<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.8 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-lenders-core-dnr-01" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.20.1 -->
  <front>
    <title abbrev="CoRE DNR">Discovery of Network-designated CoRE Resolvers</title>
    <seriesInfo name="Internet-Draft" value="draft-lenders-core-dnr-01"/>
    <author fullname="Martine Sophie Lenders">
      <organization abbrev="TU Dresden">TUD Dresden University of Technology</organization>
      <address>
        <postal>
          <street>Helmholtzstr. 10</street>
          <city>Dresden</city>
          <code>D-01069</code>
          <country>Germany</country>
        </postal>
        <email>martine.lenders@tu-dresden.de</email>
      </address>
    </author>
    <author initials="C." surname="Amsüss" fullname="Christian Amsüss">
      <organization/>
      <address>
        <email>christian@amsuess.com</email>
      </address>
    </author>
    <author fullname="Thomas C. Schmidt">
      <organization>HAW Hamburg</organization>
      <address>
        <email>t.schmidt@haw-hamburg.de</email>
      </address>
    </author>
    <author initials="M." surname="Wählisch" fullname="Matthias Wählisch">
      <organization abbrev="TU Dresden &amp; Barkhausen Institut">TUD Dresden University of Technology &amp; Barkhausen Institut</organization>
      <address>
        <postal>
          <street>Helmholtzstr. 10</street>
          <city>Dresden</city>
          <code>D-01069</code>
          <country>Germany</country>
        </postal>
        <email>m.waehlisch@tu-dresden.de</email>
      </address>
    </author>
    <date year="2024" month="March" day="19"/>
    <area>Web and Internet Transport</area>
    <workgroup>Constrained RESTful Environments</workgroup>
    <keyword>CoRE</keyword>
    <keyword>CoAP</keyword>
    <keyword>DoC</keyword>
    <keyword>DNR</keyword>
    <keyword>SVCB</keyword>
    <abstract>
      <?line 80?>

<t>This document specifies solutions to discover DNS resolvers that support
encrypted DNS resolution in constrained environments. The discovery is
based DNS SVCB records, Router Advertisements, or DHCP. In particular, the proposed
specification allows a host to learn DNS over CoAP (DoC) servers, including
configurations to use DoC over TLS/DTLS, OSCORE, and EDHOC when
resolving names.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://anr-bmbf-pivot.github.io/draft-lenders-core-dnr/draft-lenders-core-dnr.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-lenders-core-dnr/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Constrained RESTful Environments Working Group mailing list (<eref target="mailto:core@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/core/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/core/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/anr-bmbf-pivot/draft-lenders-core-dnr"/>.</t>
    </note>
  </front>
  <middle>
    <?line 89?>

<section anchor="introduction">
      <name>Introduction</name>
      <t><xref target="RFC9461"/>, <xref target="RFC9462"/> and <xref target="RFC9463"/> specify options to discover DNS
resolvers that allow for encrypted DNS resolution, using either DNS or, in
a local network, Router Advertisements or DHCP.  These specifications use
Service Binding (SVCB) resource records or Service Parameters (SvcParams)
to carry information required for configuration of such resolvers.  So far,
however, only DNS transfer protocols based on Transport Layer Security
(TLS) are supported, namely DNS over TLS (DoT) <xref target="RFC7858"/>, DNS over HTTPS
(DoH) <xref target="RFC8484"/>, and DNS over Dedicated QUIC (DoQ) <xref target="RFC9250"/>. This document
discusses and specifies options to discover DNS resolvers in constrained
environments, mainly based on DNS over CoAP (DoC) <xref target="I-D.ietf-core-dns-over-coap"/>.</t>
      <t>DoC provides a solution for encrypted DNS in constrained environments.  In
such scenarios, the usage of DoT, DoH, DoQ, or similar TLS-based solutions
is often not possible.
The Constrained Application Protocol (CoAP) <xref target="RFC7252"/>, the transfer protocol for DoC, is mostly
agnostic to the transport layer, i.e., CoAP can be transported over UDP, TCP, or WebSockets
<xref target="RFC8323"/>, and even less common transports such as Bluetooth GATT <xref target="I-D.amsuess-core-coap-over-gatt"/> or SMS
<xref target="lwm2m"/> are discussed.</t>
      <t>CoAP offers three security modes, which would need to be covered by the SvcParams:</t>
      <ul spacing="normal">
        <li>
          <t><strong>No Security:</strong> This plain CoAP mode does not support any encryption. It
is not recommended when using <xref target="I-D.ietf-core-dns-over-coap"/> but inherits core CoAP features
such as block-wise transfer <xref target="RFC7959"/> for datagram-based
segmentation.  Such features are beneficial in constrained settings even
without encryption.</t>
        </li>
        <li>
          <t><strong>Transport Security:</strong> CoAP may use DTLS when transferred over UDP <xref target="RFC7252"/> and TLS when
transferred over TCP <xref target="RFC8323"/>.</t>
        </li>
        <li>
          <t><strong>Object Security:</strong> Securing content objects can be achieved using
OSCORE <xref target="RFC8613"/>. OSCORE can be used either as an alternative or in
addition to transport security.  </t>
          <t>
OSCORE keys have a limited lifetime and need to be set up,
for example through an EDHOC key exchange <xref target="I-D.ietf-core-oscore-edhoc"/>,
which may use credentials from trusted ACE Authorization Server (AS)
as described in the ACE EDHOC profile <xref target="I-D.ietf-ace-edhoc-oscore-profile"/>.
As an alternative to EDHOC,
keys can be set up by such an AS as described in the ACE OSCORE profile <xref target="RFC9203"/>.</t>
        </li>
      </ul>
      <t>To discover a DoC server via Discovery of Designated Resolvers (DDR) <xref target="RFC9462"/> and
Discovery of Network-designated Resolvers (DNR) <xref target="RFC9463"/>, the SvcParams
field needs to convey both transfer protocol and type and
parameters of the security parameters. We will specify extensions of SvcParams in
this document.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The terms “DoC server” and “DoC client” are used as defined in <xref target="I-D.ietf-core-dns-over-coap"/>.</t>
      <t>The terms “constrained node” and "constrained network" are used as defined in <xref target="RFC7228"/>.</t>
      <t>SvcParams denotes the field in either DNS SVCB/HTTPS records as defined in <xref target="RFC9460"/>, or DHCP and RA
messages as defined in <xref target="RFC9463"/>. SvcParamKeys are used as defined in <xref target="RFC9460"/>.</t>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="problem-space">
      <name>Problem Space</name>
      <t>The first and most important question to ask for the discoverability of DoC resolvers is if and what
new SvcParamKeys need to be defined.</t>
      <t><xref target="RFC9460"/> defines the “alpn” key, which is used to identify the protocol suite of a service binding
using its Application-Layer Protocol Negotiation (ALPN) ID <xref target="RFC7301"/>. While this is useful to
identify classic transport layer security, the question is raised if this is needed or even helpful
for when there is only object security. There is an ALPN ID for CoAP over TLS that was defined in
<xref target="RFC8323"/>. As using the same ALPN ID for different transport layers is not recommended, an ALPN for CoAP over UDP is being requested in <xref target="iana"/>. Object security
may be selected in addition to transport layer security, so defining an ALPN ID for each
combination might not be viable or scalable. For some ways of setting up object security, additional information is
needed for the establishment of an encryption context and for authentication with an authentication
server (AS). Orthogonally to the security mechanism, the transfer protocol needs to be established.</t>
      <t>Beyond the SvcParamKeys, there is the question of what the field values of the Encrypted DNS Options defined
in <xref target="RFC9463"/> might be with EDHOC or ACE EDHOC. While most fields map,
“authentication-domain-name” (ADN) and its corresponding ADN length field may not matter in ACE driven cases.</t>
      <t>Out of scope of this document are related issues adjacent to its problem space.
they are listed both for conceptual delimitation,
and to aid in discussion of more comprehensive solutions:</t>
      <ul spacing="normal">
        <li>
          <t>There is ongoing work in addressing the trouble created by CoAP using a diverse set of URI schemes
in the shape of <tt>coap+...</tt>, such as <tt>coap+tcp</tt> <xref target="I-D.ietf-core-transport-indication"/>.
The creation of URI authority values that express the content of SVCB records together with IP literals
is part of the solution space that will be explored there.</t>
        </li>
        <li>
          <t>Route Advertisements (RAs) as used in <xref target="RFC9463"/> can easily exceed the link layer fragmentation threshold of constrained networks.
The presence of DNR information in an RA can contribute to that issue.</t>
        </li>
      </ul>
    </section>
    <section anchor="solution-sketches">
      <name>Solution Sketches</name>
      <t>To answer the raised questions, we first look at the general case then 4 base scenarios, from which
other scenarios might be a combination of:</t>
      <ul spacing="normal">
        <li>
          <t>Unencrypted DoC,</t>
        </li>
        <li>
          <t>DoC over TLS/DTLS,</t>
        </li>
        <li>
          <t>DoC over OSCORE using EDHOC, and</t>
        </li>
        <li>
          <t>DoC over OSCORE using ACE-EDHOC.</t>
        </li>
      </ul>
      <t>In the general case, we mostly need to answer the question for additional SvcParamKeys. <xref target="RFC9460"/>
defines the keys “mandatory”, “alpn”, “no-default-alpn”, “port”, “ipv4hint”, and “ipv6hint” were
defined. Additionally, <xref target="RFC9461"/> defines “dohpath” which carries the URI template for the
DNS resource at the DoH server in relative form.</t>
      <t>For DoC, the DNS resource needs to be identified as, so a corresponding “docpath” key should be
provided that provides either a relative URI or CRI <xref target="I-D.ietf-core-href"/>. Since the URI-Path option in CoAP may
be omitted (defaulting to the root path), this could also be done for the “docpath”.</t>
      <section anchor="sec_solution-unencrypted">
        <name>Unencrypted DoC</name>
        <t>While unencrypted DoC is not recommended by <xref target="I-D.ietf-core-dns-over-coap"/> and might not even be viable using DDR/DNR, it
provides additional benefits not provided by classic unencrypted DNS over UDP, such as segmentation
block-wise transfer <xref target="RFC7959"/>. However, it provides the simplest DoC configuration and thus is
here discussed.</t>
        <t>At minimum for a DoC server a way to identify the following keys are required. “docpath” (see
above), an optional “port” (see <xref target="RFC9460"/>), the IP address (either with an optional
“ipv6hint”/“ipv4hint” or the respective IP address field in <xref target="RFC9463"/>), and a yet to be defined
SvcParamKey for the CoAP transfer protocol, e.g., “coaptransfer”. The latter can be used to identify
the service binding as a CoAP service binding.</t>
        <t>The “authenticator-domain-name” field should remain empty as it does not serve a purpose without
encryption.</t>
        <t>See this example for the possible values of a DNR option:</t>
        <artwork><![CDATA[
authenticator-domain-name: ""
ipv6-address: <DoC server address>
svc-params:
 - coaptransfer="tcp"
 - docpath="/dns"
 - port=61616
]]></artwork>
      </section>
      <section anchor="sec_solution-tls">
        <name>DoC over TLS/DTLS</name>
        <t>In addition to the SvcParamKeys proposed in <xref target="sec_solution-unencrypted"/>, this scenario needs the
“alpn” key. While there is a “coap” ALPN ID defined, it only identifies CoAP over TLS <xref target="RFC8323"/>.
As such, a new ALPN ID for CoAP over DTLS is required.</t>
        <t>See this example for the possible values of a DNR option:</t>
        <artwork><![CDATA[
authenticator-domain-name: "dns.example.com"
ipv6-address: <DoC server address>
svc-params:
 - alpn="co"
 - docpath="/dns"
]]></artwork>
        <t>Note that “coaptransfer” is not needed, as it is implied by the ALPN ID;
thus, no values for it would be allocated for transfer protocols that use transport security.</t>
      </section>
      <section anchor="doc-over-oscore-using-edhoc">
        <name>DoC over OSCORE using EDHOC</name>
        <t>While the “alpn” SvcParamKey is needed for the transport layer security (see <xref target="sec_solution-tls"/>),
we can implement a CA-style authentication with EDHOC when using object security with OSCORE using
the authenticator-domain-name field.</t>
        <t>A new key SvcParamKey “objectsecurity” identifies the type of object security, using the value
"edhoc" in this scenario.</t>
        <t>See this example for the possible values of a DNR option:</t>
        <artwork><![CDATA[
authenticator-domain-name: "dns.example.com"
ipv6-address: <DoC server address>
svc-params:
 - coaptransfer="udp",
 - objectsecurity="edhoc",
 - docpath="/dns",
 - port=61616
]]></artwork>
        <t>The use of objectsecurity="edhoc" with an authenticator-domain-name and no further ACE details indicates
that the client can use CA based authentication of the server.</t>
      </section>
      <section anchor="doc-over-ace-oscore">
        <name>DoC over ACE-OSCORE</name>
        <t>Using ACE, we require an OAuth context to authenticate the server in addition to the
“objectsecurity” key. We propose three keys “oauth-aud” for the audience, “oauth-scope” for the
OAuth scope, and “auth-as” for the authentication server. “oauth-aud” should be the valid domain
name of the DoC server, “oauth-scope” a list of identifiers for the scope, and “oauth-as” a valid
URI or CRI.</t>
        <t>TBD: should oauth-scope be expressed at all?</t>
        <t>Since authentication is done over OAuth and not CA-style, the “authenticator-domain-name” is not
needed. There might be merit, however, to use it instead of the “oauth-aud” SvcParamKey.</t>
        <t>See this example for the possible values of a DNR option:</t>
        <sourcecode type="~"><![CDATA[
authenticator-domain-name: ""
ipv6-address: <DoC server address>
svc-params:
 - coaptransfer="tcp"
 - objectsecurity="edhoc" /* TBD: or ace-edhoc? */
 - docpath="/dns",
 - port=61616,
 - oauth-aud="dns.example.com",
 - oauth-scope="resolve DNS"
 - oauth-as="coap://as.example.com"
]]></sourcecode>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <section anchor="tls-alpn-for-coap">
        <name>TLS ALPN for CoAP</name>
        <t>The following entry has been added to the
"TLS Application-Layer Protocol Negotiation (ALPN) Protocol IDs" registry,
which is part of the "Transport Layer Security (TLS) Extensions" group.</t>
        <ul spacing="normal">
          <li>
            <t>Protocol: CoAP (over DTLS)</t>
          </li>
          <li>
            <t>Identification sequence: 0x63 0x6f ("co")</t>
          </li>
          <li>
            <t>Reference: <xref target="RFC7252"/> and [this document]</t>
          </li>
        </ul>
        <t>Note that <xref target="RFC7252"/> does not prescribe the use of the ALPN TLS extension during connection the DTLS handshake.
This document does not change that, and thus does not establish any rules like those in <xref section="8.2" sectionFormat="of" target="RFC8323"/>.</t>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC7301">
          <front>
            <title>Transport Layer Security (TLS) Application-Layer Protocol Negotiation Extension</title>
            <author fullname="S. Friedl" initials="S." surname="Friedl"/>
            <author fullname="A. Popov" initials="A." surname="Popov"/>
            <author fullname="A. Langley" initials="A." surname="Langley"/>
            <author fullname="E. Stephan" initials="E." surname="Stephan"/>
            <date month="July" year="2014"/>
            <abstract>
              <t>This document describes a Transport Layer Security (TLS) extension for application-layer protocol negotiation within the TLS handshake. For instances in which multiple application protocols are supported on the same TCP or UDP port, this extension allows the application layer to negotiate which protocol will be used within the TLS connection.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7301"/>
          <seriesInfo name="DOI" value="10.17487/RFC7301"/>
        </reference>
        <reference anchor="RFC8613">
          <front>
            <title>Object Security for Constrained RESTful Environments (OSCORE)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Mattsson" initials="J." surname="Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <date month="July" year="2019"/>
            <abstract>
              <t>This document defines Object Security for Constrained RESTful Environments (OSCORE), a method for application-layer protection of the Constrained Application Protocol (CoAP), using CBOR Object Signing and Encryption (COSE). OSCORE provides end-to-end protection between endpoints communicating using CoAP or CoAP-mappable HTTP. OSCORE is designed for constrained nodes and networks supporting a range of proxy operations, including translation between different transport protocols.</t>
              <t>Although an optional functionality of CoAP, OSCORE alters CoAP options processing and IANA registration. Therefore, this document updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8613"/>
          <seriesInfo name="DOI" value="10.17487/RFC8613"/>
        </reference>
        <reference anchor="RFC9460">
          <front>
            <title>Service Binding and Parameter Specification via the DNS (SVCB and HTTPS Resource Records)</title>
            <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
            <author fullname="M. Bishop" initials="M." surname="Bishop"/>
            <author fullname="E. Nygren" initials="E." surname="Nygren"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies the "SVCB" ("Service Binding") and "HTTPS" DNS resource record (RR) types to facilitate the lookup of information needed to make connections to network services, such as for HTTP origins. SVCB records allow a service to be provided from multiple alternative endpoints, each with associated parameters (such as transport protocol configuration), and are extensible to support future uses (such as keys for encrypting the TLS ClientHello). They also enable aliasing of apex domains, which is not possible with CNAME. The HTTPS RR is a variation of SVCB for use with HTTP (see RFC 9110, "HTTP Semantics"). By providing more information to the client before it attempts to establish a connection, these records offer potential benefits to both performance and privacy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9460"/>
          <seriesInfo name="DOI" value="10.17487/RFC9460"/>
        </reference>
        <reference anchor="RFC9461">
          <front>
            <title>Service Binding Mapping for DNS Servers</title>
            <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>The SVCB DNS resource record type expresses a bound collection of endpoint metadata, for use when establishing a connection to a named service. DNS itself can be such a service, when the server is identified by a domain name. This document provides the SVCB mapping for named DNS servers, allowing them to indicate support for encrypted transport protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9461"/>
          <seriesInfo name="DOI" value="10.17487/RFC9461"/>
        </reference>
        <reference anchor="RFC9462">
          <front>
            <title>Discovery of Designated Resolvers</title>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="E. Kinnear" initials="E." surname="Kinnear"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <author fullname="T. Jensen" initials="T." surname="Jensen"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document defines Discovery of Designated Resolvers (DDR), a set of mechanisms for DNS clients to use DNS records to discover a resolver's encrypted DNS configuration. An Encrypted DNS Resolver discovered in this manner is referred to as a "Designated Resolver". These mechanisms can be used to move from unencrypted DNS to encrypted DNS when only the IP address of a resolver is known. These mechanisms are designed to be limited to cases where Unencrypted DNS Resolvers and their Designated Resolvers are operated by the same entity or cooperating entities. It can also be used to discover support for encrypted DNS protocols when the name of an Encrypted DNS Resolver is known.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9462"/>
          <seriesInfo name="DOI" value="10.17487/RFC9462"/>
        </reference>
        <reference anchor="RFC9463">
          <front>
            <title>DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers (DNR)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="T. Reddy.K" initials="T." role="editor" surname="Reddy.K"/>
            <author fullname="D. Wing" initials="D." surname="Wing"/>
            <author fullname="N. Cook" initials="N." surname="Cook"/>
            <author fullname="T. Jensen" initials="T." surname="Jensen"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies new DHCP and IPv6 Router Advertisement options to discover encrypted DNS resolvers (e.g., DNS over HTTPS, DNS over TLS, and DNS over QUIC). Particularly, it allows a host to learn an Authentication Domain Name together with a list of IP addresses and a set of service parameters to reach such encrypted DNS resolvers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9463"/>
          <seriesInfo name="DOI" value="10.17487/RFC9463"/>
        </reference>
        <reference anchor="I-D.ietf-core-dns-over-coap">
          <front>
            <title>DNS over CoAP (DoC)</title>
            <author fullname="Martine Sophie Lenders" initials="M. S." surname="Lenders">
              <organization>TUD Dresden University of Technology</organization>
            </author>
            <author fullname="Christian Amsüss" initials="C." surname="Amsüss">
         </author>
            <author fullname="Cenk Gündoğan" initials="C." surname="Gündoğan">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Thomas C. Schmidt" initials="T. C." surname="Schmidt">
              <organization>HAW Hamburg</organization>
            </author>
            <author fullname="Matthias Wählisch" initials="M." surname="Wählisch">
              <organization>TUD Dresden University of Technology &amp; Barkhausen Institut</organization>
            </author>
            <date day="4" month="March" year="2024"/>
            <abstract>
              <t>   This document defines a protocol for sending DNS messages over the
   Constrained Application Protocol (CoAP).  These CoAP messages are
   protected by DTLS-Secured CoAP (CoAPS) or Object Security for
   Constrained RESTful Environments (OSCORE) to provide encrypted DNS
   message exchange for constrained devices in the Internet of Things
   (IoT).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-dns-over-coap-06"/>
        </reference>
        <reference anchor="I-D.ietf-core-oscore-edhoc">
          <front>
            <title>Using Ephemeral Diffie-Hellman Over COSE (EDHOC) with the Constrained Application Protocol (CoAP) and Object Security for Constrained RESTful Environments (OSCORE)</title>
            <author fullname="Francesca Palombini" initials="F." surname="Palombini">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Rikard Höglund" initials="R." surname="Höglund">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Stefan Hristozov" initials="S." surname="Hristozov">
              <organization>Fraunhofer AISEC</organization>
            </author>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson</organization>
            </author>
            <date day="29" month="November" year="2023"/>
            <abstract>
              <t>   The lightweight authenticated key exchange protocol Ephemeral Diffie-
   Hellman Over COSE (EDHOC) can be run over the Constrained Application
   Protocol (CoAP) and used by two peers to establish a Security Context
   for the security protocol Object Security for Constrained RESTful
   Environments (OSCORE).  This document details this use of the EDHOC
   protocol, by specifying a number of additional and optional
   mechanisms.  These especially include an optimization approach for
   combining the execution of EDHOC with the first OSCORE transaction.
   This combination reduces the number of round trips required to set up
   an OSCORE Security Context and to complete an OSCORE transaction
   using that Security Context.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-oscore-edhoc-10"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC7228">
          <front>
            <title>Terminology for Constrained-Node Networks</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="M. Ersue" initials="M." surname="Ersue"/>
            <author fullname="A. Keranen" initials="A." surname="Keranen"/>
            <date month="May" year="2014"/>
            <abstract>
              <t>The Internet Protocol Suite is increasingly used on small devices with severe constraints on power, memory, and processing resources, creating constrained-node networks. This document provides a number of basic terms that have been useful in the standardization work for constrained-node networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7228"/>
          <seriesInfo name="DOI" value="10.17487/RFC7228"/>
        </reference>
        <reference anchor="RFC7858">
          <front>
            <title>Specification for DNS over Transport Layer Security (TLS)</title>
            <author fullname="Z. Hu" initials="Z." surname="Hu"/>
            <author fullname="L. Zhu" initials="L." surname="Zhu"/>
            <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="D. Wessels" initials="D." surname="Wessels"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
              <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7858"/>
          <seriesInfo name="DOI" value="10.17487/RFC7858"/>
        </reference>
        <reference anchor="RFC7959">
          <front>
            <title>Block-Wise Transfers in the Constrained Application Protocol (CoAP)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="Z. Shelby" initials="Z." role="editor" surname="Shelby"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a RESTful transfer protocol for constrained nodes and networks. Basic CoAP messages work well for small payloads from sensors and actuators; however, applications will need to transfer larger payloads occasionally -- for instance, for firmware updates. In contrast to HTTP, where TCP does the grunt work of segmenting and resequencing, CoAP is based on datagram transports such as UDP or Datagram Transport Layer Security (DTLS). These transports only offer fragmentation, which is even more problematic in constrained nodes and networks, limiting the maximum size of resource representations that can practically be transferred.</t>
              <t>Instead of relying on IP fragmentation, this specification extends basic CoAP with a pair of "Block" options for transferring multiple blocks of information from a resource representation in multiple request-response pairs. In many important cases, the Block options enable a server to be truly stateless: the server can handle each block transfer separately, with no need for a connection setup or other server-side memory of previous block transfers. Essentially, the Block options provide a minimal way to transfer larger representations in a block-wise fashion.</t>
              <t>A CoAP implementation that does not support these options generally is limited in the size of the representations that can be exchanged, so there is an expectation that the Block options will be widely used in CoAP implementations. Therefore, this specification updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7959"/>
          <seriesInfo name="DOI" value="10.17487/RFC7959"/>
        </reference>
        <reference anchor="RFC8323">
          <front>
            <title>CoAP (Constrained Application Protocol) over TCP, TLS, and WebSockets</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="S. Lemay" initials="S." surname="Lemay"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="B. Silverajan" initials="B." surname="Silverajan"/>
            <author fullname="B. Raymor" initials="B." role="editor" surname="Raymor"/>
            <date month="February" year="2018"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP), although inspired by HTTP, was designed to use UDP instead of TCP. The message layer of CoAP over UDP includes support for reliable delivery, simple congestion control, and flow control.</t>
              <t>Some environments benefit from the availability of CoAP carried over reliable transports such as TCP or Transport Layer Security (TLS). This document outlines the changes required to use CoAP over TCP, TLS, and WebSockets transports. It also formally updates RFC 7641 for use with these transports and RFC 7959 to enable the use of larger messages over a reliable transport.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8323"/>
          <seriesInfo name="DOI" value="10.17487/RFC8323"/>
        </reference>
        <reference anchor="RFC8484">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="RFC9250">
          <front>
            <title>DNS over Dedicated QUIC Connections</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>This document describes the use of QUIC to provide transport confidentiality for DNS. The encryption provided by QUIC has similar properties to those provided by TLS, while QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides more efficient packet-loss recovery than UDP. DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC 7858, and latency characteristics similar to classic DNS over UDP. This specification describes the use of DoQ as a general-purpose transport for DNS and includes the use of DoQ for stub to recursive, recursive to authoritative, and zone transfer scenarios.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9250"/>
          <seriesInfo name="DOI" value="10.17487/RFC9250"/>
        </reference>
        <reference anchor="RFC9203">
          <front>
            <title>The Object Security for Constrained RESTful Environments (OSCORE) Profile of the Authentication and Authorization for Constrained Environments (ACE) Framework</title>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="M. Gunnarsson" initials="M." surname="Gunnarsson"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document specifies a profile for the Authentication and Authorization for Constrained Environments (ACE) framework. It utilizes Object Security for Constrained RESTful Environments (OSCORE) to provide communication security and proof-of-possession for a key owned by the client and bound to an OAuth 2.0 access token.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9203"/>
          <seriesInfo name="DOI" value="10.17487/RFC9203"/>
        </reference>
        <reference anchor="I-D.amsuess-core-coap-over-gatt">
          <front>
            <title>CoAP over GATT (Bluetooth Low Energy Generic Attributes)</title>
            <author fullname="Christian Amsüss" initials="C." surname="Amsüss">
         </author>
            <date day="18" month="March" year="2024"/>
            <abstract>
              <t>   Interaction from computers and cell phones to constrained devices is
   limited by the different network technologies used, and by the
   available APIs.  This document describes a transport for the
   Constrained Application Protocol (CoAP) that uses Bluetooth GATT
   (Generic Attribute Profile) and its use cases.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-amsuess-core-coap-over-gatt-06"/>
        </reference>
        <reference anchor="I-D.ietf-ace-edhoc-oscore-profile">
          <front>
            <title>Ephemeral Diffie-Hellman Over COSE (EDHOC) and Object Security for Constrained Environments (OSCORE) Profile for Authentication and Authorization for Constrained Environments (ACE)</title>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE</organization>
            </author>
            <author fullname="Rikard Höglund" initials="R." surname="Höglund">
              <organization>RISE</organization>
            </author>
            <date day="4" month="March" year="2024"/>
            <abstract>
              <t>   This document specifies a profile for the Authentication and
   Authorization for Constrained Environments (ACE) framework.  It
   utilizes Ephemeral Diffie-Hellman Over COSE (EDHOC) for achieving
   mutual authentication between an ACE-OAuth Client and Resource
   Server, and it binds an authentication credential of the Client to an
   ACE-OAuth access token.  EDHOC also establishes an Object Security
   for Constrained RESTful Environments (OSCORE) Security Context, which
   is used to secure communications when accessing protected resources
   according to the authorization information indicated in the access
   token.  This profile can be used to delegate management of
   authorization information from a resource-constrained server to a
   trusted host with less severe limitations regarding processing power
   and memory.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ace-edhoc-oscore-profile-04"/>
        </reference>
        <reference anchor="I-D.ietf-core-href">
          <front>
            <title>Constrained Resource Identifiers</title>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <date day="9" month="January" year="2024"/>
            <abstract>
              <t>   The Constrained Resource Identifier (CRI) is a complement to the
   Uniform Resource Identifier (URI) that represents the URI components
   in Concise Binary Object Representation (CBOR) instead of a sequence
   of characters.  This simplifies parsing, comparison, and reference
   resolution in environments with severe limitations on processing
   power, code size, and memory size.


   // (This "cref" paragraph will be removed by the RFC editor:) The
   // present revision –14 of this draft picks up comments from the
   // shepherd review and adds sections on CoAP integration and on cri
   // application-oriented literals for the Extended Diagnostic
   // Notation.  This revision still contains open issues and is
   // intended to serve as a snapshot while the processing of the
   // shepherd review is being completed.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-href-14"/>
        </reference>
        <reference anchor="lwm2m" target="https://omaspecworks.org/white-paper-lightweight-m2m-1-1/">
          <front>
            <title>White Paper – Lightweight M2M 1.1</title>
            <author>
              <organization>OMA SpecWorks</organization>
            </author>
            <date year="2018" month="October"/>
          </front>
        </reference>
        <reference anchor="I-D.ietf-core-transport-indication">
          <front>
            <title>CoAP Transport Indication</title>
            <author fullname="Christian Amsüss" initials="C." surname="Amsüss">
         </author>
            <author fullname="Martine Sophie Lenders" initials="M. S." surname="Lenders">
              <organization>TUD Dresden University of Technology</organization>
            </author>
            <date day="18" month="March" year="2024"/>
            <abstract>
              <t>   The Constrained Application Protocol (CoAP, [RFC7252]) is available
   over different transports (UDP, DTLS, TCP, TLS, WebSockets), but
   lacks a way to unify these addresses.  This document provides
   terminology and provisions based on Web Linking [RFC8288] to express
   alternative transports available to a device, and to optimize
   exchanges using these.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-transport-indication-05"/>
        </reference>
      </references>
    </references>
    <?line 332?>

<section anchor="change-log">
      <name>Change Log</name>
      <section anchor="since-draft-lenders-core-dnr-00">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-lenders-core-dnr-00">draft-lenders-core-dnr-00</eref></name>
        <ul spacing="normal">
          <li>
            <t>IANA has processed the "co" ALPN and it is now added to the registry</t>
          </li>
        </ul>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
