<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.8) -->
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc compact="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-nottingham-rfc8615bis-01" category="std" consensus="true" obsoletes="8615" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <?v3xml2rfc table_borders="light"?>
  <front>
    <title abbrev="Well-Known URIs">Well-Known Uniform Resource Identifiers (URIs)</title>
    <seriesInfo name="Internet-Draft" value="draft-nottingham-rfc8615bis-01"/>
    <author initials="M." surname="Nottingham" fullname="Mark Nottingham">
      <organization/>
      <address>
        <email>mnot@mnot.net</email>
        <uri>https://www.mnot.net/</uri>
      </address>
    </author>
    <date/>
    <area>General</area>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 44?>

<t>This memo defines a path prefix for "well-known locations", <br/>
"/.well-known/", in selected Uniform Resource Identifier (URI) schemes.</t>
      <t>In doing so, it obsoletes RFC 8615.</t>
    </abstract>
  </front>
  <middle>
    <?line 52?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Some applications on the Web require the discovery of information about an origin <xref target="RFC6454"/> (sometimes called "site-wide metadata") before making a request. For example, the Robots Exclusion Protocol <xref target="RFC9309"/> specifies a way for automated processes to obtain permission to access resources; likewise, the Platform for Privacy Preferences <xref target="P3P"/> tells user agents how to discover privacy policy before interacting with an origin server.</t>
      <t>While there are several ways to access per-resource metadata (e.g., HTTP header fields, PROPFIND in Web Distributed Authoring and Versioning (WebDAV) <xref target="RFC4918"/>), the perceived overhead (either in terms of client-perceived latency and/or deployment difficulties) associated with them often precludes their use in these scenarios.</t>
      <t>At the same time, it has become more popular to use HTTP as a substrate for non-Web protocols. Sometimes, such protocols need a way to locate one or more resources on a given host.</t>
      <t>When this happens, one solution is to designate a "well-known location" for data or services related to the origin overall, so that it can be easily located. However, this approach has the drawback of risking collisions, both with other such designated "well-known locations" and with resources that the origin has created (or wishes to create). Furthermore, defining well-known locations usurps the origin's control over its own URI space <xref target="RFC7320"/>.</t>
      <t>To address these uses, this memo reserves a path prefix in nominated URI schemes for these "well-known locations", "/.well-known/". Future specifications that need to define a resource for such metadata can register their use to avoid collisions and minimise impingement upon origins' URI space.</t>
      <t>Well-known URIs can also be used with other URI schemes, but only when those schemes' definitions explicitly allow it.</t>
    </section>
    <section anchor="notational-conventions">
      <name>Notational Conventions</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>
    </section>
    <section anchor="well-known">
      <name>Well-Known URIs</name>
      <t>A well-known URI is a URI <xref target="RFC3986"/> whose path component begins with the characters "/.well-known/", provided that the scheme is explicitly defined to support well-known URIs.</t>
      <t>For example, if an application registers the name 'example', the corresponding well-known URI on 'http://www.example.com/' would be 'http://www.example.com/.well-known/example'.</t>
      <t>Previous revisions of this specification updated the "http" <xref target="RFC9110"/> and "https" <xref target="RFC9110"/> schemes to support well-known URIs. Other existing schemes can use the appropriate process for updating their definitions; for example, <xref target="RFC8307"/> does so for the "ws" and "wss" schemes. The "Uniform Resource Identifier (URI) Schemes" registry tracks which schemes support well-known URIs.</t>
      <t>Applications that wish to mint new well-known URIs MUST register them, following the procedures in <xref target="register"/>, subject to the following requirements.</t>
      <t>Registered names MUST conform to the "segment-nz" production in <xref target="RFC3986"/>. This means they cannot contain the "/" character.</t>
      <t>Registered names for a specific application SHOULD be correspondingly precise; "squatting" on generic terms is not encouraged. For example, if the Example application wants a well-known location for metadata, an appropriate registered name might be "example-metadata" or even "example.com-metadata", not "metadata".</t>
      <t>At a minimum, a registration will reference a specification that defines the format and associated media type(s) to be obtained by dereferencing the well-known URI, along with the URI scheme(s) that the well-known URI can be used with. If no URI schemes are explicitly specified, "http" and "https" are assumed.</t>
      <t>Typically, applications will use the default port for the given scheme; if an alternative port is used, it MUST be explicitly specified by the application in question.</t>
      <t>Registrations MAY also contain additional information, such as the syntax of additional path components, query strings, and/or fragment identifiers to be appended to the well-known URI, or protocol-specific details (e.g., HTTP <xref target="RFC9110"/> method handling).</t>
      <t>Note that this specification defines neither how to determine the hostname to use to find the well-known URI for a particular application, nor the scope of the metadata discovered by dereferencing the well-known URI; both should be defined by the application itself.</t>
      <t>Also, this specification does not define a format or media type for the resource located at "/.well-known/", and clients should not expect a resource to exist at that location.</t>
      <t>Well-known URIs are rooted in the top of the path's hierarchy; they are not well-known by definition in other parts of the path. For example, "/.well-known/example" is a well-known URI, whereas "/foo/.well-known/example" is not.</t>
      <t>See also <xref target="sec"/> for Security Considerations regarding well-known locations.</t>
      <section anchor="procedure">
        <name>Registering Well-Known URIs</name>
        <t>The "Well-Known URIs" registry is located at &lt;https://www.iana.org/assignments/well-known-uris/&gt;. Registration requests can be made by following the instructions located there or by sending an email to the &lt;wellknown-uri-review@ietf.org&gt; mailing list.</t>
        <t>Registration requests consist of at least the following information:</t>
        <dl>
          <dt>URI suffix:</dt>
          <dd>
            <t>The name requested for the well-known URI, relative to "/.well-known/"; e.g., "example".</t>
          </dd>
          <dt>Change controller:</dt>
          <dd>
            <t>For Standards Track RFCs, state "IETF". For others, give the name of the responsible party. Other
details (e.g., email address, home page URI) may also be included.</t>
          </dd>
          <dt>Specification document(s):</dt>
          <dd>
            <t>Reference to the document that specifies the field, preferably including a URI that can be used
to retrieve a copy of the document. An indication of the relevant sections may also be included,
but is not required.</t>
          </dd>
          <dt>Status:</dt>
          <dd>
            <t>One of "permanent" or "provisional". See guidance below.</t>
          </dd>
          <dt>Related information:</dt>
          <dd>
            <t>Optionally, citations to additional documents containing further relevant information.</t>
          </dd>
        </dl>
        <t>General requirements for registered values are described in <xref target="well-known"/>.</t>
        <t>Values defined by Standards Track RFCs and other open standards (in the sense of <xref target="RFC2026"/>, Section 7.1.1) have a status of "permanent". Other values can also be registered as permanent, if the experts find that they are in use, in consultation with the community. Other values should be registered as "provisional".</t>
        <t>Provisional entries can be removed by the experts if -- in consultation with the community -- the experts find that they are not in use. The experts can change a provisional entry's status to permanent; in doing so, the experts should consider how widely used a value is and consult the community beforehand.</t>
        <t>Note that "consult the community" above refers to those responsible for the URI scheme(s) in question. Generally, this would take place on the mailing list(s) of the appropriate Working Group(s) (possibly concluded), or on &lt;art@ietf.org&gt; if no such list exists.</t>
        <t>Well-known URIs can be registered by third parties (including the expert(s)), if the expert(s) determine that an unregistered well-known URI is widely deployed and not likely to be registered in a timely manner otherwise. Such registrations still are subject to the requirements defined, including the need to reference a specification.</t>
      </section>
    </section>
    <section anchor="sec">
      <name>Security Considerations</name>
      <t>Applications minting new well-known URIs, as well as administrators deploying them, will need to consider several security-related issues, including (but not limited to) exposure of sensitive data, denial-of-service attacks (in addition to normal load issues), server and client authentication, vulnerability to DNS rebinding attacks, and attacks where limited access to a server grants the ability to affect how well-known URIs are served.</t>
      <t><xref target="RFC3552"/> contains some examples of potential security considerations that may be relevant to application protocols and administrators deploying them.</t>
      <section anchor="protecting-well-known-resources">
        <name>Protecting Well-Known Resources</name>
        <t>Because well-known locations effectively represent the entire origin, server operators should appropriately control the ability to write to them. This is especially true when more than one entity is<br/>
co-located on the same origin. Even for origins that are controlled by and represent a single entity, due care should be taken to assure that write access to well-known locations is not granted unwittingly, either externally through server configuration or locally through implementation permissions (e.g., on a filesystem).</t>
      </section>
      <section anchor="interaction-with-web-browsing">
        <name>Interaction with Web Browsing</name>
        <t>Applications using well-known URIs for "http" or "https" URLs need to be aware that well-known resources will be accessible to Web browsers, and therefore are able to be manipulated by content obtained from other parts of that origin. If an attacker is able to inject content (e.g., through a Cross-Site Scripting vulnerability), they will be able to make potentially arbitrary requests to the well-known resource.</t>
        <t>HTTP and HTTPS also use origins as a security boundary for many other mechanisms, including (but not limited to) cookies <xref target="RFC6265"/>, Web Storage <xref target="WEBSTORAGE"/>, and various capabilities.</t>
        <t>An application that defines well-known locations should not assume that it has sole access to these mechanisms or that it is the only application using the origin. Depending on the nature of the application, mitigations can include:</t>
        <ul spacing="normal">
          <li>
            <t>Encrypting sensitive information</t>
          </li>
          <li>
            <t>Allowing flexibility in the use of identifiers (e.g., cookie names) to avoid collisions with other applications</t>
          </li>
          <li>
            <t>Using the 'HttpOnly' flag on cookies to assure that cookies are not exposed to browser scripting languages <xref target="RFC6265"/></t>
          </li>
          <li>
            <t>Using the 'Path' parameter on cookies to assure that they are not available to other parts of the origin <xref target="RFC6265"/></t>
          </li>
          <li>
            <t>Using X-Content-Type-Options: nosniff <xref target="FETCH"/> to assure that content under attacker control can't be coaxed into a form that is interpreted as active content by a Web browser</t>
          </li>
        </ul>
        <t>Other good practices include:</t>
        <ul spacing="normal">
          <li>
            <t>Using an application-specific media type in the Content-Type header field, and requiring clients to fail if it is not used</t>
          </li>
          <li>
            <t>Using Content-Security-Policy <xref target="CSP"/> to constrain the capabilities of active content (such as HTML <xref target="HTML5"/>), thereby mitigating Cross-Site Scripting attacks</t>
          </li>
          <li>
            <t>Using Referrer-Policy <xref target="REFERRER-POLICY"/> to prevent sensitive data in URLs from being leaked in the Referer request header field</t>
          </li>
          <li>
            <t>Avoiding use of compression on any sensitive information (e.g., authentication tokens, passwords), as the scripting environment offered by Web browsers allows an attacker to repeatedly probe the compression space; if the attacker has access to the path of the communication, they can use this capability to recover that information.</t>
          </li>
        </ul>
      </section>
      <section anchor="scoping-applications">
        <name>Scoping Applications</name>
        <t>This memo does not specify the scope of applicability for the information obtained from a well-known URI, and does not specify how to discover a well-known URI for a particular application.</t>
        <t>Individual applications using this mechanism must define both aspects; if this is not specified, security issues can arise from implementation deviations and confusion about boundaries between applications.</t>
        <t>Applying metadata discovered in a well-known URI to resources other than those co-located on the same origin risks administrative as well as security issues. For example, allowing "https://example.com/.well-known/example" to apply policy to "https://department.example.com", "https://www.example.com", or even "https://www.example.com:8000" assumes a relationship between hosts where there might be none, thereby giving control to a potential attacker.</t>
        <t>Likewise, specifying that a well-known URI on a particular hostname is to be used to bootstrap a protocol can cause a large number of undesired requests. For example, if a well-known HTTPS URI is used to find policy about a separate service such as email, it can result in a flood of requests to Web servers, even if they don't implement the well-known URI. Such undesired requests can resemble a denial-of-service attack.</t>
      </section>
      <section anchor="hidden-capabilities">
        <name>Hidden Capabilities</name>
        <t>Applications using well-known locations should consider that some server administrators might be unaware of their existence (especially on operating systems that hide directories whose names begin with "."). This means that if an attacker has write access to the <br/>
.well-known directory, they would be able to control its contents, possibly without the administrator realising it.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="register">
        <name>The Well-Known URI Registry</name>
        <t>This specification updates the registration procedures for the "Well-Known URI" registry, first defined in <xref target="RFC5785"/>; see <xref target="procedure"/>.</t>
        <t>Well-known URIs are registered on the advice of one or more experts, with a Specification Required (using terminology from <xref target="RFC8126"/>).</t>
        <t>The experts' primary considerations in evaluating registration requests are:</t>
        <ul spacing="normal">
          <li>
            <t>Conformance to the requirements in <xref target="well-known"/></t>
          </li>
          <li>
            <t>The availability and stability of the specifying document</t>
          </li>
          <li>
            <t>The considerations outlined in <xref target="sec"/></t>
          </li>
        </ul>
        <t>IANA will direct the senders of any incoming registry requests to this document and, if defined, the processes established by the expert(s); typically, this will mean referring them to the registry Web page.</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC6454">
          <front>
            <title>The Web Origin Concept</title>
            <author fullname="A. Barth" initials="A." surname="Barth"/>
            <date month="December" year="2011"/>
            <abstract>
              <t>This document defines the concept of an "origin", which is often used as the scope of authority or privilege by user agents. Typically, user agents isolate content retrieved from different origins to prevent malicious web site operators from interfering with the operation of benign web sites. In addition to outlining the principles that underlie the concept of origin, this document details how to determine the origin of a URI and how to serialize an origin into a string. It also defines an HTTP header field, named "Origin", that indicates which origins are associated with an HTTP request. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6454"/>
          <seriesInfo name="DOI" value="10.17487/RFC6454"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC9110">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="HTML5" target="https://html.spec.whatwg.org">
          <front>
            <title>HTML - Living Standard</title>
            <author>
              <organization>WHATWG</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="FETCH" target="https://fetch.spec.whatwg.org">
          <front>
            <title>Fetch - Living Standard</title>
            <author>
              <organization>WHATWG</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC8323">
          <front>
            <title>CoAP (Constrained Application Protocol) over TCP, TLS, and WebSockets</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="S. Lemay" initials="S." surname="Lemay"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="B. Silverajan" initials="B." surname="Silverajan"/>
            <author fullname="B. Raymor" initials="B." role="editor" surname="Raymor"/>
            <date month="February" year="2018"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP), although inspired by HTTP, was designed to use UDP instead of TCP. The message layer of CoAP over UDP includes support for reliable delivery, simple congestion control, and flow control.</t>
              <t>Some environments benefit from the availability of CoAP carried over reliable transports such as TCP or Transport Layer Security (TLS). This document outlines the changes required to use CoAP over TCP, TLS, and WebSockets transports. It also formally updates RFC 7641 for use with these transports and RFC 7959 to enable the use of larger messages over a reliable transport.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8323"/>
          <seriesInfo name="DOI" value="10.17487/RFC8323"/>
        </reference>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC9309">
          <front>
            <title>Robots Exclusion Protocol</title>
            <author fullname="M. Koster" initials="M." surname="Koster"/>
            <author fullname="G. Illyes" initials="G." surname="Illyes"/>
            <author fullname="H. Zeller" initials="H." surname="Zeller"/>
            <author fullname="L. Sassman" initials="L." surname="Sassman"/>
            <date month="September" year="2022"/>
            <abstract>
              <t>This document specifies and extends the "Robots Exclusion Protocol" method originally defined by Martijn Koster in 1994 for service owners to control how content served by their services may be accessed, if at all, by automatic clients known as crawlers. Specifically, it adds definition language for the protocol, instructions for handling errors, and instructions for caching.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9309"/>
          <seriesInfo name="DOI" value="10.17487/RFC9309"/>
        </reference>
        <reference anchor="P3P" target="https://www.w3.org/TR/2002/REC-P3P-20020416/">
          <front>
            <title>The Platform for Privacy Preferences 1.0 (P3P1.0) Specification</title>
            <author fullname="Massimo Marchiori" role="editor"/>
            <date day="16" month="April" year="2002"/>
          </front>
          <seriesInfo name="W3C REC" value="REC-P3P-20020416"/>
          <seriesInfo name="W3C" value="REC-P3P-20020416"/>
        </reference>
        <reference anchor="RFC4918">
          <front>
            <title>HTTP Extensions for Web Distributed Authoring and Versioning (WebDAV)</title>
            <author fullname="L. Dusseault" initials="L." role="editor" surname="Dusseault"/>
            <date month="June" year="2007"/>
            <abstract>
              <t>Web Distributed Authoring and Versioning (WebDAV) consists of a set of methods, headers, and content-types ancillary to HTTP/1.1 for the management of resource properties, creation and management of resource collections, URL namespace manipulation, and resource locking (collision avoidance).</t>
              <t>RFC 2518 was published in February 1999, and this specification obsoletes RFC 2518 with minor revisions mostly due to interoperability experience. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4918"/>
          <seriesInfo name="DOI" value="10.17487/RFC4918"/>
        </reference>
        <reference anchor="RFC7320">
          <front>
            <title>URI Design and Ownership</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <date month="July" year="2014"/>
            <abstract>
              <t>Section 1.1.1 of RFC 3986 defines URI syntax as "a federated and extensible naming system wherein each scheme's specification may further restrict the syntax and semantics of identifiers using that scheme." In other words, the structure of a URI is defined by its scheme. While it is common for schemes to further delegate their substructure to the URI's owner, publishing independent standards that mandate particular forms of URI substructure is inappropriate, because that essentially usurps ownership. This document further describes this problematic practice and provides some acceptable alternatives for use in standards.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7320"/>
          <seriesInfo name="DOI" value="10.17487/RFC7320"/>
        </reference>
        <reference anchor="RFC8307">
          <front>
            <title>Well-Known URIs for the WebSocket Protocol</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>RFC 5785 defines a path prefix, "/.well-known/", that can be used by well-known URIs. It was specifically defined for the "http" and "https" URI schemes. The present memo formally updates RFC 6455, which defines the URI schemes defined for the WebSocket Protocol, to extend the use of these well-known URIs to those URI schemes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8307"/>
          <seriesInfo name="DOI" value="10.17487/RFC8307"/>
        </reference>
        <reference anchor="RFC2026">
          <front>
            <title>The Internet Standards Process -- Revision 3</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="October" year="1996"/>
            <abstract>
              <t>This memo documents the process used by the Internet community for the standardization of protocols and procedures. It defines the stages in the standardization process, the requirements for moving a document between stages and the types of documents used during this process. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="9"/>
          <seriesInfo name="RFC" value="2026"/>
          <seriesInfo name="DOI" value="10.17487/RFC2026"/>
        </reference>
        <reference anchor="RFC3552">
          <front>
            <title>Guidelines for Writing RFC Text on Security Considerations</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="B. Korver" initials="B." surname="Korver"/>
            <date month="July" year="2003"/>
            <abstract>
              <t>All RFCs are required to have a Security Considerations section. Historically, such sections have been relatively weak. This document provides guidelines to RFC authors on how to write a good Security Considerations section. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="72"/>
          <seriesInfo name="RFC" value="3552"/>
          <seriesInfo name="DOI" value="10.17487/RFC3552"/>
        </reference>
        <reference anchor="RFC6265">
          <front>
            <title>HTTP State Management Mechanism</title>
            <author fullname="A. Barth" initials="A." surname="Barth"/>
            <date month="April" year="2011"/>
            <abstract>
              <t>This document defines the HTTP Cookie and Set-Cookie header fields. These header fields can be used by HTTP servers to store state (called cookies) at HTTP user agents, letting the servers maintain a stateful session over the mostly stateless HTTP protocol. Although cookies have many historical infelicities that degrade their security and privacy, the Cookie and Set-Cookie header fields are widely used on the Internet. This document obsoletes RFC 2965. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6265"/>
          <seriesInfo name="DOI" value="10.17487/RFC6265"/>
        </reference>
        <reference anchor="WEBSTORAGE" target="https://www.w3.org/TR/2016/REC-webstorage-20160419/">
          <front>
            <title>Web Storage (Second Edition)</title>
            <author fullname="Ian Hickson" role="editor"/>
            <date day="19" month="April" year="2016"/>
          </front>
          <seriesInfo name="W3C REC" value="REC-webstorage-20160419"/>
          <seriesInfo name="W3C" value="REC-webstorage-20160419"/>
        </reference>
        <reference anchor="CSP" target="https://www.w3.org/TR/2016/WD-CSP3-20160913/">
          <front>
            <title>Content Security Policy Level 3</title>
            <author/>
            <date day="13" month="September" year="2016"/>
          </front>
          <seriesInfo name="W3C WD" value="WD-CSP3-20160913"/>
          <seriesInfo name="W3C" value="WD-CSP3-20160913"/>
        </reference>
        <reference anchor="REFERRER-POLICY" target="https://www.w3.org/TR/2017/CR-referrer-policy-20170126/">
          <front>
            <title>Referrer Policy</title>
            <author fullname="Emily Stark" role="editor"/>
            <author fullname="Jochen Eisinger" role="editor"/>
            <date day="26" month="January" year="2017"/>
          </front>
          <seriesInfo name="W3C CR" value="CR-referrer-policy-20170126"/>
          <seriesInfo name="W3C" value="CR-referrer-policy-20170126"/>
        </reference>
        <reference anchor="RFC5785">
          <front>
            <title>Defining Well-Known Uniform Resource Identifiers (URIs)</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <author fullname="E. Hammer-Lahav" initials="E." surname="Hammer-Lahav"/>
            <date month="April" year="2010"/>
            <abstract>
              <t>This memo defines a path prefix for "well-known locations", "/.well-known/", in selected Uniform Resource Identifier (URI) schemes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5785"/>
          <seriesInfo name="DOI" value="10.17487/RFC5785"/>
        </reference>
      </references>
    </references>
    <?line 204?>

<section anchor="frequently-asked-questions">
      <name>Frequently Asked Questions</name>
      <dl newline="true">
        <dt>Aren't well-known locations bad for the Web?</dt>
        <dd>
          <t>They are, but for various reasons -- both technical and social -- they are sometimes necessary. This memo defines a "sandbox" for them, to reduce the risks of collision and to minimise the impact upon preexisting URIs on sites.</t>
        </dd>
        <dt>Why "/.well-known?"</dt>
        <dd>
          <t>It's short, descriptive, and according to search indices, not widely used.</t>
        </dd>
        <dt>What impact does this have on existing mechanisms, such as P3P and robots.txt?</dt>
        <dd>
          <t>None, until they choose to use this mechanism.</t>
        </dd>
        <dt>Why aren't per-directory well-known locations defined?</dt>
        <dd>
          <t>Allowing every URI path segment to have a well-known location (e.g., "/images/.well-known/") would increase the risks of colliding with a preexisting URI on a site, and generally these solutions are found not to scale well because they're too "chatty".</t>
        </dd>
      </dl>
    </section>
    <section anchor="changes-from-rfc-8615">
      <name>Changes from RFC 8615</name>
      <t>TBD</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
