<?xml version='1.0' encoding='utf-8'?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" version="3" ipr="trust200902" docName="draft-ietf-core-dns-over-coap-20" category="std" consensus="true" submissionType="IETF" xml:lang="en" number="9953" tocInclude="true" sortRefs="true" symRefs="true" prepTime="2026-03-31T16:04:10" indexInclude="true" scripts="Common,Latin" tocDepth="3">
  <link href="https://dx.doi.org/10.17487/rfc9953" rel="alternate"/>
  <link href="urn:issn:2070-1721" rel="alternate"/>
  <link href="https://datatracker.ietf.org/doc/draft-ietf-core-dns-over-coap-20" rel="prev"/>
  <front>
    <title abbrev="DoC">DNS over CoAP (DoC)</title>
    <seriesInfo name="RFC" value="9953" stream="IETF"/>
    <author initials="M. S." surname="Lenders" fullname="Martine Sophie Lenders">
      <organization abbrev="TU Dresden" showOnFrontPage="true">TUD Dresden University of Technology</organization>
      <address>
        <postal>
          <street>Helmholtzstr. 10</street>
          <city>Dresden</city>
          <code>D-01069</code>
          <country>Germany</country>
        </postal>
        <email>martine.lenders@tu-dresden.de</email>
      </address>
    </author>
    <author initials="C." surname="Amsüss" fullname="Christian Amsüss">
      <organization showOnFrontPage="true"/>
      <address>
        <email>christian@amsuess.com</email>
      </address>
    </author>
    <author initials="C." surname="Gündoğan" fullname="Cenk Gündoğan">
      <organization showOnFrontPage="true">NeuralAgent GmbH</organization>
      <address>
        <postal>
          <street>Mies-van-der-Rohe-Straße 6</street>
          <city>Munich</city>
          <code>D-80807</code>
          <country>Germany</country>
        </postal>
        <email>cenk.gundogan@neuralagent.ai</email>
      </address>
    </author>
    <author initials="T. C." surname="Schmidt" fullname="Thomas C. Schmidt">
      <organization showOnFrontPage="true">HAW Hamburg</organization>
      <address>
        <postal>
          <street>Berliner Tor 7</street>
          <city>Hamburg</city>
          <code>D-20099</code>
          <country>Germany</country>
        </postal>
        <email>t.schmidt@haw-hamburg.de</email>
      </address>
    </author>
    <author initials="M." surname="Wählisch" fullname="Matthias Wählisch">
      <organization abbrev="TU Dresden &amp; Barkhausen Institut" showOnFrontPage="true">TUD Dresden University of Technology &amp; Barkhausen Institut</organization>
      <address>
        <postal>
          <street>Helmholtzstr. 10</street>
          <city>Dresden</city>
          <code>D-01069</code>
          <country>Germany</country>
        </postal>
        <email>m.waehlisch@tu-dresden.de</email>
      </address>
    </author>
    <date month="03" year="2026"/>
    <area>WIT</area>
    <workgroup>CoRE</workgroup>
    <keyword>CoRE</keyword>
    <keyword>CoAP</keyword>
    <keyword>DNS</keyword>
    <abstract pn="section-abstract">
      <t indent="0" pn="section-abstract-1">This document defines a protocol for exchanging DNS queries (OPCODE 0) over the
Constrained Application Protocol (CoAP). These CoAP messages can be protected
by (D)TLS-Secured CoAP or Object Security for Constrained RESTful
Environments (OSCORE) to provide encrypted DNS message exchange for
constrained devices in the Internet of Things (IoT).</t>
    </abstract>
    <boilerplate>
      <section anchor="status-of-memo" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.1">
        <name slugifiedName="name-status-of-this-memo">Status of This Memo</name>
        <t indent="0" pn="section-boilerplate.1-1">
            This is an Internet Standards Track document.
        </t>
        <t indent="0" pn="section-boilerplate.1-2">
            This document is a product of the Internet Engineering Task Force
            (IETF).  It represents the consensus of the IETF community.  It has
            received public review and has been approved for publication by
            the Internet Engineering Steering Group (IESG).  Further
            information on Internet Standards is available in Section 2 of 
            RFC 7841.
        </t>
        <t indent="0" pn="section-boilerplate.1-3">
            Information about the current status of this document, any
            errata, and how to provide feedback on it may be obtained at
            <eref target="https://www.rfc-editor.org/info/rfc9953" brackets="none"/>.
        </t>
      </section>
      <section anchor="copyright" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.2">
        <name slugifiedName="name-copyright-notice">Copyright Notice</name>
        <t indent="0" pn="section-boilerplate.2-1">
            Copyright (c) 2026 IETF Trust and the persons identified as the
            document authors. All rights reserved.
        </t>
        <t indent="0" pn="section-boilerplate.2-2">
            This document is subject to BCP 78 and the IETF Trust's Legal
            Provisions Relating to IETF Documents
            (<eref target="https://trustee.ietf.org/license-info" brackets="none"/>) in effect on the date of
            publication of this document. Please review these documents
            carefully, as they describe your rights and restrictions with
            respect to this document. Code Components extracted from this
            document must include Revised BSD License text as described in
            Section 4.e of the Trust Legal Provisions and are provided without
            warranty as described in the Revised BSD License.
        </t>
      </section>
    </boilerplate>
    <toc>
      <section anchor="toc" numbered="false" removeInRFC="false" toc="exclude" pn="section-toc.1">
        <name slugifiedName="name-table-of-contents">Table of Contents</name>
        <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1">
          <li pn="section-toc.1-1.1">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.1"><xref derivedContent="1" format="counter" sectionFormat="of" target="section-1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-introduction">Introduction</xref></t>
          </li>
          <li pn="section-toc.1-1.2">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.2.1"><xref derivedContent="2" format="counter" sectionFormat="of" target="section-2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-terminology-and-conventions">Terminology and Conventions</xref></t>
          </li>
          <li pn="section-toc.1-1.3">
            <t indent="0" pn="section-toc.1-1.3.1"><xref derivedContent="3" format="counter" sectionFormat="of" target="section-3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-selection-of-a-doc-server">Selection of a DoC Server</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.3.2">
              <li pn="section-toc.1-1.3.2.1">
                <t indent="0" keepWithNext="true" pn="section-toc.1-1.3.2.1.1"><xref derivedContent="3.1" format="counter" sectionFormat="of" target="section-3.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-discovery-by-resource-type">Discovery by Resource Type</xref></t>
              </li>
              <li pn="section-toc.1-1.3.2.2">
                <t indent="0" pn="section-toc.1-1.3.2.2.1"><xref derivedContent="3.2" format="counter" sectionFormat="of" target="section-3.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-discovery-using-svcb-resour">Discovery Using SVCB Resource Records or DNR</xref></t>
                <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.3.2.2.2">
                  <li pn="section-toc.1-1.3.2.2.2.1">
                    <t indent="0" pn="section-toc.1-1.3.2.2.2.1.1"><xref derivedContent="3.2.1" format="counter" sectionFormat="of" target="section-3.2.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-examples">Examples</xref></t>
                  </li>
                </ul>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.4">
            <t indent="0" pn="section-toc.1-1.4.1"><xref derivedContent="4" format="counter" sectionFormat="of" target="section-4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-basic-message-exchange">Basic Message Exchange</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.4.2">
              <li pn="section-toc.1-1.4.2.1">
                <t indent="0" pn="section-toc.1-1.4.2.1.1"><xref derivedContent="4.1" format="counter" sectionFormat="of" target="section-4.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-the-application-dns-message">The "application/dns-message" Content-Format</xref></t>
              </li>
              <li pn="section-toc.1-1.4.2.2">
                <t indent="0" pn="section-toc.1-1.4.2.2.1"><xref derivedContent="4.2" format="counter" sectionFormat="of" target="section-4.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-dns-queries-in-coap-request">DNS Queries in CoAP Requests</xref></t>
                <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.4.2.2.2">
                  <li pn="section-toc.1-1.4.2.2.2.1">
                    <t indent="0" pn="section-toc.1-1.4.2.2.2.1.1"><xref derivedContent="4.2.1" format="counter" sectionFormat="of" target="section-4.2.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-request-format">Request Format</xref></t>
                  </li>
                  <li pn="section-toc.1-1.4.2.2.2.2">
                    <t indent="0" pn="section-toc.1-1.4.2.2.2.2.1"><xref derivedContent="4.2.2" format="counter" sectionFormat="of" target="section-4.2.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-support-of-coap-caching">Support of CoAP Caching</xref></t>
                  </li>
                  <li pn="section-toc.1-1.4.2.2.2.3">
                    <t indent="0" pn="section-toc.1-1.4.2.2.2.3.1"><xref derivedContent="4.2.3" format="counter" sectionFormat="of" target="section-4.2.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-example">Example</xref></t>
                  </li>
                </ul>
              </li>
              <li pn="section-toc.1-1.4.2.3">
                <t indent="0" pn="section-toc.1-1.4.2.3.1"><xref derivedContent="4.3" format="counter" sectionFormat="of" target="section-4.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-dns-responses-in-coap-respo">DNS Responses in CoAP Responses</xref></t>
                <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.4.2.3.2">
                  <li pn="section-toc.1-1.4.2.3.2.1">
                    <t indent="0" pn="section-toc.1-1.4.2.3.2.1.1"><xref derivedContent="4.3.1" format="counter" sectionFormat="of" target="section-4.3.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-response-codes-and-handling">Response Codes and Handling DNS and CoAP Errors</xref></t>
                  </li>
                  <li pn="section-toc.1-1.4.2.3.2.2">
                    <t indent="0" pn="section-toc.1-1.4.2.3.2.2.1"><xref derivedContent="4.3.2" format="counter" sectionFormat="of" target="section-4.3.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-support-of-coap-caching-2">Support of CoAP Caching</xref></t>
                  </li>
                  <li pn="section-toc.1-1.4.2.3.2.3">
                    <t indent="0" pn="section-toc.1-1.4.2.3.2.3.1"><xref derivedContent="4.3.3" format="counter" sectionFormat="of" target="section-4.3.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-examples-2">Examples</xref></t>
                  </li>
                </ul>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.5">
            <t indent="0" pn="section-toc.1-1.5.1"><xref derivedContent="5" format="counter" sectionFormat="of" target="section-5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-interaction-with-other-coap">Interaction with Other CoAP and CoRE Features</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.5.2">
              <li pn="section-toc.1-1.5.2.1">
                <t indent="0" pn="section-toc.1-1.5.2.1.1"><xref derivedContent="5.1" format="counter" sectionFormat="of" target="section-5.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-dns-push-notifications-and-">DNS Push Notifications and CoAP Observe</xref></t>
              </li>
              <li pn="section-toc.1-1.5.2.2">
                <t indent="0" pn="section-toc.1-1.5.2.2.1"><xref derivedContent="5.2" format="counter" sectionFormat="of" target="section-5.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-oscore">OSCORE</xref></t>
              </li>
              <li pn="section-toc.1-1.5.2.3">
                <t indent="0" pn="section-toc.1-1.5.2.3.1"><xref derivedContent="5.3" format="counter" sectionFormat="of" target="section-5.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-mapping-doc-to-doh">Mapping DoC to DoH</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.6">
            <t indent="0" pn="section-toc.1-1.6.1"><xref derivedContent="6" format="counter" sectionFormat="of" target="section-6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-considerations-for-unprotec">Considerations for Unprotected Use</xref></t>
          </li>
          <li pn="section-toc.1-1.7">
            <t indent="0" pn="section-toc.1-1.7.1"><xref derivedContent="7" format="counter" sectionFormat="of" target="section-7"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-security-considerations">Security Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.8">
            <t indent="0" pn="section-toc.1-1.8.1"><xref derivedContent="8" format="counter" sectionFormat="of" target="section-8"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-iana-considerations">IANA Considerations</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.8.2">
              <li pn="section-toc.1-1.8.2.1">
                <t indent="0" pn="section-toc.1-1.8.2.1.1"><xref derivedContent="8.1" format="counter" sectionFormat="of" target="section-8.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-coap-content-formats-regist">CoAP Content-Formats Registry</xref></t>
              </li>
              <li pn="section-toc.1-1.8.2.2">
                <t indent="0" pn="section-toc.1-1.8.2.2.1"><xref derivedContent="8.2" format="counter" sectionFormat="of" target="section-8.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-dns-svbc-service-parameter-">DNS SVBC Service Parameter Keys (SvcParamKeys) Registry</xref></t>
              </li>
              <li pn="section-toc.1-1.8.2.3">
                <t indent="0" pn="section-toc.1-1.8.2.3.1"><xref derivedContent="8.3" format="counter" sectionFormat="of" target="section-8.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-resource-type-rt-link-targe">Resource Type (rt=) Link Target Attribute Values Registry</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.9">
            <t indent="0" pn="section-toc.1-1.9.1"><xref derivedContent="9" format="counter" sectionFormat="of" target="section-9"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-operational-considerations">Operational Considerations</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.9.2">
              <li pn="section-toc.1-1.9.2.1">
                <t indent="0" pn="section-toc.1-1.9.2.1.1"><xref derivedContent="9.1" format="counter" sectionFormat="of" target="section-9.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-coexistence-of-different-dn">Coexistence of Different DNS and CoAP Transports</xref></t>
              </li>
              <li pn="section-toc.1-1.9.2.2">
                <t indent="0" pn="section-toc.1-1.9.2.2.1"><xref derivedContent="9.2" format="counter" sectionFormat="of" target="section-9.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-redirects">Redirects</xref></t>
              </li>
              <li pn="section-toc.1-1.9.2.3">
                <t indent="0" pn="section-toc.1-1.9.2.3.1"><xref derivedContent="9.3" format="counter" sectionFormat="of" target="section-9.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-proxy-hop-limit">Proxy Hop Limit</xref></t>
              </li>
              <li pn="section-toc.1-1.9.2.4">
                <t indent="0" pn="section-toc.1-1.9.2.4.1"><xref derivedContent="9.4" format="counter" sectionFormat="of" target="section-9.4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-error-handling">Error Handling</xref></t>
              </li>
              <li pn="section-toc.1-1.9.2.5">
                <t indent="0" pn="section-toc.1-1.9.2.5.1"><xref derivedContent="9.5" format="counter" sectionFormat="of" target="section-9.5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-dns-extensions">DNS Extensions</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.10">
            <t indent="0" pn="section-toc.1-1.10.1"><xref derivedContent="10" format="counter" sectionFormat="of" target="section-10"/>. <xref derivedContent="" format="title" sectionFormat="of" target="name-references">References</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.10.2">
              <li pn="section-toc.1-1.10.2.1">
                <t indent="0" pn="section-toc.1-1.10.2.1.1"><xref derivedContent="10.1" format="counter" sectionFormat="of" target="section-10.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-normative-references">Normative References</xref></t>
              </li>
              <li pn="section-toc.1-1.10.2.2">
                <t indent="0" pn="section-toc.1-1.10.2.2.1"><xref derivedContent="10.2" format="counter" sectionFormat="of" target="section-10.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-informative-references">Informative References</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.11">
            <t indent="0" pn="section-toc.1-1.11.1"><xref derivedContent="Appendix A" format="default" sectionFormat="of" target="section-appendix.a"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-evaluation">Evaluation</xref></t>
          </li>
          <li pn="section-toc.1-1.12">
            <t indent="0" pn="section-toc.1-1.12.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.b"/><xref derivedContent="" format="title" sectionFormat="of" target="name-acknowledgments">Acknowledgments</xref></t>
          </li>
          <li pn="section-toc.1-1.13">
            <t indent="0" pn="section-toc.1-1.13.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.c"/><xref derivedContent="" format="title" sectionFormat="of" target="name-authors-addresses">Authors' Addresses</xref></t>
          </li>
        </ul>
      </section>
    </toc>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" removeInRFC="false" toc="include" pn="section-1">
      <name slugifiedName="name-introduction">Introduction</name>
      <t indent="0" pn="section-1-1">This document defines DNS over CoAP (DoC), a protocol to send DNS
<xref target="STD13" format="default" sectionFormat="of" derivedContent="STD13"/> queries and get DNS responses over the Constrained Application
Protocol (CoAP) <xref target="RFC7252" format="default" sectionFormat="of" derivedContent="RFC7252"/> using OPCODE 0 (Query). Each DNS query-response pair is mapped into a
CoAP message exchange. Each CoAP message can be secured by any combination of DTLS 1.2 or newer <xref target="RFC6347" format="default" sectionFormat="of" derivedContent="RFC6347"/> <xref target="RFC9147" format="default" sectionFormat="of" derivedContent="RFC9147"/>, TLS 1.3 or newer <xref target="RFC8323" format="default" sectionFormat="of" derivedContent="RFC8323"/> <xref target="RFC8446" format="default" sectionFormat="of" derivedContent="RFC8446"/>, or Object Security for Constrained RESTful Environments (OSCORE) <xref target="RFC8613" format="default" sectionFormat="of" derivedContent="RFC8613"/> to ensure message integrity and confidentiality.</t>
      <t indent="0" pn="section-1-2">The application use case of DoC is inspired by DNS over HTTPS (DoH) <xref target="RFC8484" format="default" sectionFormat="of" derivedContent="RFC8484"/>.
However, DoC aims for deployment in the constrained Internet of
Things (IoT), which usually conflicts with the requirements introduced by
HTTPS.
Constrained IoT devices may be restricted in memory, power consumption,
link-layer frame sizes, throughput, and latency. They may
only have a handful kilobytes of both RAM and ROM. They may sleep for long
durations of time, after which they need to refresh the named resources they
know about. Name resolution in such scenarios must take into account link-layer
frame sizes of only a few hundred bytes, bit rates in the magnitude
of kilobits per second, and latencies of several seconds <xref target="RFC7228" format="default" sectionFormat="of" derivedContent="RFC7228"/> <xref target="I-D.ietf-iotops-7228bis" format="default" sectionFormat="of" derivedContent="RFC7228bis"/>.</t>
      <t indent="0" pn="section-1-3">In order not to be burdened by the resource requirements of TCP and HTTPS, constrained IoT devices could use DNS over DTLS <xref target="RFC8094" format="default" sectionFormat="of" derivedContent="RFC8094"/>.
In contrast to DNS over DTLS, DoC
can take advantage of CoAP features to mitigate drawbacks of datagram-based
communication. These features include (1) block-wise transfer <xref target="RFC7959" format="default" sectionFormat="of" derivedContent="RFC7959"/>, which solves
the Path MTU problem of DNS over DTLS (see <xref section="5" sectionFormat="comma" target="RFC8094" format="default" derivedLink="https://rfc-editor.org/rfc/rfc8094#section-5" derivedContent="RFC8094"/>), (2) CoAP
proxies, which provide an additional level of caching, and (3) reuse of data
structures for application traffic and DNS information, which saves memory
on constrained devices.</t>
      <t indent="0" pn="section-1-4">To avoid the resource requirements of DTLS or TLS on top of UDP (e.g., introduced by DNS over DTLS <xref target="RFC8094" format="default" sectionFormat="of" derivedContent="RFC8094"/> or DNS over QUIC <xref target="RFC9250" format="default" sectionFormat="of" derivedContent="RFC9250"/>), DoC allows for lightweight message protection based on OSCORE.</t>
      <figure anchor="fig-overview-arch" align="left" suppress-title="false" pn="figure-1">
        <name slugifiedName="name-basic-doc-architecture">Basic DoC Architecture</name>
        <artset pn="section-1-5.1">
          <artwork type="svg" align="left" pn="section-1-5.1.1"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="208" width="584" viewBox="0 0 584 208" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,96 L 8,144" fill="none" stroke="black"/>
              <path d="M 64,96 L 64,144" fill="none" stroke="black"/>
              <path d="M 192,96 L 192,144" fill="none" stroke="black"/>
              <path d="M 248,96 L 248,144" fill="none" stroke="black"/>
              <path d="M 304,96 L 304,144" fill="none" stroke="black"/>
              <path d="M 440,112 L 440,128" fill="none" stroke="black"/>
              <path d="M 576,112 L 576,128" fill="none" stroke="black"/>
              <path d="M 8,96 L 64,96" fill="none" stroke="black"/>
              <path d="M 192,96 L 304,96" fill="none" stroke="black"/>
              <path d="M 456,96 L 560,96" fill="none" stroke="black"/>
              <path d="M 72,112 L 184,112" fill="none" stroke="black"/>
              <path d="M 312,112 L 328,112" fill="none" stroke="black"/>
              <path d="M 344,112 L 360,112" fill="none" stroke="black"/>
              <path d="M 376,112 L 392,112" fill="none" stroke="black"/>
              <path d="M 408,112 L 432,112" fill="none" stroke="black"/>
              <path d="M 72,128 L 184,128" fill="none" stroke="black"/>
              <path d="M 312,128 L 336,128" fill="none" stroke="black"/>
              <path d="M 352,128 L 368,128" fill="none" stroke="black"/>
              <path d="M 384,128 L 400,128" fill="none" stroke="black"/>
              <path d="M 416,128 L 432,128" fill="none" stroke="black"/>
              <path d="M 8,144 L 64,144" fill="none" stroke="black"/>
              <path d="M 192,144 L 304,144" fill="none" stroke="black"/>
              <path d="M 456,144 L 560,144" fill="none" stroke="black"/>
              <path d="M 40,192 L 80,192" fill="none" stroke="black"/>
              <path d="M 192,192 L 232,192" fill="none" stroke="black"/>
              <path d="M 264,192 L 296,192" fill="none" stroke="black"/>
              <path d="M 512,192 L 544,192" fill="none" stroke="black"/>
              <path d="M 32,176 L 40,192" fill="none" stroke="black"/>
              <path d="M 256,176 L 264,192" fill="none" stroke="black"/>
              <path d="M 104,64 L 120,32" fill="none" stroke="black"/>
              <path d="M 232,192 L 240,176" fill="none" stroke="black"/>
              <path d="M 544,192 L 552,176" fill="none" stroke="black"/>
              <path d="M 456,96 C 447.16936,96 440,103.16936 440,112" fill="none" stroke="black"/>
              <path d="M 560,96 C 568.83064,96 576,103.16936 576,112" fill="none" stroke="black"/>
              <path d="M 456,144 C 447.16936,144 440,136.83064 440,128" fill="none" stroke="black"/>
              <path d="M 560,144 C 568.83064,144 576,136.83064 576,128" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="440,112 428,106.4 428,117.6" fill="black" transform="rotate(0,432,112)"/>
              <polygon class="arrowhead" points="320,128 308,122.4 308,133.6" fill="black" transform="rotate(180,312,128)"/>
              <polygon class="arrowhead" points="192,112 180,106.4 180,117.6" fill="black" transform="rotate(0,184,112)"/>
              <polygon class="arrowhead" points="80,128 68,122.4 68,133.6" fill="black" transform="rotate(180,72,128)"/>
              <g class="text">
                <text x="152" y="36">FETCH</text>
                <text x="268" y="36">coaps://[2001:db8::1]/</text>
                <text x="100" y="84">CoAP</text>
                <text x="152" y="84">request</text>
                <text x="100" y="100">[DNS</text>
                <text x="148" y="100">query]</text>
                <text x="344" y="100">DNS</text>
                <text x="384" y="100">query</text>
                <text x="32" y="116">DoC</text>
                <text x="216" y="116">DoC</text>
                <text x="272" y="116">DNS</text>
                <text x="504" y="116">DNS</text>
                <text x="36" y="132">Client</text>
                <text x="220" y="132">Server</text>
                <text x="276" y="132">Client</text>
                <text x="508" y="132">Infrastructure</text>
                <text x="92" y="148">CoAP</text>
                <text x="148" y="148">response</text>
                <text x="336" y="148">DNS</text>
                <text x="388" y="148">response</text>
                <text x="92" y="164">[DNS</text>
                <text x="152" y="164">response]</text>
                <text x="96" y="196">DNS</text>
                <text x="132" y="196">over</text>
                <text x="172" y="196">CoAP</text>
                <text x="312" y="196">DNS</text>
                <text x="348" y="196">over</text>
                <text x="440" y="196">UDP/HTTPS/QUIC/..</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="left" pn="section-1-5.1.2">
              . FETCH coaps://[2001:db8::1]/
             /
            /
          CoAP request
+------+  [DNS query]  +------+------+   DNS query     .--------------.
| DoC  |--------------&gt;| DoC  | DNS  |--- --- --- ---&gt;|      DNS       |
|Client|&lt;--------------|Server|Client|&lt;--- --- --- ---| Infrastructure |
+------+ CoAP response +------+------+  DNS response   '--------------'
         [DNS response]
   \                         / \                                    /
    '-----DNS over CoAP-----'   '----DNS over UDP/HTTPS/QUIC/...---'
</artwork>
        </artset>
      </figure>
      <t indent="0" pn="section-1-6">The most important components of DoC can be seen in <xref target="fig-overview-arch" format="default" sectionFormat="of" derivedContent="Figure 1"/>: a DoC
client tries to resolve DNS information by sending DNS queries carried within
CoAP requests to a DoC server.
That DoC server can be the authoritative name server for the queried record or a DNS client (i.e., a stub or recursive resolver) that resolves DNS information by using other DNS transports such
as DNS over UDP <xref target="STD13" format="default" sectionFormat="of" derivedContent="STD13"/>, DNS over HTTPS <xref target="RFC8484" format="default" sectionFormat="of" derivedContent="RFC8484"/>, or DNS over QUIC <xref target="RFC9250" format="default" sectionFormat="of" derivedContent="RFC9250"/> when communicating with the upstream
DNS infrastructure.
Using that information, the DoC server then replies to the queries of the DoC client with DNS
responses carried within CoAP responses.
A DoC server <bcp14>MAY</bcp14> also serve as a DNSSEC validator to provide DNSSEC validation to the more
constrained DoC clients.</t>
      <t indent="0" pn="section-1-7">Note that this specification is distinct from DoH because the CoAP-specific FETCH method <xref target="RFC8132" format="default" sectionFormat="of" derivedContent="RFC8132"/> is used.
A benefit of using this method is having the DNS query in the body such as when using the POST method, but with the same caching advantages of responses to requests that use the GET method.
Having the DNS query in the body means that there is no need for extra base64 encoding, which would increase
code complexity and message sizes.
Also, this allows for the block-wise transfer of queries <xref target="RFC7959" format="default" sectionFormat="of" derivedContent="RFC7959"/>.</t>
    </section>
    <section anchor="terminology-and-conventions" numbered="true" removeInRFC="false" toc="include" pn="section-2">
      <name slugifiedName="name-terminology-and-conventions">Terminology and Conventions</name>
      <t indent="0" pn="section-2-1">The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119" format="default" sectionFormat="of" derivedContent="RFC2119"/> <xref target="RFC8174" format="default" sectionFormat="of" derivedContent="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <t indent="0" pn="section-2-2">A server that provides the service specified in this document is called a "DoC
server" to differentiate it from a classic "DNS server".
A DoC server acts as either a DNS stub resolver or a DNS recursive resolver <xref target="BCP219" format="default" sectionFormat="of" derivedContent="BCP219"/>.
As such, the DoC server communicates with an "upstream DNS infrastructure" or a single "upstream DNS server".
A "DoC resource" is a CoAP resource <xref target="RFC7252" format="default" sectionFormat="of" derivedContent="RFC7252"/> at the DoC server that DoC clients can target in order to send a DNS query in a CoAP request.</t>
      <t indent="0" pn="section-2-3">A client using the service specified in this document to retrieve
the DNS information is called a "DoC client".</t>
      <t indent="0" pn="section-2-4">The term "constrained nodes" is used as defined in <xref target="RFC7228" format="default" sectionFormat="of" derivedContent="RFC7228"/>.
<xref target="RFC6690" format="default" sectionFormat="of" derivedContent="RFC6690"/> describes that Constrained RESTful Environments (CoRE) realize the Representational State Transfer (REST) architecture <xref target="REST" format="default" sectionFormat="of" derivedContent="REST"/> in a suitable form for such constrained nodes.</t>
      <t indent="0" pn="section-2-5">A DoC server can provide Observe capabilities as defined in <xref section="1.2" sectionFormat="comma" target="RFC7641" format="default" derivedLink="https://rfc-editor.org/rfc/rfc7641#section-1.2" derivedContent="RFC7641"/>.
As part of that, it administers a "list of observers". DoC clients using these capabilities are "observers" as defined in <xref section="1.2" sectionFormat="comma" target="RFC7641" format="default" derivedLink="https://rfc-editor.org/rfc/rfc7641#section-1.2" derivedContent="RFC7641"/>.
A "notification" is a CoAP response message with an Observe option; see <xref section="4.2" sectionFormat="comma" target="RFC7641" format="default" derivedLink="https://rfc-editor.org/rfc/rfc7641#section-4.2" derivedContent="RFC7641"/>.</t>
      <t indent="0" pn="section-2-6">The terms "payload" and "body" are used as defined in <xref section="2" sectionFormat="comma" target="RFC7959" format="default" derivedLink="https://rfc-editor.org/rfc/rfc7959#section-2" derivedContent="RFC7959"/>.
Note that, when block-wise transfer is not used, the terms "payload" and "body" are to be understood as equal.</t>
      <t indent="0" pn="section-2-7">In the examples in this document, the binary payload and resource records are shown in a hexadecimal representation as well as a human-readable format for better readability. However, in the actual message sent and received, they are encoded in the binary message format defined in <xref target="STD13" format="default" sectionFormat="of" derivedContent="STD13"/>.</t>
    </section>
    <section anchor="sec_doc-server-selection" numbered="true" removeInRFC="false" toc="include" pn="section-3">
      <name slugifiedName="name-selection-of-a-doc-server">Selection of a DoC Server</name>
      <t indent="0" pn="section-3-1">While there is no path specified for the DoC resource, it is <bcp14>RECOMMENDED</bcp14> to use the root path "/"
to keep the CoAP requests small.</t>
      <t indent="0" pn="section-3-2">The DoC client needs to know the DoC server and the DoC resource at the DoC server.
Possible options to assure this could be (1) manual configuration of a Uniform Resource Identifier (URI) <xref target="RFC3986" format="default" sectionFormat="of" derivedContent="RFC3986"/> or Constrained Resource Identifier (CRI) <xref target="I-D.ietf-core-href" format="default" sectionFormat="of" derivedContent="CRI"/>
or (2) automatic configuration, e.g., using a CoRE resource directory
<xref target="RFC9176" format="default" sectionFormat="of" derivedContent="RFC9176"/>, DHCP or Router Advertisement options <xref target="RFC9463" format="default" sectionFormat="of" derivedContent="RFC9463"/>, or discovery of designated resolvers
<xref target="RFC9462" format="default" sectionFormat="of" derivedContent="RFC9462"/>.
Automatic configuration <bcp14>MUST</bcp14> only be done from a trusted source.</t>
      <section anchor="discovery-by-resource-type" numbered="true" removeInRFC="false" toc="include" pn="section-3.1">
        <name slugifiedName="name-discovery-by-resource-type">Discovery by Resource Type</name>
        <t indent="0" pn="section-3.1-1">For discovery of the DoC resource through a link mechanism that allows describing a resource type
(e.g., the Resource Type attribute in <xref target="RFC6690" format="default" sectionFormat="of" derivedContent="RFC6690"/>), this document introduces the resource type "core.dns".
It can be used to identify a generic DNS resolver that is available to the client.</t>
      </section>
      <section anchor="discovery-using-svcb-resource-records-or-dnr" numbered="true" removeInRFC="false" toc="include" pn="section-3.2">
        <name slugifiedName="name-discovery-using-svcb-resour">Discovery Using SVCB Resource Records or DNR</name>
        <t indent="0" pn="section-3.2-1">A DoC server can also be discovered using Service Binding (SVCB) Resource Records (RRs) <xref target="RFC9460" format="default" sectionFormat="of" derivedContent="RFC9460"/> <xref target="RFC9461" format="default" sectionFormat="of" derivedContent="RFC9461"/> resolved via another DNS service (e.g., provided by an unencrypted local resolver) or Discovery of Network-designated Resolvers (DNR)
Service Parameters <xref target="RFC9463" format="default" sectionFormat="of" derivedContent="RFC9463"/> via DHCP or Router Advertisements.
<xref target="RFC8323" format="default" sectionFormat="of" derivedContent="RFC8323"/> defines the Application-Layer Protocol Negotiation (ALPN) ID for CoAP over TLS servers and <xref target="RFC9952" format="default" sectionFormat="of" derivedContent="RFC9952"/> defines the ALPN ID for CoAP over DTLS servers.
DoC servers that use only OSCORE <xref target="RFC8613" format="default" sectionFormat="of" derivedContent="RFC8613"/> and Ephemeral Diffie-Hellman Over COSE (EDHOC) <xref target="RFC9528" format="default" sectionFormat="of" derivedContent="RFC9528"/> (COSE stands for "Concise Binary Object Notation (CBOR) Object Signing and Encryption" <xref target="RFC9052" format="default" sectionFormat="of" derivedContent="RFC9052"/>) to support security cannot be discovered using these SVCB RR or DNR mechanisms.
Specifying an alternate discovery mechanism is out of the scope of this document.</t>
        <t indent="0" pn="section-3.2-2">This document is not an SVCB mapping document for the CoAP schemes
as defined in <xref section="2.4.3" sectionFormat="of" target="RFC9460" format="default" derivedLink="https://rfc-editor.org/rfc/rfc9460#section-2.4.3" derivedContent="RFC9460"/>.
A full SVCB mapping is specified in <xref target="I-D.ietf-core-transport-indication" format="default" sectionFormat="of" derivedContent="TRANSPORT-IND"/>.
It generalizes mechanisms for all CoAP services.
This document introduces only the discovery of DoC services.</t>
        <t indent="0" pn="section-3.2-3">This document specifies "docpath" as
a single-valued Service Parameter Key (SvcParamKey) that is mandatory for DoC SVCB records.
If the "docpath" SvcParamKey is absent, the service should not be considered a valid DoC service.</t>
        <t indent="0" pn="section-3.2-4">The docpath is divided up into segments of the absolute path to the DoC resource (docpath-segment),
each a sequence of 1-255 octets.
In ABNF <xref target="RFC5234" format="default" sectionFormat="of" derivedContent="RFC5234"/>:</t>
        <sourcecode type="abnf" markers="false" pn="section-3.2-5">
docpath-segment = 1*255OCTET
</sourcecode>
        <t indent="0" pn="section-3.2-6">Note that this restricts the length of each docpath-segment to at most 255 octets.
Paths with longer segments cannot be advertised with the "docpath" SvcParam and are thus <bcp14>NOT RECOMMENDED</bcp14> for the path to the DoC resource.</t>
        <t indent="0" pn="section-3.2-7">The presentation format value of "docpath" <bcp14>SHALL</bcp14> be a comma-separated list (<xref section="A.1" sectionFormat="of" target="RFC9460" format="default" derivedLink="https://rfc-editor.org/rfc/rfc9460#appendix-A.1" derivedContent="RFC9460"/>)
of 0 or more docpath-segments.
The root path "/" is represented by 0 docpath-segments, i.e., an empty list.
The same considerations apply for the "," and "\" characters in docpath-segments for zone-file
implementations and the alpn-ids in an "alpn" SvcParam (<xref section="7.1.1" sectionFormat="of" target="RFC9460" format="default" derivedLink="https://rfc-editor.org/rfc/rfc9460#section-7.1.1" derivedContent="RFC9460"/>).</t>
        <t indent="0" pn="section-3.2-8">The wire-format value for "docpath" consists of 0 or more sequences of octets prefixed by their
respective length as a single octet.
We call this single octet the length octet.
The length octet and the corresponding sequence form a length-value pair.
These length-value pairs are concatenated to form the SvcParamValue.
These pairs <bcp14>MUST</bcp14> exactly fill the SvcParamValue; otherwise, the SvcParamValue is malformed.
Each such length-value pair represents one segment of the absolute path to the DoC resource.
The root path "/" is represented by 0 length-value pairs, i.e., SvcParamValue length 0.</t>
        <t indent="0" pn="section-3.2-9">Note that this format uses the same encoding as the "alpn" SvcParam, and it can reuse the
decoders and encoders for that SvcParam with the adaption that a length of zero is allowed.
As long as each docpath-segment has a length between 0 and 23 octets, inclusive, it is easily transferred into the path
representation in CRIs <xref target="I-D.ietf-core-href" format="default" sectionFormat="of" derivedContent="CRI"/> by masking each length octet with the CBOR text string major type 3
(<tt>0x60</tt> as an octet; see <xref target="RFC8949" format="default" sectionFormat="of" derivedContent="RFC8949"/>).
Furthermore, it is easily transferable into a sequence of CoAP Uri-Path options by
mapping each length octet into the Option Delta and Option Length of the corresponding CoAP Uri-Path
option, provided the docpath-segments are all of a length between 0 and 12 octets (see <xref section="3.1" sectionFormat="comma" target="RFC7252" format="default" derivedLink="https://rfc-editor.org/rfc/rfc7252#section-3.1" derivedContent="RFC7252"/>). Likewise, it can be transferred into a URI path-abempty form by replacing each length octet with the "/" character.
None of the abovementioned prevent longer docpath-segments than the considered ones; they just make the
translation harder as space is required for the longer delimiters, which in turn require octets to be moved.</t>
        <t indent="0" pn="section-3.2-10">To use the service binding from an SVCB RR or DNR Encrypted DNS option, the DoC client <bcp14>MUST</bcp14> send a DoC request constructed from the SvcParams including "docpath".
The construction algorithm for DoC requests is as follows, with the provided records in order of their priority.
For the purposes of this algorithm, the DoC client is assumed to be SVCB-optional (see <xref section="3" sectionFormat="of" target="RFC9460" format="default" derivedLink="https://rfc-editor.org/rfc/rfc9460#section-3" derivedContent="RFC9460"/>).</t>
        <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-3.2-11">
          <li pn="section-3.2-11.1">
            <t indent="0" pn="section-3.2-11.1.1">If the "alpn" SvcParam value for the service is "coap", a CoAP request for CoAP over TLS <bcp14>MUST</bcp14> be constructed <xref target="RFC8323" format="default" sectionFormat="of" derivedContent="RFC8323"/>.
If it is "co", a CoAP request for CoAP over DTLS <bcp14>MUST</bcp14> be constructed <xref target="RFC9952" format="default" sectionFormat="of" derivedContent="RFC9952"/>.
Any other SvcParamKeys specifying a transport are out of the scope of this document.</t>
          </li>
          <li pn="section-3.2-11.2">
            <t indent="0" pn="section-3.2-11.2.1">The destination address for the request <bcp14>SHOULD</bcp14> be taken from additional information about the target.
This may include (1) A or AAAA RRs associated with the target name and delivered with the SVCB RR (see <xref target="RFC9462" format="default" sectionFormat="of" derivedContent="RFC9462"/>), (2) "ipv4hint" or "ipv6hint" SvcParams from the SVCB RR (see <xref target="RFC9461" format="default" sectionFormat="of" derivedContent="RFC9461"/>), or (3) IPv4 or IPv6 addresses provided if DNR <xref target="RFC9463" format="default" sectionFormat="of" derivedContent="RFC9463"/> is used.
As a fallback, an address <bcp14>MAY</bcp14> be queried for the target name of the SVCB record from another DNS service.</t>
          </li>
          <li pn="section-3.2-11.3">
            <t indent="0" pn="section-3.2-11.3.1">The destination port for the request <bcp14>MUST</bcp14> be taken from the "port" SvcParam value, if present.
Otherwise, take the default port of the CoAP transport, e.g., with regards to this specification, the default is TCP port 5684 for "coap" or UDP port 5684 for "co".
This document introduces no limitations on the ports that can be used.
If a malicious SVCB record allows its originator to influence message payloads, <xref section="12" sectionFormat="of" target="RFC9460" format="default" derivedLink="https://rfc-editor.org/rfc/rfc9460#section-12" derivedContent="RFC9460"/> recommends placing such restrictions in the SVCB mapping document.
The records used in this document only influence the Uri-Path option.
That option is only sent in the plaintext of an encrypted (D)TLS channel
and thus does not warrant any limitations.</t>
          </li>
          <li pn="section-3.2-11.4">
            <t indent="0" pn="section-3.2-11.4.1">The request URI's hostname component <bcp14>MUST</bcp14> be the Authentication Domain Name (ADN) when obtained through DNR
and <bcp14>MUST</bcp14> be the target name of the SVCB record when obtained through a <tt>_dns</tt> query
(if AliasMode is used to the target name of the AliasMode record).
This can be achieved efficiently by setting that name in TLS Server Name Indication (SNI) <xref target="RFC8446" format="default" sectionFormat="of" derivedContent="RFC8446"/>
or by setting the Uri-Host option on each request.</t>
          </li>
          <li pn="section-3.2-11.5">
            <t indent="0" pn="section-3.2-11.5.1">For each element in the CBOR sequence of the "docpath" SvcParam value, a Uri-Path option <bcp14>MUST</bcp14> be added to the request.</t>
          </li>
          <li pn="section-3.2-11.6">
            <t indent="0" pn="section-3.2-11.6.1">If the request constructed this way receives a response, the same SVCB record <bcp14>MUST</bcp14> be used for construction of future DoC queries.
If not, or if the endpoint becomes unreachable, the algorithm repeats with the SVCB RR or DNR Encrypted DNS option with the next highest Service Priority as a fallback (see Sections <xref target="RFC9460" section="2.4.1" sectionFormat="bare" format="default" derivedLink="https://rfc-editor.org/rfc/rfc9460#section-2.4.1" derivedContent="RFC9460"/> and <xref target="RFC9460" section="3" sectionFormat="bare" format="default" derivedLink="https://rfc-editor.org/rfc/rfc9460#section-3" derivedContent="RFC9460"/> of <xref target="RFC9460" format="default" sectionFormat="of" derivedContent="RFC9460"/>).</t>
          </li>
        </ul>
        <t indent="0" pn="section-3.2-12">A more generalized construction algorithm for any CoAP request can be found in <xref target="I-D.ietf-core-transport-indication" format="default" sectionFormat="of" derivedContent="TRANSPORT-IND"/>.</t>
        <section anchor="examples" numbered="true" removeInRFC="false" toc="include" pn="section-3.2.1">
          <name slugifiedName="name-examples">Examples</name>
          <t indent="0" pn="section-3.2.1-1">A typical SVCB resource record response for a DoC server at the root path "/" of the server looks
like the following (the "docpath" SvcParam is the last 4 bytes <tt>00 0a 00 00</tt> in the binary):</t>
          <sourcecode markers="false" pn="section-3.2.1-2">
Resource record (binary):
 04 5f 64 6e 73 07 65 78 61 6d 70 6c 65 03 6f 72
 67 00 00 40 00 01 00 00 06 28 00 1e 00 01 03 64
 6e 73 07 65 78 61 6d 70 6c 65 03 6f 72 67 00 00
 01 00 03 02 63 6f 00 0a 00 00

Resource record (human-readable):
 _dns.example.org.  1576  IN SVCB 1 dns.example.org (
     alpn=co docpath )
</sourcecode>
          <t indent="0" pn="section-3.2.1-3">The root path is <bcp14>RECOMMENDED</bcp14> but not required. Here are two examples where the "docpath" represents
paths of varying depth. First, "/dns" is provided in the following example
(the last 8 bytes <tt>00 0a 00 04 03 64 6e 73</tt>):</t>
          <sourcecode markers="false" pn="section-3.2.1-4">
Resource record (binary):
 04 5f 64 6e 73 07 65 78 61 6d 70 6c 65 03 6f 72
 67 00 00 40 00 01 00 00 00 55 00 22 00 01 03 64
 6e 73 07 65 78 61 6d 70 6c 65 03 6f 72 67 00 00
 01 00 03 02 63 6f 00 0a 00 04 03 64 6e 73

Resource record (human-readable):
 _dns.example.org.    85  IN SVCB 1 dns.example.org (
     alpn=co docpath=dns )
</sourcecode>
          <t indent="0" pn="section-3.2.1-5">Second, see an example for the path "/n/s" (the last 8 bytes <tt>00 0a 00 04 01 6e 01 73</tt>):</t>
          <sourcecode markers="false" pn="section-3.2.1-6">
Resource record (binary):
 04 5f 64 6e 73 07 65 78 61 6d 70 6c 65 03 6f 72
 67 00 00 40 00 01 00 00 06 6b 00 22 00 01 03 64
 6e 73 07 65 78 61 6d 70 6c 65 03 6f 72 67 00 00
 01 00 03 02 63 6f 00 0a 00 04 01 6e 01 73

Resource record (human-readable):
 _dns.example.org.   1643  IN SVCB 1 dns.example.org (
     alpn=co docpath=n,s )
</sourcecode>
          <t indent="0" pn="section-3.2.1-7">If the server also provides DNS over HTTPS, "dohpath" and "docpath" <bcp14>MAY</bcp14> coexist:</t>
          <sourcecode markers="false" pn="section-3.2.1-8">
Resource record (binary):
 04 5f 64 6e 73 07 65 78 61 6d 70 6c 65 03 6f 72
 67 00 00 40 00 01 00 00 01 ad 00 2c 00 01 03 64
 6e 73 07 65 78 61 6d 70 6c 65 03 6f 72 67 00 00
 01 00 06 02 68 33 02 63 6f 00 07 00 07 2f 7b 3f
 64 6e 73 7d 00 0a 00 00

Resource record (human-readable):
 _dns.example.org.   429  IN SVCB 1 dns.example.org (
     alpn=h3,co dohpath=/{?dns} docpath )
</sourcecode>
        </section>
      </section>
    </section>
    <section anchor="basic-message-exchange" numbered="true" removeInRFC="false" toc="include" pn="section-4">
      <name slugifiedName="name-basic-message-exchange">Basic Message Exchange</name>
      <section anchor="sec_content-format" numbered="true" removeInRFC="false" toc="include" pn="section-4.1">
        <name slugifiedName="name-the-application-dns-message">The "application/dns-message" Content-Format</name>
        <t indent="0" pn="section-4.1-1">This document defines a CoAP Content-Format ID for the Internet
media type "application/dns-message" to be the mnemonic 553, based on the port assignment of DNS.
This media type is defined as in <xref section="6" sectionFormat="of" target="RFC8484" format="default" derivedLink="https://rfc-editor.org/rfc/rfc8484#section-6" derivedContent="RFC8484"/>, i.e., a single DNS message encoded in the DNS on-the-wire format <xref target="STD13" format="default" sectionFormat="of" derivedContent="STD13"/>.
Both DoC client and DoC server <bcp14>MUST</bcp14> be able to parse contents in the "application/dns-message" Content-Format.
This document only specifies OPCODE 0 (Query) for DNS over CoAP messages.
Future documents can provide considerations for additional OPCODEs or extend its specification (e.g., by describing whether other CoAP codes need to be used for which OPCODE).
Unless another error takes precedence, a DoC server uses RCODE = 4, NotImp <xref target="STD13" format="default" sectionFormat="of" derivedContent="STD13"/>, in its response to a query with an OPCODE that it does not implement (see also <xref target="sec_resp-examples" format="default" sectionFormat="of" derivedContent="Section 4.3.3"/>).</t>
      </section>
      <section anchor="sec_queries" numbered="true" removeInRFC="false" toc="include" pn="section-4.2">
        <name slugifiedName="name-dns-queries-in-coap-request">DNS Queries in CoAP Requests</name>
        <t indent="0" pn="section-4.2-1">A DoC client encodes a single DNS query in one or more CoAP request
messages that use the CoAP FETCH <xref target="RFC8132" format="default" sectionFormat="of" derivedContent="RFC8132"/> request method.
Requests <bcp14>SHOULD</bcp14> include an Accept option to indicate the type of content that can be parsed in the response.</t>
        <t indent="0" pn="section-4.2-2">Since CoAP provides reliability at the message layer (e.g., through Confirmable messages), the retransmission mechanism of the
DNS protocol as defined in <xref target="STD13" format="default" sectionFormat="of" derivedContent="STD13"/> is not needed.</t>
        <section anchor="request-format" numbered="true" removeInRFC="false" toc="include" pn="section-4.2.1">
          <name slugifiedName="name-request-format">Request Format</name>
          <t indent="0" pn="section-4.2.1-1">When sending a CoAP request, a DoC client <bcp14>MUST</bcp14> include the DNS query in the body of the CoAP request.
As specified in <xref section="2.3.1" sectionFormat="of" target="RFC8132" format="default" derivedLink="https://rfc-editor.org/rfc/rfc8132#section-2.3.1" derivedContent="RFC8132"/>, the type of content of the body <bcp14>MUST</bcp14> be indicated using the Content-Format option.
This document specifies the usage of Content-Format "application/dns-message" (for details, see <xref target="sec_content-format" format="default" sectionFormat="of" derivedContent="Section 4.1"/>).</t>
        </section>
        <section anchor="sec_req-caching" numbered="true" removeInRFC="false" toc="include" pn="section-4.2.2">
          <name slugifiedName="name-support-of-coap-caching">Support of CoAP Caching</name>
          <t indent="0" pn="section-4.2.2-1">The DoC client <bcp14>SHOULD</bcp14> set the ID field of the DNS header to 0 to enable a CoAP cache (e.g., a CoAP proxy en route) to respond to the same DNS queries with a cache entry.
This ensures that the CoAP Cache-Key (see <xref section="2" sectionFormat="comma" target="RFC8132" format="default" derivedLink="https://rfc-editor.org/rfc/rfc8132#section-2" derivedContent="RFC8132"/>) does not change when multiple DNS queries for the same DNS data, carried in CoAP requests, are issued.
Apart from losing these caching benefits, there is no harm in not setting it to 0, e.g., when the query was received from somewhere else.
In any instance, a DoC server <bcp14>MUST</bcp14> copy the ID from the query in its response to that query.</t>
        </section>
        <section anchor="sec_req-examples" numbered="true" removeInRFC="false" toc="include" pn="section-4.2.3">
          <name slugifiedName="name-example">Example</name>
          <t indent="0" pn="section-4.2.3-1">The following example illustrates the usage of a CoAP message to
resolve "example.org. IN AAAA" based on the URI "coaps://[2001:db8::1]/". The
CoAP body is encoded in the "application/dns-message" Content-Format.</t>
          <sourcecode markers="false" pn="section-4.2.3-2">
FETCH coaps://[2001:db8::1]/
Content-Format: 553 (application/dns-message)
Accept: 553 (application/dns-message)
Payload (binary):
 00 00 01 00 00 01 00 00 00 00 00 00 07 65 78 61
 6d 70 6c 65 03 6f 72 67 00 00 1c 00 01

Payload (human-readable):
 ;; -&gt;&gt;Header&lt;&lt;- opcode: QUERY, status: NOERROR, id: 0
 ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0

 ;; QUESTION SECTION:
 ;example.org.             IN      AAAA
</sourcecode>
        </section>
      </section>
      <section anchor="dns-responses-in-coap-responses" numbered="true" removeInRFC="false" toc="include" pn="section-4.3">
        <name slugifiedName="name-dns-responses-in-coap-respo">DNS Responses in CoAP Responses</name>
        <t indent="0" pn="section-4.3-1">Each DNS query-response pair is mapped to a CoAP request-response operation.
DNS responses are provided in the body of the CoAP response, i.e., it is also possible to transfer them using block-wise transfer <xref target="RFC7959" format="default" sectionFormat="of" derivedContent="RFC7959"/>.
A DoC server <bcp14>MUST</bcp14> be able to produce responses in the "application/dns-message"
Content-Format (for details, see <xref target="sec_content-format" format="default" sectionFormat="of" derivedContent="Section 4.1"/>) when requested.
The use of the Accept option in the request is <bcp14>OPTIONAL</bcp14>.
However, all DoC clients <bcp14>MUST</bcp14> be able to parse an "application/dns-message" response (see also <xref target="sec_content-format" format="default" sectionFormat="of" derivedContent="Section 4.1"/>).
Any response Content-Format other than "application/dns-message" <bcp14>MUST</bcp14> be indicated with
the Content-Format option by the DoC server.</t>
        <section anchor="sec_resp-codes" numbered="true" removeInRFC="false" toc="include" pn="section-4.3.1">
          <name slugifiedName="name-response-codes-and-handling">Response Codes and Handling DNS and CoAP Errors</name>
          <t indent="0" pn="section-4.3.1-1">A DNS response indicates either success or failure in the RCODE of the DNS header (see <xref target="STD13" format="default" sectionFormat="of" derivedContent="STD13"/>).
It is <bcp14>RECOMMENDED</bcp14> that CoAP responses that carry a parsable DNS response use a 2.05 (Content) response code.</t>
          <t indent="0" pn="section-4.3.1-2">CoAP responses using non-successful response codes <bcp14>MUST NOT</bcp14> contain a DNS response
and <bcp14>MUST</bcp14> only be used for errors in the CoAP layer or when a request does not
fulfill the requirements of the DoC protocol.</t>
          <t indent="0" pn="section-4.3.1-3">Communication errors with an upstream DNS server (e.g., timeouts) <bcp14>MUST</bcp14> be indicated by including a DNS response with the appropriate RCODE in a successful CoAP response, i.e., using a 2.xx response code.
When an error occurs at the CoAP layer, e.g., if an unexpected request method or an unsupported Content-Format in the request are used, the DoC server <bcp14>SHOULD</bcp14> respond with an appropriate CoAP error.</t>
          <t indent="0" pn="section-4.3.1-4">A DoC client might try to repeat a non-successful exchange unless otherwise prohibited.
The DoC client might also decide to repeat a non-successful exchange with a different URI, for instance, when the response indicates an unsupported Content-Format.</t>
        </section>
        <section anchor="sec_resp-caching" numbered="true" removeInRFC="false" toc="include" pn="section-4.3.2">
          <name slugifiedName="name-support-of-coap-caching-2">Support of CoAP Caching</name>
          <t indent="0" pn="section-4.3.2-1">For reliability and energy-saving measures, content decoupling (such as en-route caching on proxies) takes a far greater role than it does in HTTP.
Likewise, CoAP makes it possible to use cache validation to refresh stale cache entries to reduce the number of large response messages.
For cache validation, CoAP implementations regularly use hashing over the message content for ETag generation (see <xref section="5.10.6" sectionFormat="comma" target="RFC7252" format="default" derivedLink="https://rfc-editor.org/rfc/rfc7252#section-5.10.6" derivedContent="RFC7252"/>).
As such, the approach to guarantee the same cache key for DNS responses as proposed in DoH (<xref section="5.1" sectionFormat="comma" target="RFC8484" format="default" derivedLink="https://rfc-editor.org/rfc/rfc8484#section-5.1" derivedContent="RFC8484"/>) is not sufficient and needs to be updated so that the TTLs in the response are more often the same regardless of query time.</t>
          <t indent="0" pn="section-4.3.2-2">The DoC server <bcp14>MUST</bcp14> ensure that the sum of the Max-Age value of a CoAP response and any TTL in the
DNS response is less than or equal to the corresponding TTL received from an upstream DNS server.
This also includes the default Max-Age value of 60 seconds (see <xref section="5.10.5" sectionFormat="of" target="RFC7252" format="default" derivedLink="https://rfc-editor.org/rfc/rfc7252#section-5.10.5" derivedContent="RFC7252"/>) when no Max-Age option is provided.
The DoC client <bcp14>MUST</bcp14> then add the Max-Age value of the carrying CoAP response to all TTLs in a DNS response on reception and use these calculated TTLs for the associated records.</t>
          <t indent="0" pn="section-4.3.2-3">To meet the requirement for DoC, the <bcp14>RECOMMENDED</bcp14> algorithm for a DoC server is as follows:
Set the Max-Age option of a response to the minimum TTL of a DNS response and subtract this value from all TTLs of that DNS response.
This prevents expired records from unintentionally being served from an intermediate CoAP cache.
Additionally, if the ETag for cache validation is based on the content of the response, it allows that ETag not to change.
This then remains the case even if the TTL values are updated by an upstream DNS cache.
If only one record set per DNS response is assumed, a simplification of this algorithm is to just set all TTLs in the response to 0 and set the TTLs at the DoC client to the value of the Max-Age option.</t>
          <t indent="0" pn="section-4.3.2-4">If shorter caching periods are plausible, e.g., if the RCODE of the message indicates an error that should only be cached for a minimal duration, the value for the Max-Age option <bcp14>SHOULD</bcp14> be set accordingly.
This value might be 0, but if the DoC server knows that the error will persist, greater values are also conceivable, depending on the projected duration of the error.
The same applies for DNS responses that, for any reason, do not carry any records with a TTL.</t>
        </section>
        <section anchor="sec_resp-examples" numbered="true" removeInRFC="false" toc="include" pn="section-4.3.3">
          <name slugifiedName="name-examples-2">Examples</name>
          <t indent="0" pn="section-4.3.3-1">The following example illustrates the response to the query "example.org. IN
AAAA record", with recursion turned on. Successful responses carry one answer
record including the address 2001:db8:1:0:1:2:3:4 and TTL 79689.</t>
          <t indent="0" pn="section-4.3.3-2">A successful response:</t>
          <sourcecode markers="false" pn="section-4.3.3-3">
2.05 Content
Content-Format: 553 (application/dns-message)
Max-Age: 58719
Payload (human-readable):
 ;; -&gt;&gt;Header&lt;&lt;- opcode: QUERY, status: NOERROR, id: 0
 ;; flags: qr rd ad; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0

 ;; QUESTION SECTION:
 ;example.org.                 IN      AAAA
 ;; ANSWER SECTION:
 ;example.org.         79689   IN      AAAA    2001:db8:1:0:1:2:3:4
</sourcecode>
          <t indent="0" pn="section-4.3.3-4">When a DNS error - NxDomain (RCODE = 3) for "does.not.exist" in this case - is noted in the DNS response, the CoAP response still indicates success.</t>
          <sourcecode markers="false" pn="section-4.3.3-5">
2.05 Content
Content-Format: 553 (application/dns-message)
Payload (human-readable):
 ;; -&gt;&gt;HEADER&lt;&lt;- opcode: QUERY, status: NXDOMAIN, id: 0
 ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0

 ;; QUESTION SECTION:
 ;does.not.exist.              IN      AAAA
</sourcecode>
          <t indent="0" pn="section-4.3.3-6">As described in <xref target="sec_content-format" format="default" sectionFormat="of" derivedContent="Section 4.1"/>, a DoC server uses NotImp (RCODE = 4) if it does not support an OPCODE - in this case, it errors on a DNS Update (OPCODE = 5) for "example.org".</t>
          <sourcecode markers="false" pn="section-4.3.3-7">
2.05 Content
Content-Format: 553 (application/dns-message)
Payload (human-readable):
 ;; -&gt;&gt;Header&lt;&lt;- opcode: UPDATE, status: NOTIMP, id: 0
 ;; flags: qr ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0

 ;; QUERY SECTION:
 ;example.org.                 IN      AAAA
</sourcecode>
          <t indent="0" pn="section-4.3.3-8">When an error occurs at the CoAP layer, the DoC server responds with
an appropriate CoAP error, for instance, 4.15 (Unsupported Content-Format)
if the Content-Format option in the request was not set to
"application/dns-message" and the Content-Format is not otherwise supported by
the server.</t>
          <sourcecode markers="false" pn="section-4.3.3-9">
4.15 Unsupported Content-Format
[no payload]
</sourcecode>
        </section>
      </section>
    </section>
    <section anchor="interaction-with-other-coap-and-core-features" numbered="true" removeInRFC="false" toc="include" pn="section-5">
      <name slugifiedName="name-interaction-with-other-coap">Interaction with Other CoAP and CoRE Features</name>
      <section anchor="dns-push-notifications-and-coap-observe" numbered="true" removeInRFC="false" toc="include" pn="section-5.1">
        <name slugifiedName="name-dns-push-notifications-and-">DNS Push Notifications and CoAP Observe</name>
        <t indent="0" pn="section-5.1-1">DNS Push Notifications <xref target="RFC8765" format="default" sectionFormat="of" derivedContent="RFC8765"/> provide the capability to asynchronously notify clients about resource record changes.
However, it results in additional overhead, which conflicts with constrained resources.
This is the reason why it is <bcp14>RECOMMENDED</bcp14> to use CoAP Observe <xref target="RFC7641" format="default" sectionFormat="of" derivedContent="RFC7641"/> instead of DNS Push
in the DoC domain.
This is particularly useful if a short-lived record is requested frequently.
The DoC server <bcp14>SHOULD</bcp14> provide Observe capabilities on its DoC resource and do as follows.</t>
        <t indent="0" pn="section-5.1-2">If a DoC client wants to observe a resource record, a DoC server can respond with a notification
and add the client to its list of observers for that resource in accordance with <xref target="RFC7641" format="default" sectionFormat="of" derivedContent="RFC7641"/>.
The DoC server <bcp14>MAY</bcp14> subscribe to DNS Push Notifications for that record.
This involves sending a DNS Subscribe message (see <xref section="6.2" sectionFormat="of" target="RFC8765" format="default" derivedLink="https://rfc-editor.org/rfc/rfc8765#section-6.2" derivedContent="RFC8765"/>),
instead of a classic DNS query to fetch the
information on behalf of the DoC client.</t>
        <t indent="0" pn="section-5.1-3">After the list of observers for a particular DNS query has become empty
(by explicit or implicit cancellation of the observation as per <xref section="3.6" sectionFormat="of" target="RFC7641" format="default" derivedLink="https://rfc-editor.org/rfc/rfc7641#section-3.6" derivedContent="RFC7641"/>),
and no other reason to subscribe to that request is present,
the DoC server <bcp14>SHOULD</bcp14> cancel the corresponding subscription.
This can involve sending a DNS Unsubscribe message or closing the session (see <xref section="6.4" sectionFormat="of" target="RFC8765" format="default" derivedLink="https://rfc-editor.org/rfc/rfc8765#section-6.4" derivedContent="RFC8765"/>).
As there is no CoAP observer anymore from the perspective of the DoC server, a failure to unsubscribe or close the session cannot be communicated back to any DoC observer.
As such, error handling (if any) needs to be resolved between the DoC server and the upstream DNS infrastructure.</t>
        <t indent="0" pn="section-5.1-4">Whenever the DoC server receives a DNS Push message from the DNS
infrastructure for an observed resource record, the DoC server sends an appropriate Observe notification response
to the DoC client.</t>
        <t indent="0" pn="section-5.1-5">A server that responds with notifications (i.e., sends the Observe option) needs to have the means of obtaining current resource records.
This may happen through DNS Push or also by upstream polling or implicit circumstances (e.g., if the DoC server is the authoritative name server for the record and wants to notify about changes).</t>
      </section>
      <section anchor="oscore" numbered="true" removeInRFC="false" toc="include" pn="section-5.2">
        <name slugifiedName="name-oscore">OSCORE</name>
        <t indent="0" pn="section-5.2-1">It is <bcp14>RECOMMENDED</bcp14> to carry DNS messages protected using OSCORE <xref target="RFC8613" format="default" sectionFormat="of" derivedContent="RFC8613"/> between the DoC client
and the DoC server. The establishment and maintenance of the OSCORE security context is out of the
scope of this document.</t>
        <t indent="0" pn="section-5.2-2"><xref target="I-D.ietf-core-cacheable-oscore" format="default" sectionFormat="of" derivedContent="CACHEABLE-OSCORE"/> describes a method to allow cache retrieval of OSCORE responses and discusses
the corresponding implications on message sizes and security properties.</t>
      </section>
      <section anchor="mapping-doc-to-doh" numbered="true" removeInRFC="false" toc="include" pn="section-5.3">
        <name slugifiedName="name-mapping-doc-to-doh">Mapping DoC to DoH</name>
        <t indent="0" pn="section-5.3-1">This document provides no specification on how to map between DoC and DoH, e.g., at a CoAP-to-HTTP proxy. Such a direct mapping is <bcp14>NOT RECOMMENDED</bcp14>:
Rewriting the FETCH method (<xref target="sec_queries" format="default" sectionFormat="of" derivedContent="Section 4.2"/>) and TTL (<xref target="sec_resp-caching" format="default" sectionFormat="of" derivedContent="Section 4.3.2"/>) as
specified in this document would be non-trivial.
It is <bcp14>RECOMMENDED</bcp14> to use a DNS forwarder to map between DoC and DoH, as would be the case for
mapping between any other pair of DNS transports.</t>
      </section>
    </section>
    <section anchor="sec_unprotected-coap" numbered="true" removeInRFC="false" toc="include" pn="section-6">
      <name slugifiedName="name-considerations-for-unprotec">Considerations for Unprotected Use</name>
      <t indent="0" pn="section-6-1">The use of DoC without confidentiality and integrity protection is <bcp14>NOT RECOMMENDED</bcp14>.
Without secure communication, many possible attacks need to be evaluated in the context of
the application's threat model.
This includes known threats for unprotected DNS <xref target="RFC3833" format="default" sectionFormat="of" derivedContent="RFC3833"/> <xref target="RFC9076" format="default" sectionFormat="of" derivedContent="RFC9076"/> and CoAP (<xref section="11" sectionFormat="of" target="RFC7252" format="default" derivedLink="https://rfc-editor.org/rfc/rfc7252#section-11" derivedContent="RFC7252"/>).
While DoC does not use the random ID of the DNS header (see <xref target="sec_req-caching" format="default" sectionFormat="of" derivedContent="Section 4.2.2"/>), equivalent protection against off-path poisoning attacks is achieved by using random large token values for unprotected CoAP requests.
If a DoC message is unprotected, it <bcp14>MUST</bcp14> use a random token with a length of at least 2 bytes to mitigate this kind of poisoning attack.</t>
    </section>
    <section anchor="security-considerations" numbered="true" removeInRFC="false" toc="include" pn="section-7">
      <name slugifiedName="name-security-considerations">Security Considerations</name>
      <t indent="0" pn="section-7-1">General CoAP security considerations (<xref section="11" sectionFormat="comma" target="RFC7252" format="default" derivedLink="https://rfc-editor.org/rfc/rfc7252#section-11" derivedContent="RFC7252"/>) apply to DoC.
DoC also inherits the security considerations of the protocols used for secure communication, e.g., OSCORE (<xref section="12" sectionFormat="comma" target="RFC8613" format="default" derivedLink="https://rfc-editor.org/rfc/rfc8613#section-12" derivedContent="RFC8613"/>) as well as DTLS 1.2 or newer (<xref section="5" sectionFormat="comma" target="RFC6347" format="default" derivedLink="https://rfc-editor.org/rfc/rfc6347#section-5" derivedContent="RFC6347"/> and <xref section="11" sectionFormat="comma" target="RFC9147" format="default" derivedLink="https://rfc-editor.org/rfc/rfc9147#section-11" derivedContent="RFC9147"/>).
Additionally, DoC uses request patterns that require the maintenance of long-lived security
contexts.
<xref section="2.9" sectionFormat="of" target="I-D.ietf-core-corr-clar" format="default" derivedLink="https://datatracker.ietf.org/doc/html/draft-ietf-core-corr-clar-04#section-2.9" derivedContent="CoAP-CORR-CLAR"/> provides insights on what can be done when those are resumed from a new endpoint.</t>
      <t indent="0" pn="section-7-2">Though DTLS v1.2 <xref target="RFC6347" format="default" sectionFormat="of" derivedContent="RFC6347"/> was obsoleted by DTLS v1.3 <xref target="RFC9147" format="default" sectionFormat="of" derivedContent="RFC9147"/>, there are many CoAP
implementations that still use v1.2 at the time of writing.
As such, this document also accounts for the usage of DTLS v1.2 even though newer versions are
<bcp14>RECOMMENDED</bcp14> when using DTLS to secure CoAP.</t>
      <t indent="0" pn="section-7-3">When using unprotected CoAP (see <xref target="sec_unprotected-coap" format="default" sectionFormat="of" derivedContent="Section 6"/>), setting the ID of a DNS message to 0 as
specified in <xref target="sec_req-caching" format="default" sectionFormat="of" derivedContent="Section 4.2.2"/> opens the DNS cache of a DoC client to cache poisoning attacks
via response spoofing.
This document requires an unpredictable CoAP token in each DoC query from the client when CoAP is
not secured to mitigate such an attack over DoC (see <xref target="sec_unprotected-coap" format="default" sectionFormat="of" derivedContent="Section 6"/>).</t>
      <t indent="0" pn="section-7-4">For secure communication via (D)TLS or OSCORE, an unpredictable ID to protect against spoofing is not necessary.
Both (D)TLS and OSCORE offer mechanisms to harden against injecting spoofed responses in their protocol design.
Consequently, the ID of the DNS message can be set to 0 without any concern in order to leverage the advantages of CoAP caching.</t>
      <t indent="0" pn="section-7-5">A DoC client must be aware that the DoC server
may communicate unprotected with the upstream DNS infrastructure, e.g., using DNS over UDP.
DoC can only guarantee confidentiality and integrity of communication between parties for which the
security context is exchanged.
The DoC server may use another security context to communicate upstream with both confidentiality and integrity
(e.g., DNS over QUIC <xref target="RFC9250" format="default" sectionFormat="of" derivedContent="RFC9250"/>); however, while recommended, this is opaque to the DoC client on the protocol level.
Record integrity can also be ensured upstream using DNSSEC <xref target="BCP237" format="default" sectionFormat="of" derivedContent="BCP237"/>.</t>
      <t indent="0" pn="section-7-6">A DoC client may not be able to perform DNSSEC validation,
e.g., due to code size constraints or the size of the responses.
It may trust its DoC server to perform DNSSEC validation;
how that trust is expressed is out of the scope of this document.
For instance, a DoC client may be configured to use a particular credential by which it recognizes an eligible DoC server.
That information can also imply trust in the DNSSEC validation by that DoC server.</t>
    </section>
    <section anchor="iana-considerations" numbered="true" removeInRFC="false" toc="include" pn="section-8">
      <name slugifiedName="name-iana-considerations">IANA Considerations</name>
      <section anchor="coap-content-formats-registry" numbered="true" removeInRFC="false" toc="include" pn="section-8.1">
        <name slugifiedName="name-coap-content-formats-regist">CoAP Content-Formats Registry</name>
        <t indent="0" pn="section-8.1-1">IANA has assigned a CoAP Content-Format ID for the "application/dns-message" media
type in the "CoAP Content-Formats" registry in the "Constrained RESTful Environments (CoRE) Parameters"
registry group <xref target="RFC7252" format="default" sectionFormat="of" derivedContent="RFC7252"/>; this corresponds to the "application/dns-message" media
type from the "Media Types" registry (see <xref target="RFC8484" format="default" sectionFormat="of" derivedContent="RFC8484"/>).</t>
        <table anchor="tab-coap-content-format" align="center" pn="table-1">
          <name slugifiedName="name-coap-content-format-id">CoAP Content-Format ID</name>
          <thead>
            <tr>
              <th align="left" colspan="1" rowspan="1">Content Type</th>
              <th align="left" colspan="1" rowspan="1">ID</th>
              <th align="left" colspan="1" rowspan="1">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left" colspan="1" rowspan="1">application/dns-message</td>
              <td align="left" colspan="1" rowspan="1">553</td>
              <td align="left" colspan="1" rowspan="1">
                <xref target="RFC8484" format="default" sectionFormat="of" derivedContent="RFC8484"/> and RFC 9953, <xref target="sec_content-format" format="default" sectionFormat="of" derivedContent="Section 4.1"/></td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="dns-svbc-service-parameter-keys-svcparamkeys-registry" numbered="true" removeInRFC="false" toc="include" pn="section-8.2">
        <name slugifiedName="name-dns-svbc-service-parameter-">DNS SVBC Service Parameter Keys (SvcParamKeys) Registry</name>
        <t indent="0" pn="section-8.2-1">IANA has added the following entry to the "DNS SVCB Service Parameter Keys (SvcParamKeys)" registry in the "DNS Service Bindings (SVCB)" registry group.
The definition of this parameter can be found in <xref target="sec_doc-server-selection" format="default" sectionFormat="of" derivedContent="Section 3"/>.</t>
        <table anchor="tab-svc-param-keys" align="center" pn="table-2">
          <name slugifiedName="name-value-for-svcparamkeys">Value for SvcParamKeys</name>
          <thead>
            <tr>
              <th align="left" colspan="1" rowspan="1">Number</th>
              <th align="left" colspan="1" rowspan="1">Name</th>
              <th align="left" colspan="1" rowspan="1">Meaning</th>
              <th align="left" colspan="1" rowspan="1">Change Controller</th>
              <th align="left" colspan="1" rowspan="1">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left" colspan="1" rowspan="1">10</td>
              <td align="left" colspan="1" rowspan="1">docpath</td>
              <td align="left" colspan="1" rowspan="1">DNS over CoAP resource path</td>
              <td align="left" colspan="1" rowspan="1">IETF</td>
              <td align="left" colspan="1" rowspan="1">RFC 9953, <xref target="sec_doc-server-selection" format="default" sectionFormat="of" derivedContent="Section 3"/></td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="resource-type-rt-link-target-attribute-values-registry" numbered="true" removeInRFC="false" toc="include" pn="section-8.3">
        <name slugifiedName="name-resource-type-rt-link-targe">Resource Type (rt=) Link Target Attribute Values Registry</name>
        <t indent="0" pn="section-8.3-1">IANA has added "core.dns" to the "Resource Type (rt=) Link Target Attribute Values" registry in the "Constrained RESTful Environments (CoRE) Parameters" registry group.</t>
        <table anchor="tab-resource-type" align="center" pn="table-3">
          <name slugifiedName="name-resource-type-rt-link-target">Resource Type (rt=) Link Target Attribute</name>
          <thead>
            <tr>
              <th align="left" colspan="1" rowspan="1">Value</th>
              <th align="left" colspan="1" rowspan="1">Description</th>
              <th align="left" colspan="1" rowspan="1">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left" colspan="1" rowspan="1">core.dns</td>
              <td align="left" colspan="1" rowspan="1">DNS over CoAP resource</td>
              <td align="left" colspan="1" rowspan="1">RFC 9953, <xref target="sec_doc-server-selection" format="default" sectionFormat="of" derivedContent="Section 3"/></td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
    <section anchor="operational-considerations" numbered="true" removeInRFC="false" toc="include" pn="section-9">
      <name slugifiedName="name-operational-considerations">Operational Considerations</name>
      <section anchor="coexistence-of-different-dns-and-coap-transports" numbered="true" removeInRFC="false" toc="include" pn="section-9.1">
        <name slugifiedName="name-coexistence-of-different-dn">Coexistence of Different DNS and CoAP Transports</name>
        <t indent="0" pn="section-9.1-1">Many DNS transports may coexist on the DoC server, such as DNS over UDP <xref target="STD13" format="default" sectionFormat="of" derivedContent="STD13"/>, DNS over (D)TLS <xref target="RFC7858" format="default" sectionFormat="of" derivedContent="RFC7858"/> <xref target="RFC8094" format="default" sectionFormat="of" derivedContent="RFC8094"/>, DNS over HTTPS <xref target="RFC8484" format="default" sectionFormat="of" derivedContent="RFC8484"/>, or DNS over QUIC <xref target="RFC9250" format="default" sectionFormat="of" derivedContent="RFC9250"/>.
In principle, transports employing channel or object security should be preferred.
In constrained scenarios, DNS over CoAP is preferable to DNS over DTLS.
The final decision regarding the preference, however, heavily depends on the use case and is therefore left to the implementers or users and is not defined in this document.</t>
        <t indent="0" pn="section-9.1-2">CoAP supports Confirmable and Non-Confirmable messages <xref target="RFC7252" format="default" sectionFormat="of" derivedContent="RFC7252"/> to deploy different levels of reliability.
However, this document does not enforce any of these message types, as the decision on which one is appropriate depends on the characteristics of the network where DoC is deployed.</t>
      </section>
      <section anchor="redirects" numbered="true" removeInRFC="false" toc="include" pn="section-9.2">
        <name slugifiedName="name-redirects">Redirects</name>
        <t indent="0" pn="section-9.2-1">Application-layer redirects (e.g., HTTP) redirect a client to a new server.
In the case of DoC, this leads to a new DNS server.
This new DNS server may provide different answers to the same DNS query than the previous DNS server.
At the time of writing, CoAP does not support redirection.
Future specifications of CoAP redirect may need to consider the impact of different results between previous and new DNS servers.</t>
      </section>
      <section anchor="proxy-hop-limit" numbered="true" removeInRFC="false" toc="include" pn="section-9.3">
        <name slugifiedName="name-proxy-hop-limit">Proxy Hop Limit</name>
        <t indent="0" pn="section-9.3-1">Mistakes might lead to CoAP proxies forming infinite loops.
Using the CoAP Hop-Limit option <xref target="RFC8768" format="default" sectionFormat="of" derivedContent="RFC8768"/> mitigates such loops.</t>
      </section>
      <section anchor="error-handling" numbered="true" removeInRFC="false" toc="include" pn="section-9.4">
        <name slugifiedName="name-error-handling">Error Handling</name>
        <t indent="0" pn="section-9.4-1"><xref target="sec_resp-codes" format="default" sectionFormat="of" derivedContent="Section 4.3.1"/> specifies that DNS operational errors should be reported back to a DoC client
using the appropriate DNS RCODE.
If a DoC client did not receive any successful DNS messages from a DoC server for a while, it might
indicate that the DoC server lost connectivity to the upstream DNS infrastructure.
The DoC client should handle this error case like a recursive resolver that lost connectivity to the upstream DNS infrastructure.
In case of CoAP errors, the usual mechanisms for CoAP response codes apply.</t>
      </section>
      <section anchor="dns-extensions" numbered="true" removeInRFC="false" toc="include" pn="section-9.5">
        <name slugifiedName="name-dns-extensions">DNS Extensions</name>
        <t indent="0" pn="section-9.5-1">DNS extensions that are specific to the choice of transport, such as described in <xref target="RFC7828" format="default" sectionFormat="of" derivedContent="RFC7828"/>, are not applicable to DoC.</t>
      </section>
    </section>
  </middle>
  <back>
    <displayreference target="I-D.ietf-core-href" to="CRI"/>
    <displayreference target="I-D.ietf-core-transport-indication" to="TRANSPORT-IND"/>
    <displayreference target="I-D.ietf-iotops-7228bis" to="RFC7228bis"/>
    <displayreference target="I-D.ietf-core-cacheable-oscore" to="CACHEABLE-OSCORE"/>
    <displayreference target="I-D.ietf-core-corr-clar" to="CoAP-CORR-CLAR"/>
    <references anchor="sec-combined-references" pn="section-10">
      <name slugifiedName="name-references">References</name>
      <references anchor="sec-normative-references" pn="section-10.1">
        <name slugifiedName="name-normative-references">Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" quoteTitle="true" derivedAnchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t indent="0">In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC3986" target="https://www.rfc-editor.org/info/rfc3986" quoteTitle="true" derivedAnchor="RFC3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t indent="0">A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC5234" target="https://www.rfc-editor.org/info/rfc5234" quoteTitle="true" derivedAnchor="RFC5234">
          <front>
            <title>Augmented BNF for Syntax Specifications: ABNF</title>
            <author fullname="D. Crocker" initials="D." role="editor" surname="Crocker"/>
            <author fullname="P. Overell" initials="P." surname="Overell"/>
            <date month="January" year="2008"/>
            <abstract>
              <t indent="0">Internet technical specifications often need to define a formal syntax. Over the years, a modified version of Backus-Naur Form (BNF), called Augmented BNF (ABNF), has been popular among many Internet specifications. The current specification documents ABNF. It balances compactness and simplicity with reasonable representational power. The differences between standard BNF and ABNF involve naming rules, repetition, alternatives, order-independence, and value ranges. This specification also supplies additional rule definitions and encoding for a core lexical analyzer of the type common to several Internet specifications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="68"/>
          <seriesInfo name="RFC" value="5234"/>
          <seriesInfo name="DOI" value="10.17487/RFC5234"/>
        </reference>
        <reference anchor="RFC6347" target="https://www.rfc-editor.org/info/rfc6347" quoteTitle="true" derivedAnchor="RFC6347">
          <front>
            <title>Datagram Transport Layer Security Version 1.2</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="January" year="2012"/>
            <abstract>
              <t indent="0">This document specifies version 1.2 of the Datagram Transport Layer Security (DTLS) protocol. The DTLS protocol provides communications privacy for datagram protocols. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. The DTLS protocol is based on the Transport Layer Security (TLS) protocol and provides equivalent security guarantees. Datagram semantics of the underlying transport are preserved by the DTLS protocol. This document updates DTLS 1.0 to work with TLS version 1.2. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6347"/>
          <seriesInfo name="DOI" value="10.17487/RFC6347"/>
        </reference>
        <reference anchor="RFC7252" target="https://www.rfc-editor.org/info/rfc7252" quoteTitle="true" derivedAnchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t indent="0">The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t indent="0">CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC7641" target="https://www.rfc-editor.org/info/rfc7641" quoteTitle="true" derivedAnchor="RFC7641">
          <front>
            <title>Observing Resources in the Constrained Application Protocol (CoAP)</title>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <date month="September" year="2015"/>
            <abstract>
              <t indent="0">The Constrained Application Protocol (CoAP) is a RESTful application protocol for constrained nodes and networks. The state of a resource on a CoAP server can change over time. This document specifies a simple protocol extension for CoAP that enables CoAP clients to "observe" resources, i.e., to retrieve a representation of a resource and keep this representation updated by the server over a period of time. The protocol follows a best-effort approach for sending new representations to clients and provides eventual consistency between the state observed by each client and the actual resource state at the server.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7641"/>
          <seriesInfo name="DOI" value="10.17487/RFC7641"/>
        </reference>
        <reference anchor="RFC7959" target="https://www.rfc-editor.org/info/rfc7959" quoteTitle="true" derivedAnchor="RFC7959">
          <front>
            <title>Block-Wise Transfers in the Constrained Application Protocol (CoAP)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="Z. Shelby" initials="Z." role="editor" surname="Shelby"/>
            <date month="August" year="2016"/>
            <abstract>
              <t indent="0">The Constrained Application Protocol (CoAP) is a RESTful transfer protocol for constrained nodes and networks. Basic CoAP messages work well for small payloads from sensors and actuators; however, applications will need to transfer larger payloads occasionally -- for instance, for firmware updates. In contrast to HTTP, where TCP does the grunt work of segmenting and resequencing, CoAP is based on datagram transports such as UDP or Datagram Transport Layer Security (DTLS). These transports only offer fragmentation, which is even more problematic in constrained nodes and networks, limiting the maximum size of resource representations that can practically be transferred.</t>
              <t indent="0">Instead of relying on IP fragmentation, this specification extends basic CoAP with a pair of "Block" options for transferring multiple blocks of information from a resource representation in multiple request-response pairs. In many important cases, the Block options enable a server to be truly stateless: the server can handle each block transfer separately, with no need for a connection setup or other server-side memory of previous block transfers. Essentially, the Block options provide a minimal way to transfer larger representations in a block-wise fashion.</t>
              <t indent="0">A CoAP implementation that does not support these options generally is limited in the size of the representations that can be exchanged, so there is an expectation that the Block options will be widely used in CoAP implementations. Therefore, this specification updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7959"/>
          <seriesInfo name="DOI" value="10.17487/RFC7959"/>
        </reference>
        <reference anchor="RFC8132" target="https://www.rfc-editor.org/info/rfc8132" quoteTitle="true" derivedAnchor="RFC8132">
          <front>
            <title>PATCH and FETCH Methods for the Constrained Application Protocol (CoAP)</title>
            <author fullname="P. van der Stok" initials="P." surname="van der Stok"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="A. Sehgal" initials="A." surname="Sehgal"/>
            <date month="April" year="2017"/>
            <abstract>
              <t indent="0">The methods defined in RFC 7252 for the Constrained Application Protocol (CoAP) only allow access to a complete resource, not to parts of a resource. In case of resources with larger or complex data, or in situations where resource continuity is required, replacing or requesting the whole resource is undesirable. Several applications using CoAP need to access parts of the resources.</t>
              <t indent="0">This specification defines the new CoAP methods, FETCH, PATCH, and iPATCH, which are used to access and update parts of a resource.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8132"/>
          <seriesInfo name="DOI" value="10.17487/RFC8132"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" quoteTitle="true" derivedAnchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t indent="0">RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8323" target="https://www.rfc-editor.org/info/rfc8323" quoteTitle="true" derivedAnchor="RFC8323">
          <front>
            <title>CoAP (Constrained Application Protocol) over TCP, TLS, and WebSockets</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="S. Lemay" initials="S." surname="Lemay"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="B. Silverajan" initials="B." surname="Silverajan"/>
            <author fullname="B. Raymor" initials="B." role="editor" surname="Raymor"/>
            <date month="February" year="2018"/>
            <abstract>
              <t indent="0">The Constrained Application Protocol (CoAP), although inspired by HTTP, was designed to use UDP instead of TCP. The message layer of CoAP over UDP includes support for reliable delivery, simple congestion control, and flow control.</t>
              <t indent="0">Some environments benefit from the availability of CoAP carried over reliable transports such as TCP or Transport Layer Security (TLS). This document outlines the changes required to use CoAP over TCP, TLS, and WebSockets transports. It also formally updates RFC 7641 for use with these transports and RFC 7959 to enable the use of larger messages over a reliable transport.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8323"/>
          <seriesInfo name="DOI" value="10.17487/RFC8323"/>
        </reference>
        <reference anchor="RFC8484" target="https://www.rfc-editor.org/info/rfc8484" quoteTitle="true" derivedAnchor="RFC8484">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <date month="October" year="2018"/>
            <abstract>
              <t indent="0">This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="RFC8613" target="https://www.rfc-editor.org/info/rfc8613" quoteTitle="true" derivedAnchor="RFC8613">
          <front>
            <title>Object Security for Constrained RESTful Environments (OSCORE)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Mattsson" initials="J." surname="Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <date month="July" year="2019"/>
            <abstract>
              <t indent="0">This document defines Object Security for Constrained RESTful Environments (OSCORE), a method for application-layer protection of the Constrained Application Protocol (CoAP), using CBOR Object Signing and Encryption (COSE). OSCORE provides end-to-end protection between endpoints communicating using CoAP or CoAP-mappable HTTP. OSCORE is designed for constrained nodes and networks supporting a range of proxy operations, including translation between different transport protocols.</t>
              <t indent="0">Although an optional functionality of CoAP, OSCORE alters CoAP options processing and IANA registration. Therefore, this document updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8613"/>
          <seriesInfo name="DOI" value="10.17487/RFC8613"/>
        </reference>
        <reference anchor="RFC8765" target="https://www.rfc-editor.org/info/rfc8765" quoteTitle="true" derivedAnchor="RFC8765">
          <front>
            <title>DNS Push Notifications</title>
            <author fullname="T. Pusateri" initials="T." surname="Pusateri"/>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <date month="June" year="2020"/>
            <abstract>
              <t indent="0">The Domain Name System (DNS) was designed to return matching records efficiently for queries for data that are relatively static. When those records change frequently, DNS is still efficient at returning the updated results when polled, as long as the polling rate is not too high. But, there exists no mechanism for a client to be asynchronously notified when these changes occur. This document defines a mechanism for a client to be notified of such changes to DNS records, called DNS Push Notifications.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8765"/>
          <seriesInfo name="DOI" value="10.17487/RFC8765"/>
        </reference>
        <reference anchor="RFC8768" target="https://www.rfc-editor.org/info/rfc8768" quoteTitle="true" derivedAnchor="RFC8768">
          <front>
            <title>Constrained Application Protocol (CoAP) Hop-Limit Option</title>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="T. Reddy.K" initials="T." surname="Reddy.K"/>
            <author fullname="J. Shallow" initials="J." surname="Shallow"/>
            <date month="March" year="2020"/>
            <abstract>
              <t indent="0">The presence of Constrained Application Protocol (CoAP) proxies may lead to infinite forwarding loops, which is undesirable. To prevent and detect such loops, this document specifies the Hop-Limit CoAP option.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8768"/>
          <seriesInfo name="DOI" value="10.17487/RFC8768"/>
        </reference>
        <reference anchor="RFC8949" target="https://www.rfc-editor.org/info/rfc8949" quoteTitle="true" derivedAnchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t indent="0">The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t indent="0">This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC9147" target="https://www.rfc-editor.org/info/rfc9147" quoteTitle="true" derivedAnchor="RFC9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t indent="0">This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t indent="0">The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t indent="0">This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC9460" target="https://www.rfc-editor.org/info/rfc9460" quoteTitle="true" derivedAnchor="RFC9460">
          <front>
            <title>Service Binding and Parameter Specification via the DNS (SVCB and HTTPS Resource Records)</title>
            <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
            <author fullname="M. Bishop" initials="M." surname="Bishop"/>
            <author fullname="E. Nygren" initials="E." surname="Nygren"/>
            <date month="November" year="2023"/>
            <abstract>
              <t indent="0">This document specifies the "SVCB" ("Service Binding") and "HTTPS" DNS resource record (RR) types to facilitate the lookup of information needed to make connections to network services, such as for HTTP origins. SVCB records allow a service to be provided from multiple alternative endpoints, each with associated parameters (such as transport protocol configuration), and are extensible to support future uses (such as keys for encrypting the TLS ClientHello). They also enable aliasing of apex domains, which is not possible with CNAME. The HTTPS RR is a variation of SVCB for use with HTTP (see RFC 9110, "HTTP Semantics"). By providing more information to the client before it attempts to establish a connection, these records offer potential benefits to both performance and privacy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9460"/>
          <seriesInfo name="DOI" value="10.17487/RFC9460"/>
        </reference>
        <reference anchor="RFC9461" target="https://www.rfc-editor.org/info/rfc9461" quoteTitle="true" derivedAnchor="RFC9461">
          <front>
            <title>Service Binding Mapping for DNS Servers</title>
            <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
            <date month="November" year="2023"/>
            <abstract>
              <t indent="0">The SVCB DNS resource record type expresses a bound collection of endpoint metadata, for use when establishing a connection to a named service. DNS itself can be such a service, when the server is identified by a domain name. This document provides the SVCB mapping for named DNS servers, allowing them to indicate support for encrypted transport protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9461"/>
          <seriesInfo name="DOI" value="10.17487/RFC9461"/>
        </reference>
        <reference anchor="RFC9462" target="https://www.rfc-editor.org/info/rfc9462" quoteTitle="true" derivedAnchor="RFC9462">
          <front>
            <title>Discovery of Designated Resolvers</title>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="E. Kinnear" initials="E." surname="Kinnear"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <author fullname="T. Jensen" initials="T." surname="Jensen"/>
            <date month="November" year="2023"/>
            <abstract>
              <t indent="0">This document defines Discovery of Designated Resolvers (DDR), a set of mechanisms for DNS clients to use DNS records to discover a resolver's encrypted DNS configuration. An Encrypted DNS Resolver discovered in this manner is referred to as a "Designated Resolver". These mechanisms can be used to move from unencrypted DNS to encrypted DNS when only the IP address of a resolver is known. These mechanisms are designed to be limited to cases where Unencrypted DNS Resolvers and their Designated Resolvers are operated by the same entity or cooperating entities. It can also be used to discover support for encrypted DNS protocols when the name of an Encrypted DNS Resolver is known.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9462"/>
          <seriesInfo name="DOI" value="10.17487/RFC9462"/>
        </reference>
        <reference anchor="RFC9463" target="https://www.rfc-editor.org/info/rfc9463" quoteTitle="true" derivedAnchor="RFC9463">
          <front>
            <title>DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers (DNR)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="T. Reddy.K" initials="T." role="editor" surname="Reddy.K"/>
            <author fullname="D. Wing" initials="D." surname="Wing"/>
            <author fullname="N. Cook" initials="N." surname="Cook"/>
            <author fullname="T. Jensen" initials="T." surname="Jensen"/>
            <date month="November" year="2023"/>
            <abstract>
              <t indent="0">This document specifies new DHCP and IPv6 Router Advertisement options to discover encrypted DNS resolvers (e.g., DNS over HTTPS, DNS over TLS, and DNS over QUIC). Particularly, it allows a host to learn an Authentication Domain Name together with a list of IP addresses and a set of service parameters to reach such encrypted DNS resolvers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9463"/>
          <seriesInfo name="DOI" value="10.17487/RFC9463"/>
        </reference>
        <reference anchor="RFC9952" target="https://www.rfc-editor.org/info/rfc9952" quoteTitle="true" derivedAnchor="RFC9952">
          <front>
            <title>Application-Layer Protocol Negotiation (ALPN) ID for CoAP over DTLS</title>
            <author initials="M. S." surname="Lenders" fullname="Martine Sophie Lenders">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="C." surname="Amsüss" fullname="Christian Amsüss">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="T. C." surname="Schmidt" fullname="Thomas C. Schmidt">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="M." surname="Wählisch" fullname="Matthias Wählisch">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2026" month="March"/>
          </front>
          <seriesInfo name="RFC" value="9952"/>
          <seriesInfo name="DOI" value="10.17487/RFC9952"/>
        </reference>
        <referencegroup anchor="STD13" target="https://www.rfc-editor.org/info/std13" derivedAnchor="STD13">
          <reference anchor="RFC1034" target="https://www.rfc-editor.org/info/rfc1034" quoteTitle="true">
            <front>
              <title>Domain names - concepts and facilities</title>
              <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
              <date month="November" year="1987"/>
              <abstract>
                <t indent="0">This RFC is the revised basic definition of The Domain Name System. It obsoletes RFC-882. This memo describes the domain style names and their used for host address look up and electronic mail forwarding. It discusses the clients and servers in the domain name system and the protocol used between them.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="13"/>
            <seriesInfo name="RFC" value="1034"/>
            <seriesInfo name="DOI" value="10.17487/RFC1034"/>
          </reference>
          <reference anchor="RFC1035" target="https://www.rfc-editor.org/info/rfc1035" quoteTitle="true">
            <front>
              <title>Domain names - implementation and specification</title>
              <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
              <date month="November" year="1987"/>
              <abstract>
                <t indent="0">This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="13"/>
            <seriesInfo name="RFC" value="1035"/>
            <seriesInfo name="DOI" value="10.17487/RFC1035"/>
          </reference>
        </referencegroup>
      </references>
      <references anchor="sec-informative-references" pn="section-10.2">
        <name slugifiedName="name-informative-references">Informative References</name>
        <referencegroup anchor="BCP219" target="https://www.rfc-editor.org/info/bcp219" derivedAnchor="BCP219">
          <reference anchor="RFC9499" target="https://www.rfc-editor.org/info/rfc9499" quoteTitle="true">
            <front>
              <title>DNS Terminology</title>
              <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
              <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
              <date month="March" year="2024"/>
              <abstract>
                <t indent="0">The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
                <t indent="0">This document updates RFC 2308 by clarifying the definitions of "forwarder" and "QNAME". It obsoletes RFC 8499 by adding multiple terms and clarifications. Comprehensive lists of changed and new definitions can be found in Appendices A and B.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="219"/>
            <seriesInfo name="RFC" value="9499"/>
            <seriesInfo name="DOI" value="10.17487/RFC9499"/>
          </reference>
        </referencegroup>
        <referencegroup anchor="BCP237" target="https://www.rfc-editor.org/info/bcp237" derivedAnchor="BCP237">
          <reference anchor="RFC9364" target="https://www.rfc-editor.org/info/rfc9364" quoteTitle="true">
            <front>
              <title>DNS Security Extensions (DNSSEC)</title>
              <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
              <date month="February" year="2023"/>
              <abstract>
                <t indent="0">This document describes the DNS Security Extensions (commonly called "DNSSEC") that are specified in RFCs 4033, 4034, and 4035, as well as a handful of others. One purpose is to introduce all of the RFCs in one place so that the reader can understand the many aspects of DNSSEC. This document does not update any of those RFCs. A second purpose is to state that using DNSSEC for origin authentication of DNS data is the best current practice. A third purpose is to provide a single reference for other documents that want to refer to DNSSEC.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="237"/>
            <seriesInfo name="RFC" value="9364"/>
            <seriesInfo name="DOI" value="10.17487/RFC9364"/>
          </reference>
        </referencegroup>
        <reference anchor="I-D.ietf-core-cacheable-oscore" target="https://datatracker.ietf.org/doc/html/draft-ietf-core-cacheable-oscore-01" quoteTitle="true" derivedAnchor="CACHEABLE-OSCORE">
          <front>
            <title>End-to-End Protected and Cacheable Responses for the Constrained Application Protocol (CoAP) using Group Object Security for Constrained RESTful Environments (Group OSCORE)</title>
            <author fullname="Christian Amsüss" initials="C." surname="Amsüss"/>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization showOnFrontPage="true">RISE AB</organization>
            </author>
            <date day="2" month="March" year="2026"/>
            <abstract>
              <t indent="0">When using the Constrained Application Protocol (CoAP), exchanged messages can be protected end-to-end also across untrusted intermediary proxies. This can be achieved with Object Security for Constrained RESTful Environments (OSCORE) or, in the case of group communication, with Group Object Security for Constrained RESTful Environments (Group OSCORE). However, this sidesteps the proxies' abilities to cache responses from the origin server(s). This document restores cacheability of end-end protected responses at proxies, by using Group OSCORE and introducing consensus requests, which any client in an OSCORE group can send to one server or multiple servers in the same group.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-cacheable-oscore-01"/>
          <refcontent>Work in Progress</refcontent>
        </reference>
        <reference anchor="I-D.ietf-core-corr-clar" target="https://datatracker.ietf.org/doc/html/draft-ietf-core-corr-clar-04" quoteTitle="true" derivedAnchor="CoAP-CORR-CLAR">
          <front>
            <title>Constrained Application Protocol (CoAP): Corrections and Clarifications</title>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization showOnFrontPage="true">Universität Bremen TZI</organization>
            </author>
            <date day="19" month="March" year="2026"/>
            <abstract>
              <t indent="0">RFC 7252 defines the Constrained Application Protocol (CoAP), along with a number of additional specifications, including RFC 7641, RFC 7959, RFC 8132, and RFC 8323. RFC 6690 defines the link format that is used in CoAP self-description documents. Some parts of the specification may be unclear or even contain errors that may lead to misinterpretations that may impair interoperability between different implementations. The present document provides corrections, additions, and clarifications to the RFCs cited; this document thus updates these RFCs. In addition, other clarifications related to the use of CoAP in other specifications, including RFC 7390 and RFC 8075, are also provided.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-corr-clar-04"/>
          <refcontent>Work in Progress</refcontent>
        </reference>
        <reference anchor="I-D.ietf-core-href" target="https://datatracker.ietf.org/doc/html/draft-ietf-core-href-30" quoteTitle="true" derivedAnchor="CRI">
          <front>
            <title>Constrained Resource Identifiers</title>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization showOnFrontPage="true">Universität Bremen TZI</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization showOnFrontPage="true">Fraunhofer SIT</organization>
            </author>
            <date day="21" month="November" year="2025"/>
            <abstract>
              <t indent="0">The Constrained Resource Identifier (CRI) is a complement to the Uniform Resource Identifier (URI) that represents the URI components in Concise Binary Object Representation (CBOR) rather than as a sequence of characters. This approach simplifies parsing, comparison, and reference resolution in environments with severe limitations on processing power, code size, and memory size. This RFC updates RFC 7595 by adding a column on the "URI Schemes" registry. // (This "cref" paragraph will be removed by the RFC editor:) After // approval of -28 and nit fixes in -29, the present revision -30 // contains two more small fixes for nits that were uncovered in the // RPC intake process.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-href-30"/>
          <refcontent>Work in Progress</refcontent>
        </reference>
        <reference anchor="DoC-paper" quoteTitle="true" target="https://doi.org/10.1145/3609423" derivedAnchor="DoC-paper">
          <front>
            <title>Securing Name Resolution in the IoT: DNS over CoAP</title>
            <author initials="M. S." surname="Lenders" fullname="Martine S. Lenders">
              <organization showOnFrontPage="true">TU Dresden, Germany</organization>
            </author>
            <author initials="C." surname="Amsüss" fullname="Christian Amsüss">
              <organization showOnFrontPage="true">Unaffiliated, Vienna, Austria</organization>
            </author>
            <author initials="C." surname="Gündogan" fullname="Cenk Gündogan">
              <organization showOnFrontPage="true">Huawei Technologies, Munich, Germany</organization>
            </author>
            <author initials="M." surname="Nawrocki" fullname="Marcin Nawrocki">
              <organization showOnFrontPage="true">TU Dresden, Germany</organization>
            </author>
            <author initials="T." surname="Schmidt" fullname="Thomas C. Schmidt">
              <organization showOnFrontPage="true">HAW Hamburg, Hamburg, Germany</organization>
            </author>
            <author initials="M." surname="Wählisch" fullname="Matthias Wählisch">
              <organization showOnFrontPage="true">TU Dresden &amp;amp; Barkhausen Institut, Dresden, Germany</organization>
            </author>
            <date year="2023" month="September"/>
          </front>
          <seriesInfo name="DOI" value="10.1145/3609423"/>
          <refcontent>Proceedings of the ACM on Networking, vol. 1, no. CoNEXT2, pp. 1-25</refcontent>
        </reference>
        <reference anchor="REST" target="https://www.ics.uci.edu/~fielding/pubs/dissertation/fielding_dissertation.pdf" quoteTitle="true" derivedAnchor="REST">
          <front>
            <title>Architectural Styles and the Design of Network-based Software Architectures</title>
            <author initials="R." surname="Fielding" fullname="Roy Thomas Fielding">
              <organization showOnFrontPage="true">University of California, Irvine</organization>
            </author>
            <date year="2000"/>
          </front>
          <format type="HTML" target="https://ics.uci.edu/~fielding/pubs/dissertation/top.htm"/>
          <refcontent>Ph.D. Dissertation, University of California, Irvine</refcontent>
        </reference>
        <reference anchor="RFC3833" target="https://www.rfc-editor.org/info/rfc3833" quoteTitle="true" derivedAnchor="RFC3833">
          <front>
            <title>Threat Analysis of the Domain Name System (DNS)</title>
            <author fullname="D. Atkins" initials="D." surname="Atkins"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <date month="August" year="2004"/>
            <abstract>
              <t indent="0">Although the DNS Security Extensions (DNSSEC) have been under development for most of the last decade, the IETF has never written down the specific set of threats against which DNSSEC is designed to protect. Among other drawbacks, this cart-before-the-horse situation has made it difficult to determine whether DNSSEC meets its design goals, since its design goals are not well specified. This note attempts to document some of the known threats to the DNS, and, in doing so, attempts to measure to what extent (if any) DNSSEC is a useful tool in defending against these threats. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3833"/>
          <seriesInfo name="DOI" value="10.17487/RFC3833"/>
        </reference>
        <reference anchor="RFC6690" target="https://www.rfc-editor.org/info/rfc6690" quoteTitle="true" derivedAnchor="RFC6690">
          <front>
            <title>Constrained RESTful Environments (CoRE) Link Format</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <date month="August" year="2012"/>
            <abstract>
              <t indent="0">This specification defines Web Linking using a link format for use by constrained web servers to describe hosted resources, their attributes, and other relationships between links. Based on the HTTP Link Header field defined in RFC 5988, the Constrained RESTful Environments (CoRE) Link Format is carried as a payload and is assigned an Internet media type. "RESTful" refers to the Representational State Transfer (REST) architecture. A well-known URI is defined as a default entry point for requesting the links hosted by a server. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6690"/>
          <seriesInfo name="DOI" value="10.17487/RFC6690"/>
        </reference>
        <reference anchor="RFC7228" target="https://www.rfc-editor.org/info/rfc7228" quoteTitle="true" derivedAnchor="RFC7228">
          <front>
            <title>Terminology for Constrained-Node Networks</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="M. Ersue" initials="M." surname="Ersue"/>
            <author fullname="A. Keranen" initials="A." surname="Keranen"/>
            <date month="May" year="2014"/>
            <abstract>
              <t indent="0">The Internet Protocol Suite is increasingly used on small devices with severe constraints on power, memory, and processing resources, creating constrained-node networks. This document provides a number of basic terms that have been useful in the standardization work for constrained-node networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7228"/>
          <seriesInfo name="DOI" value="10.17487/RFC7228"/>
        </reference>
        <reference anchor="I-D.ietf-iotops-7228bis" target="https://datatracker.ietf.org/doc/html/draft-ietf-iotops-7228bis-05" quoteTitle="true" derivedAnchor="RFC7228bis">
          <front>
            <title>Terminology for Constrained-Node Networks</title>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization showOnFrontPage="true">Universität Bremen TZI</organization>
            </author>
            <author fullname="Mehmet Ersue" initials="M." surname="Ersue"/>
            <author fullname="Ari Keränen" initials="A." surname="Keränen">
              <organization showOnFrontPage="true">Ericsson</organization>
            </author>
            <author fullname="Carles Gomez" initials="C." surname="Gomez">
              <organization showOnFrontPage="true">Universitat Politecnica de Catalunya</organization>
            </author>
            <date day="14" month="March" year="2026"/>
            <abstract>
              <t indent="0">The Internet Protocol Suite is increasingly used on small devices with severe constraints on power, memory, and processing resources, creating constrained-node networks. This document provides a number of basic terms that have been useful in research and standardization work for constrained-node networks. This document obsoletes RFC 7228.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-iotops-7228bis-05"/>
          <refcontent>Work in Progress</refcontent>
        </reference>
        <reference anchor="RFC7828" target="https://www.rfc-editor.org/info/rfc7828" quoteTitle="true" derivedAnchor="RFC7828">
          <front>
            <title>The edns-tcp-keepalive EDNS0 Option</title>
            <author fullname="P. Wouters" initials="P." surname="Wouters"/>
            <author fullname="J. Abley" initials="J." surname="Abley"/>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="R. Bellis" initials="R." surname="Bellis"/>
            <date month="April" year="2016"/>
            <abstract>
              <t indent="0">DNS messages between clients and servers may be received over either UDP or TCP. UDP transport involves keeping less state on a busy server, but can cause truncation and retries over TCP. Additionally, UDP can be exploited for reflection attacks. Using TCP would reduce retransmits and amplification. However, clients commonly use TCP only for retries and servers typically use idle timeouts on the order of seconds.</t>
              <t indent="0">This document defines an EDNS0 option ("edns-tcp-keepalive") that allows DNS servers to signal a variable idle timeout. This signalling encourages the use of long-lived TCP connections by allowing the state associated with TCP transport to be managed effectively with minimal impact on the DNS transaction time.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7828"/>
          <seriesInfo name="DOI" value="10.17487/RFC7828"/>
        </reference>
        <reference anchor="RFC7858" target="https://www.rfc-editor.org/info/rfc7858" quoteTitle="true" derivedAnchor="RFC7858">
          <front>
            <title>Specification for DNS over Transport Layer Security (TLS)</title>
            <author fullname="Z. Hu" initials="Z." surname="Hu"/>
            <author fullname="L. Zhu" initials="L." surname="Zhu"/>
            <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="D. Wessels" initials="D." surname="Wessels"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="May" year="2016"/>
            <abstract>
              <t indent="0">This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
              <t indent="0">This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7858"/>
          <seriesInfo name="DOI" value="10.17487/RFC7858"/>
        </reference>
        <reference anchor="RFC8094" target="https://www.rfc-editor.org/info/rfc8094" quoteTitle="true" derivedAnchor="RFC8094">
          <front>
            <title>DNS over Datagram Transport Layer Security (DTLS)</title>
            <author fullname="T. Reddy" initials="T." surname="Reddy"/>
            <author fullname="D. Wing" initials="D." surname="Wing"/>
            <author fullname="P. Patil" initials="P." surname="Patil"/>
            <date month="February" year="2017"/>
            <abstract>
              <t indent="0">DNS queries and responses are visible to network elements on the path between the DNS client and its server. These queries and responses can contain privacy-sensitive information, which is valuable to protect.</t>
              <t indent="0">This document proposes the use of Datagram Transport Layer Security (DTLS) for DNS, to protect against passive listeners and certain active attacks. As latency is critical for DNS, this proposal also discusses mechanisms to reduce DTLS round trips and reduce the DTLS handshake size. The proposed mechanism runs over port 853.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8094"/>
          <seriesInfo name="DOI" value="10.17487/RFC8094"/>
        </reference>
        <reference anchor="RFC8446" target="https://www.rfc-editor.org/info/rfc8446" quoteTitle="true" derivedAnchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t indent="0">This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t indent="0">This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9052" target="https://www.rfc-editor.org/info/rfc9052" quoteTitle="true" derivedAnchor="RFC9052">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t indent="0">Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t indent="0">This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="RFC9076" target="https://www.rfc-editor.org/info/rfc9076" quoteTitle="true" derivedAnchor="RFC9076">
          <front>
            <title>DNS Privacy Considerations</title>
            <author fullname="T. Wicinski" initials="T." role="editor" surname="Wicinski"/>
            <date month="July" year="2021"/>
            <abstract>
              <t indent="0">This document describes the privacy issues associated with the use of the DNS by Internet users. It provides general observations about typical current privacy practices. It is intended to be an analysis of the present situation and does not prescribe solutions. This document obsoletes RFC 7626.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9076"/>
          <seriesInfo name="DOI" value="10.17487/RFC9076"/>
        </reference>
        <reference anchor="RFC9176" target="https://www.rfc-editor.org/info/rfc9176" quoteTitle="true" derivedAnchor="RFC9176">
          <front>
            <title>Constrained RESTful Environments (CoRE) Resource Directory</title>
            <author fullname="C. Amsüss" initials="C." role="editor" surname="Amsüss"/>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="M. Koster" initials="M." surname="Koster"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. van der Stok" initials="P." surname="van der Stok"/>
            <date month="April" year="2022"/>
            <abstract>
              <t indent="0">In many Internet of Things (IoT) applications, direct discovery of resources is not practical due to sleeping nodes or networks where multicast traffic is inefficient. These problems can be solved by employing an entity called a Resource Directory (RD), which contains information about resources held on other servers, allowing lookups to be performed for those resources. The input to an RD is composed of links, and the output is composed of links constructed from the information stored in the RD. This document specifies the web interfaces that an RD supports for web servers to discover the RD and to register, maintain, look up, and remove information on resources. Furthermore, new target attributes useful in conjunction with an RD are defined.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9176"/>
          <seriesInfo name="DOI" value="10.17487/RFC9176"/>
        </reference>
        <reference anchor="RFC9250" target="https://www.rfc-editor.org/info/rfc9250" quoteTitle="true" derivedAnchor="RFC9250">
          <front>
            <title>DNS over Dedicated QUIC Connections</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <date month="May" year="2022"/>
            <abstract>
              <t indent="0">This document describes the use of QUIC to provide transport confidentiality for DNS. The encryption provided by QUIC has similar properties to those provided by TLS, while QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides more efficient packet-loss recovery than UDP. DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC 7858, and latency characteristics similar to classic DNS over UDP. This specification describes the use of DoQ as a general-purpose transport for DNS and includes the use of DoQ for stub to recursive, recursive to authoritative, and zone transfer scenarios.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9250"/>
          <seriesInfo name="DOI" value="10.17487/RFC9250"/>
        </reference>
        <reference anchor="RFC9528" target="https://www.rfc-editor.org/info/rfc9528" quoteTitle="true" derivedAnchor="RFC9528">
          <front>
            <title>Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <date month="March" year="2024"/>
            <abstract>
              <t indent="0">This document specifies Ephemeral Diffie-Hellman Over COSE (EDHOC), a very compact and lightweight authenticated Diffie-Hellman key exchange with ephemeral keys. EDHOC provides mutual authentication, forward secrecy, and identity protection. EDHOC is intended for usage in constrained scenarios, and a main use case is to establish an Object Security for Constrained RESTful Environments (OSCORE) security context. By reusing CBOR Object Signing and Encryption (COSE) for cryptography, Concise Binary Object Representation (CBOR) for encoding, and Constrained Application Protocol (CoAP) for transport, the additional code size can be kept very low.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9528"/>
          <seriesInfo name="DOI" value="10.17487/RFC9528"/>
        </reference>
        <reference anchor="I-D.ietf-core-transport-indication" target="https://datatracker.ietf.org/doc/html/draft-ietf-core-transport-indication-09" quoteTitle="true" derivedAnchor="TRANSPORT-IND">
          <front>
            <title>CoAP Transport Indication</title>
            <author fullname="Christian Amsüss" initials="C." surname="Amsüss"/>
            <author fullname="Martine Sophie Lenders" initials="M. S." surname="Lenders">
              <organization showOnFrontPage="true">TUD Dresden University of Technology</organization>
            </author>
            <date day="7" month="July" year="2025"/>
            <abstract>
              <t indent="0">The Constrained Application Protocol (CoAP, [RFC7252]) is available over different transports (UDP, DTLS, TCP, TLS, WebSockets), but lacks a way to unify these addresses. This document provides terminology and provisions based on Web Linking [RFC8288] and Service Bindings (SVCB, [RFC9460]) to express alternative transports available to a device, and to optimize exchanges using these.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-transport-indication-09"/>
          <refcontent>Work in Progress</refcontent>
        </reference>
      </references>
    </references>
    <section anchor="sec_evaluation" numbered="true" removeInRFC="false" toc="include" pn="section-appendix.a">
      <name slugifiedName="name-evaluation">Evaluation</name>
      <t indent="0" pn="section-appendix.a-1">The authors of this document presented the design, implementation, and analysis of DoC in their
paper "Securing Name Resolution in the IoT: DNS over CoAP" <xref target="DoC-paper" format="default" sectionFormat="of" derivedContent="DoC-paper"/>.</t>
    </section>
    <section numbered="false" anchor="acknowledgments" removeInRFC="false" toc="include" pn="section-appendix.b">
      <name slugifiedName="name-acknowledgments">Acknowledgments</name>
      <t indent="0" pn="section-appendix.b-1">The authors of this document want to thank <contact fullname="Mike Bishop"/>, <contact fullname="Carsten Bormann"/>, <contact fullname="Mohamed Boucadair"/>, <contact fullname="Deb Cooley"/>, <contact fullname="Vladimír Čunát"/>, <contact fullname="Roman Danyliw"/>, <contact fullname="Elwyn B. Davies"/>, <contact fullname="Esko Dijk"/>, <contact fullname="Gorry Fairhurst"/>, <contact fullname="Thomas Fossati"/>, <contact fullname="Mikolai Gütschow"/>, <contact fullname="Todd Herr"/>, <contact fullname="Tommy Pauly"/>, <contact fullname="Jan Romann"/>, <contact fullname="Ben Schwartz"/>, <contact fullname="Orie Steele"/>, <contact fullname="Marco Tiloca"/>, <contact fullname="Éric Vyncke"/>, <contact fullname="Tim Wicinski"/>, and <contact fullname="Paul Wouters"/> for their feedback and comments.</t>
      <t indent="0" pn="section-appendix.b-2">This work was supported in parts by the German Federal Ministry of Research, Technology and Space (BMFTR) under the grant numbers 16KIS1386K (TU Dresden) and 16KIS1387 (HAW Hamburg) within the research project PIVOT and under the grant numbers 16KIS1694K (TU Dresden) and 16KIS1695 (HAW Hamburg) within the research project C-ray4edge.</t>
    </section>
    <section anchor="authors-addresses" numbered="false" removeInRFC="false" toc="include" pn="section-appendix.c">
      <name slugifiedName="name-authors-addresses">Authors' Addresses</name>
      <author initials="M. S." surname="Lenders" fullname="Martine Sophie Lenders">
        <organization abbrev="TU Dresden" showOnFrontPage="true">TUD Dresden University of Technology</organization>
        <address>
          <postal>
            <street>Helmholtzstr. 10</street>
            <city>Dresden</city>
            <code>D-01069</code>
            <country>Germany</country>
          </postal>
          <email>martine.lenders@tu-dresden.de</email>
        </address>
      </author>
      <author initials="C." surname="Amsüss" fullname="Christian Amsüss">
        <organization showOnFrontPage="true"/>
        <address>
          <email>christian@amsuess.com</email>
        </address>
      </author>
      <author initials="C." surname="Gündoğan" fullname="Cenk Gündoğan">
        <organization showOnFrontPage="true">NeuralAgent GmbH</organization>
        <address>
          <postal>
            <street>Mies-van-der-Rohe-Straße 6</street>
            <city>Munich</city>
            <code>D-80807</code>
            <country>Germany</country>
          </postal>
          <email>cenk.gundogan@neuralagent.ai</email>
        </address>
      </author>
      <author initials="T. C." surname="Schmidt" fullname="Thomas C. Schmidt">
        <organization showOnFrontPage="true">HAW Hamburg</organization>
        <address>
          <postal>
            <street>Berliner Tor 7</street>
            <city>Hamburg</city>
            <code>D-20099</code>
            <country>Germany</country>
          </postal>
          <email>t.schmidt@haw-hamburg.de</email>
        </address>
      </author>
      <author initials="M." surname="Wählisch" fullname="Matthias Wählisch">
        <organization abbrev="TU Dresden &amp; Barkhausen Institut" showOnFrontPage="true">TUD Dresden University of Technology &amp; Barkhausen Institut</organization>
        <address>
          <postal>
            <street>Helmholtzstr. 10</street>
            <city>Dresden</city>
            <code>D-01069</code>
            <country>Germany</country>
          </postal>
          <email>m.waehlisch@tu-dresden.de</email>
        </address>
      </author>
    </section>
  </back>
</rfc>
