<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version  (Ruby 3.1.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-lenders-core-dnr-03" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.20.0 -->
  <front>
    <title abbrev="CoRE DNR">Discovery of Network-designated OSCORE-based Resolvers: Problem Statement</title>
    <seriesInfo name="Internet-Draft" value="draft-lenders-core-dnr-03"/>
    <author fullname="Martine Sophie Lenders">
      <organization abbrev="TU Dresden">TUD Dresden University of Technology</organization>
      <address>
        <postal>
          <street>Helmholtzstr. 10</street>
          <city>Dresden</city>
          <code>D-01069</code>
          <country>Germany</country>
        </postal>
        <email>martine.lenders@tu-dresden.de</email>
      </address>
    </author>
    <author initials="C." surname="Amsüss" fullname="Christian Amsüss">
      <organization/>
      <address>
        <email>christian@amsuess.com</email>
      </address>
    </author>
    <author fullname="Thomas C. Schmidt">
      <organization>HAW Hamburg</organization>
      <address>
        <email>t.schmidt@haw-hamburg.de</email>
      </address>
    </author>
    <author initials="M." surname="Wählisch" fullname="Matthias Wählisch">
      <organization abbrev="TU Dresden &amp; Barkhausen Institut">TUD Dresden University of Technology &amp; Barkhausen Institut</organization>
      <address>
        <postal>
          <street>Helmholtzstr. 10</street>
          <city>Dresden</city>
          <code>D-01069</code>
          <country>Germany</country>
        </postal>
        <email>m.waehlisch@tu-dresden.de</email>
      </address>
    </author>
    <date year="2024" month="July" day="09"/>
    <area>Web and Internet Transport</area>
    <workgroup>Constrained RESTful Environments</workgroup>
    <keyword>CoRE</keyword>
    <keyword>CoAP</keyword>
    <keyword>DoC</keyword>
    <keyword>DNR</keyword>
    <keyword>SVCB</keyword>
    <abstract>
      <t>This document states problems when designing DNS SVCB records to discover endpoints that communicate over
Object Security for Constrained RESTful Environments (OSCORE) <xref target="RFC8613"/>.
As a consequence of learning about OSCORE, this discovery will allow a host to learn both CoAP servers and DNS over CoAP resolvers that use OSCORE to encrypt messages and Ephemeral Diffie-Hellman Over COSE (EDHOC) <xref target="RFC9528"/> for key exchange.
Challenges arise because SVCB records are not meant to be used to exchange security contexts, which is required in OSCORE scenarios.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://anr-bmbf-pivot.github.io/draft-lenders-core-dnr/draft-lenders-core-dnr.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-lenders-core-dnr/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Constrained RESTful Environments Working Group mailing list (<eref target="mailto:core@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/core/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/core/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/anr-bmbf-pivot/draft-lenders-core-dnr"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>The discovery of Internet services can be facilitated by the Domain Name System (DNS).
To discover services of the constrained Internet of Things (IoT) using the DNS, two challenges must be solved.
First, the discovery of a DNS resolver that supports DNS resolution based on secure, IoT-friendly protocols—otherwise the subsequent discovery of IoT-tailored services would be limited to resolution protocols conflicting with constrained resources.
Second, the discovery of an IoT-friendly service beyond the DNS resolution.</t>
      <t><xref target="RFC9460"/> specifies the "SVCB" ("Service Binding") DNS resource record to lookup information needed to connect to a network service. Service Parameters (SvcParams) carry
that information within the SVCB record.</t>
      <t>The discovery of DNS resolvers can be enabled by the DNS itself <xref target="RFC9461"/>, <xref target="RFC9462"/> or, in a local network, by Router Advertisements and DHCP <xref target="RFC9463"/>.
In all theses cases, the SvcParams is used, but supports only DNS transfer based on Transport Layer Security (TLS), namely DNS over TLS (DoT) <xref target="RFC7858"/>, DNS over HTTPS (DoH) <xref target="RFC8484"/>, and DNS over Dedicated QUIC (DoQ) <xref target="RFC9250"/>.
The use of DoT, DoH, or DoQ, however, is not recommended in IoT scenarios.</t>
      <t>DNS over CoAP <xref target="I-D.ietf-core-dns-over-coap"/> provides a solution for encrypted DNS in constrained environments.
The Constrained Application Protocol (CoAP) <xref target="RFC7252"/> is mostly agnostic to the transport layer CoAP can be transported over UDP, TCP, or WebSockets <xref target="RFC8323"/>, and even less common transports such as Bluetooth GATT <xref target="I-D.amsuess-core-coap-over-gatt"/> or SMS <xref target="lwm2m"/> are discussed.
<xref target="I-D.ietf-core-transport-indication"/> covers the selection of different CoAP transports using SVCB records.</t>
      <t>CoAP offers three security modes:</t>
      <ul spacing="normal">
        <li>
          <t><strong>No Security:</strong> This plain CoAP mode does not support any encryption. It
is not recommended when using <xref target="I-D.ietf-core-dns-over-coap"/> but inherits core CoAP features
such as block-wise transfer <xref target="RFC7959"/> for datagram-based
segmentation.  Such features are beneficial in constrained settings even
without encryption.</t>
        </li>
        <li>
          <t><strong>Transport Security:</strong> CoAP may use DTLS when transferred over UDP <xref target="RFC7252"/> and TLS when transferred over TCP <xref target="RFC8323"/>.</t>
        </li>
        <li>
          <t><strong>Object Security:</strong> Securing content objects can be achieved using
OSCORE <xref target="RFC8613"/>. OSCORE can be used either as an alternative or in
addition to transport security.  </t>
          <t>
OSCORE keys have a limited lifetime and need to be set up.
Keys can be received from an ACE Authorization Server (AS), as described in the ACE OSCORE profile <xref target="RFC9203"/>, or, alternatively to support "zero-touch", through an EDHOC key exchange <xref target="RFC9528"/>, as described in the ACE EDHOC profile <xref target="I-D.ietf-ace-edhoc-oscore-profile"/>.</t>
        </li>
      </ul>
      <t>The SVCB-based discovery of a CoAP service in mode "no security" is covered in <xref target="I-D.ietf-core-transport-indication"/>, and a CoAP service in the mode "transport security" in <xref target="I-D.lenders-core-coap-dtls-svcb"/>.
The discovery of CoAP services in mode "object security" is not specified.
To guide future specifications, this document clarifies aspects when using SVCB in the context of CoAP and object security.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The terms "DoC server" and "DoC client" are used as defined in <xref target="I-D.ietf-core-dns-over-coap"/>.</t>
      <t>The terms "constrained node" and "constrained network" are used as defined in <xref target="RFC7228"/>.</t>
      <t>SvcParams denotes the field in either DNS SVCB/HTTPS records as defined in <xref target="RFC9460"/>, or DHCP and RA
messages as defined in <xref target="RFC9463"/>. SvcParamKeys are used as defined in <xref target="RFC9460"/>.</t>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="problem-space">
      <name>Problem Space</name>
      <t>The first and most important point of discussion for the discoverability of CoAP is if and what
new SvcParamKeys need to be defined and what is already there.</t>
      <t><xref target="RFC9460"/> defines the "alpn" key, which is used to identify the protocol suite of a service binding
using its Application-Layer Protocol Negotiation (ALPN) ID <xref target="RFC7301"/>. While this is useful to
identify classic transport layer security, the question is raised if this is needed or even helpful
for when there is only object security. There is an ALPN ID for CoAP over TLS that is defined in
<xref target="RFC8323"/>. As using the same ALPN ID for different transport layers is not recommended, another
ALPN ID for CoAP over DTLS is introduced in <xref target="I-D.lenders-core-coap-dtls-svcb"/>. Object security may be
selected in addition to transport layer security or without it. Additionally, different
CoAP transports can be selected, which may be orthogonal to the transport security.
For instance, DTLS can be used over transports other than UDP. The selection of CoAP transport
protocols will be covered in future versions of <xref target="I-D.ietf-core-transport-indication"/>. Defining an ALPN ID for each
combination of object security, mode of transport layer security, and transport protocol might not
be viable or scalable. For some ways of setting up object security, additional information is
needed, such as an establishment options for an encryption context with EDHOC or an authentication
server (AS) with ACE.</t>
      <t>Beyond the SvcParamKeys, there is the question of what the field values of the Encrypted DNS Options
defined in <xref target="RFC9463"/> might be with EDHOC or ACE EDHOC. While most fields map,
"authentication-domain-name" (ADN) and its corresponding ADN length field may not matter
when authentication is driven by Authorization for Constrained Environments (ACE) <xref target="RFC9203"/>
        <xref target="I-D.ietf-ace-edhoc-oscore-profile"/>.</t>
    </section>
    <section anchor="objectives">
      <name>Objectives</name>
      <t>SVCB records are not meant and should not be used to exchange security contexts, so this eliminates
scenarios that use pre-shared keys with OSCORE. This leaves 2 base scenarios for OSCORE, which may
occur in combination, with scenarios using transport security, or alternative transport protocols:</t>
      <ul spacing="normal">
        <li>
          <t>DoC over OSCORE using EDHOC, and</t>
        </li>
        <li>
          <t>DoC over OSCORE using ACE.</t>
        </li>
      </ul>
      <t>We mostly need to answer the question for additional SvcParamKeys. <xref target="RFC9460"/> defines the keys
"mandatory", "alpn", "no-default-alpn", "port", "ipv4hint", and "ipv6hint".
Additionally, <xref target="I-D.ietf-core-dns-over-coap"/> defines "docpath" which carries the path for the DNS resource at the DoC
server as a CBOR sequence.</t>
      <t>Since "alpn" is needed for transport layer security, the type of object security (OSCORE using
EDHOC, OSCORE using ACE, OSCORE using EDHOC using ACE), needs to be conveyed in a different
SvcParamKey. The semantics and necessacity of the authenticator-domain-name field in <xref target="RFC9463"/> needs
to be evaluated in each case.</t>
      <t>When using ACE, more SvcParamKeys might be needed, such as the OAuth audience, the scope or the
authentication server URI.</t>
      <t>Defining these SvcParamKeys, including their value formats and spaces, as well as the behavior
definition for authenticator-domain-name field, shall be part of future work.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>This document has no IANA considerations.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC9460">
          <front>
            <title>Service Binding and Parameter Specification via the DNS (SVCB and HTTPS Resource Records)</title>
            <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
            <author fullname="M. Bishop" initials="M." surname="Bishop"/>
            <author fullname="E. Nygren" initials="E." surname="Nygren"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies the "SVCB" ("Service Binding") and "HTTPS" DNS resource record (RR) types to facilitate the lookup of information needed to make connections to network services, such as for HTTP origins. SVCB records allow a service to be provided from multiple alternative endpoints, each with associated parameters (such as transport protocol configuration), and are extensible to support future uses (such as keys for encrypting the TLS ClientHello). They also enable aliasing of apex domains, which is not possible with CNAME. The HTTPS RR is a variation of SVCB for use with HTTP (see RFC 9110, "HTTP Semantics"). By providing more information to the client before it attempts to establish a connection, these records offer potential benefits to both performance and privacy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9460"/>
          <seriesInfo name="DOI" value="10.17487/RFC9460"/>
        </reference>
        <reference anchor="RFC9461">
          <front>
            <title>Service Binding Mapping for DNS Servers</title>
            <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>The SVCB DNS resource record type expresses a bound collection of endpoint metadata, for use when establishing a connection to a named service. DNS itself can be such a service, when the server is identified by a domain name. This document provides the SVCB mapping for named DNS servers, allowing them to indicate support for encrypted transport protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9461"/>
          <seriesInfo name="DOI" value="10.17487/RFC9461"/>
        </reference>
        <reference anchor="RFC9462">
          <front>
            <title>Discovery of Designated Resolvers</title>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="E. Kinnear" initials="E." surname="Kinnear"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <author fullname="T. Jensen" initials="T." surname="Jensen"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document defines Discovery of Designated Resolvers (DDR), a set of mechanisms for DNS clients to use DNS records to discover a resolver's encrypted DNS configuration. An Encrypted DNS Resolver discovered in this manner is referred to as a "Designated Resolver". These mechanisms can be used to move from unencrypted DNS to encrypted DNS when only the IP address of a resolver is known. These mechanisms are designed to be limited to cases where Unencrypted DNS Resolvers and their Designated Resolvers are operated by the same entity or cooperating entities. It can also be used to discover support for encrypted DNS protocols when the name of an Encrypted DNS Resolver is known.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9462"/>
          <seriesInfo name="DOI" value="10.17487/RFC9462"/>
        </reference>
        <reference anchor="RFC9463">
          <front>
            <title>DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers (DNR)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="T. Reddy.K" initials="T." role="editor" surname="Reddy.K"/>
            <author fullname="D. Wing" initials="D." surname="Wing"/>
            <author fullname="N. Cook" initials="N." surname="Cook"/>
            <author fullname="T. Jensen" initials="T." surname="Jensen"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies new DHCP and IPv6 Router Advertisement options to discover encrypted DNS resolvers (e.g., DNS over HTTPS, DNS over TLS, and DNS over QUIC). Particularly, it allows a host to learn an Authentication Domain Name together with a list of IP addresses and a set of service parameters to reach such encrypted DNS resolvers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9463"/>
          <seriesInfo name="DOI" value="10.17487/RFC9463"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC7228">
          <front>
            <title>Terminology for Constrained-Node Networks</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="M. Ersue" initials="M." surname="Ersue"/>
            <author fullname="A. Keranen" initials="A." surname="Keranen"/>
            <date month="May" year="2014"/>
            <abstract>
              <t>The Internet Protocol Suite is increasingly used on small devices with severe constraints on power, memory, and processing resources, creating constrained-node networks. This document provides a number of basic terms that have been useful in the standardization work for constrained-node networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7228"/>
          <seriesInfo name="DOI" value="10.17487/RFC7228"/>
        </reference>
        <reference anchor="RFC7301">
          <front>
            <title>Transport Layer Security (TLS) Application-Layer Protocol Negotiation Extension</title>
            <author fullname="S. Friedl" initials="S." surname="Friedl"/>
            <author fullname="A. Popov" initials="A." surname="Popov"/>
            <author fullname="A. Langley" initials="A." surname="Langley"/>
            <author fullname="E. Stephan" initials="E." surname="Stephan"/>
            <date month="July" year="2014"/>
            <abstract>
              <t>This document describes a Transport Layer Security (TLS) extension for application-layer protocol negotiation within the TLS handshake. For instances in which multiple application protocols are supported on the same TCP or UDP port, this extension allows the application layer to negotiate which protocol will be used within the TLS connection.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7301"/>
          <seriesInfo name="DOI" value="10.17487/RFC7301"/>
        </reference>
        <reference anchor="RFC7858">
          <front>
            <title>Specification for DNS over Transport Layer Security (TLS)</title>
            <author fullname="Z. Hu" initials="Z." surname="Hu"/>
            <author fullname="L. Zhu" initials="L." surname="Zhu"/>
            <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="D. Wessels" initials="D." surname="Wessels"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
              <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7858"/>
          <seriesInfo name="DOI" value="10.17487/RFC7858"/>
        </reference>
        <reference anchor="RFC7959">
          <front>
            <title>Block-Wise Transfers in the Constrained Application Protocol (CoAP)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="Z. Shelby" initials="Z." role="editor" surname="Shelby"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a RESTful transfer protocol for constrained nodes and networks. Basic CoAP messages work well for small payloads from sensors and actuators; however, applications will need to transfer larger payloads occasionally -- for instance, for firmware updates. In contrast to HTTP, where TCP does the grunt work of segmenting and resequencing, CoAP is based on datagram transports such as UDP or Datagram Transport Layer Security (DTLS). These transports only offer fragmentation, which is even more problematic in constrained nodes and networks, limiting the maximum size of resource representations that can practically be transferred.</t>
              <t>Instead of relying on IP fragmentation, this specification extends basic CoAP with a pair of "Block" options for transferring multiple blocks of information from a resource representation in multiple request-response pairs. In many important cases, the Block options enable a server to be truly stateless: the server can handle each block transfer separately, with no need for a connection setup or other server-side memory of previous block transfers. Essentially, the Block options provide a minimal way to transfer larger representations in a block-wise fashion.</t>
              <t>A CoAP implementation that does not support these options generally is limited in the size of the representations that can be exchanged, so there is an expectation that the Block options will be widely used in CoAP implementations. Therefore, this specification updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7959"/>
          <seriesInfo name="DOI" value="10.17487/RFC7959"/>
        </reference>
        <reference anchor="RFC8323">
          <front>
            <title>CoAP (Constrained Application Protocol) over TCP, TLS, and WebSockets</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="S. Lemay" initials="S." surname="Lemay"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="B. Silverajan" initials="B." surname="Silverajan"/>
            <author fullname="B. Raymor" initials="B." role="editor" surname="Raymor"/>
            <date month="February" year="2018"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP), although inspired by HTTP, was designed to use UDP instead of TCP. The message layer of CoAP over UDP includes support for reliable delivery, simple congestion control, and flow control.</t>
              <t>Some environments benefit from the availability of CoAP carried over reliable transports such as TCP or Transport Layer Security (TLS). This document outlines the changes required to use CoAP over TCP, TLS, and WebSockets transports. It also formally updates RFC 7641 for use with these transports and RFC 7959 to enable the use of larger messages over a reliable transport.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8323"/>
          <seriesInfo name="DOI" value="10.17487/RFC8323"/>
        </reference>
        <reference anchor="RFC8484">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="RFC8613">
          <front>
            <title>Object Security for Constrained RESTful Environments (OSCORE)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Mattsson" initials="J." surname="Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <date month="July" year="2019"/>
            <abstract>
              <t>This document defines Object Security for Constrained RESTful Environments (OSCORE), a method for application-layer protection of the Constrained Application Protocol (CoAP), using CBOR Object Signing and Encryption (COSE). OSCORE provides end-to-end protection between endpoints communicating using CoAP or CoAP-mappable HTTP. OSCORE is designed for constrained nodes and networks supporting a range of proxy operations, including translation between different transport protocols.</t>
              <t>Although an optional functionality of CoAP, OSCORE alters CoAP options processing and IANA registration. Therefore, this document updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8613"/>
          <seriesInfo name="DOI" value="10.17487/RFC8613"/>
        </reference>
        <reference anchor="RFC9250">
          <front>
            <title>DNS over Dedicated QUIC Connections</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>This document describes the use of QUIC to provide transport confidentiality for DNS. The encryption provided by QUIC has similar properties to those provided by TLS, while QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides more efficient packet-loss recovery than UDP. DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC 7858, and latency characteristics similar to classic DNS over UDP. This specification describes the use of DoQ as a general-purpose transport for DNS and includes the use of DoQ for stub to recursive, recursive to authoritative, and zone transfer scenarios.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9250"/>
          <seriesInfo name="DOI" value="10.17487/RFC9250"/>
        </reference>
        <reference anchor="RFC9203">
          <front>
            <title>The Object Security for Constrained RESTful Environments (OSCORE) Profile of the Authentication and Authorization for Constrained Environments (ACE) Framework</title>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="M. Gunnarsson" initials="M." surname="Gunnarsson"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document specifies a profile for the Authentication and Authorization for Constrained Environments (ACE) framework. It utilizes Object Security for Constrained RESTful Environments (OSCORE) to provide communication security and proof-of-possession for a key owned by the client and bound to an OAuth 2.0 access token.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9203"/>
          <seriesInfo name="DOI" value="10.17487/RFC9203"/>
        </reference>
        <reference anchor="RFC9528">
          <front>
            <title>Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>This document specifies Ephemeral Diffie-Hellman Over COSE (EDHOC), a very compact and lightweight authenticated Diffie-Hellman key exchange with ephemeral keys. EDHOC provides mutual authentication, forward secrecy, and identity protection. EDHOC is intended for usage in constrained scenarios, and a main use case is to establish an Object Security for Constrained RESTful Environments (OSCORE) security context. By reusing CBOR Object Signing and Encryption (COSE) for cryptography, Concise Binary Object Representation (CBOR) for encoding, and Constrained Application Protocol (CoAP) for transport, the additional code size can be kept very low.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9528"/>
          <seriesInfo name="DOI" value="10.17487/RFC9528"/>
        </reference>
        <reference anchor="I-D.amsuess-core-coap-over-gatt">
          <front>
            <title>CoAP over GATT (Bluetooth Low Energy Generic Attributes)</title>
            <author fullname="Christian Amsüss" initials="C." surname="Amsüss">
         </author>
            <date day="18" month="March" year="2024"/>
            <abstract>
              <t>   Interaction from computers and cell phones to constrained devices is
   limited by the different network technologies used, and by the
   available APIs.  This document describes a transport for the
   Constrained Application Protocol (CoAP) that uses Bluetooth GATT
   (Generic Attribute Profile) and its use cases.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-amsuess-core-coap-over-gatt-06"/>
        </reference>
        <reference anchor="I-D.ietf-ace-edhoc-oscore-profile">
          <front>
            <title>Ephemeral Diffie-Hellman Over COSE (EDHOC) and Object Security for Constrained Environments (OSCORE) Profile for Authentication and Authorization for Constrained Environments (ACE)</title>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE</organization>
            </author>
            <author fullname="Rikard Höglund" initials="R." surname="Höglund">
              <organization>RISE</organization>
            </author>
            <date day="8" month="July" year="2024"/>
            <abstract>
              <t>   This document specifies a profile for the Authentication and
   Authorization for Constrained Environments (ACE) framework.  It
   utilizes Ephemeral Diffie-Hellman Over COSE (EDHOC) for achieving
   mutual authentication between an ACE-OAuth Client and Resource
   Server, and it binds an authentication credential of the Client to an
   ACE-OAuth access token.  EDHOC also establishes an Object Security
   for Constrained RESTful Environments (OSCORE) Security Context, which
   is used to secure communications when accessing protected resources
   according to the authorization information indicated in the access
   token.  This profile can be used to delegate management of
   authorization information from a resource-constrained server to a
   trusted host with less severe limitations regarding processing power
   and memory.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ace-edhoc-oscore-profile-05"/>
        </reference>
        <reference anchor="I-D.ietf-core-dns-over-coap">
          <front>
            <title>DNS over CoAP (DoC)</title>
            <author fullname="Martine Sophie Lenders" initials="M. S." surname="Lenders">
              <organization>TUD Dresden University of Technology</organization>
            </author>
            <author fullname="Christian Amsüss" initials="C." surname="Amsüss">
         </author>
            <author fullname="Cenk Gündoğan" initials="C." surname="Gündoğan">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Thomas C. Schmidt" initials="T. C." surname="Schmidt">
              <organization>HAW Hamburg</organization>
            </author>
            <author fullname="Matthias Wählisch" initials="M." surname="Wählisch">
              <organization>TUD Dresden University of Technology &amp; Barkhausen Institut</organization>
            </author>
            <date day="28" month="June" year="2024"/>
            <abstract>
              <t>   This document defines a protocol for sending DNS messages over the
   Constrained Application Protocol (CoAP).  These CoAP messages are
   protected by DTLS-Secured CoAP (CoAPS) or Object Security for
   Constrained RESTful Environments (OSCORE) to provide encrypted DNS
   message exchange for constrained devices in the Internet of Things
   (IoT).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-dns-over-coap-07"/>
        </reference>
        <reference anchor="I-D.ietf-core-transport-indication">
          <front>
            <title>CoAP Transport Indication</title>
            <author fullname="Christian Amsüss" initials="C." surname="Amsüss">
         </author>
            <author fullname="Martine Sophie Lenders" initials="M. S." surname="Lenders">
              <organization>TUD Dresden University of Technology</organization>
            </author>
            <date day="8" month="July" year="2024"/>
            <abstract>
              <t>   The Constrained Application Protocol (CoAP, [RFC7252]) is available
   over different transports (UDP, DTLS, TCP, TLS, WebSockets), but
   lacks a way to unify these addresses.  This document provides
   terminology and provisions based on Web Linking [RFC8288] to express
   alternative transports available to a device, and to optimize
   exchanges using these.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-transport-indication-06"/>
        </reference>
        <reference anchor="I-D.lenders-core-coap-dtls-svcb">
          <front>
            <title>Service Binding and Parameter Specification for CoAP over (D)TLS</title>
            <author fullname="Martine Sophie Lenders" initials="M. S." surname="Lenders">
              <organization>TUD Dresden University of Technology</organization>
            </author>
            <author fullname="Christian Amsüss" initials="C." surname="Amsüss">
         </author>
            <author fullname="Thomas C. Schmidt" initials="T. C." surname="Schmidt">
              <organization>HAW Hamburg</organization>
            </author>
            <author fullname="Matthias Wählisch" initials="M." surname="Wählisch">
              <organization>TUD Dresden University of Technology &amp; Barkhausen Institut</organization>
            </author>
            <date day="21" month="June" year="2024"/>
            <abstract>
              <t>   This document specifies the usage of Service Parameters as used in
   SVCB ("Service Binding") DNS resource records for the discovery of
   transport-layer-secured CoAP services.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-lenders-core-coap-dtls-svcb-00"/>
        </reference>
        <reference anchor="lwm2m" target="https://omaspecworks.org/white-paper-lightweight-m2m-1-1/">
          <front>
            <title>White Paper – Lightweight M2M 1.1</title>
            <author>
              <organization>OMA SpecWorks</organization>
            </author>
            <date year="2018" month="October"/>
          </front>
        </reference>
      </references>
    </references>
    <section anchor="change-log">
      <name>Change Log</name>
      <section anchor="since-draft-lenders-core-dnr-02">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-lenders-core-dnr-02">draft-lenders-core-dnr-02</eref></name>
        <ul spacing="normal">
          <li>
            <t>Forward reference to upcoming changes in <xref target="I-D.ietf-core-transport-indication"/> updated</t>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-lenders-core-dnr-01">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-lenders-core-dnr-01">draft-lenders-core-dnr-01</eref></name>
        <ul spacing="normal">
          <li>
            <t>Remove parts specified in <xref target="I-D.ietf-core-transport-indication"/></t>
          </li>
          <li>
            <t>Remove parts specified in <xref target="I-D.lenders-core-coap-dtls-svcb"/></t>
          </li>
          <li>
            <t>Remove solution sketches, set objectives to solve problem space</t>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-lenders-core-dnr-00">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-lenders-core-dnr-00">draft-lenders-core-dnr-00</eref></name>
        <ul spacing="normal">
          <li>
            <t>IANA has processed the "co" ALPN and it is now added to the registry</t>
          </li>
        </ul>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
