<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-lenders-core-dnr-06" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.29.0 -->
  <front>
    <title abbrev="CoRE DNR">Discovery of Network-designated OSCORE-based Resolvers: Problem Statement</title>
    <seriesInfo name="Internet-Draft" value="draft-lenders-core-dnr-06"/>
    <author fullname="Martine Sophie Lenders">
      <organization abbrev="TU Dresden">TUD Dresden University of Technology</organization>
      <address>
        <postal>
          <street>Helmholtzstr. 10</street>
          <city>Dresden</city>
          <code>D-01069</code>
          <country>Germany</country>
        </postal>
        <email>martine.lenders@tu-dresden.de</email>
      </address>
    </author>
    <author initials="C." surname="Amsüss" fullname="Christian Amsüss">
      <organization/>
      <address>
        <email>christian@amsuess.com</email>
      </address>
    </author>
    <author fullname="Thomas C. Schmidt">
      <organization>HAW Hamburg</organization>
      <address>
        <email>t.schmidt@haw-hamburg.de</email>
      </address>
    </author>
    <author initials="M." surname="Wählisch" fullname="Matthias Wählisch">
      <organization abbrev="TU Dresden &amp; Barkhausen Institut">TUD Dresden University of Technology &amp; Barkhausen Institut</organization>
      <address>
        <postal>
          <street>Helmholtzstr. 10</street>
          <city>Dresden</city>
          <code>D-01069</code>
          <country>Germany</country>
        </postal>
        <email>m.waehlisch@tu-dresden.de</email>
      </address>
    </author>
    <date year="2025" month="July" day="07"/>
    <area>Web and Internet Transport</area>
    <workgroup>Constrained RESTful Environments</workgroup>
    <keyword>CoRE</keyword>
    <keyword>CoAP</keyword>
    <keyword>DoC</keyword>
    <keyword>DNR</keyword>
    <keyword>SVCB</keyword>
    <abstract>
      <?line 82?>

<t>This document states problems when designing DNS SVCB records to discover endpoints that communicate over
Object Security for Constrained RESTful Environments (OSCORE) <xref target="RFC8613"/>.
As a consequence of learning about OSCORE, this discovery will allow a host to learn both CoAP servers and DNS over CoAP resolvers that use OSCORE to encrypt messages and Ephemeral Diffie-Hellman Over COSE (EDHOC) <xref target="RFC9528"/> for key exchange.
Challenges arise because SVCB records are not meant to be used to exchange security contexts, which is required in OSCORE scenarios.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://netd-tud.github.io/draft-lenders-core-oscore-svcb/draft-lenders-core-dnr.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-lenders-core-dnr/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Constrained RESTful Environments Working Group mailing list (<eref target="mailto:core@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/core/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/core/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/netd-tud/draft-lenders-core-oscore-svcb"/>.</t>
    </note>
  </front>
  <middle>
    <?line 89?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The discovery of Internet services can be facilitated by the Domain Name System (DNS).
To discover services of the constrained Internet of Things (IoT) using the DNS, two challenges must be solved.
First, the discovery of a DNS resolver that supports DNS resolution based on secure, IoT-friendly protocols—otherwise the subsequent discovery of IoT-tailored services would be limited to resolution protocols conflicting with constrained resources.
Second, the discovery of an IoT-friendly service beyond the DNS resolution.</t>
      <t><xref target="RFC9460"/> specifies the "SVCB" ("Service Binding") DNS resource record to lookup information needed to connect to a network service. Service Parameters (SvcParams) carry
that information within the SVCB record.</t>
      <t>The discovery of recursive DNS resolvers can be enabled by the DNS itself <xref target="RFC9461"/>, <xref target="RFC9462"/> or, in a local network, by Router Advertisements and DHCP <xref target="RFC9463"/>.
In all theses cases, the SvcParams is used, but supports only DNS transfer based on Transport Layer Security (TLS), namely DNS over TLS (DoT) <xref target="RFC7858"/>, DNS over HTTPS (DoH) <xref target="RFC8484"/>, and DNS over Dedicated QUIC (DoQ) <xref target="RFC9250"/>.
The use of DoT, DoH, or DoQ, however, is not recommended in IoT scenarios.</t>
      <t>DNS over CoAP <xref target="I-D.ietf-core-dns-over-coap"/> provides a solution for encrypted DNS in constrained environments.
The Constrained Application Protocol (CoAP) <xref target="RFC7252"/> is mostly agnostic to the transport layer CoAP can be transported over UDP, TCP, or WebSockets <xref target="RFC8323"/>, and even less common transports such as Bluetooth GATT <xref target="I-D.amsuess-core-coap-over-gatt"/> or SMS <xref target="lwm2m"/> are discussed.
<xref target="I-D.ietf-core-transport-indication"/> covers the selection of different CoAP transports using SVCB records.</t>
      <t>CoAP offers three ways of secure communication:</t>
      <ul spacing="normal">
        <li>
          <t><strong>No Security:</strong> This plain CoAP mode does not support any encryption (NoSec in <xref section="9" sectionFormat="of" target="RFC7252"/>).
It is not recommended when using <xref target="I-D.ietf-core-dns-over-coap"/> but inherits core CoAP features
such as block-wise transfer <xref target="RFC7959"/> for datagram-based
segmentation.  Such features are beneficial in constrained settings even
without encryption.</t>
        </li>
        <li>
          <t><strong>Transport Security:</strong> CoAP may use DTLS when transferred over UDP <xref target="RFC7252"/> and TLS when transferred over TCP <xref target="RFC8323"/>.</t>
        </li>
        <li>
          <t><strong>Object Security:</strong> Securing content objects can be achieved using
OSCORE <xref target="RFC8613"/>. OSCORE can be used either as an alternative or in
addition to transport security.  </t>
          <t>
OSCORE keys have a limited lifetime and need to be set up.
Keys can be established through an EDHOC key exchange <xref target="RFC9528"/>,
received from an ACE Authorization Server (AS, as described in the ACE OSCORE profile <xref target="RFC9203"/>),
or through a combination of those (established with an EDHOC peer whose public key is confirmed by an AS, using the ACE EDHOC profile <xref target="I-D.ietf-ace-edhoc-oscore-profile"/>).</t>
        </li>
      </ul>
      <t>The SVCB-based discovery of CoAP services with no security and transport security is covered in <xref target="I-D.ietf-core-transport-indication"/>.
The discovery of CoAP services, however, with object security is not specified.
To guide future specifications, this document clarifies aspects when using SVCB in the context of CoAP and object security.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The terms "DoC server" and "DoC client" are used as defined in <xref target="I-D.ietf-core-dns-over-coap"/>.</t>
      <t>The terms "constrained node" and "constrained network" are used as defined in <xref target="RFC7228"/>.</t>
      <t>SvcParams denotes the field in either DNS SVCB/HTTPS records as defined in <xref target="RFC9460"/>, or DHCP and RA
messages as defined in <xref target="RFC9463"/>. SvcParamKeys are used as defined in <xref target="RFC9460"/>.</t>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="problem-space">
      <name>Problem Space</name>
      <t>The first and most important point of discussion for the discoverability of CoAP is if and what
new SvcParamKeys need to be defined and what is already there.</t>
      <t><xref target="RFC9460"/> defines the "alpn" key, which is used to identify the protocol suite of a service binding
using its Application-Layer Protocol Negotiation (ALPN) ID <xref target="RFC7301"/>. While this is useful to
identify classic transport layer security, the question is raised if this is needed or even helpful
for when there is only object security. There is an ALPN ID for CoAP over TLS that is defined in
<xref target="RFC8323"/>. As using the same ALPN ID for different transport layers is not recommended, another
ALPN ID for CoAP over DTLS is introduced in <xref target="I-D.ietf-core-coap-dtls-alpn"/>. Object security may be
selected in addition to transport layer security or without it. Additionally, different
CoAP transports can be selected, which may be orthogonal to the transport security.
For instance, DTLS can be used over transports other than UDP. The selection of CoAP transport
protocols will be covered in future versions of <xref target="I-D.ietf-core-transport-indication"/>. Defining an ALPN ID for each
combination of object security, mode of transport layer security, and transport protocol might not
be viable or scalable. For some ways of setting up object security, additional information is
needed, such as an establishment options for an encryption context with EDHOC or an authentication
server (AS) with ACE.</t>
      <t>Beyond the SvcParamKeys, there is the question of what the field values of the Encrypted DNS Options
defined in <xref target="RFC9463"/> might be with EDHOC or ACE EDHOC. While most fields map,
"authentication-domain-name" (ADN) and its corresponding ADN length field may not matter
when authentication is driven by Authorization for Constrained Environments (ACE) <xref target="RFC9203"/>
        <xref target="I-D.ietf-ace-edhoc-oscore-profile"/>.</t>
    </section>
    <section anchor="objectives">
      <name>Objectives</name>
      <t>SVCB records are not meant and should not be used to exchange security contexts, so this eliminates
scenarios that use pre-shared keys with OSCORE. This leaves 2 base scenarios for OSCORE, which may
occur in combination, with scenarios using transport security, or alternative transport protocols:</t>
      <ul spacing="normal">
        <li>
          <t>DoC over OSCORE using EDHOC, and</t>
        </li>
        <li>
          <t>DoC using any ACE profile that eventually produces an OSCORE context.</t>
        </li>
      </ul>
      <t>We mostly need to answer the question for additional SvcParamKeys. <xref target="RFC9460"/> defines the keys
"mandatory", "alpn", "no-default-alpn", "port", "ipv4hint", and "ipv6hint".
Additionally, <xref target="I-D.ietf-core-dns-over-coap"/> defines "docpath" which carries the path for the DNS resource at the DoC
server as a CBOR sequence.</t>
      <t>Since "alpn" is needed for transport layer security, the type of object security (OSCORE using
EDHOC, OSCORE using ACE, OSCORE using EDHOC using ACE), needs to be conveyed in a different
SvcParamKey. The semantics and necessacity of the authenticator-domain-name field in <xref target="RFC9463"/> needs
to be evaluated in each case.</t>
      <t>When using ACE, more SvcParamKeys might be needed, such as the OAuth audience, the scope or the
authentication server URI.</t>
      <t>Defining these SvcParamKeys, including their value formats and spaces, as well as the behavior
definition for the authenticator-domain-name field, shall be part of future work.</t>
      <section anchor="scenarios">
        <name>Scenarios</name>
        <t>Two example scenarios illustrate possible ways for which a solution should work;
they are phrased in dialogue form rather than in terms of protocol elements to avoid bias on solutions.</t>
        <section anchor="neighbor-discovered-server-with-edhoc-credential">
          <name>Neighbor discovered server with EDHOC credential</name>
          <t>In which the DoC server restricts access by network address (or not at all),
and the client trusts its router to advertise a suitable Encrypted DNS server.</t>
          <ol spacing="normal" type="1"><li>
              <t>Client: Joins a network.</t>
            </li>
            <li>
              <t>Local router: Sends out an IPv6 Router Advertisement (RA) with Encrypted DNS option (see <xref section="6" sectionFormat="of" target="RFC9463"/>).  </t>
              <t>
Next to the network address, this conveys Service Parameters indicating DoC
as well as a CWT Claims Set (CCS, <xref target="RFC8392"/>) that is to be used as an EDHOC credential.</t>
            </li>
            <li>
              <t>Client starts EDHOC with the server at the indicated address.
The client uses an ephemeral identity (i.e., authenticates with a CCS by value)
and verifies that the DoC server is in possession of the key indicated in the CCS
without explicit transmission of the CCS.</t>
            </li>
          </ol>
        </section>
        <section anchor="dhcp-discovered-server-with-ace-details">
          <name>DHCP discovered server with ACE details</name>
          <t>In which both the DoC client and server have a preconfigured security association with an ACE server,
and trust no one else.</t>
          <ol spacing="normal" type="1"><li>
              <t>Client: Requests an address using DHCP</t>
            </li>
            <li>
              <t>DHCP server: Offers an address along with the DHCPv6 Encrypted DNS Option (see <xref section="5" sectionFormat="of" target="RFC9463"/>).  </t>
              <t>
The option contains an address as well as an indication that ACE is used,
along with sufficient data for the client to obtain an ACE token.  </t>
              <t>
This includes hints like the ACE Request Creation hints:
the address of the AS and an identifier of the DoC server understood by the AS (the "aud"ience).
The address of the AS should be provided in some resolved form, given that DNS is being bootstrapped.</t>
            </li>
            <li>
              <t>Client requests token from AS:  </t>
              <t>
"I need a token for a host that is authorized to be my DNS server
with me being authorized to use it;
these hints were presented for me to obtain it."</t>
            </li>
            <li>
              <t>AS verifies that the hint represents a recognized DNS server,
that the client is authorized to use it,
and issues a token for a suitable ACE profile (e.g. ACE OSCORE profile or ACE EDHOC profile).</t>
            </li>
            <li>
              <t>Client establishes a security context with the DoC server as per the profile.</t>
            </li>
          </ol>
          <!--
There's the funny variation where the DoC server is actually one like in the EDHOC scenario,
but the AS has it on its list of good DoC servers … which might be an interesting discussion starter in ACE:
For the ACE EDHOC profile, this would contain an rs-cnf, but no token – would this Just Work?
For the ACE OSCORE profile, the token would be asymmetrically encrypted, which AIU was not explored previously but might also Just Work.
-->

</section>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>This document has no IANA considerations.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9460">
          <front>
            <title>Service Binding and Parameter Specification via the DNS (SVCB and HTTPS Resource Records)</title>
            <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
            <author fullname="M. Bishop" initials="M." surname="Bishop"/>
            <author fullname="E. Nygren" initials="E." surname="Nygren"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies the "SVCB" ("Service Binding") and "HTTPS" DNS resource record (RR) types to facilitate the lookup of information needed to make connections to network services, such as for HTTP origins. SVCB records allow a service to be provided from multiple alternative endpoints, each with associated parameters (such as transport protocol configuration), and are extensible to support future uses (such as keys for encrypting the TLS ClientHello). They also enable aliasing of apex domains, which is not possible with CNAME. The HTTPS RR is a variation of SVCB for use with HTTP (see RFC 9110, "HTTP Semantics"). By providing more information to the client before it attempts to establish a connection, these records offer potential benefits to both performance and privacy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9460"/>
          <seriesInfo name="DOI" value="10.17487/RFC9460"/>
        </reference>
        <reference anchor="RFC9461">
          <front>
            <title>Service Binding Mapping for DNS Servers</title>
            <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>The SVCB DNS resource record type expresses a bound collection of endpoint metadata, for use when establishing a connection to a named service. DNS itself can be such a service, when the server is identified by a domain name. This document provides the SVCB mapping for named DNS servers, allowing them to indicate support for encrypted transport protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9461"/>
          <seriesInfo name="DOI" value="10.17487/RFC9461"/>
        </reference>
        <reference anchor="RFC9462">
          <front>
            <title>Discovery of Designated Resolvers</title>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="E. Kinnear" initials="E." surname="Kinnear"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <author fullname="T. Jensen" initials="T." surname="Jensen"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document defines Discovery of Designated Resolvers (DDR), a set of mechanisms for DNS clients to use DNS records to discover a resolver's encrypted DNS configuration. An Encrypted DNS Resolver discovered in this manner is referred to as a "Designated Resolver". These mechanisms can be used to move from unencrypted DNS to encrypted DNS when only the IP address of a resolver is known. These mechanisms are designed to be limited to cases where Unencrypted DNS Resolvers and their Designated Resolvers are operated by the same entity or cooperating entities. It can also be used to discover support for encrypted DNS protocols when the name of an Encrypted DNS Resolver is known.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9462"/>
          <seriesInfo name="DOI" value="10.17487/RFC9462"/>
        </reference>
        <reference anchor="RFC9463">
          <front>
            <title>DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers (DNR)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="T. Reddy.K" initials="T." role="editor" surname="Reddy.K"/>
            <author fullname="D. Wing" initials="D." surname="Wing"/>
            <author fullname="N. Cook" initials="N." surname="Cook"/>
            <author fullname="T. Jensen" initials="T." surname="Jensen"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies new DHCP and IPv6 Router Advertisement options to discover encrypted DNS resolvers (e.g., DNS over HTTPS, DNS over TLS, and DNS over QUIC). Particularly, it allows a host to learn an Authentication Domain Name together with a list of IP addresses and a set of service parameters to reach such encrypted DNS resolvers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9463"/>
          <seriesInfo name="DOI" value="10.17487/RFC9463"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC7228">
          <front>
            <title>Terminology for Constrained-Node Networks</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="M. Ersue" initials="M." surname="Ersue"/>
            <author fullname="A. Keranen" initials="A." surname="Keranen"/>
            <date month="May" year="2014"/>
            <abstract>
              <t>The Internet Protocol Suite is increasingly used on small devices with severe constraints on power, memory, and processing resources, creating constrained-node networks. This document provides a number of basic terms that have been useful in the standardization work for constrained-node networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7228"/>
          <seriesInfo name="DOI" value="10.17487/RFC7228"/>
        </reference>
        <reference anchor="RFC7301">
          <front>
            <title>Transport Layer Security (TLS) Application-Layer Protocol Negotiation Extension</title>
            <author fullname="S. Friedl" initials="S." surname="Friedl"/>
            <author fullname="A. Popov" initials="A." surname="Popov"/>
            <author fullname="A. Langley" initials="A." surname="Langley"/>
            <author fullname="E. Stephan" initials="E." surname="Stephan"/>
            <date month="July" year="2014"/>
            <abstract>
              <t>This document describes a Transport Layer Security (TLS) extension for application-layer protocol negotiation within the TLS handshake. For instances in which multiple application protocols are supported on the same TCP or UDP port, this extension allows the application layer to negotiate which protocol will be used within the TLS connection.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7301"/>
          <seriesInfo name="DOI" value="10.17487/RFC7301"/>
        </reference>
        <reference anchor="RFC7858">
          <front>
            <title>Specification for DNS over Transport Layer Security (TLS)</title>
            <author fullname="Z. Hu" initials="Z." surname="Hu"/>
            <author fullname="L. Zhu" initials="L." surname="Zhu"/>
            <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="D. Wessels" initials="D." surname="Wessels"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
              <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7858"/>
          <seriesInfo name="DOI" value="10.17487/RFC7858"/>
        </reference>
        <reference anchor="RFC7959">
          <front>
            <title>Block-Wise Transfers in the Constrained Application Protocol (CoAP)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="Z. Shelby" initials="Z." role="editor" surname="Shelby"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a RESTful transfer protocol for constrained nodes and networks. Basic CoAP messages work well for small payloads from sensors and actuators; however, applications will need to transfer larger payloads occasionally -- for instance, for firmware updates. In contrast to HTTP, where TCP does the grunt work of segmenting and resequencing, CoAP is based on datagram transports such as UDP or Datagram Transport Layer Security (DTLS). These transports only offer fragmentation, which is even more problematic in constrained nodes and networks, limiting the maximum size of resource representations that can practically be transferred.</t>
              <t>Instead of relying on IP fragmentation, this specification extends basic CoAP with a pair of "Block" options for transferring multiple blocks of information from a resource representation in multiple request-response pairs. In many important cases, the Block options enable a server to be truly stateless: the server can handle each block transfer separately, with no need for a connection setup or other server-side memory of previous block transfers. Essentially, the Block options provide a minimal way to transfer larger representations in a block-wise fashion.</t>
              <t>A CoAP implementation that does not support these options generally is limited in the size of the representations that can be exchanged, so there is an expectation that the Block options will be widely used in CoAP implementations. Therefore, this specification updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7959"/>
          <seriesInfo name="DOI" value="10.17487/RFC7959"/>
        </reference>
        <reference anchor="RFC8323">
          <front>
            <title>CoAP (Constrained Application Protocol) over TCP, TLS, and WebSockets</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="S. Lemay" initials="S." surname="Lemay"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="B. Silverajan" initials="B." surname="Silverajan"/>
            <author fullname="B. Raymor" initials="B." role="editor" surname="Raymor"/>
            <date month="February" year="2018"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP), although inspired by HTTP, was designed to use UDP instead of TCP. The message layer of CoAP over UDP includes support for reliable delivery, simple congestion control, and flow control.</t>
              <t>Some environments benefit from the availability of CoAP carried over reliable transports such as TCP or Transport Layer Security (TLS). This document outlines the changes required to use CoAP over TCP, TLS, and WebSockets transports. It also formally updates RFC 7641 for use with these transports and RFC 7959 to enable the use of larger messages over a reliable transport.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8323"/>
          <seriesInfo name="DOI" value="10.17487/RFC8323"/>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="RFC8484">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="RFC8613">
          <front>
            <title>Object Security for Constrained RESTful Environments (OSCORE)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Mattsson" initials="J." surname="Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <date month="July" year="2019"/>
            <abstract>
              <t>This document defines Object Security for Constrained RESTful Environments (OSCORE), a method for application-layer protection of the Constrained Application Protocol (CoAP), using CBOR Object Signing and Encryption (COSE). OSCORE provides end-to-end protection between endpoints communicating using CoAP or CoAP-mappable HTTP. OSCORE is designed for constrained nodes and networks supporting a range of proxy operations, including translation between different transport protocols.</t>
              <t>Although an optional functionality of CoAP, OSCORE alters CoAP options processing and IANA registration. Therefore, this document updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8613"/>
          <seriesInfo name="DOI" value="10.17487/RFC8613"/>
        </reference>
        <reference anchor="RFC9250">
          <front>
            <title>DNS over Dedicated QUIC Connections</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>This document describes the use of QUIC to provide transport confidentiality for DNS. The encryption provided by QUIC has similar properties to those provided by TLS, while QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides more efficient packet-loss recovery than UDP. DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC 7858, and latency characteristics similar to classic DNS over UDP. This specification describes the use of DoQ as a general-purpose transport for DNS and includes the use of DoQ for stub to recursive, recursive to authoritative, and zone transfer scenarios.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9250"/>
          <seriesInfo name="DOI" value="10.17487/RFC9250"/>
        </reference>
        <reference anchor="RFC9203">
          <front>
            <title>The Object Security for Constrained RESTful Environments (OSCORE) Profile of the Authentication and Authorization for Constrained Environments (ACE) Framework</title>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="M. Gunnarsson" initials="M." surname="Gunnarsson"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document specifies a profile for the Authentication and Authorization for Constrained Environments (ACE) framework. It utilizes Object Security for Constrained RESTful Environments (OSCORE) to provide communication security and proof-of-possession for a key owned by the client and bound to an OAuth 2.0 access token.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9203"/>
          <seriesInfo name="DOI" value="10.17487/RFC9203"/>
        </reference>
        <reference anchor="RFC9528">
          <front>
            <title>Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>This document specifies Ephemeral Diffie-Hellman Over COSE (EDHOC), a very compact and lightweight authenticated Diffie-Hellman key exchange with ephemeral keys. EDHOC provides mutual authentication, forward secrecy, and identity protection. EDHOC is intended for usage in constrained scenarios, and a main use case is to establish an Object Security for Constrained RESTful Environments (OSCORE) security context. By reusing CBOR Object Signing and Encryption (COSE) for cryptography, Concise Binary Object Representation (CBOR) for encoding, and Constrained Application Protocol (CoAP) for transport, the additional code size can be kept very low.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9528"/>
          <seriesInfo name="DOI" value="10.17487/RFC9528"/>
        </reference>
        <reference anchor="I-D.amsuess-core-coap-over-gatt">
          <front>
            <title>CoAP over GATT (Bluetooth Low Energy Generic Attributes)</title>
            <author fullname="Christian Amsüss" initials="C." surname="Amsüss">
         </author>
            <date day="25" month="September" year="2024"/>
            <abstract>
              <t>   Interaction from computers and cell phones to constrained devices is
   limited by the different network technologies used, and by the
   available APIs.  This document describes a transport for the
   Constrained Application Protocol (CoAP) that uses Bluetooth GATT
   (Generic Attribute Profile) and its use cases.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-amsuess-core-coap-over-gatt-07"/>
        </reference>
        <reference anchor="I-D.ietf-ace-edhoc-oscore-profile">
          <front>
            <title>Ephemeral Diffie-Hellman Over COSE (EDHOC) and Object Security for Constrained Environments (OSCORE) Profile for Authentication and Authorization for Constrained Environments (ACE)</title>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE</organization>
            </author>
            <author fullname="Rikard Höglund" initials="R." surname="Höglund">
              <organization>RISE</organization>
            </author>
            <date day="7" month="July" year="2025"/>
            <abstract>
              <t>   This document specifies a profile for the Authentication and
   Authorization for Constrained Environments (ACE) framework.  It
   utilizes Ephemeral Diffie-Hellman Over COSE (EDHOC) for achieving
   mutual authentication between an ACE-OAuth client and resource
   server, and it binds an authentication credential of the client to an
   ACE-OAuth access token.  EDHOC also establishes an Object Security
   for Constrained RESTful Environments (OSCORE) Security Context, which
   is used to secure communications between the client and resource
   server when accessing protected resources according to the
   authorization information indicated in the access token.  This
   profile can be used to delegate management of authorization
   information from a resource-constrained server to a trusted host with
   less severe limitations regarding processing power and memory.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ace-edhoc-oscore-profile-08"/>
        </reference>
        <reference anchor="I-D.ietf-core-dns-over-coap">
          <front>
            <title>DNS over CoAP (DoC)</title>
            <author fullname="Martine Sophie Lenders" initials="M. S." surname="Lenders">
              <organization>TUD Dresden University of Technology</organization>
            </author>
            <author fullname="Christian Amsüss" initials="C." surname="Amsüss">
         </author>
            <author fullname="Cenk Gündoğan" initials="C." surname="Gündoğan">
              <organization>NeuralAgent GmbH</organization>
            </author>
            <author fullname="Thomas C. Schmidt" initials="T. C." surname="Schmidt">
              <organization>HAW Hamburg</organization>
            </author>
            <author fullname="Matthias Wählisch" initials="M." surname="Wählisch">
              <organization>TUD Dresden University of Technology &amp; Barkhausen Institut</organization>
            </author>
            <date day="19" month="June" year="2025"/>
            <abstract>
              <t>   This document defines a protocol for exchanging DNS messages over the
   Constrained Application Protocol (CoAP).  These CoAP messages can be
   protected by DTLS-Secured CoAP (CoAPS) or Object Security for
   Constrained RESTful Environments (OSCORE) to provide encrypted DNS
   message exchange for constrained devices in the Internet of Things
   (IoT).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-dns-over-coap-15"/>
        </reference>
        <reference anchor="I-D.ietf-core-transport-indication">
          <front>
            <title>CoAP Transport Indication</title>
            <author fullname="Christian Amsüss" initials="C." surname="Amsüss">
         </author>
            <author fullname="Martine Sophie Lenders" initials="M. S." surname="Lenders">
              <organization>TUD Dresden University of Technology</organization>
            </author>
            <date day="3" month="March" year="2025"/>
            <abstract>
              <t>   The Constrained Application Protocol (CoAP, [RFC7252]) is available
   over different transports (UDP, DTLS, TCP, TLS, WebSockets), but
   lacks a way to unify these addresses.  This document provides
   terminology and provisions based on Web Linking [RFC8288] and Service
   Bindings (SVCB, [RFC9460]) to express alternative transports
   available to a device, and to optimize exchanges using these.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-transport-indication-08"/>
        </reference>
        <reference anchor="I-D.ietf-core-coap-dtls-alpn">
          <front>
            <title>ALPN ID Specification for CoAP over DTLS</title>
            <author fullname="Martine Sophie Lenders" initials="M. S." surname="Lenders">
              <organization>TUD Dresden University of Technology</organization>
            </author>
            <author fullname="Christian Amsüss" initials="C." surname="Amsüss">
         </author>
            <author fullname="Thomas C. Schmidt" initials="T. C." surname="Schmidt">
              <organization>HAW Hamburg</organization>
            </author>
            <author fullname="Matthias Wählisch" initials="M." surname="Wählisch">
              <organization>TUD Dresden University of Technology &amp; Barkhausen Institut</organization>
            </author>
            <date day="1" month="April" year="2025"/>
            <abstract>
              <t>   This document specifies an Application-Layer Protocol Negotiation
   (ALPN) ID for transport-layer-secured Constrained Application
   Protocol (CoAP) services.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-coap-dtls-alpn-04"/>
        </reference>
        <reference anchor="lwm2m" target="https://omaspecworks.org/white-paper-lightweight-m2m-1-1/">
          <front>
            <title>White Paper – Lightweight M2M 1.1</title>
            <author>
              <organization>OMA SpecWorks</organization>
            </author>
            <date year="2018" month="October"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 273?>

<section anchor="change-log">
      <name>Change Log</name>
      <section anchor="since-draft-lenders-core-dnr-05">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-lenders-core-dnr-05">draft-lenders-core-dnr-05</eref></name>
        <ul spacing="normal">
          <li>
            <t>Nits</t>
          </li>
          <li>
            <t>Moving GitHub repo to netd-tud org</t>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-lenders-core-dnr-04">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-lenders-core-dnr-04">draft-lenders-core-dnr-04</eref></name>
        <ul spacing="normal">
          <li>
            <t>Avoid the term "security mode" as it has a specific definition in RFC 7252</t>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-lenders-core-dnr-03">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-lenders-core-dnr-03">draft-lenders-core-dnr-03</eref></name>
        <ul spacing="normal">
          <li>
            <t>Update <xref target="I-D.ietf-core-coap-dtls-alpn"/> reference</t>
          </li>
          <li>
            <t>intro: overhaul explanation of OSCORE setup</t>
          </li>
          <li>
            <t>objectives: Be open on ACE profiles</t>
          </li>
          <li>
            <t>Add scenarios</t>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-lenders-core-dnr-02">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-lenders-core-dnr-02">draft-lenders-core-dnr-02</eref></name>
        <ul spacing="normal">
          <li>
            <t>Forward reference to upcoming changes in <xref target="I-D.ietf-core-transport-indication"/> updated</t>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-lenders-core-dnr-01">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-lenders-core-dnr-01">draft-lenders-core-dnr-01</eref></name>
        <ul spacing="normal">
          <li>
            <t>Remove parts specified in <xref target="I-D.ietf-core-transport-indication"/></t>
          </li>
          <li>
            <t>Remove parts specified in <xref target="I-D.ietf-core-coap-dtls-alpn"/></t>
          </li>
          <li>
            <t>Remove solution sketches, set objectives to solve problem space</t>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-lenders-core-dnr-00">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-lenders-core-dnr-00">draft-lenders-core-dnr-00</eref></name>
        <ul spacing="normal">
          <li>
            <t>IANA has processed the "co" ALPN and it is now added to the registry</t>
          </li>
        </ul>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
