<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.8) -->
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc compact="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-nottingham-rfc8615bis-00" category="std" consensus="true" obsoletes="8615" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <?v3xml2rfc table_borders="light"?>
  <front>
    <title abbrev="Well-Known URIs">Well-Known Uniform Resource Identifiers (URIs)</title>
    <seriesInfo name="Internet-Draft" value="draft-nottingham-rfc8615bis-00"/>
    <author initials="M." surname="Nottingham" fullname="Mark Nottingham">
      <organization/>
      <address>
        <email>mnot@mnot.net</email>
        <uri>https://www.mnot.net/</uri>
      </address>
    </author>
    <date/>
    <area>General</area>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 44?>

<t>This memo defines a path prefix for "well-known locations", <br/>
"/.well-known/", in selected Uniform Resource Identifier (URI) schemes.</t>
      <t>In doing so, it obsoletes RFC 5785 and updates the URI schemes defined in RFC 7230 to reserve that space. It also updates RFC 7595 to track URI schemes that support well-known URIs in their registry.</t>
    </abstract>
  </front>
  <middle>
    <?line 52?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Some applications on the Web require the discovery of information about an origin <xref target="RFC6454"/> (sometimes called "site-wide metadata") before making a request. For example, the Robots Exclusion Protocol (http://www.robotstxt.org) specifies a way for automated processes to obtain permission to access resources; likewise, the Platform for Privacy Preferences <xref target="P3P"/> tells user agents how to discover privacy policy before interacting with an origin server.</t>
      <t>While there are several ways to access per-resource metadata (e.g., HTTP header fields, PROPFIND in Web Distributed Authoring and Versioning (WebDAV) <xref target="RFC4918"/>), the perceived overhead (either in terms of client-perceived latency and/or deployment difficulties) associated with them often precludes their use in these scenarios.</t>
      <t>At the same time, it has become more popular to use HTTP as a substrate for non-Web protocols. Sometimes, such protocols need a way to locate one or more resources on a given host.</t>
      <t>When this happens, one solution is to designate a "well-known location" for data or services related to the origin overall, so that it can be easily located. However, this approach has the drawback of risking collisions, both with other such designated "well-known locations" and with resources that the origin has created (or wishes to create). Furthermore, defining well-known locations usurps the origin's control over its own URI space <xref target="RFC7320"/>.</t>
      <t>To address these uses, this memo reserves a path prefix in HTTP, HTTPS, WebSocket (WS), and Secure WebSocket (WSS) URIs for these "well-known locations", "/.well-known/". Future specifications that need to define a resource for such metadata can register their use to avoid collisions and minimise impingement upon origins' URI space.</t>
      <t>Well-known URIs can also be used with other URI schemes, but only when those schemes' definitions explicitly allow it.</t>
    </section>
    <section anchor="notational-conventions">
      <name>Notational Conventions</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>
    </section>
    <section anchor="well-known">
      <name>Well-Known URIs</name>
      <t>A well-known URI is a URI <xref target="RFC3986"/> whose path component begins with the characters "/.well-known/", provided that the scheme is explicitly defined to support well-known URIs.</t>
      <t>For example, if an application registers the name 'example', the corresponding well-known URI on 'http://www.example.com/' would be 'http://www.example.com/.well-known/example'.</t>
      <t>This specification updates the "http" <xref target="RFC7230"/> and "https" <xref target="RFC7230"/> schemes to support well-known URIs. Other existing schemes can use the appropriate process for updating their definitions; for example, <xref target="RFC8307"/> does so for the "ws" and "wss" schemes. The "Uniform Resource Identifier (URI) Schemes" registry tracks which schemes support well-known URIs; see <xref target="register-scheme"/>.</t>
      <t>Applications that wish to mint new well-known URIs MUST register them, following the procedures in <xref target="register"/>, subject to the following requirements.</t>
      <t>Registered names MUST conform to the "segment-nz" production in <xref target="RFC3986"/>. This means they cannot contain the "/" character.</t>
      <t>Registered names for a specific application SHOULD be correspondingly precise; "squatting" on generic terms is not encouraged. For example, if the Example application wants a well-known location for metadata, an appropriate registered name might be "example-metadata" or even "example.com-metadata", not "metadata".</t>
      <t>At a minimum, a registration will reference a specification that defines the format and associated media type(s) to be obtained by dereferencing the well-known URI, along with the URI scheme(s) that the well-known URI can be used with. If no URI schemes are explicitly specified, "http" and "https" are assumed.</t>
      <t>Typically, applications will use the default port for the given scheme; if an alternative port is used, it MUST be explicitly specified by the application in question.</t>
      <t>Registrations MAY also contain additional information, such as the syntax of additional path components, query strings, and/or fragment identifiers to be appended to the well-known URI, or protocol-specific details (e.g., HTTP <xref target="RFC7231"/> method handling).</t>
      <t>Note that this specification defines neither how to determine the hostname to use to find the well-known URI for a particular application, nor the scope of the metadata discovered by dereferencing the well-known URI; both should be defined by the application itself.</t>
      <t>Also, this specification does not define a format or media type for the resource located at "/.well-known/", and clients should not expect a resource to exist at that location.</t>
      <t>Well-known URIs are rooted in the top of the path's hierarchy; they are not well-known by definition in other parts of the path. For example, "/.well-known/example" is a well-known URI, whereas "/foo/.well-known/example" is not.</t>
      <t>See also <xref target="sec"/> for Security Considerations regarding well-known locations.</t>
      <section anchor="procedure">
        <name>Registering Well-Known URIs</name>
        <t>The "Well-Known URIs" registry is located at &lt;https://www.iana.org/assignments/well-known-uris/&gt;. Registration requests can be made by following the instructions located there or by sending an email to the &lt;wellknown-uri-review@ietf.org&gt; mailing list.</t>
        <t>Registration requests consist of at least the following information:</t>
        <dl>
          <dt>URI suffix:</dt>
          <dd>
            <t>The name requested for the well-known URI, relative to "/.well-known/"; e.g., "example".</t>
          </dd>
          <dt>Change controller:</dt>
          <dd>
            <t>For Standards Track RFCs, state "IETF". For others, give the name of the responsible party. Other
details (e.g., email address, home page URI) may also be included.</t>
          </dd>
          <dt>Specification document(s):</dt>
          <dd>
            <t>Reference to the document that specifies the field, preferably including a URI that can be used
to retrieve a copy of the document. An indication of the relevant sections may also be included,
but is not required.</t>
          </dd>
          <dt>Status:</dt>
          <dd>
            <t>One of "permanent" or "provisional". See guidance below.</t>
          </dd>
          <dt>Related information:</dt>
          <dd>
            <t>Optionally, citations to additional documents containing further relevant information.</t>
          </dd>
        </dl>
        <t>General requirements for registered values are described in <xref target="well-known"/>.</t>
        <t>Values defined by Standards Track RFCs and other open standards (in the sense of <xref target="RFC2026"/>, Section 7.1.1) have a status of "permanent". Other values can also be registered as permanent, if the experts find that they are in use, in consultation with the community. Other values should be registered as "provisional".</t>
        <t>Provisional entries can be removed by the experts if -- in consultation with the community -- the experts find that they are not in use. The experts can change a provisional entry's status to permanent; in doing so, the experts should consider how widely used a value is and consult the community beforehand.</t>
        <t>Note that "consult the community" above refers to those responsible for the URI scheme(s) in question. Generally, this would take place on the mailing list(s) of the appropriate Working Group(s) (possibly concluded), or on &lt;art@ietf.org&gt; if no such list exists.</t>
        <t>Well-known URIs can be registered by third parties (including the expert(s)), if the expert(s) determine that an unregistered well-known URI is widely deployed and not likely to be registered in a timely manner otherwise. Such registrations still are subject to the requirements defined, including the need to reference a specification.</t>
      </section>
    </section>
    <section anchor="sec">
      <name>Security Considerations</name>
      <t>Applications minting new well-known URIs, as well as administrators deploying them, will need to consider several security-related issues, including (but not limited to) exposure of sensitive data, denial-of-service attacks (in addition to normal load issues), server and client authentication, vulnerability to DNS rebinding attacks, and attacks where limited access to a server grants the ability to affect how well-known URIs are served.</t>
      <t><xref target="RFC3552"/> contains some examples of potential security considerations that may be relevant to application protocols and administrators deploying them.</t>
      <section anchor="protecting-well-known-resources">
        <name>Protecting Well-Known Resources</name>
        <t>Because well-known locations effectively represent the entire origin, server operators should appropriately control the ability to write to them. This is especially true when more than one entity is<br/>
co-located on the same origin. Even for origins that are controlled by and represent a single entity, due care should be taken to assure that write access to well-known locations is not granted unwittingly, either externally through server configuration or locally through implementation permissions (e.g., on a filesystem).</t>
      </section>
      <section anchor="interaction-with-web-browsing">
        <name>Interaction with Web Browsing</name>
        <t>Applications using well-known URIs for "http" or "https" URLs need to be aware that well-known resources will be accessible to Web browsers, and therefore are able to be manipulated by content obtained from other parts of that origin. If an attacker is able to inject content (e.g., through a Cross-Site Scripting vulnerability), they will be able to make potentially arbitrary requests to the well-known resource.</t>
        <t>HTTP and HTTPS also use origins as a security boundary for many other mechanisms, including (but not limited to) cookies <xref target="RFC6265"/>, Web Storage <xref target="WEBSTORAGE"/>, and various capabilities.</t>
        <t>An application that defines well-known locations should not assume that it has sole access to these mechanisms or that it is the only application using the origin. Depending on the nature of the application, mitigations can include:</t>
        <ul spacing="normal">
          <li>
            <t>Encrypting sensitive information</t>
          </li>
          <li>
            <t>Allowing flexibility in the use of identifiers (e.g., cookie names) to avoid collisions with other applications</t>
          </li>
          <li>
            <t>Using the 'HttpOnly' flag on cookies to assure that cookies are not exposed to browser scripting languages <xref target="RFC6265"/></t>
          </li>
          <li>
            <t>Using the 'Path' parameter on cookies to assure that they are not available to other parts of the origin <xref target="RFC6265"/></t>
          </li>
          <li>
            <t>Using X-Content-Type-Options: nosniff <xref target="FETCH"/> to assure that content under attacker control can't be coaxed into a form that is interpreted as active content by a Web browser</t>
          </li>
        </ul>
        <t>Other good practices include:</t>
        <ul spacing="normal">
          <li>
            <t>Using an application-specific media type in the Content-Type header field, and requiring clients to fail if it is not used</t>
          </li>
          <li>
            <t>Using Content-Security-Policy <xref target="CSP"/> to constrain the capabilities of active content (such as HTML <xref target="HTML5"/>), thereby mitigating Cross-Site Scripting attacks</t>
          </li>
          <li>
            <t>Using Referrer-Policy <xref target="REFERRER-POLICY"/> to prevent sensitive data in URLs from being leaked in the Referer request header field</t>
          </li>
          <li>
            <t>Avoiding use of compression on any sensitive information (e.g., authentication tokens, passwords), as the scripting environment offered by Web browsers allows an attacker to repeatedly probe the compression space; if the attacker has access to the path of the communication, they can use this capability to recover that information.</t>
          </li>
        </ul>
      </section>
      <section anchor="scoping-applications">
        <name>Scoping Applications</name>
        <t>This memo does not specify the scope of applicability for the information obtained from a well-known URI, and does not specify how to discover a well-known URI for a particular application.</t>
        <t>Individual applications using this mechanism must define both aspects; if this is not specified, security issues can arise from implementation deviations and confusion about boundaries between applications.</t>
        <t>Applying metadata discovered in a well-known URI to resources other than those co-located on the same origin risks administrative as well as security issues. For example, allowing "https://example.com/.well-known/example" to apply policy to "https://department.example.com", "https://www.example.com", or even "https://www.example.com:8000" assumes a relationship between hosts where there might be none, thereby giving control to a potential attacker.</t>
        <t>Likewise, specifying that a well-known URI on a particular hostname is to be used to bootstrap a protocol can cause a large number of undesired requests. For example, if a well-known HTTPS URI is used to find policy about a separate service such as email, it can result in a flood of requests to Web servers, even if they don't implement the well-known URI. Such undesired requests can resemble a denial-of-service attack.</t>
      </section>
      <section anchor="hidden-capabilities">
        <name>Hidden Capabilities</name>
        <t>Applications using well-known locations should consider that some server administrators might be unaware of their existence (especially on operating systems that hide directories whose names begin with "."). This means that if an attacker has write access to the <br/>
.well-known directory, they would be able to control its contents, possibly without the administrator realising it.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="register">
        <name>The Well-Known URI Registry</name>
        <t>This specification updates the registration procedures for the "Well-Known URI" registry, first defined in <xref target="RFC5785"/>; see <xref target="procedure"/>.</t>
        <t>Well-known URIs are registered on the advice of one or more experts, with a Specification Required (using terminology from <xref target="RFC8126"/>).</t>
        <t>The experts' primary considerations in evaluating registration requests are:</t>
        <ul spacing="normal">
          <li>
            <t>Conformance to the requirements in <xref target="well-known"/></t>
          </li>
          <li>
            <t>The availability and stability of the specifying document</t>
          </li>
          <li>
            <t>The considerations outlined in <xref target="sec"/></t>
          </li>
        </ul>
        <t>IANA will direct the senders of any incoming registry requests to this document and, if defined, the processes established by the expert(s); typically, this will mean referring them to the registry Web page.</t>
        <t>Per this document, IANA has:</t>
        <ul spacing="normal">
          <li>
            <t>Updated the registration procedure to Specification Required.</t>
          </li>
          <li>
            <t>Added a "Status" column to the registry and marked all of the existing registrations as "permanent".</t>
          </li>
        </ul>
      </section>
      <section anchor="register-scheme">
        <name>The Uniform Resource Identifier (URI) Schemes Registry</name>
        <t>This specification adds a field to the registration template of the "Uniform Resource Identifier (URI) Schemes" registry, with the name "Well-Known URI Support" and a default value of "-".</t>
        <t>If a URI scheme explicitly has been specified to use well-known URIs as per <xref target="well-known"/>, the value changes to a reference to that specification. Initial values not equal to "-" are given in <xref target="tab-initial"/>.</t>
        <table anchor="tab-initial">
          <name>Rows in URI Scheme Registry with Nonempty New Column</name>
          <thead>
            <tr>
              <th align="left">URI Scheme</th>
              <th align="left">Well-Known URI Support</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">coap</td>
              <td align="left">
                <xref target="RFC7252"/></td>
            </tr>
            <tr>
              <td align="left">coap+tcp</td>
              <td align="left">
                <xref target="RFC8323"/></td>
            </tr>
            <tr>
              <td align="left">coap+ws</td>
              <td align="left">
                <xref target="RFC8323"/></td>
            </tr>
            <tr>
              <td align="left">coaps</td>
              <td align="left">
                <xref target="RFC7252"/></td>
            </tr>
            <tr>
              <td align="left">coaps+tcp</td>
              <td align="left">
                <xref target="RFC8323"/></td>
            </tr>
            <tr>
              <td align="left">coaps+ws</td>
              <td align="left">
                <xref target="RFC8323"/></td>
            </tr>
            <tr>
              <td align="left">http</td>
              <td align="left">[RFC8615]</td>
            </tr>
            <tr>
              <td align="left">https</td>
              <td align="left">[RFC8615]</td>
            </tr>
            <tr>
              <td align="left">ws</td>
              <td align="left">
                <xref target="RFC8307"/></td>
            </tr>
            <tr>
              <td align="left">wss</td>
              <td align="left">
                <xref target="RFC8307"/></td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC6454">
          <front>
            <title>The Web Origin Concept</title>
            <author fullname="A. Barth" initials="A." surname="Barth"/>
            <date month="December" year="2011"/>
            <abstract>
              <t>This document defines the concept of an "origin", which is often used as the scope of authority or privilege by user agents. Typically, user agents isolate content retrieved from different origins to prevent malicious web site operators from interfering with the operation of benign web sites. In addition to outlining the principles that underlie the concept of origin, this document details how to determine the origin of a URI and how to serialize an origin into a string. It also defines an HTTP header field, named "Origin", that indicates which origins are associated with an HTTP request. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6454"/>
          <seriesInfo name="DOI" value="10.17487/RFC6454"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC7230">
          <front>
            <title>Hypertext Transfer Protocol (HTTP/1.1): Message Syntax and Routing</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document provides an overview of HTTP architecture and its associated terminology, defines the "http" and "https" Uniform Resource Identifier (URI) schemes, defines the HTTP/1.1 message syntax and parsing requirements, and describes related security concerns for implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7230"/>
          <seriesInfo name="DOI" value="10.17487/RFC7230"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="HTML5" target="https://html.spec.whatwg.org">
          <front>
            <title>HTML - Living Standard</title>
            <author>
              <organization>WHATWG</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="FETCH" target="https://fetch.spec.whatwg.org">
          <front>
            <title>Fetch - Living Standard</title>
            <author>
              <organization>WHATWG</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC8323">
          <front>
            <title>CoAP (Constrained Application Protocol) over TCP, TLS, and WebSockets</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="S. Lemay" initials="S." surname="Lemay"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="B. Silverajan" initials="B." surname="Silverajan"/>
            <author fullname="B. Raymor" initials="B." role="editor" surname="Raymor"/>
            <date month="February" year="2018"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP), although inspired by HTTP, was designed to use UDP instead of TCP. The message layer of CoAP over UDP includes support for reliable delivery, simple congestion control, and flow control.</t>
              <t>Some environments benefit from the availability of CoAP carried over reliable transports such as TCP or Transport Layer Security (TLS). This document outlines the changes required to use CoAP over TCP, TLS, and WebSockets transports. It also formally updates RFC 7641 for use with these transports and RFC 7959 to enable the use of larger messages over a reliable transport.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8323"/>
          <seriesInfo name="DOI" value="10.17487/RFC8323"/>
        </reference>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="P3P" target="https://www.w3.org/TR/2002/REC-P3P-20020416/">
          <front>
            <title>The Platform for Privacy Preferences 1.0 (P3P1.0) Specification</title>
            <author fullname="Massimo Marchiori" role="editor"/>
            <date day="16" month="April" year="2002"/>
          </front>
          <seriesInfo name="W3C REC" value="REC-P3P-20020416"/>
          <seriesInfo name="W3C" value="REC-P3P-20020416"/>
        </reference>
        <reference anchor="RFC4918">
          <front>
            <title>HTTP Extensions for Web Distributed Authoring and Versioning (WebDAV)</title>
            <author fullname="L. Dusseault" initials="L." role="editor" surname="Dusseault"/>
            <date month="June" year="2007"/>
            <abstract>
              <t>Web Distributed Authoring and Versioning (WebDAV) consists of a set of methods, headers, and content-types ancillary to HTTP/1.1 for the management of resource properties, creation and management of resource collections, URL namespace manipulation, and resource locking (collision avoidance).</t>
              <t>RFC 2518 was published in February 1999, and this specification obsoletes RFC 2518 with minor revisions mostly due to interoperability experience. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4918"/>
          <seriesInfo name="DOI" value="10.17487/RFC4918"/>
        </reference>
        <reference anchor="RFC7320">
          <front>
            <title>URI Design and Ownership</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <date month="July" year="2014"/>
            <abstract>
              <t>Section 1.1.1 of RFC 3986 defines URI syntax as "a federated and extensible naming system wherein each scheme's specification may further restrict the syntax and semantics of identifiers using that scheme." In other words, the structure of a URI is defined by its scheme. While it is common for schemes to further delegate their substructure to the URI's owner, publishing independent standards that mandate particular forms of URI substructure is inappropriate, because that essentially usurps ownership. This document further describes this problematic practice and provides some acceptable alternatives for use in standards.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7320"/>
          <seriesInfo name="DOI" value="10.17487/RFC7320"/>
        </reference>
        <reference anchor="RFC8307">
          <front>
            <title>Well-Known URIs for the WebSocket Protocol</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>RFC 5785 defines a path prefix, "/.well-known/", that can be used by well-known URIs. It was specifically defined for the "http" and "https" URI schemes. The present memo formally updates RFC 6455, which defines the URI schemes defined for the WebSocket Protocol, to extend the use of these well-known URIs to those URI schemes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8307"/>
          <seriesInfo name="DOI" value="10.17487/RFC8307"/>
        </reference>
        <reference anchor="RFC7231">
          <front>
            <title>Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless \%application- level protocol for distributed, collaborative, hypertext information systems. This document defines the semantics of HTTP/1.1 messages, as expressed by request methods, request header fields, response status codes, and response header fields, along with the payload of messages (metadata and body content) and mechanisms for content negotiation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7231"/>
          <seriesInfo name="DOI" value="10.17487/RFC7231"/>
        </reference>
        <reference anchor="RFC2026">
          <front>
            <title>The Internet Standards Process -- Revision 3</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="October" year="1996"/>
            <abstract>
              <t>This memo documents the process used by the Internet community for the standardization of protocols and procedures. It defines the stages in the standardization process, the requirements for moving a document between stages and the types of documents used during this process. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="9"/>
          <seriesInfo name="RFC" value="2026"/>
          <seriesInfo name="DOI" value="10.17487/RFC2026"/>
        </reference>
        <reference anchor="RFC3552">
          <front>
            <title>Guidelines for Writing RFC Text on Security Considerations</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="B. Korver" initials="B." surname="Korver"/>
            <date month="July" year="2003"/>
            <abstract>
              <t>All RFCs are required to have a Security Considerations section. Historically, such sections have been relatively weak. This document provides guidelines to RFC authors on how to write a good Security Considerations section. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="72"/>
          <seriesInfo name="RFC" value="3552"/>
          <seriesInfo name="DOI" value="10.17487/RFC3552"/>
        </reference>
        <reference anchor="RFC6265">
          <front>
            <title>HTTP State Management Mechanism</title>
            <author fullname="A. Barth" initials="A." surname="Barth"/>
            <date month="April" year="2011"/>
            <abstract>
              <t>This document defines the HTTP Cookie and Set-Cookie header fields. These header fields can be used by HTTP servers to store state (called cookies) at HTTP user agents, letting the servers maintain a stateful session over the mostly stateless HTTP protocol. Although cookies have many historical infelicities that degrade their security and privacy, the Cookie and Set-Cookie header fields are widely used on the Internet. This document obsoletes RFC 2965. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6265"/>
          <seriesInfo name="DOI" value="10.17487/RFC6265"/>
        </reference>
        <reference anchor="WEBSTORAGE" target="https://www.w3.org/TR/2016/REC-webstorage-20160419/">
          <front>
            <title>Web Storage (Second Edition)</title>
            <author fullname="Ian Hickson" role="editor"/>
            <date day="19" month="April" year="2016"/>
          </front>
          <seriesInfo name="W3C REC" value="REC-webstorage-20160419"/>
          <seriesInfo name="W3C" value="REC-webstorage-20160419"/>
        </reference>
        <reference anchor="CSP" target="https://www.w3.org/TR/2016/WD-CSP3-20160913/">
          <front>
            <title>Content Security Policy Level 3</title>
            <author/>
            <date day="13" month="September" year="2016"/>
          </front>
          <seriesInfo name="W3C WD" value="WD-CSP3-20160913"/>
          <seriesInfo name="W3C" value="WD-CSP3-20160913"/>
        </reference>
        <reference anchor="REFERRER-POLICY" target="https://www.w3.org/TR/2017/CR-referrer-policy-20170126/">
          <front>
            <title>Referrer Policy</title>
            <author fullname="Emily Stark" role="editor"/>
            <author fullname="Jochen Eisinger" role="editor"/>
            <date day="26" month="January" year="2017"/>
          </front>
          <seriesInfo name="W3C CR" value="CR-referrer-policy-20170126"/>
          <seriesInfo name="W3C" value="CR-referrer-policy-20170126"/>
        </reference>
        <reference anchor="RFC5785">
          <front>
            <title>Defining Well-Known Uniform Resource Identifiers (URIs)</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <author fullname="E. Hammer-Lahav" initials="E." surname="Hammer-Lahav"/>
            <date month="April" year="2010"/>
            <abstract>
              <t>This memo defines a path prefix for "well-known locations", "/.well-known/", in selected Uniform Resource Identifier (URI) schemes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5785"/>
          <seriesInfo name="DOI" value="10.17487/RFC5785"/>
        </reference>
      </references>
    </references>
    <?line 230?>

<section anchor="frequently-asked-questions">
      <name>Frequently Asked Questions</name>
      <dl newline="true">
        <dt>Aren't well-known locations bad for the Web?</dt>
        <dd>
          <t>They are, but for various reasons -- both technical and social -- they are sometimes necessary. This memo defines a "sandbox" for them, to reduce the risks of collision and to minimise the impact upon preexisting URIs on sites.</t>
        </dd>
        <dt>Why "/.well-known?"</dt>
        <dd>
          <t>It's short, descriptive, and according to search indices, not widely used.</t>
        </dd>
        <dt>What impact does this have on existing mechanisms, such as P3P and robots.txt?</dt>
        <dd>
          <t>None, until they choose to use this mechanism.</t>
        </dd>
        <dt>Why aren't per-directory well-known locations defined?</dt>
        <dd>
          <t>Allowing every URI path segment to have a well-known location (e.g., "/images/.well-known/") would increase the risks of colliding with a preexisting URI on a site, and generally these solutions are found not to scale well because they're too "chatty".</t>
        </dd>
      </dl>
    </section>
    <section anchor="changes-from-rfc-5785">
      <name>Changes from RFC 5785</name>
      <ul spacing="normal">
        <li>
          <t>Allowed non-Web well-known locations</t>
        </li>
        <li>
          <t>Adjusted IANA instructions</t>
        </li>
        <li>
          <t>Updated references</t>
        </li>
        <li>
          <t>Made various other clarifications</t>
        </li>
        <li>
          <t>Tracked supporting schemes in the "Uniform Resource Identifier (URI) Schemes" registry</t>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
