<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-mboned-dorms-08" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.2 -->
  <front>
    <title abbrev="DORMS">Discovery Of Restconf Metadata for Source-specific multicast</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-mboned-dorms-08"/>
    <author initials="J." surname="Holland" fullname="Jake Holland">
      <organization>Akamai Technologies, Inc.</organization>
      <address>
        <postal>
          <street>145 Broadway</street>
          <city>Cambridge, MA 02144</city>
          <country>United States of America</country>
        </postal>
        <email>jakeholland.net@gmail.com</email>
      </address>
    </author>
    <author initials="K." surname="Rose" fullname="Kyle Rose">
      <organization>Akamai Technologies, Inc.</organization>
      <address>
        <postal>
          <street>145 Broadway</street>
          <city>Cambridge, MA 02144</city>
          <country>United States of America</country>
        </postal>
        <email>krose@krose.org</email>
      </address>
    </author>
    <author initials="M." surname="Franke" fullname="Max Franke">
      <organization>TU Berlin</organization>
      <address>
        <postal>
          <country>Germany</country>
        </postal>
        <email>mfranke@inet.tu-berlin.de</email>
      </address>
    </author>
    <date year="2025" month="October" day="17"/>
    <area>Ops</area>
    <workgroup>Mboned</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 79?>

<t>This document defines DORMS (Discovery Of Restconf Metadata for Source-specific multicast), a method to discover and retrieve extensible metadata about source-specific multicast channels using RESTCONF.
The reverse IP DNS zone for a multicast sender's IP address is configured to use SRV resource records to advertise the hostname of a RESTCONF server that publishes metadata according to a new YANG module with support for extensions.
A new service name and the new YANG module are defined.</t>
    </abstract>
  </front>
  <middle>
    <?line 85?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document defines DORMS (Discovery Of Restconf Metadata for Source-specific multicast).</t>
      <t>A DORMS service is a RESTCONF <xref target="RFC8040"/> service that provides read access to data in the "ietf-dorms" YANG <xref target="RFC7950"/> model defined in <xref target="model"/>.
This model, along with optional extensions defined in other documents, provide an extensible set of information about multicast data streams.
A review of some example use cases that can be enabled by this kind of metadata is given in <xref target="motivation"/>.</t>
      <t>This document does not prohibit the use of the "ietf-dorms" model with other protocols such as NETCONF <xref target="RFC6241"/>, CORECONF <xref target="I-D.draft-ietf-core-comi"/>, or gNMI <xref target="I-D.draft-openconfig-rtgwg-gnmi-spec"/>, but the semantics of using the model over those protocols is out of scope for this document.
This document only defines the discovery and use of the "ietf-dorms" YANG model in RESTCONF.</t>
      <t>This document defines the "dorms" service name for use with the SRV DNS Resource Record (RR) type <xref target="RFC2782"/>.
A sender using a DORMS service to publish metadata SHOULD configure at least one SRV RR for the "_dorms._tcp" subdomain in the reverse IP DNS zone for the source IP used by some active multicast traffic.
The domain name in one of these SRV records provides a hostname corresponding to a DORMS server that can provide metadata for the sender's source-specific multicast traffic.
Publishing such a RR enables DORMS clients to discover and query a DORMS server as described in <xref target="disco"/>.</t>
      <section anchor="background">
        <name>Background</name>
        <t>The reader is assumed to be familiar with the basic DNS concepts described in <xref target="RFC1034"/>, <xref target="RFC1035"/>, and the subsequent documents that update them, as well as the use of the SRV Resource Record type as described in <xref target="RFC2782"/>.</t>
        <t>The reader is also assumed to be familiar with the concepts and terminology regarding source-specific multicast as described in <xref target="RFC4607"/> and the use of IGMPv3 <xref target="RFC9776"/> and MLDv2 <xref target="RFC9777"/> for group management of source-specific multicast channels, as described in <xref target="RFC4604"/>.</t>
        <t>The reader is also assumed to be familiar with the concepts and terminology for RESTCONF <xref target="RFC8040"/> and YANG <xref target="RFC7950"/>.</t>
      </section>
      <section anchor="terminology">
        <name>Terminology</name>
        <table>
          <thead>
            <tr>
              <th align="right">Term</th>
              <th align="left">Definition</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="right">(S,G)</td>
              <td align="left">A source-specific multicast channel, as described in <xref target="RFC4607"/>. A pair of IP addresses with a source host IP and destination group IP.</td>
            </tr>
            <tr>
              <td align="right">DORMS client</td>
              <td align="left">An application or system that can communicate with DORMS servers to fetch metadata about (S,G)s.</td>
            </tr>
            <tr>
              <td align="right">DORMS server</td>
              <td align="left">A RESTCONF server that implements the ietf-dorms YANG model defined in this document.</td>
            </tr>
            <tr>
              <td align="right">RR</td>
              <td align="left">A DNS Resource Record, as described in <xref target="RFC1034"/></td>
            </tr>
            <tr>
              <td align="right">RRType</td>
              <td align="left">A DNS Resource Record Type, as described in <xref target="RFC1034"/></td>
            </tr>
            <tr>
              <td align="right">SSM</td>
              <td align="left">Source-specific multicast, as described in <xref target="RFC4607"/></td>
            </tr>
          </tbody>
        </table>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in <xref target="RFC2119"/> and <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>
      </section>
      <section anchor="motivation">
        <name>Motivation and Use Cases</name>
        <t>DORMS provides a framework that can be extended to publish supplemental information about multicast traffic in a globally discoverable manner.
This supplemental information may be needed by entities involved in the delivery or processing of the traffic to ensure it is handled in accordance with their operational or policy requirements.</t>
        <t>Detailing the specifics of all known possible extensions is out of scope for this document except to note that a range of possible use cases are expected and they may be supported by a variety of different future extensions.
But a few example use cases are provided below for illustration.</t>
        <section anchor="provisioning-and-oversubscription-protection">
          <name>Provisioning and Oversubscription Protection</name>
          <t>One use case for DORMS is when a network that is capable of forwarding multicast traffic may need to take provisioning actions or make admission control decisions based on the expected bitrate of the traffic in order to prevent oversubscription of constrained devices in the network.
In such a case, the network in question could learn these bitrates from the metadata provided by DORMS.
<xref target="I-D.draft-ietf-mboned-cbacc"/> defines some DORMS extensions to support this use case.</t>
        </section>
        <section anchor="authentication">
          <name>Authentication</name>
          <t>Another use case for DORMS is providing information for use in authenticating the multicast traffic before accepting it for forwarding by a network device, or for processing by a receiving application.
As DORMS metadata is transmitted over a secure and authenticated connection, it can act as a security anchor for data required to verify the authenticity of multicast packets.
<xref target="I-D.draft-ietf-mboned-ambi"/> defines some DORMS extensions to support this use case.</t>
        </section>
        <section anchor="content-description">
          <name>Content Description</name>
          <t>Another use case for DORMS is describing the contents carried by a multicast traffic channel.
The content description could include information about the protocols or applications that can be used to consume the traffic, or information about the media carried (e.g. information based on the Dublin Core Metadata Element Set <xref target="RFC5013"/>), or could make assertions about the legal status of the traffic within specific contexts.</t>
        </section>
      </section>
      <section anchor="notes-for-contributors-and-reviewers">
        <name>Notes for Contributors and Reviewers</name>
        <t>Note to RFC Editor: Please remove this section and its subsections before publication.</t>
        <t>This section is to provide references to make it easier to review the development and discussion on the draft so far.</t>
        <section anchor="venue">
          <name>Venues for Contribution and Discussion</name>
          <t>This document is in the Github repository at:</t>
          <t>https://github.com/GrumpyOldTroll/ietf-dorms-cluster</t>
          <t>Readers are welcome to open issues and send pull requests for this document.</t>
          <t>Please note that contributions may be merged and substantially edited, and as a reminder, please carefully consider the Note Well before contributing: https://datatracker.ietf.org/submit/note-well/</t>
          <t>Substantial discussion of this document should take place on the MBONED working group mailing list (mboned@ietf.org).</t>
          <ul spacing="normal">
            <li>
              <t>Join: https://www.ietf.org/mailman/listinfo/mboned</t>
            </li>
            <li>
              <t>Search: https://mailarchive.ietf.org/arch/browse/mboned/</t>
            </li>
          </ul>
        </section>
      </section>
    </section>
    <section anchor="disco">
      <name>Discovery and Metadata Retrieval</name>
      <t>A client that needs metadata about an (S,G) MAY attempt to discover metadata for the (S,G) using the mechanisms defined here, and MAY use the metadata received to manage the forwarding or processing of the packets in the channel.</t>
      <section anchor="channel-discovery">
        <name>Channel Discovery</name>
        <t>DORMS provides a method for clients to fetch metadata about (S,G)s that are already known to the clients.
In general, a DORMS client might learn of an (S,G) by any means, so describing all possible methods a DORMS client might use to discover a set of (S,G)s for which it wants metadata is out of scope for this document.</t>
        <t>But for example, a multicast receiver application that is a DORMS client might learn about an (S,G) by getting signals from inside the application logic, such as a selection made by a user, or a scheduled API call that reacts to updates in a library provided by a service operator.</t>
        <t>As another example, an on-path router that’s a DORMS client might instead learn about an (S,G) by receiving a PIM message or an IGMP or MLD membership report indicating a downstream client has tried to subscribe to an (S,G).
Such a router might use information learned from the DORMS metadata to make an access control decision about whether to propagate the join further upstream in the network.</t>
        <t>Other approaches for learning relevant (S,G)s could be driven by monitoring a route reflector to discover channels that are being actively forwarded, for a purpose such as monitoring network health.</t>
      </section>
      <section anchor="dns-boot">
        <name>DNS Bootstrap</name>
        <t>The DNS Bootstrap step is how a client discovers an appropriate RESTCONF server, given the source address of an (S,G).
Use of the DNS Bootstrap is OPTIONAL for clients with an alternate method of obtaining a hostname of a trusted DORMS server that has information about a target (S,G).</t>
        <t>This mechanism only works for source-specific multicast (SSM) channels.
The source address of the (S,G) is reversed and used as an index into one of the reverse mapping trees (in-addr.arpa for IPv4, as described in Section 3.5 of <xref target="RFC1035"/>, or ip6.arpa for IPv6, as described in Section 2.5 of <xref target="RFC3596"/>).</t>
        <t>When a DORMS client needs metadata for an (S,G), for example when handling a new join for that (S,G) and looking up the authentication methods that are available, the DORMS client can issue a DNS query for an SRV RR using the "dorms" service name with the domain from the reverse mapping tree, combining them as described in <xref target="RFC2782"/>.</t>
        <t>For example, a client looking for metadata about the channel with a source IP of 2001:db8::a and the group address of ff3e::8000:d, the client would start the DNS bootstrap step by performing a query for the SRV RRType for the following domain (after removing the line break inserted for editorial reasons):</t>
        <artwork><![CDATA[
     _dorms._tcp.a.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.
                 0.0.0.0.0.0.0.0.8.b.d.0.1.0.0.2.ip6.arpa.
]]></artwork>
        <t>Or for an IPv4 (S,G) with a source address of 203.0.113.4, the DORMS client would request the SRV record from the in-addr.arpa tree instead:</t>
        <artwork><![CDATA[
     _dorms._tcp.4.113.0.203.in-addr.arpa.
]]></artwork>
        <t>In either case, the DNS response for this domain might return a record such as this:</t>
        <artwork><![CDATA[
     SRV 0 1 443 dorms-restconf.example.com.
]]></artwork>
        <t>This response informs the client that a DORMS server should be reachable at dorms-restconf.example.com on port 443, and should contain metadata about multicast traffic from the given source IP.
Multiple SRV records are handled as described by <xref target="RFC2782"/>.</t>
        <t>A sender providing DORMS discovery SHOULD publish at least one SRV record in the reverse DNS zone for each source address of the multicast channels it is sending in order to advertise the hostname of the DORMS server to DORMS clients.
The DORMS servers advertised SHOULD be configured with metadata for all the groups sent from the same source IP address that have metadata published with DORMS.</t>
        <t>When performing the SRV lookup, any CNAMEs or DNAMEs found MUST be followed.
This is necessary to support zone delegation.
Some examples outlining this need are described in <xref target="RFC2317"/>.</t>
      </section>
      <section anchor="restconf-bootstrap">
        <name>RESTCONF Bootstrap</name>
        <t>Once a DORMS server has been chosen (whether via an SRV RR from a DNS response or via some other method), RESTCONF provides all the information necessary to determine the versions and url paths for metadata from the server.
A walkthrough is provided here for a sequence of example requests and responses between a DORMS client and a new DORMS server.</t>
        <section anchor="root-resource-discovery">
          <name>Root Resource Discovery</name>
          <t>As described in Section 3.1 of <xref target="RFC8040"/> and <xref target="RFC6415"/>, the RESTCONF server provides the link to the RESTCONF api entry point via the "/.well-known/host-meta" or "/.well-known/host-meta.json" resource.</t>
          <t>Example:</t>
          <t>The client might send:</t>
          <artwork><![CDATA[
     GET /.well-known/host-meta.json HTTP/1.1
     Host: dorms-restconf.example.com
     Accept: application/json
]]></artwork>
          <t>The server might respond as follows:</t>
          <artwork><![CDATA[
      HTTP/1.1 200 OK
      Date: Tue, 09 Jul 2025 20:56:00 GMT
      Server: example-server
      Cache-Control: no-cache
      Content-Type: application/json

      {
        "links":[
          {
            "rel":"restconf",
            "href":"/top/restconf"
          }
        ]
      }
]]></artwork>
        </section>
        <section anchor="yang-library-version">
          <name>YANG Library Version</name>
          <t>As described in Section 3.3.3 of <xref target="RFC8040"/>, the yang-library-version leaf is required by RESTCONF, and can be used to determine the schema of the ietf-yang-library module:</t>
          <t>Example:</t>
          <t>The client might send:</t>
          <artwork><![CDATA[
      GET /top/restconf/yang-library-version HTTP/1.1
      Host: dorms-restconf.example.com
      Accept: application/yang-data+json
]]></artwork>
          <t>The server might respond as follows:</t>
          <artwork><![CDATA[
      HTTP/1.1 200 OK
      Date: Tue, 09 Jul 2025 20:56:01 GMT
      Server: example-server
      Cache-Control: no-cache
      Content-Type: application/yang-data+json

      {
          "ietf-restconf:yang-library-version": "2016-06-21"
      }
]]></artwork>
          <t>If a DORMS client determines through examination of the yang-library-version that it may not understand the responses of the server due to a version mismatch, the server qualifies as a candidate for adding to an ignore list as described in <xref target="ignore"/>.</t>
        </section>
        <section anchor="yang-library-contents">
          <name>YANG Library Contents</name>
          <t>After checking that it supports the version of the yang-library module offered by the server, the client can check that the desired metadata modules are available on the DORMS server by fetching the module-state resource from the ietf-yang-library module.</t>
          <t>Example:</t>
          <t>The client might send:</t>
          <artwork><![CDATA[
      GET /top/restconf/data/ietf-yang-library:modules-state/\
          module=ietf-dorms,2025-09-15
      Host: dorms-restconf.example.com
      Accept: application/yang-data+json
]]></artwork>
          <t>The server might respond as follows:</t>
          <artwork><![CDATA[
    HTTP/1.1 200 OK
    Date: Tue, 09 Jul 2025 20:56:02 GMT
    Server: example-server
    Cache-Control: no-cache
    Content-Type: application/yang-data+json

    {
      "ietf-yang-library:module": [
        {
          "conformance-type": "implement",
          "name": "ietf-dorms",
          "namespace": "urn:ietf:params:xml:ns:yang:ietf-dorms",
          "revision": "2025-09-15",
          "schema":
              "https://example.com/yang/ietf-dorms@2025-09-15.yang"
        }
      ]
    }
]]></artwork>
          <t>Other modules required or desired by the client also can be checked in a similar way, or the full set of available modules can be retrieved by not providing a key for the "module" list.
If a DORMS client that requires the presence of certain modules to perform its function discovers the required modules are not present on a server, that server qualifies for inclusion in an ignore list according to <xref target="ignore"/>.</t>
        </section>
        <section anchor="metadata-retrieval">
          <name>Metadata Retrieval</name>
          <t>Once the expected DORMS version is confirmed, the client can retrieve the metadata specific to the desired (S,G).</t>
          <t>Example:</t>
          <t>The client might send:</t>
          <artwork><![CDATA[
      GET /top/restconf/data/ietf-dorms:dorms/metadata/\
          sender=2001:db8::a/group=ff3e::8000:1
      Host: dorms-restconf.example.com
      Accept: application/yang-data+json
]]></artwork>
          <t>The server might respond as follows:</t>
          <artwork><![CDATA[
      HTTP/1.1 200 OK
      Date: Tue, 09 Jul 2025 20:56:02 GMT
      Server: example-server
      Cache-Control: no-cache
      Content-Type: application/yang-data+json

      {
        "ietf-dorms:group": [
          {
            "group-address":"ff3e::8000:1",
            "udp-stream":[
              {
                "port":"5001"
              }
            ]
          }
        ]
      }
]]></artwork>
          <t>Note that when other modules are installed on the DORMS server that extend the ietf-dorms module, other fields MAY appear inside the response.
This is the primary mechanism for providing extensible metadata for an (S,G), so clients SHOULD ignore fields they do not understand.</t>
          <t>As mentioned in <xref target="scoping"/>, most clients SHOULD use data resource identifiers in the request URI as in the above example, in order to retrieve metadata for only the targeted (S,G)s.</t>
        </section>
        <section anchor="cors-considerations">
          <name>Cross Origin Resource Sharing (CORS)</name>
          <t>It is RECOMMENDED that DORMS servers use the Access-Control-Allow-Origin header field, as specified by <xref target="whatwg-fetch"/>, and that they respond appropriately to Preflight requests.</t>
          <t>The use of '*' for allowed origins is NOT RECOMMENDED for publicly reachable DORMS servers.
A review of some of the potential consequences of unrestricted CORS access is given in <xref target="security-cors"/>.</t>
        </section>
      </section>
    </section>
    <section anchor="model">
      <name>YANG Model</name>
      <t>The primary purpose of the YANG model defined here is to serve as a scaffold for the more useful metadata that will extend it.
See <xref target="motivation"/> for some example use cases that can be enabled by the use of DORMS extensions.</t>
      <section anchor="yang-tree">
        <name>YANG Tree</name>
        <t>The tree diagram below follows the notation defined in <xref target="RFC8340"/>.</t>
        <figure>
          <name>DORMS Tree Diagram</name>
          <artwork><![CDATA[
YANG-TREE ietf-dorms.yang
]]></artwork>
        </figure>
      </section>
      <section anchor="yang-module">
        <name>YANG Module</name>
        <artwork><![CDATA[
YANG-MODULE ietf-dorms.yang
]]></artwork>
      </section>
    </section>
    <section anchor="security">
      <name>Security Considerations</name>
      <section anchor="yang-considerations">
        <name>YANG Model Considerations</name>
        <t>The YANG module specified in this document defines a schema for data that is designed to be accessed via RESTCONF <xref target="RFC8040"/>.
The lowest RESTCONF layer is HTTPS, and the mandatory-to-implement secure transport is TLS <xref target="RFC8446"/>.</t>
        <t>There are a number of data nodes defined in this YANG module that are writable/creatable/deletable (i.e., config true, which is the default).
These data nodes may be considered sensitive or vulnerable in some network environments.
Write operations to these data nodes (e.g., via HTTP POST/PUT/PATCH/DELETE methods) without proper protection can have a negative effect on network operations.
These are the subtrees and data nodes and their sensitivity/vulnerability:</t>
        <t>Subtrees:</t>
        <ul spacing="normal">
          <li>
            <t>/dorms/metadata</t>
          </li>
          <li>
            <t>/dorms/metadata/sender</t>
          </li>
          <li>
            <t>/dorms/metadata/sender/group</t>
          </li>
          <li>
            <t>/dorms/metadata/sender/group/udp-stream</t>
          </li>
        </ul>
        <t>Data nodes:</t>
        <ul spacing="normal">
          <li>
            <t>/dorms/metadata/sender/source-address</t>
          </li>
          <li>
            <t>/dorms/metadata/sender/group/group-address</t>
          </li>
          <li>
            <t>/dorms/metadata/sender/group/udp-stream/port</t>
          </li>
        </ul>
        <t>These data nodes refer to the characteristics of a stream of data packets being sent on a multicast channel.
If an unauthorized or incorrect edit is made, receivers would no longer be able to associate the data stream to the correct metadata, resulting in a denial-of-service for end users that rely on the metadata to properly process the data packets.
Therefore, DORMS servers MUST constrain write access to ensure that unauthorized users cannot edit the data published by the server.</t>
        <t>The Network Configuration Access Control Model (NACM) <xref target="RFC8341"/> provides the means to restrict access for particular NETCONF or RESTCONF users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content.
DORMS servers SHOULD use NACM to constrain write accesses if NETCONF or RESTCONF are configured to offer any write access at all.</t>
        <t>However, note that scalability considerations described in <xref target="provisioning"/> might make the naive use of NACM intractable in many deployments, for a broadcast use case.
So alternative methods to constrain write access to the metadata MAY be used instead of or in addition to NACM.
For example, some deployments that use a CDN or caching layer of discoverable DORMS servers might uniformly provide read-only access through the caching layer, and require the trusted writers of configuration to use an alternate method for accessing the underlying database such as connecting directly to the origin, or requiring the use of a non-RESTCONF mechanism (such as an HTTPS API requiring some kind of client authentication) for editing the contents of the metadata.</t>
        <t>The data nodes defined in this YANG module are writable because some deployments might manage the contents in the database by using normal RESTCONF editing operations with NACM, but in typical deployments it is expected that DORMS clients will generally have read-only access.
For the reasons and requirements described in <xref target="exposure"/>, none of the data nodes in the DORMS module or its extensions contain sensitive data.</t>
        <t>DORMS servers MAY provide read-only access to clients for publicly available metadata without authenticating the clients.
That is, under the terms in Section 2.5 of <xref target="RFC8040"/> read-only access to publicly available data MAY be treated as unprotected resources.</t>
      </section>
      <section anchor="exposure">
        <name>Exposure of Metadata</name>
        <t>Although some DORMS servers MAY restrict access based on client identity, as described in Section 2.5 of <xref target="RFC8040"/>, many DORMS servers will use the ietf-dorms YANG model to publish information without restriction, and even DORMS servers requiring client authentication will inherently be providing the DORMS metadata to a multitude of multicast receivers acting as DORMS clients.</t>
        <t>Accordingly, future YANG modules that augment data paths under "ietf-dorms:dorms" MUST NOT include any sensitive data unsuitable for public dissemination in those data paths.</t>
        <t>Because of the possibility that scalable read-only access might be necessary to fulfill the scalability goals for a DORMS server, data under these paths MAY be cached or replicated by numerous external entities, so owners of such data SHOULD NOT assume such data can be kept secret when provided by DORMS servers anywhere under the "ietf-dorms:dorms" path even if access controls are used with authenticated clients unless additional operational procedures and restrictions are defined and implemented that can effectively control the dissemination of the secret data.
DORMS alone does not provide any such mechanisms, and users of DORMS can be expected not to be following any such mechanisms in the absence of additional assurances.</t>
      </section>
      <section anchor="secure-communications">
        <name>Secure Communications</name>
        <t>The provisions of Section 2 of <xref target="RFC8040"/> provide secure communication requirements that are already required of DORMS servers, since they are RESTCONF servers.
All RESTCONF requirements and security considerations remain in force for DORMS servers.</t>
        <t>It is intended that security-related metadata about the SSM channels such as public keys for use with cryptographic algorithms may be delivered over the RESTCONF connection, and that information available from this connection can be used as a trust anchor.
The secure transport provided by these minimum requirements are relied upon to provide authenticated delivery of these trust anchors, once a connection with a trusted DORMS server has been established.</t>
      </section>
      <section anchor="record-spoofing">
        <name>Record-Spoofing</name>
        <t>When using the DNS Bootstrap method of discovery described in <xref target="dns-boot"/>, the SRV resource record contains information that MUST be communicated to the DORMS client without being modified.
The method used to ensure the result was unmodified is up to the client.</t>
        <t>There must be a trust relationship between the end consumer of this resource record and the DNS server.
This relationship may be end-to-end DNSSEC validation or a secure connection to a trusted resolver that itself makes use of mechanisms for ensuring RR integrity (e.g., by enforcing DNSSEC validation on recursive requests) to prevent record-spoofing of the response from the trusted server.
The connection to this trusted resolver can use any secure channel, such as with a TSIG <xref target="RFC8945"/> or SIG(0) <xref target="RFC2931"/> channel, a secure local channel on the host, DNS over TLS <xref target="RFC7858"/>, or DNS over HTTPS <xref target="RFC8484"/>.
Any combination of mechanisms may be employed that together guarantee end-to-end integrity of the intended RR.</t>
        <t>If a DORMS client accepts a maliciously crafted SRV record, the client could connect to a server controlled by the attacker, and use metadata provided by them.
The consequences of trusting maliciously crafted metadata could range from attacks against the DORMS client's parser of the metadata (via malicious constructions of the formatting of the data) to arbitrary disruption of the decisions the DORMS client makes as a result of processing validly constructed metadata.</t>
        <t>Clients MAY use other secure methods to explicitly associate an (S,G) with a set of DORMS server hostnames, such as a configured mapping or an alternative trusted lookup service.</t>
      </section>
      <section anchor="security-cors">
        <name>CORS considerations</name>
        <t>As described in <xref target="cors-considerations"/>, it is RECOMMENDED that DORMS servers provide appropriate restrictions to ensure only authorized web pages access metadata for their (S,G)s from the widely deployed base of secure browsers that use the CORS protocol according to <xref target="whatwg-fetch"/>.</t>
        <t>Providing '*' for the allowed origins exposes the DORMS-based metadata to access by scripts in all web pages, which opens the possibility of certain kinds of attacks against networks where browsers have support for joining multicast (S,G)s.</t>
        <t>If the authentication for an (S,G) relies on DORMS-based metadata (for example, as defined in <xref target="I-D.draft-ietf-mboned-ambi"/>), an unauthorized web page that tries to join an (S,G) not permitted by the CORS headers for the DORMS server will be prevented from subscribing to the channels.</t>
        <t>If an unauthorized site is not prevented from subscribing, code on the site (for example a malicious advertisement) could request subscriptions from many different (S,G)s, overflowing limits on the joining of (S,G)s and disrupting the delivery of multicast traffic for legitimate use.</t>
        <t>Further, if the malicious script can be distributed to many different users within the same receiving network, the script could coordinate an attack against the network as a whole by joining disjoint sets of (S,G)s from different users within the receiving network.
The distributed subscription requests across the receiving network could overflow limits for the receiving network as a whole, essentially causing the websites displaying the ad to participate in an overjoining attack (see Appendix A of <xref target="I-D.draft-ietf-mboned-cbacc"/>).</t>
        <t>Even if network safety mechanisms protect the network from the worst effects of oversubscription, the population counts for the multicast subscriptions could be disrupted by this kind of attack, and therefore push out legitimately requested traffic that's being consumed by real users.
For a legitimately popular event, this could cause a widespread disruption to the service if it is successfully pushed out.</t>
        <t>A denial-of-service attack of this sort would be thwarted by restricting the access to (S,G)s to authorized websites through the use of properly restricted CORS headers.</t>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <section anchor="linking-content-to-traffic-streams">
        <name>Linking Content to Traffic Streams</name>
        <t>In the typical case, the mechanisms defined in this document provide a standardized way to discover information that is already available in other ways.</t>
        <t>However, depending on the metadata provided by the server, observers may be able to more easily associate traffic from an (S,G) with the content contained within the (S,G).
At the subscriber edge of a multicast-capable network, where the network operator has the capability to localize an IGMP <xref target="RFC9776"/> or MLD <xref target="RFC9777"/> channel subscription to a specific user or location, for example by MAC address or source IP address, the structured publishing of metadata may make it easier to automate collection of data about the content a receiver is consuming.</t>
      </section>
      <section anchor="linking-multicast-subscribers-to-unicast-connections">
        <name>Linking Multicast Subscribers to Unicast Connections</name>
        <t>Subscription to a multicast channel generally only exposes the IGMP or MLD membership report to others on the same LAN, and as the membership propagates through a multicast-capable network, it ordinarily gets aggregated with other end users.</t>
        <t>However, a RESTCONF connection is a unicast connection, and exposes a different set of information to the operator of the RESTCONF server, including IP address and timing about the requests made.
Where DORMS access becomes required for a successful multicast join (for example, as expected in a browser deployment), this can expose new information about end users relative to services based solely on multicast streams.
The information disclosure occurs by giving the DORMS service operator information about the client's IP and the channels the client queried.
Additionally, an on-path observer may infer multicast subscription intent by observing client traffic directed to a known DORMS server.</t>
        <t>In some deployments it may be possible to use a proxy that aggregates many end users when the aggregate privacy characteristics are needed by end users.</t>
      </section>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <section anchor="provisioning">
        <name>Provisioning</name>
        <t>In contrast to many common RESTCONF deployments that are intended to provide configuration management for a service to a narrow set of authenticated administrators, DORMS servers often provide read-only metadata for public access or for a very large set of end receivers, since it provides metadata in support of multicast data streams and multicast can scale to very large audiences.</t>
        <t>Operators are advised to provision the DORMS service in a way that will scale appropriately to the size of the expected audience.
Specific advice on such scaling is out of scope for this document, but some of the mechanisms outlined in <xref target="RFC3040"/> or other online resources might be useful, depending on the expected number of clients.</t>
      </section>
      <section anchor="scoping">
        <name>Data Scoping</name>
        <t>Except as outlined below, clients SHOULD issue narrowed requests for DORMS resources by following the format from Section 3.5.3 of <xref target="RFC8040"/> to encode data resource identifiers in the request URI.
This avoids downloading excessive data, since the DORMS server may provide metadata for many (S,G)s, possibly from many different senders.</t>
        <t>However, clients that possess out-of-band knowledge about the expected content scope MAY issue (S,G) metadata requests that are filtered only by the source address, or that are unfiltered altogether.
Depending on the request patterns and the contents of the data store, this may result in fewer round trips or less overhead, and can therefore be helpful behavior for scaling purposes in some scenarios.
In general, engaging in this behavior requires some administrative configuration or some optimization heuristics that can recover from unexpected results.</t>
        <t>Servers MAY restrict or throttle client access based on the client certificate presented (if any), or based on heuristics that take note of client request patterns.</t>
        <t>A complete description of the heuristics for clients and servers to meet their scalability goals is out of scope for this document.</t>
      </section>
      <section anchor="ignore">
        <name>Ignore List</name>
        <t>If a DORMS client reaches a DORMS server but determines through examination of responses from that DORMS server that it may not understand or be able to use the responses of the server (for example due to an issue like a version mismatch or modules that are missing but are required for the DORMS client's purposes), the client MAY add this server to an ignore list and reject servers in its ignore list during future discovery attempts.</t>
        <t>A client using the DNS Bootstrap discovery method in <xref target="dns-boot"/> would treat servers in its ignore list as unreachable for the purposes of processing the SRV RR as described in <xref target="RFC2782"/>.
(For example, a client might end up selecting a server with a less-preferred priority than servers in its ignore list, even if an HTTPS connection could have been formed successfully with some of those servers.)</t>
        <t>If an ignore list is maintained, entries SHOULD time out and allow for re-checking after a configurable hold-down time that has a default value no shorter than 1 hour and no longer than 24 hours.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="the-yang-module-names-registry">
        <name>The YANG Module Names Registry</name>
        <t>This document adds one YANG module to the "YANG Module Names" registry maintained at &lt;https://www.iana.org/assignments/yang-parameters&gt;.
The following registrations are made, per the format in Section 14 of <xref target="RFC6020"/>:</t>
        <artwork><![CDATA[
      name:      ietf-dorms
      namespace: urn:ietf:params:xml:ns:yang:ietf-dorms
      prefix:    dorms
      reference: I-D.draft-ietf-mboned-dorms
]]></artwork>
      </section>
      <section anchor="the-xml-registry">
        <name>The XML Registry</name>
        <t>This document adds the following registration to the "ns" subregistry of the "IETF XML Registry" defined in <xref target="RFC3688"/>, referencing this document.</t>
        <artwork><![CDATA[
       URI: urn:ietf:params:xml:ns:yang:ietf-dorms
       Registrant Contact: The IESG.
       XML: N/A, the requested URI is an XML namespace.
]]></artwork>
      </section>
      <section anchor="the-service-name-and-transport-protocol-port-number-registry">
        <name>The Service Name and Transport Protocol Port Number Registry</name>
        <t>This document adds one service name to the "Service Name and Transport Protocol Port Number Registry" maintained at &lt;https://www.iana.org/assignments/service-names-port-numbers&gt;.
The following registrations are made, per the format in Section 8.1.1 of <xref target="RFC6335"/>:</t>
        <artwork><![CDATA[
     Service Name:            dorms
     Transport Protocol(s):   TCP, UDP
     Assignee:                IESG <iesg@ietf.org>
     Contact:                 IETF Chair <chair@ietf.org>
     Description:             The DORMS service (RESTCONF that
                              includes ietf-dorms YANG model)
     Reference:               I-D.draft-ietf-mboned-dorms
     Port Number:             N/A
     Service Code:            N/A
     Known Unauthorized Uses: N/A
     Assignment Notes:        N/A
]]></artwork>
      </section>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Thanks to Christian Worm Mortensen, Dino Farinacci, Lenny Guiliano, and Reshad Rahman for their very helpful comments and reviews.</t>
      <t>Part of this work was supported by the Federal Ministry of Research, Technology and Space in the programme of “Souverän. Digital. Vernetzt.” Joint project 6G-RIC, project identification number: 16KISK030.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC2317">
          <front>
            <title>Classless IN-ADDR.ARPA delegation</title>
            <author fullname="H. Eidnes" initials="H." surname="Eidnes"/>
            <author fullname="G. de Groot" initials="G." surname="de Groot"/>
            <author fullname="P. Vixie" initials="P." surname="Vixie"/>
            <date month="March" year="1998"/>
            <abstract>
              <t>This document describes a way to do IN-ADDR.ARPA delegation on non-octet boundaries for address spaces covering fewer than 256 addresses. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="20"/>
          <seriesInfo name="RFC" value="2317"/>
          <seriesInfo name="DOI" value="10.17487/RFC2317"/>
        </reference>
        <reference anchor="RFC2782">
          <front>
            <title>A DNS RR for specifying the location of services (DNS SRV)</title>
            <author fullname="A. Gulbrandsen" initials="A." surname="Gulbrandsen"/>
            <author fullname="P. Vixie" initials="P." surname="Vixie"/>
            <author fullname="L. Esibov" initials="L." surname="Esibov"/>
            <date month="February" year="2000"/>
            <abstract>
              <t>This document describes a DNS RR which specifies the location of the server(s) for a specific protocol and domain. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2782"/>
          <seriesInfo name="DOI" value="10.17487/RFC2782"/>
        </reference>
        <reference anchor="RFC3596">
          <front>
            <title>DNS Extensions to Support IP Version 6</title>
            <author fullname="S. Thomson" initials="S." surname="Thomson"/>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="V. Ksinant" initials="V." surname="Ksinant"/>
            <author fullname="M. Souissi" initials="M." surname="Souissi"/>
            <date month="October" year="2003"/>
            <abstract>
              <t>This document defines the changes that need to be made to the Domain Name System (DNS) to support hosts running IP version 6 (IPv6). The changes include a resource record type to store an IPv6 address, a domain to support lookups based on an IPv6 address, and updated definitions of existing query types that return Internet addresses as part of additional section processing. The extensions are designed to be compatible with existing applications and, in particular, DNS implementations themselves. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="88"/>
          <seriesInfo name="RFC" value="3596"/>
          <seriesInfo name="DOI" value="10.17487/RFC3596"/>
        </reference>
        <reference anchor="RFC6020">
          <front>
            <title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="October" year="2010"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6020"/>
          <seriesInfo name="DOI" value="10.17487/RFC6020"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC7950">
          <front>
            <title>The YANG 1.1 Data Modeling Language</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7950"/>
          <seriesInfo name="DOI" value="10.17487/RFC7950"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8340">
          <front>
            <title>YANG Tree Diagrams</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="L. Berger" initials="L." role="editor" surname="Berger"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document captures the current syntax used in YANG module tree diagrams. The purpose of this document is to provide a single location for this definition. This syntax may be updated from time to time based on the evolution of the YANG language.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="215"/>
          <seriesInfo name="RFC" value="8340"/>
          <seriesInfo name="DOI" value="10.17487/RFC8340"/>
        </reference>
        <reference anchor="RFC8341">
          <front>
            <title>Network Configuration Access Control Model</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability. There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content. This document defines such an access control model.</t>
              <t>This document obsoletes RFC 6536.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="91"/>
          <seriesInfo name="RFC" value="8341"/>
          <seriesInfo name="DOI" value="10.17487/RFC8341"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="whatwg-fetch" target="https://fetch.spec.whatwg.org/">
          <front>
            <title>WHATWG Fetch Living Standard</title>
            <author>
              <organization/>
            </author>
            <date year="2020" month="October"/>
          </front>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC1034">
          <front>
            <title>Domain names - concepts and facilities</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised basic definition of The Domain Name System. It obsoletes RFC-882. This memo describes the domain style names and their used for host address look up and electronic mail forwarding. It discusses the clients and servers in the domain name system and the protocol used between them.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1034"/>
          <seriesInfo name="DOI" value="10.17487/RFC1034"/>
        </reference>
        <reference anchor="RFC1035">
          <front>
            <title>Domain names - implementation and specification</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1035"/>
          <seriesInfo name="DOI" value="10.17487/RFC1035"/>
        </reference>
        <reference anchor="RFC2931">
          <front>
            <title>DNS Request and Transaction Signatures ( SIG(0)s )</title>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
            <date month="September" year="2000"/>
            <abstract>
              <t>This document describes the minor but non-interoperable changes in Request and Transaction signature resource records ( SIG(0)s ) that implementation experience has deemed necessary. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2931"/>
          <seriesInfo name="DOI" value="10.17487/RFC2931"/>
        </reference>
        <reference anchor="RFC3040">
          <front>
            <title>Internet Web Replication and Caching Taxonomy</title>
            <author fullname="I. Cooper" initials="I." surname="Cooper"/>
            <author fullname="I. Melve" initials="I." surname="Melve"/>
            <author fullname="G. Tomlinson" initials="G." surname="Tomlinson"/>
            <date month="January" year="2001"/>
            <abstract>
              <t>This memo specifies standard terminology and the taxonomy of web replication and caching infrastructure as deployed today. It introduces standard concepts, and protocols used today within this application domain. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3040"/>
          <seriesInfo name="DOI" value="10.17487/RFC3040"/>
        </reference>
        <reference anchor="RFC9776">
          <front>
            <title>Internet Group Management Protocol, Version 3</title>
            <author fullname="B. Haberman" initials="B." role="editor" surname="Haberman"/>
            <date month="March" year="2025"/>
            <abstract>
              <t>The Internet Group Management Protocol (IGMP) is the protocol used by IPv4 systems to report their IP multicast group memberships to neighboring multicast routers. Version 3 of IGMP (IGMPv3) adds support for source filtering, that is, the ability for a system to report interest in receiving packets only from specific source addresses, or from all but specific source addresses, sent to a particular multicast address. That information may be used by multicast routing protocols to avoid delivering multicast packets from specific sources to networks where there are no interested receivers.</t>
              <t>This document specifies IGMPv3. It is a revised version of RFC 3376 that includes clarifications and fixes for errata, and it is backward compatible with RFC 3376.</t>
              <t>This document updates RFC 2236 and obsoletes RFC 3376.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="100"/>
          <seriesInfo name="RFC" value="9776"/>
          <seriesInfo name="DOI" value="10.17487/RFC9776"/>
        </reference>
        <reference anchor="RFC3688">
          <front>
            <title>The IETF XML Registry</title>
            <author fullname="M. Mealling" initials="M." surname="Mealling"/>
            <date month="January" year="2004"/>
            <abstract>
              <t>This document describes an IANA maintained registry for IETF standards which use Extensible Markup Language (XML) related items such as Namespaces, Document Type Declarations (DTDs), Schemas, and Resource Description Framework (RDF) Schemas.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="81"/>
          <seriesInfo name="RFC" value="3688"/>
          <seriesInfo name="DOI" value="10.17487/RFC3688"/>
        </reference>
        <reference anchor="RFC9777">
          <front>
            <title>Multicast Listener Discovery Version 2 (MLDv2) for IPv6</title>
            <author fullname="B. Haberman" initials="B." role="editor" surname="Haberman"/>
            <date month="March" year="2025"/>
            <abstract>
              <t>This document specifies the Multicast Listener Discovery version 2 (MLDv2) protocol. MLD is used by an IPv6 router to discover the presence of multicast listeners on directly attached links and to discover which multicast addresses are of interest to those neighboring nodes. MLDv2 is designed to be interoperable with MLDv1. MLDv2 adds the ability for a node to report interest in listening to packets with a particular multicast address only from specific source addresses or from all sources except for specific source addresses.</t>
              <t>This document updates RFC 2710 and obsoletes RFC 3810.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="101"/>
          <seriesInfo name="RFC" value="9777"/>
          <seriesInfo name="DOI" value="10.17487/RFC9777"/>
        </reference>
        <reference anchor="RFC4604">
          <front>
            <title>Using Internet Group Management Protocol Version 3 (IGMPv3) and Multicast Listener Discovery Protocol Version 2 (MLDv2) for Source-Specific Multicast</title>
            <author fullname="H. Holbrook" initials="H." surname="Holbrook"/>
            <author fullname="B. Cain" initials="B." surname="Cain"/>
            <author fullname="B. Haberman" initials="B." surname="Haberman"/>
            <date month="August" year="2006"/>
            <abstract>
              <t>The Internet Group Management Protocol Version 3 (IGMPv3) and the Multicast Listener Discovery Protocol Version 2 (MLDv2) are protocols that allow a host to inform its neighboring routers of its desire to receive IPv4 and IPv6 multicast transmissions, respectively. Source-specific multicast (SSM) is a form of multicast in which a receiver is required to specify both the network-layer address of the source and the multicast destination address in order to receive the multicast transmission. This document defines the notion of an "SSM-aware" router and host, and clarifies and (in some cases) modifies the behavior of IGMPv3 and MLDv2 on SSM-aware routers and hosts to accommodate source-specific multicast. This document updates the IGMPv3 and MLDv2 specifications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4604"/>
          <seriesInfo name="DOI" value="10.17487/RFC4604"/>
        </reference>
        <reference anchor="RFC4607">
          <front>
            <title>Source-Specific Multicast for IP</title>
            <author fullname="H. Holbrook" initials="H." surname="Holbrook"/>
            <author fullname="B. Cain" initials="B." surname="Cain"/>
            <date month="August" year="2006"/>
            <abstract>
              <t>IP version 4 (IPv4) addresses in the 232/8 (232.0.0.0 to 232.255.255.255) range are designated as source-specific multicast (SSM) destination addresses and are reserved for use by source-specific applications and protocols. For IP version 6 (IPv6), the address prefix FF3x::/32 is reserved for source-specific multicast use. This document defines an extension to the Internet network service that applies to datagrams sent to SSM addresses and defines the host and router requirements to support this extension. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4607"/>
          <seriesInfo name="DOI" value="10.17487/RFC4607"/>
        </reference>
        <reference anchor="RFC5013">
          <front>
            <title>The Dublin Core Metadata Element Set</title>
            <author fullname="J. Kunze" initials="J." surname="Kunze"/>
            <author fullname="T. Baker" initials="T." surname="Baker"/>
            <date month="August" year="2007"/>
            <abstract>
              <t>This document defines fifteen metadata elements for resource description in a cross-disciplinary information environment. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5013"/>
          <seriesInfo name="DOI" value="10.17487/RFC5013"/>
        </reference>
        <reference anchor="RFC6335">
          <front>
            <title>Internet Assigned Numbers Authority (IANA) Procedures for the Management of the Service Name and Transport Protocol Port Number Registry</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="L. Eggert" initials="L." surname="Eggert"/>
            <author fullname="J. Touch" initials="J." surname="Touch"/>
            <author fullname="M. Westerlund" initials="M." surname="Westerlund"/>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <date month="August" year="2011"/>
            <abstract>
              <t>This document defines the procedures that the Internet Assigned Numbers Authority (IANA) uses when handling assignment and other requests related to the Service Name and Transport Protocol Port Number registry. It also discusses the rationale and principles behind these procedures and how they facilitate the long-term sustainability of the registry.</t>
              <t>This document updates IANA's procedures by obsoleting the previous UDP and TCP port assignment procedures defined in Sections 8 and 9.1 of the IANA Allocation Guidelines, and it updates the IANA service name and port assignment procedures for UDP-Lite, the Datagram Congestion Control Protocol (DCCP), and the Stream Control Transmission Protocol (SCTP). It also updates the DNS SRV specification to clarify what a service name is and how it is registered. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="165"/>
          <seriesInfo name="RFC" value="6335"/>
          <seriesInfo name="DOI" value="10.17487/RFC6335"/>
        </reference>
        <reference anchor="RFC6415">
          <front>
            <title>Web Host Metadata</title>
            <author fullname="E. Hammer-Lahav" initials="E." role="editor" surname="Hammer-Lahav"/>
            <author fullname="B. Cook" initials="B." surname="Cook"/>
            <date month="October" year="2011"/>
            <abstract>
              <t>This specification describes a method for locating host metadata as well as information about individual resources controlled by the host. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6415"/>
          <seriesInfo name="DOI" value="10.17487/RFC6415"/>
        </reference>
        <reference anchor="RFC7858">
          <front>
            <title>Specification for DNS over Transport Layer Security (TLS)</title>
            <author fullname="Z. Hu" initials="Z." surname="Hu"/>
            <author fullname="L. Zhu" initials="L." surname="Zhu"/>
            <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="D. Wessels" initials="D." surname="Wessels"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
              <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7858"/>
          <seriesInfo name="DOI" value="10.17487/RFC7858"/>
        </reference>
        <reference anchor="RFC8484">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="RFC8945">
          <front>
            <title>Secret Key Transaction Authentication for DNS (TSIG)</title>
            <author fullname="F. Dupont" initials="F." surname="Dupont"/>
            <author fullname="S. Morris" initials="S." surname="Morris"/>
            <author fullname="P. Vixie" initials="P." surname="Vixie"/>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
            <author fullname="O. Gudmundsson" initials="O." surname="Gudmundsson"/>
            <author fullname="B. Wellington" initials="B." surname="Wellington"/>
            <date month="November" year="2020"/>
            <abstract>
              <t>This document describes a protocol for transaction-level authentication using shared secrets and one-way hashing. It can be used to authenticate dynamic updates to a DNS zone as coming from an approved client or to authenticate responses as coming from an approved name server.</t>
              <t>No recommendation is made here for distributing the shared secrets; it is expected that a network administrator will statically configure name servers and clients using some out-of-band mechanism.</t>
              <t>This document obsoletes RFCs 2845 and 4635.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="93"/>
          <seriesInfo name="RFC" value="8945"/>
          <seriesInfo name="DOI" value="10.17487/RFC8945"/>
        </reference>
        <reference anchor="I-D.draft-ietf-mboned-cbacc">
          <front>
            <title>Circuit Breaker Assisted Congestion Control</title>
            <author fullname="Jake Holland" initials="J." surname="Holland">
              <organization>Akamai Technologies, Inc.</organization>
            </author>
            <author fullname="Kyle Rose" initials="K." surname="Rose">
              <organization>Akamai Technologies, Inc.</organization>
            </author>
            <author fullname="Max Franke" initials="M." surname="Franke">
              <organization>TU Berlin</organization>
            </author>
            <date day="17" month="October" year="2025"/>
            <abstract>
              <t>   This document specifies Circuit Breaker Assisted Congestion Control
   (CBACC).  CBACC enables fast-trip Circuit Breakers by publishing rate
   metadata about multicast channels from senders to intermediate
   network nodes or receivers.  The circuit breaker behavior is defined
   as a supplement to receiver driven congestion control systems, to
   preserve network health if misbehaving or malicious receiver
   applications subscribe to a volume of traffic that exceeds capacity
   policies or capability for a network or receiving device.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-mboned-cbacc-06"/>
        </reference>
        <reference anchor="I-D.draft-ietf-mboned-ambi">
          <front>
            <title>Asymmetric Manifest Based Integrity</title>
            <author fullname="Jake Holland" initials="J." surname="Holland">
              <organization>Akamai Technologies, Inc.</organization>
            </author>
            <author fullname="Kyle Rose" initials="K." surname="Rose">
              <organization>Akamai Technologies, Inc.</organization>
            </author>
            <author fullname="Max Franke" initials="M." surname="Franke">
              <organization>TU Berlin</organization>
            </author>
            <date day="17" month="October" year="2025"/>
            <abstract>
              <t>   This document defines Asymmetric Manifest-Based Integrity (AMBI).
   AMBI allows each receiver or forwarder of a stream of multicast
   packets to check the integrity of the contents of each packet in the
   data stream.  AMBI operates by passing cryptographically verifiable
   hashes of the data packets inside manifest messages, and sending the
   manifests over authenticated out-of-band communication channels.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-mboned-ambi-05"/>
        </reference>
        <reference anchor="I-D.draft-ietf-core-comi">
          <front>
            <title>CoAP Management Interface (CORECONF)</title>
            <author fullname="Michel Veillette" initials="M." surname="Veillette">
              <organization>Trilliant Networks Inc.</organization>
            </author>
            <author fullname="Peter Van der Stok" initials="P." surname="Van der Stok">
              <organization>consultant</organization>
            </author>
            <author fullname="Alexander Pelov" initials="A." surname="Pelov">
              <organization>IMT Atlantique</organization>
            </author>
            <author fullname="Andy Bierman" initials="A." surname="Bierman">
              <organization>YumaWorks</organization>
            </author>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <date day="6" month="May" year="2025"/>
            <abstract>
              <t>   This document describes a network management interface for
   constrained devices and networks, called CoAP Management Interface
   (CORECONF).  The Constrained Application Protocol (CoAP) is used to
   access datastore and data node resources specified in YANG, or SMIv2
   converted to YANG.  CORECONF uses the YANG to CBOR mapping and
   converts YANG identifier strings to numeric identifiers for payload
   size reduction.  CORECONF extends the set of YANG based protocols,
   NETCONF and RESTCONF, with the capability to manage constrained
   devices and networks.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-comi-20"/>
        </reference>
        <reference anchor="I-D.draft-openconfig-rtgwg-gnmi-spec">
          <front>
            <title>gRPC Network Management Interface (gNMI)</title>
            <author fullname="Rob Shakir" initials="R." surname="Shakir">
              <organization>Google</organization>
            </author>
            <author fullname="Anees Shaikh" initials="A." surname="Shaikh">
              <organization>Google</organization>
            </author>
            <author fullname="Paul Borman" initials="P." surname="Borman">
              <organization>Google</organization>
            </author>
            <author fullname="Marcus Hines" initials="M." surname="Hines">
              <organization>Google</organization>
            </author>
            <author fullname="Carl Lebsack" initials="C." surname="Lebsack">
              <organization>Google</organization>
            </author>
            <author fullname="Chris Morrow" initials="C." surname="Morrow">
              <organization>Google</organization>
            </author>
            <date day="5" month="March" year="2018"/>
            <abstract>
              <t>   This document describes the gRPC Network Management Interface (gNMI),
   a network management protocol based on the gRPC framework.  gNMI
   supports retrieval and manipulation of state from network elements
   where the data is represented by a tree structure, and addressable by
   paths.  The gNMI service defines operations for configuration
   management, operational state retrieval, and bulk data collection via
   streaming telemetry.  The authoritative gNMI specification is
   maintained at [GNMI-SPEC].

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-openconfig-rtgwg-gnmi-spec-01"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
