<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.33 (Ruby 3.1.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-ohai-svcb-config-02" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.1 -->
  <front>
    <title abbrev="Oblivious Services in SVCB">Discovery of Oblivious Services via Service Binding Records</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-ohai-svcb-config-02"/>
    <author initials="T." surname="Pauly" fullname="Tommy Pauly">
      <organization>Apple Inc.</organization>
      <address>
        <email>tpauly@apple.com</email>
      </address>
    </author>
    <author initials="T." surname="Reddy" fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <date year="2023" month="May" day="09"/>
    <area>Security</area>
    <workgroup>Oblivious HTTP Application Intermediation</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 35?>

<t>This document defines a parameter that can be included in SVCB and HTTPS
DNS resource records to denote that a service is accessible using Oblivious
HTTP, by offering an Oblivious Gateway Resource through which to access the
target. This document also defines a mechanism to learn the key configuration
of the discovered Oblivious Gateway Resource.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-ohai-svcb-config/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Oblivious HTTP Application Intermediation Working Group mailing list (<eref target="mailto:ohai@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ohai/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/ohai/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-wg-ohai/draft-ohai-svcb-config"/>.</t>
    </note>
  </front>
  <middle>
    <?line 43?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Oblivious HTTP <xref target="OHTTP"/> allows clients to encrypt
messages exchanged with an Oblivious Target Resource (target). The messages
are encapsulated in encrypted messages to an Oblivious Gateway Resource
(gateway), which gates access to the target. The gateway is access via an
Oblivious Relay Resource (relay), which proxies the encapsulated messages
to hide the identity of the client. Overall, this architecture is designed
in such a way that the relay cannot inspect the contents of messages, and
the gateway and target cannot discover the client's identity.</t>
      <t>Since Oblivious HTTP deployments will often involve very specific coordination
between clients, relays, and gateways, the key configuration can often be
shared in a bespoke fashion. However, some deployments involve clients
discovering oblivious targets and their assoicated gateways more dynamically.
For example, a network might operate a DNS resolver that provides more optimized
or more relevant DNS answers and is accessible using Oblivious HTTP, and might
want to advertise support for Oblivious HTTP via mechanisms like Discovery of
Designated Resolvers (<xref target="DDR"/>). Clients can work with trusted
relays to access these gateways.</t>
      <t>This document defines a way to use DNS records to advertise that an HTTP service
supports Oblivious HTTP. This indication is a parameter that can be included in SVCB
and HTTPS DNS resource records <xref target="SVCB"/> (<xref target="svc-param"/>).
The presence of this parameter indicates that a service can act as an oblivious
target and has an oblivious gateway that can provide access to the target.</t>
      <t>The client learns the URI to use for the oblivious gateway using a well-known
URI <xref target="WELLKNOWN"/>, "ohttp-gateway", which is accessed on the
oblivious target (<xref target="gateway-location"/>). This means that for deployments that
support this kind of discovery, the gateway and target resources need to
be located on the same host.</t>
      <t>This document also defines a way to fetch an oblivious gateway's key
configuration from the oblivious gateway (<xref target="config-fetch"/>).</t>
      <t>This mechanism does not aid in the discovery of oblivious relays;
relay configuration is out of scope for this document. Models in which
this discovery mechanism is applicable are described in <xref target="applicability"/>.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="applicability">
      <name>Applicability</name>
      <t>There are multiple models in which the discovery mechanism defined
in this document can be used.</t>
      <ul spacing="normal">
        <li>Upgrading non-oblivious HTTP to oblivious HTTP. In this model, the
client intends to communicate with a specific target service, and
prefers to use oblivious HTTP if it is available. The target service
has an oblivious gateway that it offers to allow access using oblivious
HTTP. Once the client learns about the oblivious gateway, it "upgrades"
to using oblivious HTTP to access the target service.</li>
        <li>Discovering alternative oblivious HTTP services. In this model,
the client has a default oblivious target service that it uses. For
example, this may be a public DNS resolver that is accessible over
oblivious HTTP. The client is willing to use alternative oblivious
target services if they are discovered, which may provide more
optimized or more relevant responses.</li>
      </ul>
      <t>In both of these deployment models, the client is assumed to already
know of an oblivious relay that it trusts and works with. This oblivious
relay either needs to provide generic access to oblivious gateways, or
provide a service to clients to allow them to check which gateways
are accessible.</t>
    </section>
    <section anchor="svc-param">
      <name>The ohttp SvcParamKey</name>
      <t>The "ohttp" SvcParamKey (<xref target="iana"/>) is used to indicate that a
service described in an SVCB record can be accessed as an oblivious target
using an associated gateway. The service that is queried by the client hosts
one or more target resources.</t>
      <t>In order to access the service's target resources obliviously, the client
needs to send encapsulated messages to the gateway resource and the gateway's
key configuration (both of which can be retrieved using the method described in
<xref target="config-fetch"/>).</t>
      <t>Both the presentation and wire format values for the "ohttp" parameter
<bcp14>MUST</bcp14> be empty.</t>
      <t>The "ohttp" parameter can be included in the mandatory parameter
list to ensure that clients that do not support oblivious access
do not try to use the service. Services that mark the "ohttp"
parameter as mandatory can, therefore, indicate that the service might
not be accessible in a non-oblivious fashion. Services that are
intended to be accessed either obliviously or directly
<bcp14>SHOULD NOT</bcp14> mark the "ohttp" parameter as mandatory. Note that since
multiple SVCB responses can be provided for a single query, the oblivious
and non-oblivious versions of a single service can have different SVCB
records to support different names or properties.</t>
      <t>The media type to use for encapsulated requests made to a target service
depends on the scheme of the SVCB record. This document defines the
interpretation for the "https" <xref target="SVCB"/> and "dns" <xref target="DNS-SVCB"/>
schemes. Other schemes that want to use this parameter <bcp14>MUST</bcp14> define the
interpretation and meaning of the configuration.</t>
      <section anchor="use-in-https-service-records">
        <name>Use in HTTPS service records</name>
        <t>For the "https" scheme, which uses the HTTPS RR type instead of SVCB,
the presence of the "ohttp" parameter means that the target
being described is an Oblivious HTTP service that is accessible using
the default "message/bhttp" media type <xref target="OHTTP"/>
          <xref target="BINARY-HTTP"/>.</t>
        <t>For example, an HTTPS service record for svc.example.com that supports
an oblivious gateway could look like this:</t>
        <artwork><![CDATA[
svc.example.com. 7200  IN HTTPS 1 . ( alpn=h2 ohttp )
]]></artwork>
        <t>A similar record for a service that only supports oblivious connectivity
could look like this:</t>
        <artwork><![CDATA[
svc.example.com. 7200  IN HTTPS 1 . ( mandatory=ohttp ohttp )
]]></artwork>
      </section>
      <section anchor="use-in-dns-server-svcb-records">
        <name>Use in DNS server SVCB records</name>
        <t>For the "dns" scheme, as defined in <xref target="DNS-SVCB"/>, the presence of
the "ohttp" parameter means that the DNS server being
described has a DNS over HTTP (DoH) <xref target="DOH"/> service that can
be accessed using Oblivious HTTP. Requests to the resolver are sent to
the oblivious gateway using binary HTTP with the default "message/bhttp"
media type <xref target="BINARY-HTTP"/>, containing inner requests that use the
"application/dns-message" media type <xref target="DOH"/>.</t>
        <t>If the "ohttp" parameter is included in an DNS server SVCB record,
the "alpn" <bcp14>MUST</bcp14> include at least one HTTP value (such as "h2" or
"h3").</t>
        <t>In order for DoH servers to function as oblivious targets, their
associated gateways need to be accessible via an oblivious relay.
DoH servers used with the discovery mechanisms described
in this section can either be publicly accessible, or specific to a
network. In general, only publicly accessible DoH servers will work
as oblivious targets, unless there is a coordinated deployment
with an oblivious relay that is also hosted within a network.</t>
        <section anchor="ddr">
          <name>Use with DDR</name>
          <t>Clients can discover that a DoH server support Oblivious HTTP using
DDR, either by querying _dns.resolver.arpa to a locally configured
resolver or by querying using the name of a resolver <xref target="DDR"/>.</t>
          <t>For example, a DoH service advertised over DDR can be annotated
as supporting oblivious resolution using the following record:</t>
          <artwork><![CDATA[
_dns.resolver.arpa  7200  IN SVCB 1 doh.example.net (
     alpn=h2 dohpath=/dns-query{?dns} ohttp )
]]></artwork>
          <t>Clients still need to perform some verification of oblivious DoH servers,
such as the TLS certificate check described in <xref target="DDR"/>. This certificate
check can be done when looking up the configuration on the gateway
as described in <xref target="config-fetch"/>, which can either be done directly,
or via the relay or another proxy to avoid exposing client IP addresses.
Since the oblivious gateway that is discovered dynamically uses a well-known
URI on the same host as the target, as described in <xref target="config-fetch"/>, the
certificate evaluation for the connection to well-known gateway URI also
covers the name of the target DoH server.</t>
          <t>Opportunistic discovery <xref target="DDR"/>, where only the IP address is validated,
<bcp14>SHOULD NOT</bcp14> be used in general with oblivious HTTP, since this mode
primarily exists to support resolvers that use private or local IP
addresses, which will usually not be accessible when using an oblivious
relay. If a configuration occurs where the resolver is accessible, but
cannot use certificate-based validation, the client needs to ensure
that the oblivious relay only accesses the gateway and target using
the unencrypted resolver's original IP address.</t>
          <t>For the case of DoH servers, clients also need to ensure that they are not
being targeted with unique DoH paths that would reveal their identity. See
<xref target="security"/> for more discussion.</t>
        </section>
        <section anchor="dnr">
          <name>Use with DNR</name>
          <t>The SvcParamKeys defined in this document also can be used with Discovery
of Network-designated Resolvers (DNR) <xref target="DNR"/>. In this
case, the oblivious configuration and path parameters can be included
in DHCP and Router Advertisement messages.</t>
          <t>While DNR does not require the same kind of verification as DDR, clients
that learn about DoH servers still need to ensure that they are not being
targeted with unique DoH paths that would reveal their identity. See <xref target="security"/>
for more discussion.</t>
        </section>
      </section>
    </section>
    <section anchor="gateway-location">
      <name>Gateway Location</name>
      <t>Clients that know a service is available as an oblivious target
via discovery through the "ohttp" parameter in a SVCB or HTTPS
record need to know the location of the associated oblivious gateway
before sending oblivious requests.</t>
      <t>By default, the oblivious gateway for an oblivious target is defined
as a well-known resource (<xref target="WELLKNOWN"/>) on the target,
"/.well-known/ohttp-gateway".</t>
      <t>Commonly, servers will not want to actually operate the oblivious gateway
on a well-known URI. In such cases, servers can use 3xx redirection responses
(<xref section="15.4" sectionFormat="of" target="HTTP"/>) to direct clients and relays to the correct
location of the oblivious gateway.</t>
      <t>Generally, the first request a client will make will be a GET request to
discover the key configuration, described in <xref target="config-fetch"/>.
This initial request also provides a convenient way for clients to learn
about the redirect from the well-known resource, if there is a redirect.
When clients work with their oblivious relays to send oblivious requests
to the gateway, clients can communicate this redirected gateway URI.</t>
    </section>
    <section anchor="config-fetch">
      <name>Key Configuration Fetching</name>
      <t>Clients also need to know the key configuration of an oblivious gateway before
sending oblivious requests.</t>
      <t>In order to fetch the key configuration of an oblivious gateway discovered
in the manner described in <xref target="gateway-location"/>, the client issues a GET request
to the URI of the gateway specifying the "application/ohttp-keys" (<xref target="OHTTP"/>)
media type in the Accept header.</t>
      <t>For example, if the client knows an oblivious gateway URI,
"https://svc.example.com/.well-known/ohttp-gateway", it could fetch the
key configuration with the following request:</t>
      <artwork><![CDATA[
GET /.well-known/ohttp-gateway HTTP/1.1
Host: svc.example.com
Accept: application/ohttp-keys
]]></artwork>
      <t>Oblivious gateways that coordinate with targets that advertise oblivious
support <bcp14>SHOULD</bcp14> support GET requests for their key configuration in this
manner, unless there is another out-of-band configuration model that is
usable by clients. Gateways respond with their key configuration in the
response body, with a content type of "application/ohttp-keys".</t>
      <t>Clients can either fetch this key configuration directly, or do so via
a proxy in order to avoid the server discovering information about the
client's identity. See <xref target="security"/> for more discussion of avoiding key
targeting attacks.</t>
    </section>
    <section anchor="security">
      <name>Security and Privacy Considerations</name>
      <t>Attackers on a network can remove SVCB information from cleartext DNS
answers that are not protected by DNSSEC <xref target="DNSSEC"/>. This
can effectively downgrade clients. However, since SVCB indications
for oblivious support are just hints, a client can mitigate this by
always checking for oblivious gateway configuration <xref target="config-fetch"/>
on the well-known gateway location <xref target="gateway-location"/>.
Use of encrypted DNS along with DNSSEC can also be used as a mitigation.</t>
      <t>When clients fetch a gateway's configuration (<xref target="config-fetch"/>),
they can expose their identity in the form of an IP address if they do not
connect via a proxy or some other IP-hiding mechanism. In some circumstances,
this might not be a privacy concern, since revealing that a particular
client IP address is preparing to use an Oblivious HTTP service can be
expected. However, if a client is otherwise trying to hide its IP
address or location (and not merely decouple its specific requests from its
IP address), or if revealing its IP address facilitates key targeting attacks
(if a gateway service uses IP addresses to associate specific configurations
with specific clients), a proxy or similar mechanism can be used to fetch
the gateway's configuration.</t>
      <t>When discovering designated oblivious DoH servers using this mechanism,
clients need to ensure that the designation is trusted in lieu of
being able to directly check the contents of the gateway server's TLS
certificate. See <xref target="ddr"/> for more discussion, as well as the Security
Considerations of <xref target="SVCBDNS"/>.</t>
      <section anchor="key-targeting-attacks">
        <name>Key Targeting Attacks</name>
        <t>As discussed in <xref target="OHTTP"/>, client requests using Oblivious HTTP
can only be linked by recognizing the key configuration. In order to
prevent unwanted linkability and tracking, clients using any key
configuration discovery mechanism need to be concerned with attacks
that target a specific user or population with a unique key configuration.</t>
        <t>There are several approaches clients can use to mitigate key targeting
attacks. <xref target="CONSISTENCY"/> provides an analysis
of the options for ensuring the key configurations are consistent between
different clients. Clients <bcp14>SHOULD</bcp14> employ some technique to mitigate key
targeting attacks, such as the option of confirming the key with a shared
proxy as described in <xref target="CONSISTENCY"/>. Oblivious gateways that are detected
to use targeted key configurations per-client <bcp14>MUST NOT</bcp14> be used.</t>
      </section>
      <section anchor="dohpath-targeting-attacks">
        <name>dohpath Targeting Attacks</name>
        <t>For oblivious DoH servers, an attacker could use unique <tt>dohpath</tt> values
to target or identify specific clients. This attack is very similar to
the generic OHTTP key targeting attack described above.</t>
        <t>Clients <bcp14>SHOULD</bcp14> mitigate such attacks. This can be done with a
check for consistency, such as using a mechanism described in <xref target="CONSISTENCY"/>
to validate the <tt>dohpath</tt> value with another source. It can also be
done by limiting the the allowable values of <tt>dohpath</tt> to a single
value, such as the commonly used "/dns-query{?dns}".</t>
      </section>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <section anchor="svcb-service-parameter">
        <name>SVCB Service Parameter</name>
        <t>IANA is requested to add the following entry to the SVCB Service Parameters
registry (<xref target="SVCB"/>).</t>
        <table>
          <thead>
            <tr>
              <th align="left">Number</th>
              <th align="left">Name</th>
              <th align="left">Meaning</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TBD</td>
              <td align="left">ohttp</td>
              <td align="left">Denotes that a service operates an Oblivious HTTP target</td>
              <td align="left">(This document)</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="well-known-uri">
        <name>Well-Known URI</name>
        <t>IANA is requested to add one new entry in the "Well-Known URIs" registry <xref target="WELLKNOWN"/>.</t>
        <t>URI suffix: ohttp-gateway</t>
        <t>Change controller: IETF</t>
        <t>Specification document: This document</t>
        <t>Status: permanent</t>
        <t>Related information: N/A</t>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="OHTTP">
          <front>
            <title>Oblivious HTTP</title>
            <author fullname="Martin Thomson" initials="M." surname="Thomson">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="15" month="March" year="2023"/>
            <abstract>
              <t>   This document describes a system for forwarding encrypted HTTP
   messages.  This allows a client to make multiple requests to an
   origin server without that server being able to link those requests
   to the client or to identify the requests as having come from the
   same client, while placing only limited trust in the nodes used to
   forward the messages.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ohai-ohttp-08"/>
        </reference>
        <reference anchor="DDR">
          <front>
            <title>Discovery of Designated Resolvers</title>
            <author fullname="Tommy Pauly" initials="T." surname="Pauly">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Eric Kinnear" initials="E." surname="Kinnear">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Patrick McManus" initials="P." surname="McManus">
              <organization>Fastly</organization>
            </author>
            <author fullname="Tommy Jensen" initials="T." surname="Jensen">
              <organization>Microsoft</organization>
            </author>
            <date day="5" month="August" year="2022"/>
            <abstract>
              <t>   This document defines Discovery of Designated Resolvers (DDR), a
   mechanism for DNS clients to use DNS records to discover a resolver's
   encrypted DNS configuration.  An encrypted DNS resolver discovered in
   this manner is referred to as a "Designated Resolver".  This
   mechanism can be used to move from unencrypted DNS to encrypted DNS
   when only the IP address of a resolver is known.  This mechanism is
   designed to be limited to cases where unencrypted DNS resolvers and
   their designated resolvers are operated by the same entity or
   cooperating entities.  It can also be used to discover support for
   encrypted DNS protocols when the name of an encrypted DNS resolver is
   known.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-add-ddr-10"/>
        </reference>
        <reference anchor="SVCB">
          <front>
            <title>Service binding and parameter specification via the DNS (DNS SVCB and HTTPS RRs)</title>
            <author fullname="Benjamin M. Schwartz" initials="B. M." surname="Schwartz">
              <organization>Google</organization>
            </author>
            <author fullname="Mike Bishop" initials="M." surname="Bishop">
              <organization>Akamai Technologies</organization>
            </author>
            <author fullname="Erik Nygren" initials="E." surname="Nygren">
              <organization>Akamai Technologies</organization>
            </author>
            <date day="11" month="March" year="2023"/>
            <abstract>
              <t>   This document specifies the "SVCB" and "HTTPS" DNS resource record
   (RR) types to facilitate the lookup of information needed to make
   connections to network services, such as for HTTP origins.  SVCB
   records allow a service to be provided from multiple alternative
   endpoints, each with associated parameters (such as transport
   protocol configuration), and are extensible to support future uses
   (such as keys for encrypting the TLS ClientHello).  They also enable
   aliasing of apex domains, which is not possible with CNAME.  The
   HTTPS RR is a variation of SVCB for use with HTTP [HTTP].  By
   providing more information to the client before it attempts to
   establish a connection, these records offer potential benefits to
   both performance and privacy.

   TO BE REMOVED: This document is being collaborated on in Github at:
   https://github.com/MikeBishop/dns-alt-svc
   (https://github.com/MikeBishop/dns-alt-svc).  The most recent working
   version of the document, open issues, etc. should all be available
   there.  The authors (gratefully) accept pull requests.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dnsop-svcb-https-12"/>
        </reference>
        <reference anchor="WELLKNOWN">
          <front>
            <title>Well-Known Uniform Resource Identifiers (URIs)</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham">
              <organization/>
            </author>
            <date month="May" year="2019"/>
            <abstract>
              <t>This memo defines a path prefix for "well-known locations", "/.well-known/", in selected Uniform Resource Identifier (URI) schemes.</t>
              <t>In doing so, it obsoletes RFC 5785 and updates the URI schemes defined in RFC 7230 to reserve that space.  It also updates RFC 7595 to track URI schemes that support well-known URIs in their registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8615"/>
          <seriesInfo name="DOI" value="10.17487/RFC8615"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="DNS-SVCB">
          <front>
            <title>Service Binding Mapping for DNS Servers</title>
            <author fullname="Benjamin M. Schwartz" initials="B. M." surname="Schwartz">
              <organization>Google LLC</organization>
            </author>
            <date day="14" month="March" year="2023"/>
            <abstract>
              <t>   The SVCB DNS resource record type expresses a bound collection of
   endpoint metadata, for use when establishing a connection to a named
   service.  DNS itself can be such a service, when the server is
   identified by a domain name.  This document provides the SVCB mapping
   for named DNS servers, allowing them to indicate support for
   encrypted transport protocols.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-add-svcb-dns-08"/>
        </reference>
        <reference anchor="BINARY-HTTP">
          <front>
            <title>Binary Representation of HTTP Messages</title>
            <author fullname="Martin Thomson" initials="M." surname="Thomson">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="6" month="July" year="2022"/>
            <abstract>
              <t>This document defines a binary format for representing HTTP messages.
              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-httpbis-binary-message-06"/>
        </reference>
        <reference anchor="DOH">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <author fullname="P. McManus" initials="P." surname="McManus">
              <organization/>
            </author>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS.  Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="DNR">
          <front>
            <title>DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers (DNR)</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dan Wing" initials="D." surname="Wing">
              <organization>Citrix Systems, Inc.</organization>
            </author>
            <author fullname="Neil Cook" initials="N." surname="Cook">
              <organization>Open-Xchange</organization>
            </author>
            <author fullname="Tommy Jensen" initials="T." surname="Jensen">
              <organization>Microsoft</organization>
            </author>
            <date day="27" month="April" year="2023"/>
            <abstract>
              <t>   The document specifies new DHCP and IPv6 Router Advertisement options
   to discover encrypted DNS resolvers (e.g., DNS-over-HTTPS, DNS-over-
   TLS, DNS-over-QUIC).  Particularly, it allows a host to learn an
   authentication domain name together with a list of IP addresses and a
   set of service parameters to reach such encrypted DNS resolvers.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-add-dnr-16"/>
        </reference>
        <reference anchor="HTTP">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding">
              <organization/>
            </author>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham">
              <organization/>
            </author>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke">
              <organization/>
            </author>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes. </t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="DNSSEC">
          <front>
            <title>DNS Security Introduction and Requirements</title>
            <author fullname="R. Arends" initials="R." surname="Arends">
              <organization/>
            </author>
            <author fullname="R. Austein" initials="R." surname="Austein">
              <organization/>
            </author>
            <author fullname="M. Larson" initials="M." surname="Larson">
              <organization/>
            </author>
            <author fullname="D. Massey" initials="D." surname="Massey">
              <organization/>
            </author>
            <author fullname="S. Rose" initials="S." surname="Rose">
              <organization/>
            </author>
            <date month="March" year="2005"/>
            <abstract>
              <t>The Domain Name System Security Extensions (DNSSEC) add data origin authentication and data integrity to the Domain Name System.  This document introduces these extensions and describes their capabilities and limitations.  This document also discusses the services that the DNS security extensions do and do not provide.  Last, this document describes the interrelationships between the documents that collectively describe DNSSEC.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4033"/>
          <seriesInfo name="DOI" value="10.17487/RFC4033"/>
        </reference>
        <reference anchor="SVCBDNS">
          <front>
            <title>Service Binding Mapping for DNS Servers</title>
            <author fullname="Benjamin M. Schwartz" initials="B. M." surname="Schwartz">
              <organization>Google LLC</organization>
            </author>
            <date day="14" month="March" year="2023"/>
            <abstract>
              <t>   The SVCB DNS resource record type expresses a bound collection of
   endpoint metadata, for use when establishing a connection to a named
   service.  DNS itself can be such a service, when the server is
   identified by a domain name.  This document provides the SVCB mapping
   for named DNS servers, allowing them to indicate support for
   encrypted transport protocols.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-add-svcb-dns-08"/>
        </reference>
        <reference anchor="CONSISTENCY">
          <front>
            <title>Key Consistency and Discovery</title>
            <author fullname="Alex Davidson" initials="A." surname="Davidson">
              <organization>Brave Software</organization>
            </author>
            <author fullname="Matthew Finkel" initials="M." surname="Finkel">
              <organization>The Tor Project</organization>
            </author>
            <author fullname="Martin Thomson" initials="M." surname="Thomson">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="24" month="October" year="2022"/>
            <abstract>
              <t>   This document describes the key consistency and correctness
   requirements of protocols such as Privacy Pass, Oblivious DoH, and
   Oblivious HTTP for user privacy.  It discusses several mechanisms and
   proposals for enabling user privacy in varying threat models.  In
   concludes with discussion of open problems in this area.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-privacypass-key-consistency-00"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
