<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.6.2 (Ruby 3.0.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-lenders-dns-over-coap-03" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.12.3 -->
  <front>
    <title abbrev="DoC">DNS Queries over CoAP (DoC)</title>
    <seriesInfo name="Internet-Draft" value="draft-lenders-dns-over-coap-03"/>
    <author initials="M. S." surname="Lenders" fullname="Martine Sophie Lenders">
      <organization abbrev="FU Berlin">Freie Universität Berlin</organization>
      <address>
        <email>m.lenders@fu-berlin.de</email>
      </address>
    </author>
    <author initials="C." surname="Amsüss" fullname="Christian Amsüss">
      <organization/>
      <address>
        <email>christian@amsuess.com</email>
      </address>
    </author>
    <author initials="C." surname="Gündoğan" fullname="Cenk Gündoğan">
      <organization>HAW Hamburg</organization>
      <address>
        <email>cenk.guendogan@haw-hamburg.de</email>
      </address>
    </author>
    <author initials="T. C." surname="Schmidt" fullname="Thomas C. Schmidt">
      <organization>HAW Hamburg</organization>
      <address>
        <email>t.schmidt@haw-hamburg.de</email>
      </address>
    </author>
    <author initials="M." surname="Wählisch" fullname="Matthias Wählisch">
      <organization abbrev="FU Berlin">Freie Universität Berlin</organization>
      <address>
        <email>m.waehlisch@fu-berlin.de</email>
      </address>
    </author>
    <date year="2022" month="March" day="07"/>
    <area>Applications</area>
    <workgroup>CoRE</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document defines a protocol for sending DNS messages over the
Constrained Application Protocol (CoAP). These CoAP messages are protected
by DTLS-Secured CoAP (CoAPS) or Object Security for Constrained RESTful
Environments (OSCORE) to provide encrypted DNS message exchange for
constrained devices in the Internet of Things (IoT).</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on TODO <!--the
    Constrained RESTful Environments Working Group mailing list (core@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/core/"/>.-->
      </t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/anr-bmbf-pivot/draft-dns-over-coap"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>This document defines DNS over CoAP (DoC), a protocol to send DNS
<xref target="RFC1035"/> queries and get DNS responses over the Constrained Application
Protocol (CoAP) <xref target="RFC7252"/>. Each DNS query-response pair is mapped into a
CoAP message exchange. Each CoAP message is secured by DTLS <xref target="RFC6347"/> or
Object Security for Constrained RESTful Environments (OSCORE) <xref target="RFC8613"/>
to ensure message integrity and confidentiality.</t>
      <t>The application use case of DoC is inspired by DNS over HTTPS <xref target="RFC8484"/>
(DoH). DoC, however, aims for the deployment in the constrained Internet of
Things (IoT), which usually conflicts with the requirements introduced by
HTTPS.</t>
      <t>To prevent TCP and HTTPS resource requirements, constrained IoT devices
could use DNS over DTLS <xref target="RFC8094"/>. In contrast to DNS over DTLS, DoC
utilizes CoAP features to mitigate drawbacks of datagram-based
communication. These features include: block-wise transfer, which solves
the Path MTU problem of DNS over DTLS (see <xref target="RFC8094"/>, section 5); CoAP
proxies, which provide an additional level of caching; re-use of data
structures for application traffic and DNS information, which saves memory
on constrained devices.</t>
      <t>To prevent resource requirements of DTLS or TLS on top of UDP (e.g.,
introduced by DNS over QUIC <xref target="I-D.ietf-dprive-dnsoquic"/>), DoC allows
for lightweight end-to-end payload encryption based on OSCORE.</t>
      <figure anchor="fig-overview-arch">
        <name>Basic DoC architecture</name>
        <sourcecode type="drawing"><![CDATA[
                - FETCH coaps://[2001:db8::1]/
               /
              /
             CoAP request
+--------+   [DNS query]   +--------+   DNS query    +--------+
|  DoC   |---------------->|  DoC   |...............>|  DNS   |
| Client |<----------------| Server |<...............| Server |
+--------+  CoAP response  +--------+  DNS response  +--------+
            [DNS response]

]]></sourcecode>
      </figure>
      <t>The most important components of DoC can be seen in <xref target="fig-overview-arch"/>: A DoC
client tries to resolve DNS information by sending DNS queries carried within
CoAP requests to a DoC server. That DoC server may or may not resolve that DNS
information itself by using other DNS transports with an upstream DNS server.
The DoC server then replies to the DNS queries with DNS responses carried within
CoAP responses.</t>
      <t>TBD: additional feature sets of CoAP/CoRE</t>
      <ul spacing="normal">
        <li>resource directory for DoC service discovery,</li>
        <li>...</li>
      </ul>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>A server that provides the service specified in this document is called a "DoC
server" to differentiate it from a classic "DNS server". Correspondingly, a
client using this protocol to retrieve the DNS information is called a "DoC
client".</t>
      <t>The term "constrained nodes" is used as defined in <xref target="RFC7228"/>.</t>
      <t>The terms "CoAP payload" and "CoAP body" are used as defined in <xref target="RFC7959"/>.</t>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="selection-of-a-doc-server">
      <name>Selection of a DoC Server</name>
      <t>In this document, it is assumed that the DoC client knows the DoC server and the DNS resource at the
DoC server.
Possible options could be manual configuration of a URI <xref target="RFC3986"/> or CRI <xref target="I-D.ietf-core-href"/>,
or automatic configuration, e.g., using a CoRE resource directory
<xref target="I-D.ietf-core-resource-directory"/>, DHCP or Router Advertisement options <xref target="I-D.ietf-add-dnr"/>.
Automatic configuration <bcp14>SHOULD</bcp14> only be done from a trusted source.</t>
      <t>When discovering the DNS resource through a link mechanism that allows describing a resource type
(e.g., the Resource Type Attribute in <xref target="RFC6690"/>), the resource type "core.dns" can be used to
identify a generic DNS resolver that is available to the client.</t>
    </section>
    <section anchor="basic-message-exchange">
      <name>Basic Message Exchange</name>
      <section anchor="sec_content-format">
        <name>The "application/dns-message" Content-Format</name>
        <t>This document defines the Internet media type "application/dns-message" for
the CoAP Content-Format. This media type is defined as in <xref target="RFC8484"/>
Section 6, i.e., a single DNS message encoded in the DNS on-the-wire format
<xref target="RFC1035"/>.</t>
      </section>
      <section anchor="dns-queries-in-coap-requests">
        <name>DNS Queries in CoAP Requests</name>
        <t>A DoC client encodes a single DNS query in one or more CoAP request messages the CoAP FETCH <xref target="RFC8132"/> method.
Requests <bcp14>SHOULD</bcp14> include an Accept option to indicate the type of content that can be parsed in the response.</t>
        <t>To enable reliable message exchange, the CoAP request <bcp14>SHOULD</bcp14> be carried in a Confirmable (CON) message.</t>
        <section anchor="request-format">
          <name>Request Format</name>
          <t>When sending a CoAP request, a DoC client <bcp14>MUST</bcp14> include the DNS query in the body (i.e. the payload, or the concatenated payloads) of the CoAP request.
As specified in <xref target="RFC8132"/> Section 2.3.1, the type of content of the body <bcp14>MUST</bcp14> be indicated using the Content-Format option.
This document specifies the usage of Content-Format "application/dns-message" (details see <xref target="sec_content-format"/>).</t>
          <t>If block-wise transfer <xref target="RFC7959"/> is supported by the client, more than one CoAP request message <bcp14>MAY</bcp14> be used.
If more than one CoAP request message is used to encode the DNS query, it
must be chained together using the Block1 option in those CoAP requests.</t>
          <t>The FETCH request is sent to the URI specified in <xref target="selection-of-a-doc-server"/>.</t>
          <t>A DoC server <bcp14>MUST</bcp14> be able to parse requests of Content-Format
"application/dns-message".</t>
        </section>
        <section anchor="sec_req-caching">
          <name>Support of CoAP Caching</name>
          <t>The DoC client <bcp14>SHOULD</bcp14> set the ID field of the DNS header always to 0 to enable a CoAP cache (e.g., a CoAP proxy en-route) to respond to the same DNS queries with a cache entry.
This ensures that the CoAP Cache-Key (see <xref target="RFC8132"/> Section 2) does not change when multiple DNS queries for the same DNS data, carried in CoAP requests, are issued.</t>
        </section>
        <section anchor="examples">
          <name>Examples</name>
          <t>The following example illustrates the usage of a CoAP message to
resolve "example.org. IN AAAA" based on the URI "coaps://[2001:db8::1]/". The
CoAP body is encoded in "application/dns-message" Content Format.</t>
          <artwork><![CDATA[
FETCH coaps://[2001:db8::1]/
Content-Format: application/dns-message
Accept: application/dns-message
Payload: 00 00 01 20 00 02 00 00 00 00 00 00 07 65 78 61 [binary]
         6d 70 6c 65 03 6f 72 67 00 00 1c 00 01 c0 0c 00 [binary]
         01 00 01                                        [binary]
]]></artwork>
        </section>
      </section>
      <section anchor="dns-responses-in-coap-responses">
        <name>DNS Responses in CoAP Responses</name>
        <t>Each DNS query-response pair is mapped to a CoAP REST request-response
operation, which may consist of several CoAP request-response pairs if
block-wise transfer is involved.  DNS responses are provided in the body (i.e. the
payload, or the concatenated payloads) of the CoAP response. A DoC server <bcp14>MUST</bcp14>
indicate the type of content of the body using the Content-Format option,
and <bcp14>MUST</bcp14> be able to produce responses in the "application/dns-message"
Content-Format (details see <xref target="sec_content-format"/>) when requested.
A DoC client <bcp14>MUST</bcp14> understand responses in "application/dns-message" format
when it does not send an Accept option.</t>
        <t>If supported, a DoC server <bcp14>MAY</bcp14> transfer the DNS response in more than one
CoAP responses using the Block2 option <xref target="RFC7959"/>.</t>
        <section anchor="response-codes-and-handling-dns-and-coap-errors">
          <name>Response Codes and Handling DNS and CoAP errors</name>
          <t>A DNS response indicates either success or failure in the Response code of
the DNS header (see <xref target="RFC1035"/> Section 4.1.1). It is <bcp14>RECOMMENDED</bcp14> that
CoAP responses that carry any valid DNS response use a "2.05 Content"
response code.</t>
          <t>CoAP responses use non-successful response codes <bcp14>MUST NOT</bcp14> contain any payload
and may only be used on errors in the CoAP layer or when a request does not
fulfill the requirements of the DoC protocol.</t>
          <t>Communication errors with a DNS server (e.g., timeouts) <bcp14>SHOULD</bcp14> be indicated
by including a SERVFAIL DNS response in a successful CoAP response.</t>
          <t>A DoC client might try to repeat a non-successful exchange unless otherwise prohibited.
The DoC client might also decide to repeat a non-successful exchange with a different URI, for instance, when the response indicates an unsupported Content-Format.</t>
        </section>
        <section anchor="sec_resp-caching">
          <name>Support of CoAP Caching</name>
          <t>It is <bcp14>RECOMMENDED</bcp14> to set the Max-Age option of a response to the minimum TTL in the Answer section of a DNS response. This prevents expired records unintentionally being served from a CoAP cache.</t>
          <t>It is <bcp14>RECOMMENDED</bcp14> that DoC servers set an ETag option on large responses (TBD: more concrete guidance) that have a short Max-Age relative to the expected clients' caching time.
Thus, clients that need to revalidate a response can do so using the established ETag mechanism.
<!--
With short responses, a usable ETag might be almost as long as the response.
With long-lived responses, the client does not need to revalidate often.
-->
With responses large enough to be fragmented,
it's best practice for servers to set an ETag anyway.
As specified in <xref target="RFC7252"/> and <xref target="RFC8132"/>, if the response associated with
the ETag is still valid, the response uses the "2.03 Valid" code and consequently
carries no payload.</t>
        </section>
        <section anchor="examples-1">
          <name>Examples</name>
          <t>The following examples illustrate the replies to the query "example.org. IN
AAAA record", recursion turned on. Successful responses carry one answer
record including address 2001:db8:1::1:2:3:4 and TTL 58719.</t>
          <t>A successful response:</t>
          <artwork><![CDATA[
2.05 Content
Content-Format: application/dns-message
Max-Age: 58719
Payload: 00 00 81 a0 00 01 00 01 00 00 00 00 07 65 78 61 [binary]
         6d 70 6c 65 03 6f 72 67 00 00 1c 00 01 c0 0c 00 [binary]
         1c 00 01 00 01 37 49 00 10 20 01 0d b8 00 01 00 [binary]
         00 00 01 00 02 00 03 00 04                      [binary]
]]></artwork>
          <t>When a DNS error (SERVFAIL in this case) is noted in the DNS response, the CoAP
response still indicates success:</t>
          <artwork><![CDATA[
2.05 Content
Content-Format: application/dns-message
Payload: 00 00 81 a2 00 01 00 00 00 00 00 00 07 65 78 61 [binary]
         6d 70 6c 65 03 6f 72 67 00 00 1c 00 01          [binary]
]]></artwork>
          <t>When an error occurs on the CoAP layer, the DoC server <bcp14>SHOULD</bcp14> respond with
an appropriate CoAP error, for instance "4.15 Unsupported Content-Format"
if the Content-Format option in the request was not set to
"application/dns-message" and the Content-Format is not otherwise supported by
the server.</t>
        </section>
      </section>
    </section>
    <section anchor="coapcore-integration">
      <name>CoAP/CoRE Integration</name>
      <section anchor="doc-server-considerations">
        <name>DoC server considerations</name>
        <t>In the case of CNAME records in a DNS response, a DoC server <bcp14>SHOULD</bcp14> follow common DNS resolver
behavior <xref target="RFC1034"/> by resolving a CNAME until the originally requested resource record type is
reached. This reduces the number of message exchanges within an LLN.</t>
        <t>The DoC server <bcp14>SHOULD</bcp14> send compact answers, i.e., additional or authority sections in the DNS
response should only be sent if needed or if it is anticipated that they help the DoC client to
reduce additional queries.</t>
      </section>
      <section anchor="proxies-and-caching">
        <name>Proxies and caching</name>
        <t>TBD:</t>
        <ul spacing="normal">
          <li>
            <eref target="https://github.com/anr-bmbf-pivot/draft-dns-over-coap/issues/5">TTL vs. Max-Age</eref></li>
          <li>Responses that are not globally valid</li>
          <li>
            <t>General CoAP proxy problem, but what to do when DoC server is a DNS proxy,
response came not yet in but retransmission by DoC client was received (see
<xref target="rt-problem"/>)
            </t>
            <ul spacing="normal">
              <li>
                <t>send empty ACK (<eref target="https://github.com/anr-bmbf-pivot/draft-dns-over-coap/issues/6#issuecomment-895880206">maybe move to best practices appendix</eref>)      </t>
                <figure anchor="rt-problem">
                  <name>CoAP retransmission (rt) is received before DNS query could have been fulfilled.</name>
                  <sourcecode type="drawing"><![CDATA[
DoC client           DoC proxy           DNS server
     |  CoAP req [rt 1]  |                    |
     |------------------>|  DNS query [rt 1]  |
     |                   |------------------->|
     |  CoAP req [rt 2]  |                    |
     |------------------>|      DNS resp      |
     |     CoAP resp     |<-------------------|
     |<------------------|                    |
     |                   |                    |
]]></sourcecode>
                </figure>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="observe-modifications">
        <name>OBSERVE (modifications)?</name>
        <ul spacing="normal">
          <li>TBD</li>
          <li>DoH has considerations on Server Push to deliver additional, potentially
outstanding requests + response to the DoC client for caching</li>
          <li>OBSERVE does not include the request it would have been generated from ==&gt;
cannot be cached without corresponding request having been send over the wire.</li>
          <li>If use case exists: extend OBSERVE with option that contains "promised" request
(see <xref target="RFC7540"/>, section 8.2)?</li>
          <li>Other caveat: clients can't cache, only proxys so value needs to be evaluated</li>
          <li>Potential use case: <xref target="RFC8490"/> Section 4.1.2</li>
        </ul>
      </section>
      <section anchor="oscore">
        <name>OSCORE</name>
        <ul spacing="normal">
          <li>TBD</li>
          <li>With OSCORE DTLS might not be required</li>
        </ul>
      </section>
    </section>
    <section anchor="considerations-for-unencrypted-use">
      <name>Considerations for Unencrypted Use</name>
      <t>While not recommended,
DoC can be used without any encryption
(e.g., in very constrained environments where encryption is not possible or necessary).
It can also be used when lower layers provide secure communication between client and server.
In both cases,
potential benefits of
unencrypted DoC usage over classic DNS are e.g. block-wise transfer or alternative CoAP
Content-Formats to overcome link-layer constraints.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="new-applicationdns-message-content-format">
        <name>New "application/dns-message" Content-Format</name>
        <t>IANA is requested to assign CoAP Content-Format ID for the DNS message media
type in the "CoAP Content-Formats" sub-registry, within the "CoRE Parameters"
registry <xref target="RFC7252"/>, corresponding the "application/dns-message" media
type from the "Media Types" registry:</t>
        <t>Media-Type: application/dns-message</t>
        <t>Encoding: -</t>
        <t>Id: TBD</t>
        <t>Reference: [TBD-this-spec]</t>
      </section>
      <section anchor="new-coredns-resource-type">
        <name>New "core.dns" Resource Type</name>
        <t>IANA is requested to assign a new Resource Type (rt=) Link Target Attribute, "core.dns" in the
"Resource Type (rt=) Link Target Attribute Values" sub-registry, within the "CoRE Parameters"
register <xref target="RFC6690"/>.</t>
        <t>Attribute Value: core.dns</t>
        <t>Description: DNS over CoAP resource.</t>
        <t>Reference: [TBD-this-spec] <xref target="selection-of-a-doc-server"/></t>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC1035">
          <front>
            <title>Domain names - implementation and specification</title>
            <author fullname="P.V. Mockapetris" initials="P.V." surname="Mockapetris">
              <organization/>
            </author>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System.  It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1035"/>
          <seriesInfo name="DOI" value="10.17487/RFC1035"/>
        </reference>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby">
              <organization/>
            </author>
            <author fullname="K. Hartke" initials="K." surname="Hartke">
              <organization/>
            </author>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks.  The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s.  The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types.  CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC6347">
          <front>
            <title>Datagram Transport Layer Security Version 1.2</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu">
              <organization/>
            </author>
            <date month="January" year="2012"/>
            <abstract>
              <t>This document specifies version 1.2 of the Datagram Transport Layer Security (DTLS) protocol.  The DTLS protocol provides communications privacy for datagram protocols.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.  The DTLS protocol is based on the Transport Layer Security (TLS) protocol and provides equivalent security guarantees.  Datagram semantics of the underlying transport are preserved by the DTLS protocol.  This document updates DTLS 1.0 to work with TLS version 1.2.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6347"/>
          <seriesInfo name="DOI" value="10.17487/RFC6347"/>
        </reference>
        <reference anchor="RFC8613">
          <front>
            <title>Object Security for Constrained RESTful Environments (OSCORE)</title>
            <author fullname="G. Selander" initials="G." surname="Selander">
              <organization/>
            </author>
            <author fullname="J. Mattsson" initials="J." surname="Mattsson">
              <organization/>
            </author>
            <author fullname="F. Palombini" initials="F." surname="Palombini">
              <organization/>
            </author>
            <author fullname="L. Seitz" initials="L." surname="Seitz">
              <organization/>
            </author>
            <date month="July" year="2019"/>
            <abstract>
              <t>This document defines Object Security for Constrained RESTful Environments (OSCORE), a method for application-layer protection of the Constrained Application Protocol (CoAP), using CBOR Object Signing and Encryption (COSE).  OSCORE provides end-to-end protection between endpoints communicating using CoAP or CoAP-mappable HTTP. OSCORE is designed for constrained nodes and networks supporting a range of proxy operations, including translation between different transport protocols.</t>
              <t>Although an optional functionality of CoAP, OSCORE alters CoAP options processing and IANA registration.  Therefore, this document updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8613"/>
          <seriesInfo name="DOI" value="10.17487/RFC8613"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8132">
          <front>
            <title>PATCH and FETCH Methods for the Constrained Application Protocol (CoAP)</title>
            <author fullname="P. van der Stok" initials="P." surname="van der Stok">
              <organization/>
            </author>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <author fullname="A. Sehgal" initials="A." surname="Sehgal">
              <organization/>
            </author>
            <date month="April" year="2017"/>
            <abstract>
              <t>The methods defined in RFC 7252 for the Constrained Application Protocol (CoAP) only allow access to a complete resource, not to parts of a resource.  In case of resources with larger or complex data, or in situations where resource continuity is required, replacing or requesting the whole resource is undesirable.  Several applications using CoAP need to access parts of the resources.</t>
              <t>This specification defines the new CoAP methods, FETCH, PATCH, and iPATCH, which are used to access and update parts of a resource.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8132"/>
          <seriesInfo name="DOI" value="10.17487/RFC8132"/>
        </reference>
        <reference anchor="RFC7959">
          <front>
            <title>Block-Wise Transfers in the Constrained Application Protocol (CoAP)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <author fullname="Z. Shelby" initials="Z." role="editor" surname="Shelby">
              <organization/>
            </author>
            <date month="August" year="2016"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a RESTful transfer protocol for constrained nodes and networks.  Basic CoAP messages work well for small payloads from sensors and actuators; however, applications will need to transfer larger payloads occasionally -- for instance, for firmware updates.  In contrast to HTTP, where TCP does the grunt work of segmenting and resequencing, CoAP is based on datagram transports such as UDP or Datagram Transport Layer Security (DTLS).  These transports only offer fragmentation, which is even more problematic in constrained nodes and networks, limiting the maximum size of resource representations that can practically be transferred.</t>
              <t>Instead of relying on IP fragmentation, this specification extends basic CoAP with a pair of "Block" options for transferring multiple blocks of information from a resource representation in multiple request-response pairs.  In many important cases, the Block options enable a server to be truly stateless: the server can handle each block transfer separately, with no need for a connection setup or other server-side memory of previous block transfers.  Essentially, the Block options provide a minimal way to transfer larger representations in a block-wise fashion.</t>
              <t>A CoAP implementation that does not support these options generally is limited in the size of the representations that can be exchanged, so there is an expectation that the Block options will be widely used in CoAP implementations.  Therefore, this specification updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7959"/>
          <seriesInfo name="DOI" value="10.17487/RFC7959"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC8484">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <author fullname="P. McManus" initials="P." surname="McManus">
              <organization/>
            </author>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS.  Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="RFC8094">
          <front>
            <title>DNS over Datagram Transport Layer Security (DTLS)</title>
            <author fullname="T. Reddy" initials="T." surname="Reddy">
              <organization/>
            </author>
            <author fullname="D. Wing" initials="D." surname="Wing">
              <organization/>
            </author>
            <author fullname="P. Patil" initials="P." surname="Patil">
              <organization/>
            </author>
            <date month="February" year="2017"/>
            <abstract>
              <t>DNS queries and responses are visible to network elements on the path between the DNS client and its server.  These queries and responses can contain privacy-sensitive information, which is valuable to protect.</t>
              <t>This document proposes the use of Datagram Transport Layer Security (DTLS) for DNS, to protect against passive listeners and certain active attacks.  As latency is critical for DNS, this proposal also discusses mechanisms to reduce DTLS round trips and reduce the DTLS handshake size.  The proposed mechanism runs over port 853.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8094"/>
          <seriesInfo name="DOI" value="10.17487/RFC8094"/>
        </reference>
        <reference anchor="I-D.ietf-dprive-dnsoquic">
          <front>
            <title>DNS over Dedicated QUIC Connections</title>
            <author fullname="Christian Huitema">
              <organization>Private Octopus Inc.</organization>
            </author>
            <author fullname="Sara Dickinson">
              <organization>Sinodun IT</organization>
            </author>
            <author fullname="Allison Mankin">
              <organization>Salesforce</organization>
            </author>
            <date day="28" month="February" year="2022"/>
            <abstract>
              <t>   This document describes the use of QUIC to provide transport privacy
   for DNS.  The encryption provided by QUIC has similar properties to
   that provided by TLS, while QUIC transport eliminates the head-of-
   line blocking issues inherent with TCP and provides more efficient
   packet loss recovery than UDP.  DNS over QUIC (DoQ) has privacy
   properties similar to DNS over TLS (DoT) specified in RFC7858, and
   latency characteristics similar to classic DNS over UDP.  This
   specification describes the use of DNS over QUIC as a general-purpose
   transport for DNS and includes the use of DNS over QUIC for stub to
   recursive, recursive to authoritative, and zone transfer scenarios.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dprive-dnsoquic-10"/>
        </reference>
        <reference anchor="RFC7228">
          <front>
            <title>Terminology for Constrained-Node Networks</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <author fullname="M. Ersue" initials="M." surname="Ersue">
              <organization/>
            </author>
            <author fullname="A. Keranen" initials="A." surname="Keranen">
              <organization/>
            </author>
            <date month="May" year="2014"/>
            <abstract>
              <t>The Internet Protocol Suite is increasingly used on small devices with severe constraints on power, memory, and processing resources, creating constrained-node networks.  This document provides a number of basic terms that have been useful in the standardization work for constrained-node networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7228"/>
          <seriesInfo name="DOI" value="10.17487/RFC7228"/>
        </reference>
        <reference anchor="RFC3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee">
              <organization/>
            </author>
            <author fullname="R. Fielding" initials="R." surname="Fielding">
              <organization/>
            </author>
            <author fullname="L. Masinter" initials="L." surname="Masinter">
              <organization/>
            </author>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource.  This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet.  The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier.  This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="I-D.ietf-core-href">
          <front>
            <title>Constrained Resource Identifiers</title>
            <author fullname="Carsten Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <author fullname="Henk Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <date day="15" month="January" year="2022"/>
            <abstract>
              <t>   The Constrained Resource Identifier (CRI) is a complement to the
   Uniform Resource Identifier (URI) that serializes the URI components
   in Concise Binary Object Representation (CBOR) instead of a sequence
   of characters.  This simplifies parsing, comparison and reference
   resolution in environments with severe limitations on processing
   power, code size, and memory size.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-href-09"/>
        </reference>
        <reference anchor="I-D.ietf-core-resource-directory">
          <front>
            <title>CoRE Resource Directory</title>
            <author fullname="Christian Amsüss">
	 </author>
            <author fullname="Zach Shelby">
              <organization>ARM</organization>
            </author>
            <author fullname="Michael Koster">
              <organization>SmartThings</organization>
            </author>
            <author fullname="Carsten Bormann">
              <organization>Universitaet Bremen TZI</organization>
            </author>
            <author fullname="Peter van der Stok">
              <organization>consultant</organization>
            </author>
            <date day="7" month="March" year="2021"/>
            <abstract>
              <t>   In many IoT applications, direct discovery of resources is not
   practical due to sleeping nodes, or networks where multicast traffic
   is inefficient.  These problems can be solved by employing an entity
   called a Resource Directory (RD), which contains information about
   resources held on other servers, allowing lookups to be performed for
   those resources.  The input to an RD is composed of links and the
   output is composed of links constructed from the information stored
   in the RD.  This document specifies the web interfaces that an RD
   supports for web servers to discover the RD and to register,
   maintain, lookup and remove information on resources.  Furthermore,
   new target attributes useful in conjunction with an RD are defined.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-resource-directory-28"/>
        </reference>
        <reference anchor="I-D.ietf-add-dnr">
          <front>
            <title>DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers (DNR)</title>
            <author fullname="Mohamed Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Tirumaleswar Reddy">
              <organization>Akamai</organization>
            </author>
            <author fullname="Dan Wing">
              <organization>Citrix Systems, Inc.</organization>
            </author>
            <author fullname="Neil Cook">
              <organization>Open-Xchange</organization>
            </author>
            <author fullname="Tommy Jensen">
              <organization>Microsoft</organization>
            </author>
            <date day="13" month="December" year="2021"/>
            <abstract>
              <t>   The document specifies new DHCP and IPv6 Router Advertisement options
   to discover encrypted DNS servers (e.g., DNS-over-HTTPS, DNS-over-
   TLS, DNS-over-QUIC).  Particularly, it allows to learn an
   authentication domain name together with a list of IP addresses and a
   set of service parameters to reach such encrypted DNS servers.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-add-dnr-05"/>
        </reference>
        <reference anchor="RFC6690">
          <front>
            <title>Constrained RESTful Environments (CoRE) Link Format</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby">
              <organization/>
            </author>
            <date month="August" year="2012"/>
            <abstract>
              <t>This specification defines Web Linking using a link format for use by constrained web servers to describe hosted resources, their attributes, and other relationships between links.  Based on the HTTP Link Header field defined in RFC 5988, the Constrained RESTful Environments (CoRE) Link Format is carried as a payload and is assigned an Internet media type.  "RESTful" refers to the Representational State Transfer (REST) architecture.  A well-known URI is defined as a default entry point for requesting the links hosted by a server.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6690"/>
          <seriesInfo name="DOI" value="10.17487/RFC6690"/>
        </reference>
        <reference anchor="RFC1034">
          <front>
            <title>Domain names - concepts and facilities</title>
            <author fullname="P.V. Mockapetris" initials="P.V." surname="Mockapetris">
              <organization/>
            </author>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised basic definition of The Domain Name System.  It obsoletes RFC-882.  This memo describes the domain style names and their used for host address look up and electronic mail forwarding.  It discusses the clients and servers in the domain name system and the protocol used between them.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1034"/>
          <seriesInfo name="DOI" value="10.17487/RFC1034"/>
        </reference>
        <reference anchor="RFC7540">
          <front>
            <title>Hypertext Transfer Protocol Version 2 (HTTP/2)</title>
            <author fullname="M. Belshe" initials="M." surname="Belshe">
              <organization/>
            </author>
            <author fullname="R. Peon" initials="R." surname="Peon">
              <organization/>
            </author>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson">
              <organization/>
            </author>
            <date month="May" year="2015"/>
            <abstract>
              <t>This specification describes an optimized expression of the semantics of the Hypertext Transfer Protocol (HTTP), referred to as HTTP version 2 (HTTP/2).  HTTP/2 enables a more efficient use of network resources and a reduced perception of latency by introducing header field compression and allowing multiple concurrent exchanges on the same connection.  It also introduces unsolicited push of representations from servers to clients.</t>
              <t>This specification is an alternative to, but does not obsolete, the HTTP/1.1 message syntax.  HTTP's existing semantics remain unchanged.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7540"/>
          <seriesInfo name="DOI" value="10.17487/RFC7540"/>
        </reference>
        <reference anchor="RFC8490">
          <front>
            <title>DNS Stateful Operations</title>
            <author fullname="R. Bellis" initials="R." surname="Bellis">
              <organization/>
            </author>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire">
              <organization/>
            </author>
            <author fullname="J. Dickinson" initials="J." surname="Dickinson">
              <organization/>
            </author>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson">
              <organization/>
            </author>
            <author fullname="T. Lemon" initials="T." surname="Lemon">
              <organization/>
            </author>
            <author fullname="T. Pusateri" initials="T." surname="Pusateri">
              <organization/>
            </author>
            <date month="March" year="2019"/>
            <abstract>
              <t>This document defines a new DNS OPCODE for DNS Stateful Operations (DSO).  DSO messages communicate operations within persistent stateful sessions using Type Length Value (TLV) syntax.  Three TLVs are defined that manage session timeouts, termination, and encryption padding, and a framework is defined for extensions to enable new stateful operations.  This document updates RFC 1035 by adding a new DNS header OPCODE that has both different message semantics and a new result code.  This document updates RFC 7766 by redefining a session, providing new guidance on connection reuse, and providing a new mechanism for handling session idle timeouts.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8490"/>
          <seriesInfo name="DOI" value="10.17487/RFC8490"/>
        </reference>
      </references>
    </references>
    <section anchor="change-log">
      <name>Change Log</name>
      <t>TBD:</t>
      <ul spacing="normal">
        <li>
          <eref target="https://github.com/anr-bmbf-pivot/draft-dns-over-coap/issues/4">Request text duplication</eref></li>
      </ul>
      <section anchor="since-draft-lenders-dns-over-coap-02httpsdatatrackerietforgdochtmldraft-lenders-dns-over-coap-02">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-lenders-dns-over-coap-02">draft-lenders-dns-over-coap-02</eref></name>
        <ul spacing="normal">
          <li>Clarify server selection to be out-of-band and define "core.dns" resource type in
<xref target="selection-of-a-doc-server"/> and <xref target="new-coredns-resource-type"/></li>
          <li>Add message manipulation considerations for DoC servers in <xref target="doc-server-considerations"/></li>
          <li>Update Considerations for Unencrypted Use in <xref target="considerations-for-unencrypted-use"/></li>
        </ul>
      </section>
      <section anchor="since-draft-lenders-dns-over-coap-01httpsdatatrackerietforgdochtmldraft-lenders-dns-over-coap-01">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-lenders-dns-over-coap-01">draft-lenders-dns-over-coap-01</eref></name>
        <ul spacing="normal">
          <li>Remove GET and POST methods</li>
          <li>Add note on ETag and response codes</li>
          <li>Provide requirement conflict for DNS over QUIC</li>
          <li>Clarify Content-Format / Accept handling</li>
        </ul>
      </section>
      <section anchor="since-draft-lenders-dns-over-coap-00httpsdatatrackerietforgdochtmldraft-lenders-dns-over-coap-00">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-lenders-dns-over-coap-00">draft-lenders-dns-over-coap-00</eref></name>
        <ul spacing="normal">
          <li>Soften Content-Format requirements in <xref target="request-format"/> and <xref target="dns-responses-in-coap-responses"/></li>
          <li>Clarify "CoAP payload"/"CoAP body" terminology</li>
          <li>Fix nits and typos</li>
        </ul>
      </section>
      <section anchor="since-draft-lenders-dns-over-coaps-00httpsdatatrackerietforgdochtmldraft-lenders-dns-over-coaps-00">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-lenders-dns-over-coaps-00">draft-lenders-dns-over-coaps-00</eref></name>
        <ul spacing="normal">
          <li>Clarification in abstract that both DTLS and OSCORE can be used as secure transport</li>
          <li>
            <t>Restructuring of <xref target="basic-message-exchange"/>:
            </t>
            <ul spacing="normal">
              <li>Add dedicated <xref target="sec_content-format"/> on Content-Format</li>
              <li>Add overview table about usable and required features for request method
types to <xref target="dns-queries-in-coap-requests"/></li>
              <li>Add dedicated <xref target="sec_req-caching"/> and <xref target="sec_resp-caching"/> on caching
requirements for CoAP requests and responses</li>
            </ul>
          </li>
          <li>Fix nits and typos</li>
        </ul>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
