<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version  (Ruby 3.0.4) -->
<?rfc strict="yes"?>
<?rfc compact="yes"?>
<?rfc comments="yes"?>
<?rfc subcompact="no"?>
<?rfc iprnotified="no"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-core-transport-indication-01" category="std" consensus="true" tocDepth="3" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.12.4 -->
  <front>
    <title>CoAP Protocol Indication</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-core-transport-indication-01"/>
    <author initials="C." surname="Amsüss" fullname="Christian Amsüss">
      <organization/>
      <address>
        <postal>
          <country>Austria</country>
        </postal>
        <email>christian@amsuess.com</email>
      </address>
    </author>
    <date year="2022" month="July" day="12"/>
    <area>Internet</area>
    <workgroup>CoRE</workgroup>
    <keyword>CoRE, Web Linking, Proxy, URI, aliasing</keyword>
    <abstract>
      <t>The Constrained Application Protocol (CoAP, <xref target="RFC7252"/>) is available over different transports
(UDP, DTLS, TCP, TLS, WebSockets),
but lacks a way to unify these addresses.
This document provides terminology and provisions based on Web Linking <xref target="RFC8288"/>
to express alternative transports available to a device,
and to optimize exchanges using these.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Constrained RESTful Environments Working Group mailing list (core@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/core/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/core-wg/transport-indication"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>The Constrained Application Protocol (CoAP) provides transports mechanisms
(UDP and DTLS since <xref target="RFC7252"/>, TCP, TLS and WebSockets since <xref target="RFC8323"/>),
with some additional being used in LwM2M <xref target="lwm2m"/>
and even more being explored (<xref target="I-D.bormann-t2trg-slipmux"/>, <xref target="I-D.amsuess-core-coap-over-gatt"/>).
These are mutually incompatible on the wire,
but CoAP implementations commonly support several of them,
and proxies can translate between them.</t>
      <t>CoAP currently lacks a way to indicate which transports are available for a given resource,
and to indicate that a device is prepared to serve as a proxy;
this document solves both by introducing the "has-proxy" terminology to Web Linking <xref target="RFC8288"/> that expresses the former through the latter.
The additional "has-unique-proxy" term is introduced
to negate any per-request overhead that would otherwise be introduced in the course of this.</t>
      <t>CoAP also lacks a unified scheme to label a resource in a transport-independent way.
This document does <em>not</em> attempt to introduce any new scheme here,
or raise a scheme to be the canonical one.
Instead, each host or application can pick a canonical address for its resources,
and advertise other transports in addition.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>Readers are expected to be familiar with the terms and concepts
described in CoAP <xref target="RFC7252"/>
and link format (<xref target="RFC6690"/>
(or, equivalently, web links as described in <xref target="RFC8288"/>).</t>
        <dl>
          <dt>Same-host proxy:</dt>
          <dd>
            <t>A CoAP server that accepts forward proxy requests (i.e., requests carrying the Proxy-Scheme option)
exclusively for URIs that it is also the authoritative server for is defined as a "same-host proxy".</t>
          </dd>
          <dt/>
          <dd>
            <t>The distinction between a same-host and any other proxy is only relevant on a practical, server-implementation and illustrative level;
this specification does not use the distinction in normative requirements,
and clients need not make the distinction at all.</t>
          </dd>
          <dt>hosts:</dt>
          <dd>
            <t>The verb "to host" is used here in the sense of the link relation of the same name defined in <xref target="RFC6690"/>.</t>
            <t>For resources discovered via CoAP's discovery interface,
a hosting statement is typically provided by the defaults implied by <xref target="RFC6690"/>
where a link like <tt>&lt;/sensor/temp&gt;</tt> is implied to have the relation "hosts" and the anchor <tt>/</tt>,
such that a statement "coap://hostname hosts coap://hostname/sensor/temp" is implied in the link.</t>
            <t>The link relation has been occasionally used with different interpretations,
which ascribe more meaning to the term than it has in its definition.
In particular,</t>
            <ul spacing="normal">
              <li>the "hosts" relation can not be inferred merely by two URIs having
the same scheme, host and port (and vice versa), and</li>
              <li>the "hosts" relation on its own does not make any statement
about the physical devices that hold the resource's representation.</li>
            </ul>
            <t>[ TBD: The former could probably still be used without too many ill effects;
but things might also get weird when a dynamic resource created
with one transport from use with another transport unless explicitly cleared.</t>
            <t>Whether or not "to host" is used exclusively along the "hosts" relation or using the more generic same-start-of-URI sense
is the largest open issue in this document.
]</t>
            <t>For the purpose of this document, "hosting" is used in a transitive way:
If A hosts B and B hosts C, it is implied that A hosts C.</t>
            <t>[ TBD: It may make sense for many other relations to imply "hosts",
e.g. any relations that occur in a pub-sub context,
but that'd need further consideration. ]</t>
          </dd>
        </dl>
        <t>When talking of proxy requests,
this document only talks of the Proxy-Scheme option.
Given that all URIs this is usable with can be expressed in decomposed CoAP URIs,
the need for using the Proxy-URI option should never arise.
The Proxy-URI option is still equivalent to the decomposed options,
and can be used if the server supports it.</t>
        <section anchor="using-uris-to-identify-protocol-endpoints">
          <name>Using URIs to identify protocol endpoints</name>
          <t>The URI <tt>coap://device.example.com</tt> identifies a particular resource, possibly a "welcome" text.
It is, colloquially, also used to identify the combination
of a host (identified through a name), the default port, and the CoAP method of sending requests to the host.</t>
          <t>For precision, this document uses the term
"the transport address indicated by (a URI)" to refer to the host / port / protocol combination,
but otherwise no big deal is made of it.</t>
          <t>For the CoAP schemes (coap, coaps, coap+tcp, coaps+tcp, coap+ws, coaps+ws),
URIs indicating a transport are always given with an empty path
(which under their URI normalization rules is equivalent to a path containing a single slash).
For the coap and coap+tcp schemes, URIs with different host names
can indicate the same transport as long as the names resolve to the same addresses.
For the other protocols, the given host name informs the name set in TLS's Server Name Indication (SNI)
and/or the host sent in the "Host" header of the underlying HTTP request.</t>
          <t>If an update to this document extends the list,
for new schemes it might be allowed to have paths, queries or fragment identifiers present in the URI indicating the transport address.
No guidance can be given here for these,
as no realistic example is known.
(Note that while the coap+ws scheme does use the well-known path <tt>/.well-known/coap</tt> internally,
that is used purely on the HTTP side, and not part of the CoAP URI, not even for indicating the transport address).</t>
          <t>A similar concept is used in <xref target="I-D.ietf-core-observe-multicast-notifications"/> (expressed as pieces of its <tt>tp_info</tt> parameter),
but not expressed with URIs yet.
As that document migrates towards using CRIs (<xref target="I-D.ietf-core-href"/>),
it is expected that its transport addresses coincide with the URIs (CRIs, equivalently) indicating a transport.</t>
          <t>URIs indicating a transport are especially useful when talking about proxies;
this use is aligned with the way they are exprssed in the conventional environment variables <tt>http_proxy</tt> etc.
[ cite https://about.gitlab.com/blog/2021/01/27/we-need-to-talk-no-proxy/ ].
Furthermore, URIs processing is widespread in CoAP systems,
and when that changes (e.g. through the introduction of <xref target="I-D.ietf-core-href"/>),
URIs indicating a transport will still be efficient to encode.
And last but not least, it lines up well with the colloquial identity mentioned above.
(An alternative would be using a dedicated naming scheme, say, <tt>transport:coap:device.example.com:port</tt>,
but that would needlessly introduce implementation complexity).</t>
          <t>Note that this mechanism can only used with proxies that use CoAP's native address indication mechanisms.
Proxies that perform URI mapping
(as described in Section 5 of <xref target="RFC8075"/>, especially using URI templates)
are not supported in this document.</t>
          <t>[ TBD: Do we want to extend this to HTTP proxies? Probably just not, and if so, only to those that can just take coap://... for a URI. ]</t>
        </section>
      </section>
      <section anchor="goals">
        <name>Goals</name>
        <t>This document introduces provisions for the seamless use of different transport mechanisms for CoAP.
Combined, these provide:</t>
        <ul spacing="normal">
          <li>Enablement: Inform clients of the availability of other transports of servers.</li>
          <li>No Aliasing: Any URI aliasing must be opt-in by the server. Any defined mechanisms must allow applications to keep working on the canonical URIs given by the server.</li>
          <li>Optimization: Do not incur per-request overhead from switching protocols. This may depend on the server's willingness to create aliased URIs.</li>
          <li>Proxy usability: All information provided must be usable by aware proxies to reduce the need for duplicate cache entries.</li>
          <li>Proxy announcement: Allow third parties to announce that they provide alternative transports to a host.</li>
        </ul>
        <t>For all these functions, security policies must be described that allow the client to use them as securely as the original transport.</t>
        <t>This document will not concern itself with changes in transport availability over time,
neither in causing them ("Please take up your TCP interface, I'm going to send a firmware update")
nor in advertising their availability in advance.
Hosts whose transport's availability changes over time can utilize
any suitable mechanism to keep client updated,
such as placing a suitable Max-Age value on their resources
or having them observable.</t>
      </section>
    </section>
    <section anchor="indicating-alternative-transports">
      <name>Indicating alternative transports</name>
      <t>While CoAP can set the authority component of the requested URI in all requests (by means of Uri-Host and Uri-Port),
setting the scheme of a requested URI (by means of Proxy-Scheme) makes the request implicitly a proxy request.
However, this needs to be of only little practical concern:
Any device can serve as a proxy for itself (a "same-host proxy")
by accepting requests that carry the Proxy-Scheme option.
If it is to be a well-behaved proxy,
the device should then check whether it recognizes the name set in Uri-Host as one of its own
(as it should if no Proxy-Scheme option accompanied it). <!-- without 7252 explicitly mandating that -->
If the name is not recognized,
it should reject the request with 5.05 (Proxying Not Supported)
-- unless, of course, it implements forward proxy functionality exceeding the same-host proxy.
If the name is recognized,
it should process the request as it would process a request coming in on the given protocol
(which, for many hosts, is the same as if the option were absent completely).</t>
      <t>A server can advertise a recommended proxy
by serving a Web Link with the "has-proxy" relation to a URI indicating its transport address.
In particular (and that is a typical case),
it can indicate its own transport address on an alternative transport when implementing same-host proxy functionality.</t>
      <t>The semantics of a link from S to P with relations has-proxy ("S has-proxy P", <tt>&lt;P&gt;;rel=has-proxy;anchor="S"</tt>)
are that for any resource R hosted on S ("S hosts R"), the proxy with the transport address indicated by P can be used to obtain R.</t>
      <section anchor="example">
        <name>Example</name>
        <t>A constrained device at the address 2001:db8::1 that supports CoAP over TCP in addition to CoAP can self-describe like this:</t>
        <figure anchor="fig-has-proxy">
          <name>Discovery and follow-up request through a has-proxy relation</name>
          <artwork><![CDATA[
Req: to [ff02::fd]:5683 on UDP
Code: GET
Uri-Path: /.well-known/core
Uri-Query: if=tag:example.com,sensor

Res: from [2001:db8::1]:5683
Content-Format: application/link-format
Payload:
</sensors/temp>;if="tag:example.com,sensor",
<coap+tcp://[2001:db8::1]>;rel=has-proxy;anchor="/"


Req: to [2001:db8::1]:5683 on TCP
Code: GET
Proxy-Scheme: coap
Uri-Path: /sensors/temp
Observe: 0

Res: 2.05 Content
Observe: 0
Payload:
39.1°C
]]></artwork>
        </figure>
        <t>Note that generating this discovery file needs to be dynamic based on its available addresses;
only if queried using a link-local source address, the server may also respond with a link-local address in the authority component of the proxy URI.</t>
        <t>Unless the device makes resources discoverable at <tt>coap+tcp://[2001:db8::1]/.well-known/core</tt> or another discovery mechanism,
clients may not assume that <tt>coap+tcp://[2001:db8::1]/sensors/temp</tt> is a valid resource (let alone is equivalent to the other resource on the same path).
The server advertising itself like this may reject any request on CoAP-over-TCP unless it contains a Proxy-Scheme option.</t>
        <t>Clients that want to access the device using CoAP-over-TCP would send a request
by connecting to 2001:db8::1 TCP port 5683
and sending a GET with the options Proxy-Scheme: coap, no Uri-Host or -Port options (utilizing their default values),
and the Uri-Paths "sensors" and "temp".</t>
      </section>
      <section anchor="secctx-propagation">
        <name>Security context propagation</name>
        <t>If the originally requested URI R or the application requirements demand a security mechanism is used,
the client MUST only use the proxy P if the proxy can provide suitable credentials.
(The hosting URI S is immaterial to these considerations).</t>
        <t>For example, if the application uses the host name and a public key infrastructure and R is <tt>coap://example.com/</tt>
the proxy accessed as <tt>coap+tcp://[2001:db8::1]</tt> still needs to provide a certificate chain for the name example.com to one of the system's trust anchors.
If, on the other hand, the application is doing a firmware update and requires any certificate from its configured firmware update issuer,
the proxy needs to provide such a firmware update certificate.</t>
        <t>Some applications have requirements
exceeding the requirements of a secure connection,
e.g., (explicitly or implicitly) requiring that
name resolution happen through a secure process
and packets are only routed into networks where it trusts that they will not be intercepted on the path to the server.
Such applications need to extend their requirements to the source of the <tt>has-proxy</tt> statement;
a sufficient (but maybe needlessly strict) requirement is to only follow <tt>has-proxy</tt> statements
that are part of the same resource that advertises the link currently being followed.
Section <xref target="proxy-foreign-advertisement"/> adds further considerations.</t>
      </section>
      <section anchor="choice-of-transports">
        <name>Choice of transports</name>
        <t>It is up to the client whether to use an advertised proxy transport,
or (if multiple are provided) which to pick.</t>
        <t>Links to proxies may be annotated with additional metadata that may help guide such a choice;
defining such metadata is out of scope for this document.</t>
        <t>Clients MAY switch between advertised transports as long as the document describing them is fresh;
they may even do so per request.
(For example, they may perform individual requests using CoAP-over-UDP,
but choose CoAP-over-TCP for requests with large expected responses).
When the describing document approaches expiry,
the client can use the representation's ETag to efficiently renew its justification for using the alternative transport.</t>
      </section>
      <section anchor="selection-of-a-canonical-origin">
        <name>Selection of a canonical origin</name>
        <t>While a server is at liberty to provide the same resource independently on different transports (i.e. to create aliases),
it may make sense for it to pick a single scheme and authority under which it announces its resources.
Using only one address helps proxies keep their caches efficient,
and makes it easier for clients to avoid exploring the same server twice from different angles.</t>
        <t>When there is a predominant scheme and authority through which an existing service is discovered,
it makes sense to use these for the canonical addresses.</t>
        <t>Otherwise,
it is suggested to use the <tt>coap</tt> or <tt>coaps</tt> scheme
(given that these are the most basic and widespread ones),
and the most stable usable name the host has.</t>
        <section anchor="unreachable-canonical-origin-addresses">
          <name>Unreachable canonical origin addresses</name>
          <t>For devicesc that are not generally reachable at a stable address,
it may make sense to use a scheme and authority as the canonical address that can not actually be dereferenced.</t>
          <t>The registered names available for that purpose depend on the locally defined host or service name registry.
When the Domain Name System (DNS) is used,
such names would not be associated with any A or AAAA records
(but may still use, for example, TLSA records).</t>
          <t>Such URIs are <em>only</em> usable to clients that discover a suitable proxy along with the URI,
and which can place sufficient trust in that proxy.</t>
        </section>
      </section>
      <section anchor="advertisement-through-a-resource-directory">
        <name>Advertisement through a Resource Directory</name>
        <t>In the Resource Directory specification <xref target="rfc9176"/>,
protocol negotiation was anticipated to use multiple base values.
This approach was abandoned since then,
as it would incur heavy URI aliasing.</t>
        <t>Instead, devices can submit their has-proxy links to the Resource Directory like all their other metadata.</t>
        <t>A client performing resource lookup can ask the RD to provide available (same-host-)proxies in a follow-up request
by asking for <tt>?anchor=&lt;the-discovered-host&gt;&amp;rel=has-proxy</tt>.
<!-- We don't say that the RD can not do that, right? -->
The RD may also volunteer that information during resource lookups even though the has-proxy link itself does not match the search criteria.</t>
        <t>[ It may be useful to define RD parameters for use with lookup here, which'd guide which available proxies to include.
For example, asking <tt>?if=tag:example.com,sensor&amp;proxy-links=tcp</tt> could give as a result:
<tt>&lt;coap://[2001:db8::1]/s&gt;;rt=tag:example.com,sensor,&lt;coap+tcp://[2001:db8::1]/&gt;;rel=has-proxy;anchor="coap://[2001:db8::1]/"</tt>
]</t>
      </section>
    </section>
    <section anchor="elision-of-proxy-scheme-and-uri-host">
      <name>Elision of Proxy-Scheme and Uri-Host</name>
      <t>A CoAP server may publish and accept multiple URIs for the same resource,
for example when it accepts requests on different IP addresses that do not carry a Uri-Host option,
or when it accepts requests both with and without the Uri-Host option carrying a registered name.
Likewise, the server may serve the same resources on different transports.
This makes for efficient requests (with no Proxy-Scheme or Uri-Host option),
but in general is discouraged <xref target="aliases"/>.</t>
      <t>To make efficient requests possible without creating URI aliases that propagate,
the "has-unique-proxy" specialization of the has-proxy relation is defined.</t>
      <t>If a proxy is unique,
it means that requests arriving at the proxy are treated the same
no matter whether the scheme, authority and port of the link context are set in the Proxy-Scheme, Uri-Host and Uri-Port options, respectively,
or whether all of them are absent.</t>
      <t>[ The following two paragraphs are both true but follow different approaches to explaining the observable and implementable behavior;
   it may later be decided to focus on one or the other in this document. ]</t>
      <t>While this creates URI aliasing in the requests as they are sent over the network,
applications that discover a proxy this way should not "think" in terms of these URIs,
but retain the originally discovered URIs (which, because Cool URIs Don't Change<xref target="cooluris"/>, should be long-term usable).
They use the proxy for as long as they have fresh knowledge of the has-(unique-)proxy statement.</t>
      <t>In a way, advertising <tt>has-unique-proxy</tt> can be viewed as a description of the link target in terms of SCHC <xref target="I-D.ietf-lpwan-coap-static-context-hc"/>:
In requests to that target, the link source's scheme and host are implicitly present.</t>
      <t>While applications retain knowledge of the originally requested URI
(even if it is not expressed in full on the wire),
the original URI is not accessible to caches both within the host and on the network
(for the latter, see <xref target="actualproxies"/>).
Thus, cached responses to the canonical and any aliased URI are mutually interchangeable
as long as both the response and the proxy statement are fresh.</t>
      <t>A client MAY use a unique-proxy like a proxy and still send the Proxy-Scheme and Uri-Host option;
such a client needs to recognize both relation types, as relations of the has-unique-proxy type
are a specialization of has-proxy and typically don't carry the latter (redundant) annotation.
[ To be evaluated -- on one hand, supporting it this way means that the server needs to identify all of its addresses and reject others.
   Then again, is a server that (like many now do) fully ignore any set Uri-Host correct at all? ]</t>
      <t>Example:</t>
      <figure anchor="fig-has-unique-proxy">
        <name>Follow-up request through a has-unique-proxy relation. Compared to the last example, 5 bytes of scheme indication are saved during the follow-up request.</name>
        <artwork><![CDATA[
Req: to [ff02::fd]:5683 on UDP
Code: GET
Uri-Path: /.well-known/core
Uri-Query: if=tag:example.com,sensor

Res: from [2001:db8::1]:5683
Content-Format: application/link-format
Payload:
</sensors/>;if="tag:example.com,collection",
<coaps+ws://[2001:db8::1]>;rel=has-unique-proxy;anchor="/"


Req: to [2001:db8::1] via WebSockets over HTTPS
Code: GET
Uri-Path: /sensors/

Res: 2.05 Content
Content-Format: application/link-format
Payload:
</sensors/temperature>;if="tag:example.com,sensor"
]]></artwork>
      </figure>
      <t>It is noteworthy that when the URI reference <tt>/sensors/temperature</tt> is resolved,
the base URI is <tt>coap://device0815.example.com</tt> and not its coaps+ws counterpart --
as the request is still for that URI, which both the client and the server are aware of.
However, this detail is of little practical importance:
A simplistic client that uses <tt>coaps+ws://device0815.proxy.rd.example.com</tt> as a base URI will still arrive at an identical follow-up request with no ill effect,
as long as it only uses the wrongly assembled URI for dereferencing resources,
the security context is the same,
the state is kept no longer than the has-unique-proxy statement is fresh,
and it does not (for example) pass the URI on to other devices.</t>
      <section anchor="impact-on-caches">
        <name>Impact on caches</name>
        <t>[ This section is written with the "there is implied URI aliasing" mindset;
it should be possible to write it with the "compression" mindset as well
(but there is no point in having both around in the document at this time).</t>
        <t>It is also slightly duplicating, but also more detailed than,
the brief note on the topic in <xref target="actualproxies"/>
]</t>
        <t>When a node that performs caching learns of a <tt>has-unique-proxy</tt> statement,
it can utilize the information about the implied URI aliasing:
Requests to resources hosted by S can be answered with cached entries from P
(because by the rules of <tt>has-unique-proxy</tt> a request can be crafted that is sent to P for which a fresh response is available).
The inverse direction (serving resources whose URI "starts with" P from a cached request that was sent to S) is harder to serve because it additionaly requires a fresh statement
that "S hosts R" for the matching resource R.</t>
      </section>
      <section anchor="unique-security">
        <name>Using unique proxies securely</name>
        <t>[
This section is work in progress, it is more a flow of considerations turning back on each other.
This is all made a bit trickier by not applying to OSCORE which is usually the author's go-to example,
because OSCORE's requirements already preclude all these troubles.
]</t>
        <t>The use of unique proxies requires slightly more care in terms of security.</t>
        <t>No requirements are necessary on the client side; those of {#secctx-propagation} suffice.
(In particular, it is not necessary for the statement to originate from the original server
unless that were already a requirement without the uniqueness property).</t>
        <t>The extra care is necessary on the side of servers that are commissioned with wide ranging authorization [ or is it? ]:
These may now be tricked into serving a resource of which the client assumes a different name.
For example,
if the desired resource is <tt>coaps://high-security.example.org/configuration</tt>,
and there exists a "home page" style service for employees with patterns of
<tt>coaps+tcp://user-${username}.example.org/</tt> at which they can store files,
and the server operating that service is commissioned with a wild-card certificate "*.example.org",
then a device that receives the (malicious) information
<tt>&lt;coaps+tcp://user-mave.example.org&gt;;rel=has-unique-proxy;anchor="coaps://high-security.example.org"</tt>
might use this statement to contact the transport address indicated by <tt>coaps+tcp://user-mave.example.org</tt> and ask for <tt>/config</tt>
(which, to the server, is indistinguishable from <tt>coaps+tcp://user-mave.example.org/config</tt>)
and obtain a malicious configuration.</t>
        <t>In a non-unique proxy situation,
the error would have been caught by the server,
which would have seen the request for <tt>coaps://high-security.example.com</tt>
and refused to serve a request containing critical options it can not adaequately process.</t>
        <t>In the unique proxy situation, ...
[ TBD:
now whose fault is it?
Can only be the client's ...
because it looked at the wildcard certificate rather than whether the host-name it was narrowing it down to is authorized to speak for high-security.example.com?
The server (operator) can barely be blamed,
for while the certificate is needlessly wide,
to the server it did look precisely like a good request.
]</t>
      </section>
    </section>
    <section anchor="thirdparty">
      <name>Third party proxy services</name>
      <t>A server that is aware of a suitable cross proxy may use the has-proxy relation to advertise that proxy.
If the protocol used towards the proxy provides name indication (as CoAP over TLS or WebSockets does),
or by using a large number of addresses or ports,
it can even advertise a (more efficient) has-unique-proxy relation.
This is particularly interesting when the advertisements are made available across transports,
for example in a Resource Directory.</t>
      <t>How the server can discover and trust such a proxy
is out of scope for this document,
but generally involves the same kind of links.
In particular, a server may obtain a link to a third party proxy from an administrator as part of its configuration.</t>
      <t>The proxy may advertise itself without the origin server's involvement;
in that case, the client needs to take additional care (see <xref target="proxy-foreign-advertisement"/>).</t>
      <figure anchor="fig-external-proxy">
        <name>HTTP based discovery and CoAP-over-WS request to a CoAP resource through a has-unique-proxy relation</name>
        <artwork><![CDATA[
Req: GET http://rd.example.com/rd-lookup?if=tag:example.com,sensor

Res:
Content-Format: application/link-format
Payload:
<coap://device0815.example.com/sensors/>;if="tag:example.com,collection",
<coap+wss://device0815.proxy.rd.example.com>;rel=has-unique-proxy;anchor="coap://device0815.example.com/"


Req: to device0815.proxy.rd.example.com on WebSocket
Host (indicated during upgrade): device0815.proxy.rd.example.com
Code: GET
Uri-Path: /sensors/

Res: 2.05 Content
Content-Format: application/link-format
Payload:
</sensors/temperature>;if="tag:example.com,sensor"
]]></artwork>
      </figure>
      <section anchor="generic-advertisements">
        <name>Generic proxy advertisements</name>
        <t>A third party proxy may advertise its availability to act as a proxy for arbitrary CoAP requests.
This use is not directly related to the protocol indication in other parts of this document,
but sufficiently similar to warrant being described in the same document.</t>
        <t>The resource type "TBDcore.proxy" can be used to describe such a proxy.
The link target attribute "proxy-schemes" can be used to indicate the scheme(s) supported by the proxy, separated by the space character.</t>
        <figure anchor="fig-6lbr-proxy">
          <name>A CoAP client discovers that its border router can also serve as a proxy, and uses that to access a resource on an HTTP server.</name>
          <artwork><![CDATA[
Req: GET coap://[fe80::1]/.well-known/core?rt=TBDcore.proxy

Res:
Content-Format: application/link-format
Payload:
<>;rt=TBDcore.proxy;proxy-schemes="coap coap+tcp coap+ws http"

Req: to [fe80::1] via CoAP
Code: GET
Proxy-Scheme: http
Uri-Host: example.com
Uri-Path: /motd
Accept: text/plain

Res: 2.05 Content
Content-Format: text/plain
Payload:
On Monday, October 25th 2021, there is no special message of the day.
]]></artwork>
        </figure>
        <t>The considerations of <xref target="proxy-foreign-advertisement"/> apply here.</t>
        <t>A generic advertised proxy is always a forward proxy,
and can not be advertised as a "unique" proxy as it would lack information about where to forward.
(A proxy limited to a single outbound protocol might in theory work as a unique proxy when using a transport in which the full default Uri-Host value is configured at setup time,
but these are considered impractical and thus not assigned a resource type here.)</t>
        <t>The use of a generic proxy can be limited to a set of devices that have permission to use it.
Clients can be allowed by their network address if they can be verified,
or by using explicit client authentication using the methods of <xref target="I-D.tiloca-core-oscore-capable-proxies"/>.</t>
      </section>
    </section>
    <section anchor="actualproxies">
      <name>Client picked proxies</name>
      <t>This section is purely informative,
and serves to illustrate that the mechanisms introduced in this document do not hinder the continued use of existing proxies.</t>
      <t>When a resource is accessed through an "actual" proxy (i.e., a host between the client and the server, which itself may have a same-host proxy in addition to that),
the proxy's choice of the upstream server is originally (i.e., without the mechanisms of this document)
either configured (as in a "chain" of proxies)
or determined by the request URI (where a proxy picks CoAP over TCP and resolves the given name for a request aimed at a coap+tcp URI).</t>
      <t>A proxy that has learned,
by active solicitation of the information or by consulting links in its cache,
that the requested URI is available through a (possibly same-host) proxy,
may use that information
in choosing the upstream transport,
to correct the URI associated with a cached response,
and to use responses obtained through one transport to satisfy requests on another.</t>
      <t>For example, if a host at coap://h1.example.com has advertised <tt>&lt;/res&gt;,&lt;coap+tcp://h1.example.com&gt;;rel=has-proxy;anchor="/"</tt>,
then a proxy that has an active CoAP-over-TCP connection to h1.example.com
can forward an incoming request for coap://h1.example.com/res through that CoAP-over-TCP connection
with a suitable Proxy-Scheme on that connection.</t>
      <t>If the host had marked the proxy point as <tt>&lt;coap+tcp://h1.example.com&gt;;rel=has-unique-proxy</tt> instead,
then the proxy could elide the Proxy-Scheme and Uri-Host options,
and would (from the original CoAP caching rules) also be allowed
to use any fresh cache representation of coap+tcp://h1.example.com/res
to satisfy requests for coap://h1.example.com/res.</t>
      <t>A client that uses a forward proxy
and learns of a different proxy advertised to access a particular resource
will not change its behavior if its original proxy is part of its configuration.
If the forward proxy was only used out of necessity
(e.g., to access a resource on the protocol not supported by the client)
it can be practical for the client to use the advertised proxy instead.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security considerations</name>
      <section anchor="security-context-propagation">
        <name>Security context propagation</name>
        <t>Clients need to strictly enforce the rules of <xref target="secctx-propagation"/>.
Failure to do so,
in particular using a thusly announced proxy based on a certificate that attests the proxy's name,
would allow attackers to circumvent the client's security expectation.</t>
        <t>When security is terminated at proxies (as is in DTLS and TLS),
a third party proxy can usually not satisfy this requirement;
these transports are limited to same-host proxies.</t>
      </section>
      <section anchor="proxy-foreign-advertisement">
        <name>Traffic misdirection</name>
        <t>Accepting arbitrary proxies,
even with security context propagation performed properly,
would allow attackers to redirect traffic through systems under their control.
Not only does that impact availability,
it also allows an attacker to observe traffic patterns.</t>
        <t>This affects both OSCORE and (D)TLS,
as neither protect the participants' network addresses.</t>
        <t>Other than the security context propagation rules,
there are no hard and general rules about when an advertised proxy is a suitable candidate.
Aspects for consideration are:</t>
        <ul spacing="normal">
          <li>
            <t>When no direct connection is possible
(e.g. because the resource to be accessed is served as coap+tcp and TCP is not implemented in the client,
or because the resource's host is available on IPv6 while the client has no default IPv6 route),
using a proxy is necessary if complete service disruption is to be avoided.  </t>
            <t>
While an adversary can cause such a situation (e.g. by manipulating routing or DNS entries),
such an adversary is usually already in a position to observe traffic patterns.</t>
          </li>
          <li>
            <t>A proxy advertised by the device hosting the resource to be accessed is less risky to use than one advertised by a third party.  </t>
            <t>
Note that in some applications, servers produce representations based on unverified user input.
In such cases, and more so when multiple applications share a security context, the advertisements' provenance may need to be considered.</t>
          </li>
        </ul>
        <!-- Note that these aspects' applicability is mutually exclusive:
When the advertisement was obtained from the target host,
that needs to be reachable. -->

</section>
      <section anchor="protecting-the-proxy">
        <name>Protecting the proxy</name>
        <t>A widely published statement about a host's availability as a proxy can cause many clients to attempt to use it.</t>
        <t>This is mitigated in well-behaved clients by observing the rate limits of <xref target="RFC7252"/>,
and by ceasing attempts to reach a proxy for the Max-Age of received errors.</t>
        <t>Operators can further limit ill-effects
by ensuring that their client systems do not needlessly use proxies advertised in an unsecured way,
and by providing own proxies when their clients need them<!-- in a sense, avoid having starving clients that grab any straw at connectivity -->.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA considerations</name>
      <section anchor="link-relation-types">
        <name>Link Relation Types</name>
        <t>IANA is asked to add two entries into the Link Relation Type Registry last updated in <xref target="RFC8288"/>:</t>
        <table anchor="tab-iana">
          <name>New Link Relation types</name>
          <thead>
            <tr>
              <th align="left">Relation Name</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">has-proxy</td>
              <td align="left">The link target can be used as a proxy to reach the link context.</td>
              <td align="left">RFCthis</td>
            </tr>
            <tr>
              <td align="left">has-unique-proxy</td>
              <td align="left">Like has-proxy, and using this proxy implies scheme and host of the target.</td>
              <td align="left">RFCthis</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="resource-types">
        <name>Resource Types</name>
        <t>IANA is asked to add an entry into the "Resource Type (rt=) Link Target Attribute Values" registry under the Constrained RESTful Environments (CoRE) Parameters:</t>
        <t>[ The RFC Editor is asked to replace any occurrence of TBDcore.proxy with the actually registered attribute value. ]</t>
        <t>Attribute Value: core.proxy</t>
        <t>Description: Forward proxying services</t>
        <t>Reference: [ this document ]</t>
        <t>Notes: The schemes for which the proxy is usable may be indicated using the proxy-schemes target attribute as per <xref target="generic-advertisements"/> of [ this document ].</t>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby">
              <organization/>
            </author>
            <author fullname="K. Hartke" initials="K." surname="Hartke">
              <organization/>
            </author>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks.  The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s.  The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types.  CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC8288">
          <front>
            <title>Web Linking</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham">
              <organization/>
            </author>
            <date month="October" year="2017"/>
            <abstract>
              <t>This specification defines a model for the relationships between resources on the Web ("links") and the type of those relationships ("link relation types").</t>
              <t>It also defines the serialisation of such links in HTTP headers with the Link header field.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8288"/>
          <seriesInfo name="DOI" value="10.17487/RFC8288"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="aliases" target="https://www.w3.org/TR/webarch/#uri-aliases">
          <front>
            <title>Architecture of the World Wide Web, Section 2.3.1 URI aliases</title>
            <author>
              <organization>W3C</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="cooluris" target="https://www.w3.org/Provider/Style/URI">
          <front>
            <title>Cool URIs don't change</title>
            <author initials="T." surname="BL" fullname="Tim BL">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="lwm2m" target="https://omaspecworks.org/white-paper-lightweight-m2m-1-1/">
          <front>
            <title>White Paper – Lightweight M2M 1.1</title>
            <author>
              <organization>OMA SpecWorks</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC8323">
          <front>
            <title>CoAP (Constrained Application Protocol) over TCP, TLS, and WebSockets</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <author fullname="S. Lemay" initials="S." surname="Lemay">
              <organization/>
            </author>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
              <organization/>
            </author>
            <author fullname="K. Hartke" initials="K." surname="Hartke">
              <organization/>
            </author>
            <author fullname="B. Silverajan" initials="B." surname="Silverajan">
              <organization/>
            </author>
            <author fullname="B. Raymor" initials="B." role="editor" surname="Raymor">
              <organization/>
            </author>
            <date month="February" year="2018"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP), although inspired by HTTP, was designed to use UDP instead of TCP.  The message layer of CoAP over UDP includes support for reliable delivery, simple congestion control, and flow control.</t>
              <t>Some environments benefit from the availability of CoAP carried over reliable transports such as TCP or Transport Layer Security (TLS). This document outlines the changes required to use CoAP over TCP, TLS, and WebSockets transports.  It also formally updates RFC 7641 for use with these transports and RFC 7959 to enable the use of larger messages over a reliable transport.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8323"/>
          <seriesInfo name="DOI" value="10.17487/RFC8323"/>
        </reference>
        <reference anchor="I-D.bormann-t2trg-slipmux">
          <front>
            <title>Slipmux: Using an UART interface for diagnostics, configuration, and packet transfer</title>
            <author fullname="Carsten Bormann">
              <organization>Universitaet Bremen TZI</organization>
            </author>
            <author fullname="Tobias Kaupat">
              <organization>Lobaro UG</organization>
            </author>
            <date day="4" month="November" year="2019"/>
            <abstract>
              <t>   Many research and maker platforms for Internet of Things
   experimentation offer a serial interface.  This is often used for
   programming, diagnostic output, as well as a crude command interface
   ("AT interface").  Alternatively, it is often used with SLIP
   (RFC1055) to transfer IP packets only.

   The present report describes how to use a single serial interface for
   diagnostics, configuration commands and state readback, as well as
   packet transfer.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-bormann-t2trg-slipmux-03"/>
        </reference>
        <reference anchor="I-D.amsuess-core-coap-over-gatt">
          <front>
            <title>CoAP over GATT (Bluetooth Low Energy Generic Attributes)</title>
            <author fullname="Christian Amsüss">
	 </author>
            <date day="2" month="November" year="2020"/>
            <abstract>
              <t>   Interaction from computers and cell phones to constrained devices is
   limited by the different network technologies used, and by the
   available APIs.  This document describes a transport for the
   Constrained Application Protocol (CoAP) that uses Bluetooth GATT
   (Generic Attribute Profile) and its use cases.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-amsuess-core-coap-over-gatt-01"/>
        </reference>
        <reference anchor="RFC6690">
          <front>
            <title>Constrained RESTful Environments (CoRE) Link Format</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby">
              <organization/>
            </author>
            <date month="August" year="2012"/>
            <abstract>
              <t>This specification defines Web Linking using a link format for use by constrained web servers to describe hosted resources, their attributes, and other relationships between links.  Based on the HTTP Link Header field defined in RFC 5988, the Constrained RESTful Environments (CoRE) Link Format is carried as a payload and is assigned an Internet media type.  "RESTful" refers to the Representational State Transfer (REST) architecture.  A well-known URI is defined as a default entry point for requesting the links hosted by a server.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6690"/>
          <seriesInfo name="DOI" value="10.17487/RFC6690"/>
        </reference>
        <reference anchor="I-D.ietf-core-observe-multicast-notifications">
          <front>
            <title>Observe Notifications as CoAP Multicast Responses</title>
            <author fullname="Marco Tiloca">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Rikard Höglund">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Christian Amsüss">
	 </author>
            <author fullname="Francesca Palombini">
              <organization>Ericsson AB</organization>
            </author>
            <date day="11" month="July" year="2022"/>
            <abstract>
              <t>   The Constrained Application Protocol (CoAP) allows clients to
   "observe" resources at a server, and receive notifications as unicast
   responses upon changes of the resource state.  In some use cases,
   such as based on publish-subscribe, it would be convenient for the
   server to send a single notification addressed to all the clients
   observing a same target resource.  This document updates RFC7252 and
   RFC7641, and defines how a server sends observe notifications as
   response messages over multicast, synchronizing all the observers of
   a same resource on a same shared Token value.  Besides, this document
   defines how Group OSCORE can be used to protect multicast
   notifications end-to-end between the server and the observer clients.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-observe-multicast-notifications-04"/>
        </reference>
        <reference anchor="I-D.ietf-core-href">
          <front>
            <title>Constrained Resource Identifiers</title>
            <author fullname="Carsten Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <author fullname="Henk Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <date day="7" month="March" year="2022"/>
            <abstract>
              <t>   The Constrained Resource Identifier (CRI) is a complement to the
   Uniform Resource Identifier (URI) that serializes the URI components
   in Concise Binary Object Representation (CBOR) instead of a sequence
   of characters.  This simplifies parsing, comparison and reference
   resolution in environments with severe limitations on processing
   power, code size, and memory size.

   The present revision -10 of this draft contains an experimental
   addition that allows representing user information
   (https://alice@chains.example) in the URI authority component.  This
   feature lacks test vectors and implementation experience at the time
   of writing and requires discussion.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-href-10"/>
        </reference>
        <reference anchor="RFC8075">
          <front>
            <title>Guidelines for Mapping Implementations: HTTP to the Constrained Application Protocol (CoAP)</title>
            <author fullname="A. Castellani" initials="A." surname="Castellani">
              <organization/>
            </author>
            <author fullname="S. Loreto" initials="S." surname="Loreto">
              <organization/>
            </author>
            <author fullname="A. Rahman" initials="A." surname="Rahman">
              <organization/>
            </author>
            <author fullname="T. Fossati" initials="T." surname="Fossati">
              <organization/>
            </author>
            <author fullname="E. Dijk" initials="E." surname="Dijk">
              <organization/>
            </author>
            <date month="February" year="2017"/>
            <abstract>
              <t>This document provides reference information for implementing a cross-protocol network proxy that performs translation from the HTTP protocol to the Constrained Application Protocol (CoAP).  This will enable an HTTP client to access resources on a CoAP server through the proxy.  This document describes how an HTTP request is mapped to a CoAP request and how a CoAP response is mapped back to an HTTP response.  This includes guidelines for status code, URI, and media type mappings, as well as additional interworking advice.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8075"/>
          <seriesInfo name="DOI" value="10.17487/RFC8075"/>
        </reference>
        <reference anchor="rfc9176">
          <front>
            <title>Constrained RESTful Environments (CoRE) Resource Directory</title>
            <author fullname="C. Amsüss" initials="C." role="editor" surname="Amsüss">
              <organization/>
            </author>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby">
              <organization/>
            </author>
            <author fullname="M. Koster" initials="M." surname="Koster">
              <organization/>
            </author>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <author fullname="P. van der Stok" initials="P." surname="van der Stok">
              <organization/>
            </author>
            <date month="April" year="2022"/>
            <abstract>
              <t>In many Internet of Things (IoT) applications, direct discovery of resources is not practical due to sleeping nodes or networks where multicast traffic is inefficient. These problems can be solved by employing an entity called a Resource Directory (RD), which contains information about resources held on other servers, allowing lookups to be performed for those resources. The input to an RD is composed of links, and the output is composed of links constructed from the information stored in the RD. This document specifies the web interfaces that an RD supports for web servers to discover the RD and to register, maintain, look up, and remove information on resources. Furthermore, new target attributes useful in conjunction with an RD are defined.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9176"/>
          <seriesInfo name="DOI" value="10.17487/RFC9176"/>
        </reference>
        <reference anchor="I-D.ietf-lpwan-coap-static-context-hc">
          <front>
            <title>Static Context Header Compression (SCHC) for the Constrained Application Protocol (CoAP)</title>
            <author fullname="Ana Minaburo">
              <organization>Acklio</organization>
            </author>
            <author fullname="Laurent Toutain">
              <organization>Institut MINES TELECOM; IMT Atlantique</organization>
            </author>
            <author fullname="Ricardo Andreasen">
              <organization>Universidad de Buenos Aires</organization>
            </author>
            <date day="8" month="March" year="2021"/>
            <abstract>
              <t>This document defines how to compress Constrained Application Protocol (CoAP) headers using the Static Context Header Compression and fragmentation (SCHC) framework.  SCHC defines a header compression mechanism adapted for Constrained Devices.  SCHC uses a static description of the header to reduce the header's redundancy and size.  While RFC 8724 describes the SCHC compression and fragmentation framework, and its application for IPv6/UDP headers, this document applies SCHC to CoAP headers.  The CoAP header structure differs from IPv6 and UDP, since CoAP uses a flexible header with a variable number of options, themselves of variable length.  The CoAP message format is asymmetric: the request messages have a header format different from the format in the response messages.  This specification gives guidance on applying SCHC to flexible headers and how to leverage the asymmetry for more efficient compression Rules.
              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lpwan-coap-static-context-hc-19"/>
        </reference>
        <reference anchor="I-D.tiloca-core-oscore-capable-proxies">
          <front>
            <title>OSCORE-capable Proxies</title>
            <author fullname="Marco Tiloca">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Rikard Höglund">
              <organization>RISE AB</organization>
            </author>
            <date day="11" month="July" year="2022"/>
            <abstract>
              <t>   Object Security for Constrained RESTful Environments (OSCORE) can be
   used to protect CoAP messages end-to-end between two endpoints at the
   application layer, also in the presence of intermediaries such as
   proxies.  This document defines how to use OSCORE for protecting CoAP
   messages also between an origin application endpoint and an
   intermediary, or between two intermediaries.  Also, it defines how to
   secure a CoAP message by applying multiple, nested OSCORE
   protections, e.g., both end-to-end between origin application
   endpoints, as well as between an application endpoint and an
   intermediary or between two intermediaries.  Thus, this document
   updates RFC 8613.  The same approach can be seamlessly used with
   Group OSCORE, for protecting CoAP messages when group communication
   with intermediaries is used.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-tiloca-core-oscore-capable-proxies-03"/>
        </reference>
        <reference anchor="RFC7838">
          <front>
            <title>HTTP Alternative Services</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham">
              <organization/>
            </author>
            <author fullname="P. McManus" initials="P." surname="McManus">
              <organization/>
            </author>
            <author fullname="J. Reschke" initials="J." surname="Reschke">
              <organization/>
            </author>
            <date month="April" year="2016"/>
            <abstract>
              <t>This document specifies "Alternative Services" for HTTP, which allow an origin's resources to be authoritatively available at a separate network location, possibly accessed with a different protocol configuration.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7838"/>
          <seriesInfo name="DOI" value="10.17487/RFC7838"/>
        </reference>
        <reference anchor="RFC6763">
          <front>
            <title>DNS-Based Service Discovery</title>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire">
              <organization/>
            </author>
            <author fullname="M. Krochmal" initials="M." surname="Krochmal">
              <organization/>
            </author>
            <date month="February" year="2013"/>
            <abstract>
              <t>This document specifies how DNS resource records are named and structured to facilitate service discovery.  Given a type of service that a client is looking for, and a domain in which the client is looking for that service, this mechanism allows clients to discover a list of named instances of that desired service, using standard DNS queries. This mechanism is referred to as DNS-based Service Discovery, or DNS-SD.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6763"/>
          <seriesInfo name="DOI" value="10.17487/RFC6763"/>
        </reference>
        <reference anchor="I-D.amsuess-t2trg-rdlink">
          <front>
            <title>rdlink: Robust distributed links to constrained devices</title>
            <author fullname="Christian Amsüss">
	 </author>
            <date day="23" month="September" year="2019"/>
            <abstract>
              <t>   Thing to thing communication in Constrained RESTful Environments
   (CoRE) relies on URIs to link to servers.  Next to hierarchical
   configuration and short-lived IP addresses, this document introduces
   a naming scheme for devices based on cryptographic identifiers.  A
   special purpose domain is reserved for expressing those identifiers,
   and mechanisms for constrained devices to announce their names and to
   look them up are described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-amsuess-t2trg-rdlink-01"/>
        </reference>
        <reference anchor="RFC8613">
          <front>
            <title>Object Security for Constrained RESTful Environments (OSCORE)</title>
            <author fullname="G. Selander" initials="G." surname="Selander">
              <organization/>
            </author>
            <author fullname="J. Mattsson" initials="J." surname="Mattsson">
              <organization/>
            </author>
            <author fullname="F. Palombini" initials="F." surname="Palombini">
              <organization/>
            </author>
            <author fullname="L. Seitz" initials="L." surname="Seitz">
              <organization/>
            </author>
            <date month="July" year="2019"/>
            <abstract>
              <t>This document defines Object Security for Constrained RESTful Environments (OSCORE), a method for application-layer protection of the Constrained Application Protocol (CoAP), using CBOR Object Signing and Encryption (COSE).  OSCORE provides end-to-end protection between endpoints communicating using CoAP or CoAP-mappable HTTP. OSCORE is designed for constrained nodes and networks supporting a range of proxy operations, including translation between different transport protocols.</t>
              <t>Although an optional functionality of CoAP, OSCORE alters CoAP options processing and IANA registration.  Therefore, this document updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8613"/>
          <seriesInfo name="DOI" value="10.17487/RFC8613"/>
        </reference>
        <reference anchor="I-D.silverajan-core-coap-protocol-negotiation">
          <front>
            <title>CoAP Protocol Negotiation</title>
            <author fullname="Bilhanan Silverajan">
              <organization>TUT</organization>
            </author>
            <author fullname="Mert Ocak">
              <organization>Ericsson</organization>
            </author>
            <date day="2" month="July" year="2018"/>
            <abstract>
              <t>   CoAP has been standardised as an application-level REST-based
   protocol.  When multiple transport protocols exist for exchanging
   CoAP resource representations, this document introduces a way forward
   for CoAP endpoints as well as intermediaries to agree upon alternate
   transport and protocol configurations as well as URIs for CoAP
   messaging.  Several mechanisms are proposed: Extending the CoRE
   Resource Directory with new parameter types, introducing a new CoAP
   Option with which clients can interact directly with servers without
   needing the Resource Directory, and finally a new CoRE Link Attribute
   allowing exposing alternate locations on a per-resource basis.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-silverajan-core-coap-protocol-negotiation-09"/>
        </reference>
      </references>
    </references>
    <section anchor="change-log">
      <name>Change log</name>
      <t>Since draft-ietf-core-transport-indication-00:</t>
      <ul spacing="normal">
        <li>Add section on canonical URIs that are not necessarily reachable.</li>
        <li>Clarify that the the "hosts" relation is followed transitively.</li>
        <li>Cross reference with compatible multicast-notifications concept.</li>
      </ul>
      <t>Since draft-amsuess-core-transport-indication-03:</t>
      <ul spacing="normal">
        <li>No changes (merely changing the name after WG adoption)</li>
      </ul>
      <t>Since -02 (mainly processing reviews from Marco and Klaus):</t>
      <ul spacing="normal">
        <li>Acknowledge that 'coap://hostname/' is not the proxy but a URI that (in a particular phrasing) is used to stand in for the proxy's address (while it regularly identifies a resurce on the server)</li>
        <li>Security: Referencing traffic misdirection already in the first security block.</li>
        <li>Security: Add (incomplete) considerations for unique-proxy case.</li>
        <li>Narrow down "unique" proxy semantics to those properties used by the client, allowing unique proxies to be co-hosted with forward proxies.</li>
        <li>"Client picked proxies" clarified to merely illustrate how this is compatible with them.</li>
        <li>Use of "hosts" relation sharpened.</li>
        <li>Precision on how this does and does not consider changing transports.</li>
        <li>"Related work" section demoted to appendix.</li>
        <li>Add note on DTLS session resumption.</li>
        <li>Variable renaming.</li>
        <li>Various editorial fixes.</li>
      </ul>
      <t>Since -01:</t>
      <ul spacing="normal">
        <li>Removed suggestion for generally trusted proxies;
now stating that with (D)TLS,
"a third party proxy can usually not satisfy [the security context propagation requirement]".</li>
        <li>State more clearly that valid cache entries for resources aliased through has-unique-proxy can be used.</li>
        <li>Added considerations for Multipath TCP.</li>
        <li>Added concrete suggestion and example for advertisement of general proxies.</li>
        <li>Added concrete suggestion for RD lookup extension that provides proxies.</li>
        <li>Minor editorial and example changes.</li>
      </ul>
      <t>Since -00:</t>
      <ul spacing="normal">
        <li>Added introduction</li>
        <li>Added examples</li>
        <li>Added SCHC analogy</li>
        <li>Expanded security considerations</li>
        <li>Added guidance on choice of transport, and canonical addresses</li>
        <li>Added subsection on interaction with a Resource Directory</li>
        <li>Added comparisons with related work, including rdlink and DNS-SD sketches</li>
        <li>Added IANA considerations</li>
        <li>Added section on open questions</li>
      </ul>
    </section>
    <section anchor="related-work-and-applicability-to-related-fields">
      <name>Related work and applicability to related fields</name>
      <section anchor="on-http">
        <name>On HTTP</name>
        <t>The mechanisms introduced here are similar to the Alt-Svc header of <xref target="RFC7838"/>
in that they do not create different application-visible addresses,
but provide dispatch through lower transport implementations.</t>
        <t>Unlike in HTTP, the variations of CoAP protocols each come with their unique URI schemes
and thus enable the "transport address indicated by a URI" concept.
Thus, there is no need for a distinction between protocol-id and scheme.</t>
        <t>To accommodate the message size constraints typical of CoRE environments,
and accounting for the differences between HTTP headers and CoAP options,
information is delivered once at discovery time.</t>
        <t>Using the has-proxy and has-unique-proxy with HTTP URIs as the context is NOT RECOMMENDED;
the HTTP provisions of the Alt-Svc header and ALPN are preferred.</t>
      </section>
      <section anchor="using-dns">
        <name>Using DNS</name>
        <t>As pointed out in <xref target="RFC7838"/>,
DNS can already serve some of the applications of Alt-Svc and has-unique-proxy by providing different CNAME records.
These cover cases of multiple addresses,
but not different ports or protocols.</t>
        <t>While not specified for CoAP yet (and neither being specified here),</t>
        <t>[ which is an open discussion point for CoRE -- should we? Here? In a separate DNS-SD document? ]</t>
        <t>DNS SRV records (possibly in combination with DNS Service Discovery <xref target="RFC6763"/>) can provide records that could be considered equivalent to has-unique-proxy relations.
If <tt>_coap._tcp</tt>, <tt>_coaps._tcp</tt>, <tt>_coap._udp</tt>, <tt>_coap+ws._tcp</tt> etc. were defined with suitable semantics,
these can be equivalent:</t>
        <artwork><![CDATA[
_coap._udp.device.example.com SRV 0 0 device.example.com 61616
device.example.com AAAA 2001:db8::1

<coap://[2001:db8::1]>;rel=has-unique-proxy;anchor="coap://device.example.com"
]]></artwork>
        <t>It would be up to such a specification to give details on what the link's context is;
unlike the link based discovery of this document,
it would either need to pick one distinguished context scheme for which these records are looked up,
or would introduce aliasing on its own.</t>
      </section>
      <section anchor="using-names-outside-regular-dns">
        <name>Using names outside regular DNS</name>
        <t>Names that are resolved through different mechanisms than DNS,
or names which are defined within the scope of DNS but have no universally valid answers to A/AAAA requests,
can be advertised using the relation types defined here and CoAP discovery.</t>
        <t>In <xref target="fig-rdlink"/>, a server using a cryptographic name as described in <xref target="I-D.amsuess-t2trg-rdlink"/> is discovered and used.</t>
        <figure anchor="fig-rdlink">
          <name>Obtaining a sensor value from a local device with a global name</name>
          <artwork><![CDATA[
Req: to [ff02::fd]:5683 on UDP
Code: GET
Uri-Path: /.well-known/core
Uri-Query: rel=has-proxy
Uri-Query: anchor=coap://nbswy3dpo5xxe3denbswy3dpo5xxe3de.ab.rdlink.arpa

Res: from [2001:db8::1]:5683
Content-Format: application/link-format
Payload:
<coap+tcp://[2001:db8::1]>;rel=has-unique-proxy;
  anchor="coap://nbswy3dpo5xxe3denbswy3dpo5xxe3de.ab.rdlink.arpa"


Req: to [2001:db8::1]:5683 on TCP
Code: GET
OSCORE: ...
Uri-Path: /sensors/temp
Observe: 0

Res: 2.05 Content
OSCORE: ...
Observe: 0
Payload:
39.1°C
]]></artwork>
        </figure>
      </section>
      <section anchor="multipath-tcp">
        <name>Multipath TCP</name>
        <t>When CoAP-over-TCP is used over Multipath TCP
and no Uri-Host option is sent,
the implicit assumption is that there is aliasing between URIs containing any of the endpoints' addresses.</t>
        <t>As these are negotiated within MPTCP,
this works independently of this document's mechanisms.
As long as all the server's addresses are equally reachable,
there is no need to advertise multiple addresses that can later be discovered through MPTCP anyway.
When advertisements are long-lived and there is no single more stable address,
several available addresses can be advertised (independently of whether MPTCP is involved or not).
If a client uses an address that is merely a proxy address (and not a unique proxy address),
but during MPTCP finds out that the network location being accessed is actually an MPTCP alternative address of the used one,
the client MAY forego sending of the Proxy-Scheme and Uri-Path option.</t>
        <t>[ This follows from multiple addresses being valid for that TCP connection;
at some point we may want to say something about what that means for the default value of the Uri-Host option --
maybe something like "has the default value of any of the associated addresses, but the server may only enable MPTCP if there is implicit aliasing between all of them" (similar to OSCORE's statement)?  ]</t>
        <t>[ TBD: Do we need a section analog to this that deals with (D)TLS session resumption in absence of SNI? ]</t>
      </section>
    </section>
    <section anchor="open-questions-further-ideas">
      <name>Open Questions / further ideas</name>
      <ul spacing="normal">
        <li>
          <t>OSCORE interaction: <xref target="RFC8613"/> Section 4.1.3.2 requirements place OSCORE use in a weird category between has-proxy and has-unique-proxy
(because if routing still works, the result will be correct).
Not sure how to write this down properly,
or whether it's actionable at all.  </t>
          <t>
Possibly there is an inbetween category of
"The host needs the Uri-Host etc. when accessed through CoAP,
but because the host does not use the same OSCORE KID across different virtual hosts,
it's has-unique-proxy as soon as you talk OSCORE".</t>
        </li>
        <li>
          <t>Self-uniqueness:  </t>
          <t>
A host that wants to indicate that it doesn't care about Uri-Host
can probably publish something like <tt>&lt;/&gt;;rel=has-unique-proxy</tt> to do so.  </t>
          <t>
This'd help applications justify when they can elide the Uri-Host,
even when no different protocols are involved.</t>
        </li>
        <li>
          <t>Advertising under a stable name:  </t>
          <t>
If a host wants to advertise its host name rather than its IP address during multicast, how does it best do that?  </t>
          <t>
Options, when answering from 2001:db8::1 to a request to ff02::fd are:  </t>
          <artwork><![CDATA[
<coap://myhostname/foo>,...,
<coap://[2001:db8::1]>;rel=has-unique-proxy;anchor="coap://myhostname"
]]></artwork>
          <t>
which is verbose but formally clear, and  </t>
          <artwork><![CDATA[
</foo>,...,
<coap://[2001:db8::1]>;rel=has-unique-proxy;anchor="coap://myhostname"
]]></artwork>
          <t>
which is compatible with unaware clients,
but its correctness with respect to canonical URIs needs to be argued by the client, in this sequence  </t>
          <ul spacing="normal">
            <li>understanding the has-unique-proxy line,</li>
            <li>understanding that the request that went to 2001:db8::1 was really a Proxy-Scheme/Uri-Host-elided version of a request to coap://myhostname, and then</li>
            <li>processing any relative reference with this new base in mind.</li>
          </ul>
          <t>
(Not that it'd need to happen in software in that sequence,
but that's the sequence needed to understand how the <tt>/foo</tt> here is really <tt>coap://myhostname/foo</tt>).  </t>
          <t>
If CoRAL is used during discovery, a base directive or reverse relation to has-unique-proxy would make this easier.</t>
        </li>
      </ul>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>This document heavily builds on concepts
explored by Bill Silverajan and Mert Ocak in <xref target="I-D.silverajan-core-coap-protocol-negotiation"/>,
and together with Ines Robles and Klaus Hartke inside T2TRG.</t>
      <t>[ TBD: reviewers
Marco
Klaus
]</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
