<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.7 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-lenders-core-dnr-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.20.0 -->
  <front>
    <title abbrev="CoRE DNR">Discovery of Network-designated CoRE Resolvers</title>
    <seriesInfo name="Internet-Draft" value="draft-lenders-core-dnr-00"/>
    <author fullname="Martine Sophie Lenders">
      <organization abbrev="TU Dresden">TUD Dresden University of Technology</organization>
      <address>
        <postal>
          <street>Helmholtzstr. 10</street>
          <city>Dresden</city>
          <code>D-01069</code>
          <country>Germany</country>
        </postal>
        <email>martine.lenders@tu-dresden.de</email>
      </address>
    </author>
    <author initials="C." surname="Amsüss" fullname="Christian Amsüss">
      <organization/>
      <address>
        <email>christian@amsuess.com</email>
      </address>
    </author>
    <author fullname="Thomas C. Schmidt">
      <organization>HAW Hamburg</organization>
      <address>
        <email>t.schmidt@haw-hamburg.de</email>
      </address>
    </author>
    <author initials="M." surname="Wählisch" fullname="Matthias Wählisch">
      <organization abbrev="TU Dresden &amp; Barkhausen Institut">TUD Dresden University of Technology &amp; Barkhausen Institut</organization>
      <address>
        <postal>
          <street>Helmholtzstr. 10</street>
          <city>Dresden</city>
          <code>D-01069</code>
          <country>Germany</country>
        </postal>
        <email>m.waehlisch@tu-dresden.de</email>
      </address>
    </author>
    <date year="2024" month="March" day="04"/>
    <area>Web and Internet Transport</area>
    <workgroup>Constrained RESTful Environments</workgroup>
    <keyword>CoRE</keyword>
    <keyword>CoAP</keyword>
    <keyword>DoC</keyword>
    <keyword>DNR</keyword>
    <keyword>SVCB</keyword>
    <abstract>
      <?line 80?>

<t>This document specifies solutions to discover DNS resolvers that support
encrypted DNS resolution in constrained environments. The discovery is
based DNS SVCB records, Router Advertisements, or DHCP. In particular, the proposed
specification allows a host to learn DNS over CoAP (DoC) servers, including
configurations to use DoC over TLS/DTLS, OSCORE, and EDHOC when
resolving names.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://anr-bmbf-pivot.github.io/draft-lenders-core-dnr/draft-lenders-core-dnr.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-lenders-core-dnr/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Constrained RESTful Environments Working Group mailing list (<eref target="mailto:core@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/core/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/core/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/anr-bmbf-pivot/draft-lenders-core-dnr"/>.</t>
    </note>
  </front>
  <middle>
    <?line 89?>

<section anchor="introduction">
      <name>Introduction</name>
      <t><xref target="RFC9461"/>, <xref target="RFC9462"/> and <xref target="RFC9463"/> specify options to discover DNS
resolvers that allow for encrypted DNS resolution, using either DNS or, in
a local network, Router Advertisements or DHCP.  These specifications use
Service Binding (SVCB) resource records or Service Parameters (SvcParams)
to carry information required for configuration of such resolvers.  So far,
however, only DNS transfer protocols based on Transport Layer Security
(TLS) are supported, namely DNS over TLS (DoT) <xref target="RFC7858"/>, DNS over HTTPS
(DoH) <xref target="RFC8484"/>, and DNS over Dedicated QUIC (DoQ) <xref target="RFC9250"/>. This document
discusses and specifies options to discover DNS resolvers in constrained
environments, mainly based on DNS over CoAP (DoC) <xref target="I-D.ietf-core-dns-over-coap"/>.</t>
      <t>DoC provides a solution for encrypted DNS in constrained environments.  In
such scenarios, the usage of DoT, DoH, DoQ, or similar TLS-based solutions
is often not possible.
The Constrained Application Protocol (CoAP) <xref target="RFC7252"/>, the transfer protocol for DoC, is mostly
agnostic to the transport layer, i.e., CoAP can be transported over UDP, TCP, or WebSockets
<xref target="RFC8323"/>, and even less common transports such as Bluetooth GATT <xref target="I-D.amsuess-core-coap-over-gatt"/> or SMS
<xref target="lwm2m"/> are discussed.</t>
      <t>CoAP offers three security modes, which would need to be covered by the SvcParams:</t>
      <ul spacing="normal">
        <li>
          <t><strong>No Security:</strong> This plain CoAP mode does not support any encryption. It
is not recommended when using <xref target="I-D.ietf-core-dns-over-coap"/> but inherits core CoAP features
such as block-wise transfer <xref target="RFC7959"/> for datagram-based
segmentation.  Such features are beneficial in constrained settings even
without encryption.</t>
        </li>
        <li>
          <t><strong>Transport Security:</strong> CoAP may use DTLS when transferred over UDP <xref target="RFC7252"/> and TLS when
transferred over TCP <xref target="RFC8323"/>.</t>
        </li>
        <li>
          <t><strong>Object Security:</strong> Securing content objects can be achieved using
OSCORE <xref target="RFC8613"/>. OSCORE can be used either as an alternative or in
addition to transport security.  </t>
          <t>
OSCORE keys have a limited lifetime and need to be set up,
for example through an EDHOC key exchange <xref target="I-D.ietf-core-oscore-edhoc"/>,
which may use credentials from trusted ACE Authorization Server (AS)
as described in the ACE EDHOC profile <xref target="I-D.ietf-ace-edhoc-oscore-profile"/>.
As an alternative to EDHOC,
keys can be set up by such an AS as described in the ACE OSCORE profile <xref target="RFC9203"/>.</t>
        </li>
      </ul>
      <t>To discover a DoC server via Discovery of Designated Resolvers (DDR) <xref target="RFC9462"/> and
Discovery of Network-designated Resolvers (DNR) <xref target="RFC9463"/>, the SvcParams
field needs to convey both transfer protocol and type and
parameters of the security parameters. We will specify extensions of SvcParams in
this document.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The terms “DoC server” and “DoC client” are used as defined in <xref target="I-D.ietf-core-dns-over-coap"/>.</t>
      <t>The terms “constrained node” and "constrained network" are used as defined in <xref target="RFC7228"/>.</t>
      <t>SvcParams denotes the field in either DNS SVCB/HTTPS records as defined in <xref target="RFC9460"/>, or DHCP and RA
messages as defined in <xref target="RFC9463"/>. SvcParamKeys are used as defined in <xref target="RFC9460"/>.</t>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="problem-space">
      <name>Problem Space</name>
      <t>The first and most important question to ask for the discoverability of DoC resolvers is if and what
new SvcParamKeys need to be defined.</t>
      <t><xref target="RFC9460"/> defines the “alpn” key, which is used to identify the protocol suite of a service binding
using its Application-Layer Protocol Negotiation (ALPN) ID <xref target="RFC7301"/>. While this is useful to
identify classic transport layer security, the question is raised if this is needed or even helpful
for when there is only object security. There is an ALPN ID for CoAP over TLS that was defined in
<xref target="RFC8323"/>. As using the same ALPN ID for different transport layers is not recommended, an ALPN for CoAP over UDP is being requested in <xref target="iana"/>. Object security
may be selected in addition to transport layer security, so defining an ALPN ID for each
combination might not be viable or scalable. For some ways of setting up object security, additional information is
needed for the establishment of an encryption context and for authentication with an authentication
server (AS). Orthogonally to the security mechanism, the transfer protocol needs to be established.</t>
      <t>Beyond the SvcParamKeys, there is the question of what the field values of the Encrypted DNS Options defined
in <xref target="RFC9463"/> might be with EDHOC or ACE EDHOC. While most fields map,
“authentication-domain-name” (ADN) and its corresponding ADN length field may not matter in ACE driven cases.</t>
      <t>Out of scope of this document are related issues adjacent to its problem space.
they are listed both for conceptual delimitation,
and to aid in discussion of more comprehensive solutions:</t>
      <ul spacing="normal">
        <li>
          <t>There is ongoing work in addressing the trouble created by CoAP using a diverse set of URI schemes
in the shape of <tt>coap+...</tt>, such as <tt>coap+tcp</tt> <xref target="I-D.ietf-core-transport-indication"/>.
The creation of URI authority values that express the content of SVCB records together with IP literals
is part of the solution space that will be explored there.</t>
        </li>
        <li>
          <t>Route Advertisements (RAs) as used in <xref target="RFC9463"/> can easily exceed the link layer fragmentation threshold of constrained networks.
The presence of DNR information in an RA can contribute to that issue.</t>
        </li>
      </ul>
    </section>
    <section anchor="solution-sketches">
      <name>Solution Sketches</name>
      <t>To answer the raised questions, we first look at the general case then 4 base scenarios, from which
other scenarios might be a combination of:</t>
      <ul spacing="normal">
        <li>
          <t>Unencrypted DoC,</t>
        </li>
        <li>
          <t>DoC over TLS/DTLS,</t>
        </li>
        <li>
          <t>DoC over OSCORE using EDHOC, and</t>
        </li>
        <li>
          <t>DoC over OSCORE using ACE-EDHOC.</t>
        </li>
      </ul>
      <t>In the general case, we mostly need to answer the question for additional SvcParamKeys. <xref target="RFC9460"/>
defines the keys “mandatory”, “alpn”, “no-default-alpn”, “port”, “ipv4hint”, and “ipv6hint” were
defined. Additionally, <xref target="RFC9461"/> defines “dohpath” which carries the URI template for the
DNS resource at the DoH server in relative form.</t>
      <t>For DoC, the DNS resource needs to be identified as, so a corresponding “docpath” key should be
provided that provides either a relative URI or CRI <xref target="I-D.ietf-core-href"/>. Since the URI-Path option in CoAP may
be omitted (defaulting to the root path), this could also be done for the “docpath”.</t>
      <section anchor="sec_solution-unencrypted">
        <name>Unencrypted DoC</name>
        <t>While unencrypted DoC is not recommended by <xref target="I-D.ietf-core-dns-over-coap"/> and might not even be viable using DDR/DNR, it
provides additional benefits not provided by classic unencrypted DNS over UDP, such as segmentation
block-wise transfer <xref target="RFC7959"/>. However, it provides the simplest DoC configuration and thus is
here discussed.</t>
        <t>At minimum for a DoC server a way to identify the following keys are required. “docpath” (see
above), an optional “port” (see <xref target="RFC9460"/>), the IP address (either with an optional
“ipv6hint”/“ipv4hint” or the respective IP address field in <xref target="RFC9463"/>), and a yet to be defined
SvcParamKey for the CoAP transfer protocol, e.g., “coaptransfer”. The latter can be used to identify
the service binding as a CoAP service binding.</t>
        <t>The “authenticator-domain-name” field should remain empty as it does not serve a purpose without
encryption.</t>
        <t>See this example for the possible values of a DNR option:</t>
        <artwork><![CDATA[
authenticator-domain-name: ""
ipv6-address: <DoC server address>
svc-params:
 - coaptransfer="tcp"
 - docpath="/dns"
 - port=61616
]]></artwork>
      </section>
      <section anchor="sec_solution-tls">
        <name>DoC over TLS/DTLS</name>
        <t>In addition to the SvcParamKeys proposed in <xref target="sec_solution-unencrypted"/>, this scenario needs the
“alpn” key. While there is a “coap” ALPN ID defined, it only identifies CoAP over TLS <xref target="RFC8323"/>.
As such, a new ALPN ID for CoAP over DTLS is required.</t>
        <t>See this example for the possible values of a DNR option:</t>
        <artwork><![CDATA[
authenticator-domain-name: "dns.example.com"
ipv6-address: <DoC server address>
svc-params:
 - alpn="co"
 - docpath="/dns"
]]></artwork>
        <t>Note that “coaptransfer” is not needed, as it is implied by the ALPN ID;
thus, no values for it would be allocated for transfer protocols that use transport security.</t>
      </section>
      <section anchor="doc-over-oscore-using-edhoc">
        <name>DoC over OSCORE using EDHOC</name>
        <t>While the “alpn” SvcParamKey is needed for the transport layer security (see <xref target="sec_solution-tls"/>),
we can implement a CA-style authentication with EDHOC when using object security with OSCORE using
the authenticator-domain-name field.</t>
        <t>A new key SvcParamKey “objectsecurity” identifies the type of object security, using the value
"edhoc" in this scenario.</t>
        <t>See this example for the possible values of a DNR option:</t>
        <artwork><![CDATA[
authenticator-domain-name: "dns.example.com"
ipv6-address: <DoC server address>
svc-params:
 - coaptransfer="udp",
 - objectsecurity="edhoc",
 - docpath="/dns",
 - port=61616
]]></artwork>
        <t>The use of objectsecurity="edhoc" with an authenticator-domain-name and no further ACE details indicates
that the client can use CA based authentication of the server.</t>
      </section>
      <section anchor="doc-over-ace-oscore">
        <name>DoC over ACE-OSCORE</name>
        <t>Using ACE, we require an OAuth context to authenticate the server in addition to the
“objectsecurity” key. We propose three keys “oauth-aud” for the audience, “oauth-scope” for the
OAuth scope, and “auth-as” for the authentication server. “oauth-aud” should be the valid domain
name of the DoC server, “oauth-scope” a list of identifiers for the scope, and “oauth-as” a valid
URI or CRI.</t>
        <t>TBD: should oauth-scope be expressed at all?</t>
        <t>Since authentication is done over OAuth and not CA-style, the “authenticator-domain-name” is not
needed. There might be merit, however, to use it instead of the “oauth-aud” SvcParamKey.</t>
        <t>See this example for the possible values of a DNR option:</t>
        <sourcecode type="~"><![CDATA[
authenticator-domain-name: ""
ipv6-address: <DoC server address>
svc-params:
 - coaptransfer="tcp"
 - objectsecurity="edhoc" /* TBD: or ace-edhoc? */
 - docpath="/dns",
 - port=61616,
 - oauth-aud="dns.example.com",
 - oauth-scope="resolve DNS"
 - oauth-as="coap://as.example.com"
]]></sourcecode>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <section anchor="tls-alpn-for-coap">
        <name>TLS ALPN for CoAP</name>
        <t>The following entry is being requested for addition into the
"TLS Application-Layer Protocol Negotiation (ALPN) Protocol IDs" registry,
which is part of the "Transport Layer Security (TLS) Extensions" group.</t>
        <ul spacing="normal">
          <li>
            <t>Protocol: CoAP (over DTLS)</t>
          </li>
          <li>
            <t>Identification sequence: 0x63 0x6f ("co")</t>
          </li>
          <li>
            <t>Reference: <xref target="RFC7252"/> and [this document]</t>
          </li>
        </ul>
        <t>Note that <xref target="RFC7252"/> does not prescribe the use of the ALPN TLS extension during connection the DTLS handshake.
This document does not change that, and thus does not establish any rules like those in <xref section="8.2" sectionFormat="of" target="RFC8323"/>.</t>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC7301">
          <front>
            <title>Transport Layer Security (TLS) Application-Layer Protocol Negotiation Extension</title>
            <author fullname="S. Friedl" initials="S." surname="Friedl"/>
            <author fullname="A. Popov" initials="A." surname="Popov"/>
            <author fullname="A. Langley" initials="A." surname="Langley"/>
            <author fullname="E. Stephan" initials="E." surname="Stephan"/>
            <date month="July" year="2014"/>
            <abstract>
              <t>This document describes a Transport Layer Security (TLS) extension for application-layer protocol negotiation within the TLS handshake. For instances in which multiple application protocols are supported on the same TCP or UDP port, this extension allows the application layer to negotiate which protocol will be used within the TLS connection.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7301"/>
          <seriesInfo name="DOI" value="10.17487/RFC7301"/>
        </reference>
        <reference anchor="RFC8613">
          <front>
            <title>Object Security for Constrained RESTful Environments (OSCORE)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Mattsson" initials="J." surname="Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <date month="July" year="2019"/>
            <abstract>
              <t>This document defines Object Security for Constrained RESTful Environments (OSCORE), a method for application-layer protection of the Constrained Application Protocol (CoAP), using CBOR Object Signing and Encryption (COSE). OSCORE provides end-to-end protection between endpoints communicating using CoAP or CoAP-mappable HTTP. OSCORE is designed for constrained nodes and networks supporting a range of proxy operations, including translation between different transport protocols.</t>
              <t>Although an optional functionality of CoAP, OSCORE alters CoAP options processing and IANA registration. Therefore, this document updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8613"/>
          <seriesInfo name="DOI" value="10.17487/RFC8613"/>
        </reference>
        <reference anchor="RFC9460">
          <front>
            <title>Service Binding and Parameter Specification via the DNS (SVCB and HTTPS Resource Records)</title>
            <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
            <author fullname="M. Bishop" initials="M." surname="Bishop"/>
            <author fullname="E. Nygren" initials="E." surname="Nygren"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies the "SVCB" ("Service Binding") and "HTTPS" DNS resource record (RR) types to facilitate the lookup of information needed to make connections to network services, such as for HTTP origins. SVCB records allow a service to be provided from multiple alternative endpoints, each with associated parameters (such as transport protocol configuration), and are extensible to support future uses (such as keys for encrypting the TLS ClientHello). They also enable aliasing of apex domains, which is not possible with CNAME. The HTTPS RR is a variation of SVCB for use with HTTP (see RFC 9110, "HTTP Semantics"). By providing more information to the client before it attempts to establish a connection, these records offer potential benefits to both performance and privacy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9460"/>
          <seriesInfo name="DOI" value="10.17487/RFC9460"/>
        </reference>
        <reference anchor="RFC9461">
          <front>
            <title>Service Binding Mapping for DNS Servers</title>
            <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>The SVCB DNS resource record type expresses a bound collection of endpoint metadata, for use when establishing a connection to a named service. DNS itself can be such a service, when the server is identified by a domain name. This document provides the SVCB mapping for named DNS servers, allowing them to indicate support for encrypted transport protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9461"/>
          <seriesInfo name="DOI" value="10.17487/RFC9461"/>
        </reference>
        <reference anchor="RFC9462">
          <front>
            <title>Discovery of Designated Resolvers</title>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="E. Kinnear" initials="E." surname="Kinnear"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <author fullname="T. Jensen" initials="T." surname="Jensen"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document defines Discovery of Designated Resolvers (DDR), a set of mechanisms for DNS clients to use DNS records to discover a resolver's encrypted DNS configuration. An Encrypted DNS Resolver discovered in this manner is referred to as a "Designated Resolver". These mechanisms can be used to move from unencrypted DNS to encrypted DNS when only the IP address of a resolver is known. These mechanisms are designed to be limited to cases where Unencrypted DNS Resolvers and their Designated Resolvers are operated by the same entity or cooperating entities. It can also be used to discover support for encrypted DNS protocols when the name of an Encrypted DNS Resolver is known.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9462"/>
          <seriesInfo name="DOI" value="10.17487/RFC9462"/>
        </reference>
        <reference anchor="RFC9463">
          <front>
            <title>DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers (DNR)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="T. Reddy.K" initials="T." role="editor" surname="Reddy.K"/>
            <author fullname="D. Wing" initials="D." surname="Wing"/>
            <author fullname="N. Cook" initials="N." surname="Cook"/>
            <author fullname="T. Jensen" initials="T." surname="Jensen"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies new DHCP and IPv6 Router Advertisement options to discover encrypted DNS resolvers (e.g., DNS over HTTPS, DNS over TLS, and DNS over QUIC). Particularly, it allows a host to learn an Authentication Domain Name together with a list of IP addresses and a set of service parameters to reach such encrypted DNS resolvers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9463"/>
          <seriesInfo name="DOI" value="10.17487/RFC9463"/>
        </reference>
        <reference anchor="I-D.ietf-core-dns-over-coap">
          <front>
            <title>DNS over CoAP (DoC)</title>
            <author fullname="Martine Sophie Lenders" initials="M. S." surname="Lenders">
              <organization>TUD Dresden University of Technology</organization>
            </author>
            <author fullname="Christian Amsüss" initials="C." surname="Amsüss">
         </author>
            <author fullname="Cenk Gündoğan" initials="C." surname="Gündoğan">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Thomas C. Schmidt" initials="T. C." surname="Schmidt">
              <organization>HAW Hamburg</organization>
            </author>
            <author fullname="Matthias Wählisch" initials="M." surname="Wählisch">
              <organization>TUD Dresden University of Technology &amp; Barkhausen Institut</organization>
            </author>
            <date day="17" month="November" year="2023"/>
            <abstract>
              <t>   This document defines a protocol for sending DNS messages over the
   Constrained Application Protocol (CoAP).  These CoAP messages are
   protected by DTLS-Secured CoAP (CoAPS) or Object Security for
   Constrained RESTful Environments (OSCORE) to provide encrypted DNS
   message exchange for constrained devices in the Internet of Things
   (IoT).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-dns-over-coap-05"/>
        </reference>
        <reference anchor="I-D.ietf-core-oscore-edhoc">
          <front>
            <title>Using Ephemeral Diffie-Hellman Over COSE (EDHOC) with the Constrained Application Protocol (CoAP) and Object Security for Constrained RESTful Environments (OSCORE)</title>
            <author fullname="Francesca Palombini" initials="F." surname="Palombini">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Rikard Höglund" initials="R." surname="Höglund">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Stefan Hristozov" initials="S." surname="Hristozov">
              <organization>Fraunhofer AISEC</organization>
            </author>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson</organization>
            </author>
            <date day="29" month="November" year="2023"/>
            <abstract>
              <t>   The lightweight authenticated key exchange protocol Ephemeral Diffie-
   Hellman Over COSE (EDHOC) can be run over the Constrained Application
   Protocol (CoAP) and used by two peers to establish a Security Context
   for the security protocol Object Security for Constrained RESTful
   Environments (OSCORE).  This document details this use of the EDHOC
   protocol, by specifying a number of additional and optional
   mechanisms.  These especially include an optimization approach for
   combining the execution of EDHOC with the first OSCORE transaction.
   This combination reduces the number of round trips required to set up
   an OSCORE Security Context and to complete an OSCORE transaction
   using that Security Context.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-oscore-edhoc-10"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC7228">
          <front>
            <title>Terminology for Constrained-Node Networks</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="M. Ersue" initials="M." surname="Ersue"/>
            <author fullname="A. Keranen" initials="A." surname="Keranen"/>
            <date month="May" year="2014"/>
            <abstract>
              <t>The Internet Protocol Suite is increasingly used on small devices with severe constraints on power, memory, and processing resources, creating constrained-node networks. This document provides a number of basic terms that have been useful in the standardization work for constrained-node networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7228"/>
          <seriesInfo name="DOI" value="10.17487/RFC7228"/>
        </reference>
        <reference anchor="RFC7858">
          <front>
            <title>Specification for DNS over Transport Layer Security (TLS)</title>
            <author fullname="Z. Hu" initials="Z." surname="Hu"/>
            <author fullname="L. Zhu" initials="L." surname="Zhu"/>
            <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="D. Wessels" initials="D." surname="Wessels"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
              <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7858"/>
          <seriesInfo name="DOI" value="10.17487/RFC7858"/>
        </reference>
        <reference anchor="RFC7959">
          <front>
            <title>Block-Wise Transfers in the Constrained Application Protocol (CoAP)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="Z. Shelby" initials="Z." role="editor" surname="Shelby"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a RESTful transfer protocol for constrained nodes and networks. Basic CoAP messages work well for small payloads from sensors and actuators; however, applications will need to transfer larger payloads occasionally -- for instance, for firmware updates. In contrast to HTTP, where TCP does the grunt work of segmenting and resequencing, CoAP is based on datagram transports such as UDP or Datagram Transport Layer Security (DTLS). These transports only offer fragmentation, which is even more problematic in constrained nodes and networks, limiting the maximum size of resource representations that can practically be transferred.</t>
              <t>Instead of relying on IP fragmentation, this specification extends basic CoAP with a pair of "Block" options for transferring multiple blocks of information from a resource representation in multiple request-response pairs. In many important cases, the Block options enable a server to be truly stateless: the server can handle each block transfer separately, with no need for a connection setup or other server-side memory of previous block transfers. Essentially, the Block options provide a minimal way to transfer larger representations in a block-wise fashion.</t>
              <t>A CoAP implementation that does not support these options generally is limited in the size of the representations that can be exchanged, so there is an expectation that the Block options will be widely used in CoAP implementations. Therefore, this specification updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7959"/>
          <seriesInfo name="DOI" value="10.17487/RFC7959"/>
        </reference>
        <reference anchor="RFC8323">
          <front>
            <title>CoAP (Constrained Application Protocol) over TCP, TLS, and WebSockets</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="S. Lemay" initials="S." surname="Lemay"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="B. Silverajan" initials="B." surname="Silverajan"/>
            <author fullname="B. Raymor" initials="B." role="editor" surname="Raymor"/>
            <date month="February" year="2018"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP), although inspired by HTTP, was designed to use UDP instead of TCP. The message layer of CoAP over UDP includes support for reliable delivery, simple congestion control, and flow control.</t>
              <t>Some environments benefit from the availability of CoAP carried over reliable transports such as TCP or Transport Layer Security (TLS). This document outlines the changes required to use CoAP over TCP, TLS, and WebSockets transports. It also formally updates RFC 7641 for use with these transports and RFC 7959 to enable the use of larger messages over a reliable transport.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8323"/>
          <seriesInfo name="DOI" value="10.17487/RFC8323"/>
        </reference>
        <reference anchor="RFC8484">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="RFC9250">
          <front>
            <title>DNS over Dedicated QUIC Connections</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>This document describes the use of QUIC to provide transport confidentiality for DNS. The encryption provided by QUIC has similar properties to those provided by TLS, while QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides more efficient packet-loss recovery than UDP. DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC 7858, and latency characteristics similar to classic DNS over UDP. This specification describes the use of DoQ as a general-purpose transport for DNS and includes the use of DoQ for stub to recursive, recursive to authoritative, and zone transfer scenarios.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9250"/>
          <seriesInfo name="DOI" value="10.17487/RFC9250"/>
        </reference>
        <reference anchor="RFC9203">
          <front>
            <title>The Object Security for Constrained RESTful Environments (OSCORE) Profile of the Authentication and Authorization for Constrained Environments (ACE) Framework</title>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="M. Gunnarsson" initials="M." surname="Gunnarsson"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document specifies a profile for the Authentication and Authorization for Constrained Environments (ACE) framework. It utilizes Object Security for Constrained RESTful Environments (OSCORE) to provide communication security and proof-of-possession for a key owned by the client and bound to an OAuth 2.0 access token.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9203"/>
          <seriesInfo name="DOI" value="10.17487/RFC9203"/>
        </reference>
        <reference anchor="I-D.amsuess-core-coap-over-gatt">
          <front>
            <title>CoAP over GATT (Bluetooth Low Energy Generic Attributes)</title>
            <author fullname="Christian Amsüss" initials="C." surname="Amsüss">
         </author>
            <date day="23" month="October" year="2023"/>
            <abstract>
              <t>   Interaction from computers and cell phones to constrained devices is
   limited by the different network technologies used, and by the
   available APIs.  This document describes a transport for the
   Constrained Application Protocol (CoAP) that uses Bluetooth GATT
   (Generic Attribute Profile) and its use cases.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-amsuess-core-coap-over-gatt-05"/>
        </reference>
        <reference anchor="I-D.ietf-ace-edhoc-oscore-profile">
          <front>
            <title>Ephemeral Diffie-Hellman Over COSE (EDHOC) and Object Security for Constrained Environments (OSCORE) Profile for Authentication and Authorization for Constrained Environments (ACE)</title>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE</organization>
            </author>
            <author fullname="Rikard Höglund" initials="R." surname="Höglund">
              <organization>RISE</organization>
            </author>
            <date day="23" month="October" year="2023"/>
            <abstract>
              <t>   This document specifies a profile for the Authentication and
   Authorization for Constrained Environments (ACE) framework.  It
   utilizes Ephemeral Diffie-Hellman Over COSE (EDHOC) for achieving
   mutual authentication between an OAuth 2.0 Client and Resource
   Server, and it binds an authentication credential of the Client to an
   OAuth 2.0 access token.  EDHOC also establishes an Object Security
   for Constrained RESTful Environments (OSCORE) Security Context, which
   is used to secure communications when accessing protected resources
   according to the authorization information indicated in the access
   token.  This profile can be used to delegate management of
   authorization information from a resource-constrained server to a
   trusted host with less severe limitations regarding processing power
   and memory.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ace-edhoc-oscore-profile-03"/>
        </reference>
        <reference anchor="I-D.ietf-core-href">
          <front>
            <title>Constrained Resource Identifiers</title>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <date day="9" month="January" year="2024"/>
            <abstract>
              <t>   The Constrained Resource Identifier (CRI) is a complement to the
   Uniform Resource Identifier (URI) that represents the URI components
   in Concise Binary Object Representation (CBOR) instead of a sequence
   of characters.  This simplifies parsing, comparison, and reference
   resolution in environments with severe limitations on processing
   power, code size, and memory size.


   // (This "cref" paragraph will be removed by the RFC editor:) The
   // present revision –14 of this draft picks up comments from the
   // shepherd review and adds sections on CoAP integration and on cri
   // application-oriented literals for the Extended Diagnostic
   // Notation.  This revision still contains open issues and is
   // intended to serve as a snapshot while the processing of the
   // shepherd review is being completed.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-href-14"/>
        </reference>
        <reference anchor="lwm2m" target="https://omaspecworks.org/white-paper-lightweight-m2m-1-1/">
          <front>
            <title>White Paper – Lightweight M2M 1.1</title>
            <author>
              <organization>OMA SpecWorks</organization>
            </author>
            <date year="2018" month="October"/>
          </front>
        </reference>
        <reference anchor="I-D.ietf-core-transport-indication">
          <front>
            <title>CoAP Protocol Indication</title>
            <author fullname="Christian Amsüss" initials="C." surname="Amsüss">
         </author>
            <date day="23" month="October" year="2023"/>
            <abstract>
              <t>   The Constrained Application Protocol (CoAP, [RFC7252]) is available
   over different transports (UDP, DTLS, TCP, TLS, WebSockets), but
   lacks a way to unify these addresses.  This document provides
   terminology and provisions based on Web Linking [RFC8288] to express
   alternative transports available to a device, and to optimize
   exchanges using these.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-transport-indication-03"/>
        </reference>
      </references>
    </references>
    <?line 332?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
