host of the target.</td>
              <td align="left">RFCthis</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="resource-types">
        <name>Resource Types</name>
        <t>IANA is asked to add an entry into the "Resource Type (rt=) Link Target Attribute Values" registry under the Constrained RESTful Environments (CoRE) Parameters:</t>
        <t>[ The RFC Editor is asked to replace any occurrence of TBDcore.proxy with the actually registered attribute value. ]</t>
        <t>Attribute Value: core.proxy</t>
        <t>Description: Forward proxying services</t>
        <t>Reference: [ this document ]</t>
        <t>Notes: The schemes for which the proxy is usable may be indicated using the proxy-schemes target attribute as per <xref target="generic-advertisements"/> of [ this document ].</t>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby">
              <organization/>
            </author>
            <author fullname="K. Hartke" initials="K." surname="Hartke">
              <organization/>
            </author>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks.  The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s.  The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types.  CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC8288">
          <front>
            <title>Web Linking</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham">
              <organization/>
            </author>
            <date month="October" year="2017"/>
            <abstract>
              <t>This specification defines a model for the relationships between resources on the Web ("links") and the type of those relationships ("link relation types").</t>
              <t>It also defines the serialisation of such links in HTTP headers with the Link header field.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8288"/>
          <seriesInfo name="DOI" value="10.17487/RFC8288"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="aliases" target="https://www.w3.org/TR/webarch/#uri-aliases">
          <front>
            <title>Architecture of the World Wide Web, Section 2.3.1 URI aliases</title>
            <author>
              <organization>W3C</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="cooluris" target="https://www.w3.org/Provider/Style/URI">
          <front>
            <title>Cool URIs don't change</title>
            <author initials="T." surname="BL" fullname="Tim BL">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="lwm2m" target="https://omaspecworks.org/white-paper-lightweight-m2m-1-1/">
          <front>
            <title>White Paper – Lightweight M2M 1.1</title>
            <author>
              <organization>OMA SpecWorks</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC8323">
          <front>
            <title>CoAP (Constrained Application Protocol) over TCP, TLS, and WebSockets</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <author fullname="S. Lemay" initials="S." surname="Lemay">
              <organization/>
            </author>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
              <organization/>
            </author>
            <author fullname="K. Hartke" initials="K." surname="Hartke">
              <organization/>
            </author>
            <author fullname="B. Silverajan" initials="B." surname="Silverajan">
              <organization/>
            </author>
            <author fullname="B. Raymor" initials="B." role="editor" surname="Raymor">
              <organization/>
            </author>
            <date month="February" year="2018"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP), although inspired by HTTP, was designed to use UDP instead of TCP.  The message layer of CoAP over UDP includes support for reliable delivery, simple congestion control, and flow control.</t>
              <t>Some environments benefit from the availability of CoAP carried over reliable transports such as TCP or Transport Layer Security (TLS). This document outlines the changes required to use CoAP over TCP, TLS, and WebSockets transports.  It also formally updates RFC 7641 for use with these transports and RFC 7959 to enable the use of larger messages over a reliable transport.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8323"/>
          <seriesInfo name="DOI" value="10.17487/RFC8323"/>
        </reference>
        <reference anchor="I-D.bormann-t2trg-slipmux">
          <front>
            <title>Slipmux: Using an UART interface for diagnostics, configuration, and packet transfer</title>
            <author fullname="Carsten Bormann">
              <organization>Universitaet Bremen TZI</organization>
            </author>
            <author fullname="Tobias Kaupat">
              <organization>Lobaro UG</organization>
            </author>
            <date day="4" month="November" year="2019"/>
            <abstract>
              <t>   Many research and maker platforms for Internet of Things
   experimentation offer a serial interface.  This is often used for
   programming, diagnostic output, as well as a crude command interface
   ("AT interface").  Alternatively, it is often used with SLIP
   (RFC1055) to transfer IP packets only.

   The present report describes how to use a single serial interface for
   diagnostics, configuration commands and state readback, as well as
   packet transfer.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-bormann-t2trg-slipmux-03"/>
        </reference>
        <reference anchor="I-D.amsuess-core-coap-over-gatt">
          <front>
            <title>CoAP over GATT (Bluetooth Low Energy Generic Attributes)</title>
            <author fullname="Christian Amsüss">
	 </author>
            <date day="2" month="November" year="2020"/>
            <abstract>
              <t>   Interaction from computers and cell phones to constrained devices is
   limited by the different network technologies used, and by the
   available APIs.  This document describes a transport for the
   Constrained Application Protocol (CoAP) that uses Bluetooth GATT
   (Generic Attribute Profile) and its use cases.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-amsuess-core-coap-over-gatt-01"/>
        </reference>
        <reference anchor="RFC6690">
          <front>
            <title>Constrained RESTful Environments (CoRE) Link Format</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby">
              <organization/>
            </author>
            <date month="August" year="2012"/>
            <abstract>
              <t>This specification defines Web Linking using a link format for use by constrained web servers to describe hosted resources, their attributes, and other relationships between links.  Based on the HTTP Link Header field defined in RFC 5988, the Constrained RESTful Environments (CoRE) Link Format is carried as a payload and is assigned an Internet media type.  "RESTful" refers to the Representational State Transfer (REST) architecture.  A well-known URI is defined as a default entry point for requesting the links hosted by a server.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6690"/>
          <seriesInfo name="DOI" value="10.17487/RFC6690"/>
        </reference>
        <reference anchor="I-D.ietf-core-href">
          <front>
            <title>Constrained Resource Identifiers</title>
            <author fullname="Carsten Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <author fullname="Henk Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <date day="7" month="March" year="2022"/>
            <abstract>
              <t>   The Constrained Resource Identifier (CRI) is a complement to the
   Uniform Resource Identifier (URI) that serializes the URI components
   in Concise Binary Object Representation (CBOR) instead of a sequence
   of characters.  This simplifies parsing, comparison and reference
   resolution in environments with severe limitations on processing
   power, code size, and memory size.

   The present revision -10 of this draft contains an experimental
   addition that allows representing user information
   (https://alice@chains.example) in the URI authority component.  This
   feature lacks test vectors and implementation experience at the time
   of writing and requires discussion.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-href-10"/>
        </reference>
        <reference anchor="RFC8075">
          <front>
            <title>Guidelines for Mapping Implementations: HTTP to the Constrained Application Protocol (CoAP)</title>
            <author fullname="A. Castellani" initials="A." surname="Castellani">
              <organization/>
            </author>
            <author fullname="S. Loreto" initials="S." surname="Loreto">
              <organization/>
            </author>
            <author fullname="A. Rahman" initials="A." surname="Rahman">
              <organization/>
            </author>
            <author fullname="T. Fossati" initials="T." surname="Fossati">
              <organization/>
            </author>
            <author fullname="E. Dijk" initials="E." surname="Dijk">
              <organization/>
            </author>
            <date month="February" year="2017"/>
            <abstract>
              <t>This document provides reference information for implementing a cross-protocol network proxy that performs translation from the HTTP protocol to the Constrained Application Protocol (CoAP).  This will enable an HTTP client to access resources on a CoAP server through the proxy.  This document describes how an HTTP request is mapped to a CoAP request and how a CoAP response is mapped back to an HTTP response.  This includes guidelines for status code, URI, and media type mappings, as well as additional interworking advice.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8075"/>
          <seriesInfo name="DOI" value="10.17487/RFC8075"/>
        </reference>
        <reference anchor="I-D.ietf-core-resource-directory">
          <front>
            <title>Constrained RESTful Environments (CoRE) Resource Directory</title>
            <author fullname="Christian Amsüss">
	 </author>
            <author fullname="Zach Shelby">
              <organization>ARM</organization>
            </author>
            <author fullname="Michael Koster">
              <organization>SmartThings</organization>
            </author>
            <author fullname="Carsten Bormann">
              <organization>Universitaet Bremen TZI</organization>
            </author>
            <author fullname="Peter van der Stok">
              <organization>consultant</organization>
            </author>
            <date day="7" month="March" year="2021"/>
            <abstract>
              <t>In many Internet of Things (IoT) applications, direct discovery of resources is not practical due to sleeping nodes or networks where multicast traffic is inefficient.  These problems can be solved by employing an entity called a Resource Directory (RD), which contains information about resources held on other servers, allowing lookups to be performed for those resources.  The input to an RD is composed of links, and the output is composed of links constructed from the information stored in the RD.  This document specifies the web interfaces that an RD supports for web servers to discover the RD and to register, maintain, look up, and remove information on resources.  Furthermore, new target attributes useful in conjunction with an RD are defined.
              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-resource-directory-28"/>
        </reference>
        <reference anchor="I-D.ietf-lpwan-coap-static-context-hc">
          <front>
            <title>Static Context Header Compression (SCHC) for the Constrained Application Protocol (CoAP)</title>
            <author fullname="Ana Minaburo">
              <organization>Acklio</organization>
            </author>
            <author fullname="Laurent Toutain">
              <organization>Institut MINES TELECOM; IMT Atlantique</organization>
            </author>
            <author fullname="Ricardo Andreasen">
              <organization>Universidad de Buenos Aires</organization>
            </author>
            <date day="8" month="March" year="2021"/>
            <abstract>
              <t>This document defines how to compress Constrained Application Protocol (CoAP) headers using the Static Context Header Compression and fragmentation (SCHC) framework.  SCHC defines a header compression mechanism adapted for Constrained Devices.  SCHC uses a static description of the header to reduce the header's redundancy and size.  While RFC 8724 describes the SCHC compression and fragmentation framework, and its application for IPv6/UDP headers, this document applies SCHC to CoAP headers.  The CoAP header structure differs from IPv6 and UDP, since CoAP uses a flexible header with a variable number of options, themselves of variable length.  The CoAP message format is asymmetric: the request messages have a header format different from the format in the response messages.  This specification gives guidance on applying SCHC to flexible headers and how to leverage the asymmetry for more efficient compression Rules.
              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lpwan-coap-static-context-hc-19"/>
        </reference>
        <reference anchor="I-D.tiloca-core-oscore-capable-proxies">
          <front>
            <title>OSCORE-capable Proxies</title>
            <author fullname="Marco Tiloca">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Rikard Höglund">
              <organization>RISE AB</organization>
            </author>
            <date day="7" month="March" year="2022"/>
            <abstract>
              <t>   Object Security for Constrained RESTful Environments (OSCORE) can be
   used to protect CoAP messages end-to-end between two endpoints at the
   application layer, also in the presence of intermediaries such as
   proxies.  This document defines how to use OSCORE for protecting CoAP
   messages also between an origin application endpoint and an
   intermediary, or between two intermediaries.  Also, it defines how to
   secure a CoAP message by applying multiple, nested OSCORE
   protections, e.g., both end-to-end between origin application
   endpoints, as well as between an application endpoint and an
   intermediary or between two intermediaries.  Thus, this document
   updates RFC 8613.  The same approach can be seamlessly used with
   Group OSCORE, for protecting CoAP messages when group communication
   with intermediaries is used.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-tiloca-core-oscore-capable-proxies-02"/>
        </reference>
        <reference anchor="RFC7838">
          <front>
            <title>HTTP Alternative Services</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham">
              <organization/>
            </author>
            <author fullname="P. McManus" initials="P." surname="McManus">
              <organization/>
            </author>
            <author fullname="J. Reschke" initials="J." surname="Reschke">
              <organization/>
            </author>
            <date month="April" year="2016"/>
            <abstract>
              <t>This document specifies "Alternative Services" for HTTP, which allow an origin's resources to be authoritatively available at a separate network location, possibly accessed with a different protocol configuration.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7838"/>
          <seriesInfo name="DOI" value="10.17487/RFC7838"/>
        </reference>
        <reference anchor="RFC6763">
          <front>
            <title>DNS-Based Service Discovery</title>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire">
              <organization/>
            </author>
            <author fullname="M. Krochmal" initials="M." surname="Krochmal">
              <organization/>
            </author>
            <date month="February" year="2013"/>
            <abstract>
              <t>This document specifies how DNS resource records are named and structured to facilitate service discovery.  Given a type of service that a client is looking for, and a domain in which the client is looking for that service, this mechanism allows clients to discover a list of named instances of that desired service, using standard DNS queries. This mechanism is referred to as DNS-based Service Discovery, or DNS-SD.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6763"/>
          <seriesInfo name="DOI" value="10.17487/RFC6763"/>
        </reference>
        <reference anchor="I-D.amsuess-t2trg-rdlink">
          <front>
            <title>rdlink: Robust distributed links to constrained devices</title>
            <author fullname="Christian Amsüss">
	 </author>
            <date day="23" month="September" year="2019"/>
            <abstract>
              <t>   Thing to thing communication in Constrained RESTful Environments
   (CoRE) relies on URIs to link to servers.  Next to hierarchical
   configuration and short-lived IP addresses, this document introduces
   a naming scheme for devices based on cryptographic identifiers.  A
   special purpose domain is reserved for expressing those identifiers,
   and mechanisms for constrained devices to announce their names and to
   look them up are described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-amsuess-t2trg-rdlink-01"/>
        </reference>
        <reference anchor="RFC8613">
          <front>
            <title>Object Security for Constrained RESTful Environments (OSCORE)</title>
            <author fullname="G. Selander" initials="G." surname="Selander">
              <organization/>
            </author>
            <author fullname="J. Mattsson" initials="J." surname="Mattsson">
              <organization/>
            </author>
            <author fullname="F. Palombini" initials="F." surname="Palombini">
              <organization/>
            </author>
            <author fullname="L. Seitz" initials="L." surname="Seitz">
              <organization/>
            </author>
            <date month="July" year="2019"/>
            <abstract>
              <t>This document defines Object Security for Constrained RESTful Environments (OSCORE), a method for application-layer protection of the Constrained Application Protocol (CoAP), using CBOR Object Signing and Encryption (COSE).  OSCORE provides end-to-end protection between endpoints communicating using CoAP or CoAP-mappable HTTP. OSCORE is designed for constrained nodes and networks supporting a range of proxy operations, including translation between different transport protocols.</t>
              <t>Although an optional functionality of CoAP, OSCORE alters CoAP options processing and IANA registration.  Therefore, this document updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8613"/>
          <seriesInfo name="DOI" value="10.17487/RFC8613"/>
        </reference>
        <reference anchor="I-D.silverajan-core-coap-protocol-negotiation">
          <front>
            <title>CoAP Protocol Negotiation</title>
            <author fullname="Bilhanan Silverajan">
              <organization>TUT</organization>
            </author>
            <author fullname="Mert Ocak">
              <organization>Ericsson</organization>
            </author>
            <date day="2" month="July" year="2018"/>
            <abstract>
              <t>   CoAP has been standardised as an application-level REST-based
   protocol.  When multiple transport protocols exist for exchanging
   CoAP resource representations, this document introduces a way forward
   for CoAP endpoints as well as intermediaries to agree upon alternate
   transport and protocol configurations as well as URIs for CoAP
   messaging.  Several mechanisms are proposed: Extending the CoRE
   Resource Directory with new parameter types, introducing a new CoAP
   Option with which clients can interact directly with servers without
   needing the Resource Directory, and finally a new CoRE Link Attribute
   allowing exposing alternate locations on a per-resource basis.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-silverajan-core-coap-protocol-negotiation-09"/>
        </reference>
      </references>
    </references>
    <section anchor="change-log">
      <name>Change log</name>
      <t>Since draft-amsuess-core-transport-indication-03:</t>
      <ul spacing="normal">
        <li>No changes (merely changing the name after WG adoption)</li>
      </ul>
      <t>Since -02 (mainly processing reviews from Marco and Klaus):</t>
      <ul spacing="normal">
        <li>Acknowledge that 'coap://hostname/' is not the proxy but a URI that (in a particular phrasing) is used to stand in for the proxy's address (while it regularly identifies a resurce on the server)</li>
        <li>Security: Referencing traffic misdirection already in the first security block.</li>
        <li>Security: Add (incomplete) considerations for unique-proxy case.</li>
        <li>Narrow down "unique" proxy semantics to those properties used by the client, allowing unique proxies to be co-hosted with forward proxies.</li>
        <li>"Client picked proxies" clarified to merely illustrate how this is compatible with them.</li>
        <li>Use of "hosts" relation sharpened.</li>
        <li>Precision on how this does and does not consider changing transports.</li>
        <li>"Related work" section demoted to appendix.</li>
        <li>Add note on DTLS session resumption.</li>
        <li>Variable renaming.</li>
        <li>Various editorial fixes.</li>
      </ul>
      <t>Since -01:</t>
      <ul spacing="normal">
        <li>Removed suggestion for generally trusted proxies;
now stating that with (D)TLS,
"a third party proxy can usually not satisfy [the security context propagation requirement]".</li>
        <li>State more clearly that valid cache entries for resources aliased through has-unique-proxy can be used.</li>
        <li>Added considerations for Multipath TCP.</li>
        <li>Added concrete suggestion and example for advertisement of general proxies.</li>
        <li>Added concrete suggestion for RD lookup extension that provides proxies.</li>
        <li>Minor editorial and example changes.</li>
      </ul>
      <t>Since -00:</t>
      <ul spacing="normal">
        <li>Added introduction</li>
        <li>Added examples</li>
        <li>Added SCHC analogy</li>
        <li>Expanded security considerations</li>
        <li>Added guidance on choice of transport, and canonical addresses</li>
        <li>Added subsection on interaction with a Resource Directory</li>
        <li>Added comparisons with related work, including rdlink and DNS-SD sketches</li>
        <li>Added IANA considerations</li>
        <li>Added section on open questions</li>
      </ul>
    </section>
    <section anchor="related-work-and-applicability-to-related-fields">
      <name>Related work and applicability to related fields</name>
      <section anchor="on-http">
        <name>On HTTP</name>
        <t>The mechanisms introduced here are similar to the Alt-Svc header of <xref target="RFC7838"/>
in that they do not create different application-visible addresses,
but provide dispatch through lower transport implementations.</t>
        <t>Unlike in HTTP, the variations of CoAP protocols each come with their unique URI schemes
and thus enable the "transport address indicated by a URI" concept.
Thus, there is no need for a distinction between protocol-id and scheme.</t>
        <t>To accommodate the message size constraints typical of CoRE environments,
and accounting for the differences between HTTP headers and CoAP options,
information is delivered once at discovery time.</t>
        <t>Using the has-proxy and has-unique-proxy with HTTP URIs as the context is NOT RECOMMENDED;
the HTTP provisions of the Alt-Svc header and ALPN are preferred.</t>
      </section>
      <section anchor="using-dns">
        <name>Using DNS</name>
        <t>As pointed out in <xref target="RFC7838"/>,
DNS can already serve some of the applications of Alt-Svc and has-unique-proxy by providing different CNAME records.
These cover cases of multiple addresses,
but not different ports or protocols.</t>
        <t>While not specified for CoAP yet (and neither being specified here),</t>
        <t>[ which is an open discussion point for CoRE -- should we? Here? In a separate DNS-SD document? ]</t>
        <t>DNS SRV records (possibly in combination with DNS Service Discovery <xref target="RFC6763"/>) can provide records that could be considered equivalent to has-unique-proxy relations.
If <tt>_coap._tcp</tt>, <tt>_coaps._tcp</tt>, <tt>_coap._udp</tt>, <tt>_coap+ws._tcp</tt> etc. were defined with suitable semantics,
these can be equivalent:</t>
        <artwork><![CDATA[
_coap._udp.device.example.com SRV 0 0 device.example.com 61616
device.example.com AAAA 2001:db8::1

<coap://[2001:db8::1]>;rel=has-unique-proxy;anchor="coap://device.example.com"
]]></artwork>
        <t>It would be up to such a specification to give details on what the link's context is;
unlike the link based discovery of this document,
it would either need to pick one distinguished context scheme for which these records are looked up,
or would introduce aliasing on its own.</t>
      </section>
      <section anchor="using-names-outside-regular-dns">
        <name>Using names outside regular DNS</name>
        <t>Names that are resolved through different mechanisms than DNS,
or names which are defined within the scope of DNS but have no universally valid answers to A/AAAA requests,
can be advertised using the relation types defined here and CoAP discovery.</t>
        <t>In <xref target="fig-rdlink"/>, a server using a cryptographic name as described in <xref target="I-D.amsuess-t2trg-rdlink"/> is discovered and used.</t>
        <figure anchor="fig-rdlink">
          <name>Obtaining a sensor value from a local device with a global name</name>
          <artwork><![CDATA[
Req: to [ff02::fd]:5683 on UDP
Code: GET
Uri-Path: /.well-known/core
Uri-Query: rel=has-proxy
Uri-Query: anchor=coap://nbswy3dpo5xxe3denbswy3dpo5xxe3de.ab.rdlink.arpa

Res: from [2001:db8::1]:5683
Content-Format: application/link-format
Payload:
<coap+tcp://[2001:db8::1]>;rel=has-unique-proxy;
  anchor="coap://nbswy3dpo5xxe3denbswy3dpo5xxe3de.ab.rdlink.arpa"


Req: to [2001:db8::1]:5683 on TCP
Code: GET
OSCORE: ...
Uri-Path: /sensors/temp
Observe: 0

Res: 2.05 Content
OSCORE: ...
Observe: 0
Payload:
39.1°C
]]></artwork>
        </figure>
      </section>
      <section anchor="multipath-tcp">
        <name>Multipath TCP</name>
        <t>When CoAP-over-TCP is used over Multipath TCP
and no Uri-Host option is sent,
the implicit assumption is that there is aliasing between URIs containing any of the endpoints' addresses.</t>
        <t>As these are negotiated within MPTCP,
this works independently of this document's mechanisms.
As long as all the server's addresses are equally reachable,
there is no need to advertise multiple addresses that can later be discovered through MPTCP anyway.
When advertisements are long-lived and there is no single more stable address,
several available addresses can be advertised (independently of whether MPTCP is involved or not).
If a client uses an address that is merely a proxy address (and not a unique proxy address),
but during MPTCP finds out that the network location being accessed is actually an MPTCP alternative address of the used one,
the client MAY forego sending of the Proxy-Scheme and Uri-Path option.</t>
        <t>[ This follows from multiple addresses being valid for that TCP connection;
at some point we may want to say something about what that means for the default value of the Uri-Host option --
maybe something like "has the default value of any of the associated addresses, but the server may only enable MPTCP if there is implicit aliasing between all of them" (similar to OSCORE's statement)?  ]</t>
        <t>[ TBD: Do we need a section analog to this that deals with (D)TLS session resumption in absence of SNI? ]</t>
      </section>
    </section>
    <section anchor="open-questions-further-ideas">
      <name>Open Questions / further ideas</name>
      <ul spacing="normal">
        <li>
          <t>OSCORE interaction: <xref target="RFC8613"/> Section 4.1.3.2 requirements place OSCORE use in a weird category between has-proxy and has-unique-proxy
(because if routing still works, the result will be correct).
Not sure how to write this down properly,
or whether it's actionable at all.  </t>
          <t>
Possibly there is an inbetween category of
"The host needs the Uri-Host etc. when accessed through CoAP,
but because the host does not use the same OSCORE KID across different virtual hosts,
it's has-unique-proxy as soon as you talk OSCORE".</t>
        </li>
        <li>
          <t>Self-uniqueness:  </t>
          <t>
A host that wants to indicate that it doesn't care about Uri-Host
can probably publish something like <tt>&lt;/&gt;;rel=has-unique-proxy</tt> to do so.  </t>
          <t>
This'd help applications justify when they can elide the Uri-Host,
even when no different protocols are involved.</t>
        </li>
        <li>
          <t>Advertising under a stable name:  </t>
          <t>
If a host wants to advertise its host name rather than its IP address during multicast, how does it best do that?  </t>
          <t>
Options, when answering from 2001:db8::1 to a request to ff02::fd are:  </t>
          <artwork><![CDATA[
<coap://myhostname/foo>,...,
<coap://[2001:db8::1]>;rel=has-unique-proxy;anchor="coap://myhostname"
]]></artwork>
          <t>
which is verbose but formally clear, and  </t>
          <artwork><![CDATA[
</foo>,...,
<coap://[2001:db8::1]>;rel=has-unique-proxy;anchor="coap://myhostname"
]]></artwork>
          <t>
which is compatible with unaware clients,
but its correctness with respect to canonical URIs needs to be argued by the client, in this sequence  </t>
          <ul spacing="normal">
            <li>understanding the has-unique-proxy line,</li>
            <li>understanding that the request that went to 2001:db8::1 was really a Proxy-Scheme/Uri-Host-elided version of a request to coap://myhostname, and then</li>
            <li>processing any relative reference with this new base in mind.</li>
          </ul>
          <t>
(Not that it'd need to happen in software in that sequence,
but that's the sequence needed to understand how the <tt>/foo</tt> here is really <tt>coap://myhostname/foo</tt>).  </t>
          <t>
If CoRAL is used during discovery, a base directive or reverse relation to has-unique-proxy would make this easier.</t>
        </li>
      </ul>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>This document heavily builds on concepts
explored by Bill Silverajan and Mert Ocak in <xref target="I-D.silverajan-core-coap-protocol-negotiation"/>,
and together with Ines Robles and Klaus Hartke inside T2TRG.</t>
      <t>[ TBD: reviewers
Marco
Klaus
]</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
