<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.35 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-ohai-svcb-config-03" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.3 -->
  <front>
    <title abbrev="Oblivious Services in SVCB">Discovery of Oblivious Services via Service Binding Records</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-ohai-svcb-config-03"/>
    <author initials="T." surname="Pauly" fullname="Tommy Pauly">
      <organization>Apple Inc.</organization>
      <address>
        <email>tpauly@apple.com</email>
      </address>
    </author>
    <author initials="T." surname="Reddy" fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <date year="2023" month="June" day="09"/>
    <area>Security</area>
    <workgroup>Oblivious HTTP Application Intermediation</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 35?>

<t>This document defines a parameter that can be included in SVCB and HTTPS
DNS resource records to denote that a service is accessible using Oblivious
HTTP, by offering an Oblivious Gateway Resource through which to access the
target. This document also defines a mechanism to learn the key configuration
of the discovered Oblivious Gateway Resource.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-ohai-svcb-config/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Oblivious HTTP Application Intermediation Working Group mailing list (<eref target="mailto:ohai@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ohai/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/ohai/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-wg-ohai/draft-ohai-svcb-config"/>.</t>
    </note>
  </front>
  <middle>
    <?line 43?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Oblivious HTTP <xref target="OHTTP"/> allows clients to encrypt
messages exchanged with an Oblivious Target Resource (target). The messages
are encapsulated in encrypted messages to an Oblivious Gateway Resource
(gateway), which gates access to the target. The gateway is access via an
Oblivious Relay Resource (relay), which proxies the encapsulated messages
to hide the identity of the client. Overall, this architecture is designed
in such a way that the relay cannot inspect the contents of messages, and
the gateway and target cannot discover the client's identity.</t>
      <t>Since Oblivious HTTP deployments will often involve very specific coordination
between clients, relays, and gateways, the key configuration can often be
shared in a bespoke fashion. However, some deployments involve clients
discovering oblivious targets and their associated gateways more dynamically.
For example, a network might operate a DNS resolver that provides more optimized
or more relevant DNS answers and is accessible using Oblivious HTTP, and might
want to advertise support for Oblivious HTTP via mechanisms like Discovery of
Designated Resolvers (<xref target="DDR"/>). Clients can work with trusted
relays to access these gateways.</t>
      <t>This document defines a way to use DNS records to advertise that an HTTP service
supports Oblivious HTTP. This indication is a parameter that can be included in SVCB
and HTTPS DNS resource records <xref target="SVCB"/> (<xref target="svc-param"/>).
The presence of this parameter indicates that a service can act as an oblivious
target and has an oblivious gateway that can provide access to the target.</t>
      <t>The client learns the URI to use for the oblivious gateway using a well-known
URI <xref target="WELLKNOWN"/>, "ohttp-gateway", which is accessed on the
oblivious target (<xref target="gateway-location"/>). This means that for deployments that
support this kind of discovery, the gateway and target resources need to
be located on the same host.</t>
      <t>This document also defines a way to fetch an oblivious gateway's key
configuration from the oblivious gateway (<xref target="config-fetch"/>).</t>
      <t>This mechanism does not aid in the discovery of oblivious relays;
relay configuration is out of scope for this document. Models in which
this discovery mechanism is applicable are described in <xref target="applicability"/>.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="applicability">
      <name>Applicability</name>
      <t>There are multiple models in which the discovery mechanism defined
in this document can be used.</t>
      <ul spacing="normal">
        <li>Upgrading non-oblivious HTTP to oblivious HTTP. In this model, the
client intends to communicate with a specific target service, and
prefers to use oblivious HTTP if it is available. The target service
has an oblivious gateway that it offers to allow access using oblivious
HTTP. Once the client learns about the oblivious gateway, it "upgrades"
to using oblivious HTTP to access the target service.</li>
        <li>Discovering alternative oblivious HTTP services. In this model,
the client has a default oblivious target service that it uses. For
example, this may be a public DNS resolver that is accessible over
oblivious HTTP. The client is willing to use alternative oblivious
target services if they are discovered, which may provide more
optimized or more relevant responses.</li>
      </ul>
      <t>In both of these deployment models, the client is assumed to already
know of an oblivious relay that it trusts and works with. This oblivious
relay either needs to provide generic access to oblivious gateways, or
provide a service to clients to allow them to check which gateways
are accessible.</t>
    </section>
    <section anchor="svc-param">
      <name>The ohttp SvcParamKey</name>
      <t>The "ohttp" SvcParamKey (<xref target="iana"/>) is used to indicate that a
service described in an SVCB record can be accessed as an oblivious target
using an associated gateway. The service that is queried by the client hosts
one or more target resources.</t>
      <t>In order to access the service's target resources obliviously, the client
needs to send encapsulated messages to the gateway resource and the gateway's
key configuration (both of which can be retrieved using the method described in
<xref target="config-fetch"/>).</t>
      <t>Both the presentation and wire format values for the "ohttp" parameter
<bcp14>MUST</bcp14> be empty.</t>
      <t>The "ohttp" parameter can be included in the mandatory parameter
list to ensure that clients that do not support oblivious access
do not try to use the service. Services that mark the "ohttp"
parameter as mandatory can, therefore, indicate that the service might
not be accessible in a non-oblivious fashion. Services that are
intended to be accessed either obliviously or directly
<bcp14>SHOULD NOT</bcp14> mark the "ohttp" parameter as mandatory. Note that since
multiple SVCB responses can be provided for a single query, the oblivious
and non-oblivious versions of a single service can have different SVCB
records to support different names or properties.</t>
      <t>The media type to use for encapsulated requests made to a target service
depends on the scheme of the SVCB record. This document defines the
interpretation for the "https" <xref target="SVCB"/> and "dns" <xref target="DNS-SVCB"/>
schemes. Other schemes that want to use this parameter <bcp14>MUST</bcp14> define the
interpretation and meaning of the configuration.</t>
      <section anchor="use-in-https-service-records">
        <name>Use in HTTPS service records</name>
        <t>For the "https" scheme, which uses the HTTPS RR type instead of SVCB,
the presence of the "ohttp" parameter means that the target
being described is an Oblivious HTTP service that is accessible using
the default "message/bhttp" media type <xref target="OHTTP"/>
          <xref target="BINARY-HTTP"/>.</t>
        <t>For example, an HTTPS service record for svc.example.com that supports
an oblivious gateway could look like this:</t>
        <artwork><![CDATA[
svc.example.com. 7200  IN HTTPS 1 . ( alpn=h2 ohttp )
]]></artwork>
        <t>A similar record for a service that only supports oblivious connectivity
could look like this:</t>
        <artwork><![CDATA[
svc.example.com. 7200  IN HTTPS 1 . ( mandatory=ohttp ohttp )
]]></artwork>
      </section>
      <section anchor="use-in-dns-server-svcb-records">
        <name>Use in DNS server SVCB records</name>
        <t>For the "dns" scheme, as defined in <xref target="DNS-SVCB"/>, the presence of
the "ohttp" parameter means that the DNS server being
described has a DNS over HTTP (DoH) <xref target="DOH"/> service that can
be accessed using Oblivious HTTP. Requests to the resolver are sent to
the oblivious gateway using binary HTTP with the default "message/bhttp"
media type <xref target="BINARY-HTTP"/>, containing inner requests that use the
"application/dns-message" media type <xref target="DOH"/>.</t>
        <t>If the "ohttp" parameter is included in an DNS server SVCB record,
the "alpn" <bcp14>MUST</bcp14> include at least one HTTP value (such as "h2" or
"h3").</t>
        <t>In order for DoH servers to function as oblivious targets, their
associated gateways need to be accessible via an oblivious relay.
DoH servers used with the discovery mechanisms described
in this section can either be publicly accessible, or specific to a
network. In general, only publicly accessible DoH servers will work
as oblivious targets, unless there is a coordinated deployment
with an oblivious relay that is also hosted within a network.</t>
        <section anchor="ddr">
          <name>Use with DDR</name>
          <t>Clients can discover that a DoH server support Oblivious HTTP using
DDR, either by querying _dns.resolver.arpa to a locally configured
resolver or by querying using the name of a resolver <xref target="DDR"/>.</t>
          <t>For example, a DoH service advertised over DDR can be annotated
as supporting oblivious resolution using the following record:</t>
          <artwork><![CDATA[
_dns.resolver.arpa  7200  IN SVCB 1 doh.example.net (
     alpn=h2 dohpath=/dns-query{?dns} ohttp )
]]></artwork>
          <t>Clients still need to perform some verification of oblivious DoH servers,
such as the TLS certificate check described in <xref target="DDR"/>. This certificate
check can be done when looking up the configuration on the gateway
as described in <xref target="config-fetch"/>, which can either be done directly,
or via the relay or another proxy to avoid exposing client IP addresses.
Since the oblivious gateway that is discovered dynamically uses a well-known
URI on the same host as the target, as described in <xref target="config-fetch"/>, the
certificate evaluation for the connection to well-known gateway URI also
covers the name of the target DoH server.</t>
          <t>Opportunistic discovery <xref target="DDR"/>, where only the IP address is validated,
<bcp14>SHOULD NOT</bcp14> be used in general with oblivious HTTP, since this mode
primarily exists to support resolvers that use private or local IP
addresses, which will usually not be accessible when using an oblivious
relay. If a configuration occurs where the resolver is accessible, but
cannot use certificate-based validation, the client needs to ensure
that the oblivious relay only accesses the gateway and target using
the unencrypted resolver's original IP address.</t>
          <t>For the case of DoH servers, clients also need to ensure that they are not
being targeted with unique DoH paths that would reveal their identity. See
<xref target="security"/> for more discussion.</t>
        </section>
        <section anchor="dnr">
          <name>Use with DNR</name>
          <t>The SvcParamKeys defined in this document also can be used with Discovery
of Network-designated Resolvers (DNR) <xref target="DNR"/>. In this
case, the oblivious configuration and path parameters can be included
in DHCP and Router Advertisement messages.</t>
          <t>While DNR does not require the same kind of verification as DDR, clients
that learn about DoH servers still need to ensure that they are not being
targeted with unique DoH paths that would reveal their identity. See <xref target="security"/>
for more discussion.</t>
        </section>
      </section>
    </section>
    <section anchor="gateway-location">
      <name>Gateway Location</name>
      <t>Clients that know a service is available as an oblivious target
via discovery through the "ohttp" parameter in a SVCB or HTTPS
record need to know the location of the associated oblivious gateway
before sending oblivious requests.</t>
      <t>By default, the oblivious gateway for an oblivious target is defined
as a well-known resource (<xref target="WELLKNOWN"/>) on the target,
"/.well-known/ohttp-gateway".</t>
      <t>Commonly, servers will not want to actually operate the oblivious gateway
on a well-known URI. In such cases, servers can use 3xx redirection responses
(<xref section="15.4" sectionFormat="of" target="HTTP"/>) to direct clients and relays to the correct
location of the oblivious gateway. Such redirects would apply both to requests
made to fetch key configurations (as defined in <xref target="config-fetch"/>) and to
oblivious requests made via an oblivious relay.</t>
      <t>If a client receives a redirect when fetching the key configuration from the
well-known gateway resource, it <bcp14>MUST NOT</bcp14> communicate the redirected
gateway URI to the oblivious relay as the location of the gateway to use.
Doing so would allow the oblivious gateway to target clients by encoding
unique or client-identifying values in the redirected URI. Instead,
relays being used with dynamically discovered gateways <bcp14>MUST</bcp14> use the
well-known gateway resource and follow any redirects independently of
redirects that clients received. The relay can remember such redirects
across oblivious requests for all clients in order to avoid added latency.</t>
    </section>
    <section anchor="config-fetch">
      <name>Key Configuration Fetching</name>
      <t>Clients also need to know the key configuration of an oblivious gateway before
sending oblivious requests.</t>
      <t>In order to fetch the key configuration of an oblivious gateway discovered
in the manner described in <xref target="gateway-location"/>, the client issues a GET request
to the URI of the gateway specifying the "application/ohttp-keys" (<xref target="OHTTP"/>)
media type in the Accept header.</t>
      <t>For example, if the client knows an oblivious gateway URI,
"https://svc.example.com/.well-known/ohttp-gateway", it could fetch the
key configuration with the following request:</t>
      <artwork><![CDATA[
GET /.well-known/ohttp-gateway HTTP/1.1
Host: svc.example.com
Accept: application/ohttp-keys
]]></artwork>
      <t>Oblivious gateways that coordinate with targets that advertise oblivious
support <bcp14>SHOULD</bcp14> support GET requests for their key configuration in this
manner, unless there is another out-of-band configuration model that is
usable by clients. Gateways respond with their key configuration in the
response body, with a content type of "application/ohttp-keys".</t>
      <t>Clients can either fetch this key configuration directly, or do so via
a proxy in order to avoid the server discovering information about the
client's identity. See <xref target="security"/> for more discussion of avoiding key
targeting attacks.</t>
    </section>
    <section anchor="security">
      <name>Security and Privacy Considerations</name>
      <t>Attackers on a network can remove SVCB information from cleartext DNS
answers that are not protected by DNSSEC <xref target="DNSSEC"/>. This
can effectively downgrade clients. However, since SVCB indications
for oblivious support are just hints, a client can mitigate this by
always checking for oblivious gateway configuration <xref target="config-fetch"/>
on the well-known gateway location <xref target="gateway-location"/>.
Use of encrypted DNS along with DNSSEC can also be used as a mitigation.</t>
      <t>When clients fetch a gateway's configuration (<xref target="config-fetch"/>),
they can expose their identity in the form of an IP address if they do not
connect via a proxy or some other IP-hiding mechanism. In some circumstances,
this might not be a privacy concern, since revealing that a particular
client IP address is preparing to use an Oblivious HTTP service can be
expected. However, if a client is otherwise trying to hide its IP
address or location (and not merely decouple its specific requests from its
IP address), or if revealing its IP address facilitates key targeting attacks
(if a gateway service uses IP addresses to associate specific configurations
with specific clients), a proxy or similar mechanism can be used to fetch
the gateway's configuration.</t>
      <t>When discovering designated oblivious DoH servers using this mechanism,
clients need to ensure that the designation is trusted in lieu of
being able to directly check the contents of the gateway server's TLS
certificate. See <xref target="ddr"/> for more discussion, as well as the Security
Considerations of <xref target="DNS-SVCB"/>.</t>
      <section anchor="key-targeting-attacks">
        <name>Key Targeting Attacks</name>
        <t>As discussed in <xref target="OHTTP"/>, client requests using Oblivious HTTP
can only be linked by recognizing the key configuration. In order to
prevent unwanted linkability and tracking, clients using any key
configuration discovery mechanism need to be concerned with attacks
that target a specific user or population with a unique key configuration.</t>
        <t>There are several approaches clients can use to mitigate key targeting
attacks. <xref target="CONSISTENCY"/> provides an analysis
of the options for ensuring the key configurations are consistent between
different clients. Clients <bcp14>SHOULD</bcp14> employ some technique to mitigate key
targeting attacks, such as the option of confirming the key with a shared
proxy as described in <xref target="CONSISTENCY"/>. Oblivious gateways that are detected
to use targeted key configurations per-client <bcp14>MUST NOT</bcp14> be used.</t>
      </section>
      <section anchor="dohpath-targeting-attacks">
        <name>dohpath Targeting Attacks</name>
        <t>For oblivious DoH servers, an attacker could use unique <tt>dohpath</tt> values
to target or identify specific clients. This attack is very similar to
the generic OHTTP key targeting attack described above.</t>
        <t>Clients <bcp14>SHOULD</bcp14> mitigate such attacks. This can be done with a
check for consistency, such as using a mechanism described in <xref target="CONSISTENCY"/>
to validate the <tt>dohpath</tt> value with another source. It can also be
done by limiting the the allowable values of <tt>dohpath</tt> to a single
value, such as the commonly used "/dns-query{?dns}".</t>
      </section>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <section anchor="svcb-service-parameter">
        <name>SVCB Service Parameter</name>
        <t>IANA is requested to add the following entry to the SVCB Service Parameters
registry (<xref target="SVCB"/>).</t>
        <table>
          <thead>
            <tr>
              <th align="left">Number</th>
              <th align="left">Name</th>
              <th align="left">Meaning</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TBD</td>
              <td align="left">ohttp</td>
              <td align="left">Denotes that a service operates an Oblivious HTTP target</td>
              <td align="left">(This document)</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="well-known-uri">
        <name>Well-Known URI</name>
        <t>IANA is requested to add one new entry in the "Well-Known URIs" registry <xref target="WELLKNOWN"/>.</t>
        <t>URI suffix: ohttp-gateway</t>
        <t>Change controller: IETF</t>
        <t>Specification document: This document</t>
        <t>Status: permanent</t>
        <t>Related information: N/A</t>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="OHTTP">
          <front>
            <title>Oblivious HTTP</title>
            <author fullname="Martin Thomson" initials="M." surname="Thomson">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="15" month="March" year="2023"/>
            <abstract>
              <t>   This document describes a system for forwarding encrypted HTTP
   messages.  This allows a client to make multiple requests to an
   origin server without that server being able to link those requests
   to the client or to identify the requests as having come from the
   same client, while placing only limited trust in the nodes used to
   forward the messages.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ohai-ohttp-08"/>
        </reference>
        <reference anchor="DDR">
          <front>
            <title>Discovery of Designated Resolvers</title>
            <author fullname="Tommy Pauly" initials="T." surname="Pauly">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Eric Kinnear" initials="E." surname="Kinnear">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Patrick McManus" initials="P." surname="McManus">
              <organization>Fastly</organization>
            </author>
            <author fullname="Tommy Jensen" initials="T." surname="Jensen">
              <organization>Microsoft</organization>
            </author>
            <date day="5" month="August" year="2022"/>
            <abstract>
              <t>   This document defines Discovery of Designated Resolvers (DDR), a
   mechanism for DNS clients to use DNS records to discover a resolver's
   encrypted DNS configuration.  An encrypted DNS resolver discovered in
   this manner is referred to as a "Designated Resolver".  This
   mechanism can be used to move from unencrypted DNS to encrypted DNS
   when only the IP address of a resolver is known.  This mechanism is
   designed to be limited to cases where unencrypted DNS resolvers and
   their designated resolvers are operated by the same entity or
   cooperating entities.  It can also be used to discover support for
   encrypted DNS protocols when the name of an encrypted DNS resolver is
   known.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-add-ddr-10"/>
        </reference>
        <reference anchor="SVCB">
          <front>
            <title>Service binding and parameter specification via the DNS (DNS SVCB and HTTPS RRs)</title>
            <author fullname="Benjamin M. Schwartz" initials="B. M." surname="Schwartz">
              <organization>Google</organization>
            </author>
            <author fullname="Mike Bishop" initials="M." surname="Bishop">
              <organization>Akamai Technologies</organization>
            </author>
            <author fullname="Erik Nygren" initials="E." surname="Nygren">
              <organization>Akamai Technologies</organization>
            </author>
            <date day="11" month="March" year="2023"/>
            <abstract>
              <t>   This document specifies the "SVCB" and "HTTPS" DNS resource record
   (RR) types to facilitate the lookup of information needed to make
   connections to network services, such as for HTTP origins.  SVCB
   records allow a service to be provided from multiple alternative
   endpoints, each with associated parameters (such as transport
   protocol configuration), and are extensible to support future uses
   (such as keys for encrypting the TLS ClientHello).  They also enable
   aliasing of apex domains, which is not possible with CNAME.  The
   HTTPS RR is a variation of SVCB for use with HTTP [HTTP].  By
   providing more information to the client before it attempts to
   establish a connection, these records offer potential benefits to
   both performance and privacy.

   TO BE REMOVED: This document is being collaborated on in Github at:
   https://github.com/MikeBishop/dns-alt-svc
   (https://github.com/MikeBishop/dns-alt-svc).  The most recent working
   version of the document, open issues, etc. should all be available
   there.  The authors (gratefully) accept pull requests.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dnsop-svcb-https-12"/>
        </reference>
        <reference anchor="WELLKNOWN">
          <front>
            <title>Well-Known Uniform Resource Identifiers (URIs)</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <date month="May" year="2019"/>
            <abstract>
              <t>This memo defines a path prefix for "well-known locations", "/.well-known/", in selected Uniform Resource Identifier (URI) schemes.</t>
              <t>In doing so, it obsoletes RFC 5785 and updates the URI schemes defined in RFC 7230 to reserve that space. It also updates RFC 7595 to track URI schemes that support well-known URIs in their registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8615"/>
          <seriesInfo name="DOI" value="10.17487/RFC8615"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized.  This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="DNS-SVCB">
          <front>
            <title>Service Binding Mapping for DNS Servers</title>
            <author fullname="Benjamin M. Schwartz" initials="B. M." surname="Schwartz">
              <organization>Google LLC</organization>
            </author>
            <date day="14" month="March" year="2023"/>
            <abstract>
              <t>   The SVCB DNS resource record type expresses a bound collection of
   endpoint metadata, for use when establishing a connection to a named
   service.  DNS itself can be such a service, when the server is
   identified by a domain name.  This document provides the SVCB mapping
   for named DNS servers, allowing them to indicate support for
   encrypted transport protocols.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-add-svcb-dns-08"/>
        </reference>
        <reference anchor="BINARY-HTTP">
          <front>
            <title>Binary Representation of HTTP Messages</title>
            <author fullname="M. Thomson" initials="M." surname="Thomson"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document defines a binary format for representing HTTP messages.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9292"/>
          <seriesInfo name="DOI" value="10.17487/RFC9292"/>
        </reference>
        <reference anchor="DOH">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS.  Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="DNR">
          <front>
            <title>DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers (DNR)</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dan Wing" initials="D." surname="Wing">
              <organization>Citrix Systems, Inc.</organization>
            </author>
            <author fullname="Neil Cook" initials="N." surname="Cook">
              <organization>Open-Xchange</organization>
            </author>
            <author fullname="Tommy Jensen" initials="T." surname="Jensen">
              <organization>Microsoft</organization>
            </author>
            <date day="27" month="April" year="2023"/>
            <abstract>
              <t>   The document specifies new DHCP and IPv6 Router Advertisement options
   to discover encrypted DNS resolvers (e.g., DNS-over-HTTPS, DNS-over-
   TLS, DNS-over-QUIC).  Particularly, it allows a host to learn an
   authentication domain name together with a list of IP addresses and a
   set of service parameters to reach such encrypted DNS resolvers.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-add-dnr-16"/>
        </reference>
        <reference anchor="HTTP">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="DNSSEC">
          <front>
            <title>DNS Security Introduction and Requirements</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>The Domain Name System Security Extensions (DNSSEC) add data origin authentication and data integrity to the Domain Name System.  This document introduces these extensions and describes their capabilities and limitations.  This document also discusses the services that the DNS security extensions do and do not provide.  Last, this document describes the interrelationships between the documents that collectively describe DNSSEC. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4033"/>
          <seriesInfo name="DOI" value="10.17487/RFC4033"/>
        </reference>
        <reference anchor="CONSISTENCY">
          <front>
            <title>Key Consistency and Discovery</title>
            <author fullname="Alex Davidson" initials="A." surname="Davidson">
              <organization>Brave Software</organization>
            </author>
            <author fullname="Matthew Finkel" initials="M." surname="Finkel">
              <organization>The Tor Project</organization>
            </author>
            <author fullname="Martin Thomson" initials="M." surname="Thomson">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="24" month="October" year="2022"/>
            <abstract>
              <t>   This document describes the key consistency and correctness
   requirements of protocols such as Privacy Pass, Oblivious DoH, and
   Oblivious HTTP for user privacy.  It discusses several mechanisms and
   proposals for enabling user privacy in varying threat models.  In
   concludes with discussion of open problems in this area.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-privacypass-key-consistency-00"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
