<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.23 (Ruby 3.3.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-lenders-core-dnr-04" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.26.0 -->
  <front>
    <title abbrev="CoRE DNR">Discovery of Network-designated OSCORE-based Resolvers: Problem Statement</title>
    <seriesInfo name="Internet-Draft" value="draft-lenders-core-dnr-04"/>
    <author fullname="Martine Sophie Lenders">
      <organization abbrev="TU Dresden">TUD Dresden University of Technology</organization>
      <address>
        <postal>
          <street>Helmholtzstr. 10</street>
          <city>Dresden</city>
          <code>D-01069</code>
          <country>Germany</country>
        </postal>
        <email>martine.lenders@tu-dresden.de</email>
      </address>
    </author>
    <author initials="C." surname="Amsüss" fullname="Christian Amsüss">
      <organization/>
      <address>
        <email>christian@amsuess.com</email>
      </address>
    </author>
    <author fullname="Thomas C. Schmidt">
      <organization>HAW Hamburg</organization>
      <address>
        <email>t.schmidt@haw-hamburg.de</email>
      </address>
    </author>
    <author initials="M." surname="Wählisch" fullname="Matthias Wählisch">
      <organization abbrev="TU Dresden &amp; Barkhausen Institut">TUD Dresden University of Technology &amp; Barkhausen Institut</organization>
      <address>
        <postal>
          <street>Helmholtzstr. 10</street>
          <city>Dresden</city>
          <code>D-01069</code>
          <country>Germany</country>
        </postal>
        <email>m.waehlisch@tu-dresden.de</email>
      </address>
    </author>
    <date year="2025" month="February" day="05"/>
    <area>Web and Internet Transport</area>
    <workgroup>Constrained RESTful Environments</workgroup>
    <keyword>CoRE</keyword>
    <keyword>CoAP</keyword>
    <keyword>DoC</keyword>
    <keyword>DNR</keyword>
    <keyword>SVCB</keyword>
    <abstract>
      <?line 82?>

<t>This document states problems when designing DNS SVCB records to discover endpoints that communicate over
Object Security for Constrained RESTful Environments (OSCORE) <xref target="RFC8613"/>.
As a consequence of learning about OSCORE, this discovery will allow a host to learn both CoAP servers and DNS over CoAP resolvers that use OSCORE to encrypt messages and Ephemeral Diffie-Hellman Over COSE (EDHOC) <xref target="RFC9528"/> for key exchange.
Challenges arise because SVCB records are not meant to be used to exchange security contexts, which is required in OSCORE scenarios.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://anr-bmbf-pivot.github.io/draft-lenders-core-dnr/draft-lenders-core-dnr.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-lenders-core-dnr/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Constrained RESTful Environments Working Group mailing list (<eref target="mailto:core@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/core/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/core/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/anr-bmbf-pivot/draft-lenders-core-dnr"/>.</t>
    </note>
  </front>
  <middle>
    <?line 89?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The discovery of Internet services can be facilitated by the Domain Name System (DNS).
To discover services of the constrained Internet of Things (IoT) using the DNS, two challenges must be solved.
First, the discovery of a DNS resolver that supports DNS resolution based on secure, IoT-friendly protocols—otherwise the subsequent discovery of IoT-tailored services would be limited to resolution protocols conflicting with constrained resources.
Second, the discovery of an IoT-friendly service beyond the DNS resolution.</t>
      <t><xref target="RFC9460"/> specifies the "SVCB" ("Service Binding") DNS resource record to lookup information needed to connect to a network service. Service Parameters (SvcParams) carry
that information within the SVCB record.</t>
      <t>The discovery of DNS resolvers can be enabled by the DNS itself <xref target="RFC9461"/>, <xref target="RFC9462"/> or, in a local network, by Router Advertisements and DHCP <xref target="RFC9463"/>.
In all theses cases, the SvcParams is used, but supports only DNS transfer based on Transport Layer Security (TLS), namely DNS over TLS (DoT) <xref target="RFC7858"/>, DNS over HTTPS (DoH) <xref target="RFC8484"/>, and DNS over Dedicated QUIC (DoQ) <xref target="RFC9250"/>.
The use of DoT, DoH, or DoQ, however, is not recommended in IoT scenarios.</t>
      <t>DNS over CoAP <xref target="I-D.ietf-core-dns-over-coap"/> provides a solution for encrypted DNS in constrained environments.
The Constrained Application Protocol (CoAP) <xref target="RFC7252"/> is mostly agnostic to the transport layer CoAP can be transported over UDP, TCP, or WebSockets <xref target="RFC8323"/>, and even less common transports such as Bluetooth GATT <xref target="I-D.amsuess-core-coap-over-gatt"/> or SMS <xref target="lwm2m"/> are discussed.
<xref target="I-D.ietf-core-transport-indication"/> covers the selection of different CoAP transports using SVCB records.</t>
      <t>CoAP offers three security modes:</t>
      <ul spacing="normal">
        <li>
          <t><strong>No Security:</strong> This plain CoAP mode does not support any encryption. It
is not recommended when using <xref target="I-D.ietf-core-dns-over-coap"/> but inherits core CoAP features
such as block-wise transfer <xref target="RFC7959"/> for datagram-based
segmentation.  Such features are beneficial in constrained settings even
without encryption.</t>
        </li>
        <li>
          <t><strong>Transport Security:</strong> CoAP may use DTLS when transferred over UDP <xref target="RFC7252"/> and TLS when transferred over TCP <xref target="RFC8323"/>.</t>
        </li>
        <li>
          <t><strong>Object Security:</strong> Securing content objects can be achieved using
OSCORE <xref target="RFC8613"/>. OSCORE can be used either as an alternative or in
addition to transport security.  </t>
          <t>
OSCORE keys have a limited lifetime and need to be set up.
Keys can be established through an EDHOC key exchange <xref target="RFC9528"/>,
received from an ACE Authorization Server (AS, as described in the ACE OSCORE profile <xref target="RFC9203"/>),
or through a combination of those (established with an EDHOC peer whose public key is confirmed by an AS, using the ACE EDHOC profile <xref target="I-D.ietf-ace-edhoc-oscore-profile"/>).</t>
        </li>
      </ul>
      <t>The SVCB-based discovery of a CoAP service in mode "no security" is covered in <xref target="I-D.ietf-core-transport-indication"/>, and a CoAP service in the mode "transport security" in <xref target="I-D.ietf-core-coap-dtls-alpn"/>.
The discovery of CoAP services in mode "object security" is not specified.
To guide future specifications, this document clarifies aspects when using SVCB in the context of CoAP and object security.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The terms "DoC server" and "DoC client" are used as defined in <xref target="I-D.ietf-core-dns-over-coap"/>.</t>
      <t>The terms "constrained node" and "constrained network" are used as defined in <xref target="RFC7228"/>.</t>
      <t>SvcParams denotes the field in either DNS SVCB/HTTPS records as defined in <xref target="RFC9460"/>, or DHCP and RA
messages as defined in <xref target="RFC9463"/>. SvcParamKeys are used as defined in <xref target="RFC9460"/>.</t>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="problem-space">
      <name>Problem Space</name>
      <t>The first and most important point of discussion for the discoverability of CoAP is if and what
new SvcParamKeys need to be defined and what is already there.</t>
      <t><xref target="RFC9460"/> defines the "alpn" key, which is used to identify the protocol suite of a service binding
using its Application-Layer Protocol Negotiation (ALPN) ID <xref target="RFC7301"/>. While this is useful to
identify classic transport layer security, the question is raised if this is needed or even helpful
for when there is only object security. There is an ALPN ID for CoAP over TLS that is defined in
<xref target="RFC8323"/>. As using the same ALPN ID for different transport layers is not recommended, another
ALPN ID for CoAP over DTLS is introduced in <xref target="I-D.ietf-core-coap-dtls-alpn"/>. Object security may be
selected in addition to transport layer security or without it. Additionally, different
CoAP transports can be selected, which may be orthogonal to the transport security.
For instance, DTLS can be used over transports other than UDP. The selection of CoAP transport
protocols will be covered in future versions of <xref target="I-D.ietf-core-transport-indication"/>. Defining an ALPN ID for each
combination of object security, mode of transport layer security, and transport protocol might not
be viable or scalable. For some ways of setting up object security, additional information is
needed, such as an establishment options for an encryption context with EDHOC or an authentication
server (AS) with ACE.</t>
      <t>Beyond the SvcParamKeys, there is the question of what the field values of the Encrypted DNS Options
defined in <xref target="RFC9463"/> might be with EDHOC or ACE EDHOC. While most fields map,
"authentication-domain-name" (ADN) and its corresponding ADN length field may not matter
when authentication is driven by Authorization for Constrained Environments (ACE) <xref target="RFC9203"/>
        <xref target="I-D.ietf-ace-edhoc-oscore-profile"/>.</t>
    </section>
    <section anchor="objectives">
      <name>Objectives</name>
      <t>SVCB records are not meant and should not be used to exchange security contexts, so this eliminates
scenarios that use pre-shared keys with OSCORE. This leaves 2 base scenarios for OSCORE, which may
occur in combination, with scenarios using transport security, or alternative transport protocols:</t>
      <ul spacing="normal">
        <li>
          <t>DoC over OSCORE using EDHOC, and</t>
        </li>
        <li>
          <t>DoC using any ACE profile that eventually produces an OSCORE context.</t>
        </li>
      </ul>
      <t>We mostly need to answer the question for additional SvcParamKeys. <xref target="RFC9460"/> defines the keys
"mandatory", "alpn", "no-default-alpn", "port", "ipv4hint", and "ipv6hint".
Additionally, <xref target="I-D.ietf-core-dns-over-coap"/> defines "docpath" which carries the path for the DNS resource at the DoC
server as a CBOR sequence.</t>
      <t>Since "alpn" is needed for transport layer security, the type of object security (OSCORE using
EDHOC, OSCORE using ACE, OSCORE using EDHOC using ACE), needs to be conveyed in a different
SvcParamKey. The semantics and necessacity of the authenticator-domain-name field in <xref target="RFC9463"/> needs
to be evaluated in each case.</t>
      <t>When using ACE, more SvcParamKeys might be needed, such as the OAuth audience, the scope or the
authentication server URI.</t>
      <t>Defining these SvcParamKeys, including their value formats and spaces, as well as the behavior
definition for authenticator-domain-name field, shall be part of future work.</t>
      <section anchor="scenarios">
        <name>Scenarios</name>
        <t>Two example scenarios illustrate possible ways for which a solution should work;
they are phrased in dialogue form rather than in terms of protocol elements to avoid bias on solutions.</t>
        <section anchor="neighbor-discovered-server-with-edhoc-credential">
          <name>Neighbor discovered server with EDHOC credential</name>
          <t>In which the DoC server restricts access by network address (or not at all),
and the client trusts its router to advertise a suitable Encrypted DNS server.</t>
          <ol spacing="normal" type="1"><li>
              <t>Client: Joins a network.</t>
            </li>
            <li>
              <t>Local router: Sends out an IPv6 Router Advertisement (RA) with Encrypted DNS option (see <xref section="6" sectionFormat="of" target="RFC9463"/>).  </t>
              <t>
Next to the network address, this conveys Service Parameters indicating DoC
as well as a CWT Claims Set (CCS, <xref target="RFC8392"/>) that is to be used as an EDHOC credential.</t>
            </li>
            <li>
              <t>Client starts EDHOC with the server at the indicated address.
The client uses an ephemeral identity (i.e., authenticates with a CCS by value)
and verifies that the DoC server is in possession of the key indicated in the CCS
without explicit transmission of the CCS.</t>
            </li>
          </ol>
        </section>
        <section anchor="dhcp-discovered-server-with-ace-details">
          <name>DHCP discovered server with ACE details</name>
          <t>In which both the DoC client and server have a preconfigured security association with an ACE server,
and trust no one else.</t>
          <ol spacing="normal" type="1"><li>
              <t>Client: Requests an address using DHCP</t>
            </li>
            <li>
              <t>DHCP server: Offers an address along with the DHCPv6 Encrypted DNS Option (see <xref section="5" sectionFormat="of" target="RFC9463"/>).  </t>
              <t>
The option contains an address as well as an indication that ACE is used,
along with sufficient data for the client to obtain an ACE token.  </t>
              <t>
This includes hints like the ACE Request Creation hints:
the address of the AS and an identifier of the DoC server understood by the AS (the "aud"ience).
The address of the AS should be provided in some resolved form, given that DNS is being bootstrapped.</t>
            </li>
            <li>
              <t>Client requests token from AS:  </t>
              <t>
"I need a token for a host that is authorized to be my DNS server
with me being authorized to use it;
these hints were presented for me to obtain it."</t>
            </li>
            <li>
              <t>AS verifies that the hint represents a recognized DNS server,
that the client is authorized to use it,
and issues a token for a suitable ACE profile (e.g. ACE OSCORE profile or ACE EDHOC profile).</t>
            </li>
            <li>
              <t>Client establishes a security context with the DoC server as per the profile.</t>
            </li>
          </ol>
          <!--
There's the funny variation where the DoC server is actually one like in the EDHOC scenario,
but the AS has it on its list of good DoC servers … which might be an interesting discussion starter in ACE:
For the ACE EDHOC profile, this would contain an rs-cnf, but no token – would this Just Work?
For the ACE OSCORE profile, the token would be asymmetrically encrypted, which AIU was not explored previously but might also Just Work.
-->

</section>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>This document has no IANA considerations.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9460">
          <front>
            <title>Service Binding and Parameter Specification via the DNS (SVCB and HTTPS Resource Records)</title>
            <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
            <author fullname="M. Bishop" initials="M." surname="Bishop"/>
            <author fullname="E. Nygren" initials="E." surname="Nygren"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies the "SVCB" ("Service Binding") and "HTTPS" DNS resource record (RR) types to facilitate the lookup of information needed to make connections to network services, such as for HTTP origins. SVCB records allow a service to be provided from multiple alternative endpoints, each with associated parameters (such as transport protocol configuration), and are extensible to support future uses (such as keys for encrypting the TLS ClientHello). They also enable aliasing of apex domains, which is not possible with CNAME. The HTTPS RR is a variation of SVCB for use with HTTP (see RFC 9110, "HTTP Semantics"). By providing more information to the client before it attempts to establish a connection, these records offer potential benefits to both performance and privacy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9460"/>
          <seriesInfo name="DOI" value="10.17487/RFC9460"/>
        </reference>
        <reference anchor="RFC9461">
          <front>
            <title>Service Binding Mapping for DNS Servers</title>
            <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>The SVCB DNS resource record type expresses a bound collection of endpoint metadata, for use when establishing a connection to a named service. DNS itself can be such a service, when the server is identified by a domain name. This document provides the SVCB mapping for named DNS servers, allowing them to indicate support for encrypted transport protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9461"/>
          <seriesInfo name="DOI" value="10.17487/RFC9461"/>
        </reference>
        <reference anchor="RFC9462">
          <front>
            <title>Discovery of Designated Resolvers</title>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="E. Kinnear" initials="E." surname="Kinnear"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <author fullname="T. Jensen" initials="T." surname="Jensen"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document defines Discovery of Designated Resolvers (DDR), a set of mechanisms for DNS clients to use DNS records to discover a resolver's encrypted DNS configuration. An Encrypted DNS Resolver discovered in this manner is referred to as a "Designated Resolver". These mechanisms can be used to move from unencrypted DNS to encrypted DNS when only the IP address of a resolver is known. These mechanisms are designed to be limited to cases where Unencrypted DNS Resolvers and their Designated Resolvers are operated by the same entity or cooperating entities. It can also be used to discover support for encrypted DNS protocols when the name of an Encrypted DNS Resolver is known.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9462"/>
          <seriesInfo name="DOI" value="10.17487/RFC9462"/>
        </reference>
        <reference anchor="RFC9463">
          <front>
            <title>DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers (DNR)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="T. Reddy.K" initials="T." role="editor" surname="Reddy.K"/>
            <author fullname="D. Wing" initials="D." surname="Wing"/>
            <author fullname="N. Cook" initials="N." surname="Cook"/>
            <author fullname="T. Jensen" initials="T." surname="Jensen"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies new DHCP and IPv6 Router Advertisement options to discover encrypted DNS resolvers (e.g., DNS over HTTPS, DNS over TLS, and DNS over QUIC). Particularly, it allows a host to learn an Authentication Domain Name together with a list of IP addresses and a set of service parameters to reach such encrypted DNS resolvers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9463"/>
          <seriesInfo name="DOI" value="10.17487/RFC9463"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC7228">
          <front>
            <title>Terminology for Constrained-Node Networks</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="M. Ersue" initials="M." surname="Ersue"/>
            <author fullname="A. Keranen" initials="A." surname="Keranen"/>
            <date month="May" year="2014"/>
            <abstract>
              <t>The Internet Protocol Suite is increasingly used on small devices with severe constraints on power, memory, and processing resources, creating constrained-node networks. This document provides a number of basic terms that have been useful in the standardization work for constrained-node networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7228"/>
          <seriesInfo name="DOI" value="10.17487/RFC7228"/>
        </reference>
        <reference anchor="RFC7301">
          <front>
            <title>Transport Layer Security (TLS) Application-Layer Protocol Negotiation Extension</title>
            <author fullname="S. Friedl" initials="S." surname="Friedl"/>
            <author fullname="A. Popov" initials="A." surname="Popov"/>
            <author fullname="A. Langley" initials="A." surname="Langley"/>
            <author fullname="E. Stephan" initials="E." surname="Stephan"/>
            <date month="July" year="2014"/>
            <abstract>
              <t>This document describes a Transport Layer Security (TLS) extension for application-layer protocol negotiation within the TLS handshake. For instances in which multiple application protocols are supported on the same TCP or UDP port, this extension allows the application layer to negotiate which protocol will be used within the TLS connection.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7301"/>
          <seriesInfo name="DOI" value="10.17487/RFC7301"/>
        </reference>
        <reference anchor="RFC7858">
          <front>
            <title>Specification for DNS over Transport Layer Security (TLS)</title>
            <author fullname="Z. Hu" initials="Z." surname="Hu"/>
            <author fullname="L. Zhu" initials="L." surname="Zhu"/>
            <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="D. Wessels" initials="D." surname="Wessels"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
              <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7858"/>
          <seriesInfo name="DOI" value="10.17487/RFC7858"/>
        </reference>
        <reference anchor="RFC7959">
          <front>
            <title>Block-Wise Transfers in the Constrained Application Protocol (CoAP)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="Z. Shelby" initials="Z." role="editor" surname="Shelby"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a RESTful transfer protocol for constrained nodes and networks. Basic CoAP messages work well for small payloads from sensors and actuators; however, applications will need to transfer larger payloads occasionally -- for instance, for firmware updates. In contrast to HTTP, where TCP does the grunt work of segmenting and resequencing, CoAP is based on datagram transports such as UDP or Datagram Transport Layer Security (DTLS). These transports only offer fragmentation, which is even more problematic in constrained nodes and networks, limiting the maximum size of resource representations that can practically be transferred.</t>
              <t>Instead of relying on IP fragmentation, this specification extends basic CoAP with a pair of "Block" options for transferring multiple blocks of information from a resource representation in multiple request-response pairs. In many important cases, the Block options enable a server to be truly stateless: the server can handle each block transfer separately, with no need for a connection setup or other server-side memory of previous block transfers. Essentially, the Block options provide a minimal way to transfer larger representations in a block-wise fashion.</t>
              <t>A CoAP implementation that does not support these options generally is limited in the size of the representations that can be exchanged, so there is an expectation that the Block options will be widely used in CoAP implementations. Therefore, this specification updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7959"/>
          <seriesInfo name="DOI" value="10.17487/RFC7959"/>
        </reference>
        <reference anchor="RFC8323">
          <front>
            <title>CoAP (Constrained Application Protocol) over TCP, TLS, and WebSockets</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="S. Lemay" initials="S." surname="Lemay"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="B. Silverajan" initials="B." surname="Silverajan"/>
            <author fullname="B. Raymor" initials="B." role="editor" surname="Raymor"/>
            <date month="February" year="2018"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP), although inspired by HTTP, was designed to use UDP instead of TCP. The message layer of CoAP over UDP includes support for reliable delivery, simple congestion control, and flow control.</t>
              <t>Some environments benefit from the availability of CoAP carried over reliable transports such as TCP or Transport Layer Security (TLS). This document outlines the changes required to use CoAP over TCP, TLS, and WebSockets transports. It also formally updates RFC 7641 for use with these transports and RFC 7959 to enable the use of larger messages over a reliable transport.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8323"/>
          <seriesInfo name="DOI" value="10.17487/RFC8323"/>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="RFC8484">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="RFC8613">
          <front>
            <title>Object Security for Constrained RESTful Environments (OSCORE)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Mattsson" initials="J." surname="Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <date month="July" year="2019"/>
            <abstract>
              <t>This document defines Object Security for Constrained RESTful Environments (OSCORE), a method for application-layer protection of the Constrained Application Protocol (CoAP), using CBOR Object Signing and Encryption (COSE). OSCORE provides end-to-end protection between endpoints communicating using CoAP or CoAP-mappable HTTP. OSCORE is designed for constrained nodes and networks supporting a range of proxy operations, including translation between different transport protocols.</t>
              <t>Although an optional functionality of CoAP, OSCORE alters CoAP options processing and IANA registration. Therefore, this document updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8613"/>
          <seriesInfo name="DOI" value="10.17487/RFC8613"/>
        </reference>
        <reference anchor="RFC9250">
          <front>
            <title>DNS over Dedicated QUIC Connections</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>This document describes the use of QUIC to provide transport confidentiality for DNS. The encryption provided by QUIC has similar properties to those provided by TLS, while QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides more efficient packet-loss recovery than UDP. DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC 7858, and latency characteristics similar to classic DNS over UDP. This specification describes the use of DoQ as a general-purpose transport for DNS and includes the use of DoQ for stub to recursive, recursive to authoritative, and zone transfer scenarios.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9250"/>
          <seriesInfo name="DOI" value="10.17487/RFC9250"/>
        </reference>
        <reference anchor="RFC9203">
          <front>
            <title>The Object Security for Constrained RESTful Environments (OSCORE) Profile of the Authentication and Authorization for Constrained Environments (ACE) Framework</title>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="M. Gunnarsson" initials="M." surname="Gunnarsson"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document specifies a profile for the Authentication and Authorization for Constrained Environments (ACE) framework. It utilizes Object Security for Constrained RESTful Environments (OSCORE) to provide communication security and proof-of-possession for a key owned by the client and bound to an OAuth 2.0 access token.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9203"/>
          <seriesInfo name="DOI" value="10.17487/RFC9203"/>
        </reference>
        <reference anchor="RFC9528">
          <front>
            <title>Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>This document specifies Ephemeral Diffie-Hellman Over COSE (EDHOC), a very compact and lightweight authenticated Diffie-Hellman key exchange with ephemeral keys. EDHOC provides mutual authentication, forward secrecy, and identity protection. EDHOC is intended for usage in constrained scenarios, and a main use case is to establish an Object Security for Constrained RESTful Environments (OSCORE) security context. By reusing CBOR Object Signing and Encryption (COSE) for cryptography, Concise Binary Object Representation (CBOR) for encoding, and Constrained Application Protocol (CoAP) for transport, the additional code size can be kept very low.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9528"/>
          <seriesInfo name="DOI" value="10.17487/RFC9528"/>
        </reference>
        <reference anchor="I-D.amsuess-core-coap-over-gatt">
          <front>
            <title>CoAP over GATT (Bluetooth Low Energy Generic Attributes)</title>
            <author fullname="Christian Amsüss" initials="C." surname="Amsüss">
         </author>
            <date day="25" month="September" year="2024"/>
            <abstract>
              <t>   Interaction from computers and cell phones to constrained devices is
   limited by the different network technologies used, and by the
   available APIs.  This document describes a transport for the
   Constrained Application Protocol (CoAP) that uses Bluetooth GATT
   (Generic Attribute Profile) and its use cases.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-amsuess-core-coap-over-gatt-07"/>
        </reference>
        <reference anchor="I-D.ietf-ace-edhoc-oscore-profile">
          <front>
            <title>Ephemeral Diffie-Hellman Over COSE (EDHOC) and Object Security for Constrained Environments (OSCORE) Profile for Authentication and Authorization for Constrained Environments (ACE)</title>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE</organization>
            </author>
            <author fullname="Rikard Höglund" initials="R." surname="Höglund">
              <organization>RISE</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>   This document specifies a profile for the Authentication and
   Authorization for Constrained Environments (ACE) framework.  It
   utilizes Ephemeral Diffie-Hellman Over COSE (EDHOC) for achieving
   mutual authentication between an ACE-OAuth Client and Resource
   Server, and it binds an authentication credential of the Client to an
   ACE-OAuth access token.  EDHOC also establishes an Object Security
   for Constrained RESTful Environments (OSCORE) Security Context, which
   is used to secure communications when accessing protected resources
   according to the authorization information indicated in the access
   token.  This profile can be used to delegate management of
   authorization information from a resource-constrained server to a
   trusted host with less severe limitations regarding processing power
   and memory.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ace-edhoc-oscore-profile-06"/>
        </reference>
        <reference anchor="I-D.ietf-core-dns-over-coap">
          <front>
            <title>DNS over CoAP (DoC)</title>
            <author fullname="Martine Sophie Lenders" initials="M. S." surname="Lenders">
              <organization>TUD Dresden University of Technology</organization>
            </author>
            <author fullname="Christian Amsüss" initials="C." surname="Amsüss">
         </author>
            <author fullname="Cenk Gündoğan" initials="C." surname="Gündoğan">
              <organization>NeuralAgent GmbH</organization>
            </author>
            <author fullname="Thomas C. Schmidt" initials="T. C." surname="Schmidt">
              <organization>HAW Hamburg</organization>
            </author>
            <author fullname="Matthias Wählisch" initials="M." surname="Wählisch">
              <organization>TUD Dresden University of Technology &amp; Barkhausen Institut</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>   This document defines a protocol for sending DNS messages over the
   Constrained Application Protocol (CoAP).  These CoAP messages are
   protected by DTLS-Secured CoAP (CoAPS) or Object Security for
   Constrained RESTful Environments (OSCORE) to provide encrypted DNS
   message exchange for constrained devices in the Internet of Things
   (IoT).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-dns-over-coap-09"/>
        </reference>
        <reference anchor="I-D.ietf-core-transport-indication">
          <front>
            <title>CoAP Transport Indication</title>
            <author fullname="Christian Amsüss" initials="C." surname="Amsüss">
         </author>
            <author fullname="Martine Sophie Lenders" initials="M. S." surname="Lenders">
              <organization>TUD Dresden University of Technology</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>   The Constrained Application Protocol (CoAP, [RFC7252]) is available
   over different transports (UDP, DTLS, TCP, TLS, WebSockets), but
   lacks a way to unify these addresses.  This document provides
   terminology and provisions based on Web Linking [RFC8288] and Service
   Bindings (SVCB, [RFC9460]) to express alternative transports
   available to a device, and to optimize exchanges using these.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-transport-indication-07"/>
        </reference>
        <reference anchor="I-D.ietf-core-coap-dtls-alpn">
          <front>
            <title>ALPN ID Specification for CoAP over DTLS</title>
            <author fullname="Martine Sophie Lenders" initials="M. S." surname="Lenders">
              <organization>TUD Dresden University of Technology</organization>
            </author>
            <author fullname="Christian Amsüss" initials="C." surname="Amsüss">
         </author>
            <author fullname="Thomas C. Schmidt" initials="T. C." surname="Schmidt">
              <organization>HAW Hamburg</organization>
            </author>
            <author fullname="Matthias Wählisch" initials="M." surname="Wählisch">
              <organization>TUD Dresden University of Technology &amp; Barkhausen Institut</organization>
            </author>
            <date day="16" month="December" year="2024"/>
            <abstract>
              <t>   This document specifies an Application-Layer Protocol Negotiation
   (ALPN) ID for transport-layer-secured CoAP services.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-coap-dtls-alpn-01"/>
        </reference>
        <reference anchor="lwm2m" target="https://omaspecworks.org/white-paper-lightweight-m2m-1-1/">
          <front>
            <title>White Paper – Lightweight M2M 1.1</title>
            <author>
              <organization>OMA SpecWorks</organization>
            </author>
            <date year="2018" month="October"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 273?>

<section anchor="change-log">
      <name>Change Log</name>
      <section anchor="since-draft-lenders-core-dnr-03">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-lenders-core-dnr-03">draft-lenders-core-dnr-03</eref></name>
        <ul spacing="normal">
          <li>
            <t>Update <xref target="I-D.ietf-core-coap-dtls-alpn"/> reference</t>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-lenders-core-dnr-02">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-lenders-core-dnr-02">draft-lenders-core-dnr-02</eref></name>
        <ul spacing="normal">
          <li>
            <t>Forward reference to upcoming changes in <xref target="I-D.ietf-core-transport-indication"/> updated</t>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-lenders-core-dnr-01">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-lenders-core-dnr-01">draft-lenders-core-dnr-01</eref></name>
        <ul spacing="normal">
          <li>
            <t>Remove parts specified in <xref target="I-D.ietf-core-transport-indication"/></t>
          </li>
          <li>
            <t>Remove parts specified in <xref target="I-D.ietf-core-coap-dtls-alpn"/></t>
          </li>
          <li>
            <t>Remove solution sketches, set objectives to solve problem space</t>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-lenders-core-dnr-00">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-lenders-core-dnr-00">draft-lenders-core-dnr-00</eref></name>
        <ul spacing="normal">
          <li>
            <t>IANA has processed the "co" ALPN and it is now added to the registry</t>
          </li>
        </ul>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
