<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.39 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-ohai-svcb-config-05" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.5 -->
  <front>
    <title abbrev="Oblivious Services in SVCB">Discovery of Oblivious Services via Service Binding Records</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-ohai-svcb-config-05"/>
    <author initials="T." surname="Pauly" fullname="Tommy Pauly">
      <organization>Apple Inc.</organization>
      <address>
        <email>tpauly@apple.com</email>
      </address>
    </author>
    <author initials="T." surname="Reddy" fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <date year="2023" month="August" day="07"/>
    <area>Security</area>
    <workgroup>Oblivious HTTP Application Intermediation</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 35?>

<t>This document defines a parameter that can be included in SVCB and HTTPS
DNS resource records to denote that a service is accessible using Oblivious
HTTP, by offering an Oblivious Gateway Resource through which to access the
target. This document also defines a mechanism to learn the key configuration
of the discovered Oblivious Gateway Resource.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-ohai-svcb-config/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Oblivious HTTP Application Intermediation Working Group mailing list (<eref target="mailto:ohai@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ohai/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/ohai/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-wg-ohai/draft-ohai-svcb-config"/>.</t>
    </note>
  </front>
  <middle>
    <?line 43?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Oblivious HTTP <xref target="OHTTP"/> allows clients to encrypt
messages exchanged with an Oblivious Target Resource (target). The messages
are encapsulated in encrypted messages to an Oblivious Gateway Resource
(gateway), which gates access to the target. The gateway is accessed via an
Oblivious Relay Resource (relay), which proxies the encapsulated messages
to hide the identity of the client. Overall, this architecture is designed
in such a way that the relay cannot inspect the contents of messages, and
the gateway and target cannot learn the client's identity from a single
transaction.</t>
      <t>Since Oblivious HTTP deployments typically involve very specific coordination
between clients, relays, and gateways, the key configuration is often shared
in a bespoke fashion. However, some deployments involve clients
discovering targets and their associated gateways more dynamically.
For example, a network might operate a DNS resolver that provides more optimized
or more relevant DNS answers and is accessible using Oblivious HTTP, and might
want to advertise support for Oblivious HTTP via mechanisms like Discovery of
Designated Resolvers (<xref target="DDR"/>). Clients can access these
gateways through trusted relays.</t>
      <t>This document defines a way to use DNS records to advertise that an HTTP service
supports Oblivious HTTP. This advertisement is a parameter that can be included in SVCB
and HTTPS DNS resource records <xref target="SVCB"/> (<xref target="svc-param"/>).
The presence of this parameter indicates that a service can act as a target and
has a gateway that can provide access to the target.</t>
      <t>The client learns the URI to use for the gateway using a well-known
URI <xref target="WELLKNOWN"/>, "ohttp-gateway", which is accessed on the
target (<xref target="gateway-location"/>). This means that for deployments that
support this kind of discovery, the gateway and target resources need to
be located on the same host.</t>
      <t>This document also defines a way to fetch an gateway's key
configuration from the gateway (<xref target="config-fetch"/>).</t>
      <t>This mechanism does not aid in the discovery of relays;
relay configuration is out of scope for this document. Models in which
this discovery mechanism is applicable are described in <xref target="applicability"/>.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="applicability">
      <name>Applicability</name>
      <t>There are multiple models in which the discovery mechanism defined
in this document can be used.</t>
      <ul spacing="normal">
        <li>Upgrading regular (non-proxied) HTTP to Oblivious HTTP. In this model,
the client intends to communicate with a specific target service, and
prefers to use Oblivious HTTP if it is available. The target service
has a gateway that it offers to allow access using Oblivious
HTTP. Once the client learns about the gateway, it "upgrades"
to using Oblivious HTTP to access the target service.</li>
        <li>Discovering alternative Oblivious HTTP services. In this model,
the client has a default target service that it uses. For
example, this may be a public DNS resolver that is accessible over
Oblivious HTTP. The client is willing to use alternative
target services if they are discovered, which may provide more
optimized or more relevant responses.</li>
      </ul>
      <t>In both of these deployment models, the client is configured with
a relay that it trusts for Oblivious HTTP transactions. This
relay either needs to provide generic access to gateways, or
provide a service to clients to allow them to check which gateways
are accessible.</t>
    </section>
    <section anchor="svc-param">
      <name>The ohttp SvcParamKey</name>
      <t>The "ohttp" SvcParamKey (<xref target="iana"/>) is used to indicate that a
service described in an SVCB record can be accessed as a target
using an associated gateway. The service that is queried by the client hosts
one or more target resources.</t>
      <t>In order to access the service's target resources using Oblivious HTTP, the client
needs to send encapsulated messages to the gateway resource and the gateway's
key configuration (both of which can be retrieved using the method described in
<xref target="config-fetch"/>).</t>
      <t>Both the presentation and wire format values for the "ohttp" parameter
<bcp14>MUST</bcp14> be empty.</t>
      <t>Services can include the "ohttp" parameter in the mandatory parameter
list if the service is only accessible using Oblivious HTTP. Marking
the "ohttp" parameter as mandatory will cause clients that do not
understand the parameter to ignore that SVCB record.
Including the "ohttp" parameter without marking it mandatory advertises
a service that is optionally available using Oblivious HTTP. Note also
that multiple SVCB records can be provided to indicate separate
configurations.</t>
      <t>The media type to use for encapsulated requests made to a target service
depends on the scheme of the SVCB record. This document defines the
interpretation for the "https" <xref target="SVCB"/> and "dns" <xref target="DNS-SVCB"/>
schemes. Other schemes that want to use this parameter <bcp14>MUST</bcp14> define the
interpretation and meaning of the configuration.</t>
      <section anchor="use-in-https-service-records">
        <name>Use in HTTPS service records</name>
        <t>For the "https" scheme, which uses the HTTPS RR type instead of SVCB,
the presence of the "ohttp" parameter means that the target
being described is an Oblivious HTTP service that is accessible using
the default "message/bhttp" media type <xref target="OHTTP"/>
          <xref target="BINARY-HTTP"/>.</t>
        <t>For example, an HTTPS service record for svc.example.com that supports
a Oblivious HTTP could look like this:</t>
        <artwork><![CDATA[
svc.example.com. 7200  IN HTTPS 1 . ( alpn=h2 ohttp )
]]></artwork>
        <t>A similar record for a service that only supports Oblivious HTTP
could look like this:</t>
        <artwork><![CDATA[
svc.example.com. 7200  IN HTTPS 1 . ( mandatory=ohttp ohttp )
]]></artwork>
      </section>
      <section anchor="use-in-dns-server-svcb-records">
        <name>Use in DNS server SVCB records</name>
        <t>For the "dns" scheme, as defined in <xref target="DNS-SVCB"/>, the presence of
the "ohttp" parameter means that the DNS server being
described has a DNS over HTTP (DoH) <xref target="DOH"/> service that can
be accessed using Oblivious HTTP. Requests to the resolver are sent to
the gateway using binary HTTP with the default "message/bhttp"
media type <xref target="BINARY-HTTP"/>, containing inner requests that use the
"application/dns-message" media type <xref target="DOH"/>.</t>
        <t>If the "ohttp" parameter is included in an DNS server SVCB record,
the "alpn" <bcp14>MUST</bcp14> include at least one HTTP value (such as "h2" or
"h3").</t>
        <t>In order for DoH-capable recursive resolvers to function as Oblivious HTTP targets, their
associated gateways need to be accessible via a client-trusted relay.
DoH recursive resolvers used with the discovery mechanisms described
in this section can either be publicly accessible, or specific to a
network. In general, only publicly accessible DoH recursive resolvers will work
as Oblivious HTTP targets, unless there is a coordinated deployment
with a relay to access the network-specific DoH recursive resolvers.</t>
        <section anchor="ddr">
          <name>Use with DDR</name>
          <t>Clients can discover that a DoH recursive resolvers support Oblivious HTTP using
DDR, either by querying _dns.resolver.arpa to a locally configured
resolver or by querying using the name of a resolver <xref target="DDR"/>.</t>
          <t>For example, a DoH service advertised over DDR can be annotated
as supporting resolution via Oblivious HTTP using the following record:</t>
          <artwork><![CDATA[
_dns.resolver.arpa  7200  IN SVCB 1 doh.example.net (
     alpn=h2 dohpath=/dns-query{?dns} ohttp )
]]></artwork>
          <t>Clients still need to perform verification of oblivious DoH servers,
specifically the TLS certificate checks described in <xref section="4.2" sectionFormat="of" target="DDR"/>.
Since the gateway and target resources for discovered oblivious services
need to be on the same host, this means that the client needs to verify
that the certificate presented by the gateway passes the required checks.
These checks can be performed when looking up the configuration on the gateway
as described in <xref target="config-fetch"/>, which can either be done directly
or via the relay or another proxy to avoid exposing client IP addresses.</t>
          <t>Opportunistic discovery <xref target="DDR"/>, where only the IP address is validated,
<bcp14>SHOULD NOT</bcp14> be used in general with Oblivious HTTP, since this mode
primarily exists to support resolvers that use private or local IP
addresses, which will usually not be accessible when using a
relay. If a configuration occurs where the resolver is accessible, but
cannot use certificate-based validation, the client needs to ensure
that the relay only accesses the gateway and target using
the unencrypted resolver's original IP address.</t>
          <t>For the case of DoH recursive resolvers, clients also need to ensure that they are not
being targeted with unique DoH paths that would reveal their identity. See
<xref target="security"/> for more discussion.</t>
        </section>
        <section anchor="dnr">
          <name>Use with DNR</name>
          <t>The SvcParamKeys defined in this document also can be used with Discovery
of Network-designated Resolvers (DNR) <xref target="DNR"/>. In this
case, the oblivious configuration and path parameters can be included
in DHCP and Router Advertisement messages.</t>
          <t>While DNR does not require the same kind of verification as DDR, clients
that learn about DoH recursive resolvers still need to ensure that they are not being
targeted with unique DoH paths that would reveal their identity. See <xref target="security"/>
for more discussion.</t>
        </section>
      </section>
    </section>
    <section anchor="gateway-location">
      <name>Gateway Location</name>
      <t>Once a client has discovered that a service supports Oblivious HTTP
via the "ohttp" parameter in a SVCB or HTTPS record, it needs to be
able to send requests via a relay to the correct gateway location.</t>
      <t>By default, the gateway for a target is defined as a well-known
resource (<xref target="WELLKNOWN"/>) on the target, "/.well-known/ohttp-gateway".</t>
      <t>Some servers might not want to operate the gateway on a well-known URI.
In such cases, these servers can use 3xx redirection responses
(<xref section="15.4" sectionFormat="of" target="HTTP"/>) to direct clients and relays to the correct
location of the gateway. Such redirects would apply both to requests
made to fetch key configurations (as defined in <xref target="config-fetch"/>) and to
encapsulated requests made via a relay.</t>
      <t>If a client receives a redirect when fetching the key configuration from the
well-known gateway resource, it <bcp14>MUST NOT</bcp14> communicate the redirected
gateway URI to the relay as the location of the gateway to use.
Doing so would allow the gateway to target clients by encoding
unique or client-identifying values in the redirected URI. Instead,
relays being used with dynamically discovered gateways <bcp14>MUST</bcp14> use the
well-known gateway resource and follow any redirects independently of
redirects that clients received. The relay can remember such redirects
across oblivious requests for all clients in order to avoid added latency.</t>
    </section>
    <section anchor="config-fetch">
      <name>Key Configuration Fetching</name>
      <t>Clients also need to know the key configuration of a gateway before encapsulating
and sending requests to the relay.</t>
      <t>In order to fetch the key configuration of a gateway discovered
in the manner described in <xref target="gateway-location"/>, the client issues a GET request
to the URI of the gateway specifying the "application/ohttp-keys" (<xref target="OHTTP"/>)
media type in the Accept header.</t>
      <t>For example, if the client knows an oblivious gateway URI,
"https://svc.example.com/.well-known/ohttp-gateway", it could fetch the
key configuration with the following request:</t>
      <artwork><![CDATA[
GET /.well-known/ohttp-gateway HTTP/1.1
Host: svc.example.com
Accept: application/ohttp-keys
]]></artwork>
      <t>Gateways that coordinate with targets that advertise Oblivious HTTP
support <bcp14>SHOULD</bcp14> support GET requests for their key configuration in this
manner, unless there is another out-of-band configuration model that is
usable by clients. Gateways respond with their key configuration in the
response body, with a content type of "application/ohttp-keys".</t>
      <t>Clients can either fetch this key configuration directly, or do so via
a proxy in order to avoid the server discovering information about the
client's identity. See <xref target="consistency"/> for more discussion of avoiding key
targeting attacks.</t>
    </section>
    <section anchor="security">
      <name>Security and Privacy Considerations</name>
      <t>Attackers on a network can remove SVCB information from cleartext DNS
answers that are not protected by DNSSEC <xref target="DNSSEC"/>. This
can effectively downgrade clients. However, since SVCB indications
for Oblivious HTTP support are just hints, a client can mitigate this by
always checking for a gateway configuration <xref target="config-fetch"/>
on the well-known gateway location <xref target="gateway-location"/>.
Use of encrypted DNS along with DNSSEC can also be used as a mitigation.</t>
      <t>When clients fetch a gateway's configuration (<xref target="config-fetch"/>),
they can expose their identity in the form of an IP address if they do not
connect via a proxy or some other IP-hiding mechanism. In some circumstances,
this might not be a privacy concern, since revealing that a particular
client IP address is preparing to use an Oblivious HTTP service can be
expected. However, if a client is otherwise trying to hide its IP
address or location (and not merely decouple its specific requests from its
IP address), or if revealing its IP address facilitates key targeting attacks
(if a gateway service uses IP addresses to associate specific configurations
with specific clients), a proxy or similar mechanism can be used to fetch
the gateway's configuration.</t>
      <t>When discovering designated oblivious DoH recursive resolvers using this mechanism,
clients need to ensure that the designation is trusted in lieu of
being able to directly check the contents of the gateway server's TLS
certificate. See <xref target="ddr"/> for more discussion, as well as the Security
Considerations of <xref target="DNS-SVCB"/>.</t>
      <section anchor="consistency">
        <name>Key Targeting Attacks</name>
        <t>As discussed in <xref target="OHTTP"/>, client requests using Oblivious HTTP
can only be linked by recognizing the key configuration. In order to
prevent unwanted linkability and tracking, clients using any key
configuration discovery mechanism need to be concerned with attacks
that target a specific user or population with a unique key configuration.</t>
        <t>There are several approaches clients can use to mitigate key targeting
attacks. <xref target="CONSISTENCY"/> provides an overview
of the options for ensuring the key configurations are consistent between
different clients. Clients <bcp14>SHOULD</bcp14> employ some technique to mitigate key
targeting attacks, such as the option of confirming the key with a shared
proxy as described in <xref target="CONSISTENCY"/>. If a client detects that a gateway
is using per-client targeted key configuration, the client can stop using
the gateway, and potentially report the targeting attack to let other
clients avoid using this gateway in the future.</t>
      </section>
      <section anchor="dohpath-targeting-attacks">
        <name>dohpath Targeting Attacks</name>
        <t>For oblivious DoH servers, an attacker could use unique <tt>dohpath</tt> values
to target or identify specific clients. This attack is very similar to
the generic OHTTP key targeting attack described above.</t>
        <t>Clients <bcp14>SHOULD</bcp14> mitigate such attacks. This can be done with a
check for consistency, such as using a mechanism described in <xref target="CONSISTENCY"/>
to validate the <tt>dohpath</tt> value with another source. It can also be
done by limiting the the allowable values of <tt>dohpath</tt> to a single
value, such as the commonly used "/dns-query{?dns}".</t>
      </section>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <section anchor="svcb-service-parameter">
        <name>SVCB Service Parameter</name>
        <t>This document adds the following entry to the SVCB Service Parameters
registry (<xref target="SVCB"/>).</t>
        <table>
          <thead>
            <tr>
              <th align="left">Number</th>
              <th align="left">Name</th>
              <th align="left">Meaning</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">8 (Early Allocation)</td>
              <td align="left">ohttp</td>
              <td align="left">Denotes that a service operates an Oblivious HTTP target</td>
              <td align="left">(This document)</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="well-known-uri">
        <name>Well-Known URI</name>
        <t>IANA is requested to add one new entry in the "Well-Known URIs" registry <xref target="WELLKNOWN"/>.</t>
        <t>URI suffix: ohttp-gateway</t>
        <t>Change controller: IETF</t>
        <t>Specification document: This document</t>
        <t>Status: permanent</t>
        <t>Related information: N/A</t>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="OHTTP">
          <front>
            <title>Oblivious HTTP</title>
            <author fullname="Martin Thomson" initials="M." surname="Thomson">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="27" month="July" year="2023"/>
            <abstract>
              <t>   This document describes a system for forwarding encrypted HTTP
   messages.  This allows a client to make multiple requests to an
   origin server without that server being able to link those requests
   to the client or to identify the requests as having come from the
   same client, while placing only limited trust in the nodes used to
   forward the messages.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ohai-ohttp-09"/>
        </reference>
        <reference anchor="DDR">
          <front>
            <title>Discovery of Designated Resolvers</title>
            <author fullname="Tommy Pauly" initials="T." surname="Pauly">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Eric Kinnear" initials="E." surname="Kinnear">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Patrick McManus" initials="P." surname="McManus">
              <organization>Fastly</organization>
            </author>
            <author fullname="Tommy Jensen" initials="T." surname="Jensen">
              <organization>Microsoft</organization>
            </author>
            <date day="5" month="August" year="2022"/>
            <abstract>
              <t>   This document defines Discovery of Designated Resolvers (DDR), a
   mechanism for DNS clients to use DNS records to discover a resolver's
   encrypted DNS configuration.  An encrypted DNS resolver discovered in
   this manner is referred to as a "Designated Resolver".  This
   mechanism can be used to move from unencrypted DNS to encrypted DNS
   when only the IP address of a resolver is known.  This mechanism is
   designed to be limited to cases where unencrypted DNS resolvers and
   their designated resolvers are operated by the same entity or
   cooperating entities.  It can also be used to discover support for
   encrypted DNS protocols when the name of an encrypted DNS resolver is
   known.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-add-ddr-10"/>
        </reference>
        <reference anchor="SVCB">
          <front>
            <title>Service binding and parameter specification via the DNS (DNS SVCB and HTTPS RRs)</title>
            <author fullname="Benjamin M. Schwartz" initials="B. M." surname="Schwartz">
              <organization>Google</organization>
            </author>
            <author fullname="Mike Bishop" initials="M." surname="Bishop">
              <organization>Akamai Technologies</organization>
            </author>
            <author fullname="Erik Nygren" initials="E." surname="Nygren">
              <organization>Akamai Technologies</organization>
            </author>
            <date day="11" month="March" year="2023"/>
            <abstract>
              <t>   This document specifies the "SVCB" and "HTTPS" DNS resource record
   (RR) types to facilitate the lookup of information needed to make
   connections to network services, such as for HTTP origins.  SVCB
   records allow a service to be provided from multiple alternative
   endpoints, each with associated parameters (such as transport
   protocol configuration), and are extensible to support future uses
   (such as keys for encrypting the TLS ClientHello).  They also enable
   aliasing of apex domains, which is not possible with CNAME.  The
   HTTPS RR is a variation of SVCB for use with HTTP [HTTP].  By
   providing more information to the client before it attempts to
   establish a connection, these records offer potential benefits to
   both performance and privacy.

   TO BE REMOVED: This document is being collaborated on in Github at:
   https://github.com/MikeBishop/dns-alt-svc
   (https://github.com/MikeBishop/dns-alt-svc).  The most recent working
   version of the document, open issues, etc. should all be available
   there.  The authors (gratefully) accept pull requests.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dnsop-svcb-https-12"/>
        </reference>
        <reference anchor="WELLKNOWN">
          <front>
            <title>Well-Known Uniform Resource Identifiers (URIs)</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <date month="May" year="2019"/>
            <abstract>
              <t>This memo defines a path prefix for "well-known locations", "/.well-known/", in selected Uniform Resource Identifier (URI) schemes.</t>
              <t>In doing so, it obsoletes RFC 5785 and updates the URI schemes defined in RFC 7230 to reserve that space. It also updates RFC 7595 to track URI schemes that support well-known URIs in their registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8615"/>
          <seriesInfo name="DOI" value="10.17487/RFC8615"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="DNS-SVCB">
          <front>
            <title>Service Binding Mapping for DNS Servers</title>
            <author fullname="Benjamin M. Schwartz" initials="B. M." surname="Schwartz">
              <organization>Meta Platforms, Inc.</organization>
            </author>
            <date day="26" month="June" year="2023"/>
            <abstract>
              <t>   The SVCB DNS resource record type expresses a bound collection of
   endpoint metadata, for use when establishing a connection to a named
   service.  DNS itself can be such a service, when the server is
   identified by a domain name.  This document provides the SVCB mapping
   for named DNS servers, allowing them to indicate support for
   encrypted transport protocols.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-add-svcb-dns-09"/>
        </reference>
        <reference anchor="BINARY-HTTP">
          <front>
            <title>Binary Representation of HTTP Messages</title>
            <author fullname="M. Thomson" initials="M." surname="Thomson"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document defines a binary format for representing HTTP messages.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9292"/>
          <seriesInfo name="DOI" value="10.17487/RFC9292"/>
        </reference>
        <reference anchor="DOH">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="DNR">
          <front>
            <title>DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers (DNR)</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dan Wing" initials="D." surname="Wing">
              <organization>Citrix Systems, Inc.</organization>
            </author>
            <author fullname="Neil Cook" initials="N." surname="Cook">
              <organization>Open-Xchange</organization>
            </author>
            <author fullname="Tommy Jensen" initials="T." surname="Jensen">
              <organization>Microsoft</organization>
            </author>
            <date day="27" month="April" year="2023"/>
            <abstract>
              <t>   The document specifies new DHCP and IPv6 Router Advertisement options
   to discover encrypted DNS resolvers (e.g., DNS-over-HTTPS, DNS-over-
   TLS, DNS-over-QUIC).  Particularly, it allows a host to learn an
   authentication domain name together with a list of IP addresses and a
   set of service parameters to reach such encrypted DNS resolvers.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-add-dnr-16"/>
        </reference>
        <reference anchor="HTTP">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="DNSSEC">
          <front>
            <title>DNS Security Introduction and Requirements</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>The Domain Name System Security Extensions (DNSSEC) add data origin authentication and data integrity to the Domain Name System. This document introduces these extensions and describes their capabilities and limitations. This document also discusses the services that the DNS security extensions do and do not provide. Last, this document describes the interrelationships between the documents that collectively describe DNSSEC. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4033"/>
          <seriesInfo name="DOI" value="10.17487/RFC4033"/>
        </reference>
        <reference anchor="CONSISTENCY">
          <front>
            <title>Key Consistency and Discovery</title>
            <author fullname="Alex Davidson" initials="A." surname="Davidson">
              <organization>Brave Software</organization>
            </author>
            <author fullname="Matthew Finkel" initials="M." surname="Finkel">
              <organization>The Tor Project</organization>
            </author>
            <author fullname="Martin Thomson" initials="M." surname="Thomson">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="10" month="July" year="2023"/>
            <abstract>
              <t>   This document describes the consistency requirements of protocols
   such as Privacy Pass, Oblivious DoH, and Oblivious HTTP for user
   privacy.  It presents definitions for consistency and then surveys
   mechanisms for providing consistency in varying threat models.  In
   concludes with discussion of open problems in this area.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-privacypass-key-consistency-01"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
