<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.26 (Ruby 3.3.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-core-coap-dtls-alpn-03" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.0 -->
  <front>
    <title abbrev="CoRE ALPN">ALPN ID Specification for CoAP over DTLS</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-core-coap-dtls-alpn-03"/>
    <author fullname="Martine Sophie Lenders">
      <organization abbrev="TU Dresden">TUD Dresden University of Technology</organization>
      <address>
        <postal>
          <street>Helmholtzstr. 10</street>
          <city>Dresden</city>
          <code>D-01069</code>
          <country>Germany</country>
        </postal>
        <email>martine.lenders@tu-dresden.de</email>
      </address>
    </author>
    <author initials="C." surname="Amsüss" fullname="Christian Amsüss">
      <organization/>
      <address>
        <email>christian@amsuess.com</email>
      </address>
    </author>
    <author fullname="Thomas C. Schmidt">
      <organization>HAW Hamburg</organization>
      <address>
        <postal>
          <street>Berliner Tor 7</street>
          <city>Hamburg</city>
          <code>D-20099</code>
          <country>Germany</country>
        </postal>
        <email>t.schmidt@haw-hamburg.de</email>
      </address>
    </author>
    <author initials="M." surname="Wählisch" fullname="Matthias Wählisch">
      <organization abbrev="TU Dresden &amp; Barkhausen Institut">TUD Dresden University of Technology &amp; Barkhausen Institut</organization>
      <address>
        <postal>
          <street>Helmholtzstr. 10</street>
          <city>Dresden</city>
          <code>D-01069</code>
          <country>Germany</country>
        </postal>
        <email>m.waehlisch@tu-dresden.de</email>
      </address>
    </author>
    <date year="2025" month="April" day="01"/>
    <area>Web and Internet Transport</area>
    <workgroup>Constrained RESTful Environments</workgroup>
    <keyword>CoRE</keyword>
    <keyword>CoAP</keyword>
    <keyword>SVCB</keyword>
    <keyword>DTLS</keyword>
    <keyword>ALPN</keyword>
    <abstract>
      <?line 68?>

<t>This document specifies an Application-Layer Protocol Negotiation (ALPN) ID for
transport-layer-secured Constrained Application Protocol (CoAP) services.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://core-wg.github.io/coap-dtls-alpn/draft-ietf-core-coap-dtls-alpn.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-core-coap-dtls-alpn/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Constrained RESTful Environments Working Group mailing list (<eref target="mailto:core@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/core/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/core/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/core-wg/coap-dtls-alpn"/>.</t>
    </note>
  </front>
  <middle>
    <?line 73?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Application-Layer Protocol Negotiation (ALPN) enables communicating parties to agree on an application-layer protocol during a Transport Layer Security (TLS) handshake using an ALPN ID <xref target="RFC7301"/>.
This ALPN ID can be discovered for services as part of Service Bindings (SVCB) via the DNS, using SVCB resource records with the "alpn" Service Parameter Keys <xref target="RFC9460"/>.
As an example, applications that use the Constrained Application Protocol (CoAP) <xref target="RFC7252"/> can obtain this information as part of the discovery of DNS over CoAP (DoC) servers (see <xref section="3.2" sectionFormat="of" target="I-D.ietf-core-dns-over-coap"/>) that deploy TLS <xref target="RFC8446"/> or Datagram Transport Layer Security (DTLS) <xref target="RFC6347"/> <xref target="RFC9147"/> to secure their messages.
This document specifies an ALPN ID for CoAP services that are secured by transport layer security using DTLS.
An ALPN ID for CoAP services secured by TLS has already been specified in <xref target="RFC8323"/>.</t>
    </section>
    <section anchor="application-layer-protocol-negotiation-alpn-ids">
      <name>Application-Layer Protocol Negotiation (ALPN) IDs</name>
      <t>For CoAP over TLS, an ALPN ID was defined as "coap" in <xref target="RFC8323"/>.
As it is not advisable to re-use the same ALPN ID for a different transport layer, an ALPN for
CoAP over DTLS is registered in <xref target="iana-coap-alpn"/>.</t>
      <t>ALPN ID values have variable length.
For CoAP over DTLS, a short value ("co") is allocated, as this can avoid fragmentation of Client Hello and Server Hello messages in constrained networks with link-layer fragmentation, such as 6LoWPAN <xref target="RFC4944"/>.</t>
      <t>To discover CoAP services that secure their messages with TLS or DTLS, the ALPN IDs "coap" and "co" can be used, respectively, in
the same manner as for any other service secured with transport layer security, as
described in <xref target="RFC9460"/>.
The discovery of CoAP services that rely on other security mechanisms is out of the scope of this document.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Any security considerations on ALPN (see <xref target="RFC7301"/>) and SVCB resource records (see <xref target="RFC9460"/>) also apply to this document.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t><cref anchor="replace-xxxx">RFC Ed.: throughout this section, please replace
RFC-XXXX with the RFC number of this specification and remove this
note.</cref></t>
      <t>This document has the following actions for IANA.</t>
      <section anchor="iana-coap-alpn">
        <name>TLS ALPN for CoAP</name>
        <t>The following entry has been added to the "TLS Application-Layer Protocol Negotiation (ALPN) Protocol IDs" registry, which is part of the "Transport Layer Security (TLS) Extensions" registry group.</t>
        <ul spacing="normal">
          <li>
            <t>Protocol: CoAP (over DTLS)</t>
          </li>
          <li>
            <t>Identification sequence: 0x63 0x6f ("co")</t>
          </li>
          <li>
            <t>Reference: <xref target="RFC7252"/> and [RFC-XXXX]</t>
          </li>
        </ul>
        <t>Note that <xref target="RFC7252"/> does not define the use of the ALPN TLS extension during the DTLS connection handshake.
This document does not change this behavior, and thus does not establish any rules like those in <xref section="8.2" sectionFormat="of" target="RFC8323"/>.</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC7301">
          <front>
            <title>Transport Layer Security (TLS) Application-Layer Protocol Negotiation Extension</title>
            <author fullname="S. Friedl" initials="S." surname="Friedl"/>
            <author fullname="A. Popov" initials="A." surname="Popov"/>
            <author fullname="A. Langley" initials="A." surname="Langley"/>
            <author fullname="E. Stephan" initials="E." surname="Stephan"/>
            <date month="July" year="2014"/>
            <abstract>
              <t>This document describes a Transport Layer Security (TLS) extension for application-layer protocol negotiation within the TLS handshake. For instances in which multiple application protocols are supported on the same TCP or UDP port, this extension allows the application layer to negotiate which protocol will be used within the TLS connection.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7301"/>
          <seriesInfo name="DOI" value="10.17487/RFC7301"/>
        </reference>
        <reference anchor="RFC9460">
          <front>
            <title>Service Binding and Parameter Specification via the DNS (SVCB and HTTPS Resource Records)</title>
            <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
            <author fullname="M. Bishop" initials="M." surname="Bishop"/>
            <author fullname="E. Nygren" initials="E." surname="Nygren"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies the "SVCB" ("Service Binding") and "HTTPS" DNS resource record (RR) types to facilitate the lookup of information needed to make connections to network services, such as for HTTP origins. SVCB records allow a service to be provided from multiple alternative endpoints, each with associated parameters (such as transport protocol configuration), and are extensible to support future uses (such as keys for encrypting the TLS ClientHello). They also enable aliasing of apex domains, which is not possible with CNAME. The HTTPS RR is a variation of SVCB for use with HTTP (see RFC 9110, "HTTP Semantics"). By providing more information to the client before it attempts to establish a connection, these records offer potential benefits to both performance and privacy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9460"/>
          <seriesInfo name="DOI" value="10.17487/RFC9460"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC6347">
          <front>
            <title>Datagram Transport Layer Security Version 1.2</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="January" year="2012"/>
            <abstract>
              <t>This document specifies version 1.2 of the Datagram Transport Layer Security (DTLS) protocol. The DTLS protocol provides communications privacy for datagram protocols. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. The DTLS protocol is based on the Transport Layer Security (TLS) protocol and provides equivalent security guarantees. Datagram semantics of the underlying transport are preserved by the DTLS protocol. This document updates DTLS 1.0 to work with TLS version 1.2. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6347"/>
          <seriesInfo name="DOI" value="10.17487/RFC6347"/>
        </reference>
        <reference anchor="RFC8323">
          <front>
            <title>CoAP (Constrained Application Protocol) over TCP, TLS, and WebSockets</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="S. Lemay" initials="S." surname="Lemay"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="B. Silverajan" initials="B." surname="Silverajan"/>
            <author fullname="B. Raymor" initials="B." role="editor" surname="Raymor"/>
            <date month="February" year="2018"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP), although inspired by HTTP, was designed to use UDP instead of TCP. The message layer of CoAP over UDP includes support for reliable delivery, simple congestion control, and flow control.</t>
              <t>Some environments benefit from the availability of CoAP carried over reliable transports such as TCP or Transport Layer Security (TLS). This document outlines the changes required to use CoAP over TCP, TLS, and WebSockets transports. It also formally updates RFC 7641 for use with these transports and RFC 7959 to enable the use of larger messages over a reliable transport.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8323"/>
          <seriesInfo name="DOI" value="10.17487/RFC8323"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="I-D.ietf-core-dns-over-coap">
          <front>
            <title>DNS over CoAP (DoC)</title>
            <author fullname="Martine Sophie Lenders" initials="M. S." surname="Lenders">
              <organization>TUD Dresden University of Technology</organization>
            </author>
            <author fullname="Christian Amsüss" initials="C." surname="Amsüss">
         </author>
            <author fullname="Cenk Gündoğan" initials="C." surname="Gündoğan">
              <organization>NeuralAgent GmbH</organization>
            </author>
            <author fullname="Thomas C. Schmidt" initials="T. C." surname="Schmidt">
              <organization>HAW Hamburg</organization>
            </author>
            <author fullname="Matthias Wählisch" initials="M." surname="Wählisch">
              <organization>TUD Dresden University of Technology &amp; Barkhausen Institut</organization>
            </author>
            <date day="3" month="March" year="2025"/>
            <abstract>
              <t>   This document defines a protocol for exchanging DNS messages over the
   Constrained Application Protocol (CoAP).  These CoAP messages can be
   protected by DTLS-Secured CoAP (CoAPS) or Object Security for
   Constrained RESTful Environments (OSCORE) to provide encrypted DNS
   message exchange for constrained devices in the Internet of Things
   (IoT).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-dns-over-coap-13"/>
        </reference>
        <reference anchor="RFC4944">
          <front>
            <title>Transmission of IPv6 Packets over IEEE 802.15.4 Networks</title>
            <author fullname="G. Montenegro" initials="G." surname="Montenegro"/>
            <author fullname="N. Kushalnagar" initials="N." surname="Kushalnagar"/>
            <author fullname="J. Hui" initials="J." surname="Hui"/>
            <author fullname="D. Culler" initials="D." surname="Culler"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>This document describes the frame format for transmission of IPv6 packets and the method of forming IPv6 link-local addresses and statelessly autoconfigured addresses on IEEE 802.15.4 networks. Additional specifications include a simple header compression scheme using shared context and provisions for packet delivery in IEEE 802.15.4 meshes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4944"/>
          <seriesInfo name="DOI" value="10.17487/RFC4944"/>
        </reference>
      </references>
    </references>
    <?line 123?>

<section anchor="change-log">
      <name>Change Log</name>
      <section anchor="since-draft-ietf-core-coap-dtls-alpn-02">
        <name>Since <eref target="https://datatracker.ietf.org/doc/draft-ietf-core-coap-dtls-alpn/02/">draft-ietf-core-coap-dtls-alpn-02</eref></name>
        <ul spacing="normal">
          <li>
            <t>Address shepherd review</t>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-ietf-core-coap-dtls-alpn-01">
        <name>Since <eref target="https://datatracker.ietf.org/doc/draft-ietf-core-coap-dtls-alpn/01/">draft-ietf-core-coap-dtls-alpn-01</eref></name>
        <ul spacing="normal">
          <li>
            <t>Address review by Esko Dijk</t>
          </li>
          <li>
            <t>Address review by Marco Tiloca</t>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-ietf-core-coap-dtls-alpn-00">
        <name>Since <eref target="https://datatracker.ietf.org/doc/draft-ietf-core-coap-dtls-alpn/00/">draft-ietf-core-coap-dtls-alpn-00</eref></name>
        <ul spacing="normal">
          <li>
            <t>Fix ALPN ID for CoAP over TLS</t>
          </li>
          <li>
            <t>Change intended status to Informational</t>
          </li>
        </ul>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We like to thank Rich Salz for the expert review on the "co" ALPN ID allocation.
We also like to thank Mohamed Boucadair and Ben Schwartz for their early review before WG adoption
of this draft and Esko Dijk, Thomas Fossati, and Marco Tiloca for their feedback and comments.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
