<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.24 (Ruby 3.3.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-lenders-core-dnr-05" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.0 -->
  <front>
    <title abbrev="CoRE DNR">Discovery of Network-designated OSCORE-based Resolvers: Problem Statement</title>
    <seriesInfo name="Internet-Draft" value="draft-lenders-core-dnr-05"/>
    <author fullname="Martine Sophie Lenders">
      <organization abbrev="TU Dresden">TUD Dresden University of Technology</organization>
      <address>
        <postal>
          <street>Helmholtzstr. 10</street>
          <city>Dresden</city>
          <code>D-01069</code>
          <country>Germany</country>
        </postal>
        <email>martine.lenders@tu-dresden.de</email>
      </address>
    </author>
    <author initials="C." surname="Amsüss" fullname="Christian Amsüss">
      <organization/>
      <address>
        <email>christian@amsuess.com</email>
      </address>
    </author>
    <author fullname="Thomas C. Schmidt">
      <organization>HAW Hamburg</organization>
      <address>
        <email>t.schmidt@haw-hamburg.de</email>
      </address>
    </author>
    <author initials="M." surname="Wählisch" fullname="Matthias Wählisch">
      <organization abbrev="TU Dresden &amp; Barkhausen Institut">TUD Dresden University of Technology &amp; Barkhausen Institut</organization>
      <address>
        <postal>
          <street>Helmholtzstr. 10</street>
          <city>Dresden</city>
          <code>D-01069</code>
          <country>Germany</country>
        </postal>
        <email>m.waehlisch@tu-dresden.de</email>
      </address>
    </author>
    <date year="2025" month="March" day="03"/>
    <area>Web and Internet Transport</area>
    <workgroup>Constrained RESTful Environments</workgroup>
    <keyword>CoRE</keyword>
    <keyword>CoAP</keyword>
    <keyword>DoC</keyword>
    <keyword>DNR</keyword>
    <keyword>SVCB</keyword>
    <abstract>
      <?line 82?>

<t>This document states problems when designing DNS SVCB records to discover endpoints that communicate over
Object Security for Constrained RESTful Environments (OSCORE) <xref target="RFC8613"/>.
As a consequence of learning about OSCORE, this discovery will allow a host to learn both CoAP servers and DNS over CoAP resolvers that use OSCORE to encrypt messages and Ephemeral Diffie-Hellman Over COSE (EDHOC) <xref target="RFC9528"/> for key exchange.
Challenges arise because SVCB records are not meant to be used to exchange security contexts, which is required in OSCORE scenarios.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://anr-bmbf-pivot.github.io/draft-lenders-core-dnr/draft-lenders-core-dnr.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-lenders-core-dnr/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Constrained RESTful Environments Working Group mailing list (<eref target="mailto:core@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/core/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/core/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/anr-bmbf-pivot/draft-lenders-core-dnr"/>.</t>
    </note>
  </front>
  <middle>
    <?line 89?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The discovery of Internet services can be facilitated by the Domain Name System (DNS).
To discover services of the constrained Internet of Things (IoT) using the DNS, two challenges must be solved.
First, the discovery of a DNS resolver that supports DNS resolution based on secure, IoT-friendly protocols—otherwise the subsequent discovery of IoT-tailored services would be limited to resolution protocols conflicting with constrained resources.
Second, the discovery of an IoT-friendly service beyond the DNS resolution.</t>
      <t><xref target="RFC9460"/> specifies the "SVCB" ("Service Binding") DNS resource record to lookup information needed to connect to a network service. Service Parameters (SvcParams) carry
that information within the SVCB record.</t>
      <t>The discovery of DNS resolvers can be enabled by the DNS itself <xref target="RFC9461"/>, <xref target="RFC9462"/> or, in a local network, by Router Advertisements and DHCP <xref target="RFC9463"/>.
In all theses cases, the SvcParams is used, but supports only DNS transfer based on Transport Layer Security (TLS), namely DNS over TLS (DoT) <xref target="RFC7858"/>, DNS over HTTPS (DoH) <xref target="RFC8484"/>, and DNS over Dedicated QUIC (DoQ) <xref target="RFC9250"/>.
The use of DoT, DoH, or DoQ, however, is not recommended in IoT scenarios.</t>
      <t>DNS over CoAP <xref target="I-D.ietf-core-dns-over-coap"/> provides a solution for encrypted DNS in constrained environments.
The Constrained Application Protocol (CoAP) <xref target="RFC7252"/> is mostly agnostic to the transport layer CoAP can be transported over UDP, TCP, or WebSockets <xref target="RFC8323"/>, and even less common transports such as Bluetooth GATT <xref target="I-D.amsuess-core-coap-over-gatt"/> or SMS <xref target="lwm2m"/> are discussed.
<xref target="I-D.ietf-core-transport-indication"/> covers the selection of different CoAP transports using SVCB records.</t>
      <t>CoAP offers three ways of secure communication:</t>
      <ul spacing="normal">
        <li>
          <t><strong>No Security:</strong> This plain CoAP mode does not support any encryption (NoSec in <xref section="9" sectionFormat="of" target="RFC7252"/>).
It is not recommended when using <xref target="I-D.ietf-core-dns-over-coap"/> but inherits core CoAP features
such as block-wise transfer <xref target="RFC7959"/> for datagram-based
segmentation.  Such features are beneficial in constrained settings even
without encryption.</t>
        </li>
        <li>
          <t><strong>Transport Security:</strong> CoAP may use DTLS when transferred over UDP <xref target="RFC7252"/> and TLS when transferred over TCP <xref target="RFC8323"/>.</t>
        </li>
        <li>
          <t><strong>Object Security:</strong> Securing content objects can be achieved using
OSCORE <xref target="RFC8613"/>. OSCORE can be used either as an alternative or in
addition to transport security.  </t>
          <t>
OSCORE keys have a limited lifetime and need to be set up.
Keys can be established through an EDHOC key exchange <xref target="RFC9528"/>,
received from an ACE Authorization Server (AS, as described in the ACE OSCORE profile <xref target="RFC9203"/>),
or through a combination of those (established with an EDHOC peer whose public key is confirmed by an AS, using the ACE EDHOC profile <xref target="I-D.ietf-ace-edhoc-oscore-profile"/>).</t>
        </li>
      </ul>
      <t>The SVCB-based discovery of a CoAP service with no security is covered in <xref target="I-D.ietf-core-transport-indication"/>, and a CoAP service with transport security in <xref target="I-D.ietf-core-coap-dtls-alpn"/>.
The discovery of CoAP services with object security is not specified.
To guide future specifications, this document clarifies aspects when using SVCB in the context of CoAP and object security.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The terms "DoC server" and "DoC client" are used as defined in <xref target="I-D.ietf-core-dns-over-coap"/>.</t>
      <t>The terms "constrained node" and "constrained network" are used as defined in <xref target="RFC7228"/>.</t>
      <t>SvcParams denotes the field in either DNS SVCB/HTTPS records as defined in <xref target="RFC9460"/>, or DHCP and RA
messages as defined in <xref target="RFC9463"/>. SvcParamKeys are used as defined in <xref target="RFC9460"/>.</t>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="problem-space">
      <name>Problem Space</name>
      <t>The first and most important point of discussion for the discoverability of CoAP is if and what
new SvcParamKeys need to be defined and what is already there.</t>
      <t><xref target="RFC9460"/> defines the "alpn" key, which is used to identify the protocol suite of a service binding
using its Application-Layer Protocol Negotiation (ALPN) ID <xref target="RFC7301"/>. While this is useful to
identify classic transport layer security, the question is raised if this is needed or even helpful
for when there is only object security. There is an ALPN ID for CoAP over TLS that is defined in
<xref target="RFC8323"/>. As using the same ALPN ID for different transport layers is not recommended, another
ALPN ID for CoAP over DTLS is introduced in <xref target="I-D.ietf-core-coap-dtls-alpn"/>. Object security may be
selected in addition to transport layer security or without it. Additionally, different
CoAP transports can be selected, which may be orthogonal to the transport security.
For instance, DTLS can be used over transports other than UDP. The selection of CoAP transport
protocols will be covered in future versions of <xref target="I-D.ietf-core-transport-indication"/>. Defining an ALPN ID for each
combination of object security, mode of transport layer security, and transport protocol might not
be viable or scalable. For some ways of setting up object security, additional information is
needed, such as an establishment options for an encryption context with EDHOC or an authentication
server (AS) with ACE.</t>
      <t>Beyond the SvcParamKeys, there is the question of what the field values of the Encrypted DNS Options
defined in <xref target="RFC9463"/> might be with EDHOC or ACE EDHOC. While most fields map,
"authentication-domain-name" (ADN) and its corresponding ADN length field may not matter
when authentication is driven by Authorization for Constrained Environments (ACE) <xref target="RFC9203"/>
        <xref target="I-D.ietf-ace-edhoc-oscore-profile"/>.</t>
    </section>
    <section anchor="objectives">
      <name>Objectives</name>
      <t>SVCB records are not meant and should not be used to exchange security contexts, so this eliminates
scenarios that use pre-shared keys with OSCORE. This leaves 2 base scenarios for OSCORE, which may
occur in combination, with scenarios using transport security, or alternative transport protocols:</t>
      <ul spacing="normal">
        <li>
          <t>DoC over OSCORE using EDHOC, and</t>
        </li>
        <li>
          <t>DoC using any ACE profile that eventually produces an OSCORE context.</t>
        </li>
      </ul>
      <t>We mostly need to answer the question for additional SvcParamKeys. <xref target="RFC9460"/> defines the keys
"mandatory", "alpn", "no-default-alpn", "port", "ipv4hint", and "ipv6hint".
Additionally, <xref target="I-D.ietf-core-dns-over-coap"/> defines "docpath" which carries the path for the DNS resource at the DoC
server as a CBOR sequence.</t>
      <t>Since "alpn" is needed for transport layer security, the type of object security (OSCORE using
EDHOC, OSCORE using ACE, OSCORE using EDHOC using ACE), needs to be conveyed in a different
SvcParamKey. The semantics and necessacity of the authenticator-domain-name field in <xref target="RFC9463"/> needs
to be evaluated in each case.</t>
      <t>When using ACE, more SvcParamKeys might be needed, such as the OAuth audience, the scope or the
authentication server URI.</t>
      <t>Defining these SvcParamKeys, including their value formats and spaces, as well as the behavior
definition for authenticator-domain-name field, shall be part of future work.</t>
      <section anchor="scenarios">
        <name>Scenarios</name>
        <t>Two example scenarios illustrate possible ways for which a solution should work;
they are phrased in dialogue form rather than in terms of protocol elements to avoid bias on solutions.</t>
        <section anchor="neighbor-discovered-server-with-edhoc-credential">
          <name>Neighbor discovered server with EDHOC credential</name>
          <t>In which the DoC server restricts access by network address (or not at all),
and the client trusts its router to advertise a suitable Encrypted DNS server.</t>
          <ol spacing="normal" type="1"><li>
              <t>Client: Joins a network.</t>
            </li>
            <li>
              <t>Local router: Sends out an IPv6 Router Advertisement (RA) with Encrypted DNS option (see <xref section="6" sectionFormat="of" target="RFC9463"/>).  </t>
              <t>
Next to the network address, this conveys Service Parameters indicating DoC
as well as a CWT Claims Set (CCS, <xref target="RFC8392"/>) that is to be used as an EDHOC credential.</t>
            </li>
            <li>
              <t>Client starts EDHOC with the server at the indicated address.
The client uses an ephemeral identity (i.e., authenticates with a CCS by value)
and verifies that the DoC server is in possession of the key indicated in the CCS
without explicit transmission of the CCS.</t>
            </li>
          </ol>
        </section>
        <section anchor="dhcp-discovered-server-with-ace-details">
          <name>DHCP discovered server with ACE details</name>
          <t>In which both the DoC client and server have a preconfigured security association with an ACE server,
and trust no one else.</t>
          <ol spacing="normal" type="1"><li>
              <t>Client: Requests an address using DHCP</t>
            </li>
            <li>
              <t>DHCP server: Offers an address along with the DHCPv6 Encrypted DNS Option (see <xref section="5" sectionFormat="of" target="RFC9463"/>).  </t>
              <t>
The option contains an address as well as an indication that ACE is used,
along with sufficient data for the client to obtain an ACE token.  </t>
              <t>
This includes hints like the ACE Request Creation hints:
the address of the AS and an identifier of the DoC server understood by the AS (the "aud"ience).
The address of the AS should be provided in some resolved form, given that DNS is being bootstrapped.</t>
            </li>
            <li>
              <t>Client requests token from AS:  </t>
              <t>
"I need a token for a host that is authorized to be my DNS server
with me being authorized to use it;
these hints were presented for me to obtain it."</t>
            </li>
            <li>
              <t>AS verifies that the hint represents a recognized DNS server,
that the client is authorized to use it,
and issues a token for a suitable ACE profile (e.g. ACE OSCORE profile or ACE EDHOC profile).</t>
            </li>
            <li>
              <t>Client establishes a security context with the DoC server as per the profile.</t>
            </li>
          </ol>
          <!--
There's the funny variation where the DoC server is actually one like in the EDHOC scenario,
but the AS has it on its list of good DoC servers … which might be an interesting discussion starter in ACE:
For the ACE EDHOC profile, this would contain an rs-cnf, but no token – would this Just Work?
For the ACE OSCORE profile, the token would be asymmetrically encrypted, which AIU was not explored previously but might also Just Work.
-->

</section>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>This document has no IANA considerations.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9460">
          <front>
            <title>Service Binding and Parameter Specification via the DNS (SVCB and HTTPS Resource Records)</title>
            <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
            <author fullname="M. Bishop" initials="M." surname="Bishop"/>
            <author fullname="E. Nygren" initials="E." surname="Nygren"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies the "SVCB" ("Service Binding") and "HTTPS" DNS resource record (RR) types to facilitate the lookup of information needed to make connections to network services, such as for HTTP origins. SVCB records allow a service to be provided from multiple alternative endpoints, each with associated parameters (such as transport protocol configuration), and are extensible to support future uses (such as keys for encrypting the TLS ClientHello). They also enable aliasing of apex domains, which is not possible with CNAME. The HTTPS RR is a variation of SVCB for use with HTTP (see RFC 9110, "HTTP Semantics"). By providing more information to the client before it attempts to establish a connection, these records offer potential benefits to both performance and privacy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9460"/>
          <seriesInfo name="DOI" value="10.17487/RFC9460"/>
        </reference>
        <reference anchor="RFC9461">
          <front>
            <title>Service Binding Mapping for DNS Servers</title>
            <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>The SVCB DNS resource record type expresses a bound collection of endpoint metadata, for use when establishing a connection to a named service. DNS itself can be such a service, when the server is identified by a domain name. This document provides the SVCB mapping for named DNS servers, allowing them to indicate support for encrypted transport protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9461"/>
          <seriesInfo name="DOI" value="10.17487/RFC9461"/>
        </reference>
        <reference anchor="RFC9462">
          <front>
            <title>Discovery of Designated Resolvers</title>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="E. Kinnear" initials="E." surname="Kinnear"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <author fullname="T. Jensen" initials="T." surname="Jensen"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document defines Discovery of Designated Resolvers (DDR), a set of mechanisms for DNS clients to use DNS records to discover a resolver's encrypted DNS configuration. An Encrypted DNS Resolver discovered in this manner is referred to as a "Designated Resolver". These mechanisms can be used to move from unencrypted DNS to encrypted DNS when only the IP address of a resolver is known. These mechanisms are designed to be limited to cases where Unencrypted DNS Resolvers and their Designated Resolvers are operated by the same entity or cooperating entities. It can also be used to discover support for encrypted DNS protocols when the name of an Encrypted DNS Resolver is known.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9462"/>
          <seriesInfo name="DOI" value="10.17487/RFC9462"/>
        </reference>
        <reference anchor="RFC9463">
          <front>
            <title>DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers (DNR)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="T. Reddy.K" initials="T." role="editor" surname="Reddy.K"/>
            <author fullname="D. Wing" initials="D." surname="Wing"/>
            <author fullname="N. Cook" initials="N." surname="Cook"/>
            <author fullname="T. Jensen" initials="T." surname="Jensen"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies new DHCP and IPv6 Router Advertisement options to discover encrypted DNS resolvers (e.g., DNS over HTTPS, DNS over TLS, and DNS over QUIC). Particularly, it allows a host to learn an Authentication Domain Name together with a list of IP addresses and a set of service parameters to reach such encrypted DNS resolvers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9463"/>
          <seriesInfo name="DOI" value="10.17487/RFC9463"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC7228">
          <front>
            <title>Terminology for Constrained-Node Networks</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="M. Ersue" initials="M." surname="Ersue"/>
            <author fullname="A. Keranen" initials="A." surname="Keranen"/>
            <date month="May" year="2014"/>
            <abstract>
              <t>The Internet Protocol Suite is increasingly used on small devices with severe constraints on power, memory, and processing resources, creating constrained-node networks. This document provides a number of basic terms that have been useful in the standardization work for constrained-node networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7228"/>
          <seriesInfo name="DOI" value="10.17487/RFC7228"/>
        </reference>
        <reference anchor="RFC7301">
          <front>
            <title>Transport Layer Security (TLS) Application-Layer Protocol Negotiation Extension</title>
            <author fullname="S. Friedl" initials="S." surname="Friedl"/>
            <author fullname="A. Popov" initials="A." surname="Popov"/>
            <author fullname="A. Langley" initials="A." surname="Langley"/>
            <author fullname="E. Stephan" initials="E." surname="Stephan"/>
            <date month="July" year="2014"/>
            <abstract>
              <t>This document describes a Transport Layer Security (TLS) extension for application-layer protocol negotiation within the TLS handshake. For instances in which multiple application protocols are supported on the same TCP or UDP port, this extension allows the application layer to negotiate which protocol will be used within the TLS connection.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7301"/>
          <seriesInfo name="DOI" value="10.17487/RFC7301"/>
        </reference>
        <reference anchor="RFC7858">
          <front>
            <title>Specification for DNS over Transport Layer Security (TLS)</title>
            <author fullname="Z. Hu" initials="Z." surname="Hu"/>
            <author fullname="L. Zhu" initials="L." surname="Zhu"/>
            <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="D. Wessels" initials="D." surname="Wessels"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
              <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7858"/>
          <seriesInfo name="DOI" value="10.17487/RFC7858"/>
        </reference>
        <reference anchor="RFC7959">
          <front>
            <title>Block-Wise Transfers in the Constrained Application Protocol (CoAP)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="Z. Shelby" initials="Z." role="editor" surname="Shelby"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a RESTful transfer protocol for constrained nodes and networks. Basic CoAP messages work well for small payloads from sensors and actuators; however, applications will need to transfer larger payloads occasionally -- for instance, for firmware updates. In contrast to HTTP, where TCP does the grunt work of segmenting and resequencing, CoAP is based on datagram transports such as UDP or Datagram Transport Layer Security (DTLS). These transports only offer fragmentation, which is even more problematic in constrained nodes and networks, limiting the maximum size of resource representations that can practically be transferred.</t>
              <t>Instead of relying on IP fragmentation, this specification extends basic CoAP with a pair of "Block" options for transferring multiple blocks of information from a resource representation in multiple request-response pairs. In many important cases, the Block options enable a server to be truly stateless: the server can handle each block transfer separately, with no need for a connection setup or other server-side memory of previous block transfers. Essentially, the Block options provide a minimal way to transfer larger representations in a block-wise fashion.</t>
              <t>A CoAP implementation that does not support these options generally is limited in the size of the representations that can be exchanged, so there is an expectation that the Block options will be widely used in CoAP implementations. Therefore, this specification updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7959"/>
          <seriesInfo name="DOI" value="10.17487/RFC7959"/>
        </reference>
        <reference anchor="RFC8323">
          <front>
            <title>CoAP (Constrained Application Protocol) over TCP, TLS, and WebSockets</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="S. Lemay" initials="S." surname="Lemay"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="B. Silverajan" initials="B." surname="Silverajan"/>
            <author fullname="B. Raymor" initials="B." role="editor" surname="Raymor"/>
            <date month="February" year="2018"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP), although inspired by HTTP, was designed to use UDP instead of TCP. The message layer of CoAP over UDP includes support for reliable delivery, simple congestion control, and flow control.</t>
              <t>Some environments benefit from the availability of CoAP carried over reliable transports such as TCP or Transport Layer Security (TLS). This document outlines the changes required to use CoAP over TCP, TLS, and WebSockets transports. It also formally updates RFC 7641 for use with these transports and RFC 7959 to enable the use of larger messages over a reliable transport.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8323"/>
          <seriesInfo name="DOI" value="10.17487/RFC8323"/>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="RFC8484">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="RFC8613">
          <front>
            <title>Object Security for Constrained RESTful Environments (OSCORE)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Mattsson" initials="J." surname="Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <date month="July" year="2019"/>
            <abstract>
              <t>This document defines Object Security for Constrained RESTful Environments (OSCORE), a method for application-layer protection of the Constrained Application Protocol (CoAP), using CBOR Object Signing and Encryption (COSE). OSCORE provides end-to-end protection between endpoints communicating using CoAP or CoAP-mappable HTTP. OSCORE is designed for constrained nodes and networks supporting a range of proxy operations, including translation between different transport protocols.</t>
              <t>Although an optional functionality of CoAP, OSCORE alters CoAP options processing and IANA registration. Therefore, this document updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8613"/>
          <seriesInfo name="DOI" value="10.17487/RFC8613"/>
        </reference>
        <reference anchor="RFC9250">
          <front>
            <title>DNS over Dedicated QUIC Connections</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>This document describes the use of QUIC to provide transport confidentiality for DNS. The encryption provided by QUIC has similar properties to those provided by TLS, while QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides more efficient packet-loss recovery than UDP. DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC 7858, and latency characteristics similar to classic DNS over UDP. This specification describes the use of DoQ as a general-purpose transport for DNS and includes the use of DoQ for stub to recursive, recursive to authoritative, and zone transfer scenarios.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9250"/>
          <seriesInfo name="DOI" value="10.17487/RFC9250"/>
        </reference>
        <reference anchor="RFC9203">
          <front>
            <title>The Object Security for Constrained RESTful Environments (OSCORE) Profile of the Authentication and Authorization for Constrained Environments (ACE) Framework</title>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="M. Gunnarsson" initials="M." surname="Gunnarsson"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document specifies a profile for the Authentication and Authorization for Constrained Environments (ACE) framework. It utilizes Object Security for Constrained RESTful Environments (OSCORE) to provide communication security and proof-of-possession for a key owned by the client and bound to an OAuth 2.0 access token.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9203"/>
          <seriesInfo name="DOI" value="10.17487/RFC9203"/>
        </reference>
        <reference anchor="RFC9528">
          <front>
            <title>Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>This document specifies Ephemeral Diffie-Hellman Over COSE (EDHOC), a very compact and lightweight authenticated Diffie-Hellman key exchange with ephemeral keys. EDHOC provides mutual authentication, forward secrecy, and identity protection. EDHOC is intended for usage in constrained scenarios, and a main use case is to establish an Object Security for Constrained RESTful Environments (OSCORE) security context. By reusing CBOR Object Signing and Encryption (COSE) for cryptography, Concise Binary Object Representation (CBOR) for encoding, and Constrained Application Protocol (CoAP) for transport, the additional code size can be kept very low.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9528"/>
          <seriesInfo name="DOI" value="10.17487/RFC9528"/>
        </reference>
        <reference anchor="I-D.amsuess-core-coap-over-gatt">
          <front>
            <title>CoAP over GATT (Bluetooth Low Energy Generic Attributes)</title>
            <author fullname="Christian Amsüss" initials="C." surname="Amsüss">
         </author>
            <date day="25" month="September" year="2024"/>
            <abstract>
              <t>   Interaction from computers and cell phones to constrained devices is
   limited by the different network technologies used, and by the
   available APIs.  This document describes a transport for the
   Constrained Application Protocol (CoAP) that uses Bluetooth GATT
   (Generic Attribute Profile) and its use cases.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-amsuess-core-coap-over-gatt-07"/>
        </reference>
        <reference anchor="I-D.ietf-ace-edhoc-oscore-profile">
          <front>
            <title>Ephemeral Diffie-Hellman Over COSE (EDHOC) and Object Security for Constrained Environments (OSCORE) Profile for Authentication and Authorization for Constrained Environments (ACE)</title>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE</organization>
            </author>
            <author fullname="Rikard Höglund" initials="R." surname="Höglund">
              <organization>RISE</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>   This document specifies a profile for the Authentication and
   Authorization for Constrained Environments (ACE) framework.  It
   utilizes Ephemeral Diffie-Hellman Over COSE (EDHOC) for achieving
   mutual authentication between an ACE-OAuth Client and Resource
   Server, and it binds an authentication credential of the Client to an
   ACE-OAuth access token.  EDHOC also establishes an Object Security
   for Constrained RESTful Environments (OSCORE) Security Context, which
   is used to secure communications when accessing protected resources
   according to the authorization information indicated in the access
   token.  This profile can be used to delegate management of
   authorization information from a resource-constrained server to a
   trusted host with less severe limitations regarding processing power
   and memory.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ace-edhoc-oscore-profile-06"/>
        </reference>
        <reference anchor="I-D.ietf-core-dns-over-coap">
          <front>
            <title>DNS over CoAP (DoC)</title>
            <author fullname="Martine Sophie Lenders" initials="M. S." surname="Lenders">
              <organization>TUD Dresden University of Technology</organization>
            </author>
            <author fullname="Christian Amsüss" initials="C." surname="Amsüss">
         </author>
            <author fullname="Cenk Gündoğan" initials="C." surname="Gündoğan">
              <organization>NeuralAgent GmbH</organization>
            </author>
            <author fullname="Thomas C. Schmidt" initials="T. C." surname="Schmidt">
              <organization>HAW Hamburg</organization>
            </author>
            <author fullname="Matthias Wählisch" initials="M." surname="Wählisch">
              <organization>TUD Dresden University of Technology &amp; Barkhausen Institut</organization>
            </author>
            <date day="14" month="February" year="2025"/>
            <abstract>
              <t>   This document defines a protocol for sending DNS messages over the
   Constrained Application Protocol (CoAP).  These CoAP messages are
   protected by DTLS-Secured CoAP (CoAPS) or Object Security for
   Constrained RESTful Environments (OSCORE) to provide encrypted DNS
   message exchange for constrained devices in the Internet of Things
   (IoT).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-dns-over-coap-12"/>
        </reference>
        <reference anchor="I-D.ietf-core-transport-indication">
          <front>
            <title>CoAP Transport Indication</title>
            <author fullname="Christian Amsüss" initials="C." surname="Amsüss">
         </author>
            <author fullname="Martine Sophie Lenders" initials="M. S." surname="Lenders">
              <organization>TUD Dresden University of Technology</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>   The Constrained Application Protocol (CoAP, [RFC7252]) is available
   over different transports (UDP, DTLS, TCP, TLS, WebSockets), but
   lacks a way to unify these addresses.  This document provides
   terminology and provisions based on Web Linking [RFC8288] and Service
   Bindings (SVCB, [RFC9460]) to express alternative transports
   available to a device, and to optimize exchanges using these.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-transport-indication-07"/>
        </reference>
        <reference anchor="I-D.ietf-core-coap-dtls-alpn">
          <front>
            <title>ALPN ID Specification for CoAP over DTLS</title>
            <author fullname="Martine Sophie Lenders" initials="M. S." surname="Lenders">
              <organization>TUD Dresden University of Technology</organization>
            </author>
            <author fullname="Christian Amsüss" initials="C." surname="Amsüss">
         </author>
            <author fullname="Thomas C. Schmidt" initials="T. C." surname="Schmidt">
              <organization>HAW Hamburg</organization>
            </author>
            <author fullname="Matthias Wählisch" initials="M." surname="Wählisch">
              <organization>TUD Dresden University of Technology &amp; Barkhausen Institut</organization>
            </author>
            <date day="3" month="March" year="2025"/>
            <abstract>
              <t>   This document specifies an Application-Layer Protocol Negotiation
   (ALPN) ID for transport-layer-secured Constrained Application
   Protocol (CoAP) services.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-coap-dtls-alpn-02"/>
        </reference>
        <reference anchor="lwm2m" target="https://omaspecworks.org/white-paper-lightweight-m2m-1-1/">
          <front>
            <title>White Paper – Lightweight M2M 1.1</title>
            <author>
              <organization>OMA SpecWorks</organization>
            </author>
            <date year="2018" month="October"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 273?>

<section anchor="change-log">
      <name>Change Log</name>
      <section anchor="since-draft-lenders-core-dnr-04">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-lenders-core-dnr-04">draft-lenders-core-dnr-04</eref></name>
        <ul spacing="normal">
          <li>
            <t>Avoid the term "security mode" as it has a specific definition in RFC 7252</t>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-lenders-core-dnr-03">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-lenders-core-dnr-03">draft-lenders-core-dnr-03</eref></name>
        <ul spacing="normal">
          <li>
            <t>Update <xref target="I-D.ietf-core-coap-dtls-alpn"/> reference</t>
          </li>
          <li>
            <t>intro: overhaul explanation of OSCORE setup</t>
          </li>
          <li>
            <t>objectives: Be open on ACE profiles</t>
          </li>
          <li>
            <t>Add scenarios</t>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-lenders-core-dnr-02">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-lenders-core-dnr-02">draft-lenders-core-dnr-02</eref></name>
        <ul spacing="normal">
          <li>
            <t>Forward reference to upcoming changes in <xref target="I-D.ietf-core-transport-indication"/> updated</t>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-lenders-core-dnr-01">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-lenders-core-dnr-01">draft-lenders-core-dnr-01</eref></name>
        <ul spacing="normal">
          <li>
            <t>Remove parts specified in <xref target="I-D.ietf-core-transport-indication"/></t>
          </li>
          <li>
            <t>Remove parts specified in <xref target="I-D.ietf-core-coap-dtls-alpn"/></t>
          </li>
          <li>
            <t>Remove solution sketches, set objectives to solve problem space</t>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-lenders-core-dnr-00">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-lenders-core-dnr-00">draft-lenders-core-dnr-00</eref></name>
        <ul spacing="normal">
          <li>
            <t>IANA has processed the "co" ALPN and it is now added to the registry</t>
          </li>
        </ul>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
