<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.14 (Ruby 3.1.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-pauly-ohai-svcb-config-03" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.13.0 -->
  <front>
    <title abbrev="Oblivious Services in SVCB">Discovery of Oblivious Services via Service Binding Records</title>
    <seriesInfo name="Internet-Draft" value="draft-pauly-ohai-svcb-config-03"/>
    <author initials="T." surname="Pauly" fullname="Tommy Pauly">
      <organization>Apple Inc.</organization>
      <address>
        <email>tpauly@apple.com</email>
      </address>
    </author>
    <author initials="T." surname="Reddy" fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <date year="2022" month="July" day="27"/>
    <area>Security</area>
    <workgroup>Oblivious HTTP Application Intermediation</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document defines a parameter that can be included in SVCB and HTTPS
DNS resource records to denote that a service is accessible using Oblivious
HTTP, by offering an Oblivious Gateway Resource through which to access the
target. This document also defines a mechanism to learn the key configuration
of the discovered Oblivious Gateway Resource.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-pauly-ohai-svcb-config/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Oblivious HTTP Application Intermediation Working Group mailing list (<eref target="mailto:ohai@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ohai/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/tfpauly/draft-ohai-svcb-config"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Oblivious HTTP <xref target="OHTTP"/> allows clients to encrypt
messages exchanged with an Oblivious Target Resource (target). The messages
are encapsulated in encrypted messages to an Oblivious Gateway Resource
(gateway), which gates access to the target. The gateway is access via an
Oblivious Relay Resource (relay), which proxies the encapsulated messages
to hide the identity of the client. Overall, this architecture is designed
in such a way that the relay cannot inspect the contents of messages, and
the gateway and target cannot discover the client's identity.</t>
      <t>Since Oblivious HTTP deployments will often involve very specific coordination
between clients, relays, and gateways, the key configuration can often be
shared in a bespoke fashion. However, some deployments involve clients
discovering oblivious targets and their assoicated gateways more dynamically.
For example, a network may want to advertise a DNS resolver that is accessible
over Oblivious HTTP and applies local network resolution policies via mechanisms
like Discovery of Designated Resolvers (<xref target="DDR"/>). Clients
can work with trusted relays to access these gateways.</t>
      <t>This document defines a mechanism to advertise that an HTTP service supports
Oblivious HTTP using DNS records, as a parameter that can be included in SVCB
and HTTPS DNS resource records <xref target="SVCB"/> (<xref target="svc-param"/>).
The presence of this parameter indicates that a service can act as an oblivious
target and has an oblivious gateway that can provide access to the target.</t>
      <t>The client learns the URI to use for the oblivious gateway using a well-known
URI <xref target="WELLKNOWN"/>, "oblivious-gateway", which is accessed on the
oblivious target (<xref target="gateway-location"/>).</t>
      <t>This document also defines a way to fetch an oblivious gateway's key
configuration from the oblivious gateway (<xref target="config-fetch"/>).</t>
      <t>This mechanism does not aid in the discovery of oblivious relays;
relay configuration is out of scope for this document. Models in which
this discovery mechanism is applicable are described in <xref target="applicability"/>.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="applicability">
      <name>Applicability</name>
      <t>There are multiple models in which the discovery mechanism defined
in this document can be used.</t>
      <ul spacing="normal">
        <li>Upgrading non-oblivious HTTP to oblivious HTTP. In this model, the
client intends to communicate with a specific target service, and
prefers to use oblivious HTTP if it is available. The target service
has an oblivious gateway that it offers to allow access using oblivious
HTTP. Once the client learns about the oblivious gateway, it "upgrades"
to using oblivious HTTP to access the target service.</li>
        <li>Discovering alternative oblivious HTTP services. In this model,
the client has a default oblivious target service that it uses. For
example, this may be a public DNS resolver that is accessible over
oblivious HTTP. The client is willing to use alternative oblivious
target services if they are discovered, which may provide more
optimized or more relevant responses.</li>
      </ul>
      <t>In both of these deployment models, the client is assumed to already
know of an oblivious relay that it trusts and works with. This oblivious
relay either needs to provide generic access to oblivious gateways, or
provide a service to clients to allow them to check which gateways
are accessible.</t>
    </section>
    <section anchor="svc-param">
      <name>The oblivious SvcParamKey</name>
      <t>The "oblivious" SvcParamKey (<xref target="iana"/>) is used to indicate that a
service described in an SVCB record can be accessed as an oblivious target
using an associated gateway. The service that is queried by the client hosts
one or more target resources.</t>
      <t>In order to access the service's target resources obliviously, the client
needs to send encapsulated messages to the gateway resource and the gateway's
key configuration (both of which can be retrieved using the method described in
<xref target="config-fetch"/>).</t>
      <t>Both the presentation and wire format values for the "oblivious" parameter
<bcp14>MUST</bcp14> be empty.</t>
      <t>The "oblivious" parameter can be included in the mandatory parameter
list to ensure that clients that do not support oblivious access
do not try to use the service. Services that mark the oblivious
parameter as mandatory can, therefore, indicate that the service might
not be accessible in a non-oblivious fashion. Services that are
intended to be accessed either obliviously or directly
<bcp14>SHOULD NOT</bcp14> mark the "oblivious" parameter as mandatory. Note that since
multiple SVCB responses can be provided for a single query, the oblivious
and non-oblivious versions of a single service can have different SVCB
records to support different names or properties.</t>
      <t>The media type to use for encapsulated requests made to a target service
depends on the scheme of the SVCB record. This document defines the
interpretation for the "https" <xref target="SVCB"/> and "dns" <xref target="DNS-SVCB"/>
schemes. Other schemes that want to use this parameter <bcp14>MUST</bcp14> define the
interpretation and meaning of the configuration.</t>
      <section anchor="use-in-https-service-records">
        <name>Use in HTTPS service records</name>
        <t>For the "https" scheme, which uses the HTTPS RR type instead of SVCB,
the presence of the "oblivious" parameter means that the target
being described is an Oblivious HTTP service that is accessible using
the default "message/bhttp" media type <xref target="OHTTP"/>
          <xref target="BINARY-HTTP"/>.</t>
        <t>For example, an HTTPS service record for svc.example.com that supports
an oblivious gateway could look like this:</t>
        <artwork><![CDATA[
svc.example.com. 7200  IN HTTPS 1 . ( alpn=h2 oblivious )
]]></artwork>
        <t>A similar record for a service that only support oblivious connectivity
could look like this:</t>
        <artwork><![CDATA[
svc.example.com. 7200  IN HTTPS 1 . ( mandatory=oblivious oblivious )
]]></artwork>
      </section>
      <section anchor="use-in-dns-server-svcb-records">
        <name>Use in DNS server SVCB records</name>
        <t>For the "dns" scheme, as defined in <xref target="DNS-SVCB"/>, the presence of
the "oblivious" parameter means that the DNS server being
described is an Oblivious DNS over HTTP (DoH) service. The default
media type expected for use in Oblivious HTTP to DNS resolvers
is "application/dns-message" <xref target="DOH"/>.</t>
        <t>In order for DNS servers to function as oblivious targets, their
associated gateways need to be accessible via an oblivious relay.
Encrypted DNS servers used with the discovery mechanisms described
in this section can either be publicly accessible, or specific to a
network. In general, only publicly accessible DNS servers will work
as oblivious DNS servers, unless there is a coordinated deployment
with an oblivious relay that is also hosted within a network.</t>
        <section anchor="ddr">
          <name>Use with DDR</name>
          <t>Clients can discover an oblivious DNS server configuration using
DDR, by either querying _dns.resolver.arpa to a locally configured
resolver or querying using the name of a resolver <xref target="DDR"/>.</t>
          <t>For example, a DoH service advertised over DDR can be annotated
as supporting oblivious resolution using the following record:</t>
          <artwork><![CDATA[
_dns.resolver.arpa  7200  IN SVCB 1 doh.example.net (
     alpn=h2 dohpath=/dns-query{?dns} oblivious )
]]></artwork>
          <t>Clients still need to perform some verification of oblivious DNS servers,
such as the TLS certificate check described in <xref target="DDR"/>. This certificate
check can be done when looking up the configuration on the gateway
as described in <xref target="config-fetch"/>, which can either be done directly,
or via the relay or another proxy to avoid exposing client IP addresses.</t>
          <t>For the case of DoH servers, clients also need to ensure that they are not
being targeted with unique DoH paths that would reveal their identity. See
<xref target="security"/> for more discussion.</t>
        </section>
        <section anchor="dnr">
          <name>Use with DNR</name>
          <t>The SvcParamKeys defined in this document also can be used with Discovery
of Network-designated Resolvers (DNR) <xref target="DNR"/>. In this
case, the oblivious configuration and path parameters can be included
in DHCP and Router Advertisement messages.</t>
          <t>While DNR does not require the same kind of verification as DDR, clients
that learn about DoH servers still need to ensure that they are not being
targeted with unique DoH paths that would reveal their identity. See <xref target="security"/>
for more discussion.</t>
        </section>
      </section>
    </section>
    <section anchor="gateway-location">
      <name>Gateway Location</name>
      <t>Clients that know a service is available as an oblivious target
via discovery through the "oblivious" parameter in a SVCB or HTTPS
record need to know the location of the associated oblivious gateway
before sending oblivious requests.</t>
      <t>By default, the oblivious gateway for an oblivious target is defined
as a well-known resource (<xref target="WELLKNOWN"/>) on the target,
"/.well-known/oblivious-gateway".</t>
      <t>Commonly, servers will not want to actually operate the oblivious gateway
on a well-known URI. In such cases, servers can use 3xx redirection responses
(<xref section="15.4" sectionFormat="of" target="HTTP"/>) to direct clients and relays to the correct
location of the oblivious gateway.</t>
      <t>Generally, the first request a client will make will be a GET request to
discover the key configuration, described in <xref target="config-fetch"/>.
This initial request also provides a convenient way for clients to learn
about the redirect from the well-known resource, if there is a redirect.
When clients work with their oblivious relays to send oblivious requests
to the gateway, clients can communicate this redirected gateway URI.</t>
    </section>
    <section anchor="config-fetch">
      <name>Key Configuration Fetching</name>
      <t>Clients also need to know the key configuration of an oblivious gateway before
sending oblivious requests.</t>
      <t>In order to fetch the key configuration of an oblivious gateway discovered
in the manner described in <xref target="gateway-location"/>, the client issues a GET request
to the URI of the gateway specifying the "application/ohttp-keys" (<xref target="OHTTP"/>)
media type in the Accept header.</t>
      <t>For example, if the client knows an oblivious gateway URI,
"https://osvc.example.com/gateway", it could fetch the key configuration
with the following request:</t>
      <artwork><![CDATA[
GET /gateway HTTP/1.1
Host: osvc.example.com
Accept: application/ohttp-keys
]]></artwork>
      <t>Oblivious gateways that coordinate with targets that advertise oblivious
support <bcp14>SHOULD</bcp14> support GET requests for their key configuration in this
manner, unless there is another out-of-band configuration model that is
usable by clients. Gateways respond with their key configuration in the
response body, with a content type of "application/ohttp-keys".</t>
      <t>Clients can either fetch this key configuration directly, or do so via
a proxy in order to avoid the server discovering information about the
client's identity. See <xref target="security"/> for more discussion of avoiding key
targeting attacks.</t>
    </section>
    <section anchor="security">
      <name>Security and Privacy Considerations</name>
      <t>Attackers on a network can remove SVCB information from cleartext DNS
answers that are not protected by DNSSEC <xref target="DNSSEC"/>. This
can effectively downgrade clients. However, since SVCB indications
for oblivious support are just hints, a client can mitigate this by
always checking for oblivious gateway configuration <xref target="config-fetch"/>
on the well-known gateway location <xref target="gateway-location"/>.
Use of encrypted DNS along with DNSSEC can also be used as a mitigation.</t>
      <t>When discovering designated oblivious DNS servers using this mechanism,
clients need to ensure that the designation is trusted in lieu of
being able to directly check the contents of the gateway server's TLS
certificate. See <xref target="ddr"/> for more discussion, as well as the Security
Considerations of <xref target="SVCBDNS"/>.</t>
      <t>For oblivious DoH servers, an attacker could use unique DoH path values
to target or identify specific clients. Clients can mitigate such
attacks in several ways. Some options include: only allow common DoH
paths (such as the de-facto default "/dns-query{?dns}"); performing
consistency checks by fetching the information about the resolver
over multiple resolution paths; or coordinating with a trusted
oblivious relay to validate that DoH paths are common across clients
using the same gateway.</t>
      <t>As discussed in <xref target="OHTTP"/>, client requests using Oblivious HTTP
can only be linked by recognizing the key configuration. In order to
prevent unwanted linkability and tracking, clients using any key
configuration discovery mechanism need to be concerned with attacks
that target a specific user or population with a unique key configuration.</t>
      <t>There are several approaches clients can use to mitigate key targeting
attacks. <xref target="CONSISTENCY"/> provides an analysis
of the options for ensuring the key configurations are consistent between
different clients. Clients <bcp14>SHOULD</bcp14> employ some technique to mitigate key
targeting attack. Oblivious gateways that are detected to use targeted
key configurations per-client <bcp14>MUST NOT</bcp14> be used.</t>
      <t>When clients fetch a gateway's configuration (<xref target="config-fetch"/>),
they can expose their identity in the form of an IP address if they do not
connect via a proxy or some other IP-hiding mechanism. In some circumstances,
this might not be a privacy concern, since revealing that a particular
client IP address is preparing to use an Oblivious HTTP service can be
expected. However, if a client is otherwise trying to obfuscate its IP
address or location (and not merely decouple its specific requests from its
IP address), or revealing its IP address will increase the risk of a key
targeting attack (if a gateway service is trying to differentiate traffic
across client IP addresses), a proxy or similar mechanism can be used to fetch
the gateway's configuration.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <section anchor="svcb-service-parameter">
        <name>SVCB Service Parameter</name>
        <t>IANA is requested to add the following entry to the SVCB Service Parameters
registry (<xref target="SVCB"/>).</t>
        <table>
          <thead>
            <tr>
              <th align="left">Number</th>
              <th align="left">Name</th>
              <th align="left">Meaning</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TBD</td>
              <td align="left">oblivious</td>
              <td align="left">Denotes that a service operates an oblivious HTTP target</td>
              <td align="left">(This document)</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="well-known-uri">
        <name>Well-Known URI</name>
        <t>IANA is requested to add one new entry in the "Well-Known URIs" registry <xref target="WELLKNOWN"/>.</t>
        <t>URI suffix: oblivious-gateway</t>
        <t>Change controller: IETF</t>
        <t>Specification document: This document</t>
        <t>Status: permanent</t>
        <t>Related information: N/A</t>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="OHTTP">
          <front>
            <title>Oblivious HTTP</title>
            <author fullname="Martin Thomson">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Christopher A. Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="10" month="July" year="2022"/>
            <abstract>
              <t>   This document describes a system for the forwarding of encrypted HTTP
   messages.  This allows a client to make multiple requests of a server
   without the server being able to link those requests to the client or
   to identify the requests as having come from the same client.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ohai-ohttp-02"/>
        </reference>
        <reference anchor="DDR">
          <front>
            <title>Discovery of Designated Resolvers</title>
            <author fullname="Tommy Pauly">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Eric Kinnear">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Christopher A. Wood">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Patrick McManus">
              <organization>Fastly</organization>
            </author>
            <author fullname="Tommy Jensen">
              <organization>Microsoft</organization>
            </author>
            <date day="5" month="July" year="2022"/>
            <abstract>
              <t>   This document defines Discovery of Designated Resolvers (DDR), a
   mechanism for DNS clients to use DNS records to discover a resolver's
   encrypted DNS configuration.  An encrypted resolver discovered in
   this manner is referred to as a "Designated Resolver".  This
   mechanism can be used to move from unencrypted DNS to encrypted DNS
   when only the IP address of a resolver is known.  This mechanism is
   designed to be limited to cases where unencrypted resolvers and their
   designated resolvers are operated by the same entity or cooperating
   entities.  It can also be used to discover support for encrypted DNS
   protocols when the name of an encrypted resolver is known.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-add-ddr-08"/>
        </reference>
        <reference anchor="SVCB">
          <front>
            <title>Service binding and parameter specification via the DNS (DNS SVCB and HTTPS RRs)</title>
            <author fullname="Ben Schwartz">
              <organization>Google</organization>
            </author>
            <author fullname="Mike Bishop">
              <organization>Akamai Technologies</organization>
            </author>
            <author fullname="Erik Nygren">
              <organization>Akamai Technologies</organization>
            </author>
            <date day="24" month="May" year="2022"/>
            <abstract>
              <t>   This document specifies the "SVCB" and "HTTPS" DNS resource record
   (RR) types to facilitate the lookup of information needed to make
   connections to network services, such as for HTTP origins.  SVCB
   records allow a service to be provided from multiple alternative
   endpoints, each with associated parameters (such as transport
   protocol configuration and keys for encrypting the TLS ClientHello).
   They also enable aliasing of apex domains, which is not possible with
   CNAME.  The HTTPS RR is a variation of SVCB for use with HTTP [HTTP].
   By providing more information to the client before it attempts to
   establish a connection, these records offer potential benefits to
   both performance and privacy.

   TO BE REMOVED: This document is being collaborated on in Github at:
   https://github.com/MikeBishop/dns-alt-svc
   (https://github.com/MikeBishop/dns-alt-svc).  The most recent working
   version of the document, open issues, etc. should all be available
   there.  The authors (gratefully) accept pull requests.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dnsop-svcb-https-10"/>
        </reference>
        <reference anchor="WELLKNOWN">
          <front>
            <title>Well-Known Uniform Resource Identifiers (URIs)</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham">
              <organization/>
            </author>
            <date month="May" year="2019"/>
            <abstract>
              <t>This memo defines a path prefix for "well-known locations", "/.well-known/", in selected Uniform Resource Identifier (URI) schemes.</t>
              <t>In doing so, it obsoletes RFC 5785 and updates the URI schemes defined in RFC 7230 to reserve that space.  It also updates RFC 7595 to track URI schemes that support well-known URIs in their registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8615"/>
          <seriesInfo name="DOI" value="10.17487/RFC8615"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="DNS-SVCB">
          <front>
            <title>Service Binding Mapping for DNS Servers</title>
            <author fullname="Benjamin Schwartz">
              <organization>Google LLC</organization>
            </author>
            <date day="5" month="July" year="2022"/>
            <abstract>
              <t>   The SVCB DNS resource record type expresses a bound collection of
   endpoint metadata, for use when establishing a connection to a named
   service.  DNS itself can be such a service, when the server is
   identified by a domain name.  This document provides the SVCB mapping
   for named DNS servers, allowing them to indicate support for
   encrypted transport protocols.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-add-svcb-dns-06"/>
        </reference>
        <reference anchor="BINARY-HTTP">
          <front>
            <title>Binary Representation of HTTP Messages</title>
            <author fullname="Martin Thomson">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Christopher A. Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="6" month="July" year="2022"/>
            <abstract>
              <t>   This document defines a binary format for representing HTTP messages.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-httpbis-binary-message-06"/>
        </reference>
        <reference anchor="DOH">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <author fullname="P. McManus" initials="P." surname="McManus">
              <organization/>
            </author>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS.  Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="DNR">
          <front>
            <title>DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers (DNR)</title>
            <author fullname="Mohamed Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Tirumaleswar Reddy">
              <organization>Akamai</organization>
            </author>
            <author fullname="Dan Wing">
              <organization>Citrix Systems, Inc.</organization>
            </author>
            <author fullname="Neil Cook">
              <organization>Open-Xchange</organization>
            </author>
            <author fullname="Tommy Jensen">
              <organization>Microsoft</organization>
            </author>
            <date day="24" month="July" year="2022"/>
            <abstract>
              <t>   The document specifies new DHCP and IPv6 Router Advertisement options
   to discover encrypted DNS resolvers (e.g., DNS-over-HTTPS, DNS-over-
   TLS, DNS-over-QUIC).  Particularly, it allows a host to learn an
   authentication domain name together with a list of IP addresses and a
   set of service parameters to reach such encrypted DNS resolvers.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-add-dnr-12"/>
        </reference>
        <reference anchor="HTTP">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding">
              <organization/>
            </author>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham">
              <organization/>
            </author>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke">
              <organization/>
            </author>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes. </t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="DNSSEC">
          <front>
            <title>DNS Security Introduction and Requirements</title>
            <author fullname="R. Arends" initials="R." surname="Arends">
              <organization/>
            </author>
            <author fullname="R. Austein" initials="R." surname="Austein">
              <organization/>
            </author>
            <author fullname="M. Larson" initials="M." surname="Larson">
              <organization/>
            </author>
            <author fullname="D. Massey" initials="D." surname="Massey">
              <organization/>
            </author>
            <author fullname="S. Rose" initials="S." surname="Rose">
              <organization/>
            </author>
            <date month="March" year="2005"/>
            <abstract>
              <t>The Domain Name System Security Extensions (DNSSEC) add data origin authentication and data integrity to the Domain Name System.  This document introduces these extensions and describes their capabilities and limitations.  This document also discusses the services that the DNS security extensions do and do not provide.  Last, this document describes the interrelationships between the documents that collectively describe DNSSEC.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4033"/>
          <seriesInfo name="DOI" value="10.17487/RFC4033"/>
        </reference>
        <reference anchor="SVCBDNS">
          <front>
            <title>Service Binding Mapping for DNS Servers</title>
            <author fullname="Benjamin Schwartz">
              <organization>Google LLC</organization>
            </author>
            <date day="5" month="July" year="2022"/>
            <abstract>
              <t>   The SVCB DNS resource record type expresses a bound collection of
   endpoint metadata, for use when establishing a connection to a named
   service.  DNS itself can be such a service, when the server is
   identified by a domain name.  This document provides the SVCB mapping
   for named DNS servers, allowing them to indicate support for
   encrypted transport protocols.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-add-svcb-dns-06"/>
        </reference>
        <reference anchor="CONSISTENCY">
          <front>
            <title>Key Consistency and Discovery</title>
            <author fullname="Alex Davidson">
              <organization>Brave Software</organization>
            </author>
            <author fullname="Matthew Finkel">
              <organization>The Tor Project</organization>
            </author>
            <author fullname="Martin Thomson">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Christopher A. Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="4" month="March" year="2022"/>
            <abstract>
              <t>   This document describes the key consistency and correctness
   requirements of protocols such as Privacy Pass, Oblivious DoH, and
   Oblivious HTTP for user privacy.  It discusses several mechanisms and
   proposals for enabling user privacy in varying threat models.  In
   concludes with discussion of open problems in this area.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-wood-key-consistency-02"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
